Method and system for protecting account security

An account security, unsaved technology, applied to key distribution, can solve complex, troublesome, troublesome process and other problems, achieve the effect of eliminating flagged harassment, protecting account security issues, and facilitating flagged harassment

Inactive Publication Date: 2020-03-13
王恩惠
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] At present, there are more and more harassing and fraudulent calls. People who make harassing and fraudulent calls often log off their mobile numbers when their numbers are marked as harassing or fraudulent. It will cause unnecessary troubles, call friends, and friends will often refuse to answer when they see the calls marked as harassment or fraud
When the user wants the mobile phone number not to be flagged for harassment and fraudulent calls, he needs to submit a lot of personal information, letters of guarantee and other documents to the corresponding platform, and wait for the approval to realize that the mobile phone number will not be flagged for harassment and fraudulent calls. The process is very troublesome and complicated

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for protecting account security
  • Method and system for protecting account security
  • Method and system for protecting account security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] In order to make the purpose, technical solution and advantages of the present invention clearer, the technical solution of the present invention will be described in detail below. Apparently, the described embodiments are only some of the embodiments of the present invention, rather than all of them. Based on the embodiments of the present invention, those of ordinary skill in the art can obtain all other Embodiments all belong to the protection scope of the present invention.

[0057] like figure 1 As shown, a method for protecting account security provided by the first embodiment of the present invention, when the method is used for registration, login or password retrieval, the method includes:

[0058] Step S1, the user uses the mobile phone number to register, log in or retrieve the password on the third-party platform;

[0059] Step S2, the third-party platform registers as a new user if the mobile phone number is not saved, and obtains the network access time ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for protecting account security. The method comprises the following steps: S1, a user registers, logs in or retrieves a password by using a mobile phone number on a third-party platform; S2, the third-party platform registers with a new user identity if the mobile phone number is not stored, and acquires network access time corresponding to the mobile phone number from a specific platform if the mobile phone number is stored; S3, the third-party platform compares the network access time with binding time corresponding to the stored mobile phone number, and the step S4 or the step S5 is executed; S4, if the network access time is earlier than the binding time, the identity of the original user is logged in or the user is allowed to retrieve the password; andS5, if the network access time is later than the binding time, a new user identity is registered and the mobile phone number and the new binding time are created and stored, or not the mobile phone number is not allowed to log in or retrieve the password. Through the method, the security problem of the user account is greatly and effectively protected.

Description

technical field [0001] The present invention relates to the technical field of account security, in particular to a method and system for protecting account security. Background technique [0002] At present, the use of mobile phone numbers as account numbers is becoming more and more common. Most websites or applications can use mobile phone numbers + verification codes to register, log in, or retrieve passwords. Although this is convenient for users to register, log in, or retrieve passwords, it has caused The hidden danger is very big, especially when the user no longer uses the original mobile phone number, once the mobile phone number is registered by other people, and the mobile phone number + verification code is used to log in to the original website or application, or the password is retrieved, it will make the The original user data is seen by it, causing user privacy to be leaked, and even used by it. In addition, users who newly register with this mobile phone n...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06H04L29/08H04W4/12H04W12/12H04W12/122
CPCH04L9/0894H04L9/083H04L63/0815H04L63/083H04L63/0876H04W4/12H04W12/122H04L67/55
Inventor 王恩惠
Owner 王恩惠
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products