CN114598734A - Account processing method and device - Google Patents
Account processing method and device Download PDFInfo
- Publication number
- CN114598734A CN114598734A CN202210210173.0A CN202210210173A CN114598734A CN 114598734 A CN114598734 A CN 114598734A CN 202210210173 A CN202210210173 A CN 202210210173A CN 114598734 A CN114598734 A CN 114598734A
- Authority
- CN
- China
- Prior art keywords
- account
- preset
- actual
- monitoring
- monitoring index
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000003672 processing method Methods 0.000 title claims abstract description 26
- 238000012544 monitoring process Methods 0.000 claims abstract description 89
- 238000000034 method Methods 0.000 claims abstract description 33
- 230000000694 effects Effects 0.000 claims abstract description 14
- 230000002159 abnormal effect Effects 0.000 claims description 47
- 230000004048 modification Effects 0.000 claims description 43
- 238000012986 modification Methods 0.000 claims description 43
- 230000006870 function Effects 0.000 description 8
- 238000004519 manufacturing process Methods 0.000 description 8
- 238000004590 computer program Methods 0.000 description 4
- 239000002699 waste material Substances 0.000 description 4
- 238000010586 diagram Methods 0.000 description 3
- 230000005856 abnormality Effects 0.000 description 2
- 230000006399 behavior Effects 0.000 description 2
- 230000007774 longterm Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004422 calculation algorithm Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000014509 gene expression Effects 0.000 description 1
- 238000005192 partition Methods 0.000 description 1
- 230000000750 progressive effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The application discloses an account processing method and device, and the method mainly comprises the following steps: firstly, monitoring indexes related to the account are obtained, and the monitoring indexes are used for reflecting the safety or the activity of the account. And then judging whether the monitoring index meets a preset condition or not, and executing corresponding processing operation on the account according to a judgment result. For example, when the account is an inactive account, the account may be set to be inactive and cleaned. By the account processing method, monitoring indexes of the account can be checked according to a preset monitoring strategy, different processing operations can be executed according to the checking result of the account, and the use safety of the account and the availability of system resources are improved.
Description
Technical Field
The present application relates to the field of data processing technologies, and in particular, to an account processing method and device.
Background
For enterprise-level users such as banks, in order to achieve partition management of system functions, the whole information system is provided with a large number of production accounts, and each production account corresponds to a specific function authority. Because the use condition of the production account is lack of effective monitoring and unified management, a plurality of production accounts with unreasonable authority, expired passwords and long-term inactivity are left on the information system, so that the waste of information system resources is caused, and the potential safety hazard that the passwords are falsely used by other people exists.
Disclosure of Invention
The embodiment of the application provides an account processing method and device, so that the safety of an account is improved, and the waste of system resources is reduced.
In a first aspect, an embodiment of the present application provides an account processing method, where the method includes:
acquiring a monitoring index of an account, wherein the monitoring index is used for reflecting the safety or activity of the account;
judging whether the monitoring index meets a preset condition or not;
and executing corresponding processing operation on the account according to the judgment result.
In a possible implementation manner, the monitoring index of the account includes: at least one of password modification time, last login time of the account and actual management authority of the account.
In a possible implementation manner, when the monitoring index of the account includes the password modification time, the determining whether the monitoring index meets a preset condition includes:
determining an actual password modification period of the account based on the password modification time and the current time;
judging whether the actual password modification period is less than or equal to a preset password modification period;
the executing the corresponding processing operation on the account according to the judgment result comprises the following steps:
and when the actual password modification period is larger than the preset password modification period, carrying out alarm prompt.
In a possible implementation manner, when the monitoring index of the account includes the last login time of the account, the determining whether the monitoring index meets a preset condition includes:
determining an actual period of inactivity for the account based on the last login time of the account and the current time;
judging whether the actual inactivity period is less than a preset inactivity period;
the executing the corresponding processing operation on the account according to the judgment result comprises the following steps:
when the actual inactivity period is greater than or equal to the preset inactivity period, adding the account number to an abnormal account number list, and checking whether the account number is an abnormal account number;
and when the account is checked to be an abnormal account, setting the account to be invalid.
In a possible implementation manner, when the monitoring index of the account includes the actual management right of the account, the determining whether the monitoring index meets a preset condition includes:
judging whether the actual management authority of the account is matched with a preset management authority or not;
the executing the corresponding processing operation on the account according to the judgment result comprises the following steps:
when the actual management authority of the account is not matched with the preset management authority, adding the account to the abnormal account list, and checking whether the account is an abnormal account;
and when the account is checked to be an abnormal account, modifying the actual management authority of the account into the preset management authority.
In a possible implementation manner, after the warning prompt is performed when the actual password modification period is greater than the preset password modification period, the method further includes:
when the password of the account is not modified within a preset time period after the alarm prompt is sent, adding the account to the abnormal account list, and checking whether the account is an abnormal account;
and when the account is checked to be an abnormal account, setting the account to be invalid.
In a possible implementation manner, after checking whether the account is an abnormal account, the method further includes:
and when the account is verified to be a normal account, modifying the preset condition according to the condition of verifying the account to be the normal account.
In a possible implementation manner, the determining whether the monitoring index meets a preset condition includes:
acquiring a monitoring condition for auditing the monitoring index;
modifying the monitoring condition based on the monitoring parameter input by the user to obtain the preset condition;
and judging whether the monitoring index meets the preset condition or not.
In a possible implementation manner, the performing, according to the determination result, the corresponding processing operation on the account includes:
and when the monitoring index meets the preset condition, adding the production account into a normal account list.
In a second aspect, an embodiment of the present application provides an account processing apparatus, where the apparatus includes: the device comprises an acquisition module, a judgment module and a processing module;
the acquisition module is used for acquiring monitoring indexes of the account, and the monitoring indexes are used for reflecting the safety or activity of the account;
the judging module is used for judging whether the monitoring index meets a preset condition;
and the processing module is used for executing corresponding processing operation on the account according to the judgment result.
In a third aspect, an embodiment of the present application provides an account processing device, where the device includes: a memory and a processor;
the memory is used for storing relevant program codes;
the processor is configured to invoke the program code, and execute the account processing method according to any one of the implementation manners of the first aspect.
In a fourth aspect, an embodiment of the present application provides a computer-readable storage medium, where the computer-readable storage medium is used to store a computer program, and the computer program is used to execute the account processing method described in any one of the implementation manners of the first aspect.
Therefore, the embodiment of the application has the following beneficial effects:
in the implementation manner of the embodiment of the application, first, a monitoring index related to an account is obtained, where the monitoring index is used to reflect security or liveness of the account. And then judging whether the monitoring index meets a preset condition or not, and executing corresponding processing operation on the account according to a judgment result. By the account processing method, monitoring indexes of the account can be checked according to a preset monitoring strategy, different processing operations can be executed according to the checking result of the account, and the use safety of the account and the availability of system resources are improved.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments provided in the present application, and other drawings can be obtained by those skilled in the art according to the drawings.
Fig. 1 is a flowchart of an account processing method according to an embodiment of the present application;
fig. 2 is a flowchart of another account processing method according to the embodiment of the present application;
fig. 3 is a schematic structural diagram of an account processing apparatus according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of an account processing device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and the described embodiments are only exemplary embodiments of the present application, and not all implementations. Those skilled in the art can combine the embodiments of the present application to obtain other embodiments without inventive work, and these embodiments are also within the scope of the present application.
For enterprise-level users such as banks, the whole information system has a large number of production accounts, and due to the lack of effective monitoring and unified management on the use condition of the production accounts, a plurality of production accounts with unreasonable authority, expired passwords and long-term inactivity are left on the information system, so that the waste of information system resources is caused, and the potential safety hazard that the passwords are falsely used by others exists.
Based on this, the embodiment of the application provides an account processing method, so as to improve the security of an account and reduce the waste of system resources. In specific implementation, firstly, a monitoring index related to the account is obtained, and the monitoring index is used for reflecting the safety or activity of the account. And then judging whether the monitoring index meets a preset condition or not, and executing corresponding processing operation on the account according to a judgment result. By the account processing method, monitoring indexes of the account can be checked according to a preset monitoring strategy, different processing operations can be executed according to the checking result of the account, and the use safety of the account and the availability of system resources are improved.
An account processing method provided in the embodiment of the present application will be described below with reference to the accompanying drawings.
Referring to fig. 1, fig. 1 is a flowchart of an account processing method according to an embodiment of the present disclosure.
The method mainly comprises the following steps:
s101: and acquiring a monitoring index of the account, wherein the monitoring index is used for reflecting the safety or the activity of the account.
In the method provided by this embodiment, effective processing of the account is mainly realized by auditing monitoring indexes related to the account, and the monitoring indexes can reflect the security or activity of the account. When the safety or the activity of the account is found to be not meeting the requirements according to the monitoring indexes, the account can be processed in time.
In one possible implementation manner, the monitoring index of the account may include: the password modification time and the last login time of the account can reflect the activity of the account, and the management authority of the account can reflect the security of the account. In the following embodiments, the method for processing the account is described with respect to different monitoring indexes.
S102: and judging whether the monitoring index meets a preset condition.
S103: and executing corresponding processing operation on the account according to the judgment result.
For any monitoring index, whether the monitoring index meets the requirement or not can be judged according to preset conditions, and then different processing operations are executed on the account according to different judgment results. The preset condition may be a monitoring policy preset for a monitoring index of the account, and different monitoring policies correspond to different monitoring indexes. The following describes a processing method of an account according to different monitoring indexes.
In a possible implementation manner, the monitoring index of the account includes password modification time, that is, the password of the account has a validity period, the password modification time reflects the activity of the current account to a certain extent, and a person using the account needs to modify the password of the account within the password validity period to ensure the validity of the account. Therefore, the actual password modification period of the account can be determined according to the last password modification time and the current time of the account, and then the actual password modification period is compared with the preset password modification period to judge whether the actual password modification period is less than or equal to the preset password modification period, namely whether the password of the account is in the valid period.
When the actual password modification period is larger than the preset password modification period, the password of the account exceeds the validity period, and the system can give an alarm. For example, a password invalidity may be displayed upon logging in to the account, and a prompt message to modify the password may be sent to the person using the account. After the system sends a prompt message to the person using the account, if the password of the account is not modified within a preset time period, the account may be added to an abnormal account list, and then whether the account is an abnormal account is checked. And setting the account to be invalid after the account is checked to be an abnormal account. If the actual password modification period of the account is less than or equal to the preset password modification period, it is indicated that the password of the account is still in the valid period, the account is a normal account, and the account can be added to a normal account list, so that a subsequent worker can classify and check the account.
In addition, the monitoring index of the account number can also include the last login time of the account number, and the login time of the account number can also reflect the activity of the current account number to a certain extent, so that whether the last login time of the current account number meets the preset condition can be judged. And determining the actual inactivity period of the account according to the last login time and the current time of the account. In one possible implementation manner, the time of last account logout may be used as the last login time of the account, and then the time when the current account has not been logged in, i.e., the actual period of inactivity, is determined according to the time of account logout and the current time. And judging whether the actual inactivity period is less than a preset inactivity period, if so, judging the account number as an abnormal account number, adding the account number into an abnormal account number list, and auditing whether the account number is the abnormal account number, namely, avoiding misidentifying the account number as the abnormal account number as far as possible. And after the account number is checked, if the account number is checked to be an abnormal account number, and if the account number is quitted from being used, setting the account number to be invalid. In addition, the related information of the account can be deleted. The account numbers are cleaned, so that invalid account numbers are prevented from occupying system resources, and the availability of the system resources is improved.
When the inactivity period of the account is less than or equal to the preset inactivity period, it is indicated that the activity of the account meets the requirement, and the account can be added to the normal account list. If the account is not checked to be the abnormal account in the process of checking the account to be the abnormal account, for example, the account is allowed to keep the inactive state in a special period in practical application, the preset condition may be modified according to the condition of checking the account to be the normal account, that is, the special period of time in which the account keeps the inactive state may be set in the preset condition.
It should be noted that the process of auditing the account may be an auditing policy preset in the system, and different auditing policies may be provided for different monitoring indexes of the account, which is not limited in the embodiment of the present application.
Because the password modification period and the inactivity period of the account can both reflect the activity of the account and are both related to the time period, when the preset password modification period of the account is greater than the preset inactivity period and the actual inactivity period of the account is greater than the preset inactivity period and less than the preset password modification period, the password of the account is still in the valid period, and thus the account is considered to be a normal account. And if the actual inactivity period of the account is greater than or equal to the preset inactivity period, the account can be considered as an inactive abnormal account, so that the judgment results of the accounts are in conflict. At this time, since the actual inactivity period of the account is greater than the preset inactivity period, the account is considered to be an abnormal account, and after the account is added to the abnormal account list, the account can be checked to determine whether the account is determined to be abnormal only because the actual inactivity period is greater than the preset inactivity period, for example, whether the account is still used can be confirmed to a person using the account, that is, whether the account is an abnormal account which is inactive can be confirmed.
In order to avoid conflict between the judgment of the password modification period and the judgment of the inactive period as much as possible, this embodiment further provides a preferred implementation manner, that is, a preset password modification period of the account may be set to be smaller than a preset inactive period, so that when the actual password modification period of the account is greater than the preset password modification period and smaller than the preset inactive period, the account may be processed correspondingly because of password failure, when the actual inactive period of the account is greater than or equal to the preset inactive period, the account is processed as an inactive abnormal account, that is, the account is added to an abnormal account list for auditing, and when the auditing is passed, the account is set to be invalid.
In a possible implementation manner, the monitoring index of the account may further include an actual management authority, and the actual management authority of the account specifies a range of functions that can be processed by using the account. When applying for an account, a manager applies for a function authority which can be processed by the account, namely the function authority is used as a preset management authority of the account. In the account monitoring process, whether the actual management authority of the account is matched with the preset management authority or not can be judged, and when the actual management authority is not matched with the preset management authority, the safety of using the account is affected by the fact that the account is too large or too small in management authority. For example, when it is determined whether the actual management authority of the account matches the preset management authority, it may be determined through some user behaviors under the account, and it is determined whether some user behaviors under the account exceed the function authority that can be processed by a preset, so as to determine whether the actual management authority of the account matches the preset management authority.
When the actual management authority of the account is not matched with the preset management authority, the account can be added to the abnormal account list, and whether the account is an abnormal account is checked again, namely the possibility that the account is wrongly judged as the abnormal account is reduced. And when the account is checked to be an abnormal account, modifying the actual management authority of the account into the preset management authority. When the actual management authority of the account is matched with the preset management authority, the account is indicated to be a normal account, and the account can be added to a normal account list.
It should be noted that the account processing methods provided for different monitoring indexes in the foregoing embodiments are only exemplary descriptions, and are not limited to the three implementation manners, that is, the foregoing embodiments do not limit the technical solutions provided by the embodiments of the present application in any form. For example, according to the actual demand of the user, some preset conditions for judging the account abnormality may be added, after the user inputs some new monitoring parameters of the account, the preset conditions are modified according to the monitoring parameters, and the account abnormality judgment is performed based on the modified preset conditions.
The account processing method provided by the embodiment of the application can be used for auditing different monitoring indexes of the account according to a preset monitoring strategy and executing corresponding processing operation on the account according to an auditing result, so that the use safety of the account and the availability of system resources are improved. In addition, the monitoring strategy can be adjusted according to user requirements and the like, and flexibility of account processing is improved.
Based on the above method embodiment, an account processing method is further provided in the embodiment of the present application, and will be described below with reference to the accompanying drawings.
Referring to fig. 2, fig. 2 is a flowchart of another account processing method according to an embodiment of the present disclosure.
And when the monitoring index of the account is acquired, different monitoring strategies are executed according to different monitoring indexes. Specifically, whether the actual password modification period of the account is smaller than or equal to a preset password modification period or not is judged, namely whether the password is modified regularly or not, and if not, the account is added to an abnormal account list. And judging whether the actual inactivity period of the account is less than a preset inactivity period, if not, indicating that the account is an inactive account, and adding the account to an abnormal account list. And judging whether the actual management authority of the account is matched with the preset management authority, and if not, adding the account into the abnormal account list. And checking the account in the abnormal account list, and automatically processing the abnormal account after the checking is passed. And when the judgment results are yes, the account is a normal account, and the account is added into a normal account list so that the following staff can classify and archive the account.
In a possible implementation manner, the account processing method provided in the above embodiment may write corresponding script programs such as Shell, Powershell, VBScript, and the like through different script tools to implement functions, so that the scheme of the embodiment may be applied to different operating system environments such as Linux, Windows, AIX, and the like. In a preferred implementation manner, the script program for implementing the above scheme may be set as a script with a function of calling at regular time and deployed in the system, so that the system can call the corresponding script at regular time to implement the processing operation on the account. In the whole processing flow, the system can realize automatic processing, if corresponding monitoring strategies are automatically obtained according to different monitoring indexes of the account for judgment, after the account is added to an abnormal account list, the auditing flow corresponding to the monitoring indexes is automatically called for auditing, corresponding processing is automatically carried out on the account according to the auditing result, manual operation is avoided, and the account processing efficiency is improved.
Based on the foregoing method embodiment, an account processing apparatus is further provided in the embodiment of the present application, and referring to fig. 3, the apparatus 300 includes: an acquisition module 301, a judgment module 302 and a processing module 303;
the obtaining module 301 is configured to obtain a monitoring index of an account, where the monitoring index is used to reflect security or activity of the account;
the judging module 302 is configured to judge whether the monitoring index meets a preset condition;
the processing module 303 is configured to perform a corresponding processing operation on the account according to the determination result.
Based on the method embodiment and the device embodiment, the application embodiment also provides an account processing device. Referring to fig. 4, fig. 4 is a schematic structural diagram of an account processing device according to an embodiment of the present application.
The apparatus 400 comprises: a memory 401 and a processor 402;
the memory 401 is used for storing relevant program codes;
the processor 402 is configured to invoke the program code to execute the account processing method according to the above method embodiment.
In addition, an embodiment of the present application further provides a computer-readable storage medium, where the computer-readable storage medium is used to store a computer program, and the computer program is used to execute the account processing method described in the above method embodiment.
It should be noted that, in the present specification, the embodiments are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments may be referred to each other. In particular, for system or apparatus embodiments, since they are substantially similar to method embodiments, they are described relatively simply, and reference may be made to some descriptions of method embodiments for related portions. The above-described embodiments of the apparatus are merely illustrative, where units or modules described as separate components may or may not be physically separate, and components displayed as the units or modules may or may not be physical modules, that is, may be located in one place, or may also be distributed on multiple network units, and some or all of the units or modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
It should be understood that in the present application, "at least one" means one or more, "a plurality" means two or more. "and/or" for describing an association relationship of associated objects, indicating that there may be three relationships, e.g., "a and/or B" may indicate: only A, only B and both A and B are present, wherein A and B may be singular or plural. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship. "at least one of the following" or similar expressions refer to any combination of these items, including any combination of single item(s) or plural items. For example, at least one (one) of a, b, or c, may represent: a, b, c, "a and b", "a and c", "b and c", or "a and b and c", wherein a, b, c may be single or plural.
It is further noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may reside in Random Access Memory (RAM), memory, Read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present application. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the application. Thus, the present application is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
Claims (10)
1. An account processing method is characterized by comprising the following steps:
acquiring a monitoring index of an account, wherein the monitoring index is used for reflecting the safety or activity of the account;
judging whether the monitoring index meets a preset condition or not;
and executing corresponding processing operation on the account according to the judgment result.
2. The method of claim 1, wherein the monitoring metrics for the account number comprise: at least one of password modification time, last login time of the account and actual management authority of the account.
3. The method according to claim 2, wherein when the monitoring index of the account includes the password modification time, the determining whether the monitoring index meets a preset condition includes:
determining an actual password modification period of the account based on the password modification time and the current time;
judging whether the actual password modification period is less than or equal to a preset password modification period;
the executing the corresponding processing operation on the account according to the judgment result comprises the following steps:
and when the actual password modification period is larger than the preset password modification period, carrying out alarm prompt.
4. The method according to claim 2, wherein when the monitoring index of the account includes the last login time of the account, the determining whether the monitoring index meets a preset condition includes:
determining an actual period of inactivity for the account based on the last login time of the account and the current time;
judging whether the actual inactivity period is less than a preset inactivity period;
the executing the corresponding processing operation on the account according to the judgment result comprises the following steps:
when the actual inactivity period is greater than or equal to the preset inactivity period, adding the account number to an abnormal account number list, and checking whether the account number is an abnormal account number;
and when the account is checked to be an abnormal account, setting the account to be invalid.
5. The method according to claim 2, wherein when the monitoring index of the account includes the actual management right of the account, the determining whether the monitoring index meets a preset condition includes:
judging whether the actual management authority of the account is matched with a preset management authority or not;
the executing the corresponding processing operation on the account according to the judgment result comprises the following steps:
when the actual management authority of the account is not matched with the preset management authority, adding the account to the abnormal account list, and checking whether the account is an abnormal account;
and when the account is checked to be an abnormal account, modifying the actual management authority of the account into the preset management authority.
6. The method of claim 3, wherein after the alert prompt is performed when the actual password modification period is greater than the preset password modification period, the method further comprises:
when the password of the account is not modified within a preset time period after the alarm prompt is sent, adding the account to the abnormal account list, and checking whether the account is an abnormal account;
and when the account is checked to be an abnormal account, setting the account to be invalid.
7. The method according to any one of claims 4 to 6, wherein after checking whether the account is an abnormal account, the method further comprises:
and when the account is verified to be a normal account, modifying the preset condition according to the condition of verifying the account to be the normal account.
8. The method according to claim 1, wherein the determining whether the monitoring index meets a preset condition comprises:
acquiring a monitoring condition for auditing the monitoring index;
modifying the monitoring condition based on the monitoring parameter input by the user to obtain the preset condition;
and judging whether the monitoring index meets the preset condition or not.
9. The method according to any one of claims 1 to 6, wherein the performing the corresponding processing operation on the account according to the determination result includes:
and when the monitoring index meets the preset condition, adding the account into a normal account list.
10. An account processing device, the device comprising: a memory and a processor;
the memory is used for storing relevant program codes;
the processor is configured to call the program code, and execute the account processing method according to any one of claims 1 to 9.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210210173.0A CN114598734A (en) | 2022-03-03 | 2022-03-03 | Account processing method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210210173.0A CN114598734A (en) | 2022-03-03 | 2022-03-03 | Account processing method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN114598734A true CN114598734A (en) | 2022-06-07 |
Family
ID=81806930
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210210173.0A Pending CN114598734A (en) | 2022-03-03 | 2022-03-03 | Account processing method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114598734A (en) |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103888457A (en) * | 2014-03-19 | 2014-06-25 | 深信服网络科技(深圳)有限公司 | Method and system for improving login security |
CN104468249A (en) * | 2013-09-17 | 2015-03-25 | 深圳市腾讯计算机系统有限公司 | Method and device for detecting abnormal account number |
CN107040494A (en) * | 2015-07-29 | 2017-08-11 | 深圳市腾讯计算机系统有限公司 | User account exception prevention method and system |
CN110233831A (en) * | 2019-05-21 | 2019-09-13 | 深圳壹账通智能科技有限公司 | The detection method and device of malicious registration |
CN110489964A (en) * | 2019-08-21 | 2019-11-22 | 北京达佳互联信息技术有限公司 | Account detection method, device, server and storage medium |
CN112818257A (en) * | 2021-02-19 | 2021-05-18 | 北京邮电大学 | Account detection method, device and equipment based on graph neural network |
CN112887105A (en) * | 2021-01-11 | 2021-06-01 | 卓望数码技术(深圳)有限公司 | Conference security monitoring method and device, electronic equipment and storage medium |
CN114065184A (en) * | 2021-10-29 | 2022-02-18 | 远光软件股份有限公司 | Account management method and device, storage medium and server |
-
2022
- 2022-03-03 CN CN202210210173.0A patent/CN114598734A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104468249A (en) * | 2013-09-17 | 2015-03-25 | 深圳市腾讯计算机系统有限公司 | Method and device for detecting abnormal account number |
CN103888457A (en) * | 2014-03-19 | 2014-06-25 | 深信服网络科技(深圳)有限公司 | Method and system for improving login security |
CN107040494A (en) * | 2015-07-29 | 2017-08-11 | 深圳市腾讯计算机系统有限公司 | User account exception prevention method and system |
CN110233831A (en) * | 2019-05-21 | 2019-09-13 | 深圳壹账通智能科技有限公司 | The detection method and device of malicious registration |
CN110489964A (en) * | 2019-08-21 | 2019-11-22 | 北京达佳互联信息技术有限公司 | Account detection method, device, server and storage medium |
CN112887105A (en) * | 2021-01-11 | 2021-06-01 | 卓望数码技术(深圳)有限公司 | Conference security monitoring method and device, electronic equipment and storage medium |
CN112818257A (en) * | 2021-02-19 | 2021-05-18 | 北京邮电大学 | Account detection method, device and equipment based on graph neural network |
CN114065184A (en) * | 2021-10-29 | 2022-02-18 | 远光软件股份有限公司 | Account management method and device, storage medium and server |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109063423B (en) | Application software authorization method and system | |
CN110704121B (en) | Operation retry method, system and computer device | |
CN110049028B (en) | Method and device for monitoring domain control administrator, computer equipment and storage medium | |
CN110602135A (en) | Network attack processing method and device and electronic equipment | |
CN111031000B (en) | Processing method, device and system of business wind control system and storage medium | |
CN110363381B (en) | Information processing method and device | |
CN109711147B (en) | Method, device and system for managing three rights separately of operating system and storage medium | |
CN114598734A (en) | Account processing method and device | |
CN111949421A (en) | SDK calling method and device, electronic equipment and computer readable storage medium | |
CN111510431B (en) | Universal terminal access control platform, client and control method | |
CN111552957B (en) | Software overuse control method and device | |
CN110177372B (en) | Base station copyright permission verification method and device | |
CN113852984A (en) | Wireless terminal access monitoring system and method, electronic equipment and readable storage device | |
CN112969151A (en) | Short message monitoring method, device and equipment | |
CN111988163A (en) | Event processing method and server | |
CN113779521B (en) | Identity authentication method and device, storage medium and electronic equipment | |
CN112330458B (en) | Wind control processing method, device, equipment and storage medium based on wind control platform | |
CN114499998B (en) | Security protection method, device, electronic equipment and storage medium | |
CN113765766B (en) | Session control method, device and equipment of virtual private network | |
JP7059741B2 (en) | Fraud detection device, fraud detection method and fraud detection program | |
CN117421760A (en) | Safe access method and system suitable for power edge computing chip | |
CN116566699A (en) | Remote login permission configuration method and device based on server and electronic equipment | |
CN115834367A (en) | Page fault prompting method and device | |
CN118295853A (en) | Batch task retry method, device, equipment and storage medium | |
CN116016128A (en) | Process management method and device of gateway equipment, electronic equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |