Method and device for user recognition

A user and current user technology, applied in the network field, can solve problems such as the inability to effectively identify the user's identity, and achieve the effect of ensuring uniqueness and timeliness

Inactive Publication Date: 2013-12-04
BEIJING IZP NETWORK TECH CO LTD
5 Cites 16 Cited by

AI-Extracted Technical Summary

Problems solved by technology

However, the identification of the user based on the registered user name is only valid after the user has logged in and verified, and is only valid with...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Method used

[0060] The prior art uses a website registration account to identify the user's identity, but if the user does not log in, or visits other websites at the same time, the user's identity cannot be identified. The embodiment of the present invention obtains the IP address from the user's uplink message, and then obtains the network access account corresponding to the user's IP address from the ISP access server to determine whether the user is a target user. For the vast majority of users, if they want to use the network, they must obtain the access verification of the network operator. If the verification is passed, the network operator will assign the user an IP address for this visit. As long as the user does not go offline, the user The network access account and IP address are always the only binding relationship. Therefore, identifying the user through the user's network access account ensures the uniqueness of user identification, and does not require the process of user registration and input of user name and password. for effective identification.
[0071] The identity mapping table is updated according to the identification result of the current user, which can ensure the timeliness and completeness of the content of the identity mapping table. In this way, if the user's identity is added to the identity mapping table after identification, when When the user needs to be re-identified, the identification can be completed only according to the content of the identity mapping table, without having to obtain the corresponding network access account from the network operator for re-identification. In this way, while ensuring the accuracy of user identification , which greatly reduces the processing steps required for identification and reduces th...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Abstract

The invention discloses a method and a device for user recognition. The method includes acquiring an uplink message of a current user, wherein the uplink message includes an address identity and an identity of the current user; matching the identity with a preset identity mapping list, if matched, determining the current user to be a target user; if not matched, acquiring a corresponding network access account according to the address identity of the current user; matching the network access account of the current user with a preset network access account mapping list, if matched, determining the current user to be the target user. Compared with the prior art, the method and the device for user recognition have the advantages that by the method, user identification information can be recognized timely and effectively while user login is not needed.

Application Domain

Technology Topic

Internet privacyCurrent user +1

Image

  • Method and device for user recognition
  • Method and device for user recognition
  • Method and device for user recognition

Examples

  • Experimental program(4)

Example Embodiment

[0041] Embodiment one
[0042] This embodiment provides a method for user identification, see figure 1 , the method includes:
[0043] In step 101, the uplink message of the current user is acquired, and the uplink message includes the address identifier and identity identifier of the current user.
[0044] The user's uplink message may be a Hypertext Transfer Protocol (Hypertext Transfer Protocol, HTTP) uplink message, or an uplink message based on other protocols, such as a File Transfer Protocol (File Transfer Protocol, FTP) uplink message, etc. .
[0045] The acquired uplink message of the user may be the uplink message sent by the user for the first time, or any uplink message sent during this communication process, which is not limited in the present invention. Taking a user accessing a website through a browser as an example, the user may click links multiple times when visiting the website, and each time the user clicks a new link, the HTTP uplink message of the current user can be obtained. In this embodiment, preferably, when the user clicks to enter the website for the first time, the HTTP uplink message of the current user is acquired.
[0046] It should be noted that the acquisition of the current user's uplink message can be obtained by the WEB server, or any device or program on the WEB server side, and in addition, it can also be other information that the user terminal will include the user address identifier and the identity identifier. The protocol message is sent to the corresponding server or device, which is not limited in the present invention. For ease of description, the embodiments of the present invention are described by taking the HTTP message obtained by a user by a WEB server as an example.
[0047] The address identifier of the current user in the uplink message is the user's IP address, which is bound to the network access account of the current user. As long as the user does not disconnect from the network, the IP address will not change. The address identifier of the user may also be a network domain name, or other information capable of identifying the user's network address.
[0048] The identity of the current user in the uplink message may be the cookie information of the terminal where the current user is located, or the user's FTP account, Email account, or other information that can uniquely identify the user's identity, which is not limited in the present invention.
[0049] Among them, the Cookie information is generated by the WEB server when the user visits the website before, and then saved in the terminal of the current user through the browser. When the user visits the website again, the browser passes the Cookie information on the current user terminal through The HTTP uplink message is sent to the WEB server. For different web servers, a unique corresponding cookie id will be generated for different users according to certain rules to identify users, such as Baidu's cookie information: BAIDUID:4057F9628F9386F26C4B198D23E351C2:FG=1.
[0050] Taking the email account as the user ID as an example, when the user enters the email account and password in the web page or client program for login verification, the email account is added as the user ID to the upstream HTTP message and sent to the corresponding server .
[0051] For the convenience of description, the identity identifiers mentioned below in this embodiment are described with Cookie information as an example.
[0052] Step 102, match the identity with the preset identity mapping table, if they match, determine the current user as the target user, if not, obtain the corresponding network access account through the address of the current user.
[0053] The preset identity mapping table is set according to the user's identity, and it contains a set of target user's identity mapping tables. For example, when the identity identifier is Cookie information, the preset identity identifier mapping table is the Cookie information mapping table.
[0054] After matching the Cookie information in the uplink message with the preset Cookie mapping table, we continue to obtain the user's network access information through the current user IP address for users who are not in the preset Cookie mapping table. Enter the account to further identify the user.
[0055] The network access account of the current user is an asymmetric digital subscriber line (Asymmetric Digital Subscriber Line, ADSL) account, a wireless local area network (Wireless Local Area Networks, WLAN) account, WiFi account, or other network access accounts, which are not limited in the present invention. Taking the ADSL account as an example, the Internet access device sends the Remote Access Dial-In User Service (RADIUS) message containing the network access account and password to the access server of the ISP, and the access server The network access account and password for verification. If the verification is successful, the access server will assign a dynamic IP address to the Internet device and enable the Internet device to access the Internet, and start billing at the same time. As long as the user's Internet device continues to connect to the Internet, the dynamic IP address assigned to the user's network access account will not change , after the user device obtains the dynamic IP address, it can access the website through the browser; if the verification fails, the access server rejects the user's Internet access request from the Internet access device. When the user applies for network disconnection, the terminal sends a RADIUS packet containing the network access account to the access server, and the access server disconnects the Internet device from the Internet and takes back the dynamic IP address assigned to the network access account.
[0056] The obtaining the corresponding network access account through the current user address identification specifically includes: accessing the network operator server, and obtaining the network access account corresponding to the current user IP address. Specifically: the WEB server requests the network operator server to send all the online information corresponding to the recorded current user IP information, and then the WEB server obtains from the online information according to the mapping relationship; The network operator server sends an acquisition request, and then the network operator server directly sends the acquired network access account of the current user to the WEB server according to the user IP address. It should be noted that the WEB server and the network operator server may also be other external independent devices, which are not limited in this embodiment.
[0057] Step 103, matching the current user's network access account with a preset network access account mapping table, and determining that the current user is a target user if they match.
[0058] Taking an ADSL account as an example of a network access account, the preset network access account mapping table refers to a collection of user ADSL account mapping tables. It should be noted that when implementing the present invention, the content of the network access account mapping table can be set according to different purposes of user identification, for example, the ADSL account of a specific group or type of user is generated into the ADSL account mapping table , such as blacklist users, whitelist users, VIP users, specific area users, etc.
[0059] By matching the current user network access account with the preset network access account mapping table, if they match, the current user is determined as the target user.
[0060] The prior art uses a website registration account to identify a user's identity, but if the user does not log in, or visits other websites at the same time, the user's identity cannot be identified. The embodiment of the present invention obtains the IP address from the user's uplink message, and then obtains the network access account corresponding to the user's IP address from the ISP access server to determine whether the user is a target user. For the vast majority of users, if they want to use the network, they must obtain the access verification of the network operator. If the verification is passed, the network operator will assign the user an IP address for this visit. As long as the user does not go offline, the user The network access account and IP address are always the only binding relationship. Therefore, identifying the user through the user's network access account ensures the uniqueness of user identification, and does not require the process of user registration and input of user name and password. for effective identification.
[0061] Further, after comparative analysis, the applicant found that if only the network access account is used to identify the user, the user's network access account needs to be obtained from the ISP access server, but the ISP access server usually has a high number of visits per unit time, which is easy Congestion occurs, which will lead to excessive communication delay with the ISP access server, resulting in failure to obtain the user's network access account in time, and unable to identify whether the access user is the target user in time. Based on this, in order to improve the timeliness of user identification, the embodiment of the present invention proposes that before using the network access account to identify the user identity, use the identity identifier in the uplink message to judge whether the access user is the target user, if the identity identifier can be used to determine If the accessing user is the target user, the identification process ends here. Since the identity mark is included in the user's uplink message, after the user's uplink message is obtained, the user's identity mark can be obtained at the first time for user identification, which improves the timeliness of user identification.

Example Embodiment

[0062] Embodiment two
[0063] refer to figure 2 , shows a flow chart of a method for identifying a user according to Embodiment 2 of the present invention. In this embodiment, the IP address is used as the user address identifier, the Cookie information is used as the user identity identifier, and the ADSL account is used as the user network access account as an example for description. . The user identification method in this embodiment includes the following steps:
[0064] In step 201, the uplink message of the current user is obtained, and the uplink message includes the IP address and Cookie information of the current user.
[0065] Step 202, match the Cookie information with the preset Cookie mapping table, if they match, determine that the current user is the target user, if not, obtain the corresponding ADSL from the network operator server through the current user IP address account.
[0066] Step 203, matching the ADSL account of the current user with a preset network access account mapping table, and determining that the current user is the target user if they match.
[0067] For the specific description of the above steps, reference may be made to Embodiment 1, which will not be repeated here.
[0068] Further, before step 203, the method further includes: collecting user network access accounts according to a preset first rule; adding the collected user network access accounts to the preset network access account mapping table.
[0069] The collecting of user network access accounts according to the preset first rule is specifically to screen the user's network access accounts according to the purpose of implementing the present invention and the content of the network access account mapping table. For example, if the network access account mapping table stores blacklist users, add the ADSL accounts of users meeting the blacklist conditions to the network access account mapping table.
[0070] Step 204, adding the identity of the current user to the preset identity mapping table.
[0071] Updating the identity mapping table according to the identification result of the current user can ensure the timeliness and integrity of the contents of the identity mapping table. When the user is re-identified, the identification can be completed only according to the content of the identity mapping table, without having to obtain the corresponding network access account from the network operator for re-identification. In this way, while ensuring the accuracy of user identification, it is greatly reduced. The processing steps required for identification are eliminated, reducing the load on the server. Compared with Embodiment 1, this embodiment updates the preset network access account mapping table in time, and overcomes the problem of not adding the ADSL account of the new target user to the preset network access account mapping table in time. , causing the user to be unable to be accurately identified; at the same time, the identity mapping table was updated in time, so that the user can be identified more accurately and quickly through identity information such as cookies, without worrying about the incomplete or incomplete user online information stored by the network operator. Timely provision of user online information to the WEB server causes user identification failure or untimely identification.

Example Embodiment

[0072] Embodiment 3 This implementation discloses another user identification method, see image 3 , the steps included in this embodiment are as follows:
[0073] In step 301, the uplink message of the current user is acquired, and the uplink message includes the IP address and Cookie information of the current user.
[0074] Step 302, match the cookie information with the preset identity mapping table, if they match, then determine that the current user is an advertisement complaint user, and the process ends; The server obtains the corresponding ADSL account.
[0075] Step 303, matching the ADSL account of the current user with the preset network access account mapping table, and if they match, determining that the current user is an advertisement complaint user.
[0076] Further, before the matching of the current user ADSL account and the preset network access account mapping table, it also includes: collecting the user network access account according to the preset first rule; adding the collected user network access account Enter the account into the preset network access account mapping table.
[0077] Step 304, adding the cookie information of the current user to the preset identity mapping table.
[0078] So far, it has been able to accurately and timely identify whether the current user is an advertisement complaint user.
[0079] Step 305, if the target user is not the advertisement complaint user, push the advertisement information to the identified target user.
[0080] If the target user is an advertisement complaint user, refuse to push the advertisement information to the target user.
[0081] It should be noted that pushing or refusing to push advertising information to target users is only a preferred method in this embodiment, and those skilled in the art can push information, such as notification information and program updates, to identified target users as needed when implementing the present invention. Information or any other information that needs to be pushed.
[0082] In the prior art, the use of website registration accounts to identify users requires the user to log in to the website first. If the user does not log in or visits other websites at the same time, the user cannot be effectively identified, and eventually advertising information may be pushed to the complaining user. The embodiment of the present invention uses the Cookie information contained in the uplink message to identify the user. Since the user's Cookie information can be obtained from the uplink message in the website just after the user visits the website, it can be guaranteed that the first time the user visits the website Judging whether the current user is the target user in a short time, that is, whether it is an advertisement complaint user, if it is an advertisement complaint user, it will refuse to push advertisement information to the user, avoiding the mistaken delivery of advertisement information.
[0083]Further, in the embodiment of the present invention, according to the current user's IP address, the corresponding ADSL account is obtained from the ISP access server to determine whether the current user is an advertisement delivery user, which further improves the accuracy of user identification. Since the IP address of a user online is usually dynamic and valid, as the user goes offline, the IP address may be assigned to other users. Therefore, the uniqueness of user identification cannot be guaranteed only through the IP address. For users with ADSL accounts, no matter when they access the Internet, no matter how the assigned IP address changes, the corresponding ADSL account remains unchanged. Therefore, judging the user’s identity by obtaining the user’s ADSL account can effectively ensure the uniqueness of the identification result. and accuracy, it can accurately determine whether the current user is an advertisement complaint user, so as to avoid pushing advertisement information to the advertisement complaint user.
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

no PUM

Description & Claims & Application Information

We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Similar technology patents

Active prevention and control method and system for highway traffic accident scene risk

ActiveCN113066287AReduce the probability of secondary accidentsGuaranteed timelinessDetection of traffic movementAnti-collision systemsIncident siteReal-time computing
Owner:TRAFFIC MANAGEMENT RES INST OF THE MIN OF PUBLIC SECURITY

Classification and recommendation of technical efficacy words

  • Uniqueness guaranteed
  • Guaranteed timeliness

Chinese web page text deduplication system and method

InactiveCN102402537AUniqueness guaranteedImprove retrieval accuracySpecial data processing applicationsSentence extractionDuplicate content
Owner:SHENGLE INFORMATION TECH SHANGHAI

Method for detecting, recovering and controlling for independence trouble during orbital transfer course

InactiveCN101214859AGuaranteed timelinessSimplify ground operationsSpacecraft guiding apparatusStart timeAngular velocity
Owner:BEIJING INST OF CONTROL ENG
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products