Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for recognizing event participant

A participant and event technology, applied to electrical components, user identity/authority verification, digital transmission systems, etc., can solve the problems of high verification failure risk, J2 confuse the past, long time, etc., and achieve the effect of reducing the risk of forgery

Inactive Publication Date: 2017-07-07
陈曦
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If S2 is the real maintenance worker subcontracted by ST, J2 is also easy to be fooled
[0006] It can be seen that Party A uses the verification information provided by Party B to verify Party B's identity, and there is a relatively high risk of verification failure.
[0007] In addition, the above-mentioned authentication information (employment card, ID card, etc.) will exist for a relatively long time, which provides the possibility of forging these authentication information in time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] In a certain event, Party A informs the system of the event identifier through the network or telephone. Party A and the system party negotiate the content to be verified and generate verification information. Then the system side sends the verification information to one or both of Party A and Party B. After receiving the verification information, Party A can use the verification information to determine whether Party B is a participant of the activity.

[0017] The content to be verified can be static information, such as Party B’s job number, photo, phone number, etc.; it can also be dynamically generated content, such as a photo taken by Party A in real time, a string of randomly generated numbers, etc.; it can also be A combination of the above two types of content, such as job number plus random numbers.

[0018] Give a specific example. If Party A J3 needs to repair a certain home appliance, after contacting the manufacturer, the manufacturer will assign a rep...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention describes a method applied in an activity to authenticate the identity of the other party participating in the activity. The authenticator sends an authentication request to the authentication server, and the server sends the authentication information to the authenticated party or the authenticating party. The verifier compares the received verification information to achieve the purpose of verifying the verified party. Verifiers can request different types of verification content, thereby increasing the reliability of the authentication method.

Description

technical field [0001] The invention describes a method for authenticating the identity of the other party participating in a certain activity. The verifier sends a verification request to the verification server, and the server sends the verification information to the verified party or the verifier. The verifying party compares the received verification information to achieve the purpose of verifying the verified party. The authenticator can request different types of authentication content, thereby improving the reliability of the authentication method. Background technique [0002] In daily activities, some of the participants in the activities are not familiar with each other. In order to confirm the identity of the other party (Party B), one party (Party A) needs to verify whether Party B is a participant of the activity. [0003] In current practice, verification information is provided by Party B. Such as Party B's work permit, work clothes, etc. In this way, si...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32
CPCH04L9/3218
Inventor 陈曦
Owner 陈曦