CN111460403A - Information processing method and system - Google Patents

Information processing method and system Download PDF

Info

Publication number
CN111460403A
CN111460403A CN202010127202.8A CN202010127202A CN111460403A CN 111460403 A CN111460403 A CN 111460403A CN 202010127202 A CN202010127202 A CN 202010127202A CN 111460403 A CN111460403 A CN 111460403A
Authority
CN
China
Prior art keywords
login
information
login account
user
account
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010127202.8A
Other languages
Chinese (zh)
Inventor
姜彦国
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Rajax Network Technology Co Ltd
Original Assignee
Rajax Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Rajax Network Technology Co Ltd filed Critical Rajax Network Technology Co Ltd
Priority to CN202010127202.8A priority Critical patent/CN111460403A/en
Publication of CN111460403A publication Critical patent/CN111460403A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention provides an information processing method and system, a computer readable storage medium and electronic equipment, which can avoid leakage of user related information and avoid causing junk information interference to users. The information processing method comprises the following steps: receiving login information of a user, and acquiring a login account in the login information; determining the login time interval of the current login of the login account from the last login according to the login account; and responding to the fact that the login time interval is higher than a preset threshold value, performing identity authentication, and displaying corresponding information according to an authentication result.

Description

Information processing method and system
Technical Field
The present invention relates to the field of computer technologies, and in particular, to an information processing method and system, a computer-readable storage medium, and an electronic device.
Background
More and more APP (Application) software nowadays supports a user to log in by using a mobile phone number, a server of the APP software identifies the user according to the mobile phone number, and then personal information of the user corresponding to the mobile phone number, APP use record information, order information and the like are displayed in the APP software. However, there is a problem that if the mobile phone number of the user is logged out or is recovered by the operator after a period of time, and then the operator provides the mobile phone number to the new user continuously after a period of time, at this time, the owner of the mobile phone number has changed, and if the new owner of the mobile phone number logs in the APP software using the mobile phone number, the personal information, the historical order information, and the like of the owner before the mobile phone number can be seen. This leads to the following two problems:
(1) the information of the original owner of the mobile phone number is revealed to the new owner of the mobile phone number;
(2) the APP software pushes information which does not belong to a new owner to the new owner of the mobile phone number, and junk information interference is caused.
For example, the user a newly changes a mobile phone number, which may have been registered and used by the user b on the APP software before, and the user a logging in on the APP software by using the mobile phone number may obtain information of the user b, so that information of the user b is leaked, or spam interference is caused to the user a. Therefore, there is a need to solve this technical problem.
Disclosure of Invention
In view of the above problems, the present invention has been made to provide an information processing method and system, a computer-readable storage medium, and an electronic device that overcome or at least partially solve the above problems, and are capable of avoiding leakage of user-related information while also avoiding spam interference to users.
According to an aspect of an embodiment of the present invention, there is provided an information processing method including:
receiving login information of a user, and acquiring a login account in the login information;
determining the login time interval of the current login of the login account from the last login according to the login account;
and responding to the fact that the login time interval is higher than a preset threshold value, performing identity authentication, and displaying corresponding information according to an authentication result.
Optionally, in response to that the login time interval is higher than a preset threshold, performing identity authentication, and displaying corresponding information according to an authentication result, including:
responding to the fact that the login time interval is higher than a preset threshold value, initiating identity authentication of the user, and receiving current identity information submitted by the user;
acquiring the bound historical identity information of the login account;
comparing whether the current identity information is consistent with the historical identity information;
and if the current identity information is consistent with the historical identity information in comparison, displaying user related information corresponding to the login account.
Optionally, if the current identity information is inconsistent with the historical identity information, the method further includes:
generating and outputting judgment information whether the login account is the first login account;
and if an instruction which is input by the user according to the judgment information and indicates that the login account is the first login account is received, deleting the user related information corresponding to the login account, and binding the login account with the current identity information.
Optionally, the method further comprises:
if an instruction which indicates that the login account is not the first login account and is input by the user according to the judgment information is received, initiating address verification on the user;
receiving address information input by the user;
acquiring address information bound by the login account;
comparing whether the address information input by the user is consistent with the address information bound by the login account;
and if the address information input by the user is consistent with the address information bound by the login account, displaying the user related information corresponding to the login account.
Optionally, the method further comprises:
and responding to the fact that the login time interval is lower than the preset threshold value, and displaying user related information corresponding to the login account.
Optionally, determining, according to the login account, a login time interval between the current login and the last login of the login account includes:
judging whether the login time of the last login of the login account is inquired or not according to the login account;
and if the login time of the last login of the login account is inquired, calculating the login time interval between the current login of the login account and the last login.
Optionally, determining whether to query the last login time of the login account according to the login account includes:
judging whether the historical login time of the login account is inquired or not according to the login account;
if the historical login time of the login account is inquired, acquiring the login time of the login account, which is the latest login time from the current login, from the historical login time of the login account as the login time of the last login of the login account.
Optionally, the method further comprises:
if the login time of the last login of the login account is not inquired, initiating identity authentication of the user;
receiving current identity information submitted by the user;
and binding the login account with the current identity information.
According to another aspect of the embodiments of the present invention, there is provided an information processing system including:
the device comprises an acquisition unit, a processing unit and a processing unit, wherein the acquisition unit is suitable for receiving login information of a user and acquiring a login account in the login information;
the determining unit is suitable for determining the login time interval of the current login distance from the last login of the login account according to the login account;
and the processing unit is suitable for responding to the fact that the login time interval is higher than a preset threshold value, carrying out identity authentication and displaying corresponding information according to an authentication result.
Optionally, the processing unit is further adapted to:
responding to the fact that the login time interval is higher than a preset threshold value, initiating identity authentication of the user, and receiving current identity information submitted by the user;
acquiring the bound historical identity information of the login account;
comparing whether the current identity information is consistent with the historical identity information;
and if the current identity information is consistent with the historical identity information in comparison, displaying user related information corresponding to the login account.
Optionally, the processing unit is further adapted to:
if the current identity information is inconsistent with the historical identity information in comparison, generating and outputting judgment information of whether the login account is a first login account;
and if an instruction which is input by the user according to the judgment information and indicates that the login account is the first login account is received, deleting the user related information corresponding to the login account, and binding the login account with the current identity information.
Optionally, the processing unit is further adapted to:
if an instruction which indicates that the login account is not the first login account and is input by the user according to the judgment information is received, initiating address verification on the user;
receiving address information input by the user;
acquiring address information bound by the login account;
comparing whether the address information input by the user is consistent with the address information bound by the login account;
and if the address information input by the user is consistent with the address information bound by the login account, displaying the user related information corresponding to the login account.
Optionally, the processing unit is further adapted to:
and responding to the fact that the login time interval is lower than the preset threshold value, and displaying user related information corresponding to the login account.
Optionally, the determination unit is further adapted to:
judging whether the login time of the last login of the login account is inquired or not according to the login account;
and if the login time of the last login of the login account is inquired, calculating the login time interval between the current login of the login account and the last login.
Optionally, the determination unit is further adapted to:
judging whether the historical login time of the login account is inquired or not according to the login account;
if the historical login time of the login account is inquired, acquiring the login time of the login account, which is the latest login time from the current login, from the historical login time of the login account as the login time of the last login of the login account.
Optionally, the determination unit is further adapted to:
if the login time of the last login of the login account is not inquired, initiating identity authentication of the user;
receiving current identity information submitted by the user;
and binding the login account with the current identity information.
According to still another aspect of the embodiments of the present invention, there is also provided a computer-readable storage medium storing a computer program, wherein the computer program is configured to execute any one of the information processing methods described above when executed.
According to still another aspect of the embodiments of the present invention, there is also provided an electronic device, including a memory and a processor, where the memory stores therein a computer program, and the processor is configured to execute the computer program to perform any one of the information processing methods described above.
By means of the technical scheme, the information processing method provided by the embodiment of the invention obtains the login account number in the login information of the user, determines the login time interval of the current login distance from the last login of the login account number according to the login account number, compares the login time interval with the preset threshold value, further responds that the login time interval is higher than the preset threshold value, carries out identity authentication, and displays corresponding information according to the authentication result, so that the leakage of related information of the user can be avoided, and meanwhile, the interference of junk information on the user is avoided.
The foregoing description is only an overview of the technical solutions of the present invention, and the embodiments of the present invention are described below in order to make the technical means of the present invention more clearly understood and to make the above and other objects, features, and advantages of the present invention more clearly understandable.
The above and other objects, advantages and features of the present invention will become more apparent to those skilled in the art from the following detailed description of specific embodiments thereof, taken in conjunction with the accompanying drawings.
Drawings
Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the invention. Also, like reference numerals are used to refer to like parts throughout the drawings. In the drawings:
FIG. 1 shows a flow diagram of an information processing method according to an embodiment of the invention;
FIG. 2 shows a flow diagram of an information processing method according to another embodiment of the invention;
FIG. 3 shows a block diagram of an information handling system according to an embodiment of the invention;
FIG. 4 shows a block diagram of an electronic device according to an embodiment of the invention.
Detailed Description
Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
To solve the above technical problem, embodiments of the present invention provide an information processing method and system, a computer-readable storage medium, and an electronic device. Fig. 1 shows a flowchart of an information processing method according to an embodiment of the present invention. As shown in fig. 1, the method may include the following steps S101 to S103:
step S101, receiving login information of a user, and acquiring a login account in the login information;
step S102, according to the login account, determining the login time interval of the current login distance of the login account from the last login;
and S103, responding to the fact that the login time interval is higher than a preset threshold value, performing identity authentication, and displaying corresponding information according to an authentication result.
According to the information processing method provided by the embodiment of the invention, the login account in the login information of the user is obtained, the login time interval of the current login of the login account from the last login is determined according to the login account, the login time interval is compared with the preset threshold value, further, the identity authentication is carried out in response to the fact that the login time interval is higher than the preset threshold value, the corresponding information is displayed according to the authentication result, the leakage of the related information of the user can be avoided, and meanwhile, the interference of junk information on the user is also avoided.
The login information mentioned in step S101 may include a login account, a login password, a login verification code, and the like, and the user may log in the APP software or the service platform through the login information, so that various services provided by the APP software or the service platform may be used. The login account may be an instant messaging number, a mobile phone number, a mailbox address, or a nickname of a user, which is not limited in this embodiment of the present invention.
Further, after the user logs in through the login information, the APP software or the service platform stores information such as login time and login location of the user, and specifically, the login account in the login information may be stored in association with information such as login time and login location of the user, and these information may be used to provide the user with relevant service, for example, the login time or login location is provided to the user to prompt whether the user is a personal operation, so that the security of the user information may be improved.
In an alternative embodiment of the present invention, the determining, in the step S102, a login time interval between the current login and the last login of the login account according to the login account may specifically include the following steps a1 to A3.
Step A1, according to the login account, judging whether the login time of the last login of the login account is inquired; if the login time of the last login of the login account is inquired, continuing to execute the step A2; if the last login time of the login account is not queried, the step a3 is continuously executed.
In this step, as described above, the login account is stored in association with the user's login time, login location, and other information, so that the login time of the last login of the login account can be queried according to the login account.
Step A2, calculating the login time interval between the current login and the last login of the login account.
In step a3, a prompt message indicating that the login account is the first login is generated.
In this step, if the login time of the last login of the login account is not queried, it is indicated that the login account is the first login, and prompt information indicating that the login account is the first login may be generated.
It can be seen that, in the above embodiment, the login time of the last login of the login account can be accurately obtained, so that the calculated login time interval is more accurate.
In an optional embodiment of the present invention, since the login account may have been logged in many times, in order to improve accuracy and efficiency of obtaining the login time of the last login of the login account, in step a1, it is determined whether to query the login time of the last login of the login account according to the login account, specifically, it is determined whether to query the historical login time of the login account according to the login account, and if the historical login time of the login account is queried, the login time of the login account closest to the current login may be obtained from the historical login time of the login account as the login time of the last login of the login account. If the historical login time of the login account is not inquired, which indicates that the login account is the first login, prompt information indicating that the login account is the first login can be generated.
In general, if the login account is the first login, the login account, the login password, the user identity information, and the like need to be submitted for registration, and the login can be completed by using the login account and the login password. With the development of the technology, more and more APP software or service platforms start to support direct login without first registering. In an optional embodiment of the present invention, the user may confirm whether the login account is a first login according to the prompt information indicating that the login account is a first login generated in step a3, if the user confirms that the login account is a first login, the user may initiate identity authentication for the user, further receive current identity information submitted by the user, then bind the login account and the current identity information, may implement the above-mentioned registration under the normal condition, and subsequently provide a relevant service for the user, for example, perform identity authentication for the user through the bound identity information, so as to improve the security of the user information. If the user confirms that the login account is not the first login, the user may be prompted to re-input the login account if the login information input by the user is incorrect. The embodiment of the invention can improve the accuracy of information processing and provide better login experience for the user by combining the autonomous judgment of the user.
In an optional embodiment of the present invention, after determining, according to the login account, a login time interval between the current login and the last login of the login account in step S102, the following steps B1 to B2 may be further included.
Step B1, the login time interval is compared with a preset threshold.
Step B2, if the comparison result is that the login time interval is lower than the preset threshold, displaying the user related information corresponding to the login account; if the comparison result is that the login time interval is higher than the preset threshold, the user-related information corresponding to the login account is not displayed, and the above step S103 is executed.
In the above step, the user-related information corresponding to the login account may include personal information of the user, historical order information, and the like, which is not limited in this embodiment of the present invention. The preset threshold value may be 3 months, 6 months, 12 months or the like, and may be set according to actual conditions, taking a login account as a mobile phone number as an example, if the mobile phone number of the user is logged out or is recovered by the operator after a period of time owing, then after the specified time, the operator will continue to provide the mobile phone number to a new user, and if the specified time is 12 months, the preset threshold value may be set to 12 months; if the specified time here is 15 months, the preset threshold value may be set to 15 months. It should be noted that the examples are only illustrative and do not limit the embodiments of the present invention.
Further, if the login time interval is lower than a preset threshold, that is, smaller than the preset threshold, it indicates that the owner of the login account is not replaced, the user related information corresponding to the login account can be displayed, the leakage of the user related information is not caused, and the interference of junk information to the user is also avoided. If the login time interval is higher than the preset threshold value, namely, the login time interval is larger than the preset threshold value, it is indicated that the owner of the login account is possibly replaced, the user related information corresponding to the login account is not displayed, the leakage of the user related information can be avoided, and meanwhile, the interference of junk information to the user is also avoided. If the login time interval is equal to the preset threshold, the login account may replace the owner, and in order to improve the security of the information, the user-related information corresponding to the login account may not be displayed.
In an optional embodiment of the present invention, it may also be that the user does not log in for a long time, so that the login time interval is greater than a preset threshold, and if this is the case, the user information is not fully presented and the user experience of the user is also affected because the user does not display the user-related information corresponding to the login account, in order to solve this problem, the step S103 performs the identity verification in response to that the login time interval is greater than the preset threshold, and displays the corresponding information according to the verification result, which may specifically include the following steps C1 to C4.
And step C1, responding to the login time interval being higher than the preset threshold value, initiating identity authentication of the user, and receiving the current identity information submitted by the user.
In this step, a page for user identity authentication may be generated, and the user may submit the current identity information through the page. The current identity information may be a service platform account number, an identity card number, a current user head portrait, and the like, which is not limited in this embodiment of the present invention.
And step C2, acquiring the bound history identity information of the login account.
And step C3, comparing whether the current identity information is consistent with the historical identity information.
In this step, a matching mode can be adopted to compare whether the current identity information is consistent with the historical identity information, and if the matching similarity reaches a preset similarity threshold, the comparison between the current identity information and the historical identity information is determined to be consistent; if the matching similarity does not reach the preset similarity threshold, it is determined that the current identity information is inconsistent with the historical identity information in comparison, where the preset similarity threshold may be, for example, 98%, and may be specifically set according to actual requirements, and the embodiment of the present invention does not limit this.
And step C4, if the current identity information is consistent with the historical identity information, displaying the user related information corresponding to the login account.
In this step, if the current identity information is consistent with the historical identity information in comparison, it is indicated that the user has not logged in for a long time, so that the login time interval is greater than the preset threshold, the owner of the login account is not replaced, the user-related information corresponding to the login account can be displayed, the leakage of the user-related information cannot be caused, and the interference of junk information to the user cannot be caused.
In an optional embodiment of the present invention, the step C3 above compares whether the current identity information is consistent with the historical identity information, and if the comparison result is that the current identity information is inconsistent with the historical identity information, then it may be further determined whether the login account is replaced by the owner, and the specific determination method may include the following steps C5 to C7.
And step C5, if the current identity information is not consistent with the historical identity information, generating and outputting judgment information whether the login account is the first login account.
And step C6, if an instruction which indicates that the login account is the first login account and is input by the user according to the judgment information is received, deleting the user related information corresponding to the login account, and binding the login account with the current identity information.
In this step, if an instruction indicating that the login account is the first login account is received, which is input by the user according to the determination information, indicating that the login account changes the owner, so as to avoid leakage of the user-related information and interference of spam information on the user, reset the user information of the login account, and then recreate the user information of the login account, for example, delete the user-related information corresponding to the login account, and bind the login account with the current identity information. Further, after the login account is bound with the current identity information, the related information of the user currently bound by the login account can be displayed.
Step C7, if an instruction indicating that the login account is not the first login account is received, which is input by the user according to the determination information, the address verification of the user may be initiated, the address information input by the user may be received, the address information bound to the login account may be obtained, and then whether the address information input by the user is consistent with the address information bound to the login account may be compared, and if the address information input by the user is consistent with the address information bound to the login account, the user-related information corresponding to the login account may be displayed.
In this step, if an instruction indicating that the login account is not the first login account is received, which is input by the user according to the determination information, indicating that the login account may not replace the owner, the user may be further authenticated, such as address authentication or authentication related to a problem, and the security of the user information may be improved.
In the embodiment, the accuracy of the judgment result can be improved by combining the autonomous judgment of the user, and the subsequent processing operation is performed according to the judgment result, so that the safety of the user information can be improved.
In the above, various implementation manners of each link in the embodiment shown in fig. 1 are introduced, and the information processing method provided in the embodiment of the present invention will be further described below by using a specific embodiment.
In a specific embodiment, taking a login account in the login information as a mobile phone number as an example, the user can directly login the APP software through the mobile phone number and a verification code obtained by the mobile phone number. In the related art, APP software directly displays APP information and user-related information, such as personal information of a user, historical order information, and the like. As introduced above, if the owner of the mobile phone number is replaced, the information of the original owner of the mobile phone number is revealed to the new owner of the mobile phone number, and the APP software also pushes information not belonging to the new owner of the mobile phone number, thereby causing spam interference. The information processing method provided by the embodiment of the invention can effectively solve the problem. As shown in fig. 2, the information processing method may include the following steps S201 to S212.
Step S201, receiving login information of a user, and acquiring a mobile phone number in the login information.
Step S202, according to the mobile phone number, determining the login time interval of the current login distance of the mobile phone number from the last login.
In the step, whether the login time of the last login of the mobile phone number is inquired or not can be judged according to the mobile phone number, and if the login time of the last login of the mobile phone number is inquired, the login time interval between the current login of the mobile phone number and the last login of the mobile phone number is calculated; if the login time of the last login of the mobile phone number is not inquired, the mobile phone number is the first login, and prompt information indicating that the mobile phone number is the first login can be generated.
Further, if the user confirms that the mobile phone number is the first login according to the prompt message, the user can be authenticated, the current identity information submitted by the user is received, then the mobile phone number and the current identity information are bound, and relevant services are subsequently provided for the user, for example, the user is authenticated through the bound identity information, so that the safety of the user information is improved, and the like. If the user confirms that the mobile phone number is not logged in for the first time according to the prompt message, the user can be prompted to re-input if the mobile phone number in the login message input by the user is wrong.
Step S203, comparing the login time interval with a preset threshold value, judging whether the login time interval is smaller than the preset threshold value, if so, continuing to execute step S204; if not, the process continues to step S205.
In this step, the preset threshold may be 3 months, 6 months, 12 months or the like, and may be set according to actual conditions, when the mobile phone number of the user is cancelled or is recovered by the operator after a period of time is owed, then after the specified time, the operator will continue to provide the mobile phone number to the new user, if the specified time is 12 months, the preset threshold may be set to 12 months; if the specified time here is 15 months, the preset threshold value may be set to 15 months. It should be noted that the examples are only illustrative and do not limit the embodiments of the present invention.
And step S204, completing the complete login, and displaying the APP information and the user related information corresponding to the mobile phone number.
In this step, the login time interval is smaller than the preset threshold value, which indicates that the owner of the mobile phone number is not replaced, so that the user-related information corresponding to the mobile phone number can be displayed, the leakage of the user-related information cannot be caused, and the interference of junk information to the user cannot be caused.
Step S205, completing login, displaying APP information and not displaying user related information corresponding to the mobile phone number, and continuing to execute step S206.
In the step, the login time interval is greater than or equal to the preset threshold value, which indicates that the owner of the mobile phone number is possibly replaced, so that the relevant user information corresponding to the mobile phone number is not displayed, the relevant user information can be prevented from being leaked, and the interference of junk information to the user is also avoided.
Step S206, the identity authentication of the user is initiated, the current identity information submitted by the user is received, and the historical identity information bound with the mobile phone number is obtained.
Step S207, comparing whether the current identity information is consistent with the historical identity information, if so, continuing to execute step S208; if not, the process continues to step S209.
And step S208, displaying the relevant information of the user corresponding to the mobile phone number.
Step S209, judging whether the mobile phone number is the first login mobile phone number, if so, continuing to execute step S210; if not, the step S212 is continued.
In the step, judging information whether the mobile phone number is the first mobile phone number or not can be generated and output, and if an instruction which indicates that the mobile phone number is the first mobile phone number and is input by a user according to the judging information is received, the mobile phone number is considered to be the first mobile phone number; and if an instruction which indicates that the mobile phone number is not the first mobile phone number and is input by the user according to the judgment information is received, the mobile phone number is considered not to be the first mobile phone number.
In step S210, the user information of the mobile phone number is reset, the user information of the mobile phone number is created again, and step S211 is continuously executed.
In this step, the relevant user information corresponding to the mobile phone number may be deleted, and the mobile phone number may be bound to the current identity information.
Step S211, displaying the user information of the mobile phone number.
Step S212, initiating address verification to the user, receiving the address information input by the user, acquiring the address information bound by the mobile phone number, comparing whether the address information input by the user is consistent with the address information bound by the mobile phone number, and if the address information input by the user is consistent with the address information bound by the mobile phone number, displaying the user related information corresponding to the mobile phone number.
In this step, if the address information input by the user is not consistent with the address information bound to the mobile phone number, the next operation may be selected, for example, the verification may be re-input, or the customer service is contacted to assist in the verification, or the login is exited.
The information processing method provided by this embodiment may be applied to a user terminal of APP software or a service platform, such as a smart phone, a tablet computer, or a smart watch, and may also be applied to a server of the APP software or the service platform. If the method is applied to the APP software or the service end of the service platform, when the user related information corresponding to the mobile phone number is displayed or not displayed, the service end can issue a corresponding instruction to the user terminal, so that the user terminal displays the user related information corresponding to the mobile phone number or does not display the user related information corresponding to the mobile phone number according to the corresponding instruction issued by the service end.
The information processing method provided by the embodiment can solve the problem that a user can also see the information of the last owner of the mobile phone number after logging in the APP software after replacing a new mobile phone number, and solve the problem that the user can see the APP using personal recording information by the next owner after logging out the mobile phone number, can avoid the leakage of the relevant information of the user, and simultaneously also avoid causing junk information interference to the user. In addition, according to the embodiment, by receiving the login information of the user, the corresponding processing operation can be executed on the user related information corresponding to the mobile phone number while the login service is provided, and the processing efficiency and the timeliness are high.
It should be noted that, in practical applications, all the above optional embodiments may be combined in a combined manner at will to form an optional embodiment of the present invention, and details are not described here any more.
Based on the information processing method provided by each embodiment, the embodiment of the invention also provides an information processing system based on the same inventive concept.
FIG. 3 shows a block diagram of an information handling system according to an embodiment of the invention. As shown in fig. 3, the information processing system may include an acquisition unit 310, a determination unit 320, and a processing unit 330.
The acquiring unit 310 is adapted to receive login information of a user, and acquire a login account in the login information;
the determining unit 320 is adapted to determine, according to the login account, a login time interval between the current login and the last login of the login account;
the processing unit 330 is adapted to perform identity authentication in response to the login time interval being higher than a preset threshold, and perform display of corresponding information according to an authentication result.
In an alternative embodiment of the invention, the processing unit 330 is further adapted to:
responding to the fact that the login time interval is higher than a preset threshold value, initiating identity authentication of the user, and receiving current identity information submitted by the user;
acquiring the bound historical identity information of a login account;
comparing whether the current identity information is consistent with the historical identity information;
and if the current identity information is consistent with the historical identity information in comparison, displaying the user related information corresponding to the login account.
In an alternative embodiment of the invention, the processing unit 330 is further adapted to:
if the current identity information is inconsistent with the historical identity information in comparison, generating and outputting judgment information of whether the login account is the first login account or not;
and if an instruction which is input by the user according to the judgment information and indicates that the login account is the first login account is received, deleting the user related information corresponding to the login account, and binding the login account with the current identity information.
In an alternative embodiment of the invention, the processing unit 330 is further adapted to:
if an instruction which indicates that the login account is not the first login account and is input by the user according to the judgment information is received, initiating address verification on the user;
receiving address information input by a user;
acquiring address information bound by a login account;
comparing whether the address information input by the user is consistent with the address information bound with the login account;
and if the address information input by the user is consistent with the address information bound by the login account, displaying the user related information corresponding to the login account.
In an alternative embodiment of the invention, the processing unit 330 is further adapted to:
and responding to the fact that the login time interval is lower than a preset threshold value, and displaying user related information corresponding to the login account.
In an alternative embodiment of the present invention, the determining unit 320 is further adapted to:
judging whether the login time of the last login of the login account is inquired according to the login account;
and if the login time of the last login of the login account is inquired, calculating the login time interval between the current login of the login account and the last login.
In an alternative embodiment of the present invention, the determining unit 320 is further adapted to:
judging whether the historical login time of the login account is inquired or not according to the login account;
if the historical login time of the login account is inquired, acquiring the login time of the login account, which is the latest login time from the current login, from the historical login time of the login account as the login time of the last login of the login account.
In an alternative embodiment of the present invention, the determining unit 320 is further adapted to:
if the login time of the last login of the login account is not inquired, initiating identity authentication of the user;
receiving current identity information submitted by a user;
and binding the login account with the current identity information.
Based on the same inventive concept, the embodiment of the present invention further provides a computer-readable storage medium, in which a computer program is stored, where the computer program is configured to execute the information processing method of any one of the above embodiments when running.
Based on the same inventive concept, an embodiment of the present invention further provides an electronic device, which includes a memory and a processor, where the memory stores a computer program, and the processor is configured to execute the computer program to perform the information processing method according to any one of the embodiments.
In an exemplary embodiment, as shown in fig. 4, an electronic device is provided, which may include a communication bus 410, a processor 420, a memory 430, and a communication interface 440, and may further include an input/output interface 450 and a display device 460, wherein the respective functional units may communicate with each other through the bus 410. The memory 430 stores a computer program, and the processor 420 is configured to execute the computer program stored in the memory to execute the information processing method according to any one of the above embodiments.
It is clear to those skilled in the art that the specific working processes of the above-described systems, devices, modules and units may refer to the corresponding processes in the foregoing method embodiments, and for the sake of brevity, further description is omitted here.
In addition, the functional units in the embodiments of the present invention may be physically independent of each other, two or more functional units may be integrated together, or all the functional units may be integrated in one processing unit. The integrated functional units may be implemented in the form of hardware, or in the form of software or firmware.
Those of ordinary skill in the art will understand that: the integrated functional units, if implemented in software and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computing device (e.g., a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention when the instructions are executed. And the aforementioned storage medium includes: u disk, removable hard disk, Read Only Memory (ROM), Random Access Memory (RAM), magnetic or optical disk, and other various media capable of storing program code.
Alternatively, all or part of the steps of implementing the foregoing method embodiments may be implemented by hardware (such as a computing device, e.g., a personal computer, a server, or a network device) associated with program instructions, which may be stored in a computer-readable storage medium, and when the program instructions are executed by a processor of the computing device, the computing device executes all or part of the steps of the method according to the embodiments of the present invention.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments can be modified or some or all of the technical features can be equivalently replaced within the spirit and principle of the present invention; such modifications or substitutions do not depart from the scope of the present invention.
According to an aspect of the embodiments of the present invention, a1. an information processing method is provided, including:
receiving login information of a user, and acquiring a login account in the login information;
determining the login time interval of the current login of the login account from the last login according to the login account;
and responding to the fact that the login time interval is higher than a preset threshold value, performing identity authentication, and displaying corresponding information according to an authentication result.
A2. According to the method of a1, in response to the login time interval being higher than the preset threshold, performing identity authentication, and displaying corresponding information according to the authentication result, the method includes:
responding to the fact that the login time interval is higher than a preset threshold value, initiating identity authentication of the user, and receiving current identity information submitted by the user;
acquiring the bound historical identity information of the login account;
comparing whether the current identity information is consistent with the historical identity information;
and if the current identity information is consistent with the historical identity information in comparison, displaying user related information corresponding to the login account.
A3. According to the method of a2, if the current identity information is not consistent with the historical identity information, the method further comprises:
generating and outputting judgment information whether the login account is the first login account;
and if an instruction which is input by the user according to the judgment information and indicates that the login account is the first login account is received, deleting the user related information corresponding to the login account, and binding the login account with the current identity information.
A4. The method according to a3, further comprising:
if an instruction which indicates that the login account is not the first login account and is input by the user according to the judgment information is received, initiating address verification on the user;
receiving address information input by the user;
acquiring address information bound by the login account;
comparing whether the address information input by the user is consistent with the address information bound by the login account;
and if the address information input by the user is consistent with the address information bound by the login account, displaying the user related information corresponding to the login account.
A5. The method of a1, the method further comprising:
and responding to the fact that the login time interval is lower than the preset threshold value, and displaying user related information corresponding to the login account.
A6. According to the method described in a1, determining, according to the login account, a login time interval between the current login and the last login of the login account includes:
judging whether the login time of the last login of the login account is inquired or not according to the login account;
and if the login time of the last login of the login account is inquired, calculating the login time interval between the current login of the login account and the last login.
A7. According to the method of a6, determining whether the login time of the last login of the login account is queried according to the login account includes:
judging whether the historical login time of the login account is inquired or not according to the login account;
if the historical login time of the login account is inquired, acquiring the login time of the login account, which is the latest login time from the current login, from the historical login time of the login account as the login time of the last login of the login account.
A8. The method according to a6, further comprising:
if the login time of the last login of the login account is not inquired, initiating identity authentication of the user;
receiving current identity information submitted by the user;
and binding the login account with the current identity information.
According to another aspect of the embodiments of the present invention, there is provided B9. an information processing system including:
the device comprises an acquisition unit, a processing unit and a processing unit, wherein the acquisition unit is suitable for receiving login information of a user and acquiring a login account in the login information;
the determining unit is suitable for determining the login time interval of the current login distance from the last login of the login account according to the login account;
and the processing unit is suitable for responding to the fact that the login time interval is higher than a preset threshold value, carrying out identity authentication and displaying corresponding information according to an authentication result.
B10. The system of B9, the processing unit further adapted to:
responding to the fact that the login time interval is higher than a preset threshold value, initiating identity authentication of the user, and receiving current identity information submitted by the user;
acquiring the bound historical identity information of the login account;
comparing whether the current identity information is consistent with the historical identity information;
and if the current identity information is consistent with the historical identity information in comparison, displaying user related information corresponding to the login account.
B11. The system of B10, the processing unit further adapted to:
if the current identity information is inconsistent with the historical identity information in comparison, generating and outputting judgment information of whether the login account is a first login account;
and if an instruction which is input by the user according to the judgment information and indicates that the login account is the first login account is received, deleting the user related information corresponding to the login account, and binding the login account with the current identity information.
B12. The system of B11, the processing unit further adapted to:
if an instruction which indicates that the login account is not the first login account and is input by the user according to the judgment information is received, initiating address verification on the user;
receiving address information input by the user;
acquiring address information bound by the login account;
comparing whether the address information input by the user is consistent with the address information bound by the login account;
and if the address information input by the user is consistent with the address information bound by the login account, displaying the user related information corresponding to the login account.
B13. The system of B9, the processing unit further adapted to:
and responding to the fact that the login time interval is lower than the preset threshold value, and displaying user related information corresponding to the login account.
B14. The system according to B9, the determination unit being further adapted to:
judging whether the login time of the last login of the login account is inquired or not according to the login account;
and if the login time of the last login of the login account is inquired, calculating the login time interval between the current login of the login account and the last login.
B15. The system according to B14, the determination unit being further adapted to:
judging whether the historical login time of the login account is inquired or not according to the login account;
if the historical login time of the login account is inquired, acquiring the login time of the login account, which is the latest login time from the current login, from the historical login time of the login account as the login time of the last login of the login account.
B16. The system according to B14, the determination unit being further adapted to:
if the login time of the last login of the login account is not inquired, initiating identity authentication of the user;
receiving current identity information submitted by the user;
and binding the login account with the current identity information.
According to a further aspect of embodiments of the present invention, there is provided c17 a computer-readable storage medium having stored thereon a computer program, wherein the computer program is arranged to execute the information processing method of any one of a1 to A8 when running.
According to a further aspect of the embodiments of the present invention, there is provided d18. an electronic device, including a memory and a processor, wherein the memory stores therein a computer program, and the processor is configured to execute the computer program to perform the information processing method of any one of a1 to A8.

Claims (10)

1. An information processing method characterized by comprising:
receiving login information of a user, and acquiring a login account in the login information;
determining the login time interval of the current login of the login account from the last login according to the login account;
and responding to the fact that the login time interval is higher than a preset threshold value, performing identity authentication, and displaying corresponding information according to an authentication result.
2. The method of claim 1, wherein performing identity authentication in response to the login time interval being higher than a preset threshold, and displaying corresponding information according to the authentication result comprises:
responding to the fact that the login time interval is higher than a preset threshold value, initiating identity authentication of the user, and receiving current identity information submitted by the user;
acquiring the bound historical identity information of the login account;
comparing whether the current identity information is consistent with the historical identity information;
and if the current identity information is consistent with the historical identity information in comparison, displaying user related information corresponding to the login account.
3. The method of claim 2, wherein if the current identity information is inconsistent with the historical identity information, the method further comprises:
generating and outputting judgment information whether the login account is the first login account;
and if an instruction which is input by the user according to the judgment information and indicates that the login account is the first login account is received, deleting the user related information corresponding to the login account, and binding the login account with the current identity information.
4. The method of claim 3, further comprising:
if an instruction which indicates that the login account is not the first login account and is input by the user according to the judgment information is received, initiating address verification on the user;
receiving address information input by the user;
acquiring address information bound by the login account;
comparing whether the address information input by the user is consistent with the address information bound by the login account;
and if the address information input by the user is consistent with the address information bound by the login account, displaying the user related information corresponding to the login account.
5. The method of claim 1, further comprising:
and responding to the fact that the login time interval is lower than the preset threshold value, and displaying user related information corresponding to the login account.
6. The method of claim 1, wherein determining, according to the login account, a login time interval between the current login and the last login of the login account comprises:
judging whether the login time of the last login of the login account is inquired or not according to the login account;
and if the login time of the last login of the login account is inquired, calculating the login time interval between the current login of the login account and the last login.
7. The method of claim 6, wherein determining whether the login time of the last login of the login account is queried according to the login account comprises:
judging whether the historical login time of the login account is inquired or not according to the login account;
if the historical login time of the login account is inquired, acquiring the login time of the login account, which is the latest login time from the current login, from the historical login time of the login account as the login time of the last login of the login account.
8. An information processing system, comprising:
the device comprises an acquisition unit, a processing unit and a processing unit, wherein the acquisition unit is suitable for receiving login information of a user and acquiring a login account in the login information;
the determining unit is suitable for determining the login time interval of the current login distance from the last login of the login account according to the login account;
and the processing unit is suitable for responding to the fact that the login time interval is higher than a preset threshold value, carrying out identity authentication and displaying corresponding information according to an authentication result.
9. A computer-readable storage medium, in which a computer program is stored, wherein the computer program is configured to execute the information processing method according to any one of claims 1 to 7 when executed.
10. An electronic device, comprising a memory and a processor, wherein the memory stores a computer program, and the processor is configured to execute the computer program to perform the information processing method according to any one of claims 1 to 7.
CN202010127202.8A 2020-02-28 2020-02-28 Information processing method and system Pending CN111460403A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010127202.8A CN111460403A (en) 2020-02-28 2020-02-28 Information processing method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010127202.8A CN111460403A (en) 2020-02-28 2020-02-28 Information processing method and system

Publications (1)

Publication Number Publication Date
CN111460403A true CN111460403A (en) 2020-07-28

Family

ID=71681496

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010127202.8A Pending CN111460403A (en) 2020-02-28 2020-02-28 Information processing method and system

Country Status (1)

Country Link
CN (1) CN111460403A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112667985A (en) * 2020-12-31 2021-04-16 深兰盛视科技(苏州)有限公司 Bargun control method and device, bargun and computer readable storage medium
CN116843302A (en) * 2023-07-25 2023-10-03 零一裂变(深圳)科技有限公司 Advertisement design project management system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103888457A (en) * 2014-03-19 2014-06-25 深信服网络科技(深圳)有限公司 Method and system for improving login security
CN104618314A (en) * 2013-12-24 2015-05-13 腾讯科技(深圳)有限公司 Method, device and system for password reset
CN104753944A (en) * 2015-03-31 2015-07-01 北京畅游天下网络技术有限公司 Account security verifying method and system
CN106372470A (en) * 2016-08-30 2017-02-01 维沃移动通信有限公司 Method for reminding of inputting password and mobile terminal
CN110119604A (en) * 2019-05-22 2019-08-13 湖南暄程科技有限公司 Improve the method, apparatus, terminal and storage equipment of information system security

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104618314A (en) * 2013-12-24 2015-05-13 腾讯科技(深圳)有限公司 Method, device and system for password reset
CN103888457A (en) * 2014-03-19 2014-06-25 深信服网络科技(深圳)有限公司 Method and system for improving login security
CN104753944A (en) * 2015-03-31 2015-07-01 北京畅游天下网络技术有限公司 Account security verifying method and system
CN106372470A (en) * 2016-08-30 2017-02-01 维沃移动通信有限公司 Method for reminding of inputting password and mobile terminal
CN110119604A (en) * 2019-05-22 2019-08-13 湖南暄程科技有限公司 Improve the method, apparatus, terminal and storage equipment of information system security

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112667985A (en) * 2020-12-31 2021-04-16 深兰盛视科技(苏州)有限公司 Bargun control method and device, bargun and computer readable storage medium
CN116843302A (en) * 2023-07-25 2023-10-03 零一裂变(深圳)科技有限公司 Advertisement design project management system

Similar Documents

Publication Publication Date Title
KR102127039B1 (en) Interactive data processing method and apparatus using same
EP3373543B1 (en) Service processing method and apparatus
EP3525410B1 (en) Account login method, apparatus, and server
CN104468249B (en) Account abnormity detection method and device
US11038975B2 (en) Information pushing method and device
EP2819351B1 (en) Information processing method, apparatus, and system
CN108305055B (en) Payment testing method and device
WO2015101320A1 (en) Account number generation method, terminal and background server
CN108287823B (en) Message data processing method and device, computer equipment and storage medium
CN112583799B (en) Processing method, related device, equipment and medium for registered account
CN103107974A (en) Method for registration and login of users and mobile terminal
CN110689084B (en) Abnormal user identification method and device
WO2015106728A1 (en) Data processing method and system
CN111460403A (en) Information processing method and system
CN108509582B (en) Information reply method, terminal equipment and computer readable storage medium
CN111125656B (en) Service processing method and device and electronic equipment
CN112015651A (en) Data processing method and device
JP2019512984A (en) Method, apparatus and system for checking change of telephone number
CN112950366B (en) Banking business handling method and device, electronic equipment and computer storage medium
CN104767880A (en) Communication number management method
CN111614676B (en) Login method, device, equipment and medium
CN111680279B (en) Login verification method, device and system
CN111127094B (en) Account matching method and device, electronic equipment and storage medium
CN113674083A (en) Internet financial platform credit risk monitoring method, device and computer system
CN108924270B (en) Method for updating terminal contact information, server and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200728