Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

User identification identifying method and system

A technology of user identification and user identity, which is applied in the field of user identification method and its identification system, can solve problems such as low security, user damage, and high cost of use, and achieve saving system space and resources, saving request operation programs, The effect of improving safety

Active Publication Date: 2007-02-28
NETEASE INFORMATION TECH(BEIJING) CO LTD
View PDF1 Cites 30 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] However, the password verification information in the static identification method is a static string, which needs to be transmitted to the server through keyboard input or network transmission. It is very easy to steal and leak through keyboard monitoring, network interception and other means, and its security is relatively high. Low, and because the password is valid for a long time, once it is stolen or leaked, the user will suffer irreparable damage; since the key type verification information does not need to be entered through the keyboard, the security is higher than the password type verification information, but generally It is necessary to use a special input device as a carrier, such as a computer, mobile memory, etc., which requires additional expenses to purchase the device, which is costly to use, and the device needs to be carried when using it, which brings great inconvenience to the user
[0008] Although the dynamic identification method generates a temporary password each time, and generally it can only be used once and is time-sensitive. The purpose of the terminal is relatively single, it is not convenient to carry, and it also needs an independent power supply. When the power is exhausted, the device that relies on time as the password factor will not work normally
In addition, mobile phone short message products make use of people's common communication methods. Although there is no need to purchase additional dedicated terminals or equipment, sending short messages will occupy limited wireless network communication resources, and sending and receiving short messages is a paid service that requires additional expenses for users; Or, due to the delay, loss, slow response speed and other problems that may be caused by the SMS technology itself, it often brings a lot of inconvenience to users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User identification identifying method and system
  • User identification identifying method and system
  • User identification identifying method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] In order to make the above objects, features and advantages of the present invention more comprehensible, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0042] With reference to Fig. 1, it is a flow chart of a kind of user identification method of the present invention, comprises the following steps:

[0043] Step 101, binding the user account and phone number, and setting an effective response time;

[0044] Step 102, obtain a user identity verification request, the request includes user account information;

[0045] Step 103, determine whether the time interval between receiving the call from the phone number bound by the user and sending the identity verification request by the user is less than or equal to the effective response time, if yes, then;

[0046] Step 104, passing the user identity verification request. After the user is authenticated, the corresponding applicatio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a user identification recognize method. Wherein, it is characterized in that: it comprises bonding user account and telephone number, and setting the effective response time; obtaining user identification check request, which comprises user account information; judging if the time space from the incoming time of received telephone number to the time that user sends out identification request is not higher than said effective response time; if it is, passing the user identification check request. The invention can support general communication terminal, without additional device to reduce the cost. And when user calls the service telephone of operator, the telephone could not be connected, to save cost; and user only needs to dial the service number.

Description

technical field [0001] The invention relates to the field of information security, in particular to a user identity identification method and an identification system thereof. Background technique [0002] Identification generally refers to the process of computer and network systems confirming the identity of the operator. Computers and computer networks form a virtual digital world. In the digital world, all information, including user identity information, is represented by a set of specific data. Computers can only identify users’ digital identities, and authorization to users is also for users. digital identity. The real world we live in is a real physical world, and everyone has a unique physical identity. How to ensure that the visitor who operates with a digital identity is the legal owner of the digital identity, that is, how to ensure that the physical identity of the operator corresponds to the digital identity, becomes an important security issue. [0003] Ide...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32
Inventor 丁磊
Owner NETEASE INFORMATION TECH(BEIJING) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products