Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Abnormity monitoring method and device for user registration

A technology of login location and user, applied in the network field, can solve the problem of not being able to guarantee the security of user accounts

Active Publication Date: 2014-01-22
NETEASE INFORMATION TECH(BEIJING) CO LTD
View PDF3 Cites 153 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, when the user name and password of the user account are leaked or stolen, the existing login methods cannot guarantee the security of the user account

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Abnormity monitoring method and device for user registration
  • Abnormity monitoring method and device for user registration
  • Abnormity monitoring method and device for user registration

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0140] The principle and spirit of the present invention will be described below with reference to several exemplary embodiments. It should be understood that these embodiments are given only to enable those skilled in the art to better understand and implement the present invention, rather than to limit the scope of the present invention in any way. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.

[0141] figure 1 A block diagram of an exemplary computing system 100 suitable for implementing embodiments of the invention is shown. Such as figure 1 As shown, the computing system 100 may include: a central processing unit (CPU) 101, a random access memory (RAM) 102, a read only memory (ROM) 103, a system bus 104, a hard disk controller 105, a keyboard controller 106, a serial interface controller 107 , parallel interface controller 108 , display control...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention embodiment provides an abnormity monitoring method for user registration. The method comprises the following steps: judging if the present registration behavior of a user is abnormal by utilizing history registration information corresponding to an user account according to and responding to a request related to the user account, if yes, storing the abnormal registration information corresponding to the abnormal registration behavior, and generating prompt information by utilizing the stored abnormal registration information and sending the prompt information to the user. The method, provided by the invention, can automatically finish the judgment and prompt of the abnormal user registration behavior according to the history user registration information and the user does not need to set the common registration place beforehand, so that the stealing risk of the user account is prominently reduced, the security of the user account is improved, the user operation complexity is decreased, and better experience is brought to the user. Furthermore, the embodiment of the invention further provides an abnormity monitoring device for the user registration.

Description

technical field [0001] The embodiments of the present invention relate to the field of network technology, and more specifically, the embodiments of the present invention relate to a method and device for monitoring user login anomalies. Background technique [0002] This section is intended to provide a background or context for implementations of the invention that are recited in the claims. The descriptions herein may include concepts that could be explored, but not necessarily concepts that have been previously thought of or explored. Therefore, unless otherwise indicated herein, what is described in this section is not prior art to the description and claims in this application and is not admitted to be prior art by inclusion in this section. [0003] In network applications, in order to realize the identification and verification of user identity, the user needs to enter the user name and password on the client side, and the server side verifies the user name and pass...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/26H04L29/06
Inventor 曹鲁张红泽董海疆崔坤
Owner NETEASE INFORMATION TECH(BEIJING) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products