Unlock instant, AI-driven research and patent intelligence for your innovation.

User identification method, computing device and computer storage medium

A user identification and user technology, applied in the Internet field, can solve problems such as unfavorable user identification, leakage of user privacy information, failure to identify such users, etc., and achieve a favorable user experience, simple and easy operation, and guaranteed security Effect

Active Publication Date: 2021-09-03
ZHANGYUE TECH CO LTD
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the inventor found in the implementation process that there are the following defects in the existing technology: the identification method of user account requires the user to provide private information such as mobile phone number and ID number, so there is a security risk of leakage of user private information
Moreover, for new users who have not yet registered a user account, this method will not be able to identify this type of user
In addition, user accounts between different applications cannot communicate with each other, which is not conducive to the user's cross-application experience; user biometrics, device IP address, IDFA, IMEI, etc. Facilitate user identification

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User identification method, computing device and computer storage medium
  • User identification method, computing device and computer storage medium
  • User identification method, computing device and computer storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0024] figure 1 A schematic flowchart of a user identity identification method provided according to Embodiment 1 of the present invention is shown. Wherein, the method may be executed by a user terminal, or may be executed by an application server. In a word, this embodiment does not limit the specific execution subject of this method.

[0025] Such as figure 1 As shown, the method includes:

[0026] Step S110: Calculate the time difference between the user terminal and the corresponding time service server.

[0027] In an actual application scenario, due to business requirements, the user terminal will establish a communication connection with a time service server, and the local time of the terminal is calibrated through the time service server. The time service server is the time service server corresponding to the user terminal.

[0028] However, due to the limitation of timing accuracy, the time of the user terminal and the corresponding timing server cannot be absol...

Embodiment 2

[0050] figure 2 A schematic flowchart of a user identity identification method provided according to Embodiment 2 of the present invention is shown. Wherein, the user identification method provided in this embodiment is a further optimization of the user identification method in the first embodiment.

[0051] Such as figure 2 As shown, the method includes:

[0052] Step S210: Calculate the time difference between the user terminal and the corresponding time service server, and generate a user time fingerprint corresponding to the user terminal according to the time difference.

[0053] Wherein, for the specific implementation process of this step, reference may be made to the description of the corresponding part in Embodiment 1, and details are not described in this embodiment here.

[0054] Step S220: Generate a user device fingerprint corresponding to the user terminal according to the preset type device information of the user terminal.

[0055] Wherein, the preset t...

Embodiment 3

[0063] image 3 A schematic flowchart of a user identity identification method provided according to Embodiment 3 of the present invention is shown. Wherein, the user identification method provided in this embodiment is a further optimization of the user identification method in the first embodiment.

[0064] Such as image 3 As shown, the method includes:

[0065] Step S310: When a first preset trigger operation is detected, generate a user time fingerprint of the first user terminal corresponding to the first preset trigger operation.

[0066] Step S320: storing the user time fingerprint of the first user terminal in a preset fingerprint library.

[0067] Step S330: When a second preset trigger operation is detected, generate a user temporal fingerprint of the second user terminal corresponding to the second preset trigger operation.

[0068] Step S340: Compare the user temporal fingerprint corresponding to the second user terminal with the user temporal fingerprint of t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a user identity identification method, a computing device and a computer storage medium. The method includes: calculating the time difference between the user terminal and the corresponding time service server, generating a user time fingerprint of the user terminal according to the time difference, and performing user identification based on the user time fingerprint. The time fingerprint of the user generated by this scheme is unique, so that the identity of the user can be accurately identified; and this scheme does not involve the acquisition of user privacy data, which ensures the security of user privacy data; moreover, in this scheme, the same user terminal The corresponding user time fingerprints are the same, which can realize cross-application identification in the same terminal; in addition, this solution can generate user time fingerprints without obtaining high-level permissions of the system, which ensures the security of the user system and is conducive to the improvement of user experience; moreover, This solution does not require user registration, is simple and easy to operate, and is suitable for large-scale application and implementation.

Description

technical field [0001] The invention relates to the technical field of the Internet, in particular to a user identity identification method, a computing device and a computer storage medium. Background technique [0002] At present, there are usually two types of user identification methods: one is the identification method based on the user account, that is, the user uses the mobile phone number, ID card number, etc. User account, and then use the user account to identify the user's identity; the second is the identification method based on the user's biological or device characteristics, such as by obtaining the user's biological characteristics (such as palm prints, biometric fingerprints, facial features), device IP address, IDFA , IMEI, Cookie and other information to obtain user identity. [0003] However, the inventor found in the implementation process that there are the following defects in the prior art: the identification method using the user account requires th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/31G06F21/44
CPCG06F21/31G06F21/44
Inventor 方茗
Owner ZHANGYUE TECH CO LTD