Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for generating identification information

A technology of identification information and identification, applied in the computer field, can solve the problem of low flexibility, achieve the effect of solving low flexibility, supporting client needs, and simplifying the process of generating identification information

Active Publication Date: 2020-07-28
TENCENT TECH (SHENZHEN) CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] Embodiments of the present invention provide a method and device for generating identification information to at least solve the technical problem of low flexibility in generating identification information in related technologies

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for generating identification information
  • Method and device for generating identification information
  • Method and device for generating identification information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0031] According to an embodiment of the present invention, an embodiment of a method for generating identification information is provided.

[0032] Optionally, in this embodiment, the method for generating the above identification information can be applied to such as figure 1 In the hardware environment constituted by the server 102 and the terminal 104 as shown. figure 1 It is a schematic diagram of a hardware environment of a method for generating identification information according to an embodiment of the present invention. like figure 1 As shown, the server 102 is connected to the terminal 104 through a network. The above-mentioned network includes but not limited to: a wide area network, a metropolitan area network or a local area network. The terminal 104 is not limited to a PC, a mobile phone, a tablet computer, and the like. The method for generating identification information in this embodiment of the present invention may be executed by the server 102, may also...

Embodiment 2

[0142] The technical solutions of the present invention will be described below in conjunction with preferred embodiments.

[0143] In this embodiment, the login information generated by the target object when logging into the client is user key information, including: user identification information, time identification information, client identification information, client version information and random numbers.

[0144] The method for generating the identification information is introduced below.

[0145] The first step is to extract the key information of the user, including user identification information, time identification information, client identification information, client version information, and random numbers.

[0146] The second step is to serialize key user information. First, the 2-byte client identification information and the 1-byte version information are combined into a 4-byte value by shifting. Then the user identification information, time identificat...

Embodiment 3

[0159] The application environment of the embodiment of the present invention may refer to, but is not limited to, the application environment in the foregoing embodiments, which will not be described in detail in this embodiment. The embodiment of the present invention provides an optional specific application for implementing the method for generating the above identification information, which is specifically described with a ticket used to represent an identity credential.

[0160] The bearer in the embodiment of the present invention is a video service, and the login supported by each video terminal includes a login mode of an instant messaging application. For the storage of background data and the verification of user identities, a system is required to carry them. Otherwise, two types of data must be stored, one is account number, and the other is OpenID. Among them, OpenID is a user-centric digital identity. The identification framework has open and decentralized main...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an identification information generation method and device. The method comprises the following steps: acquiring first login information generated when a target object logs in to a client; carrying out serialization processing of the first login information according to bytes, so that a first byte sequence is obtained; carrying out encryption of the first byte sequence according to preset encryption rules, so that a first encrypted character string matched with the first login information is obtained; and determining that the first encrypted character string is identification information used for identifying the target object. The identification information generation method and device provided by the invention has the advantage that the technical problem of low identification information generation flexibility in the relevant art is solved.

Description

technical field [0001] The present invention relates to the field of computers, in particular to a method and device for generating identification information. Background technique [0002] Identification information is a kind of identity credential, such as a ticket, which is the reliance of data interaction between the user and the server. When responding to the server's request, only the legal request can be passed after the verification of the identification information, and the illegal request will be rejected. [0003] Several basic elements of identifying information include: security, stability, and efficiency. Among them, the security is determined according to the level of security requirements of the business, and the stability is that the identification information requires a relatively high stability. [0004] There are many ways to generate tickets, but they can basically be divided into two types: stateful tickets and stateless tickets. Among them, a statef...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L29/06
CPCH04L9/0866H04L63/0807H04L63/0815
Inventor 赵丹
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products