CN111132128B - Account control method and device - Google Patents

Account control method and device Download PDF

Info

Publication number
CN111132128B
CN111132128B CN201911400756.4A CN201911400756A CN111132128B CN 111132128 B CN111132128 B CN 111132128B CN 201911400756 A CN201911400756 A CN 201911400756A CN 111132128 B CN111132128 B CN 111132128B
Authority
CN
China
Prior art keywords
account
mobile phone
phone number
target
application program
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911400756.4A
Other languages
Chinese (zh)
Other versions
CN111132128A (en
Inventor
孙大祥
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201911400756.4A priority Critical patent/CN111132128B/en
Publication of CN111132128A publication Critical patent/CN111132128A/en
Application granted granted Critical
Publication of CN111132128B publication Critical patent/CN111132128B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/183Processing at user equipment or user record carrier
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/18Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/068Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/72Subscriber identity

Abstract

The invention provides an account control method and device. The method comprises the following steps: when the verification of a first account login request of a target application program on target electronic equipment fails, acquiring a first mobile phone number bound to a first account of the target application program and a second mobile phone number corresponding to an SIM card on the target electronic equipment; if the first mobile phone number is different from the second mobile phone number and the first contact information associated with both the first mobile phone number and the second mobile phone number meets a preset condition, storing data bound with the first account of the target application program to a target account corresponding to the second mobile phone number, or sending a verification code for retrieving the password of the first account to the second mobile phone number through a server of the target application program. When the mobile phone number bound to the account of the electronic equipment is invalid and the user forgets the account password, the method and the device can provide the data bound with the account.

Description

Account control method and device
Technical Field
The invention relates to the technical field of equipment control, in particular to an account control method and device.
Background
With the popularization of electronic devices, users often own a plurality of electronic devices (such as mobile phones), and each mobile phone has a phone card. In addition, the current electronic device is generally an intelligent terminal, and a user needs to register a system application account of the electronic device when activating and using the electronic device for the first time, and generally registers the account by using a mobile phone number as an account number. In addition, when a user uses various applications on the electronic device, the user needs to register an account of the application with a mobile phone number as an account number. The application service provided by the electronic device is bound to the application account.
Then when a user's cell phone is not used for a long period of time such that the account (system application account or general application account) being logged in is already in a logged-out state, if the user wants to retrieve service data under the account, the account needs to be logged in on the cell phone. However, if the cell phone number registered for the cell phone bound account has expired (e.g., has been down and distributed for use by other users), and the user has forgotten the login password for the account, the user will not be able to reset the password through the cell phone number. Moreover, the mobile phone cannot be restored to factory settings without the login password.
Therefore, when the mobile phone number bound to the application account of the electronic device fails and the user forgets the account password, the user cannot use the application service bound to the application account of the mobile phone, and there is a risk that the personal backup data bound to the account and property are lost.
Disclosure of Invention
The embodiment of the invention provides an account control method and device, and aims to solve the problem that data bound with an application account of electronic equipment is difficult to acquire when a mobile phone number bound with the application account of the electronic equipment is invalid and a user forgets an account password in the related art.
In order to solve the technical problem, the invention is realized as follows:
in a first aspect, an embodiment of the present invention provides an account control method, where the method includes:
when the verification of a first account login request of a target application program on target electronic equipment fails, acquiring a first mobile phone number bound to a first account of the target application program and a second mobile phone number corresponding to an SIM card on the target electronic equipment;
if the first mobile phone number is different from the second mobile phone number and the first contact information associated with both the first mobile phone number and the second mobile phone number meets a preset condition, storing data bound with the first account of the target application program to a target account corresponding to the second mobile phone number, or sending a verification code for retrieving the password of the first account to the second mobile phone number through a server of the target application program.
In a second aspect, an embodiment of the present invention further provides an account control apparatus, where the apparatus includes:
the system comprises a first acquisition module, a second acquisition module and a third acquisition module, wherein the first acquisition module is used for acquiring a first mobile phone number bound to a first account of a target application program and a second mobile phone number corresponding to a SIM card on target electronic equipment when the first account login request of the target application program fails to be verified on the target electronic equipment;
and the control module is used for storing the data bound with the first account of the target application program to a target account corresponding to the second mobile phone number or sending a verification code for retrieving the password of the first account to the second mobile phone number through a server of the target application program if the first mobile phone number is different from the second mobile phone number and the first contact information associated with both the first mobile phone number and the second mobile phone number meets a preset condition.
In a third aspect, an embodiment of the present invention further provides an electronic device, including: a memory, a processor and a computer program stored on the memory and executable on the processor, the computer program, when executed by the processor, implementing the steps of the account control method.
In a fourth aspect, an embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when being executed by a processor, the computer program implements the steps of the account control method.
In the embodiment of the invention, when the verification of the login request of the first account of the target application program fails on the target electronic equipment, the first mobile phone number bound to the first account of the target application program and the second mobile phone number corresponding to the SIM card of the target electronic equipment are obtained, and whether the two mobile phone numbers are the mobile phone numbers of the same person or not is judged by using whether the common contact information associated with the two mobile phone numbers meets the preset condition or not, so that under the condition that the preset condition is met, the data bound to the first account of the target application program are stored to the target account corresponding to the second mobile phone number, or the server of the target application program sends a verification code for retrieving the password of the first account to the second mobile phone number, so that when the mobile phone number bound to the first account of the target electronic equipment fails, the verification code of the first mobile phone number bound to the second mobile phone number is used for retrieving, And when the user forgets the password of the first account, the method of the embodiment of the invention can utilize the common contact information of the two mobile phone numbers to enable the data of the target electronic equipment bound with the first account to be acquired by the user.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments of the present invention will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to these drawings without inventive labor.
FIG. 1 is a flow chart of an account control method of one embodiment of the present invention;
FIG. 2A is a first diagram of contact information, according to an embodiment of the present invention;
FIG. 2B is a diagram of contact information according to an embodiment of the invention;
FIG. 3A is a diagram of contact information of one embodiment of the present invention;
FIG. 3B is a diagram of contact information, four, in accordance with one embodiment of the present invention;
FIG. 3C is a diagram of contact information of five in accordance with one embodiment of the present invention;
FIG. 3D is a diagram six of contact information, according to one embodiment of the invention;
FIG. 4 is a schematic diagram of a terminal interface of one embodiment of the present invention;
FIG. 5 is a block diagram of an account control apparatus according to one embodiment of the present invention;
fig. 6 is a schematic diagram of a hardware structure of an electronic device according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to FIG. 1, a flow diagram of an account control method of one embodiment of the present invention is shown.
The method may be applied to the target electronic device and may also be applied to the server, and the application to the electronic device is described as an example later.
The method may specifically comprise the steps of:
step 101, when a first account login request of a target application program fails to be verified on target electronic equipment, acquiring a first mobile phone number bound to a first account of the target application program and a second mobile phone number corresponding to a SIM card on the target electronic equipment;
the target application program may be a system application bound with a device service of the electronic device (an application for activating and using the electronic device for the first time, a user needs to log in a first account of the system application, the first account being used for providing a terminal service), or may be a non-system application provided by each software development platform (after the electronic device is activated, various applications installed on the electronic device, a user needs to log in a first account of the application, the first account being used for providing an application service).
Taking the target application program as the system application as an example, the first account is an account for providing terminal services for the electronic device, the user needs to register the first account by using a mobile phone number when using the electronic device for the first time, and the mobile phone number for registering the first account is a mobile phone number bound to the first account, that is, the first mobile phone number here. Similarly, when the target application program is a non-system application provided by the software development platform, the first mobile phone number bound with the first account is a mobile phone number used by the non-system application during registration.
For convenience of explanation, the following description takes the target application as an example of system application, and when the target application is non-system application, the principles are similar, and are not described in detail and referred to each other.
For example, when a user wants to log in an account of the electronic device to use a terminal service bound to the account, a first account login request for a target application program may be triggered on the target electronic device side, and the target electronic device may verify the first account login request; optionally, the target electronic device may also send the first account login request to the server.
The first account login request may carry a mobile phone number and a login password, but when the server or the target electronic device (e.g., a mobile phone) authenticates the account login request, if the authentication result is authentication failure, it indicates that the mobile phone number or the login password in the account login request is wrong. In this example scenario, it is a password entry error. Therefore, this step may obtain the first phone number bound to the first account of the target application program of the target electronic device. When the mobile phone number in the first account login request is correct, the first mobile phone number can be acquired from the first account login request.
It should be noted that, as for a real owner (e.g., the user 1) of the target electronic device, a scenario applied in the embodiment of the present invention is that the first phone number bound to the first account is invalid (e.g., the target electronic device, e.g., the phone 1, is not used for a long time, and the first phone number, e.g., the a number, has been stopped for more than three months, and the operator has recovered the a number and redistributed the other users, so the a number does not belong to the user 1), so when the user 1 wants to log in the first account, although it is known that the account is the a number, the password is forgotten, and when the password is retrieved, the server sends the authentication code to the a number, so the user 1 cannot use the phone 1 to receive the authentication code to reset the password of the account.
For example, user 1 (xiaoming) has one mobile phone and has two SIM cards (Subscriber Identity modules), one card being the a number 18014749324 and the other card being the B number 18014749325. The A number is registered in the mobile phone for the first account, the password of the first account is forgotten, and the A number is stopped, so that the password cannot be retrieved through the A number. And the password cannot be retrieved, so that the user cannot use the terminal service of the first account bound with the A number of the mobile phone. Even if the mobile phone is required to be restored to the factory value setting, the password of the first account still needs to be input, so that the factory value cannot be restored, and the terminal service bound with the A number in the current mobile phone is difficult to be obtained clearly.
Then, in order to solve the above problem, in the embodiment of the present invention, another SIM card, which is a B number, may be reinserted into the handset. Although the mobile phone is inserted with the SIM card of the a number before the SIM card of the B number is inserted, the SIM card of the a number is already invalid, so the server cannot acquire the a number from the SIM card of the mobile phone, but when the authentication of the first account login request is performed, if the authentication fails, the a number (i.e. the first mobile phone number) may be acquired from the first account login request or directly acquired from an account number locally stored by the server and bound to the first account.
However, since the SIM card with the B number is newly inserted, after the mobile phone or the server verifies the first account login request of the mobile phone, if the verification fails, the mobile phone side may acquire the number of the inserted SIM, that is, the B number (here, the second mobile phone number).
Therefore, the present invention does not limit the execution sequence between the two steps of acquiring the first mobile phone number and acquiring the second mobile phone number. They are all triggered after authentication failure for the first account login request and there may be a condition that the target electronic device has an unproductive SIM inserted for the acquisition of the second phone number.
Optionally, in an embodiment, for the trigger timing of acquiring the two mobile phone numbers, the number of times that the first account login request fails to be continuously verified may reach an upper limit (for example, 6 times).
And, the timing of inserting the SIM card of the B-number into the mobile phone may be before the number of consecutive authentication failures reaches the upper limit number.
In one example, xiaoming uses the a number to log in the first account, but the input password is verified for 5 times in succession to indicate an input error, then the user inserts the SIM card of the B number into the handset and tries to input the password of the first account corresponding to the a number again, but still inputs the error, so the number of times of verification failure reaches 6 times in succession, then the handset side can judge whether the a number and the B number are the same, if not, step 102 is executed.
And 102, if the first mobile phone number is different from the second mobile phone number and the first contact information associated with both the first mobile phone number and the second mobile phone number meets a preset condition, storing data bound with the first account of the target application program to a target account corresponding to the second mobile phone number, or sending a verification code for retrieving the password of the first account to the second mobile phone number through a server of the target application program.
In order to ensure that an a number (namely, a first mobile phone number) bound to a first account of a mobile phone and a B number (namely, a second mobile phone number) corresponding to an SIM card inserted into the mobile phone are the mobile phone number of the same user, instead of a thief stealing the SIM card inserted into the mobile phone to use the mobile phone, in the embodiment of the present invention, whether to retrieve a password for the first account may be determined by judging whether first contact information associated with both the first mobile phone number and the second mobile phone number satisfies a preset condition.
In this step, when the mobile phone side determines that the a number is different from the B number, the a group contact information associated with the a number and the B group contact information associated with the B number may be further obtained through a big data technology, and it may be further determined whether the same first contact information exists in the a group contact information and the B group contact information, if the first contact information exists, it may be further determined whether the first contact information satisfies a preset condition, and if the first contact information satisfies the preset condition, the data bound to the first account of the target application program may be stored to the target account corresponding to the second mobile phone number, or a verification code for retrieving the password of the first account may be sent to the second mobile phone number through the server of the target application program.
The contact information according to the embodiments of the present invention may include a contact name (name or nickname) and a mobile phone number.
In addition, for the association relationship between a certain mobile phone number and the contact information, the association relationship may include association through a mobile phone address book (for example, the contact information in the mobile phone number address book corresponding to the a number is all the contact information of the a group), and may also include association through a friend relationship of the instant messaging software (for example, a friend list of the account 1 of the instant messaging APP to which the a number is bound may be the contact information of the a group).
In one example, fig. 2A illustrates a group contact information associated with an a-number and fig. 2B illustrates a group B contact information associated with a B-number.
As shown in fig. 2A, the list of the contact information in group a includes the mobile phone numbers of users such as zhang san, li xi, wang wu, and zhao liu; as shown in fig. 2B, the list of the contact information in group B includes the mobile phone numbers of users such as zhang san, li yi si, wang wu and zhao liu.
Therefore, the same first contact information exists between the group a contact information and the group B contact information (when it is determined whether the same first contact information exists, based on the telephone number, if the telephone number in one contact option exists in both the group a contact information and the group B contact information, the contact option may constitute the first contact information, for example, the name of zhangsan in the group a contact information is zhangsan, the name of zhangsan in the group B contact information is zhangsan, but the corresponding telephone numbers thereof are the same), including zhangsan and its telephone number, liquad and its telephone number, wangwei and its telephone number, and zhaoliu and its telephone number.
Obviously, the number of the contact persons corresponding to the first contact information may be one or more, and the present invention is not limited to this.
That is, the first contact information is contact information illustrating a common contact stored on both the two phone cards.
Then, the mobile phone side determines that the first contact information exists through judgment, and whether the first contact information meets a preset condition can be further judged;
and if the first contact information meets the preset condition, storing the data bound with the first account of the target application program to the target account corresponding to the second mobile phone number, or sending a verification code for retrieving the password of the first account to the second mobile phone number through a server of the target application program.
In order to facilitate the user at the target electronic device side to log in the first account registered with the a number, the target electronic device side may merge the account 1 (first account) of the target electronic device registered with the a number with the account 2 of the target electronic device registered with the B number, and the specific implementation manner may be to store the data bound to the account 1 to the account 2 corresponding to the B number (i.e., the target account).
In this way, the xiaoming can directly use the B number of the account 2 and the corresponding password to log in the account 2 of the mobile phone, and can provide the data associated with the account 1 in the terminal interface of the account 2.
Alternatively, the account merging may be implemented by transferring the data bound to account 1 to account 2 corresponding to the B number (i.e., the target account), so as to avoid the normal user of the a number from using the data of the small account 1 by retrieving the password.
Or, in order to facilitate the user at the target electronic device side to log in the first account registered with the a number, a verification code for retrieving the password of the account 1 (the first account) may be sent to the B number through a server corresponding to the target application program, and since the a number has failed, the verification code is sent to the a number side, so that the xiaoming cannot receive the verification code, and here, by sending to the B number side, the target electronic device inserted with the SIM card of the B number may receive the verification code, thereby resetting the password of the account 1, so that the xiaoming may log in the account 1 with the a number and the reset password on the target electronic device, i.e., the mobile phone, to obtain the data associated with the account 1.
In the embodiment of the invention, when the verification of the login request of the first account of the target application program fails on the target electronic equipment, the first mobile phone number bound to the first account of the target application program and the second mobile phone number corresponding to the SIM card of the target electronic equipment are obtained, and whether the two mobile phone numbers are the mobile phone numbers of the same person or not is judged by using whether the common contact information associated with the two mobile phone numbers meets the preset condition or not, so that under the condition that the preset condition is met, the data bound to the first account of the target application program are stored to the target account corresponding to the second mobile phone number, or the server of the target application program sends a verification code for retrieving the password of the first account to the second mobile phone number, so that when the mobile phone number bound to the first account of the target electronic equipment fails, the verification code of the first mobile phone number bound to the second mobile phone number is used for retrieving, And when the user forgets the password of the first account, the method of the embodiment of the invention can utilize the common contact information of the two mobile phone numbers to enable the data of the target electronic equipment bound with the first account to be acquired by the user.
For example, if a user registers a first account of a target electronic device with an a number, and the a number is invalid for the user, and the password of the first account cannot be retrieved, the embodiment of the present invention may identify, through a big data intelligent system, whether the a number forgotten the password in the mobile phone and the B number of the SIM card inserted into the mobile phone are the mobile phone numbers of the same user, so as to help the user merge the first account of the mobile phone with the B number, that is, replace the invalid mobile phone number in the a number with the B number; or, the user can reset the password of the first account of the mobile phone with the number a through the number B, so as to avoid the brick forming of the mobile phone of the user, and the user can acquire the data bound to the first account corresponding to the number a again, such as personal backup data and property data.
Optionally, in an embodiment, the first contact information satisfies a preset condition, and specifically includes:
the number of target contacts in the first contact information is greater than or equal to a first preset threshold, and notes corresponding to the first mobile phone number and the second mobile phone number in an address book of at least one target contact are the same, wherein the address book of the target contact comprises the first mobile phone number and the second mobile phone number.
That is to say, when it is determined whether the first contact information satisfies the preset condition, when the number of the target contacts in the first contact information is greater than a first preset threshold (for example, 3), and the notes corresponding to the first mobile phone number and the second mobile phone number in the address book of at least one target contact are the same, where the address book of the target contact includes both the first mobile phone number and the second mobile phone number, it is determined that the first contact information satisfies the preset condition.
The address book may be a mobile phone number address book, or an instant messaging software address book (i.e. a buddy list).
Specifically, the mobile phone side may use a big data technology to obtain, for each first contact information, the second contact information associated therewith. That is, each first contact information may correspond to one set of second contact information, so that multiple sets of second contact information may be obtained here.
For example, fig. 3A, 3B, 3C, and 3D respectively show a backup contact list associated with the mobile phone number of zhang three (i.e., the second contact information associated with the contact information of zhang three), a backup contact list associated with the mobile phone number of lie four (i.e., the second contact information associated with the contact information of zhang four), a backup contact list associated with the mobile phone number of wang five (i.e., the second contact information associated with the contact information of wang five), and a backup contact list associated with the mobile phone number of zhao six (i.e., the second contact information associated with the contact information of zhao six).
The four drawings of fig. 3A to 3D can be seen:
contacts of the account number of Zhang III (here, a mobile phone number) comprise a user 31, a user 32, a user 33, Xiaoming (18014749324), Xiaoming 2 (18014749325);
the contacts of the account number of lie four include user 41, user 42, user 43, xiaoming (18014749324), xiaoming 2 (18014749325);
the contacts of the account number of wangwu include user 51, user 52, user 53, xiaoming (18014749324), xiaoming 2 (18014749325);
contacts of the Zhao six account include user 61, user 62, user 63, Xiaoming (18014749324, 18014749325).
It can be seen that the four first contacts corresponding to the first contact information here are zhang, lie four, wang five and zhao six, and all the four first contacts include the first mobile phone number (18014749324) and the second mobile phone number (18014749325) in the address book shown in fig. 3A to 3D, and the number of the target contacts (zhang, lie four, wang five and zhao six) storing the two mobile phone numbers is 4 in all the four first contacts, and one target contact exists in all the four target contacts, and the name of the contact remarked to the first mobile phone number and the second mobile phone number in the address book is small. Accordingly, it may be determined that the first contact information satisfies the preset condition.
Thus, in the embodiment of the present invention, if the number of target contacts in a common contact of a first phone number and a second phone number is greater than or equal to a first preset threshold, and the address book of the target contact or the buddy book of the instant messaging software both include the two phone numbers, and at least one target contact has the same remark (for example, contact name) for the two phone numbers in the address book or the buddy book, it indicates that the two phone numbers are the phone numbers of the same user, so that data bound to a first account of the target application program can be stored in a target account corresponding to the second phone number, or a server of the target application program sends a verification code for retrieving a password of the first account to the second phone number, so that when the phone number bound to the first account of the target electronic device fails, When the user forgets the password of the first account, the method of the embodiment of the invention can utilize the common contact information of the two mobile phone numbers to enable the data of the target electronic equipment bound with the first account to be acquired by the user, improve the account control accuracy and avoid the password from being stolen by an illegal user.
Optionally, in an embodiment, the first contact information satisfies a preset condition, and specifically includes:
the number of the contacts corresponding to the first contact information is greater than or equal to a third preset threshold (for example, 4).
In the examples shown in fig. 3A to 3D, the number of the contacts corresponding to the first contact information is 4, so that the first contact information satisfies the preset condition.
Therefore, in the embodiment of the invention, when the number of the contacts of the first contact information associated with both the first mobile phone number and the second mobile phone number is greater than or equal to the third preset threshold, the target electronic equipment is assisted to accurately log in the target application program, so that the number of the common contacts of the two mobile phone numbers can be enough, the two mobile phone numbers can be assisted to be judged as the number of the same user, and the account control accuracy is improved.
Optionally, in an embodiment, the first contact information satisfies a preset condition, and specifically includes:
the number of the contact persons corresponding to the first contact person information is larger than or equal to a third preset threshold value, and the users corresponding to the first contact person information are all personal users.
For example, the number of the common contacts is 4 or more, the third preset threshold is 4, and the users (i.e., the contacts) corresponding to the first contact information are all personal users (that is, the mobile phone numbers may also be public numbers associated with phone numbers, such as public numbers and fire calls, backed up on both sides of the two phone numbers, and therefore, it is required to ensure that all four common contacts are personal users), it may be determined that the first contact information satisfies the preset condition.
In the embodiment of the invention, when the number of the contacts of the first contact information associated with the first mobile phone number and the second mobile phone number is greater than or equal to a third preset threshold value and the users corresponding to the first contact information are all individual users, the target electronic equipment is assisted to accurately log in the target application program, so that the sufficient number of the common contacts of the two mobile phone numbers can be ensured, the two mobile phone numbers can be assisted to judge that the two mobile phone numbers are the same user number, and the judgment accuracy is improved; furthermore, when the user corresponding to the first contact person information is a personal user, the first contact person information is confirmed to meet the preset condition, the situation that the address book information of the public number or the enterprise number cannot be acquired can be avoided, unnecessary calculation is reduced, account control efficiency is improved, and account control accuracy is improved.
Optionally, if only the users corresponding to part of the first contact information in the plurality of sets of first contact information are personal users, the number of contacts in the part of the first contact information is greater than or equal to a third preset threshold.
In the embodiment of the invention, when the number of the contacts of the individual user in the first contact information associated with the first mobile phone number and the second mobile phone number is greater than or equal to a third preset threshold value, the target electronic equipment is assisted to accurately log in the target application program, so that the number of the common contacts of the two mobile phone numbers is enough, the two mobile phone numbers can be assisted to judge that the two mobile phone numbers are the numbers of the same user, and the judgment accuracy is improved; furthermore, when the user corresponding to the first contact person information is a personal user, the first contact person information is confirmed to meet the preset condition, the situation that the address book information of the public number or the enterprise number cannot be acquired can be avoided, unnecessary calculation is reduced, account control efficiency is improved, and account control accuracy is improved.
Optionally, in an embodiment, the first contact information satisfies a preset condition, and specifically includes:
the contact intimacy degree between the first contact information and the first mobile phone number is larger than or equal to a fourth preset threshold value, and/or the contact intimacy degree between the first contact information and the second mobile phone number is larger than or equal to the fourth preset threshold value.
In one example, parameters characterizing contact closeness may include, but are not limited to, frequency of contacts within a recent period of time, length of interval between a time of a recent contact and a current time, and the like. The contact closeness may be a weighted result of the various parameters described above.
In the embodiment of the invention, when the contact intimacy degree between the first contact information associated with the first mobile phone number and the second mobile phone number and the first mobile phone number and/or the second mobile phone number is higher, the two mobile phone numbers are considered to be the mobile phone numbers of the same user, and the account control accuracy can be improved.
It should be noted that, the limitation manners described in relation to the embodiments of the present invention that the first contact information satisfies the preset condition may be combined with each other, that is, the protection scope is not limited to the range defined by the enumerated embodiments that the single first contact information satisfies the preset condition.
Optionally, in an embodiment, before the step of saving the data bound to the first account of the target application to the target account corresponding to the second phone number in step 102, or sending, by the server of the target application, the verification code for retrieving the password of the first account to the second phone number, the method according to the embodiment of the present invention may further include: s201 to S202;
s201, acquiring authentication information about the first account, which is reported by the target electronic equipment by taking the second mobile phone number as a communication number, wherein the authentication information comprises usage log information of the first mobile phone number and password record information corresponding to the first account;
continuing with the example in the above embodiment, after the SIM card of the B-number is inserted into the mobile phone, the mobile phone may be used to dial a service phone of the mobile phone to complain that the a-number bound to the first account of the mobile phone is a previously used mobile phone number.
For example, the complaint data includes a common place where a call is made using the a-number, charging record information for the a-number (for example, how much money is charged through a certain channel at a certain time), and a password used by the first account with the a-number as an account.
The target electronic device of the embodiment of the present invention may acquire the authentication data, which is reported by using the B number as the communication number and relates to the first account of the mobile phone with the a number as the account number.
The authentication data is generated by summarizing and refining the complaint data, and specifically includes usage log information of the first mobile phone number (for example, location information of a number that is frequently used, charge record information of a number that is frequently used), and password record information corresponding to the first account (for example, an old password that was used by the first account with the a number as an account).
In this step, since the authentication data is reported by the mobile phone with the B number as the communication number, it can be more probably described that the authentication data is the information about the a number provided by the legitimate user of the B number, so the authentication data can be used as an evidence to assist in proving that the use of the B number is also a user who uses the a number to register the first account, and is unlikely to be a customer service telephone that a thief steals the mobile phone and uses his own mobile phone card, i.e., the B number to dial.
S202, carrying out weighting operation on the authentication information to generate a confidence coefficient;
different types of data in the authentication data are preset with different weights.
The target electronic device can utilize big data technology to match each item of real data corresponding to each item of acquired authentication data with the corresponding real data, multiply the matching degree by the weight corresponding to the item of data to obtain a multiplication result corresponding to the item of data, and finally add the multiplication results corresponding to all items of data in the authentication data to obtain the confidence coefficient.
For example, authentication data includes a frequent call at X1, a 100-dollar charge through some payment software at time t1, a password of 123;
the target electronic equipment of the embodiment of the invention utilizes big data technology to obtain the location information of the frequently dialed call of the A number from the server side of the operator, and judges whether the location information comprises the X1 location; and judging whether the A number is charged with 100 yuan at the time t1 through the payment software by using the big data technology, and whether an old password corresponding to the first account of the target electronic device, which acquires the A number as the registration number from the operator server by using the big data technology, includes 123.
In the above judgment, if the judgment result is yes, the matching degree is 1, and if the judgment result is no, the matching degree is 0; if the matching degree is judged to be 1, the matching degrees are all 1. If the weight of the frequently used place for dialing is w1, the weight of the recharging record information is w2, and the weight of the first account password is w3, the confidence coefficient is w1+ w2+ w 3.
After S201 and S202, when the confidence is greater than a second preset threshold, the step of saving the data bound with the first account of the target application program to the target account corresponding to the second phone number, or sending a verification code for retrieving the password of the first account to the second phone number through the server of the target application program is executed.
Optionally, S201 and S202 may be executed before determining whether the first contact information satisfies the preset condition, or may be executed after the determining step, which is not limited in the present invention.
In the embodiment of the present invention, when determining whether the first phone number and the second phone number are the phone numbers of the same user, not only is the determination made by using whether the common contact of the two phone numbers meets the preset condition, but also whether the confidence corresponding to the authentication signal of the first account corresponding to the first phone number reported by the target electronic device using the second phone number as the communication identifier is greater than the second preset threshold value is further determined to roughly determine that the two phone numbers are the phone numbers of the same person, so as to improve the determination accuracy of whether the two phone numbers are the same person.
In addition, when the step S201 and the step S202 are executed before the step S201 and the step S202 determine whether the first contact information satisfies the preset condition, the step of determining whether the first contact information satisfies the preset condition may be executed when the confidence is greater than the second preset threshold, so that, when the confidence is higher, the first contact information may be reused to determine whether the two mobile phone numbers are mobile phone numbers of the same user, thereby avoiding the waste of computing resources of the electronic device due to the determination by using the contact information when the confidence is lower, because the determination result is more likely than the mobile phone numbers of the same user, in this way, when the account is controlled, the processing efficiency of the electronic device may be improved.
Optionally, when the step of saving the data bound to the first account of the target application program to the target account corresponding to the second phone number is executed, or sending a verification code for retrieving the password of the first account to the second phone number through the server of the target application program, the first information and the second information may be output; if the preset input of the first information is received, storing the data bound with the first account into a target account corresponding to the second mobile phone number; or if the preset input of the second information is received, sending a verification code for retrieving the password of the first account to the second mobile phone number through the server of the target application program.
Specifically, when it is confirmed that the first contact information meets the preset condition, the first information and the second information may be output as shown in fig. 4, a dialog box as shown in fig. 4 is displayed in an interface of the target electronic device, the dialog box may display that "big data background detects that your a account password is lost, and confirms that both a card B and a card a inserted by you are your own, you may select the following scheme |! "the text content corresponding to the first information is" merge A, B account number "in fig. 4, and the text content corresponding to the second information is" retrieve a password of a card using B card assistance "in fig. 4.
The user can select an option corresponding to the first information or an option corresponding to the second information.
When the option corresponding to the first information is selected for a short time, the target electronic device side may receive a preset input of the first information, and store the data bound to the first account to the target account, or further transfer the data bound to the first account (account 1) from the account 1 to the target account corresponding to the second phone number (i.e., B number). If the B number does not register the account of the target application program, the user may be prompted to register an account 2 (target account) of the target application program with the B number, and then, the data bound to the account 1 is transferred or saved to the account 2 corresponding to the B number.
And when the second information is selected by the Xiaoming, receiving preset input of the second information, and sending a verification code for retrieving the password of the first account (account 1) to the B number through the server of the target application program.
In the embodiment of the invention, when the first mobile phone number and the second mobile phone number are determined to be the mobile phone numbers of the same user, the data corresponding to the first account with the lost password can be acquired by outputting the first information and the second information so that the user can select a mode of combining the accounts or a mode of retrieving the password of the first account with the lost password, so that the retrieving mode of the account data is more flexible.
Referring to fig. 5, a block diagram of an account control apparatus according to an embodiment of the present invention is shown, applied to a server. The account control device of the embodiment of the invention can realize the details of the account control method in the embodiment and achieve the same effect. The account control apparatus shown in fig. 5 includes:
a first obtaining module 301, configured to obtain, when verification of a first account login request of a target application program on a target electronic device fails, a first mobile phone number bound to a first account of the target application program and a second mobile phone number corresponding to a SIM card on the target electronic device;
a control module 302, configured to, if the first mobile phone number is different from the second mobile phone number and first contact information associated with both the first mobile phone number and the second mobile phone number meets a preset condition, store data bound to the first account of the target application program to a target account corresponding to the second mobile phone number, or send, by a server of the target application program, a verification code for retrieving a password of the first account to the second mobile phone number.
Optionally, the control module 302 includes:
and the first confirming sub-module is configured to confirm that the first contact information meets a preset condition if it is confirmed that the number of the target contacts in the first contact information is greater than or equal to a first preset threshold value and the remarks corresponding to the first mobile phone number and the second mobile phone number in the address book of at least one target contact are the same, where the address book of the target contact includes the first mobile phone number and the second mobile phone number.
Optionally, the apparatus further comprises:
a second obtaining module, configured to obtain authentication information about the first account, which is reported by the target electronic device using the second mobile phone number as a communication identifier, where the authentication information includes usage log information of the first mobile phone number and password record information corresponding to the first account;
the operation module is used for carrying out weighted operation on the authentication information to generate confidence;
the control module 302 is further configured to, if the confidence is greater than a second preset threshold, store the data bound to the first account of the target application program to the target account corresponding to the second phone number, or send, by the server of the target application program, a verification code for retrieving the password of the first account to the second phone number.
Optionally, the control module 302 includes:
and the second confirming submodule is used for confirming that the first contact information meets the preset condition if the number of the contacts corresponding to the first contact information is larger than or equal to a third preset threshold value and the users corresponding to the first contact information are all personal users.
Optionally, the control module 302 includes:
the output submodule is used for outputting the first information and the second information;
the merging submodule is used for storing the data bound with the first account to a target account corresponding to the second mobile phone number if the preset input of the first information is received;
and the retrieving submodule is used for sending a verification code for retrieving the password of the first account to the second mobile phone number through the server of the target application program if the preset input of the second information is received.
The account control device provided by the embodiment of the invention can realize each process realized by the server in the above method embodiments, and is not described herein again to avoid repetition.
The account control device obtains a first mobile phone number bound to a first account of a target application program and a second mobile phone number corresponding to an SIM card of the target electronic equipment through the modules when the verification of a login request of the first account of the target application program fails on the target electronic equipment, and judges whether the two mobile phone numbers are the same person's mobile phone number by using whether common contact information associated with the two mobile phone numbers meets a preset condition, so that data bound to the first account of the target application program is stored to the target account corresponding to the second mobile phone number under the condition that the preset condition is met, or a verification code for retrieving a password of the first account is sent to the second mobile phone number through a server of the target application program, so that the mobile phone number bound to the first account of the target electronic equipment fails, And when the user forgets the password of the first account, the method of the embodiment of the invention can utilize the common contact information of the two mobile phone numbers to enable the data of the target electronic equipment bound with the first account to be acquired by the user.
Fig. 6 is a schematic diagram of a hardware structure of an electronic device for implementing various embodiments of the present invention, where the electronic device may be a target electronic device in the above embodiments, and may also be a server.
The electronic device 400 includes, but is not limited to: radio frequency unit 401, network module 402, audio output unit 403, input unit 404, sensor 405, display unit 406, user input unit 407, interface unit 408, memory 409, processor 410, and power supply 411. Those skilled in the art will appreciate that the electronic device configuration shown in fig. 6 does not constitute a limitation of the electronic device, and that the electronic device may include more or fewer components than shown, or some components may be combined, or a different arrangement of components. In the embodiment of the present invention, the electronic device includes, but is not limited to, a mobile phone, a tablet computer, a notebook computer, a palm computer, a vehicle-mounted terminal, a wearable device, a pedometer, and the like.
The processor 410 is configured to, when verification of a first account login request of a target application program on a target electronic device fails, acquire a first phone number bound to a first account of the target application program and a second phone number corresponding to a SIM card on the target electronic device; if the first mobile phone number is different from the second mobile phone number and the first contact information associated with both the first mobile phone number and the second mobile phone number meets a preset condition, storing data bound with the first account of the target application program to a target account corresponding to the second mobile phone number, or sending a verification code for retrieving the password of the first account to the second mobile phone number through a server of the target application program.
In the embodiment of the invention, when the verification of the login request of the first account of the target application program fails on the target electronic equipment, the first mobile phone number bound to the first account of the target application program and the second mobile phone number corresponding to the SIM card of the target electronic equipment are obtained, and whether the two mobile phone numbers are the mobile phone numbers of the same person or not is judged by using whether the common contact information associated with the two mobile phone numbers meets the preset condition or not, so that under the condition that the preset condition is met, the data bound with the first account of the target application program are stored to the target account corresponding to the second mobile phone number, or the server of the target application program sends a verification code for retrieving the password of the first account to the second mobile phone number, so that when the mobile phone number bound to the first account of the target electronic equipment fails, the verification code of the first account of the target application program is sent to the second mobile phone number, And when the user forgets the password of the first account, the method of the embodiment of the invention can utilize the common contact information of the two mobile phone numbers to enable the data of the target electronic equipment bound with the first account to be acquired by the user.
It should be understood that, in the embodiment of the present invention, the radio frequency unit 401 may be used for receiving and sending signals during a message sending and receiving process or a call process, and specifically, receives downlink data from a base station and then processes the received downlink data to the processor 410; in addition, the uplink data is transmitted to the base station. Typically, radio unit 401 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like. Further, the radio unit 401 can also communicate with a network and other devices through a wireless communication system.
The electronic device provides wireless broadband internet access to the user via the network module 402, such as assisting the user in sending and receiving e-mails, browsing web pages, and accessing streaming media.
The audio output unit 403 may convert audio data received by the radio frequency unit 401 or the network module 402 or stored in the memory 409 into an audio signal and output as sound. Also, the audio output unit 403 may also provide audio output related to a specific function performed by the electronic apparatus 400 (e.g., a call signal reception sound, a message reception sound, etc.). The audio output unit 403 includes a speaker, a buzzer, a receiver, and the like.
The input unit 404 is used to receive audio or video signals. The input Unit 404 may include a Graphics Processing Unit (GPU) 4041 and a microphone 4042, and the Graphics processor 4041 processes image data of a still picture or video obtained by an image capturing apparatus (such as a camera) in a video capturing mode or an image capturing mode. The processed image frames may be displayed on the display unit 406. The image frames processed by the graphic processor 4041 may be stored in the memory 409 (or other storage medium) or transmitted via the radio frequency unit 401 or the network module 402. The microphone 4042 may receive sound, and may be capable of processing such sound into audio data. The processed audio data may be converted into a format output transmittable to a mobile communication base station via the radio frequency unit 401 in case of the phone call mode.
The electronic device 400 also includes at least one sensor 405, such as light sensors, motion sensors, and other sensors. Specifically, the light sensor includes an ambient light sensor that adjusts the brightness of the display panel 4061 according to the brightness of ambient light, and a proximity sensor that turns off the display panel 4061 and/or the backlight when the electronic apparatus 400 is moved to the ear. As one type of motion sensor, an accelerometer sensor can detect the magnitude of acceleration in each direction (generally three axes), detect the magnitude and direction of gravity when stationary, and can be used to identify the posture of an electronic device (such as horizontal and vertical screen switching, related games, magnetometer posture calibration), and vibration identification related functions (such as pedometer, tapping); the sensors 405 may also include a fingerprint sensor, a pressure sensor, an iris sensor, a molecular sensor, a gyroscope, a barometer, a hygrometer, a thermometer, an infrared sensor, etc., which will not be described in detail herein.
The display unit 406 is used to display information input by the user or information provided to the user. The Display unit 406 may include a Display panel 4061, and the Display panel 4061 may be configured in the form of a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like.
The user input unit 407 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the electronic device. Specifically, the user input unit 407 includes a touch panel 4071 and other input devices 4072. Touch panel 4071, also referred to as a touch screen, may collect touch operations by a user on or near it (e.g., operations by a user on or near touch panel 4071 using a finger, a stylus, or any suitable object or attachment). The touch panel 4071 may include two parts, a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, sends the touch point coordinates to the processor 410, receives a command from the processor 410, and executes the command. In addition, the touch panel 4071 can be implemented by using various types such as a resistive type, a capacitive type, an infrared ray, and a surface acoustic wave. In addition to the touch panel 4071, the user input unit 407 may include other input devices 4072. Specifically, the other input devices 4072 may include, but are not limited to, a physical keyboard, function keys (such as volume control keys, switch keys, etc.), a track ball, a mouse, and a joystick, which are not described herein again.
Further, the touch panel 4071 can be overlaid on the display panel 4061, and when the touch panel 4071 detects a touch operation thereon or nearby, the touch operation is transmitted to the processor 410 to determine the type of the touch event, and then the processor 410 provides a corresponding visual output on the display panel 4061 according to the type of the touch event. Although in fig. 6, the touch panel 4071 and the display panel 4061 are two independent components to implement the input and output functions of the electronic device, in some embodiments, the touch panel 4071 and the display panel 4061 may be integrated to implement the input and output functions of the electronic device, and this is not limited herein.
The interface unit 408 is an interface for connecting an external device to the electronic apparatus 400. For example, the external device may include a wired or wireless headset port, an external power supply (or battery charger) port, a wired or wireless data port, a memory card port, a port for connecting a device having an identification module, an audio input/output (I/O) port, a video I/O port, an earphone port, and the like. The interface unit 408 may be used to receive input (e.g., data information, power, etc.) from an external device and transmit the received input to one or more elements within the electronic apparatus 400 or may be used to transmit data between the electronic apparatus 400 and an external device.
The memory 409 may be used to store software programs as well as various data. The memory 409 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the cellular phone, and the like. Further, the memory 409 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
The processor 410 is a control center of the electronic device, connects various parts of the entire electronic device using various interfaces and lines, performs various functions of the electronic device and processes data by operating or executing software programs and/or modules stored in the memory 409 and calling data stored in the memory 409, thereby performing overall monitoring of the electronic device. Processor 410 may include one or more processing units; preferably, the processor 410 may integrate an application processor, which mainly handles operating systems, user interfaces, application programs, etc., and a modem processor, which mainly handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor 410.
The electronic device 400 may further include a power supply 411 (e.g., a battery) for supplying power to various components, and preferably, the power supply 411 may be logically connected to the processor 410 through a power management system, so as to implement functions of managing charging, discharging, and power consumption through the power management system.
In addition, the electronic device 400 includes some functional modules that are not shown, and are not described in detail herein.
Optionally, an embodiment of the present invention further provides an electronic device, which includes a processor 410, a memory 409, and a computer program that is stored in the memory 409 and can be run on the processor 410, and when being executed by the processor 410, the computer program implements each process of the above-mentioned account control method embodiment, and can achieve the same technical effect, and in order to avoid repetition, details are not described here again.
The embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the computer program implements each process of the above-mentioned account control method embodiment, and can achieve the same technical effect, and in order to avoid repetition, details are not repeated here. The computer-readable storage medium may be a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
While the present invention has been described with reference to the embodiments shown in the drawings, the present invention is not limited to the embodiments, which are illustrative and not restrictive, and it will be apparent to those skilled in the art that various changes and modifications can be made therein without departing from the spirit and scope of the invention as defined in the appended claims.

Claims (10)

1. An account control method, the method comprising:
when the verification of a first account login request of a target application program on target electronic equipment fails, acquiring a first mobile phone number bound to a first account of the target application program and a second mobile phone number corresponding to an SIM card on the target electronic equipment;
if the first mobile phone number is different from the second mobile phone number and the first contact information associated with both the first mobile phone number and the second mobile phone number meets a preset condition, storing data bound with the first account of the target application program to a target account corresponding to the second mobile phone number, or sending a verification code for retrieving the password of the first account to the second mobile phone number through a server of the target application program.
2. The method according to claim 1, wherein the first contact information satisfies a preset condition, and specifically includes:
the number of target contacts in the first contact information is greater than or equal to a first preset threshold, and notes corresponding to the first mobile phone number and the second mobile phone number in an address book of at least one target contact are the same, wherein the address book of the target contact comprises the first mobile phone number and the second mobile phone number.
3. The method of claim 1, wherein before the data bound to the first account of the target application is saved to the target account corresponding to the second phone number or before the verification code for retrieving the password of the first account is sent to the second phone number by the server of the target application, the method further comprises:
acquiring authentication information which is reported by the target electronic equipment by taking the second mobile phone number as a communication identifier and related to the first account, wherein the authentication information comprises use log information of the first mobile phone number and password record information corresponding to the first account;
performing weighting operation on the authentication information to generate a confidence coefficient;
the step of storing the data bound with the first account of the target application program to the target account corresponding to the second mobile phone number, or sending a verification code for retrieving the password of the first account to the second mobile phone number through the server of the target application program, includes:
if the confidence is greater than a second preset threshold, storing the data bound with the first account of the target application program to the target account corresponding to the second mobile phone number, or sending a verification code for retrieving the password of the first account to the second mobile phone number through a server of the target application program.
4. The method of claim 1, wherein the first contact information satisfies a preset condition, and comprises:
the number of the contact persons corresponding to the first contact person information is larger than or equal to a third preset threshold value, and the users corresponding to the first contact person information are all personal users.
5. The method of claim 1, wherein the saving the data bound to the first account of the target application to the target account corresponding to the second phone number, or sending, by the server of the target application, a verification code for retrieving the password of the first account to the second phone number comprises:
outputting the first information and the second information;
if the preset input of the first information is received, storing the data bound with the first account into a target account corresponding to the second mobile phone number; or if the preset input of the second information is received, sending a verification code for retrieving the password of the first account to the second mobile phone number through the server of the target application program.
6. An account control apparatus, the apparatus comprising:
the system comprises a first acquisition module, a second acquisition module and a third acquisition module, wherein the first acquisition module is used for acquiring a first mobile phone number bound to a first account of a target application program and a second mobile phone number corresponding to a SIM card on target electronic equipment when the first account login request of the target application program fails to be verified on the target electronic equipment;
and the control module is used for storing the data bound with the first account of the target application program to a target account corresponding to the second mobile phone number or sending a verification code for retrieving the password of the first account to the second mobile phone number through a server of the target application program if the first mobile phone number is different from the second mobile phone number and the first contact information associated with both the first mobile phone number and the second mobile phone number meets a preset condition.
7. The apparatus of claim 6, wherein the control module comprises:
and the first confirming sub-module is configured to confirm that the first contact information meets a preset condition if it is confirmed that the number of the target contacts in the first contact information is greater than or equal to a first preset threshold value and the remarks corresponding to the first mobile phone number and the second mobile phone number in the address book of at least one target contact are the same, where the address book of the target contact includes the first mobile phone number and the second mobile phone number.
8. The apparatus of claim 6, further comprising:
a second obtaining module, configured to obtain authentication information about the first account, which is reported by the target electronic device using the second mobile phone number as a communication identifier, where the authentication information includes usage log information of the first mobile phone number and password record information corresponding to the first account;
the operation module is used for carrying out weighted operation on the authentication information to generate confidence;
the control module is further configured to, if the confidence is greater than a second preset threshold, store the data bound to the first account of the target application program to a target account corresponding to the second mobile phone number, or send, by the server of the target application program, a verification code for retrieving the password of the first account to the second mobile phone number.
9. The apparatus of claim 6, wherein the control module comprises:
and the second confirming submodule is used for confirming that the first contact information meets the preset condition if the number of the contacts corresponding to the first contact information is larger than or equal to a third preset threshold value and the users corresponding to the first contact information are all personal users.
10. The apparatus of claim 6, wherein the control module comprises:
the output submodule is used for outputting the first information and the second information;
the merging submodule is used for storing the data bound with the first account to a target account corresponding to the second mobile phone number if the preset input of the first information is received;
and the retrieving submodule is used for sending a verification code for retrieving the password of the first account to the second mobile phone number through the server of the target application program if the preset input of the second information is received.
CN201911400756.4A 2019-12-30 2019-12-30 Account control method and device Active CN111132128B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911400756.4A CN111132128B (en) 2019-12-30 2019-12-30 Account control method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911400756.4A CN111132128B (en) 2019-12-30 2019-12-30 Account control method and device

Publications (2)

Publication Number Publication Date
CN111132128A CN111132128A (en) 2020-05-08
CN111132128B true CN111132128B (en) 2022-04-29

Family

ID=70505664

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911400756.4A Active CN111132128B (en) 2019-12-30 2019-12-30 Account control method and device

Country Status (1)

Country Link
CN (1) CN111132128B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112613013A (en) * 2020-12-30 2021-04-06 重庆蓝岸通讯技术有限公司 Method for solving account password forgetting based on application program
CN112613012A (en) * 2020-12-30 2021-04-06 重庆蓝岸通讯技术有限公司 Method for solving account password forgetting based on intelligent terminal
CN114697125B (en) * 2022-04-12 2023-07-04 中国联合网络通信集团有限公司 Information processing method, operation server and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103488653A (en) * 2012-06-08 2014-01-01 北京千橡网景科技发展有限公司 Method and equipment for predicting cell phone number of target user
CN106230597A (en) * 2016-07-28 2016-12-14 努比亚技术有限公司 Short message verification code checking device and method
CN107347049A (en) * 2016-05-05 2017-11-14 腾讯科技(深圳)有限公司 A kind of account method for authenticating and server
WO2018023768A1 (en) * 2016-08-05 2018-02-08 胡明祥 Method for adjusting address book sharing technology according to other users, and sharing system
CN109905398A (en) * 2019-03-13 2019-06-18 北京字节跳动网络技术有限公司 Cell-phone number, which changes, ties up verification method, device, equipment and storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103488653A (en) * 2012-06-08 2014-01-01 北京千橡网景科技发展有限公司 Method and equipment for predicting cell phone number of target user
CN107347049A (en) * 2016-05-05 2017-11-14 腾讯科技(深圳)有限公司 A kind of account method for authenticating and server
CN106230597A (en) * 2016-07-28 2016-12-14 努比亚技术有限公司 Short message verification code checking device and method
WO2018023768A1 (en) * 2016-08-05 2018-02-08 胡明祥 Method for adjusting address book sharing technology according to other users, and sharing system
CN109905398A (en) * 2019-03-13 2019-06-18 北京字节跳动网络技术有限公司 Cell-phone number, which changes, ties up verification method, device, equipment and storage medium

Also Published As

Publication number Publication date
CN111132128A (en) 2020-05-08

Similar Documents

Publication Publication Date Title
CN106778175B (en) Interface locking method and device and terminal equipment
CN111132128B (en) Account control method and device
CN109462885B (en) Network slice registration method and terminal
CN108347512B (en) Identity recognition method and mobile terminal
CN109547495B (en) Sensitive operation processing method, device, server, terminal and storage medium
CN104901805B (en) A kind of identification authentication methods, devices and systems
CN111124221B (en) File sending method and terminal equipment
CN107682359B (en) Application registration method and mobile terminal
CN108282759B (en) Service processing method and mobile communication terminal
CN111125770A (en) Privacy protection method and electronic equipment
CN111756696A (en) Login method of application program, first electronic device and second electronic device
CN113238868B (en) Task processing method, device, server, equipment, system and storage medium
CN110929238B (en) Information processing method and device
CN111427644B (en) Target behavior identification method and electronic equipment
CN111159738B (en) Authority configuration method, application login method and device
CN110413330B (en) Face unlocking initialization method, equipment and computer readable storage medium
CN109451143B (en) Call method and mobile terminal
CN110225040B (en) Information processing method and terminal equipment
CN109547330B (en) Information sharing method and device
CN109446794B (en) Password input method and mobile terminal thereof
CN108259807B (en) Communication method, mobile terminal and computer readable storage medium
CN109547622B (en) Verification method and terminal equipment
CN108494754B (en) Account information processing method and mobile terminal
CN107330319B (en) Interaction control method, equipment and computer readable storage medium
CN108984231A (en) A kind of login method and mobile terminal of application program account

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant