User identity authentication method and device, electronic equipment and storage medium

A user identity and verification method technology, applied in the fields of electronic equipment and storage media, user identity verification methods and devices, can solve the problems of infringement of intellectual property rights, endanger user privacy, harm, etc., to improve robustness and reduce programs and data. The effect of safety hazards

Active Publication Date: 2020-07-31
BEIJING JINTI TECH CO LTD
View PDF6 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the process of realizing the present disclosure, the inventors of the present disclosure have found through research that the network access of some illegal users for data collection and other purposes will cause certain harm. For example, the network access of illegal users may occupy a large amount of bandwidth resources of the website , may endanger user privacy, and may infringe intellectual property rights, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User identity authentication method and device, electronic equipment and storage medium
  • User identity authentication method and device, electronic equipment and storage medium
  • User identity authentication method and device, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] Various exemplary embodiments of the present disclosure will now be described in detail with reference to the accompanying drawings. It should be noted that relative arrangements of components and steps, numerical expressions and numerical values ​​set forth in these embodiments do not limit the scope of the present disclosure unless specifically stated otherwise.

[0036] Those skilled in the art can understand that terms such as "first" and "second" in the embodiments of the present disclosure are only used to distinguish different steps, devices or modules, etc. necessary logical sequence.

[0037] It should also be understood that in the embodiments of the present disclosure, "plurality" may refer to two or more than two, and "at least one" may refer to one, two or more than two.

[0038] It should also be understood that any component, data or structure mentioned in the embodiments of the present disclosure can generally be understood as one or more unless there i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a user identity authentication method and device, electronic equipment and a storage medium, and the method comprises the steps: responding to an access request based on a program, and obtaining the authorization information of a user corresponding to the access request; verifying the authorization information, and obtaining a user identity identifier fromthe successfully verified authorization information; if it is detected that a preset identity identifier set does not contain the user identity identifier and the access request contains a token foridentity authentication, storing the user identity identifier and the token in the preset identity identifier set in a key value form, and performing network access counting for the user identity identifier and the token; and if it is detected that the identity identifier and the current network access count value corresponding to the token do not meet the preset counting condition, intercepting the access request. According to the method and the device, the harm of network access of illegal users to program and data security can be reduced, and the robustness of the program can be improved.

Description

technical field [0001] The present disclosure relates to Internet technologies, and in particular to a user identity verification method and device, electronic equipment and storage media. Background technique [0002] In Internet technology, network access may involve user authentication. User authentication can realize the confirmation of user identity. The purpose of user identity verification includes: confirming whether the identity of the user who is currently accessing the network is the identity of the user it claims to be. [0003] In the process of realizing the present disclosure, the inventors of the present disclosure have found through research that the network access of some illegal users for data collection and other purposes will cause certain harm. For example, the network access of illegal users may occupy a large amount of bandwidth resources of the website , may endanger user privacy, and may infringe intellectual property rights, etc. How to implemen...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0807H04L63/1466H04L63/101H04L67/60
Inventor 付利霞柳超
Owner BEIJING JINTI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products