ID (Identity) binding method and system

A technology of identity identification and binding, applied in the network field, can solve problems such as inability to enter web pages, inconvenience for users, etc., and achieve the effect of convenient login

Active Publication Date: 2013-01-23
TENCENT TECH (SHENZHEN) CO LTD
View PDF3 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the web sites user1gmail.com and user1product1.com will be considered as two independent users, and user1g

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • ID (Identity) binding method and system
  • ID (Identity) binding method and system
  • ID (Identity) binding method and system

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0052] In the second embodiment, such as figure 2 As shown, before the step of obtaining the second identity for logging in to the second website, it further includes:

[0053] Step S201: Obtain a user's selection instruction.

[0054] In this embodiment, the user can choose whether to bind the identity through the selection interface provided by the second website.

[0055] Step S203: Determine whether to bind the first identity identifier according to the user's selection instruction, if yes, go to step S103, if not, go to step S205.

[0056] In this embodiment, the judgment is made by the user's selection instruction. When it is judged that the first identity needs to be bound, step S103 is entered to establish the association relationship between the first identity and the second identity. In the case of the first identity, the first identity is directly used as the user's identity in the second website. Specifically, after the user's identity verification is successful, enter t...

Example Embodiment

[0059] In the third embodiment, such as image 3 As shown, after the step of obtaining the second identity for logging in to the second website, the method further includes:

[0060] Step S301: Obtain a password input by the user and corresponding to the second identity identifier.

[0061] Step S303: Perform identity verification according to the second identity and the corresponding password, and determine whether the identity verification is successful, if yes, proceed to step S104, if not, end.

[0062] In this embodiment, in order to ensure the security of the system and prevent the second identity in the second website from being maliciously bound, it is necessary to perform identity verification according to the second identity entered by the user and the corresponding password to determine whether the user has the right Bind the second identity with the first identity.

[0063] Step S104: Establish a mapping relationship between the first identity and the second identity.

[00...

Example Embodiment

[0066] In the fourth embodiment, such as Figure 4 As shown, in the above-mentioned identity binding method, before the step of obtaining the second identity for logging in to the second website, the following steps are further included:

[0067] In step S401, it is determined whether the user logs in to the second website for the first time according to the first identity, if yes, then go to step S103, if not, then go to step S403.

[0068] In this embodiment, after the user successfully logs in to the second website through the first identity, it can be queried whether the user logs in to the second website with the first identity for the first time. If so, it means that the user may need to change the first identity The identifier is bound to the user's original second identity in the second website. At this time, the user's original second identity in the second website is obtained, and if not, the second website is entered.

[0069] Step S403: Find from the mapping table whether...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an ID (Identity) binding method comprises the following steps of acquiring a first ID used for logging in a first website; logging in a second website with the first ID; acquiring a second ID for logging in the second website; and establishing the mapping relation between the first ID and the second ID. According to the ID binding method and an ID binding system, disclosed by the invention, the first ID and the original second ID of a user are bound when the first ID is used for logging in the second website, so that the related second ID can be found through the first ID when the user logs in the second website again, the login of the second website can be realized by the universal first ID, and if the user corresponding to the first ID and the user corresponding to the second ID are the same user can be identified when the user logs in the second website with the first ID, so that one ID used for logging in different websites is achieved and convenience is brought for users to login.

Description

【Technical field】 [0001] The invention relates to network technology, in particular to an identity mark binding method and system. 【Background technique】 [0002] When users use the services of a certain website, they usually register an account on the website to identify themselves. With the emergence of various websites that can provide services to users on the Internet, more and more users accept the services provided by the websites by registering accounts in these websites. [0003] When users register accounts on more and more websites, users will face the annoyance of managing these accounts. At this time, some users may consider using the same account number and password when registering on different websites, but this may cause security risks of account password leakage. [0004] Therefore, in order to solve such problems, an open identity (Open ID) can be used to open up user systems among major websites. Through this open identity, a unified identity can be use...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32
CPCH04L63/10H04W12/08H04L9/32G06F21/41H04L63/0815H04L29/06H04L67/02H04W12/06H04L63/08
Inventor 韩娅
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products