Unlock instant, AI-driven research and patent intelligence for your innovation.
Identity analysis method and device
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
An analysis method and identity technology, applied in the field of Internet communication, can solve problems such as inability to obtain IP addresses, and achieve the effect of reducing the burden
Inactive Publication Date: 2013-09-11
王正伟
View PDF7 Cites 6 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
Although users of the same IMS can obtain each other’s IP address, for example, in Tencent’s IMS, QQ user UsrA can obtain the IP address of UsrX through the QQ number of a QQ user UsrX, but users of different IMS However, this cannot be done in time. For example, for Baidu’s Hi user UsrD, he cannot obtain UsrX’s IP address based on UsrX’s QQ number.
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
no. 1 example
[0262] First, in step 501, when UsrB receives the connection request initiated by UsrA, or receives the GUID sent by UsrA, it analyzes the received data packet to obtain the source IP address.
[0263]For example, the source IP address is obtained by parsing the protocol header of the received IP data packet as the sender's IP address. In practice, when receiving the connection request initiated by the UsrA client, or when it is a UDP packet, the IP address of the peer can be obtained by parsing the corresponding IP protocol header, and the peer IP address can be obtained by parsing the corresponding TCP or UDP protocol header. end port number.
[0264] Step 502: After receiving the GUID sent by UsrA, UsrB analyzes the GUID according to the GUID analysis method provided by the present invention to obtain the corresponding IP address.
[0265] For example, send a request message to HSvr-B requesting to resolve the GUID, HSvr-B sends the request to HSvr-A, and Hsvr-A obtains th...
no. 2 example
[0271] First, in step 601, UsrB receives the UDP data packet of UsrA, and parses the received data packet to obtain the source IP address. For example, the source IP address is obtained by parsing the protocol header of the received IP data packet as the sender's IP address.
[0272] Step 602, UsrB obtains the carried GUID from the UDP data packet, and analyzes the GUID according to the GUID analysis method to obtain the corresponding IP address.
[0273] Step 603, UsrB judge whether the IP address obtained in step 601 is consistent with the IP address obtained in step 602, for example whether they are the same, if consistent, then use the GUID as the GUID of UsrA, otherwise, think that UsrA has sent a false GUID.
[0274] When UsrB determines that UsrA has sent a false GUID, it can discard the message sent by UsrA.
[0275] Through the above caller identification method, it is possible to prevent phone fraud or short message fraud by using caller identity fraud.
[0276] I...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
PUM
Login to View More
Abstract
The invention discloses an identity analysis method. According to the method, corresponding relation of an HCode and an HSvr is established so that an Internet user can obtain an IP address registered corresponding to an analysis target by analyzing the target attributive HSvr. Accordingly, communication with a user can be achieved by analyzing the GUID of the user, so that communication between people is convenient. The invention further provides a host identification method, the user can identify a false GUID through the method, and the user cannot be cheated. The invention further provides a browsing method, information provided by a host indicated by the GUID can be browsed through a browser improved with the method, the user can be helped to issue a website based on the GUID, and the method helps to control domain name number expanding speed. The invention further provides the HSvr, and identity analysis service is provided for global users through the HSvr.
Description
technical field [0001] The invention relates to Internet communication, more specifically to a method and device for analyzing the unified identity of global users in the Internet. Background technique [0002] Internet-based communication, including text, voice, video and other interactions, can achieve or even exceed the same effect as communication based on telecommunication networks. Why do most Internet users need to be equipped with fixed-line telephones for telecommunication networks? This kind of network deployment with repeated functions not only wastes social resources, but also occupies the limited private space of users. For example, users deploying Internet network cables generally also need to deploy a subscriber line of the telecommunication network for the access of fixed telephone terminals. In addition, with the popularization of the Internet, many people spend a lot of time facing the computer every day. Because when answering the telephone of the teleco...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.