Network user identifying method and system

A verification method and technology for network users, applied in the field of network user verification methods and systems, capable of solving problems such as reduced security

Inactive Publication Date: 2012-09-12
李明
View PDF1 Cites 105 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The patent "e-mail password verification system and method" (patent number: 200810301774.0) once announced a second password verification method for mailboxes. After the user enters the correct password for the first time to enter the interface, he can also enter a second password on the verification interface. However, no matter what, you need to enter the password under the premise of displaying the user authentication interface, which makes it easy for people to notice that there are more user permissions and hidden data, which greatly reduces the security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network user identifying method and system
  • Network user identifying method and system
  • Network user identifying method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are part of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by ordinary persons in the art without creative efforts belong to the protection scope of the present invention.

[0018] figure 1 It is a schematic diagram of a network user verification method and system according to an embodiment of the present invention, such as figure 1 As shown, the method includes:

[0019] Step 101: The access terminal connects to the server terminal through the network.

[0020] Step 102: The access terminal submits the registered user information to the server

[0021] Step 103: the server sends the user information of the access terminal to the us...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network user identifying method and system, which belong to the technical field of information safety. The system comprises an access terminal, a network server, a user identifying program and a user database, wherein the user identifying program is installed in a network server end. The method comprises the following steps: when the access terminal accesses the network server, the user identifying program compares relevant user information submitted by using access terminal input equipment of the access terminal with user information stored in the user database for identifying, acquires the identification information of network connecting equipment which is directly connected with the access terminal at present, and compares with relevant identification information of the network connecting equipment which is directly connected with the access terminal acquired by using the server during previous submission of user registration information by an access terminal stored in the user database for identifying; and the user identifying program performs corresponding preset operation on a data operation permission which can be acquired by the access terminal according to an identification result of the user registration information and an identification result of the identification information of the network connecting equipment which is directly connected with the access terminal. Due to the adoption of the system and the method, a user identifying interface is not displayed, input of secondary identifying information is hidden, a server user identifying program background is used for identifying input identifying information, and different user permissions are open to the user according to identification results.

Description

Technical field: [0001] The invention relates to the technical field of information security, in particular to a network user authentication method and system. Background technique: [0002] With the development of Internet technology, people rely more and more on the Internet for various business and entertainment applications, followed by the occurrence of various information leakage incidents. Provide user password information and let the server identify the user's identity, but hackers can use various stealing techniques to obtain the user's account password, which makes frequent incidents of counterfeiting user identities engaged in various information fraud and data theft. How to prevent such security incidents The occurrence of this is a problem to be solved. [0003] The patent "e-mail password verification system and method" (patent number: 200810301774.0) once announced a second password verification method for mailboxes. After the user enters the correct password...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
Inventor 李明
Owner 李明
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products