User identification method, computing device and computer storage medium
A user identification and user technology, applied in the Internet field, can solve problems such as unfavorable user identification, leakage of user privacy information, failure to identify such users, etc., and achieve a favorable user experience, simple and easy operation, and guaranteed security Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0024] figure 1 A schematic flowchart of a user identity identification method provided according to Embodiment 1 of the present invention is shown. Wherein, the method may be executed by a user terminal, or may be executed by an application server. In a word, this embodiment does not limit the specific execution subject of this method.
[0025] Such as figure 1 As shown, the method includes:
[0026] Step S110: Calculate the time difference between the user terminal and the corresponding time service server.
[0027] In an actual application scenario, due to business requirements, the user terminal will establish a communication connection with a time service server, and the local time of the terminal is calibrated through the time service server. The time service server is the time service server corresponding to the user terminal.
[0028] However, due to the limitation of timing accuracy, the time of the user terminal and the corresponding timing server cannot be absol...
Embodiment 2
[0050] figure 2 A schematic flowchart of a user identity identification method provided according to Embodiment 2 of the present invention is shown. Wherein, the user identification method provided in this embodiment is a further optimization of the user identification method in the first embodiment.
[0051] Such as figure 2 As shown, the method includes:
[0052] Step S210: Calculate the time difference between the user terminal and the corresponding time service server, and generate a user time fingerprint corresponding to the user terminal according to the time difference.
[0053] Wherein, for the specific implementation process of this step, reference may be made to the description of the corresponding part in Embodiment 1, and details are not described in this embodiment here.
[0054] Step S220: Generate a user device fingerprint corresponding to the user terminal according to the preset type device information of the user terminal.
[0055] Wherein, the preset t...
Embodiment 3
[0063] image 3 A schematic flowchart of a user identity identification method provided according to Embodiment 3 of the present invention is shown. Wherein, the user identification method provided in this embodiment is a further optimization of the user identification method in the first embodiment.
[0064] Such as image 3 As shown, the method includes:
[0065] Step S310: When a first preset trigger operation is detected, generate a user time fingerprint of the first user terminal corresponding to the first preset trigger operation.
[0066] Step S320: storing the user time fingerprint of the first user terminal in a preset fingerprint library.
[0067] Step S330: When a second preset trigger operation is detected, generate a user temporal fingerprint of the second user terminal corresponding to the second preset trigger operation.
[0068] Step S340: Compare the user temporal fingerprint corresponding to the second user terminal with the user temporal fingerprint of t...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


