Anti-theft method and system for mobile phone game account, and server

An anti-theft method and mobile game technology, applied in the field of mobile games, can solve problems such as easy theft of game accounts, long dynamic verification time, etc., and achieve the effect of improving anti-theft and safety, and improving security

Pending Publication Date: 2020-07-03
BEIJING ELEX TECH
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the object of the present invention is to provide an anti-theft method, system and server for mobile phone game accounts, to solve the problems that the game accounts are easy to be

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-theft method and system for mobile phone game account, and server
  • Anti-theft method and system for mobile phone game account, and server
  • Anti-theft method and system for mobile phone game account, and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0042] S1. Log in the game from a mobile terminal (mobile phone), and the login interface is as follows: image 3 As shown, the verification address when the server obtains an account based on wireless communication to log in to the game is a, and the previous login address of the same account stored in the server is also a; the addresses of the two games are the same;

[0043] S2. The verification identification b is input by the mobile terminal, and the server obtains the verification identification b when the account logs in to the game, and the identification b set by the same account in the previous game is stored in the server; the identifications of the two games are the same;

[0044] S3. Log in to the game, and record the login address as a'.

[0045] In addition, about exiting the game after the end of the game: when exiting the game, set the corresponding logo to be used as the login verification for the next game.

[0046] As mentioned above, based on the settings...

Embodiment 2

[0050] S1. The mobile terminal performs game login. The verification address when the server obtains an account based on wireless communication to log in to the game is a, and the previous login address of the same account stored in the server is also a1; the login addresses of the two games are different;

[0051] S2. Send a verification message c to the mobile phone number bound to the account, the mobile terminal inputs the verification message c, and the server determines that the input verification message is correct; specifically, the verification message here may preferably be a verification code;

[0052] S3. The verification identification b is input by the mobile terminal, and the server obtains the verification identification b when the account logs in to the game, and the identification b set by the same account in the previous game is stored in the server; the identifications of the two games are the same;

[0053] S4. Log in to the game, and record the login addre...

Embodiment 3

[0055] S1. The mobile terminal performs game login. The verification address when the server obtains an account based on wireless communication to log in to the game is a, and the previous login address of the same account stored in the server is also a1; the login addresses of the two games are different;

[0056]S2. Send a verification message f to the mobile phone number bound to the account, the mobile terminal inputs the verification message f1, and the server determines that the input verification message is incorrect;

[0057] S3. The login is abnormal, the current account is locked, and the current account is marked as stolen and to be unlocked.

[0058] In this embodiment, when the game account is locked, the operation of unlocking through real-name authentication is also included:

[0059] S4. The mobile terminal sends an unlock request to the server, and attaches the ID number for real-name authentication; for example, "iiiiii+unlock+ID number", where "iiiiii" refer...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of mobile games, and discloses an anti-theft method and system for a mobile phone game account, and a server, wherein the method comprises the steps: S1, obtaining a verification address when the account logs in a game, and comparing whether the verification address is the same as a login address when a previous game is carried out or not; if the verification address is the same as the login address, executing the step S2; if the verification address is different from the login address, executing the step S3; S2, obtaining a verification identifierwhen the account logs in the game, and comparing whether the verification identifier is the same as the verification identifier set in the previous game; if the verification identifier is the same asthe verification identifier set in the previous game, executing the step S4; if the verification identifier is different from the verification identifier set in the previous game, executing the step S3; S3, sending a verification message to the mobile phone number bound with the account, and judging whether the verification message is correct or not; if the verification message is correct, executing the step S4; if the verification message is wrong, executing the step S5; S4, logging in the game, and storing a login address; and S5, if the login is abnormal, locking the current account, and marking the current account as a stolen state and a to-be-unlocked state. In conclusion, multiple anti-theft protection can be effectively carried out on the game account.

Description

technical field [0001] The invention belongs to the technical field of mobile games, and in particular relates to an anti-theft method, system and server for mobile game accounts. Background technique [0002] The login methods of existing mobile games are mostly game account + account password, and most of the account passwords are static passwords, which have low security performance, making the game account vulnerable to the risk of being stolen; [0003] In view of the above problems, a dynamic verification login method has been proposed in the prior art to improve the security of the game account; however, most of the existing dynamic verification methods are: based on the request of the mobile terminal, the game server randomly generates a verification code, and The verification code is sent to the mobile terminal, and then the verification code is fed back to the game server through the mobile terminal, thus achieving the dynamic verification effect; and in the proces...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): A63F13/71
CPCA63F13/71A63F2300/532
Inventor 汪汇川高运
Owner BEIJING ELEX TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products