CN112138400A - Security monitoring method, system and server for game account - Google Patents

Security monitoring method, system and server for game account Download PDF

Info

Publication number
CN112138400A
CN112138400A CN202010969227.2A CN202010969227A CN112138400A CN 112138400 A CN112138400 A CN 112138400A CN 202010969227 A CN202010969227 A CN 202010969227A CN 112138400 A CN112138400 A CN 112138400A
Authority
CN
China
Prior art keywords
login
equipment
game account
security
game
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010969227.2A
Other languages
Chinese (zh)
Other versions
CN112138400B (en
Inventor
高运
王恺
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing ELEX Technology Co Ltd
Original Assignee
Beijing ELEX Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing ELEX Technology Co Ltd filed Critical Beijing ELEX Technology Co Ltd
Priority to CN202010969227.2A priority Critical patent/CN112138400B/en
Publication of CN112138400A publication Critical patent/CN112138400A/en
Application granted granted Critical
Publication of CN112138400B publication Critical patent/CN112138400B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • AHUMAN NECESSITIES
    • A63SPORTS; GAMES; AMUSEMENTS
    • A63FCARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
    • A63F13/00Video games, i.e. games using an electronically generated display having two or more dimensions
    • A63F13/70Game security or game management aspects
    • A63F13/71Game security or game management aspects using secure communication between game devices and game servers, e.g. by encrypting game data or authenticating players
    • AHUMAN NECESSITIES
    • A63SPORTS; GAMES; AMUSEMENTS
    • A63FCARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
    • A63F13/00Video games, i.e. games using an electronically generated display having two or more dimensions
    • A63F13/70Game security or game management aspects
    • A63F13/73Authorising game programs or game devices, e.g. checking authenticity
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Multimedia (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Pinball Game Machines (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention belongs to the technical field of mobile phone games, and discloses a security monitoring method, a system and a server for game accounts, wherein the security monitoring method comprises the following steps: receiving a login request sent by a first game account in a server, wherein the login request comprises current login equipment; acquiring a security value of the current login equipment; identifying whether the current login equipment is the target equipment or not according to the safety value, and executing corresponding operation according to an identification result; wherein: the target equipment comprises safety equipment, dangerous equipment, blacklist equipment and verification equipment; in summary, in the invention, the security value of the historical login device of the game account is set, so that the game account can form different mark states according to the security value, and the login device in each mark state can form corresponding security early warning when the game is logged in, thereby effectively improving the security of the player logging in the game account by using the corresponding device.

Description

Security monitoring method, system and server for game account
Technical Field
The invention belongs to the technical field of mobile phone games, and particularly relates to a security monitoring method, a security monitoring system and a security monitoring server for a game account.
Background
In the prior art, most game accounts are protected in a mode of executing dynamic verification of a mobile phone by a corresponding account password and a bound mobile phone; however, in an actual daily game, a game account is usually registered on a plurality of different devices, and once a stealing number virus is implanted in a certain device, the game account is dangerous to be stolen, and a game player loses money. At present, after a game account of a player is stolen, only the account can be found back, and equipment implanted with a stealing number virus cannot be effectively known, so that the risk of being stolen again exists when the game account is taken back.
Disclosure of Invention
In view of this, in order to solve the problem of insecurity in the prior art when a game is logged in through different devices, the present invention aims to provide a method, a system, and a server for monitoring security of a game account.
In order to achieve the purpose, the invention provides the following technical scheme:
a security monitoring method for game account numbers comprises the following steps:
receiving a login request sent by a first game account in a server, wherein the login request comprises current login equipment;
acquiring a security value of the current login equipment;
identifying whether the current login equipment is the target equipment or not according to the safety value, and executing corresponding operation according to an identification result;
wherein: the target device comprises a safety device, a dangerous device, a blacklist device and a verification device.
Preferably, the security monitoring method further includes setting a security value of each login device, and an initial value of the security value is 0.
Preferably, the safety monitoring method further comprises:
receiving a loss report request sent by a second game account in the server, and acquiring N pieces of historical login equipment of the second game account within preset time;
executing danger marking on each historical login device once, and acquiring a safety value of each marked historical login device;
sequentially judging whether each safety value is smaller than a first threshold value;
if yes, marking the corresponding history login equipment as safety equipment; if not, judging whether the corresponding marking times is larger than a second threshold value or not;
if not, marking the corresponding historical login equipment as dangerous equipment; if yes, marking the corresponding history login equipment as blacklist equipment, and executing real-name identity record of the blacklist equipment;
and after the recording is finished, marking the blacklist device as a verification device.
Preferably, when the risk marking is performed once for each of the historical login devices, the method includes:
acquiring the latest login time and login times of each historical login device;
judging whether the login time is smaller than a third threshold value; if yes, adding 1 to the safety value when a danger mark is executed once; if not, when a danger mark is executed once, the safety value is added by 0.5;
judging whether the login times are larger than a fourth threshold value or not; if yes, adding 0.5 to the safety value when a danger mark is executed once; if not, when a danger mark is executed once, adding 1 to the safety value;
wherein, when the danger marking is executed once, the judgment result of the login times is prior to the judgment result of the login time.
In conclusion;
when the current login device is identified as the safety device, the method comprises the following steps:
and agreeing to the login request, and acquiring a login password of the first game account from the current login equipment so as to log the first game account in the target game.
When the current login equipment is identified as dangerous equipment, the method comprises the following steps:
executing danger reminding in the current login equipment, and acquiring a continuous login request from the current login equipment, wherein the continuous login request comprises login verification information sent by a server to a mobile phone number bound to the first game account;
judging whether the login verification information is correct or not; if yes, the login request is approved, and the login password of the first game account is obtained from the current login equipment, so that the first game account logs in the target game.
And when the current login equipment is identified as blacklist equipment, rejecting the login request.
When the current login device is identified as the verification device, the method comprises the following steps:
executing danger reminding in the current login equipment, and acquiring a continuous login request from the current login equipment, wherein the continuous login request comprises login authentication information sent by a server to a mobile phone number bound to the first game account and real-name identity record information of the current login equipment;
judging whether the login verification information and the real-name identity recording information are correct or not; and if the current login password is correct, the login request is approved, and the login password of the first game account is acquired from the current login equipment, so that the first game account logs in the target game.
Compared with the prior art, the invention has the following beneficial effects:
in the invention, the security value of the historical login equipment of the game account is set, so that the game account can form different mark states according to the security value, and the login equipment in each mark state can form corresponding security early warning when in game login, thereby effectively improving the security of a player when using corresponding equipment to login the game account.
The safety value of the login equipment is changed according to whether the game account number logged in by the equipment is stolen, and if the game account number is stolen, the safety value of the corresponding historical login equipment is increased, so that the safety value and the corresponding state of each equipment can accurately reflect the safety of the game login, and the safety of the game account number is effectively monitored.
In addition, for the device with higher danger, the real-name identity record bound with the device is executed, so that when the danger mark continuously appears on the device, a player, a game operator or other game maintenance personnel can quickly find the responsible person corresponding to the device, and effective compensation can be obtained to a certain extent so as to reduce the loss of the player.
In order to achieve the above purpose, the invention also provides the following technical scheme:
a security monitoring system for a game account, comprising:
the system comprises a receiving module, a login module and a display module, wherein the receiving module is used for receiving a login request of a target game, and the login request at least comprises a first game account number which is requested to be logged in currently and current login equipment;
the acquisition module acquires the security value of the current login equipment;
the identification and judgment module is used for identifying and judging whether the current login equipment is the target equipment or not according to the safety value acquired by the acquisition module;
and the execution module is used for executing corresponding operation according to the judgment result of the identification judgment module.
In order to achieve the above purpose, the invention also provides the following technical scheme:
a game server comprising a processor and a memory; the storage is stored with at least one executable code; the at least one executable code is loaded and executed by the processor, and when the at least one executable code is loaded and executed, the security monitoring method for the game account is realized.
Drawings
FIG. 1 is a simplified flow chart of a security monitoring method for a game account according to the present invention;
FIG. 2 is a detailed flowchart of a security monitoring method for a game account according to the present invention;
FIG. 3 is a flow chart of calculating a security value when performing a security monitoring method for a provided game account;
fig. 4 is a block diagram of a security monitoring system for a game account according to the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example 1
In an embodiment of the present invention, a security monitoring method for a game account is disclosed, which is specifically executed by a service period, and as shown in fig. 1 to fig. 3, the security monitoring method includes the following steps:
s1, receiving a login request sent by a first game account in a server, wherein the login request comprises current login equipment;
s2, acquiring a safety value of the current login equipment;
s3, identifying whether the current login equipment is the target equipment or not according to the safety value, and executing corresponding operation according to the identification result;
wherein: the target devices include security devices, hazardous devices, blacklist devices and verification devices.
The principle of setting and calculating the safety value is as follows:
a) first, the initial value of the security value of each login device is set to 0.
b) Then, when a loss report request sent by the second game account is received in the server, N pieces of historical login equipment of the second game account in a preset time are obtained. The preset time is any preset time, for example, the preset time can be set to three months, so that when the historical login device is acquired, only the corresponding device which executes the login of the second game account within three months is acquired; specifically, the login device can be any device of a desktop computer, a notebook computer, a tablet and a smart phone.
c) After N pieces of historical login equipment are obtained, danger marking is carried out on each piece of historical login equipment once, and a safety value of each piece of marked historical login equipment is obtained. Specifically, when performing hazard marking:
acquiring the latest login time and login times of each historical login device;
judging whether the login time is less than a third threshold value; if yes, adding 1 to the safety value when a danger mark is executed once; if not, when a danger mark is executed once, the safety value is added by 0.5;
judging whether the login times are larger than a fourth threshold value or not; if yes, adding 0.5 to the safety value when a danger mark is executed once; if not, when a danger mark is executed once, adding 1 to the safety value;
wherein, when the danger marking is executed once, the judgment result of the login times is prior to the judgment result of the login time. Based on this, when the security values generated by the two determination results are different, the generated security value is determined according to the login times.
d) Sequentially judging whether each safety value is smaller than a first threshold value;
e) if yes, marking the corresponding history login equipment as safety equipment; if not, judging whether the corresponding marking times is larger than a second threshold value or not;
f) if not, marking the corresponding historical login equipment as dangerous equipment; if yes, marking the corresponding history login equipment as blacklist equipment, and executing real-name identity record of the blacklist equipment;
g) and after the recording is finished, marking the blacklist device as the verification device. Specifically, the real-name identity record mode is as follows: the server sends real-name record reminding to corresponding equipment when judging that the historical login equipment is dangerous equipment, real-name identity information (such as names and identification numbers) can be sent back to the server according to the reminding equipment owner, the corresponding equipment is always marked as blacklist equipment in the time of not sending the real-name identity information or under the condition of refusing to feed back the real-name identity information, and after the feedback sending of the real-name identity information is completed, real-name identity records corresponding to the equipment are formed in the server and serve as verification bases for logging in games through the verification equipment subsequently.
In summary, it is easy to explain;
when the second game account A is stolen, the owner of the game account sends an account loss report request (or an account recovery request) to the server, the request time is 2020/8/3, at the moment, history login equipment of the second game account A in three months (2020/5/3-2020/8/3) in the server comprises A1/A2/A3/A4/A5/A6, and danger marking is carried out on the 6 history login equipment once;
wherein, it is assumed that the safety values of device a1, device A3, and device a4 are all 0 before the hazard marking is performed; the security values for device a2 and device a5 were 0.5 and device a6 was 3.
Wherein, before executing the danger flag, the latest login time of the device a1 is 2020/7/20, and the login times is 5 times; the latest login time of the device a2 is 2020/8/1, and the login times are 10 times; the latest login time of the device a3 is 2020/5/20, and the login times are 2; the latest login time of the device a4 is 2020/8/3, and the login times are 20; the latest login time of the device a5 is 2020/6/1, and the login times are 1; the latest login time of the device a6 is 2020/6/2, and the login times are 1;
in summary, when the risk marking is performed, the third threshold of the login time is set to be one month, namely 2020/7/3-2020/8/3, the safety value in the time is added with 0.5, and the safety value outside the time is added with 1; setting a second threshold value of the login times as 15 times, namely adding 0.5 to the safety value of which the login times exceed 15 times in three months, and adding 1 to the safety value of which the login times are lower than 15 times;
in summary, after the risk marking is performed, the safety values of the devices are obtained as follows: device a1, 0+1 ═ 1; device a2, 0.5+1 ═ 1.5; device a3, 0+1 ═ 1; device a4, 0+0.5 ═ 0.5; device a5, 0.5+1 ═ 1.5; device a6, 3+1 ═ 4.5.
If the first threshold value of the safety value is 1 and the first threshold value of the safety value is 4, then it can be known from the safety value calculated as described above that: device a1, device a2, device A3, and device a5 should all be marked as hazardous devices, device a6 should be marked as blacklisted or authenticated devices, and device a4 should be marked as secure devices.
For the 6 devices described above:
if the first game account B is subjected to game login through any one of the device A1, the device A2, the device A3 or the device A5, relevant operations corresponding to dangerous devices are executed;
if the first game account B is logged in through the device a6, the relevant operations corresponding to the blacklist device or the verification device are executed;
if the first game account B is subjected to game login through the device a4, the relevant operation corresponding to the security device is executed.
Specifically, the method comprises the following steps:
(1) and when the current login equipment is identified as the safety equipment, the login request is agreed, and the login password of the first game account is acquired from the current login equipment, so that the first game account logs in the target game.
(2) When the current login equipment is identified as dangerous equipment:
executing danger reminding in the current login equipment, and acquiring a continuous login request from the current login equipment, wherein the continuous login request comprises login verification information sent by a server to a mobile phone number bound to the first game account;
judging whether the login verification information is correct or not; if yes, the login request is approved, and the login password of the first game account is obtained from the current login equipment, so that the first game account logs in the target game.
(3) And when the current login equipment is identified as blacklist equipment, rejecting the login request.
(4) When the current login device is identified as the verification device:
executing danger reminding in the current login equipment, and acquiring a continuous login request from the current login equipment, wherein the continuous login request comprises login verification information sent by a server to a mobile phone number bound to a first game account and real-name identity record information of the current login equipment;
judging whether the login verification information and the real-name identity recording information are correct or not; and if the current login equipment is correct, the login request is approved, and the login password of the first game account is obtained from the current login equipment, so that the first game account logs in the target game.
Example 2
In the embodiment of the present invention, a security monitoring system for a game account is disclosed, and specifically, as shown in fig. 4, the security monitoring system includes the following structure:
the system comprises a receiving module 10, a login module and a display module, wherein the receiving module is used for receiving a login request of a target game, and the login request at least comprises a first game account and current login equipment which are currently requested to be logged in;
the acquisition module 20 acquires a security value of the current login device;
the identification judging module 30 is configured to identify and judge whether the current login device is the target device according to the security value acquired by the acquiring module 20;
an executing module 40 for executing corresponding operation according to the judgment result of the identification judging module 30
In this embodiment, the system is executed according to the security monitoring method for game account as set forth in embodiment 1 above.
Example 3
In an embodiment of the invention, a game server is disclosed, comprising a processor and a storage;
the storage is stored with at least one executable code; at least one executable code is loaded and executed by the processor, and when the at least one executable code is loaded and executed, the security monitoring method for the game account number proposed in the above embodiment 1 is performed.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.

Claims (10)

1. A security monitoring method for a game account is characterized by comprising the following steps:
receiving a login request sent by a first game account in a server, wherein the login request comprises current login equipment;
acquiring a security value of the current login equipment;
identifying whether the current login equipment is the target equipment or not according to the safety value, and executing corresponding operation according to an identification result;
wherein: the target device comprises a safety device, a dangerous device, a blacklist device and a verification device.
2. The method as claimed in claim 1, wherein the security monitoring method further comprises setting a security value of each login device, and the starting value of the security value is 0.
3. The security monitoring method for the game account according to claim 2, wherein the security monitoring method further comprises:
receiving a loss report request sent by a second game account in the server, and acquiring N pieces of historical login equipment of the second game account within preset time;
executing danger marking on each historical login device once, and acquiring a safety value of each marked historical login device;
sequentially judging whether each safety value is smaller than a first threshold value;
if yes, marking the corresponding history login equipment as safety equipment; if not, judging whether the corresponding marking times is larger than a second threshold value or not;
if not, marking the corresponding historical login equipment as dangerous equipment; if yes, marking the corresponding history login equipment as blacklist equipment, and executing real-name identity record of the blacklist equipment;
and after the recording is finished, marking the blacklist device as a verification device.
4. The method for monitoring the security of the game account according to claim 3, wherein when the risk marking is executed once for each historical login device, the method comprises the following steps:
acquiring the latest login time and login times of each historical login device;
judging whether the login time is smaller than a third threshold value; if yes, adding 1 to the safety value when a danger mark is executed once; if not, when a danger mark is executed once, the safety value is added by 0.5;
judging whether the login times are larger than a fourth threshold value or not; if yes, adding 0.5 to the safety value when a danger mark is executed once; if not, when a danger mark is executed once, adding 1 to the safety value;
wherein, when the danger marking is executed once, the judgment result of the login times is prior to the judgment result of the login time.
5. The method for monitoring the security of the game account according to claim 4, wherein when the current login device is identified as a security device, the method includes:
and agreeing to the login request, and acquiring a login password of the first game account from the current login equipment so as to log the first game account in the target game.
6. The method for monitoring the security of the game account according to claim 4, wherein when the current login device is identified as a dangerous device, the method comprises the following steps:
executing danger reminding in the current login equipment, and acquiring a continuous login request from the current login equipment, wherein the continuous login request comprises login verification information sent by a server to a mobile phone number bound to the first game account;
judging whether the login verification information is correct or not; if yes, the login request is approved, and the login password of the first game account is obtained from the current login equipment, so that the first game account logs in the target game.
7. The method of claim 4, wherein the login request is rejected when the current login device is identified as a blacklisted device.
8. The method for monitoring the security of the game account according to claim 4, wherein when the current login device is identified as an authentication device, the method comprises:
executing danger reminding in the current login equipment, and acquiring a continuous login request from the current login equipment, wherein the continuous login request comprises login authentication information sent by a server to a mobile phone number bound to the first game account and real-name identity record information of the current login equipment;
judging whether the login verification information and the real-name identity recording information are correct or not; and if the current login password is correct, the login request is approved, and the login password of the first game account is acquired from the current login equipment, so that the first game account logs in the target game.
9. A security monitoring system for a game account, comprising:
the system comprises a receiving module, a login module and a display module, wherein the receiving module is used for receiving a login request of a target game, and the login request at least comprises a first game account number which is requested to be logged in currently and current login equipment;
the acquisition module acquires the security value of the current login equipment;
the identification and judgment module is used for identifying and judging whether the current login equipment is the target equipment or not according to the safety value acquired by the acquisition module;
and the execution module is used for executing corresponding operation according to the judgment result of the identification judgment module.
10. A game server, characterized by: comprises a processor and a storage; the storage is stored with at least one executable code; the at least one executable code is loaded and executed by the processor, and when the at least one executable code is loaded and executed, the security monitoring method for the game account according to any one of claims 1 to 8 is implemented.
CN202010969227.2A 2020-09-15 2020-09-15 Security monitoring method, system and server for game account Active CN112138400B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010969227.2A CN112138400B (en) 2020-09-15 2020-09-15 Security monitoring method, system and server for game account

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010969227.2A CN112138400B (en) 2020-09-15 2020-09-15 Security monitoring method, system and server for game account

Publications (2)

Publication Number Publication Date
CN112138400A true CN112138400A (en) 2020-12-29
CN112138400B CN112138400B (en) 2024-05-17

Family

ID=73892693

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010969227.2A Active CN112138400B (en) 2020-09-15 2020-09-15 Security monitoring method, system and server for game account

Country Status (1)

Country Link
CN (1) CN112138400B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114733207A (en) * 2022-05-12 2022-07-12 深圳爱玩网络科技股份有限公司 Game account monitoring, analyzing, early warning and managing system based on feature analysis

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104144419A (en) * 2014-01-24 2014-11-12 腾讯科技(深圳)有限公司 Identity authentication method, device and system
CN106230710A (en) * 2016-09-14 2016-12-14 广东欧珀移动通信有限公司 A kind of information synchronization method and device
CN108295477A (en) * 2018-01-26 2018-07-20 珠海金山网络游戏科技有限公司 A kind of game account safety detection method, system and device based on big data
CN108875327A (en) * 2018-05-28 2018-11-23 阿里巴巴集团控股有限公司 One seed nucleus body method and apparatus
CN109617901A (en) * 2018-12-29 2019-04-12 上海点融信息科技有限责任公司 Determine the method and device thereof of white list
CN110738392A (en) * 2019-09-10 2020-01-31 上海派拉软件股份有限公司 Single-terminal multi-user wind control modeling method based on Bayesian network model
CN111191215A (en) * 2019-11-25 2020-05-22 深圳市跨越新科技有限公司 Safety equipment identification method and system
CN111311285A (en) * 2020-02-21 2020-06-19 深圳壹账通智能科技有限公司 Method, device, equipment and storage medium for preventing user from illegally logging in

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104144419A (en) * 2014-01-24 2014-11-12 腾讯科技(深圳)有限公司 Identity authentication method, device and system
CN106230710A (en) * 2016-09-14 2016-12-14 广东欧珀移动通信有限公司 A kind of information synchronization method and device
CN108295477A (en) * 2018-01-26 2018-07-20 珠海金山网络游戏科技有限公司 A kind of game account safety detection method, system and device based on big data
CN108875327A (en) * 2018-05-28 2018-11-23 阿里巴巴集团控股有限公司 One seed nucleus body method and apparatus
CN109617901A (en) * 2018-12-29 2019-04-12 上海点融信息科技有限责任公司 Determine the method and device thereof of white list
CN110738392A (en) * 2019-09-10 2020-01-31 上海派拉软件股份有限公司 Single-terminal multi-user wind control modeling method based on Bayesian network model
CN111191215A (en) * 2019-11-25 2020-05-22 深圳市跨越新科技有限公司 Safety equipment identification method and system
CN111311285A (en) * 2020-02-21 2020-06-19 深圳壹账通智能科技有限公司 Method, device, equipment and storage medium for preventing user from illegally logging in

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114733207A (en) * 2022-05-12 2022-07-12 深圳爱玩网络科技股份有限公司 Game account monitoring, analyzing, early warning and managing system based on feature analysis

Also Published As

Publication number Publication date
CN112138400B (en) 2024-05-17

Similar Documents

Publication Publication Date Title
KR102138965B1 (en) Account theft risk identification method, identification device, prevention and control system
CN106529288A (en) Account risk identification method and device
CN109660556B (en) User login method, device, equipment and storage medium based on information security
CN104954350B (en) Account information protection method and system
CN107465642B (en) Method and device for judging abnormal login of account
CN102231745A (en) Safety system and method for network application
CN105763548A (en) User login identification method based on behavior model and equipment and system thereof
CN112953917B (en) Network attack source identification method and device, computer equipment and storage medium
CN105516211A (en) Method, device and system for recognizing database accessing behaviors based on behavior model
CN105656867A (en) Monitoring method and device for account theft event
CN105471842A (en) Network safety analysis method under big data environment
CN106127463B (en) Transfer control method and terminal equipment
CN110049028A (en) Monitor method, apparatus, computer equipment and the storage medium of domain control administrator
CN107705126B (en) Transaction instruction processing method and device
CN110839003A (en) Method and device for identifying number stealing behavior, computer equipment and storage medium
CN112138400A (en) Security monitoring method, system and server for game account
CN107040497B (en) Network account anti-theft method and device
CN107888576B (en) Anti-collision library safety risk control method using big data and equipment fingerprints
CN111814121B (en) Login authentication management system and method based on computer system
KR101576993B1 (en) Method and System for preventing Login ID theft using captcha
CN111191215A (en) Safety equipment identification method and system
CN101222481B (en) Method and client terminal for safely submitting user information
CN107888593A (en) One kind logs in safety patrol system
CN108881235B (en) Method and system for identifying account
CN112765588B (en) Identity recognition method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant