A method, device and system for detecting number theft
The technology of a detection method and a detection device, which is applied in the field of communication, can solve the problems of affecting the security of user information and the poor effect of hacking detection, so as to improve the detection effect, prevent illegal hackers from bypassing detection, and improve security.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0028] This embodiment will be described from the perspective of the number theft detection device. The number theft detection device can be implemented as an independent entity, or integrated in other network devices such as a server.
[0029] A method for detecting account theft, comprising: monitoring an account to determine the client version used when the account is logged in, and judging whether the account is a malicious jump when it is determined that the client version exists in a preset malicious version library If the number is a malicious jump, then determine that the account is a stolen number, and add the account to the black sample monitoring library; if it is a non-malicious jump number, return to the step of monitoring the account.
[0030] Such as figure 1 As shown, the specific flow of the number theft detection method can be as follows:
[0031] 101. Monitor the account to determine the client version used when the account is logged in.
[0032] Wherein, ...
Embodiment 2
[0058] According to the method described in Embodiment 1, an example will be given below for further detailed description.
[0059] In this embodiment, it will be described in detail by taking that the device for detecting number theft can be integrated in a server as an example.
[0060] see Figure 2a , the number theft detection system may include a server integrated with a number theft detection device, wherein, such as Figure 2b As shown, the stolen number detection device can include a malicious version discovery module and a stolen number detection module, in addition, it can also include a stolen number monitoring module, and the specific functions of each part can be as follows:
[0061] (1) Malicious version discovery module;
[0062] The malicious version discovery module is used to establish a malicious version library. For example, it can be established in any of the following ways, as follows:
[0063] The first way: Obtain the report information and / or compl...
Embodiment 3
[0090] In order to better implement the above method, the embodiment of the present invention also provides a hacking number detection device, such as Figure 3a As shown, the number theft detection device may include a monitoring unit 301, a judging unit 302 and an adding unit 303, as follows:
[0091] The monitoring unit 301 is configured to monitor the account, so as to determine the client version used when the account is logged in.
[0092]Wherein, the account may be a user name, a mobile phone number, an email account, and various instant messaging numbers for logging into the client terminal. The client may be a client of various terminal applications or services, which is not limited here.
[0093] The judging unit 302 is used to determine whether the client version exists in the preset malicious version library, and judge whether the account number is a malicious jumping number, and if it is a non-malicious jumping number, then trigger the monitoring unit 301 to exec...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


