Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

User account protection method and user account protection device

A technology for user accounts and users, applied in the field of computer communication, can solve the problems of inability to change passwords, cumbersome operations to change passwords, leakage, etc., and achieve the effect of improving protection efficiency

Active Publication Date: 2015-02-11
SHENZHEN TENCENT COMP SYST CO LTD
View PDF8 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there are many specific situations where the user account is abnormal. Not every situation requires the user to change the password. For example, the user account is maliciously attempted by a bad person using an automatic machine. It has not been really leaked, but there is only a possibility of leaking. At this time, it is not meaningful to force the user to change the password, and because the operation of changing the password is cumbersome, it is usually necessary to enter the reserved verification information to complete the modification operation. Once the user forgets If the reserved verification information is used, the password may never be changed, which not only fails to protect the user account, but also causes troubles for normal users and leads to the loss of users.
Therefore, existing user account protection techniques are inefficient

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User account protection method and user account protection device
  • User account protection method and user account protection device
  • User account protection method and user account protection device

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0021] see figure 1 , shows an application environment diagram of the method for protecting a user account provided by the first embodiment of the present invention. Such as figure 1 As shown, the server 11 and the user terminal 12 are located in a wireless or wired network, and the server 11 and the user terminal 12 communicate with each other through the wireless or wired network.

[0022] User terminal 12 can include smart phone, tablet computer, e-book reader, MP3 player (Moving Picture Experts Group Audio Layer III, moving picture expert compression standard audio level 3), MP4 (Moving Picture Experts Group Audio Layer IV, moving picture Expert Compression Standard Audio Level 4) Players, Laptops and Desktops, etc.

[0023] see figure 2 , shows a flow chart of the method for protecting a user account provided by the first embodiment of the present invention. combine figure 1 The method for protecting a user account provided by this embodiment includes the following ...

no. 2 example

[0032] see image 3 , shows an application environment diagram of the method for protecting a user account provided by the second embodiment of the present invention. Such as image 3 As shown, the server 31, the user terminal 32, the access server 33, and the service server 34 are located in a wireless or wired network, and through the wireless or wired network, the above-mentioned server 31, user terminal 32, access server 33, and service server 34 communicate with each other.

[0033] It can be understood that the above-mentioned server 31, access server 33, and service server 34 may be a single server, or may be a server cluster composed of multiple servers.

[0034] see Figure 4 , shows a flow chart of the method for protecting a user account provided by the second embodiment of the present invention. combine image 3 The method for protecting a user account provided by this embodiment includes the following steps:

[0035] Step 41, the server periodically detects ...

no. 3 example

[0047] see Figure 5 , shows a flow chart of the method for protecting a user account provided by the third embodiment of the present invention. This embodiment can also be applied to figure 2 shown in the application environment, combined with figure 2 ,Such as Figure 5 As shown, the user account protection method provided in this embodiment includes the following steps:

[0048] Step 51, the server periodically detects the information associated with the user account.

[0049] The information associated with the user account includes security information of the user account and the corresponding password, that is, leakage information of the user account and the corresponding password. Specifically, the server 31 regularly detects whether the user account database is attacked by hackers and whether the data information in the user account database is stolen by others, so as to detect whether the user account and the corresponding password are leaked. It can be underst...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a user account protection method which comprises the following steps: detecting information related to a user account regularly by use of a server; and when detecting that the information related to the user account is preset abnormal information, performing protective treatment on the user account according to the preset protection grade corresponding too the preset abnormal information. Furthermore, the invention also provides a user account protection device. The user account protection method and the user account protection device can be used for improving the user account protection efficiency.

Description

technical field [0001] The invention relates to the technical field of computer communication, in particular to a method and device for protecting a user account. Background technique [0002] When the user account is abnormal, for example: the user account and the corresponding password are leaked, the user account is maliciously attempted by a bad person using an automatic machine, etc., the existing user account protection technology generally adopts the method of forcibly guiding the user to change the password to protect the user account. for protection. However, there are many specific situations where the user account is abnormal. Not every situation requires the user to change the password. For example, the user account is maliciously attempted by a bad person using an automatic machine. It has not been really leaked, but there is only a possibility of leaking. At this time, it is not meaningful to force the user to change the password, and because the operation of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/0815H04L63/083H04L63/0846H04L63/14
Inventor 张杰许灿冲孙淑芹
Owner SHENZHEN TENCENT COMP SYST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products