Method for recognizing event participant
A participant and event technology, applied to electrical components, user identity/authority verification, digital transmission systems, etc., can solve the problems of high verification failure risk, J2 confuse the past, long time, etc., and achieve the effect of reducing the risk of forgery
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0016] In a certain event, Party A informs the system of the event identifier through the network or telephone. Party A and the system party negotiate the content to be verified and generate verification information. Then the system side sends the verification information to one or both of Party A and Party B. After receiving the verification information, Party A can use the verification information to determine whether Party B is a participant of the activity.
[0017] The content to be verified can be static information, such as Party B’s job number, photo, phone number, etc.; it can also be dynamically generated content, such as a photo taken by Party A in real time, a string of randomly generated numbers, etc.; it can also be A combination of the above two types of content, such as job number plus random numbers.
[0018] Give a specific example. If Party A J3 needs to repair a certain home appliance, after contacting the manufacturer, the manufacturer will assign a rep...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More