Information processing method and terminal thereof

An information processing method and terminal technology, applied in the field of information processing, can solve problems such as user security risks, password leakage, privacy leakage, etc.

Active Publication Date: 2016-03-23
TENCENT TECH (SHENZHEN) CO LTD
View PDF11 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there are obvious security problems in the current way of sharing accounts. Specifically, because under various applications, account login requires the user to enter the account number and password. At this time, account sharing will inevitably lead to password disclosure. Users bring security risks, and even lead to account theft and privacy leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information processing method and terminal thereof
  • Information processing method and terminal thereof
  • Information processing method and terminal thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0102] figure 1 It is a schematic diagram of the implementation flow of the information processing method of the embodiment of the present invention Figure 1 ; The method is applied to the first terminal, such as figure 1 As shown, the method includes:

[0103] Step 101: When the first terminal runs the first application, obtain the login request information sent by the second terminal; the login request information is used to request to log in the second application with the first account information in the second terminal; The account information is used to represent the account information bound to the first application;

[0104] In this embodiment, the first application may specifically be a software application that can provide security protection for account information; in a specific embodiment, the first account information is a user logging into a second application, such as a user logging into a social software name and password; the user can successfully log in ...

Embodiment 2

[0115] Based on the information processing method described in Method Embodiment 1, in this embodiment, the first application is provided with a verification list, and the verification list stores identification information corresponding to terminals that have undergone identity verification and passed the verification; Specifically, when the first terminal performs identity verification and passes the verification, the verification list stores the identification information corresponding to the first terminal. In this way, when the first terminal uses the first account information again When logging in to the second application, you can successfully log in to the second application without identity verification; that is, as long as the first account information can successfully log in to the second application in any other terminal, the The first application can obtain the terminal device information of the terminal that successfully logs in to the second application using the...

Embodiment 3

[0144] Figure 7 It is a schematic diagram of the implementation flow of the information processing method of the embodiment of the present invention Figure II The method is applied to the first terminal; in this embodiment, the account protection mode described in the first method embodiment includes: account lock mode and account unlock mode; Figure 7 As shown, the method includes:

[0145] Step 701: When the first terminal runs the first application, obtain the login request information sent by the second terminal; the login request information is used to request to log in the second application with the first account information in the second terminal; The account information is used to represent the account information bound to the first application;

[0146] Step 702: Detect the account protection mode corresponding to the first account information;

[0147] Step 703: When it is detected that the first account information corresponds to the account lock mode, genera...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses an information processing method and a terminal thereof. The method comprises: when a first terminal running a first application, obtaining the registration request information sent by a second terminal, wherein the registration request information is used for requesting registering a second application with first account number information in the second terminal, and the first account number information is used for representing the account number information bonded to the first application; detecting an account number protection mode corresponding to the first account number information; according to the account number protection mode, generating an account number protection strategy corresponding to the account number protection mode; and processing the registration request information based on the account number protection strategy, so as to determine whether allowing the second terminal to register the second application with the first account number information.

Description

technical field [0001] The present invention relates to information processing technology, in particular to an information processing method and a terminal thereof. Background technique [0002] With the enrichment and improvement of Internet products and Internet platforms, social accounts, as identity marks on the Internet, are increasingly being shared, that is, account sharing. The so-called public account means that the account owner shares the right to use the account with others during certain periods of time. This requirement is relatively common among game players. For example, game players borrow game accounts of different levels or different roles to enrich the game experience and speed up the upgrade. At the same time, the phenomenon of public accounts often occurs in member sharing, such as network disk resource sharing. However, there are obvious security problems in the current way of sharing accounts. Specifically, because under various applications, accoun...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0815
Inventor 彭丹丹
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products