User identification method, device and system
A technology of user identity and determination method, applied in the field of communication, can solve the problem of illegal users not performing user authentication and so on
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0029] An embodiment of the present invention provides a user identity determination method, such as figure 1 shown, including:
[0030] Step S101: After the user is authenticated, the network first randomly generates the first information, encrypts the first information with the shared key corresponding to the address of the client where the authenticated user is located, and sends the encrypted result to the client where the authenticated user is located terminal, and record the current time as the legal time corresponding to the authenticated user.
[0031] Among them, the shared key is generated according to the user password, for example, use the key generation algorithm to operate the user password to generate the shared key; or generate a random number, and use the key generation algorithm to perform operations on the user password and the random number to generate Shared key; or use the key generation algorithm agreed with the client to operate on the user password to...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 