Internet account safety policy and system

A security strategy and Internet technology, applied in the security strategy and system field of Internet accounts, can solve problems such as judgment errors, login account determination as abnormal, etc.

Active Publication Date: 2015-04-15
SHENZHEN TENCENT COMP SYST CO LTD
View PDF4 Cites 28 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, when using the existing technology to determine whether the account is abnormal, because the commonly used place only records the most commonly used place of the account, it is also determined to be abnormal when logging in to the account for a normal replacement location, resulting in a judgment error

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet account safety policy and system
  • Internet account safety policy and system
  • Internet account safety policy and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0022] An embodiment of the present invention provides a security policy for an Internet account, and the subject of execution of the method may be a server, such as figure 1 As shown, the method includes:

[0023] Step 101, counting the historical use records of different accounts logged in to different services, and obtaining the business graph and high-risk business of each account, the business graph includes the different services logged in by the account, and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention relates to the technical field of information security. Disclosed are a security policy and system for an Internet account, which can improve accuracy of determining account exception. In an embodiment of the present invention, statistics on historical use records indicating that different accounts log in to different services are collected; a service map of each account and at least one high-risk service are determined, the service map comprising the different services that are logged in to by the accounts and use frequencies of the different services; a service that is logged in to by a current account is acquired; and it is determined, according to the service that is logged in to by the current account, the service map of the current account, and the high-risk service, whether the current login of the current account is exceptional or unexceptional. The embodiment of the present invention is used for determining whether an account is exceptional.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to a security strategy and system for Internet accounts. Background technique [0002] Usually, an Internet company operates multiple services or applications, so a user can log in to multiple services or applications with one account. With the development of information technology, many malicious users usually use stolen accounts to perform malicious acts, causing losses to account users. In the prior art, it is determined whether the account is abnormal according to the login location of the account, that is, when the province or city where an account is currently logged in is different from its usual place, it is considered that the account has an abnormality in this login. The most frequent province or city. [0003] However, when using the existing technology to determine whether the account is abnormal, because the commonly used place only records the mo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L63/08
Inventor 刘金星颜国平谢远辉祝建建
Owner SHENZHEN TENCENT COMP SYST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products