Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

User identity authentication method and device

A technology of user identity and verification method, which is applied in the direction of user identity/authority verification, message/email/notification, etc., can solve the problems that the execution efficiency needs to be further improved, and achieve the effect of improving execution efficiency

Active Publication Date: 2015-07-22
BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Although the above solution can obtain the verification information from the verification message, it still needs to display an identity verification interface to the user. After entering the extracted verification information in the identity verification interface, the verification operation can continue, and its execution efficiency remains to be seen. further improvement

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User identity authentication method and device
  • User identity authentication method and device
  • User identity authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0024] This embodiment provides a technical solution of a user identity verification method. The technical solution can be implemented by a user terminal, which can be connected to the Internet through 2G, 3G, 4G, WIFI, etc., so as to perform data communication with the server of the application program through the above connection method.

[0025] see figure 1 , the user authentication methods include:

[0026] In S11, acquire a verification message sent by the verification server and identified as a destination by the user terminal, where the verification message includes a verification text message or a verification multimedia message.

[0027] Many application clients installed on user terminals require users to log in before using them. Generally speaking, users at least need to enter their own passwords when performing login on the client side. Since the user is likely to forget his password, the user often enters a wrong password during the password input operation. ...

no. 2 example

[0046] Based on the above-mentioned embodiments of the present invention, this embodiment further provides a technical solution for obtaining verification information in a user identity verification method. In this technical solution, processing the verification text message to obtain the verification information includes: using a hash algorithm to obtain a data digest of the verification text message, and using the data digest as the verification information.

[0047] Specifically, processing the verification text message to obtain the verification information includes:

[0048] In S20, a hash algorithm is used to obtain a data digest of the verification text message, and the data digest is used as the verification information.

[0049] Specifically, after obtaining the verification text message sent by the verification server, the client uses a hash algorithm to perform hash transformation on the obtained verification text message, and uses the transformed result as the data...

no. 3 example

[0052] Based on the above-mentioned embodiments of the present invention, this embodiment further provides a technical solution for obtaining verification information in a user identity verification method. In this technical solution, extracting the verification information from the verification multimedia message includes: extracting the verification information picture from the verification multimedia message; identifying the verification information from the verification information picture through denoising and character recognition .

[0053] see figure 2 , in this embodiment, extracting the verification information from the verification multimedia message includes:

[0054] In S21, the verification information picture is extracted from the verification multimedia message.

[0055] The verification multimedia message includes a verification information picture. The verification information is displayed in the verification information picture. Therefore, to obtain the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An embodiment of the invention discloses a user identity authentication method and device. The method includes: acquiring an authentication message, with a user terminal identified as a destination, sent by an authentication server, wherein the authentication message includes an authentication text message or an authentication multimedia message; acquiring authentication information from the authentication message; sending the authentication information to the authentication server so as to enable the authentication server to authenticate user identity; if receiving an authentication success message sent by the authentication sever, showing a log-in success interface to a user. By the user identity authentication method and device, execution efficiency of identity authentication is improved obviously.

Description

technical field [0001] The embodiment of the present invention relates to mobile Internet technology, and in particular to a user identity verification method and device. Background technique [0002] With the popularity of mobile Internet technology, more and more users obtain information and enjoy services through various application programs installed on mobile terminals. In order to identify the identities of different users, the server of the application generally requires the user to provide his or her username and password when the user registers. Once the registration is successful, the user can log in later using the user name and password he used during registration and use the application. However, various application programs emerge one after another, and the same user usually performs the above registration operations on different websites and application programs. Therefore, it is inevitable that the user himself forgets the password used when registering. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04W4/12H04W4/14
Inventor 齐飞周科科
Owner BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More