Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network transaction platform account control method and device, and server

A technology for network transactions and account control, applied in the network field, can solve the problems of inability to find secure login management and authority division, account information being stolen, and unsuitable for company-level merchants' security needs and experience.

Active Publication Date: 2014-06-18
ALIBABA GRP HLDG LTD
View PDF9 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Existing secondary verification products, take Taobao’s “Operation Protection” as an example, the way of this product is that when users log in or do key business operations, they need to pass SMS, OTP (One-timePassword, dynamic password) products etc. to perform identity verification to ensure that the operator is the account owner, but this product is not suitable for the security needs and experience of company-level merchants, and the usage scenarios are not personalized enough
[0004] The current platform-level merchant account security management cannot achieve the company-level control level, and is more limited by the overall account control process of the website. It cannot be personalized to meet the management status of its own company, and it is impossible to find a balance between secure login management and authority division. For example, a merchant has three sub-accounts A, B, and C. A is responsible for after-sales service and only uses transaction management; B is responsible for pre-sale service and only needs IM (Instant Messenger, instant messaging) communication; C is responsible for finance and only uses funds Management, each sub-account controls the login and security separately. At this time, if A is stolen or resigns, the merchant will have the risk of information theft and fund theft because the merchant does not have the right to use and control the account.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network transaction platform account control method and device, and server
  • Network transaction platform account control method and device, and server
  • Network transaction platform account control method and device, and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0098] This embodiment provides an account control method for an online trading platform, including:

[0099] Provide a hierarchical control function for a user account, divide the functions provided for the user account into at least two layers, each layer includes one or more functions, and each layer corresponds to a security check;

[0100] Enable or authorize the hierarchical control function for the user account;

[0101] When the user account is subsequently logged in, after receiving the request to open the layer of the user account, if the user account passes the security check corresponding to the layer requested to be opened, the user account opens the requested layer. Each function of the opened layer; and maintain the opened state of the opened layer until the user account is logged out of the system or the opened layer is closed for the user account. Among them, opening a layer means opening each function of the layer.

[0102] In an alternative solution of this embodim...

example 1

[0143] Such as figure 1 As shown, the hierarchical control function is enabled for the main account, including:

[0144] Step 101: The server receives the login request of the master account;

[0145] Step 102, the server performs identity verification, which is called weak identity verification here, for example, verifying whether the password carried in the login request is correct; if the verification is successful, go to step 104; otherwise, go to step 103;

[0146] Step 103, notify the master account that the login failed, and end;

[0147] Step 104, notify the master account that the login is successful, and receive the request of the master account to enable the hierarchical control function;

[0148] Step 105: After the server receives the request to enable the hierarchical control function of the master account, it performs a security check corresponding to the hierarchical control function, which is referred to herein as the first strong identity check, which includes personal...

example 2

[0167] In this application, the main account and the sub-account are provided, and the sub-account needs to be authorized by the main account to obtain the second-level functions. The authorization of the sub-account is as image 3 Shown, including:

[0168] Step 301: The server receives the login request of the sub-account;

[0169] Step 302, the server performs identity verification, here is weak identity verification (verify whether the password carried in the login request is correct); if the verification is successful, go to step 304, otherwise, go to step 303;

[0170] Step 303, notify the sub-account that the login failed, and end;

[0171] Step 304, notify the sub-account that the login is successful, and enable the first-level function for the sub-account;

[0172] Step 305: Receive a request for enabling the hierarchical control function of the sub-account, which is equivalent to an authorization request;

[0173] Step 306: Forward the request to enable the hierarchical contro...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a network transaction platform account control method which includes: providing a layered control function for a user account and dividing the function which is provided to the user account into at least two layers, wherein each layer includes one or more functions and each layer is corresponding to a safety verification; starting the layered control function or performing authentication for the user account; when at follow-up login of the user account, after a layer starting request of the user account is received, if the user account passes the safety verification corresponding to a layer which is requested to be opened, starting different functions of the layer which is requested by the user account to be opened; and maintaining the start state of the layer which is already started until the user account exists a system or closing the layer which is already started for the user account. The invention also provides a network transaction platform control device and a server.

Description

Technical field [0001] The invention relates to the field of network technology, in particular to a method, device and server for controlling an account of a network transaction platform. Background technique [0002] As a transaction management platform, it provides merchants with suitable differentiated (for example, different from Taobao's operation protection function) security products, and provides secure login supervision and control. The biggest difference between transaction buyers and transaction sellers on the platform is that buyers For individuals, most of the sellers, except individuals, are company-level sellers. The transaction scenarios and authority management are relatively complicated. Therefore, the characteristics of its security products must meet the needs of most company-level merchants. [0003] Existing secondary verification products, take Taobao’s "Operation Protection" as an example. The method of this product is that when users log in or do key busine...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06G06Q10/06G06Q30/06
CPCG06F21/30G06Q20/40
Inventor 雷天鹏
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products