Check patentability & draft patents in minutes with Patsnap Eureka AI!

ID (Identity) binding method and system

A technology of identity identification and binding, applied in the network field, can solve problems such as inability to enter web pages, inconvenience for users, etc., and achieve the effect of convenient login

Active Publication Date: 2013-01-23
TENCENT TECH (SHENZHEN) CO LTD
View PDF3 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the web sites user1gmail.com and user1product1.com will be considered as two independent users, and user1gmail.com cannot be used to enter the web page of the user1product1.com account, which causes inconvenience to users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • ID (Identity) binding method and system
  • ID (Identity) binding method and system
  • ID (Identity) binding method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 2

[0052] In the second embodiment, if figure 2 As shown, before the above step of obtaining the second identity for logging into the second website, it also includes:

[0053] Step S201, acquiring a user's selection instruction.

[0054] In this embodiment, the user can choose whether to bind the identity through the selection interface provided by the second website.

[0055] Step S203, judging whether to bind the first identity according to the user's selection instruction, if yes, go to step S103, if not, go to step S205.

[0056] In this embodiment, the judgment is made through the user's selection instruction. When it is judged that the first identity needs to be bound, enter step S103 to establish an association relationship between the first identity and the second identity. When the first identity is identified, the first identity is directly used as the user's identity in the second website. Specifically, after the user's identity verification is successful, the use...

Embodiment 3

[0059] In the third embodiment, as image 3 As shown, after the above step of obtaining the second identity for logging into the second website, it also includes:

[0060] Step S301, acquiring the password input by the user and corresponding to the second identity.

[0061] Step S303, perform identity verification according to the second identity mark and the corresponding password, and judge whether the identity verification is successful, if yes, proceed to step S104, if not, end.

[0062] In this embodiment, in order to ensure the security of the system and prevent the second identity in the second website from being maliciously bound, it is necessary to perform identity verification according to the second identity and the corresponding password entered by the user to determine whether the user has the right to Bind the second identity with the first identity.

[0063] Step S104, establishing a mapping relationship between the first identity and the second identity.

[...

Embodiment 4

[0066] In the fourth embodiment, as Figure 4 As shown, in the above identity binding method, the following steps are also included before the step of obtaining the second identity used to log in to the second website:

[0067] Step S401, judge whether the user is logging in the second website for the first time according to the first identity, if yes, go to step S103, if not, go to step S403.

[0068] In this embodiment, after successfully logging in to the second website through the first identity, the user can inquire whether the user is using the first identity to log in to the second website for the first time. If so, it means that the user may need to use the first identity The identifier is bound to the user's original second identity in the second website. At this time, the user's original second identity in the second website is acquired, and if not, enter the second website.

[0069] Step S403, searching the mapping table whether there is a second identity that has ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an ID (Identity) binding method comprises the following steps of acquiring a first ID used for logging in a first website; logging in a second website with the first ID; acquiring a second ID for logging in the second website; and establishing the mapping relation between the first ID and the second ID. According to the ID binding method and an ID binding system, disclosed by the invention, the first ID and the original second ID of a user are bound when the first ID is used for logging in the second website, so that the related second ID can be found through the first ID when the user logs in the second website again, the login of the second website can be realized by the universal first ID, and if the user corresponding to the first ID and the user corresponding to the second ID are the same user can be identified when the user logs in the second website with the first ID, so that one ID used for logging in different websites is achieved and convenience is brought for users to login.

Description

【Technical field】 [0001] The invention relates to network technology, in particular to an identity mark binding method and system. 【Background technique】 [0002] When users use the services of a certain website, they usually register an account on the website to identify themselves. With the emergence of various websites that can provide services to users on the Internet, more and more users accept the services provided by the websites by registering accounts in these websites. [0003] When users register accounts on more and more websites, users will face the annoyance of managing these accounts. At this time, some users may consider using the same account number and password when registering on different websites, but this may cause security risks of account password leakage. [0004] Therefore, in order to solve such problems, an open identity (Open ID) can be used to open up user systems among major websites. Through this open identity, a unified identity can be use...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/32
CPCH04L63/10H04W12/08H04L9/32G06F21/41H04L63/0815H04L29/06H04L67/02H04W12/06H04L63/08
Inventor 韩娅
Owner TENCENT TECH (SHENZHEN) CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More