Method and system for smart phone user identity identification

A user identification, smart phone technology, applied in electrical components, wireless communication, network data management and other directions, can solve the problems of cumbersome and inconvenient operation, and achieve the effect of convenient and simple implementation and simplify the user identification process.

Inactive Publication Date: 2012-12-05
冯钧
View PDF5 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the identification of existing smart phone applications basically follows the traditional account password mode. When users switch between different applications, they need to enter different account passwords, which is cumbersome and inconvenient.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for smart phone user identity identification
  • Method and system for smart phone user identity identification

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] The embodiments of the present invention will be described in detail below with reference to the accompanying drawings, wherein the following embodiments are given to provide a comprehensive and thorough understanding of the present invention, but not to limit the present invention.

[0017] Such as figure 2 As shown, the smart phone user identification system of the present invention is composed of a system server, a data storage module and an Internet access module; the system server is electrically connected to the data storage module, and the system server is electrically connected to the Internet access module, and connected to the the Internet. Submit the MAC address code of the smart phone to the system server through the Internet for verification, and obtain the bound mobile phone user information. Wherein the system server, the data storage module and the Internet access module are all prior art.

[0018] Such as figure 1 Shown, smart phone user identificat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and a system for smart phone user identity identification. The system comprises a system server, a data storage module and an internet access module, and the system server is connected to the internet through the internet access module. The method includes the steps: binding a phone number and the user information of a smart phone user and an MAC (media access control) address code of a smart phone; and submitting the MAC address code of the smart phone to the system server through the internet for verification, so that the bound phone user information is obtained. By the aid of the method and the system, a smart phone user identity identification process is simplified, user identity authentication in various applications of the smart phone is unified, and simple implementation of various application services of the smart phone is facilitated.

Description

technical field [0001] The invention relates to the field of mobile communication, in particular to a method and a system for identifying the identity of a smart phone user through the smart phone MAC address. Background technique [0002] MAC (Medium / MediaAccess Control, Media Access Control) MAC address is burned in NetworkInterfaceCard (network card, NIC), MAC address, also called hardware address, is 48 bits / bit long (6 bytes / byte, 1byte= 8bits), composed of hexadecimal numbers. 0-23 bits are called organizationally unique, which is the identifier for identifying LAN (local area network) nodes. 24-47 bits are allocated by the manufacturer itself, and the 40th bit is multicast Address flag. The physical address of the network card is usually burned into the EPROM of the network card by the network card manufacturer (a flash memory chip, which can usually be erased and rewritten by the program), which stores the real identification of the computer that sends the data and t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W8/18H04W8/20
Inventor 冯钧
Owner 冯钧
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products