Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for detecting authenticity and validity of account

An authentic and effective technology, applied in the Internet field, can solve the problems that the main body of the enterprise cannot judge whether the fake account holder is the same person, and the interests of the business are damaged, so as to achieve risk control, reduce pressure, and ensure security and stability. Effect

Inactive Publication Date: 2018-07-10
娄奥林
View PDF6 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

) Malicious registration of taxi-hailing software, no payment after each taxi-hailing, and no longer using the account after taxi-hailing, resulting in damage to the interests of the merchant
[0006] At present, some taxi-hailing software has discovered this problem, but there is no good solution. Currently, the taxi-hailing software on the market uses a language verification code (directly call the user’s mobile phone through a voice call to realize the voice broadcast of the phone) verification, but criminals can still transfer calls and obtain voice verification codes. These behaviors are actually illegal, but business entities cannot determine whether the holders of these fake accounts are the same person

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for detecting authenticity and validity of account
  • Method for detecting authenticity and validity of account
  • Method for detecting authenticity and validity of account

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals denote the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention.

[0041] Below, the technical solution of the present invention and its specific application scenarios will be further described in detail in combination with specific embodiments:

[0042] In reality, some lawbreakers take advantage of loopholes in software and programs to exchange for preferential promotions in various channels such as travel platforms, online lending platforms, electronic malls, online banking, and credit cards at low or even zero cost. The promotional dividends generated, this behavior is vividly called "sweeping wool", a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for detecting the authenticity and validity of an account, which comprises the steps of firstly judging whether the operating mode of a user is an e-mail box or a mobile phone number; if the operating mode is an e-mail box, judging whether the e-mail box is in a common e-mail box service provider list or not, and if so, detecting whether the e-mail box is registered or not; if the e-mail box is not registered, detecting whether there is a mail exchange record or not in DNS resolution records of the current e-mail box domain name, and detecting whether domain name registration time in whois information of the current e-mail box domain name exceeds a set threshold or not; if the operating mode is a mobile phone number, comparing whether the mobile phone number has ever appeared in a code connecting platform or not; and finally calculating the credibility of the account operated by the user, and thus judging the authenticity and validity of the account operated by the user. Risk control can be effectively realized according to the invention, thereby preventing lawbreakers from maliciously registering and counterfeiting a real-name system by using network vulnerabilities.

Description

technical field [0001] The invention discloses a method for detecting the authenticity and validity of an account number, and relates to the technical field of the Internet. Background technique [0002] Today, with the rapid development of Internet technology, various Internet applications are increasingly appearing in people's daily life. As a common business method, when a new user registers an account, the merchant usually adopts a promotional method of giving the user a certain cash coupon, and then rewarding the inviter who invites the user to register with a certain amount or a cash coupon. The actual purpose of merchants adopting this promotion method is to increase the number of users, develop user habits, and increase profits for subsequent companies. [0003] In the actual operation process, some personnel took advantage of the loopholes in Internet software to make the registered user and the inviter the same person, which made these users in fact belong to virt...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1441H04L63/20
Inventor 娄奥林
Owner 娄奥林
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products