Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for authentication of identity of network user

An identity authentication and network user technology, applied in the field of identity authentication that prevents user operations from being blocked by specific external software programs, can solve problems such as increased maintenance costs, easy to be tracked and analyzed by plug-ins, and achieve the effect of improving efficiency and reliability

Active Publication Date: 2009-04-29
BEIJING KINGSOFT SOFTWARE
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantage of this method is that: the anti-cheat program algorithm is generated on the client side, and the algorithm and characteristics of the anti-cheat program are easily tracked and analyzed by the plug-in program, and then the answers to the problems involved in the anti-cheat program can be obtained by analysis, or according to the anti-cheat program The technical features bypass or block the search of anti-plug-in programs
Therefore, the anti-plug-in program needs to continuously update the client, which increases the maintenance cost

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for authentication of identity of network user
  • Method for authentication of identity of network user

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] The invention provides a network user's identity authentication method, which prevents specific external programs from shielding or replacing the user's network operations.

[0049] refer to figure 1 , illustrating an implementation method of an identity authentication method of the present invention.

[0050] 11) The client and the server save the same picture group; the client and the server can save one picture group or multiple picture groups, and each group of pictures should consist of at least two pictures;

[0051] 12) When the identity authentication trigger condition is reached, the server selects at least one picture in the picture group for interference processing, and obtains the disturbed picture;

[0052] The arrival of the identity authentication trigger condition can be the timer reaching the preset business operation duration, or the business has reached a certain stage, which can be used alone or in combination according to the characteristics of the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This invention discloses a network user identity certification method including: the customer end and the service end maintain same picture sets. The service end selects at least one picture for interference process from the picture set to get an interfered picture when arriving at the trigger condition of the identity certification and sends the interfered picture information. The customer end obtains the information to display the interfered picture and pictures of the set. The service end judges if the picture identification feedback by the customer end is the same with that of the processed pictures, if so, the current service of the customer end is continued.

Description

technical field [0001] The invention relates to a network user identity authentication method, in particular to an identity authentication method for preventing user operations from being shielded by specific external software programs. Background technique [0002] With the popularity of Internet applications, in order to ensure the security of Internet applications, user identity authentication has been paid more and more attention. In addition to distinguishing different user identities, the usual user identity authentication also includes preventing specific external software programs from shielding user operations through user identity authentication, and replacing users with network operations, thereby threatening user information security or endangering network applications. . [0003] Taking online games as an example, the user identity authentication is mainly used to prevent game players from using game cheats. The so-called game plug-in is an auxiliary program o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32
Inventor 何剑峰
Owner BEIJING KINGSOFT SOFTWARE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products