Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method, device and system for preventing illegal subscriber log-on

A technology for illegal users and users, applied in transmission systems, digital transmission systems, secure communication devices, etc., and can solve problems such as lack of

Inactive Publication Date: 2006-12-20
INT BUSINESS MASCH CORP
View PDF0 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This situation always occurs in public places such as Internet cafes, and through non-network channels, so it is a situation that cannot be circumvented from a technical perspective
[0006] Therefore, there is a lack of a method and system in the prior art that can effectively prevent illegal users from using illegally obtained real user account numbers and passwords to log into online games

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and system for preventing illegal subscriber log-on
  • Method, device and system for preventing illegal subscriber log-on
  • Method, device and system for preventing illegal subscriber log-on

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] Next, embodiments of the present invention will be described in detail. It should be noted that the following description should not be used to limit the present invention. On the contrary, according to the inventive concept of the present invention, those skilled in the art can make appropriate changes, and these changes can fall within the scope of the invention defined by the claims.

[0029] At the same time, it should be noted that although an online game is taken as an example here, those skilled in the art should understand that the present invention is not limited to the method and system for preventing illegal users from logging into online games. In online applications where passwords and other information verify user identities, the method and system of the present invention can be used to prevent illegal users from invading.

[0030] In order to describe the present invention more clearly, a system for implementing online games in the prior art is firstly d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for avoiding illegal user to access into one on-line application with the access information of real user, wherein the invention relates to the user access information with the number of personal communication device appointed by user; when receiving the user access information input by user, searching for the number of personal communication device related to said user access information, and sending one message to the number, to inform user about the access operation; if not receiving the confirm message of user, rejecting said user access information to access on the on-line application. The invention uses external personal communication device as mobile phone to avoid illegal user to access, to avoid the illegal user to theft the network resource of real user.

Description

technical field [0001] The present invention relates to the field of online applications, in particular to a method, device and system for preventing an illegal user from logging into an online application with a user account and password of a real user. Background technique [0002] In many online service applications, such as online games, a user is identified by a unique account / password. All important data of the user are associated with this account / password. For example, in the case of online games, if the account / password is hacked, the user will lose his level and all his virtual assets. This is a disaster for both users and online gaming services. Unfortunately, the account number / password is often obtained by hackers using some simple methods, such as "Trojan horse". Hackers use viruses such as "Trojan horses" to record all keystrokes of the user, thereby recording the user's behavior on the client side, obtaining his account number / password, and then participat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/10
CPCH04L63/08H04L63/18H04L63/083
Inventor 张健阎蓉邵凌
Owner INT BUSINESS MASCH CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products