Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network user identification authentication method and system

An identity authentication and network user technology, applied in the network field, can solve problems such as interfering with user operations, reducing user information security, network application hazards, etc., to achieve the effect of enhancing security

Active Publication Date: 2007-03-28
BEIJING KINGSOFT SOFTWARE
View PDF0 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Specific external programs that pass authentication may block user operations or interfere with user operations, thereby reducing the security of user information and causing network applications to be compromised

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network user identification authentication method and system
  • Network user identification authentication method and system
  • Network user identification authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0034] Embodiment 1, referring to accompanying drawing 1, in order to realize the purpose of the invention, the specific flow of the method provided by the present invention includes the following steps:

[0035] Step 101: the server sends the obtained vertex data of the 3D model and a verification information group including the corresponding information of the model to the client;

[0036] Among them, the 3D model library is preset on the server side, and each 3D model corresponds to a unique identifier. After the authentication procedure starts, the server randomly selects a 3D model from the 3D model library, and sends the vertex data of this model to the client. In addition, the server randomly selects more than two preset 3D models, and sends the relevant information of all the selected 3D models as a verification information group to the client;

[0037] Wherein, the verification information group includes relevant information of the selected 3D model, and the relevant ...

Embodiment 2

[0058] Embodiment 2. The present invention also provides an optimization method for network user identity authentication. Before the server sends the obtained vertex data of the 3D model to the client, the 3D model to be sent is subjected to interference processing, and the model is transformed. The 3D model data sent to the client is the vertex data of the model after the vertex transformation, avoiding specific external programs to save the 3D model sent by the server each time, and find out the rules of the sent model through analysis and calculation to achieve the purpose of identification.

[0059] Referring to Figure 3, the specific process of the method includes:

[0060] Step 301: the server performs vertex transformation on each vertex data of the acquired 3D model;

[0061] Among them, the 3D model library is preset on the server side, and each 3D model corresponds to a unique identifier. After the authentication procedure starts, the server randomly selects a 3D mod...

Embodiment 3

[0079] Embodiment 3, in the above two specific embodiments, in the process of network user identity authentication, in order to prevent the external program from forcibly suspending the client service every time the server authenticates the user identity, and then reconnecting to the service, In order to evade identity authentication, on the basis of the methods provided in the above two embodiments, the server sends the 3D model data and starts the preset timer at the same time. When the client does not feed back the verification information within the preset time When the user is offline, the server saves the authentication state of the client user identity, and when the user connects again, the previous identity authentication state is restored, and the user's identity authentication process continues.

[0080] Referring to Fig. 5, on the basis of the method provided in the first embodiment, the specific flow of the optimization scheme provided in this embodiment includes: ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

When network user ID authentication condition is fulfilled, the server sends to the user end all peak point data of the preset 3D model and the validation info group (VIG) related to the model. The user end romances these data and displays them with the received VIG on the user end. The user end feedbacks to the server the validation info selected from VIG by the user. If the server judges that the received validation info equals to the sent 3D model info, it will continues the on-going service. This invention ensures that during the server authenticates the net user ID, a certain outside program interferes hardly the operation of the current user business, nor can shield it. This increases network application and the safety of user info.

Description

technical field [0001] The invention relates to the field of network technology, in particular to a method and system for network user identity authentication. Background technique [0002] In the field of network technology, the identity authentication of Internet users is to effectively ensure the security of Internet applications. By authenticating user identities, it can not only distinguish different user identities, but also prevent specific external software programs from shielding users. Operations, and then replace users in network operations, enhance the security of user information, and enable network applications to be effectively maintained. [0003] In the prior art, the client and the server save the same group of pictures. When authenticating the user, the server randomly selects at least one picture from the stored pictures, and sends the picture to the client after interference processing. , after the client receives the picture, the user selects the same ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
Inventor 左力志
Owner BEIJING KINGSOFT SOFTWARE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products