Account control method, device and server of an online trading platform
A network transaction and account control technology, applied in the network field, can solve problems such as being unsuitable for the security needs and experience of company-level merchants, unable to find secure login management and authority division, and insufficiently personalized usage scenarios.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0098] This embodiment provides an account control method for an online trading platform, including:
[0099] Provide hierarchical control functions for user accounts, divide the functions provided to the user accounts into at least two layers, each layer includes one or more functions, and each layer corresponds to a security check;
[0100] enabling or authorizing the hierarchical control function for the user account;
[0101] When the user account subsequently logs in, after receiving the request for opening the layer of the user account, if the user account passes the security verification corresponding to the layer requested to be opened, the requested layer is enabled for the user account. each function of the opened layer; and maintain the opened state of the opened layer until the user account is logged out from the system or the opened layer is closed for the user account. Wherein, enabling a layer means enabling each function of the layer.
[0102] In an alternati...
example 1
[0143] Such as figure 1 As shown, the hierarchical control function is enabled for the primary account, including:
[0144] Step 101, the server receives a login request of the primary account;
[0145] Step 102, the server performs identity verification, which is called weak identity verification herein, for example, verifying whether the password carried in the login request is correct; if the verification is successful, then go to step 104, otherwise, go to step 103;
[0146] Step 103, notify the main account of failure to log in, end;
[0147] Step 104, notifying the master account that the login is successful, and receiving a request from the master account to enable the layered control function;
[0148] Step 105: After receiving the master account's request to enable the layered control function, the server performs a security check corresponding to the layered control function, which is called the first strong identity check here, and the first strong identity check ...
example 2
[0167] In this application, a main account and a sub-account are provided, and the sub-account needs to be authorized by the main account to obtain the second-tier functions. Sub-account authorization such as image 3 shown, including:
[0168] Step 301, the server receives a login request of a sub-account;
[0169] Step 302, the server performs identity verification, here is a weak identity verification (check whether the password carried in the login request is correct); if the verification is successful, then go to step 304, otherwise, go to step 303;
[0170] Step 303, notify the sub-account of failure to log in, end;
[0171] Step 304, notify the sub-account of successful login, and enable the first-level function for the sub-account;
[0172] Step 305, receiving the sub-account's request to enable the layered control function, which is equivalent to an authorization request;
[0173] Step 306, forwarding the request for enabling the layered control function to the pr...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


