Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

User identification identifying method and system

A technology for user identification and user identification, applied in the field of user identification methods and identification systems, can solve problems such as user inconvenience, loss, and slow response speed, save system space and resources, and save procedures for requesting operations. The effect of improving safety

Active Publication Date: 2011-11-02
NETEASE INFORMATION TECH(BEIJING) CO LTD
View PDF1 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] Although the dynamic identification method generates a temporary password each time, and generally it can only be used once and is time-sensitive. The purpose of the terminal is relatively single, it is not convenient to carry, and it also needs an independent power supply. When the power is exhausted, the device that relies on time as the password factor will not work normally
In addition, mobile phone short message products make use of people's common communication methods. Although there is no need to purchase additional dedicated terminals or equipment, sending short messages will occupy limited wireless network communication resources, and sending and receiving short messages is a paid service that requires additional expenses for users; Or, due to the delay, loss, slow response speed and other problems that may be caused by the SMS technology itself, it often brings a lot of inconvenience to users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User identification identifying method and system
  • User identification identifying method and system
  • User identification identifying method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] In order to make the above objects, features and advantages of the present invention more comprehensible, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0033] refer to figure 1 , is a flow chart of a user identification method of the present invention, comprising the following steps:

[0034] Step 101, binding the user account and phone number, and setting an effective response time;

[0035] Step 102, obtain a user identity verification request, the request includes user account information;

[0036] Step 103, determine whether the time interval between receiving the call from the phone number bound by the user and sending the identity verification request by the user is less than or equal to the effective response time, if yes, then;

[0037] Step 104, passing the user identity verification request. After the user is authenticated, the corresponding application service can b...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a user identification recognize method. Wherein, it is characterized in that: it comprises bonding user account and telephone number, and setting the effective response time; obtaining user identification check request, which comprises user account information; judging if the time space from the incoming time of received telephone number to the time that user sends out identification request is not higher than said effective response time; if it is, passing the user identification check request. The invention can support general communication terminal, without additional device to reduce the cost. And when user calls the service telephone of operator, the telephone could not be connected, to save cost; and user only needs to dial the service number.

Description

technical field [0001] The invention relates to the field of information security, in particular to a user identity identification method and an identification system thereof. Background technique [0002] Identification generally refers to the process of computer and network systems confirming the identity of the operator. Computers and computer networks form a virtual digital world. In the digital world, all information, including user identity information, is represented by a set of specific data. Computers can only identify users’ digital identities, and authorization to users is also for users. digital identity. The real world we live in is a real physical world, and everyone has a unique physical identity. How to ensure that the visitor who operates with a digital identity is the legal owner of the digital identity, that is, how to ensure that the physical identity of the operator corresponds to the digital identity, becomes an important security issue. [0003] Ide...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32
Inventor 丁磊
Owner NETEASE INFORMATION TECH(BEIJING) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products