Linux-based user identifier uniqueness implementation method and device, equipment and medium
A user identification and implementation method technology, applied in the computer field, can solve problems such as increasing data leakage, identity theft, program or file theft or abuse, and endangering computer system security.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0065] The present application will be further described in detail below with reference to the accompanying drawings.
[0066]figure 1 This is a schematic flowchart of a method for realizing uniqueness of a user identifier based on Linux provided by an embodiment of the present application.
[0067] like figure 1 As shown, the main flow of the method is described as follows (steps S101-S106):
[0068] Step S101, in response to the user's user account creation instruction, determine whether the user ID creation instruction includes a specified user ID;
[0069] Step S102, if yes, then judge whether the specified user ID has a usage record based on a preset user ID database;
[0070] Step S103, if there is no usage record, then create a user account based on the specified user ID, and store the specified user ID in the user ID database, and update the user ID database;
[0071] Step S104, if there is a usage record, then determine whether there is an available user ID;
[00...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com



