Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for preventing malicious sharing of user identity and device thereof

A technology of user identity and user identity information, applied in the field of content access control, can solve the problems of easy theft of user identity, loss of content providing websites, malicious sharing, etc., to achieve the effect of simple investigation, high accuracy, and prevention of malicious sharing

Inactive Publication Date: 2016-08-31
LETV INFORMATION TECH BEIJING
View PDF7 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, when the user logs in to the content-providing website through the purchased account number and other identity information, the user’s identity is easily stolen and then shared maliciously, thus causing losses to the content-providing website

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for preventing malicious sharing of user identity and device thereof
  • Method for preventing malicious sharing of user identity and device thereof
  • Method for preventing malicious sharing of user identity and device thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] This application records the identity information and address information of users who access content through the client, and obtains the number of times the same user uses different addresses to access the same content within the first time period according to the user identity information and address information. If the number of times the same user accesses the same content using different addresses exceeds a first threshold, it is determined that the user identity has been maliciously shared. This application can easily realize the investigation of user identity information, prevent user identity from being maliciously shared, and has convenient operation and high accuracy.

[0037] Of course, implementing any technical solution of the present application does not necessarily need to achieve all the above advantages at the same time.

[0038] In order to enable those skilled in the art to better understand the technical solutions in the present application, the tech...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The application provides a method for preventing malicious sharing of user identity and a device thereof. The method comprises the steps that user identity information and address information performing content accessing through a client side are recorded; the number of times of the same user accessing the same content by adopting different addresses is acquired within a first time period according to the user identity information and the address information; and if the number of times of the same user accessing the same content by adopting different addresses exceeds a first threshold, malicious sharing of the user identity is determined. Screening of the user identity information can be simply and conveniently realized so that malicious sharing of the user identity can be prevented, operation is convenient and rapid and accuracy is high.

Description

technical field [0001] The present application relates to the technical field of content access control, in particular to a method and device for preventing user identities from being maliciously shared. Background technique [0002] With the development of Internet technology, it has become an important way of network information provision for users to log in to content providing websites through specific identity information to access content. For example, a user may purchase an account of a video content providing website, and watch the video content provided by it in a paid manner. [0003] However, when the user logs in to the content providing website through the purchased account and other identity information, the user's identity is easily stolen, and then maliciously shared, thereby causing losses to the content providing website. [0004] Therefore, how to easily prevent user identities from being maliciously shared has become a technical problem that needs to be ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24H04L29/06
CPCH04L63/10H04L41/28
Inventor 黄梦雅
Owner LETV INFORMATION TECH BEIJING
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products