skip to main content
Language:
Search Limited to: Search Limited to: Resource type Show Results with: Show Results with: Search type Index

Access application authentication method based on cross-chain application

Digital Resources/Online E-Resources

Citations Cited by
  • Title:
    Access application authentication method based on cross-chain application
  • Author: FANG JINGXIN ; ZHAO RUIBIN ; WANG JIAYING ; ZHAO YAJUN ; ZHANG HAO ; LU KAI ; KANG XIAOPU
  • Subjects: ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRICITY ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
  • Description: The invention discloses an access application authentication method based on a cross-chain application, relates to the technical field of application authentication, and solves the technical problem that in the prior art, a corresponding application terminal cannot be analyzed in a cross-chain application process, so that the authentication opportunity setting of the corresponding application terminal is unreasonable. After the block chain transaction is executed and the application terminal is connected to the network, the authentication opportunity analysis is performed on the application terminal, and the authentication opportunity is constructed according to the real-time network connection type of the application terminal, so that the authentication security is improved, the application authentication cost is controlled, the authentication cost control is performed on the premise of not influencing the data security, and the user experience is improved. The working efficiency of application authenticatio
  • Creation Date: 2022
  • Language: Chinese;English
  • Source: esp@cenet

Searching Remote Databases, Please Wait