Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An identification method and terminal

An identity recognition and terminal technology, applied in the field of data processing, can solve the problems of cumbersome user operation, poor user experience, inconvenient user information statistics and analysis, etc., to achieve the effect of convenient login, avoid repeated authentication, and good user experience

Active Publication Date: 2020-01-03
FUJIAN MIKE INTERCONNECTION NETWORK TECH CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, at present, when user identity verification is performed, when logging in to the same platform with different accounts, the user needs to confirm. It needs to be confirmed by the user, but in fact, the WeChat account and Alipay account of the JD platform are the same person, and the JD platform cannot know that the two users are the same person, resulting in repeated authentication, cumbersome user operations, and poor user experience. , and the current cross-platform login can only realize login, but cannot realize the sharing of user information on each platform, resulting in inconvenient statistics and analysis of user information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An identification method and terminal
  • An identification method and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0068] An identification method, comprising the steps of:

[0069] S1. Receive a login request from a mobile terminal, and identify the third-party open platform where the mobile terminal is located;

[0070] Wherein, the login request is generated after the mobile terminal scans a two-dimensional code;

[0071] S2. Obtain authorization information of the user on the third-party open platform;

[0072] Specifically, the OAuth2.0 authorization mechanism is used to obtain the authorization token of the user on the third-party open platform;

[0073] Obtain the authorization information of the user on the third-party open platform according to the authorization token;

[0074] S3. Obtain a digital identity corresponding to the authorization information;

[0075] Specifically, including steps:

[0076] S31. Determine whether there is a digital identity corresponding to the authorization information, if not, execute step S32, otherwise, execute step S35;

[0077] S32. Extract ...

Embodiment 2

[0084] An identification method, which differs from Embodiment 1 in that it also includes the steps of:

[0085] S5. Receive transaction completion information sent by the mobile terminal, and store user information related to the transaction based on the digital identity;

[0086] Wherein, the user information includes coupons of various third-party open platforms owned by the user, order information of the user, and the like.

Embodiment 3

[0088] Apply the identification method to specific scenarios, for example: after the user enters the restaurant and takes a seat, scan the QR code of the dining table through WeChat to log in to the server used by the restaurant;

[0089] The server recognizes that the third-party open platform where the mobile phone is located is WeChat according to the login request, and then obtains the authorization token of the user on the WeChat platform through an OAuth2.0 authorization mechanism;

[0090] According to the authorization token, obtain the authorization information of the user in WeChat, such as WeChat account;

[0091] Search whether there is a corresponding digital identity in the terminal database based on the WeChat account, if not, extract the user’s mobile phone number from the WeChat account, bind the user’s mobile phone number to the WeChat account, and add the WeChat account to the user In the authorization information pool corresponding to the mobile phone numbe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides an identity identification method and a terminal. According to the identity identification method and the terminal, the authorization information of users on each third-party open platform is obtained based on the mobile phone numbers of the users; the authorization information is aggregated; a universal digital identity corresponding to each piece of authorization information is generated; and the digital identity is utilized to realize fast identity identification and fast log-in; user information is stored based on the digital identity; and therefore, cross-platform and cross-scene quick identity identification and user information sharing can be realized flexibly, repeated authentication can be avoided, user experience can be enhanced, and product functions can be enriched.

Description

technical field [0001] The invention relates to the field of data processing, in particular to an identification method and a terminal. Background technique [0002] Under the background of the mobile phone number real-name system, users have become accustomed to completing all possible operations on mobile terminals. Many platforms that need to confirm the user's identity can use the mobile phone number to identify the identity. And it can also achieve cross-platform login. For example, if you want to log in to the Jingdong platform, you can directly use WeChat to log in. However, at present, when user identity verification is performed, when logging in to the same platform with different accounts, the user needs to confirm. It needs to be confirmed by the user, but in fact, the WeChat account and Alipay account of the JD platform are the same person, and the JD platform cannot know that the two users are the same person, resulting in repeated authentication, cumbersome us...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0815H04L67/08
Inventor 叶海鹏任启志陈光磊陈巧林好
Owner FUJIAN MIKE INTERCONNECTION NETWORK TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products