Account login method and system

An account and abnormal login technology, applied in the field of information security, can solve the problems of random misappropriation of communication software accounts, inability to take further precautions, account theft, etc., and achieve the effect of reducing the risk of account theft

Inactive Publication Date: 2013-05-08
ULTRAPOWER SOFTWARE
View PDF4 Cites 47 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the user's account is currently easily stolen by viruses such as Trojan horses. When the account is stolen, the user does not know and cannot take further preventive measures
[0003] It can be seen that, in the prior art, after the account of the user's communication software is stolen, the user cannot immediately perceive it, and only when the user logs in with the account next time, it is possible to know
As a result, the user's communication software account is stolen at will, and cannot be prevented

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Account login method and system
  • Account login method and system
  • Account login method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0046] A method for account login of the present invention is as follows: figure 1 shown.

[0047] Step S100, the server receives an account login request.

[0048] Wherein, the step S100 includes:

[0049] In step S110A, the server receives an account login request carrying the identifier of the currently used machine.

[0050] In step S120A, the server verifies the legality of the identification, if it is not legal, it returns an instruction to perform graphic verification to the account, and then executes step S130A; if it is legal, executes step S200.

[0051] In step S130A, the server receives the graphic verification code submitted by the account, and verifies the legitimacy of the graphic verification code. If it is valid, step S200 is e...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an account login method and a system. The method comprises: step 1, an account login request is received by a server; step 2, the server judges whether the login meets pre-set unusual login prompt conditions or not after success of login, and if the login meets the pre-set unusual login prompt conditions, unusual login prompt information is sent to a user terminal; and step 3, when the server receives lock information replied according to unusual login prompt information through the user terminal, a current registered account is forced to log off, and the account is forbidden to log in again. The account login method and the system can inform a user timely after the account of the user is stolen, and meanwhile usage of the account is limited so as to prevent loss of the user.

Description

technical field [0001] The present invention relates to the field of information security, in particular to an account login method and system. Background technique [0002] In the prior art, communication software applications, such as chat tools, are used more and more widely, and more and more personal information is stored therein. Therefore, account security of communication software applications is becoming more and more important to users. However, the user's account is currently easily stolen by viruses such as Trojan horses. When the account is stolen, the user does not know and cannot take further preventive measures. [0003] It can be seen that, in the prior art, after the user's communication software account is stolen, the user cannot immediately perceive it, and only when the user uses the account to log in next time, it is possible to know. As a result, the account of the user's communication software is misappropriated arbitrarily and cannot be prevented. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 鞠进步
Owner ULTRAPOWER SOFTWARE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products