Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity authentication method and device based on temporary identifier

An identity verification method and a temporary identifier technology, applied in the field of communication technology and Internet advertising, can solve the problems of privacy information leakage, untrustworthy behavior, etc., and achieve the effect of effective monitoring and avoiding the risk of user privacy leakage

Active Publication Date: 2019-04-16
武汉稀云科技有限公司
View PDF10 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

but through figure 1 As shown in the network structure, the website of Bank M cannot obtain the historical behavior of the user in time for effective analysis. After the user enters the verification code, the user is allowed to apply for a credit card. After the user applies for a credit card of Bank M, he may There will still be certain untrustworthy behaviors, which is undoubtedly a hidden danger for Bank M
[0005] At the same time, the network side describes the identity through a certain fixed user identification (here, a mobile phone number) combined with attributes. When the website or APP needs to interact with the SMS center of the operator, it needs to rely on the user identification to establish Contact, while the user ID involves user privacy and personal information data, the risk of leakage of private information is likely to be caused during the transmission of the user ID in the network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and device based on temporary identifier
  • Identity authentication method and device based on temporary identifier
  • Identity authentication method and device based on temporary identifier

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0054] Embodiment 1 of the present invention provides an identity verification method based on a temporary identifier, which is used to solve the problem in the prior art that when a user applies for an operation on a website or APP, the website or APP cannot combine user history information to determine whether the user is allowed to perform the operation. The above operation is effectively verified, and the user identity is described by a fixed user identifier in the prior art, and carrying a fixed user identifier in a message transmitted over the network will involve leakage of user privacy. The embodiment of the present invention is a solution designed to this technical problem.

[0055] like figure 2 As stated, methods include:

[0056] In step 201, after receiving a push message carrying a user ID and a verification code, the first device generates a first temporary identifier in a preset manner.

[0057] In a specific implementation manner, the first device may be a ...

Embodiment 2

[0140] The embodiment of the present invention combines as Figure 15 The signaling diagram shown illustrates a specific implementation process of an identity verification method based on a temporary identifier. In the scenario described in the embodiment of the present invention, the enhanced proxy and processing engine described in Embodiment 1 are not introduced, the first device acts as an enhanced gateway; the information database includes a first information database and a second information database, The first information database is represented as a telecommunications database, and the second information database is embodied as a financial information database; the operation is embodied as applying for registration on a website or App; Mobile phone number; the verification code is randomly generated by the website or APP.

[0141] In step 501, the user uses the smart terminal and uses the corresponding mobile phone number to apply for registration on the website or Ap...

Embodiment 3

[0160] The embodiment of the present invention combines as Figure 16 The signaling diagram shown illustrates a specific implementation process of an identity verification method based on a temporary identifier. Compared with Embodiment 2, the enhanced agent described in Embodiment 1 is introduced into the scenario described in the embodiment of the present invention, then the interaction between each website and / or APP and the enhanced gateway can be centrally processed through the enhanced agent, The network bandwidth occupation in the network can be saved, the signaling interaction process in the network environment can be simplified, and the message processing load of the first device can be reduced.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of communication technology and personal information services and provides an identity authentication method and device based on a temporary identifier, wherein the method comprises the following steps: receiving a push message carrying a user identifier and a verification code and generating a first temporary identifier according to a preset mode; acquiring corresponding user historical information from an information database according to the user identifier, and obtaining a score made by the current user based on the user historical information;sending out a user grading result corresponding to the first temporary identifier so that the website or an APP can obtain the user grading result and judge whether the current user is a target user or not. According to the method and the device in the invention, the user can be effectively verified and screened according to the user historical information, which facilitates effective monitoring of the website or the APP and avoids a potential user privacy leakage risk caused by the fact that the fixed user identifier is used in the network.

Description

【Technical field】 [0001] The present invention relates to the fields of communication technology and Internet advertisement technology, in particular to an identity verification method and device based on a temporary identifier. 【Background technique】 [0002] With the development of the Internet, the Internet has become an important means of releasing information, promoting business, serving customers, and communicating with employees. More and more users use the Internet to meet their own needs. When a user applies for an operation through a website or APP, he usually passes a verification code for verification. After entering the verification code and passing the verification, he can perform the next operation on the corresponding website or APP. [0003] Such as figure 1 As shown in , it is an existing network structure diagram used when users apply for operations through the network. The user uses the smart terminal and uses the mobile phone number to apply for an ope...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04L9/08
CPCH04L9/0869H04L9/3236H04L63/0407H04L63/0838H04L63/0876H04L63/0884
Inventor 雷正
Owner 武汉稀云科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products