[go: up one dir, main page]

CN108427879A - Account safety management method, device, computer equipment and storage medium - Google Patents

Account safety management method, device, computer equipment and storage medium Download PDF

Info

Publication number
CN108427879A
CN108427879A CN201810241884.8A CN201810241884A CN108427879A CN 108427879 A CN108427879 A CN 108427879A CN 201810241884 A CN201810241884 A CN 201810241884A CN 108427879 A CN108427879 A CN 108427879A
Authority
CN
China
Prior art keywords
account
time
password
account name
human face
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810241884.8A
Other languages
Chinese (zh)
Inventor
刘阳
冯心
梁瑾
张瑞光
李俊
黄心官
刘文慧
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Technology Shenzhen Co Ltd
Original Assignee
Ping An Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Technology Shenzhen Co Ltd filed Critical Ping An Technology Shenzhen Co Ltd
Priority to CN201810241884.8A priority Critical patent/CN108427879A/en
Priority to PCT/CN2018/095320 priority patent/WO2019178984A1/en
Publication of CN108427879A publication Critical patent/CN108427879A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/107License processing; Key processing
    • G06F21/1078Logging; Metering
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Collating Specific Patterns (AREA)
  • Storage Device Security (AREA)

Abstract

Present invention is disclosed a kind of account safety management method, device, computer equipment and storage medium, wherein method includes:Judge whether the account name received and password match;If the account name and password match success, record the first time currently logged in, and obtain the second time once logged in before the account name;Calculate the time interval between the first time and the second time;Wherein, if second time is sky, the time interval is infinity;If the time interval is more than preset time interval threshold value, the corresponding account of the account name is successfully logged in.The present invention does not have to quote third party's time task management frame for account unlock problem, without additional marker bit is set for initial user, reduces development amount;Time task management action need not be carried out on backstage, greatly reduce the expense of system resource.

Description

Account safety management method, device, computer equipment and storage medium
Technical field
The present invention relates to account safety management domain, a kind of account safety management method, device, meter are especially related to Calculate machine equipment and storage medium.
Background technology
When logging in certain systems, website, logon account name and password are needed, after only password and account name correspond to successfully, It can just login successfully.For system safety, the number of continuous input error password in specified time can be limited, if continuous input Password mistake reaches preset times, then can lock account name, then be unlocked account name according to the mode of setting, than as usual See, it is automatic to restore normal setting etc. after specified time is grown.
Specifically, in account safety management, there are two ways for the prior art, specific as follows:
1, when login times reach setting value, that is, lock an account name, must not be logged in a period of time;
2, operation system generally uses administrator's establishment rather than logon mode generates account name, and administrator creates password Intensity is weaker or inconvenient memory, needs the mandatory modification password in initial log.
Above-mentioned first way needs automatic unlocking after account locking, usually sets timed task in systems, setting Time point internal trigger unlock task.And configuring timing tasks need to introduce third square bearer in systems, while task execution It needs to consume a large amount of system resource in the process, this undoubtedly increases development amount and system hardware expense, extends project Development cycle;The above-mentioned second way initializes account, needs additional label bit identification, equally can also increase development.
It is a kind of asking for urgent need to resolve to save development amount so providing a kind of new account safety management method Topic.
Invention content
The main object of the present invention is to provide a kind of account safety pipe that need not introduce third party's time task management frame Manage method, apparatus, computer equipment and storage medium.
In order to achieve the above-mentioned object of the invention, the present invention proposes a kind of account safety management method, including:
Judge whether the account name received and password match;
If the account name and password match success, record the first time currently logged in, and obtain the account The second time once logged in before name;
Calculate the time interval between the first time and the second time;Wherein, if second time is sky, institute It is infinity to state time interval;
If the time interval is more than preset time interval threshold value, the corresponding account of the account name is successfully logged in.
Further, if the account name and password match success, record the first time currently logged in, and After the step of obtaining the second time once logged in before the account name, including:
If second time is sky, mandatory modification cipher instruction is generated.
Further, after the step of generation mandatory modification cipher instruction, including:
Receive modified password, and the first human face photo of shooting Modify password person;
By the modified password and first human face photo respectively with the account name associated storage in data In library.
Further, after described the step of successfully logging in the account name corresponding account, including:
Shoot the second human face photo of current registrant;
First human face photo corresponding with the account name is transferred in the database;
First human face photo and the second human face photo are compared;
If it is determined that first human face photo and the human face photo that the second human face photo is same people, then opening currently log in Whole account permissions of person;If it is determined that first human face photo and the second human face photo are the human face photo of different people, then root The part account permission of current lander is closed according to preset rules.
Further, the step for transferring first human face photo corresponding with the account name in the database Before rapid, including:
Ultrasonic scanning is carried out to shooting area, and receives the back wave of ultrasonic wave;
The profile of the object of shooting area is judged according to back wave;
If profile meets preset standard, judge that the picture of current shooting is true man's picture, generates and call described first The instruction of human face photo.
Further, after the step of time interval calculated between the first time and the second time, including:
Empty the historical data of Password Input errors number.
Further, after the step of whether account name for judging to receive and password match, including:
If the account name and password match failure, add one in the historical data of Password Input errors number;
Judge to add whether the historical data after one is more than default error thresholds;
If more than then locking the account name.
The present invention also provides a kind of account safety managing devices, including:
Whether judging unit, account name and password for judging to receive match;
Acquiring unit is recorded, if for the account name and password match success, records the first time currently logged in, And obtain the second time once logged in before the account name;
Computing unit, for calculating the time interval between the first time and the second time;Wherein, if described second Time is sky, then the time interval is infinity;
Unit is logged in, if being more than preset time interval threshold value for the time interval, successfully logs in the account The corresponding account of name.
The present invention also provides a kind of computer equipment, including memory and processor, the memory is stored with computer The step of program, the processor realizes any of the above-described the method when executing the computer program.
The present invention also provides a kind of computer readable storage mediums, are stored thereon with computer program, the computer journey The step of method described in any one of the above embodiments is realized when sequence is executed by processor.
Account safety management method, device, computer equipment and the storage medium of the present invention does not have to unlock problem for account And third party's time task management frame is quoted, without additional marker bit is set for initial user, development amount is reduced, Shorten the development time.Judge whether that releasing the time of the lock-out state of account is carried out according to the login time of user, is released The Annual distribution of lock-out state more disperses, and also need not carry out time task management action on backstage, greatly reduce system The expense of resource.
Description of the drawings
Fig. 1 is the flow diagram of the account safety management method of one embodiment of the invention;
Fig. 2 is the flow diagram of the account safety management method of one embodiment of the invention;
Fig. 3 is the flow diagram of the account safety management method of one embodiment of the invention;
Fig. 4 is the flow diagram of the account safety management method of one embodiment of the invention;
Fig. 5 is the structural schematic block diagram of the account safety managing device of one embodiment of the invention;
Fig. 6 is the structural schematic block diagram of the account safety managing device of one embodiment of the invention;
Fig. 7 is the structural schematic block diagram of the account safety managing device of one embodiment of the invention;
Fig. 8 is the structural schematic block diagram of the account safety managing device of one embodiment of the invention;
Fig. 9 is the structural schematic block diagram of the computer equipment of one embodiment of the invention.
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific implementation mode
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
Referring to Fig.1, the embodiment of the present invention provides a kind of account safety management method, including step:
Whether the account name and password that S1, judgement receive match;
If S2, the account name and password match success, record the first time currently logged in, and obtain the account The second time once logged in before name in an account book;
Time interval between S3, the calculating first time and the second time;
If S4, the time interval are more than preset time interval threshold value, the corresponding account of the account name is successfully logged in Family.
The title content inputted is needed as described in above-mentioned steps S1, when above-mentioned account name refers to login system corresponding account. Whether above-mentioned password is correct for verifying account name.In a system, each account be typically provided with one it is corresponding close Code.In one embodiment, an account can be correspondingly arranged multiple passwords, when using the different password login account, Obtained permission is different.This step S1 refers to after system receives the account name and password of active user's input, judging account Whether name matches with password, if successful match, can send out miscue etc. with login system, if it fails to match Information.
As described in above-mentioned steps S2, above-mentioned first time be system judge to record after above-mentioned account name and password match when Between, which can be that user input the time clicked after account name and password when logging in, and can also be that system has judged account Name in an account book and password whether match after time, can according to specific requirement carry out accordingly be arranged.Above-mentioned second time is The time once logged in before system, the preceding primary login refer to that user inputs after account name and password the operation for clicking login, point It hits after login regardless of whether login successfully, can record a time, this time both may be considered the second above-mentioned time.
As described in above-mentioned steps S3, if institute is sky above-mentioned second time, time interval is infinity;Above-mentioned second time Refer to current logon account be first time logon account for sky, i.e., there is no logged above-mentioned accounts before this, so, Second time was not present, it can be considered that being at the first time infinity with the time interval of the second time.
As described in above-mentioned steps S4, as long as above-mentioned time interval is more than preset time interval threshold value, then can successfully it log in The corresponding system of above-mentioned account.That is, no matter user is before logon account, account is in the lock state or non-locking state, As long as account name and password match, and above-mentioned time interval is more than preset time interval threshold value, can succeed login system. In another embodiment, if time interval is less than or equal to above-mentioned time interval threshold value, if the corresponding account of account name is in lock Determine state, then can not succeed logon account, if the corresponding account of account name is not in lock-out state, not interfere with user just Normal login.
With reference to Fig. 2, in the present embodiment, if the above-mentioned account name and password match success, the currently logged in is recorded After the step S2 of the second time once logged in before one time, and the acquisition account name, including:
If S21, second time are sky, mandatory modification cipher instruction is generated.
S22, modified password, and the first human face photo of shooting Modify password person are received;
S23, the modified password and first human face photo are existed with the account name associated storage respectively In database.
As described in above-mentioned steps S21, if the second time was sky, illustrate that the corresponding account of account name may be system pipes Reason person distribution account, password is generally relatively simple, or is not easy to remember, the later stage using when there are risks, if close Code is relatively simple, then is easy to be cracked;If password is not easy to remember, it is easy to forget, trouble administrator is needed to remind Deng so generating mandatory modification cipher instruction, it is desirable that the necessary Modify password of user, and the password of user oneself modification are opposite to use It is easy memory for family, the higher password of difficulty can also be set.
As described in above-mentioned steps S22, modification complete password after, can also shoot Modify password person's (i.e. above-mentioned user) First human face photo, the first human face photo can be used for the uses such as second verification or the rights management in later stage.
As described in above-mentioned steps S23, modified password and the first human face photo are existed with account name associated storage respectively It is in order to which the later stage is called password according to account name and the first human face photo is compared in database.
With reference to Fig. 2, in the present embodiment, after the above-mentioned step S4 for successfully logging in the corresponding account of the account name, including:
S41, the second human face photo for shooting current registrant;
S42, first human face photo corresponding with the account name is transferred in the database;
S43, first human face photo and the second human face photo are compared;
S44, if it is determined that first human face photo and the second human face photo are the human face photo of same people, then it is open current Whole account permissions of lander;If it is determined that first human face photo and the human face photo that the second human face photo is different people, The part account permission of current lander is then closed according to preset rules.
As described in above-mentioned steps S41 to S44, if the first human face photo and the face that the second human face photo is same people shine Piece, explanation are that the corresponding owner of account name logs in, and have whole permissions.If the first human face photo and the second face Photo is not the human face photo of same people, then explanation is the login that the corresponding owner of non-account name carries out, at this point, can there are two kinds Can, the first is that user good friend logs in;Second is that account is stolen.Either any situation is provided with account at this time Permission, then can protect the safety of account.In other embodiments, when being limited by permission, current operator can send Entitlement Management Message can get the permission of bigger to user if user receives and reply the order of mandate, the permission It can be whole permissions, different authorization commands can also be replied according to user and give corresponding permission.In a specific implementation In example, for example system is the automatic-teller-machine systems of bank, although account name and password match success, because of above-mentioned face Failure is compared, at this point, the permission of active user is can to check account balance, but cannot be withdrawn the money.
With reference to Fig. 3, in the present embodiment, it is above-mentioned transfer in the database it is corresponding with the account name described the first Before the step S42 of face photo, including:
S421, ultrasonic scanning is carried out to shooting area, and receives the back wave of ultrasonic wave;
S422, judged according to back wave shooting area object profile;
If S423, profile meet preset standard, judge that the picture of current shooting is true man's picture, generates described in calling The instruction of first human face photo.
As described in above-mentioned steps S421 to S423, if the picture of current shooting is the photos such as a poster, sea The photos such as report must be more smooth expansion, its profile is a plane at this time, and if it is true man, and profile is a 3d wheel It is wide.That is, carry out scanning as B ultrasound to subject, if scanning the result is that one and the approximate 3d profiles of the number of people, recognize The second photo for shooting is true man's photo, to prevent other people from getting the complete of above-mentioned account using photo fraud system Portion's permission improves the safety of account.
With reference to Fig. 4, in the present embodiment, the step of time interval between the above-mentioned calculating first time and the second time After S3, including:
If S31, the time interval are more than preset time interval threshold value, the history of Password Input errors number is emptied Data.
As described in above-mentioned steps S31, no matter whether current account is in the lock state, and account is arranged to unlocked automatically State, while the errors number of Password Input can login successfully at this time if password is correct before emptying;At this time if Password mistake then restarts to record logon error number.
In the present embodiment, after the step S1 whether account name and password that above-mentioned judgement receives match, including:
If S11, the account name and password match failure, add one in the historical data of Password Input errors number;
S12, judge to add whether the historical data after one is more than default error thresholds;
S13, if more than then locking the account name.
As described in S11 to S13 after above-mentioned general headquarters, if as working as the account name and password mismatch of previous input, increase The number of Password Input mistake is accumulative.
In the present embodiment, the step S3 of the time interval between the above-mentioned calculating first time and the second time it Afterwards, including:
If S301, above-mentioned time interval are less than or equal to preset time interval threshold value, and above-mentioned account is in the lock state In the case of, it receives predetermined registration operation and acts compulsory commutation lock-out state.
As described in above-mentioned steps S301, the process of specific compulsory commutation lock-out state is as follows:Receive preset pressure The button for the state that unlocks is clicked the instruction of generation, generates mail input frame;Whether judge the content inputted in input frame It is preset content (content is the content that user inputs when establishing account);If so, the content is sent to specified Mailbox (mailbox is also in preset mailbox when establishing account);If not receiving the feedback of above-mentioned mailbox, (including feedback is super When), then the state that unlocks failure;If receiving the feedback of above-mentioned mailbox, it is pre- to judge whether the content of mailbox feedback meets If it is required that (also in the content for establishing account setup, the content of the content and the above-mentioned input frame of input is generally different), if It meets the requirements, then unlock state, the state that otherwise unlocks failure.The benefit of this step is:If current operator is Other people are fed back, together then he, which does not know that, is specifically sent to that mailbox so it will not log in corresponding mailbox When, not necessarily know if be the password of which mailbox mailbox even if knowing, further increases safety of account etc..
Further, it is above-mentioned " judge mailbox feedback content whether meet preset requirement " the step of before, judge to step on Whether the equipment for recording mailbox is identical as the equipment of current logon account, if identical, the state that unlocks failure.It is, such as The fruit state that unlock will at least prepare two different equipment, otherwise can not complete the state of unlocking, it is intended to increase solution Except the difficulty of lock-out state.In the present embodiment, can also judge to log in equipment and the current logon account of mail equipment whether Belong in same LAN, if in same LAN, can not also complete the state of unlocking.It is same to increase the state that unlocks Difficulty.
In the present embodiment, before judging whether the content inputted in input frame is preset content, it can also judge to log in Geographical location residing for the equipment of account;Judge whether the geographical location is preset specified geographic location;If so, generating The instruction of " judging whether the content inputted in input frame is preset content ".The method of above-mentioned judgement position includes a variety of, if The equipment of connec-tionless network when the equipment of logon account can then pass through GPS, wifi positioning, base station triangulation location etc.;If stepping on The equipment for recording account is limited connection gateway, then obtains the position of gateway.
In the present embodiment, above-mentioned account safety management method can write corresponding above-mentioned side in the logging program of system The application program of method reduces open work without introducing third party's time task management frame when exploitation Amount.Judge whether that releasing the time of the lock-out state of account name is carried out according to the login time of user, unlock state Annual distribution more disperse, system be not necessarily to from the background always carry out time task management work, greatly reduce system resource Expense.
With reference to Fig. 5, the present invention also provides a kind of account safety managing devices, including:
Whether judging unit 10, account name and password for judging to receive match.
Acquiring unit 20 is recorded, if for the account name and password match success, when recording currently log in first Between, and obtain the second time once logged in before the account name;
Computing unit 30, for calculating the time interval between the first time and the second time;
Unit 40 is logged in, if being more than preset time interval threshold value for the time interval, successfully logs in the account The corresponding account of name in an account book.
The title content inputted is needed in above-mentioned judging unit 10, when account name refers to login system corresponding account.It is above-mentioned Whether password is correct for verifying account name.In a system, each account is typically provided with a corresponding password. In one specific embodiment, an account can be correspondingly arranged multiple passwords, acquired when using the different password login account Permission it is different.In the present embodiment, above system receive active user input account name and password after, judge account name with Whether password matches, if successful match, can send out the information such as miscue with login system, if it fails to match.
In above-mentioned record acquiring unit 20, above-mentioned first time is recorded after system judges above-mentioned account name and password match Time, which can be that user input the time clicked after account name and password when logging in, and can also be that system judges Complete account name and password whether match after time, can according to specific requirement carry out accordingly be arranged.When above-mentioned second Between be the time once logged in before system, which refers to that user inputs after account name and password the behaviour for clicking login Make, regardless of whether logining successfully after click logs in, can record a time, this time both may be considered above-mentioned second Time.
In above-mentioned computing unit 30, if above-mentioned second time is sky, time interval is infinity;Above-mentioned second time is It is first time logon account that sky, which refers to current logon account, i.e., there is no logged above-mentioned accounts before this, so, the Two times were not present, it can be considered that being at the first time infinity with the time interval of the second time.
In above-mentioned login unit 40, as long as above-mentioned time interval is more than preset time interval threshold value, then can successfully it log in The corresponding system of above-mentioned account.That is, no matter user is before logon account, account is in the lock state or non-locking state, As long as account name and password match, and above-mentioned time interval is more than preset time interval threshold value, can succeed login system. In another embodiment, if time interval is less than or equal to above-mentioned time interval threshold value, if the corresponding account of account name is in lock Determine state, then can not succeed logon account, if the corresponding account of account name is not in lock-out state, not interfere with user just Normal login.
With reference to Fig. 6, in the present embodiment, above-mentioned account safety managing device further includes:
Generation unit 21 generates mandatory modification cipher instruction if being sky for second time.
Photographing unit 22 is changed, for receiving modified password, and the first human face photo of shooting Modify password person;
Associated storage unit 23, for by the modified password and first human face photo respectively with it is described Account name associated storage is in the database.
In above-mentioned generation unit 21, if the second time was sky, illustrate that the corresponding account of account name may be system Administrator distribution account, password is generally relatively simple, or is not easy to remember, the later stage using when there are risks, if Password is relatively simple, then is easy to be cracked;If password is not easy to remember, it is easy to forget, trouble administrator is needed to carry It wakes up, so generating mandatory modification cipher instruction, it is desirable that the necessary Modify password of user, and the password of user oneself modification, relatively It is easy memory for user, the higher password of difficulty can also be set.
In above-mentioned modification photographing unit 22, after password is completed in modification, person's (the i.e. above-mentioned use that can also shoot Modify password Family) the first human face photo, the first human face photo can be used for the uses such as second verification or the rights management in later stage.
In above-mentioned associated storage unit 23, modified password and the first human face photo are associated with account name deposit respectively Storage is in order to which the later stage is called password according to account name and the first human face photo is compared in the database.
With reference to Fig. 6, in the present embodiment, above-mentioned account safety managing device further includes:
Shooting unit 41, the second human face photo for shooting current registrant;
Unit 42 is transferred, for transferring first human face photo corresponding with the account name in the database;
Comparing unit 43, for first human face photo and the second human face photo to be compared;
Rights management unit 44 is used for if it is determined that first human face photo and the face that the second human face photo is same people Photo then opens whole account permissions of current lander;If it is determined that first human face photo and the second human face photo are not With the human face photo of people, then the part account permission of current lander is closed according to preset rules.
In above-mentioned shooting unit 41, unit 42, comparing unit 43 and rights management unit 44 are transferred, if the first Face photo and the human face photo that the second human face photo is same people, explanation is that the corresponding owner of account name logs in, and is had Whole permissions.If the first human face photo and the second human face photo are not the human face photo of same people, illustrate to be non-account The login that the corresponding owner of name carries out, at this point, there are two kinds of possibility, the first is that user good friend logs in;Second is account Family is stolen.Either any situation is provided with the permission of account, then can protect the safety of account at this time.In other implementations In example, when being limited by permission, current operator can send Entitlement Management Message to user, be awarded if user receives and replys The order of power can then get the permission of bigger, which can be whole permissions, can also be replied according to user different Authorization command and give corresponding permission.
With reference to Fig. 7, in the present embodiment, above-mentioned account safety managing device further includes:
Ultrasonic scanning unit 421 for carrying out ultrasonic scanning to shooting area, and receives the back wave of ultrasonic wave;
Profile judging unit 422, the profile of the object for judging shooting area according to back wave;
Face judging unit 423 judges that the picture of current shooting is true man's figure if meeting preset standard for profile Piece generates the instruction for calling first human face photo.
In above-mentioned ultrasonic scanning unit 421, profile judging unit 422 and face judging unit 423, if current shooting Picture when being the photos such as a poster, then the expansion that the photos such as poster must be more smooth, its profile is one flat at this time Face, and if it is true man, profile is a 3d profile.That is, the scanning as B ultrasound is carried out to subject, if scanning The result is that one and the approximate 3d profiles of the number of people, then it is assumed that the second photo of shooting is true man's photo, to prevent other people profits Whole permissions that above-mentioned account is got with photo fraud system, improve the safety of account.
With reference to Fig. 8, in one embodiment, above-mentioned account safety managing device further includes:
Unit 31 is emptied, the historical data for emptying Password Input errors number.
Unit 31 is emptied above-mentioned, no matter whether current account is in the lock state, and account is arranged to unlocked automatically Determine state, while the errors number of Password Input can login successfully at this time if password is correct before emptying;At this time such as Fruit password mistake then restarts to record logon error number.
In one embodiment, above-mentioned account safety managing device further includes:
Adding unit 11, if failing for the account name and password match, in the history of Password Input errors number Add one in data;
Threshold decision unit 12, for judging to add whether the historical data after one is more than default error thresholds;
Lock cell 13 locks the account name if being more than default error thresholds for the historical data.
In one embodiment, above-mentioned account safety managing device further includes:
Unlock unit 301, if being less than or equal to preset time interval threshold value, and above-mentioned account for above-mentioned time interval In the case that family is in the lock state, receives predetermined registration operation and act compulsory commutation lock-out state.
In the above-mentioned unit 301 that unlocks, the process of specific compulsory commutation lock-out state is as follows:It receives preset The button of compulsory commutation lock-out state is clicked the instruction of generation, generates mail input frame;Judge the content inputted in input frame Whether it is preset content (content is the content that user inputs when establishing account);If so, the content is sent to finger Fixed mailbox (mailbox is also in preset mailbox when establishing account);If do not receive above-mentioned mailbox feedback (including feedback Time-out), then the state that unlocks failure;If receiving the feedback of above-mentioned mailbox, judge whether the content of mailbox feedback meets Preset requirement (also in the content for establishing account setup, the content is generally different from the content for inputting above-mentioned input frame), such as Fruit meets the requirements, then unlock state, the state that otherwise unlocks failure.The benefit of this step is:If current operator It is other people, then he, which does not know that, is specifically sent to that mailbox, is fed back so it will not log in corresponding mailbox, together When, not necessarily know if be the password of which mailbox mailbox even if knowing, further increases safety of account etc..Further, It is above-mentioned " judge mailbox feedback content whether meet preset requirement " the step of before, judge log in mailbox equipment whether with The equipment of current logon account is identical, if identical, the state that unlocks failure.It is, if to unlock state extremely To prepare two different equipment less, otherwise can not complete the state of unlocking, it is intended to increase the difficulty for the state that unlocks.This In embodiment, it can also judge to log in whether the equipment of mail belongs to the equipment of current logon account in same LAN, if In same LAN, the state of unlocking can not be also completed.The same difficulty for increasing the state that unlocks.
In the present embodiment, before judging whether the content inputted in input frame is preset content, can also:Judge to log in Geographical location residing for the equipment of account;Judge whether the geographical location is preset specified geographic location;If so, generating The instruction of " judging whether the content inputted in input frame is preset content ".The method of above-mentioned judgement position includes a variety of, if The equipment of connec-tionless network when the equipment of logon account can then pass through GPS, wifi positioning, base station triangulation location etc.;If stepping on The equipment for recording account is limited connection gateway, then obtains the position of gateway.
Account safety managing device in the embodiment of the present invention can write corresponding above-mentioned side in the logging program of system The application program of method reduces open work without introducing third party's time task management frame when exploitation Amount.Judge whether that releasing the time of the lock-out state of account name is carried out according to the login time of user, unlock state Annual distribution more disperse, system be not necessarily to from the background always carry out time task management work, greatly reduce system resource Expense.
With reference to Fig. 9, a kind of computer equipment is also provided in the embodiment of the present invention, which can be server, Its internal structure can be as shown in Figure 9.The computer equipment includes processor, memory, the network connected by system bus Interface and database.Wherein, the processor of the Computer Design is for providing calculating and control ability.The computer equipment is deposited Reservoir includes non-volatile memory medium, built-in storage.The non-volatile memory medium is stored with operating system, computer program And database.The internal memory provides environment for the operation of operating system and computer program in non-volatile memory medium.It should The database of computer equipment is for storing the data such as the image data used in account safety management method.The computer equipment Network interface be used to communicate by network connection with external terminal.To realize one when the computer program is executed by processor Kind account safety management method.
Above-mentioned processor executes the step of above-mentioned account safety management method and includes:Judge the account name and password that receive Whether match;If the account name and password match success, record the first time currently logged in, and obtain the account The second time once logged in before name;Calculate the time interval between the first time and the second time;Wherein, if described Two times were sky, then the time interval is infinity;If the time interval is more than preset time interval threshold value, succeed Log in the corresponding account of the account name.
In one embodiment, if the above-mentioned account name and password match success, record the first time currently logged in, And after the step of obtaining the second time once logged in before the account name, including:If second time is sky, locate It manages device and generates mandatory modification cipher instruction.
In one embodiment, after above-mentioned processor generates the step of mandatory modification cipher instruction, including:After receiving modification Password, and shooting Modify password person the first human face photo;The modified password and first face are shone Piece respectively with the account name associated storage in the database.
In one embodiment, after above-mentioned processor successfully logs in the step of account name corresponding account, including:It claps Take the photograph the second human face photo of current registrant;First face corresponding with the account name is transferred in the database to shine Piece;First human face photo and the second human face photo are compared;If it is determined that first human face photo and the second face Photo is the human face photo of same people, then opens whole account permissions of current lander;If it is determined that first human face photo With the human face photo that the second human face photo is different people, then the part account permission of current lander is closed according to preset rules.
In one embodiment, above-mentioned processor is transferred corresponding with the account name described the first in the database Before the step of face photo, including:Ultrasonic scanning is carried out to shooting area, and receives the back wave of ultrasonic wave;According to reflection Wave judges the profile of the object of shooting area;If profile meets preset standard, judge that the picture of current shooting is true man's figure Piece generates the instruction for calling first human face photo.
In one embodiment, above-mentioned processor calculates the step of time interval between the first time and the second time Later, including:Empty the historical data of Password Input errors number.
In one embodiment, after above-mentioned processor judges the step of whether account name received and password match, packet It includes:If the account name and password match failure, add one in the historical data of Password Input errors number;Judge after adding one The historical data whether be more than default error thresholds;If more than then locking the account name.
It will be understood by those skilled in the art that structure shown in Fig. 9, is only tied with the relevant part of application scheme The block diagram of structure does not constitute the restriction for the computer equipment being applied thereon to application scheme.
The embodiment of the present invention also provides a kind of computer readable storage medium, is stored thereon with computer program, computer Realize that a kind of account safety management method, this method are specially when program is executed by processor:Judge the account name that receives and Whether password matches;If the account name and password match success, record the first time currently logged in, and described in acquisition The second time once logged in before account name;Calculate the time interval between the first time and the second time;Wherein, if institute It is sky to state for the second time, then the time interval is infinity;If the time interval is more than preset time interval threshold value, Success logs in the corresponding account of the account name.
The computer program of above computer readable storage medium storing program for executing storage quotes third party without unlocking problem for account Time task management frame reduces development amount without additional marker bit is set for initial user, when shortening exploitation Between.Judge whether that releasing the time of the lock-out state of account name is carried out according to the login time of user, unlock state Annual distribution more disperse, also need not carry out time task management action on backstage, greatly reduce system resource and open Pin.
In one embodiment, if the above-mentioned account name and password match success, when recording currently log in first Between, and after the step of obtaining the second time once logged in before the account name, including:If second time is sky, Then processor generates mandatory modification cipher instruction.
In one embodiment, after above-mentioned processor generates the step of mandatory modification cipher instruction, including:After receiving modification Password, and shooting Modify password person the first human face photo;The modified password and first face are shone Piece respectively with the account name associated storage in the database.
In one implements, after the step of above-mentioned processor successfully logs in the account name corresponding account, including:Shooting The second human face photo of current registrant;First face corresponding with the account name is transferred in the database to shine Piece;First human face photo and the second human face photo are compared;If it is determined that first human face photo and the second face Photo is the human face photo of same people, then opens whole account permissions of current lander;If it is determined that first human face photo With the human face photo that the second human face photo is different people, then the part account permission of current lander is closed according to preset rules.
In one embodiment, above-mentioned processor is transferred corresponding with the account name described the first in the database Before the step of face photo, including:Ultrasonic scanning is carried out to shooting area, and receives the back wave of ultrasonic wave;According to reflection Wave judges the profile of the object of shooting area;If profile meets preset standard, judge that the picture of current shooting is true man's figure Piece generates the instruction for calling first human face photo.
In one embodiment, above-mentioned processor calculates the step of time interval between the first time and the second time Later, including:Empty the historical data of Password Input errors number.
In one embodiment, after above-mentioned processor judges the step of whether account name received and password match, packet It includes:If the account name and password match failure, add one in the historical data of Password Input errors number;Judge after adding one The historical data whether be more than default error thresholds;If more than then locking the account name.
One of ordinary skill in the art will appreciate that realizing all or part of flow in above-described embodiment method, being can be with Relevant hardware is instructed to complete by computer program, the computer program can store and a non-volatile computer In read/write memory medium, the computer program is when being executed, it may include such as the flow of the embodiment of above-mentioned each method.Wherein, Any reference to memory, storage, database or other media used in provided herein and embodiment, Including non-volatile and/or volatile memory.Nonvolatile memory may include read-only memory (ROM), programming ROM (PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include Random access memory (RAM) or external cache.By way of illustration and not limitation, mono- diversified forms of RAM can obtain, Such as static state RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double speed are according to rate SDRAM (SSRSDRAM), enhancing Type SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM (RDRAM), direct memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM) etc..
It should be noted that herein, the terms "include", "comprise" or its any other variant are intended to non-row His property includes, so that process, device, article or method including a series of elements include not only those elements, and And further include other elements that are not explicitly listed, or further include for this process, device, article or method institute it is intrinsic Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including this There is also other identical elements in the process of element, device, article or method.
The foregoing is merely the preferred embodiment of the present invention, are not intended to limit the scope of the invention, every utilization Equivalent structure or equivalent flow shift made by description of the invention and accompanying drawing content is applied directly or indirectly in other correlations Technical field, be included within the scope of the present invention.

Claims (10)

1. a kind of account safety management method, which is characterized in that including:
Judge whether the account name received and password match;
If the account name and password match success, before recording the first time currently logged in, and the acquisition account name The second time once logged in;
Calculate the time interval between the first time and the second time;
If the time interval is more than preset time interval threshold value, the corresponding account of the account name is successfully logged in.
2. account safety management method according to claim 1, which is characterized in that if the account name and password With success, then the first time currently logged in, and the step of obtaining the second time once logged in before the account name are recorded Later, including:
If second time is sky, mandatory modification cipher instruction is generated.
3. account safety management method according to claim 2, which is characterized in that the generation mandatory modification cipher instruction The step of after, including:
Receive modified password, and the first human face photo of shooting Modify password person;
By the modified password and first human face photo respectively with the account name associated storage in database In.
4. account safety management method according to claim 3, which is characterized in that described successfully to log in the account name pair After the step of account answered, including:
Shoot the second human face photo of current registrant;
First human face photo corresponding with the account name is transferred in the database;
First human face photo and the second human face photo are compared;
If it is determined that first human face photo and the human face photo that the second human face photo is same people, then open current lander's Whole account permissions;If it is determined that first human face photo and the human face photo that the second human face photo is different people, then according to pre- If rule closes the part account permission of current lander.
5. account safety management method according to claim 4, which is characterized in that it is described transfer in the database with Before the step of account name corresponding first human face photo, including:
Ultrasonic scanning is carried out to shooting area, and receives the back wave of ultrasonic wave;
The profile of the object of shooting area is judged according to back wave;
If profile meets preset standard, judge that the picture of current shooting is true man's picture, generates and call first face The instruction of photo.
6. account safety management method according to claim 1, which is characterized in that described to calculate first time and the After the step of time interval between two times, including:
If the time interval is more than preset time interval threshold value, the historical data of Password Input errors number is emptied.
7. account safety management method according to claim 1, which is characterized in that it is described judge the account name that receives and After the step of whether password matches, including:
If the account name and password match failure, add one in the historical data of Password Input errors number;
Judge to add whether the historical data after one is more than default error thresholds;
If more than then locking the account name.
8. a kind of account safety managing device, which is characterized in that including:
Whether judging unit, account name and password for judging to receive match;
Acquiring unit is recorded, if for the account name and password match success, records the first time currently logged in, and Obtain the second time once logged in before the account name;
Computing unit, for calculating the time interval between the first time and the second time;
Unit is logged in, if being more than preset time interval threshold value for the time interval, successfully logs in the account name pair The account answered.
9. a kind of computer equipment, including memory and processor, the memory are stored with computer program, feature exists In when the processor executes the computer program the step of any one of realization claim 1 to 7 the method.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program The step of method described in any one of claim 1 to 7 is realized when being executed by processor.
CN201810241884.8A 2018-03-22 2018-03-22 Account safety management method, device, computer equipment and storage medium Pending CN108427879A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201810241884.8A CN108427879A (en) 2018-03-22 2018-03-22 Account safety management method, device, computer equipment and storage medium
PCT/CN2018/095320 WO2019178984A1 (en) 2018-03-22 2018-07-11 Account security management method and apparatus, computer device, and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810241884.8A CN108427879A (en) 2018-03-22 2018-03-22 Account safety management method, device, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN108427879A true CN108427879A (en) 2018-08-21

Family

ID=63159454

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810241884.8A Pending CN108427879A (en) 2018-03-22 2018-03-22 Account safety management method, device, computer equipment and storage medium

Country Status (2)

Country Link
CN (1) CN108427879A (en)
WO (1) WO2019178984A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110661973A (en) * 2019-09-29 2020-01-07 联想(北京)有限公司 Control method and electronic equipment
CN110955884A (en) * 2019-12-04 2020-04-03 中国银行股份有限公司 Method and device for determining upper limit times of password trial and error
CN111327588A (en) * 2020-01-16 2020-06-23 深圳开源互联网安全技术有限公司 Network access security detection method, system, terminal and readable storage medium

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115442120A (en) * 2022-08-31 2022-12-06 中国银行股份有限公司 Password verification method and device

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101396277A (en) * 2007-09-26 2009-04-01 中国科学院声学研究所 Ultrasonics face recognition method and device
CN102110200A (en) * 2009-12-25 2011-06-29 凹凸电子(武汉)有限公司 Authentication method capable of being executed by computer
CN105959277A (en) * 2016-04-27 2016-09-21 四川效率源信息安全技术股份有限公司 Method of locking/unlocking computer screen based on NFC terminal
CN106254299A (en) * 2015-06-03 2016-12-21 阿里巴巴集团控股有限公司 Multiple expression coupling account authentication method, password amendment authentication method and device thereof
CN106557678A (en) * 2016-11-09 2017-04-05 珠海格力电器股份有限公司 Intelligent terminal mode switching method and device
CN107229868A (en) * 2017-05-27 2017-10-03 郑州云海信息技术有限公司 A kind of information security management and control method and system based on storage management system

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102281309B (en) * 2010-06-11 2015-11-25 腾讯科技(深圳)有限公司 The dissemination method of the network information and the delivery system of the network information and client
CN104158790B (en) * 2013-05-14 2016-05-25 腾讯科技(深圳)有限公司 user login method, device and equipment
CN105991281A (en) * 2015-02-04 2016-10-05 中国移动通信集团公司 Identity authentication method, equipment and system
CN104753944A (en) * 2015-03-31 2015-07-01 北京畅游天下网络技术有限公司 Account security verifying method and system
CN106161397A (en) * 2015-04-21 2016-11-23 富泰华工业(深圳)有限公司 There is the electronic installation of Anti-addiction function, Anti-addiction management system and method
CN105512531B (en) * 2015-11-26 2019-01-22 北京像素软件科技股份有限公司 A kind of method and device controlling Game Authentication
CN107784225B (en) * 2016-12-28 2020-03-06 平安科技(深圳)有限公司 Financial account security management method and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101396277A (en) * 2007-09-26 2009-04-01 中国科学院声学研究所 Ultrasonics face recognition method and device
CN102110200A (en) * 2009-12-25 2011-06-29 凹凸电子(武汉)有限公司 Authentication method capable of being executed by computer
CN106254299A (en) * 2015-06-03 2016-12-21 阿里巴巴集团控股有限公司 Multiple expression coupling account authentication method, password amendment authentication method and device thereof
CN105959277A (en) * 2016-04-27 2016-09-21 四川效率源信息安全技术股份有限公司 Method of locking/unlocking computer screen based on NFC terminal
CN106557678A (en) * 2016-11-09 2017-04-05 珠海格力电器股份有限公司 Intelligent terminal mode switching method and device
CN107229868A (en) * 2017-05-27 2017-10-03 郑州云海信息技术有限公司 A kind of information security management and control method and system based on storage management system

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110661973A (en) * 2019-09-29 2020-01-07 联想(北京)有限公司 Control method and electronic equipment
CN110955884A (en) * 2019-12-04 2020-04-03 中国银行股份有限公司 Method and device for determining upper limit times of password trial and error
CN111327588A (en) * 2020-01-16 2020-06-23 深圳开源互联网安全技术有限公司 Network access security detection method, system, terminal and readable storage medium

Also Published As

Publication number Publication date
WO2019178984A1 (en) 2019-09-26

Similar Documents

Publication Publication Date Title
CN108427879A (en) Account safety management method, device, computer equipment and storage medium
US10607190B2 (en) Mobile check-in with push notification services
CN106652135B (en) Access control method and its system based on cloud and planar bar code technology
CN109272606B (en) Intelligent lock supervision equipment and method based on block chain and storage medium
CN107508619B (en) Mobile power based on Bluetooth technology rents self-help serving system
US20210319639A1 (en) System and method for managing electronic locks
CN107742339B (en) Platform-based passive electronic lock management method
CN207409010U (en) The newer temporary password access control system of encryption parameter dynamic
CN105261104A (en) Bluetooth door lock system based on intelligent terminal, and control method of Bluetooth door lock system
CN110213217A (en) Data access method, relevant apparatus, gateway and data access system
US10528947B2 (en) Locking an online account based on a public cryptocurrency address
FR2864289A1 (en) Resource access controlling method, involves notifying comparison of biometric data and biometric references of user, to access terminal, by server that communicates simultaneously with terminal and access terminal
CN106127905A (en) A kind of electrical lock apparatus, system and method for unlocking thereof
CN110175439A (en) User management method, device, equipment and computer readable storage medium
US20180082287A1 (en) Cryptocurrency lock for online accounts
CN110378691A (en) Block chain dispositions method, device and computer equipment based on deployment center
CN109685946A (en) Lock opening method, device, equipment and storage medium
CN110930561B (en) Control method and device of intelligent lock
CN108364165A (en) A kind of seal public use uses managing and control system and method
CN105516085A (en) System and method for managing temporary internet surfing behavior by visitor
CN109215204A (en) A kind of intelligent door lock security system based on ether mill
CN109636984A (en) Wechat barcode scanning method for unlocking, equipment and storage medium
CN112634501A (en) Visitor authorization method for property management
CN110083782A (en) Inspection method, device, computer equipment and the storage medium of electronic insurance policy
CN103177203A (en) Computer login management system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180821

RJ01 Rejection of invention patent application after publication