A method and system for detecting clone of user identity in an anonymous information system
A user identity and information system technology, applied in the field of user identity cloning detection, can solve problems that are not based on physical security assumptions, and achieve the effect of ensuring universality, low cost, and high efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0053] The user identity clone detection method and system of the present invention will be further described below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.
[0054] Such as figure 1 As shown, the clone detection system of the present invention includes a user, a registration server and an authentication server. In this system, the privacy of honest users is absolutely protected. That is to say, after the honest user registers at the registration server, he can anonymously complete the authentication at the authentication server and log in to the system. Logins are from the same user. At the same time, once the user clones the identity, by collecting the login information from the authentication server, the registration server can identify the cloning behavior and the real identity of the cloner, and c...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com