Authentication method and device, electronic equipment and storage medium

An authentication method and authentication result technology, applied in the blockchain field, can solve the problems of low efficiency, complexity, time-consuming identity authentication process, etc.

Active Publication Date: 2020-04-28
CHINA UNITED NETWORK COMM GRP CO LTD +1
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the existing technology, in the process of using the blockchain to authenticate the user's identity, the server needs to send the identity authentication request t

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method and device, electronic equipment and storage medium
  • Authentication method and device, electronic equipment and storage medium
  • Authentication method and device, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] In order to make the purpose, technical solutions and advantages of the application clearer, the technical solutions in the embodiments of the application will be clearly and completely described below in conjunction with the embodiments of the application. Obviously, the described embodiments are part of the implementation of the application. example, not all examples. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0046]The development of communication technology will have a huge impact on the application of big data. Especially in the communication industry, the rapid expansion of communication data leads to higher and higher requirements for data collection and faster data transmission. In the communication industry, the sources of data are gradually diversified and the data dimensions are getting higher and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an authentication method and device, electronic equipment and a storage medium, and the method comprises the steps: receiving an authentication request from terminal equipment,wherein the authentication request is used for requesting the authentication of the identity of a user corresponding to the terminal equipment, and the authentication request comprises identity authentication information; inputting the identity authentication information into a first model to obtain a first authentication result, wherein the first model is used for representing a corresponding relation between the identity authentication information and a prediction result, and the first authentication result is a prediction result of identity authentication of the user; if the first authentication result is that the authentication is passed, sending the first authentication result to the terminal equipment and other nodes in the blockchain. According to the authentication method providedby the invention, the identity authentication efficiency of the user can be improved.

Description

technical field [0001] The present application relates to the technical field of block chain, and in particular to an authentication-based method, device, electronic equipment and storage medium. Background technique [0002] Identity authentication refers to the process of confirming the identity of a user in a computer and computer network system to determine whether the user has access and use rights, so that the access policy of the computer and network system can be executed reliably and effectively, preventing attackers from impersonating legitimate users Gaining access, keeping systems and data secure, and legitimate interests of authorized users. With the development of science and technology, blockchain technology is developing rapidly. [0003] In the prior art, blockchain technology can be used to verify the user's identity. Specifically, it may include: the client sends an identity authentication request to the server to request identity authentication for the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L12/24
CPCH04L41/145H04L41/147H04L63/0815H04L63/0876
Inventor 谢云龙樊利安贾俊峰
Owner CHINA UNITED NETWORK COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products