Service locking method, service unlocking method, device and system

A business and unlocking technology, applied in the field of network property security, which can solve problems such as illegal operation of network virtual property

Active Publication Date: 2014-12-17
TENCENT TECH (SHENZHEN) CO LTD +1
View PDF7 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to solve the problem in the prior art that the network virtual property of legal users is easily subjected to illegal

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Service locking method, service unlocking method, device and system
  • Service locking method, service unlocking method, device and system
  • Service locking method, service unlocking method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0084] See figure 1 As shown in FIG. 1 , it shows the method flow chart of the service authentication method provided by Embodiment 1 of the present invention. The service authentication method is completed through the cooperation of the operation terminal and the verification server. The business authentication method may include:

[0085] Step 101, the operating terminal sends an authentication request to the verification server, and the authentication request includes the identification of the operating terminal and the identification information of the designated service;

[0086] The operating terminal here refers to a terminal for a user to perform related operations, such as a mobile phone, a personal computer, a multimedia TV, a multi-function camera, or an e-reader.

[0087] In practical application, the user can download and install an application program interface (app) or plug-in corresponding to the specified service provided by the server corresponding to the s...

Embodiment 2

[0112] See figure 2 As shown in FIG. 2 , it shows a method flow chart of the service locking method provided in Embodiment 2 of the present invention. The service locking method can be completed through the cooperation of the operation terminal, the lock function server and the verification server. The business locking method may include:

[0113] Step 201, the user sends a lock request to the operation terminal to request to lock a specified service;

[0114] The designated business here is the business that performs sensitive operations on network virtual property, and sensitive operations can be consumed through network virtual property. For example, these specified businesses may usually include online payment operations, game currency usage operations, and the like. Users can ensure that the important information contained in these services will not be disclosed by locking the specified services.

[0115] It should be noted that the operating terminal here may be a t...

Embodiment 3

[0168] See image 3 As shown in , it shows the method flowchart of the service unlocking method provided by Embodiment 3 of the present invention. The business unlocking method can be completed by the cooperation of the operation terminal, the lock function server and the verification server. The business unlocking method may include:

[0169] Step 301, the user sends an unlocking request to the operating terminal requesting to unlock a specified service;

[0170] Designated services usually involve network virtual property. For example, these designated services may usually include online payment operations of user accounts, operations of using game currency, and other operations that carry user property information.

[0171] Usually, the user can choose to unlock a locked specified service on the operation terminal, so as to perform related operations through the unlocked specified service.

[0172] The operation terminal here can be a trusted terminal or an ordinary oper...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a service locking method, a service unlocking method, a device and a system, and belongs to the field of network property safety. The service locking method comprises the following steps: receiving a locking request, wherein the locking request comprises the identification information of a specified service and the identity of an operating terminal, and the specified service is a service for performing sensitive operation on network virtual properties; and transmitting a verification request which comprises the identification information of the specified service and the identity of the operating terminal to a verification server, and locking the specified service after verification success information transmitted by the verification server is received. According to the service locking method, the specified service on the operating terminal is locked after successful verification of the operating terminal by the verification server, so that the problem of illegal operation of the network virtual properties of a legal user in a service operating method in the prior art is solved, any operating terminal cannot directly operate a locked specified service, and the situation of illegal operation of the specified service by an illegal user is avoided.

Description

technical field [0001] The invention relates to the field of network property security, in particular to a service locking method, a service unlocking method, a device and a system. Background technique [0002] With the continuous development of network technology, the network provides users with more and more services, such as virtual network payment, web browsing or online game currency payment. Usually, the user first authenticates the service to obtain an account and password corresponding to the service, and then the user can log in or manage his own service through the account and password. [0003] At present, there is a service operation method, which includes: first, the user enters the account number and password corresponding to a certain service into the operation terminal, and logs in the service when the account number and password are correct; then the user can log in to the service when the service is logged in Perform corresponding operations on the busine...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3213H04L9/3271H04L63/08H04W12/069H04W12/084H04W12/126G06F21/30G06F21/305G06F21/31G06F21/35H04L9/32H04L9/3226H04L63/0823H04L63/10H04L63/102
Inventor 秦铭雪贺啸秦雷王玉叶
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products