Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for determining that social media account is stolen

A technology for social media and determination methods, applied in the field of Internet information security, can solve the problems of high false positive rate, very high timeliness requirements, affecting the experience of social media accounts, etc., to improve the level of security assurance, improve friendly perception and use Experience and ensure the effect of account security

Active Publication Date: 2019-10-18
MICRO DREAM TECHTRONIC NETWORK TECH CHINACO
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Based on this prior art, for the social media accounts of news media and large enterprises, there are usually many people who frequently log in and use the website accounts on different devices (for example, reporters use the computer of the sponsor to attend a conference). Frequent verification of new device information by the system will result in a very high rate of false positives, and this type of account has very high timeliness requirements for information release and account use, which in turn affects the normal experience of using social media accounts

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for determining that social media account is stolen
  • Method and device for determining that social media account is stolen
  • Method and device for determining that social media account is stolen

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0024] Some abbreviations and key terms involved in the technical solution of the present invention are defined as follows:

[0025] Website account: Commonly known as the network ID card, it is a representative of the digital age. It is an Internet identity authentication protocol, which has uniqueness and information non-repudiation, and is a user identity record stored on the network. A website account is a representative of the digital age, t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a method and device for determining that a social media account is stolen, and the method comprises the steps: receiving an access request of the social mediaaccount; when it is judged that the verification account password or cookie information of the social media account is correct, verifying the social media account; obtaining comparison result information of the equipment information carried by each access request of the account in a set time and the equipment information of the account remained in the server in a set historical time, and obtaininginteraction information of the account in the set time; and determining whether the account is stolen or not according to the comparison result information and the interaction information. Accordingto the technical scheme, different judgment logics and corresponding processing methods are carried out on the condition that the account is possibly stolen based on the interaction behavior information between the accounts and the equipment information used by the accounts, so that the access experience of a website and the demand of discovering and processing the stolen account in time are considered to a certain extent.

Description

technical field [0001] The invention relates to the field of Internet information security, in particular to a method and device for determining the theft of a social media account. Background technique [0002] The system of the account server system in the prior art records the login information of each account for a long time, and forms the frequently used location information of the account according to the number of login times, for example, an account is often logged in in Beijing. One day, this account suddenly logged in in Hong Kong. Then the system may think that the user has a stolen account, and the account server will reject the identity authentication request of the account, thereby preventing the website account from being stolen. [0003] For this existing technology, on the one hand, as the country develops the communication network market, many third-party broadband or mobile service providers do not strictly assign specific IPs according to the city, and u...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/083H04L63/0876H04L63/102H04L63/1425
Inventor 崔培豪赵遐
Owner MICRO DREAM TECHTRONIC NETWORK TECH CHINACO