Unlock instant, AI-driven research and patent intelligence for your innovation.

Method, device and system for detecting stolen account

An account and user account technology, applied in the fields of information security and the Internet, can solve the problem of the theft of passwords that cannot be judged by bad actors, and achieve the effect of high accuracy and easy protection.

Active Publication Date: 2019-02-22
SHENZHEN TENCENT COMP SYST CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The existing account service provision system can only verify the user's account password to identify the user's identity, and cannot determine whether the account password has been stolen by bad people. Therefore, it is necessary to provide a detection method for a stolen account

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and system for detecting stolen account
  • Method, device and system for detecting stolen account
  • Method, device and system for detecting stolen account

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0020] The method and device for detecting a stolen account provided by the embodiments of the present invention can be applied to a server or to a server such as figure 1 of the multiple servers shown. The one or more servers are directly connected to the application server (including interface server and service server, etc.) providing the application through the communication network, or may be the application server itself.

[0021] The user account in th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method for detecting whether an account is stolen is provided. In the method, a server detects data operated by user terminals through user accounts, determines whether abnormality occurs to user accounts-related data based on preset rule, wherein user accounts-related data are of a plurality of types, each of which corresponds to a type identifier, the server collects at least one user account with data abnormality and at least two type identifiers corresponding to the abnormal data, compute a probability that the at least one user account is stolen based on the collected at least two type identifiers and stolen probabilities corresponding to individual preserved type identifiers, judge whether the probability that the at least one user account is stolen is greater than a preset threshold, determine to be stolen in the case of positive judgment, and store the at least one user account in a stolen account database.

Description

technical field [0001] The present invention relates to the field of Internet technology, in particular to the field of information security, in particular to a method, device and system for detecting stolen account numbers. Background technique [0002] With the rapid development and popularization of Internet technology, the problem of leakage of account information used by users on the Internet is becoming more and more serious. [0003] On the one hand, the password setting of some user accounts is too simple, which is easy to be cracked by bad guys. On the other hand, bad guys will steal user account numbers and passwords through phishing or Trojan horses. The leakage of the database will also make the user's account information fall into the wrong hands. After the bad guys get the user's account information, they can conduct illegal activities such as spying on personal privacy, sending advertising information, pornographic pictures to others, and even illegally embez...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCG06F21/316
Inventor 张杰刘畅刘海生
Owner SHENZHEN TENCENT COMP SYST CO LTD