Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for determining permission

A permission and authentication technology, applied in the computer field, can solve the problems such as the inability to realize user authentication alone, and the inability of users to authenticate, and achieve the effect of improving accuracy and simple verification method.

Active Publication Date: 2017-08-04
BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
View PDF7 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the above-mentioned identity verification methods all have certain defects. For example, in the case of forgetting the password, the user cannot use the static password method for identity verification; User authentication cannot be achieved alone; biometric identification requires specific high-precision identification devices (such as cameras, sensors, etc.), and can only be used in specific application scenarios

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for determining permission
  • Method and device for determining permission
  • Method and device for determining permission

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain related inventions, rather than to limit the invention. It should also be noted that, for the convenience of description, only the parts related to the related invention are shown in the drawings.

[0033] It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other. The present application will be described in detail below with reference to the accompanying drawings and embodiments.

[0034] figure 1 An exemplary system architecture 100 is shown to which embodiments of the method for determining rights or the apparatus for determining rights of the present application can be applied.

[0035] Such as figure 1 As shown, the system architecture 100 may in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The application discloses a method and device for determining a permission. A specific implementation way of the method comprises the following steps: acquiring historic geographic position information set in response to a received login request aiming at a target account by a request terminal; executing the following authentication steps: selecting historic geographic position information from the historic geographic position information set, generating a problem related to the selected historic geographic position information, sending the problem to the request terminal, determining a frequency threshold value of sending the problem to the request terminal based on a condition whether answer information aiming at the problem and sent by the request terminal is matched with the problem; continuously executing the authentication step in response to the condition that the frequency of sending the problem to the request terminal does not achieve the frequency threshold value; determining an accurate rate of the answer information in response to the condition that the frequency of sending the problem to the request terminal achieves the frequency threshold value; if the accurate rate is greater than a preset accurate rate threshold value, determining that the request terminal has the login permission to the target account. By use of the method disclosed by the embodiment, the degree of accuracy of the identity verification is improved.

Description

technical field [0001] The present application relates to the field of computer technology, specifically to the field of Internet technology, and in particular to a method and device for determining authority. Background technique [0002] With the development of Internet technology and network virtual space, how to effectively verify user identity has become an important issue. At present, various Internet companies are also actively developing various user account authentication methods. User identity verification has important and extensive application scenarios, and is of great significance to the improvement of user account systems and account security management of various Internet companies. [0003] At present, there are various forms of identity verification methods widely used, including static passwords, dynamic passwords, and biometric identification. A static password means that after the user sets a specific password, the server and the user verify the passwor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/08H04L63/10H04L63/101H04L63/102
Inventor 周景博郝天一吴海山
Owner BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products