A method and device for protecting user information

A user information and legal technology, applied in the Internet field, can solve the problems of reducing effectiveness, and the pace of security software upgrades cannot keep up with the upgrade and changes of hacking programs, so as to achieve the effect of improving effectiveness and strengthening security mechanisms

Active Publication Date: 2018-09-07
TENCENT TECH (SHENZHEN) CO LTD
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] After the analysis of a large number of samples, it is found that the existing security software is mainly how to prevent account numbers and passwords entered by users from being stolen by Trojan horse programs on computers, that is, how to prevent the execution of account number programs. However, account number program programs are often varied and varied. Constantly upgrade the program, so that the upgrade rhythm of the security software cannot keep up with the upgrade and change rhythm of the hacking program, thereby reducing the effectiveness of the security software in preventing the hacking Trojan horse program

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for protecting user information
  • A method and device for protecting user information
  • A method and device for protecting user information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] Embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0023] figure 1 It is an overall flowchart of a method for protecting user information provided by an embodiment of the present invention.

[0024] In this embodiment, the user can log in to the webpage through the web browser in the mobile terminal, and browse various information in the webpage, such as information, various online applications, etc. The interactive interface logs in to the corresponding interface to operate the corresponding business. In the above operation process, there will be an interface that requires the user to enter the user's account number and password. At this time, if the user's mobile terminal is in a safe environment (for example, the mobile terminal is protected by corresponding security software or a firewall) , the user's input account number and password operation will be protected safely; when the security softwar...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a method for protecting user information. The method includes: capturing data which is sent by a mobile terminal to a network; obtaining a target server address of the captured data; sending the target server address to a cloud end for authentication and executing operations corresponding to an authentication result on the captured data according to the returned authentication result so that effectiveness in preventing account stealing by an account stealing Trojan program is improved.

Description

technical field [0001] The invention relates to the technical field of the Internet, in particular to a method and device for protecting user information. Background technique [0002] With the development and popularization of the Internet, the Internet has gradually become a part of users' lives. Users can operate various businesses on the Internet. In the process of operating businesses, users often need to enter user names and passwords, etc. Personal confidentiality information. [0003] Due to the weakness of the Internet's own security system, users' computers are often invaded by hackers, and without knowing it, Trojan horse programs are installed by lawless personnel on the user's computers. [0004] In the existing network, there are many ways of hacking Trojan horses. The main implementation method is: the Trojan horse program is implanted into the user's computer. account number and password, and send the obtained account number and password to the target serve...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
Inventor 毕裕
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products