Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for protecting account security

An account security and unique technology, applied in security devices, transmission systems, electrical components, etc., can solve the problems of low user protection, troublesome process, troubles, etc.

Inactive Publication Date: 2019-12-31
王恩惠
View PDF7 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] At present, there are more and more harassing and fraudulent calls. People who make harassing and fraudulent calls often log off their mobile numbers when their numbers are marked as harassing or fraudulent. It will cause unnecessary troubles, call friends, and friends will often refuse to answer when they see the calls marked as harassment or fraud
When the user wants the mobile phone number not to be flagged for harassment and fraudulent calls, he needs to submit a lot of personal information, letters of guarantee and other documents to the corresponding platform, and wait for the approval to realize that the mobile phone number will not be flagged for harassment and fraudulent calls. The process is very troublesome and complicated
[0006] At present, fraudulent calls and text messages usually use unrealized mobile phone numbers to contact users. Users with low protection are easily deceived and cause property losses.
Harassing calls usually use unrealized mobile phone numbers to contact users, causing trouble to users
[0007] At present, when a user contacts a friend in the address book, especially a friend who is infrequently in contact with, the friend may not know when the mobile phone number has changed, and it will be embarrassing to call the past call and be answered by the user who has newly registered with the mobile phone number

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for protecting account security
  • Method and system for protecting account security
  • Method and system for protecting account security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0104] In order to make the purpose, technical solution and advantages of the present invention clearer, the technical solution of the present invention will be described in detail below. Apparently, the described embodiments are only some of the embodiments of the present invention, rather than all of them. Based on the embodiments of the present invention, those of ordinary skill in the art can obtain all other Embodiments all belong to the protection scope of the present invention.

[0105] Such as figure 1 As shown, a method for protecting account security provided by the first embodiment of the present invention, when the method is used for registration, login or password retrieval, the method includes:

[0106] Step S1, the user uses the mobile phone number to register, log in or retrieve the password on the third-party platform;

[0107] Step S2, the third-party platform obtains the unique identifier corresponding to the mobile phone number from a specific platform; ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for protecting account security, and when the method is used for a third-party platform to send a push notification to a mobile phone number of a user, the method comprises the following steps: the step S11, the third-party platform acquires a unique identifier corresponding to the mobile phone number from a specific platform; S12, the third-party platform judges whether the obtained unique identifier is consistent with a stored unique identifier corresponding to the mobile phone number or not; and S13, if the acquired unique identifier is consistent with the stored unique identifier corresponding to the mobile phone number, the push notification is sent to the mobile phone number, and if the acquired unique identifier is not consistent with the stored unique identifier corresponding to the mobile phone number, the push notification is not sent to the mobile phone number. According to the embodiment of the invention, the third-party platform sends the push notification to the user, and the push notification is sent after inspection, thereby effectively protecting the user information and property safety.

Description

technical field [0001] The present invention relates to the technical field of account security, in particular to a method and system for protecting account security. Background technique [0002] At present, the use of mobile phone numbers as account numbers is becoming more and more common. Most websites or applications can use mobile phone numbers + verification codes to register, log in, or retrieve passwords. Although this is convenient for users to register, log in, or retrieve passwords, it has caused The hidden danger is very big, especially when the user no longer uses the original mobile phone number, once the mobile phone number is registered by other people, and the mobile phone number + verification code is used to log in to the original website or application, or the password is retrieved, it will make the The original user data is seen by it, causing user privacy to be leaked, and even used by it. In addition, users who newly register with this mobile phone n...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/04H04W12/06H04W12/12H04L29/06
CPCH04W12/06H04W12/12H04L63/0815H04L63/083H04L63/1466H04W12/0433H04W12/041
Inventor 王恩惠
Owner 王恩惠
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products