Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for controlling modification of user's sensitive information

A technology for sensitive information and information modification, applied in the field of Internet applications, can solve problems such as high labor costs, and achieve the effect of improving security and avoiding malicious modification

Active Publication Date: 2014-07-16
SHENZHEN TENCENT COMP SYST CO LTD
View PDF4 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Based on this, it is necessary to provide a method for controlling user sensitive information modification that can reduce labor costs and avoid malicious modification of user sensitive information in view of the high labor cost caused by manual review and modification requests

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for controlling modification of user's sensitive information
  • Method and system for controlling modification of user's sensitive information
  • Method and system for controlling modification of user's sensitive information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] Such as figure 1 As shown, in one embodiment, a method for controlling modification of user sensitive information includes the following steps:

[0026] Step S110, receiving a modification request of user sensitive information.

[0027] In this embodiment, the modification request is used to modify the sensitive information of the user, and the sensitive information of the user is various private information related to the user stored in the background server.

[0028] When any user sensitive information modification operation is triggered, a modification request will be generated according to the modification content of the user sensitive information. The modification request includes the user ID to which the user sensitive information belongs and the modification content. The information modification request can know which user sensitive information corresponding to the user ID triggers the modification operation, and the content to be modified in the user sensitive ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and a system for controlling modification of user's sensitive information. The method comprises the steps of receiving a modification request of the user's sensitive information; performing suspend execution on the modification request; extracting communication information corresponding to the modification request, and transmitting an information modification message corresponding to the modification request according to the communication information; receiving a modification cancel command returned according to the information modification message and forbidding execution of the modification request subjected to the suspend execution according to the modification cancel command. The system comprises a request receiving module, a suspend execution module, a processing module and a request forbidding module. By means of the method and the system for controlling modification of the user's sensitive information, labor cost is reduced, and malicious modification of the user's sensitive information is avoided.

Description

technical field [0001] The invention relates to Internet application technology, in particular to a method and system for controlling modification of user sensitive information. Background technique [0002] With the vigorous development of Internet services, various Internet services provide a variety of functions to meet people's various needs, and people can use the required functions only after registering in Internet services as users of the Internet services. [0003] During the registration process of the Internet service, the registration information of the user on the Internet service includes the user ID, password and corresponding user information, wherein, the user information corresponding to each user ID includes various attributes input by the user, for example, the user belongs to gender, age, etc., and also includes corresponding user sensitive information, that is, user-related private information, such as e-mail address, mobile phone number, etc. User sens...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 李俊郭计伟胡育辉黄移军
Owner SHENZHEN TENCENT COMP SYST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products