ID (Identity) binding method and system
A technology of identity identification and binding, applied in the network field, can solve problems such as inability to enter web pages, inconvenience for users, etc., and achieve the effect of convenient login
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0052] In the second embodiment, such as figure 2 As shown, before the step of obtaining the second identity for logging in to the second website, it further includes:
[0053] Step S201: Obtain a user's selection instruction.
[0054] In this embodiment, the user can choose whether to bind the identity through the selection interface provided by the second website.
[0055] Step S203: Determine whether to bind the first identity identifier according to the user's selection instruction, if yes, go to step S103, if not, go to step S205.
[0056] In this embodiment, the judgment is made by the user's selection instruction. When it is judged that the first identity needs to be bound, step S103 is entered to establish the association relationship between the first identity and the second identity. In the case of the first identity, the first identity is directly used as the user's identity in the second website. Specifically, after the user's identity verification is successful, enter t...
Example Embodiment
[0059] In the third embodiment, such as image 3 As shown, after the step of obtaining the second identity for logging in to the second website, the method further includes:
[0060] Step S301: Obtain a password input by the user and corresponding to the second identity identifier.
[0061] Step S303: Perform identity verification according to the second identity and the corresponding password, and determine whether the identity verification is successful, if yes, proceed to step S104, if not, end.
[0062] In this embodiment, in order to ensure the security of the system and prevent the second identity in the second website from being maliciously bound, it is necessary to perform identity verification according to the second identity entered by the user and the corresponding password to determine whether the user has the right Bind the second identity with the first identity.
[0063] Step S104: Establish a mapping relationship between the first identity and the second identity.
[00...
Example Embodiment
[0066] In the fourth embodiment, such as Figure 4 As shown, in the above-mentioned identity binding method, before the step of obtaining the second identity for logging in to the second website, the following steps are further included:
[0067] In step S401, it is determined whether the user logs in to the second website for the first time according to the first identity, if yes, then go to step S103, if not, then go to step S403.
[0068] In this embodiment, after the user successfully logs in to the second website through the first identity, it can be queried whether the user logs in to the second website with the first identity for the first time. If so, it means that the user may need to change the first identity The identifier is bound to the user's original second identity in the second website. At this time, the user's original second identity in the second website is obtained, and if not, the second website is entered.
[0069] Step S403: Find from the mapping table whether...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap