User identifier generating method and device

A technology for user identification and generation unit, applied in the field of communication security, can solve the problem of low security and achieve the effect of protecting identification information

Inactive Publication Date: 2016-12-14
LETV HLDG BEIJING CO LTD +1
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But the logo generated by UUID is too long, and the logo generated by Twitter-Snowflake is only composed of numbers, so the security is not high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User identifier generating method and device
  • User identifier generating method and device
  • User identifier generating method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] In order to facilitate the understanding of the present invention, the present invention will be described more fully below with reference to the associated drawings. Preferred embodiments of the invention are shown in the accompanying drawings. However, the present invention can be embodied in many different forms and is not limited to the embodiments described herein. On the contrary, these embodiments are provided to make the understanding of the disclosure of the present invention more thorough and comprehensive.

[0044] Unless otherwise defined, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the technical field of the invention. The terms used herein in the description of the present invention are for the purpose of describing specific embodiments only, and are not intended to limit the present invention.

[0045] refer to figure 1 , is a schematic diagram of the method for generating a us...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a user identifier generating method and device, relates to the technical field of communication security, and aims to generate a user identifier for logging into a website. The method comprises the following steps: generating a time stamp, a random number and an auto-increment number; generating a time stamp hash code, a random number hash code and an auto-increment number hash code according to the generated time stamp, random number and auto-increment number; and acquiring the user identifier according to the generated time stamp hash code, random number hash code and auto-increment number hash code. Through adoption of the user identifier generating method and device, the user identifier is partitioned into three parts, namely, the time stamp hash code, the random number hash code and the auto-increment number hash code, so that user identifiers are different from one another; the number of bits of the user identifiers are different; the user identifiers are irregular; and the identification information of the users is protected.

Description

technical field [0001] The embodiment of the present invention relates to the technical field of communication security, in particular to a method and device for generating a user ID (ID) when logging in to a website. Background technique [0002] One of the means for hackers to attack websites is to obtain all user IDs. If the IDs generated by the website server for users are too simple, the possibility of user ID leaks will increase. [0003] The inventors of the present invention found in the process of researching the application that the prior art generally adopts UUID (Universal Unique Identifier) ​​method and Twitter-Snowflake (a method for generating a logo) method to generate. However, the ID generated by UUID is too long, and the ID generated by Twitter-Snowflake is only composed of numbers, which is not very secure. [0004] In the actual user ID generation process, it is necessary to focus on the confidentiality and complexity of the user ID to improve the secur...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L29/06
CPCH04L9/3297H04L63/0815H04L2463/121
Inventor 谢晓静
Owner LETV HLDG BEIJING CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products