Method and system for user identity verification, and campus management system

A technology of user identity and verification method, which is applied in the field of user identity verification method, system and campus management system, can solve the problems of not solving multiple identities of special users, unable to verify multiple identities of the same user, and other children cannot enjoy it, etc.

Inactive Publication Date: 2016-08-31
HUNAN YIGU TECH DEV
View PDF6 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the current online education-related products on the market, a user can only have one identity. For example, a parent can only have one parent identity. Specifically, a parent can only correspond to one student.
However, in some urban families, one parent user has multiple parent identities. Especially in rural areas, most families have two children, and some families even have three children. The two children may be distributed in different grades and classes. Even in different schools, due to the limitations of the product itself, other children will not be able to enjoy some convenient services
[0003] Or, a teacher can only have one teacher status, but for a teacher, his role can be a teacher or a parent. For a teacher, he has to assign homework and issue announcements. As a parent, he must understand One's own child's daily life, test scores, etc. In the related products on the market, one mobile phone number can only be bound to one identity, which does not solve the problem of multiple identities of special users, so that the dual identities of both parents and teachers cannot be used at the same time. different types of services
[0004] Therefore, existing online education products cannot verify multiple identities of the same user

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for user identity verification, and campus management system
  • Method and system for user identity verification, and campus management system
  • Method and system for user identity verification, and campus management system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0076] Such as figure 1 As shown, a user authentication method includes the following steps:

[0077] S101: Obtain a login request in a preset area of ​​a login interface.

[0078] A login request includes a user ID and a user password. In this embodiment, the user identifier may be the user name, mobile phone or email address registered by the user in the corresponding system, and is used to distinguish different unique identifiers of different users.

[0079] S103: Verifying whether the user has login authority according to the login request.

[0080] In one embodiment, the user registers as a registered user in the corresponding system by using the user ID and user password in advance, or the administrator enters the user ID and initial password in the background to become a registered user. When the user logs in to the corresponding system, according to the user ID and user password to verify that the user has login permissions. In another embodiment, the user can also...

Embodiment 2

[0103] Such as image 3 As shown, a user authentication method includes the following steps:

[0104] S201: Obtain a login request in a preset area of ​​a login interface.

[0105] A login request includes a user ID and a user password. In this embodiment, the user identifier may be the user name, mobile phone or email address registered by the user in the corresponding system, and is used to distinguish different unique identifiers of different users.

[0106] S203: Obtain an operation instruction of the selected first identifier and / or second identifier in a preset area of ​​the login interface.

[0107] S205: Verify according to the login request whether the user has login authority, and verify whether the first identifier and / or the second identifier matches the user identifier.

[0108] If yes, perform step S207: give the preset access authority corresponding to the first identifier and / or the second identifier.

[0109]The user identity verification method of the pre...

Embodiment 3

[0116] Such as Figure 5 As shown, a user authentication method includes the following steps:

[0117] S301: Obtain an operation instruction for entering the identity verification system, and display an identifier selection interface according to the operation instruction.

[0118] S303: Obtain an operation instruction of the selected first logo and / or second logo on the logo selection interface.

[0119] S305: Display a login interface according to the first identifier and / or the second identifier.

[0120] Specifically, the system corresponding to the first identifier and / or the second identifier is displayed according to the selected first identifier and / or the second identifier. For example, if the user only has the first identification as a teacher and the second identification as a school A and a class B, then it corresponds to the corresponding system of the school A.

[0121] S307: Obtain a login request in a preset area of ​​the login interface. A login request in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method and system for user identity verification, and a campus management system. The method comprises: a logging-in request is obtained at a preset area of a logging-in interface, wherein the logging-in request includes a user identifier and a user password; according to the logging-in request, whether the user has the logging-in permission is verified; if the verification is done successfully, an identifier selection interface is displayed and operation instructions or an operation instruction of a selected first identifier and / or a selected second identifier are / is obtained at the identifier selection interface; whether the selected first identifier and / or the selected second identifier match / matches the user identifier is determined; if so, preset access permission corresponding to the first identifier and / or the second identifier is provided. With the method, with different first identifiers and / or second identifier, the user can have multiple different identities; and the same user can carry out verification on several kinds of identities by one user identifier and the access permission corresponding to the first identifiers and the second identifiers of the different identities of the user are also provided. Therefore, identity verification of user having multiple different identities is realized.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a user identity verification method, system and campus management system. Background technique [0002] The 21st century is the era of electronic information. The rapid development of the electronic industry has changed the development model of many industries. The online education industry has also flourished. There are more and more products related to online education, and the functions are becoming more and more complete. However, in the products related to online education currently on the market, a user can only have one identity. For example, a parent can only have one parent identity. Specifically, a parent can only correspond to one student. However, in some urban families, one parent user has multiple parent identities. Especially in rural areas, most families have two children, and some families even have three children. The two children may be distributed in di...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/105H04L63/083H04L63/102
Inventor 徐析
Owner HUNAN YIGU TECH DEV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products