User account protection method and user account protection device

A technology for user accounts and users, applied in the field of computer communication, can solve the problems of inability to change passwords, cumbersome operations to change passwords, leakage, etc., and achieve the effect of improving protection efficiency

Active Publication Date: 2015-02-11
SHENZHEN TENCENT COMP SYST CO LTD
View PDF8 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there are many specific situations where the user account is abnormal. Not every situation requires the user to change the password. For example, the user account is maliciously attempted by a bad person using an automatic machine. It has not been really leaked, but there is only a possibility of leaking. At this time, it is not meaningful to force the user to change the password, and because the operation of changing the

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User account protection method and user account protection device
  • User account protection method and user account protection device
  • User account protection method and user account protection device

Examples

Experimental program
Comparison scheme
Effect test

Example

[0020] First embodiment

[0021] See figure 1 , Which shows an application environment diagram of the method for protecting a user account provided by the first embodiment of the present invention. Such as figure 1 As shown, the server 11 and the user terminal 12 are located in a wireless or wired network, and the server 11 and the user terminal 12 communicate with each other through the wireless or wired network.

[0022] The user terminal 12 may include a smart phone, a tablet computer, an e-book reader, an MP3 player (Moving Picture Experts Group Audio Layer III, moving picture experts compressed standard audio layer 3), MP4 (Moving Picture Experts Group Audio Layer IV, moving picture Experts compress standard audio level 4) Players, laptops and desktop computers, etc.

[0023] See figure 2 , Which shows a flowchart of a method for protecting a user account provided by the first embodiment of the present invention. Combine figure 1 , The user account protection method provided ...

Example

[0031] Second embodiment

[0032] See image 3 , Which shows an application environment diagram of the method for protecting a user account provided by the second embodiment of the present invention. Such as image 3 As shown, the server 31, the user terminal 32, the access server 33, and the service server 34 are located in a wireless or wired network. Through the wireless or wired network, the server 31, the user terminal 32, the access server 33, and the service server 34 Communicate with each other.

[0033] It is understandable that the above-mentioned server 31, access server 33, and service server 34 may be a single server, or may be a server cluster composed of multiple servers.

[0034] See Figure 4 , Shown as a flowchart of a method for protecting a user account provided by the second embodiment of the present invention. Combine image 3 , The user account protection method provided in this embodiment includes the following steps:

[0035] Step 41: The server periodically...

Example

[0046] The third embodiment

[0047] See Figure 5 , Which is shown as a flowchart of a method for protecting a user account provided by the third embodiment of the present invention. This embodiment can also be applied to figure 2 In the application environment shown, combined figure 2 ,Such as Figure 5 As shown, the user account protection method provided in this embodiment includes the following steps:

[0048] Step 51: The server periodically checks the information associated with the user account.

[0049] The information associated with the user account includes the security information of the user account and the corresponding password, that is, the leakage information of the user account and the corresponding password. Specifically, the server 31 regularly detects whether the user account database has been hacked and whether the data information in the user account database has been stolen by others to detect whether the user account and the corresponding password have be...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a user account protection method which comprises the following steps: detecting information related to a user account regularly by use of a server; and when detecting that the information related to the user account is preset abnormal information, performing protective treatment on the user account according to the preset protection grade corresponding too the preset abnormal information. Furthermore, the invention also provides a user account protection device. The user account protection method and the user account protection device can be used for improving the user account protection efficiency.

Description

technical field [0001] The invention relates to the technical field of computer communication, in particular to a method and device for protecting a user account. Background technique [0002] When the user account is abnormal, for example: the user account and the corresponding password are leaked, the user account is maliciously attempted by a bad person using an automatic machine, etc., the existing user account protection technology generally adopts the method of forcibly guiding the user to change the password to protect the user account. for protection. However, there are many specific situations where the user account is abnormal. Not every situation requires the user to change the password. For example, the user account is maliciously attempted by a bad person using an automatic machine. It has not been really leaked, but there is only a possibility of leaking. At this time, it is not meaningful to force the user to change the password, and because the operation of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/0815H04L63/083H04L63/0846H04L63/14
Inventor 张杰许灿冲孙淑芹
Owner SHENZHEN TENCENT COMP SYST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products