Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Verification method of user identity and apparatus thereof

A user identity and verification method technology, applied in the field of user identity verification methods and devices, can solve problems such as low business processing efficiency and waste of system resources, and achieve the effects of improving verification flexibility, saving system resources, and improving verification experience

Inactive Publication Date: 2012-02-08
ALIBABA GRP HLDG LTD
View PDF9 Cites 77 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the embodiments of the present application is to provide a user identity verification method and device to solve the problems in the prior art that the single use of a verification method with a higher verification level leads to low efficiency of the system in processing business and wastes system resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verification method of user identity and apparatus thereof
  • Verification method of user identity and apparatus thereof
  • Verification method of user identity and apparatus thereof

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0028] see figure 1 , which is the flow chart of the first embodiment of the method for verifying the identity of the user in this application:

[0029] Step 101: Receive a user request sent by the client, where the user request includes the user name of the client.

[0030] Before using the services provided by a certain website, the user first needs to register as a member of the website. During the registration, the website server will record the user’s user name, password and other registration information; The user sends corresponding verification information such as keys and tokens for the user to verify whether the service is legal each time the user uses the service, and the verification information is also associated with the corresponding user through the user name.

[0031] When the user logs in to the website through the client and chooses to use a certain service, a verification request is sent to the server, and the verification request includes the user's usern...

no. 2 example

[0045] see figure 2 , which is the flow chart of the second embodiment of the method for verifying the user identity of the present application:

[0046] Step 201: Save several executable verification methods and the risk level corresponding to each verification method.

[0047]In this embodiment of the application, instead of simply outputting a fixed verification method to the user according to the business type and user type, a corresponding risk level is set for each verification method, so that the corresponding verification method can be subsequently output according to the risk level requested by the user this time.

[0048] For example, in the embodiment of this application, three verification methods and their corresponding risk levels can be set, as shown in Table 1 below:

[0049] Table 1

[0050] Ways of identifying

risk level

Certificate

high

safe question

middle

PIN

Low

[0051] Step 202: Receive a us...

no. 3 example

[0077] see image 3 , which is the flow chart of the third embodiment of the verification method output method of this application:

[0078] Step 301: Receive the user request sent by the client, the user request includes the user name of the client and the requested service type information.

[0079] Step 302: output an initial verification method corresponding to the service type information according to the service type information.

[0080] The difference from the previous embodiments is that in this embodiment, instead of directly obtaining the corresponding authentication method based on user information, secondary authentication is performed in combination with the business type, that is, it is compatible with the existing authentication methods based on the business type or user type.

[0081] In this embodiment, the server can pre-set a corresponding verification method for each type of service, and after receiving the verification request, first output the verificat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Embodiments of the invention disclose a verification method of a user identity and an apparatus thereof. The method comprises the following steps: receiving a user request transmitted by a client, wherein the user request includes a user name of the client; searching corresponding user information according to the user name; analyzing the user information; outputting a verification mode to the client according to an analysis result of the user information; determining whether verification information returned by the client according to the verification mode is correct or not; if the verification information is correct, passing user identity verification, otherwise, not passing the user identity verification. In the embodiments of the invention, a single verification mode with a higher grade is not the only mode to output to the user but the verification modes with different verification grades are output according to the user information. Therefore, system resources consumed during carrying out user identity verification can be saved; a processing speed and efficiency of the identity verification can be raised. The verification with complex operations does not need to be performed every time so that verification experience of the user can be raised too.

Description

technical field [0001] The present application relates to the technical field of network communication, in particular to a user identity verification method and device. Background technique [0002] In the Internet industry, if the client wants to use the service provided by the service provider, it needs to interact with the service server. After the service server identifies the user identity of the client, it can allow the user to access the corresponding service through the client. In the prior art, the method for the server to verify whether the client user is legal can be verified based on what the user knows, including verifying passwords, asking security questions, verifying personal identification numbers or keys, etc.; Whether the certificates, tokens, ID cards, bank cards, etc. held by the user are legal; it can also be verified based on user attributes, including the user's voice characteristics, notes, fingerprints, etc. [0003] In the process of researching t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
Inventor 秦韬王凯陈贵艺
Owner ALIBABA GRP HLDG LTD
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More