Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method, device and server for detecting abnormal accounts

A technology for detecting abnormalities and accounts, applied in the field of network communication, can solve the problems of limited detection range, difficulty in ensuring accuracy, and low coverage, and achieve the effect of improving accuracy and coverage

Active Publication Date: 2020-06-26
TENCENT TECH (SHENZHEN) CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] At present, the commonly used methods for detecting abnormal accounts are generally aimed at specific business systems, such as detection methods for front-end virus Trojan horses or detection methods for phishing URLs. The detection range is limited and the coverage rate is low, while other detection methods are difficult to achieve make sure

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method, device and server for detecting abnormal accounts
  • A method, device and server for detecting abnormal accounts
  • A method, device and server for detecting abnormal accounts

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] In order to make the object, technical solution and advantages of the present invention clearer, the implementation manner of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0038] At present, incidents of user account theft occur from time to time. In the process of stealing user accounts, illegal user account stealers first obtain a large number of user accounts through various channels (such as Trojan horses, viruses, phishing URLs, credentialing, etc.) / password, and then select the user account with the correct password through the program or system that automatically batch verifies whether the user account / password is correct, so as to achieve the purpose of stealing the user account, and the stolen user account becomes an abnormal account. Among them, the process of selecting user accounts with correct passwords through a program or system that automatically batch-verifies whether the user accounts / p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a device for detecting an abnormal account, and a server, wherein the method for detecting an abnormal account comprises the following steps: acquiring basic datainformation of each user account, wherein the basic data information comprises an IP address logged in by each user account; generating an IP feature vector of the IP address according to the basic data information of all user accounts which have logged in the same IP address, wherein the IP feature vector comprises IP feature values of multiple dimensions; determining the abnormal IP address based on the IP feature vector and a preset discriminating rule; and determining an abnormal account from the user accounts that have logged in the abnormal IP address. The method and the device for detecting an abnormal account, and the server in the invention improve the accuracy and coverage of detecting abnormal accounts.

Description

technical field [0001] The invention relates to the technical field of network communication, in particular to a method, device and server for detecting abnormal accounts. Background technique [0002] Users often need to enter account numbers / passwords to log in and access Internet services, such as logging in to instant messaging applications, logging in to mailboxes, etc., and currently user accounts / passwords are stolen from time to time. Illegal account stealers usually steal user account / passwords through viruses, phishing URLs, credential library (that is, users use the same account / password on different websites, and steal account / password by attacking a website with weak defenses) or social engineering. , and use various methods to obtain benefits through stolen accounts, such as looting virtual property in the account (such as game equipment, gold coins, etc.), using the relationship chain of the stolen account to send spam for marketing and dissemination, and cond...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/1425
Inventor 申瑞珉
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products