User account protection method and user account protection device
A technology for user accounts and users, applied in the field of computer communication, can solve the problems of inability to change passwords, cumbersome operations to change passwords, leakage, etc., and achieve the effect of improving protection efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example
[0020] First embodiment
[0021] See figure 1 , Which shows an application environment diagram of the method for protecting a user account provided by the first embodiment of the present invention. Such as figure 1 As shown, the server 11 and the user terminal 12 are located in a wireless or wired network, and the server 11 and the user terminal 12 communicate with each other through the wireless or wired network.
[0022] The user terminal 12 may include a smart phone, a tablet computer, an e-book reader, an MP3 player (Moving Picture Experts Group Audio Layer III, moving picture experts compressed standard audio layer 3), MP4 (Moving Picture Experts Group Audio Layer IV, moving picture Experts compress standard audio level 4) Players, laptops and desktop computers, etc.
[0023] See figure 2 , Which shows a flowchart of a method for protecting a user account provided by the first embodiment of the present invention. Combine figure 1 , The user account protection method provided ...
Example
[0031] Second embodiment
[0032] See image 3 , Which shows an application environment diagram of the method for protecting a user account provided by the second embodiment of the present invention. Such as image 3 As shown, the server 31, the user terminal 32, the access server 33, and the service server 34 are located in a wireless or wired network. Through the wireless or wired network, the server 31, the user terminal 32, the access server 33, and the service server 34 Communicate with each other.
[0033] It is understandable that the above-mentioned server 31, access server 33, and service server 34 may be a single server, or may be a server cluster composed of multiple servers.
[0034] See Figure 4 , Shown as a flowchart of a method for protecting a user account provided by the second embodiment of the present invention. Combine image 3 , The user account protection method provided in this embodiment includes the following steps:
[0035] Step 41: The server periodically...
Example
[0046] The third embodiment
[0047] See Figure 5 , Which is shown as a flowchart of a method for protecting a user account provided by the third embodiment of the present invention. This embodiment can also be applied to figure 2 In the application environment shown, combined figure 2 ,Such as Figure 5 As shown, the user account protection method provided in this embodiment includes the following steps:
[0048] Step 51: The server periodically checks the information associated with the user account.
[0049] The information associated with the user account includes the security information of the user account and the corresponding password, that is, the leakage information of the user account and the corresponding password. Specifically, the server 31 regularly detects whether the user account database has been hacked and whether the data information in the user account database has been stolen by others to detect whether the user account and the corresponding password have be...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap