Method and system for system for controlling online user account using a mobile device

ABSTRACT

A method and system for controlling online user account using a mobile device. The method includes receiving an option to lock an online account of a user from a service provider. The computer-implemented method also includes locking the online user account by using a mobile device. Further, the computer-implemented method includes initiating a user action at a later point of time. Furthermore, the computer-implemented method includes receiving an alert to unlock the online user account in order to perform the user action and obtaining an unlock password from the service provider. Moreover, the computer-implemented method includes unlocking the online user account with the unlock password by using the mobile device and performing the user action subsequent to the unlocking, thereby controlling the online user account using the mobile device. The system includes a computing device, a web browser, a service provider and a mobile device.

TECHNICAL FIELD

Embodiments of the disclosure relate generally, to browsing activitiesand more specifically, to control online user account using a mobiledevice.

BACKGROUND

Web browsing activities continue to spread out with services forenormous number of users through a web browser. The web browser allowsthe users to visit websites to perform various activities. One of themost widespread and essential activity performed by users are to sendemails, attach files and receive emails using an online user account.The online user accounts are created by users through mail serviceproviders, for example Yahoo! and Gmail. Since email activities are animportant method of both business and personal communication, it isvital to be proactive in securing online user accounts. Generally,online user accounts are hijacked and hacked. Typically, a hacker uses acompromised online user account to impersonate the user and carry outmalicious (unauthorized) activities. Consequently, protecting the onlineuser accounts (email security) from hackers turns out to be imperativeas well.

There are many ways for protecting the online user accounts. A generalway to protect is to have a password. However, email security goesbeyond just having a strong password. Another way involves in lockingthe online user accounts based on heuristics. Locking is initiated bymail service providers and is completely out of the user's control.However, this process has false positives indicating that any normal orexpected behaviors on the users accounts are performed by a malicioususer, Other methods are just normal approaches that get overlooked.Despite the fact that there are many ways for protecting, preventing theonline user accounts from hacking continues to be challenge.

In light of the foregoing discussion, there is a need for an efficientmethod and system for controlling online account.

SUMMARY

The above-mentioned needs are met by a method, a computer programproduct and a system for controlling online user account using a mobiledevice.

An example of a computer-implemented method for controlling online useraccount using a mobile device includes receiving an option to lock anonline account of a user from a service provider. Thecomputer-implemented method also includes locking the online useraccount by using a mobile device. Further, the computer-implementedmethod includes initiating a user action at a later point of time.Furthermore, the computer-implemented method includes receiving an alertto unlock the online user account in order to perform the user actionand obtaining an unlock password from the service provider. Moreover,the computer-implemented method includes unlocking the online useraccount with the unlock password by using the mobile device andperforming the user action subsequent to the unlocking, therebycontrolling the online user account using the mobile device.

An example of a computer program product stored on a non-transitorycomputer-readable medium that when executed by a processor, performs amethod for controlling an online user account includes receiving anoption to lock an online account of a user from a service provider. Thecomputer program product includes locking the online user account byusing a mobile device. Further, the computer program product alsoincludes initiating a user action at a later point of time. Furthermore,the computer program receiving an alert to unlock the online useraccount in order to perform the user action and obtaining an unlockpassword from the service provider. Moreover, the computer programproduct includes unlocking the online user account with the unlockpassword by using the mobile device and performing the user actionsubsequent to the unlocking, thereby controlling the online user accountusing the mobile device.

An example of a system for controlling online user account using amobile device includes a computing device to perform user actions on anonline user account. The system also includes a web browser installed onthe computing device to load a plurality of web pages to a user.Further, the system includes a service provider, communicatively coupledto the mobile device. Furthermore, the system includes a mobile devicein electronic communication with the service provider, to lock andunlock the online user account thereby controlling the online useraccount.

The features and advantages described in this summary and in thefollowing detailed description are not all-inclusive, and particularly,many additional features and advantages will be apparent to one ofordinary skill in the relevant art in view of the drawings,specification, and claims hereof. Moreover, it should be noted that thelanguage used in the specification has been principally selected forreadability and instructional purposes, and may not have been selectedto delineate or circumscribe the inventive subject matter, resort to theclaims being necessary to determine such inventive subject matter.

BRIEF DESCRIPTION OF THE FIGURES

In the following drawings like reference numbers are used to refer tolike elements. Although the following figures depict various examples ofthe invention, the invention is not limited to the examples depicted inthe figures.

FIG. 1 is a flow diagram illustrating a method for controlling onlineuser account using a mobile device, in accordance with one embodiment;

FIG. 2 is a flow diagram illustrating a method for off-networkauthorization using a mobile device, in accordance with one embodiment;

FIG. 3 is a flow diagram illustrating a method for identifying amalicious user, in accordance with one embodiment;

FIG. 4 is a block diagram illustrating a system for controlling onlineuser account using a mobile device, in accordance with one embodiment;and

FIG. 5 is a block diagram illustrating an exemplary computing device, inaccordance with one embodiment.

DETAILED DESCRIPTION OF THE EMBODIMENTS

The above-mentioned needs are met by a method, computer program productand system for controlling online user account using a mobile device.The following detailed description is intended to provide exampleimplementations to one of ordinary skill in the art, and is not intendedto limit the invention to the explicit disclosure, as one or ordinaryskill in the art will understand that variations can be substituted thatare within the scope of the invention as described.

The user creates an online user account, for examplefrank_t802@yahoo.com, using a desired service provider. The user becomesan owner of the online user account. The service provider is hereinreferred to as a mail service provider. A service provider is anorganization that offers users to access the Internet and related onlineservices. Examples of the mail service provider include, but are notlimited to, Gmail, Yahoo! Mail and Hotmail.

FIG. 1 is a flow diagram illustrating a method for controlling useronline account using a mobile device, in accordance with one embodiment.

At step 110, an option is received to lock an online user account of auser from a service provider.

At the time of creating the online user account, the user registers hismobile device number with the service provider. At this point of time,the service provider sends the option to lock the online user account.Consequently, the user receives the option on his mobile device. Lockingensures that the online user account is secured from malicious users.

At step 115, the user locks the online user account by using his mobiledevice. Further, the lock is set by using the service provider'swebsite. Alternatively, the user locks the online user account bysending a Short Message Service (SMS), for example, “LOCK 54321”, fromthe mobile device to the service provider's number.

The user wishes to lock the online user account to prevent malicioususers from performing actions on the online user account. Occasionally,the user might be inactive on the online user account for a certainperiod of time. In such scenarios, the user may want to lock his onlineuser account that a malicious user does not perform any actions.

Locking the online user account prevents any user action to be performeduntil the online user account is unlocked using the mobile device.Further, false positives are reduced. However, the user can continueutilizing an online service subsequent to locking the online useraccount. Examples of the online service include, but are not limited to,message boards, chat services, electronic mails and online games.Further, a malicious user can utilize only passive online services afterhacking the users account. Examples of passive online services includes,but is not limited to, reading news, browsing through pictures,searching message boards and playing games.

At step 120, a user action is initiated at a later point of time.

A number of widespread activities can be performed on the online useraccounts. The activities are herein referred to as user actions.Examples of user actions include, but are not limited to, sending anemail, changing user password, changing user profile information (suchas date of birth, secret question and so on), updating accountpreferences and updating alternate emails.

At step 125, an alert is received to unlock the online user account inorder to perform the user action. The service provider identifiesoccurrence of the user action to be performed and initiates an alert. Atthis instance, the user receives the alert on the mobile device. Thealert notifies the user to unlock the online user account to perform theuser action. The alert can be a SMS from the service provider. In someembodiments, the alert can be a notification.

At step 130, an unlock password is obtained from the service provider.

Following the alert, the service provider sends the unlock password (UP)to the user's mobile device. The unlock password is a secret unspacedsequence of characters given to the user. Moreover, the unlock passwordis unique for each mobile device registered with the service provider.

At step 135, the online user account is unlocked with the unlockpassword by using the mobile device. The user keys in the unlockpassword to gain access to the online user account. In some embodiments,the user may use the unlock password to log into the online useraccount.

For the reason that the locking and unlocking is performed using themobile device, the user has complete control over the online useraccount.

In some embodiments, the user signs into the online user account againto perform an action. At this instance, the user authorizes using themobile device to unlock the online user account.

In some embodiments, the user can contact the service provider andfollow any process to unlock the online user account.

Assume a scenario where the user locks the online user account and latermisplaces his mobile device. At this moment, the user requests theservice provider to block the current SIM (Subscriber Identity Module)card and provide a new SIM card. Once the new SIM card activates, theuser can login to the online user account and initiate a user action.Consequently, a new “unlock password” is sent to the user automatically.Consider another scenario where the user's mobile device has beenstolen. It is apparent that a malicious user uses the stolen mobiledevice to unlock the online user account. However, the “unlock password”is valid only for a certain period of time and hence cannot be misused.

At step 140, the user action is performed subsequent to the unlocking,thereby controlling the online user account using the mobile device.

Only after unlocking the online user account, the user action is allowedto be performed. As a result, it becomes evident that the user action isinitiated by the owner of the online user account.

The online user account is completely controlled by the user using themobile device. The mobile device operates in an off-network environment.

FIG. 2 is a flow diagram illustrating a method for off-networkauthorization using a mobile device, in accordance with one embodiment.

Consider that a user has an online user account and owns a mobiledevice.

At step 210, the mobile device is registered by storing a numberassociated to the mobile device with a service provider.

Subsequently, the user locks the online user account, for instance asdescribed above in connection with the process of FIG. 1.

At step 215, a user action to be performed is identified by the serviceprovider. Typically, the user initiates the user action on a computingdevice. The user action stimulates the service provider to send an alerton the mobile device. Moreover, the alert notifies the user that a useraction has been initiated on his online user account. The alert is atrigger, for example a SMS, on the mobile device. (At this point,assuming that the user has actually not initiated the user action, thealert on the user's mobile device clearly discriminates that a malicioususer is hacking the online user account.)

At step 220, an unlock password is received at the at the point ofidentifying. The unlock password is generated, for instance, by theservice provider, as described in connection with element 130 of FIG. 1.

The service provider requests the user to unlock the online user accountin order to perform the user action. Consequently, the unlock passwordis sent to the user's mobile device. This process is termed asoff-network authorization. By contrast, an on-network authorizationprovides access to a user through the network.

FIG. 3 is a flow diagram illustrating a method for identifying amalicious user, in accordance with one embodiment.

At step 310, a user action to be performed is identified by the serviceprovider. The identification takes place in response to a userattempting to perform the user action. The user action might take placenormally, or might be inhibited due to locking, as described inparagraph [0042]. Note also, that the user action that is identified mayhave been attempted, not by the user himself, but rather by a malicioususer who has found or stolen a mobile appliance or who has gainedsurreptitious access to the user's mobile device.

At step 315, a request is received by the user from the service providerto unlock the user online account, again as per the discussion inparagraph [0043], above.

At step 320, the request is discarded by the user indicating the serviceprovider that the user action identified is performed by a malicioususer.

In such a scenario, a malicious user has actually initiated the useraction. The service provider assumes that the user action has beeninitiated by the user himself and requests the user to unlock the onlineuser account. However, the user is aware that the user action has notbeen initiated by himself and hence overlooks the request. For example,the user may be engaged in a social gathering when he receives an optionto unlock his online user account on his mobile device. It is evidentthat the user has not initiated the user action, and hence discards therequest indicating that a malicious user is trying to perform the useraction. As a result, the service provider confirms the malicious userand takes necessary actions to prevent hacking.

In some embodiments, a time period, for example ten minutes, may be setby the service provider when the request is sent to the user. If theuser fails to respond to the request within the stipulated time period,the service provider concludes that the user action is being performedby a malicious user.

Assume that the user has entered an incorrect unlock password. At thisinstance, the service provider sends an option to the users mobiledevice to provide a new password.

At step 325, the service provider denies the user action identified.

The following scenarios illustrate how the user is assured that theonline user account is safe from being hacked.

Scenario 1: A malicious user gets access to a user's cookies. Themalicious user performs an action by logging into the online useraccount, and tries to reset password set by the user. However, theaction fails as off-network authorization is required from the user.

Scenario 2: A malicious user has got either one of a user's login and auser's password. The malicious user logs into the online user accountand tries to reset password set by the user. However, the action failsas off-network authorization is required from the user.

Scenario 3: A malicious user sends a malicious link to a user. When theuser clicks on the link, a user action for example, “delete useraccount” and “make a credit card transaction”, is performed. However,when the user clicks on the link, the user action fails as off-networkauthorization is still waiting from the user to unlock the online useraccount.

Scenario 4: A malicious user embeds an image tag in the users email. Theimage tag points to a malicious user script running on a fraudulentserver. However, when the user opens the email, transaction would failas off-network authorization is required.

Scenario 5: A user email account is compromised and a malicious usertries to use the email account to send spam. Currently, the user usesthe email account to casually read emails without unlocking the account.However, in this scenario, the emails would be automatically blocked bythe service provider hence reducing the frequency of spam emails.

At step 330, the request initiated by the malicious user is blockedautomatically by the service provider in response to the user discardingthe request.

FIG. 4 is a block diagram illustrating a system for controlling onlineuser account using a mobile device, in accordance with one embodiment.

The system 400 can implement the method described above. The system 400includes a computing device 410, a web browser 420, a service provider430, and a mobile device 440 in communication with a network 450 (forexample, the Internet or a cellular network).

Examples of the computing device 410 include, but are not limited to, aPersonal Computer (PC), a laptop or notebook computer, a tabletcomputer, a smart phone or Personal Digital Assistant (PDA), a smartappliance, an Internet television or any other suitable processor-baseddevice that can display web pages.

The computing device 410 includes a web browser 420. The web browser isa software application for retrieving, presenting and traversinginformation resources on the World Wide Web (WWW). The informationresources are web pages, images, videos or other forms of content. Theweb browser can be a desktop web browser (for example, InternetExplorer, Mozilla, or Chrome), a mobile browser, or a web viewer builtintegrated into an application program.

The web browser 420 loads desired web pages for the user. The web pagescan include textual information, digital images, video and staticadvertisements, and other digital assets.

The service provider 430, for example Yahoo! and Gmail, provides emailservices to users of the computing device 410 through the network 450.The email services enable users to send, receive and review email fromcorresponding web browsers. Examples of email services include, but arenot limited to, Yahoo! Mail, Gmail, Hotmail and AOL Mail.

The mobile device 440 is a wireless electronic device associated with aunique number. The mobile device 440 is connected to the serviceprovider 430. The mobile device 440 is used to lock and unlock a useronline account.

The user of the computing device 410 opens the web browser 420 andcreates an online user account, for example richard_m5n@gmail.com, usingthe service provider 430. Further, the user utilizes the mobile device440 and stores a corresponding number with the service provider 430 forauthorization. Following the authorization, the user receives an optionto lock the online user account on the mobile device 440. The option tolock is sent from the service provider 430. Consequently, the onlineuser account is locked.

The user signs into the online user account and initiates a user action.At this instance, the service provider 430 identifies the user actionand alerts the user on the mobile device 440. The alert notifies theuser to unlock the online user account in order to perform the useraction. Consequently, the user receives an unlock password (UP) on themobile device 440. The user unlocks the online user account with theunlock password thereby controlling the online user account using themobile device 440. Soon after unlocking, the user action is performed.

Additional embodiments of the computing device 410 are described indetail in conjunction with FIG. 5.

FIG. 5 is a block diagram illustrating an exemplary computing device,for example the computing device 410 in accordance with one embodiment.The computing device 410 includes a processor 510, a hard drive 520, anI/O port 530, and a memory 552, coupled by a bus 599.

The bus 599 can be soldered to one or more motherboards. Examples of theprocessor 510 includes, but is not limited to, a general purposeprocessor, an application-specific integrated circuit (ASIC), an FPGA(Field Programmable Gate Array), a RISC (Reduced Instruction SetController) processor, or an integrated circuit. The processor 510 canbe a single core or a multiple core processor. In one embodiment, theprocessor 510 is specially suited for processing demands oflocation-aware reminders (for example, custom micro-code, andinstruction fetching, pipelining or cache sizes). The processor 510 canbe disposed on silicon or any other suitable material. In operation, theprocessor 510 can receive and execute instructions and data stored inthe memory 552 or the hard drive 520. The hard drive 520 can be aplatter-based storage device, a flash drive, an external drive, apersistent memory device, or other types of memory.

The hard drive 520 provides persistent (long term) storage forinstructions and data. The I/O port 530 is an input/output panelincluding a network card 532 with an interface 533 along with a keyboardcontroller 534, a mouse controller 536, a GPS card 538 and I/0interfaces 540. The network card 532 can be, for example, a wirednetworking card (for example, a USB card, or an IEEE 802.3 card), awireless networking card (for example, an IEEE 802.11 card, or aBluetooth card), and a cellular networking card (for example, a 3Gcard). The interface 533 is configured according to networkingcompatibility. For example, a wired networking card includes a physicalport to plug in a cord, and a wireless networking card includes anantennae. The network card 532 provides access to a communicationchannel on a network. The keyboard controller 534 can be coupled to aphysical port 535 (for example PS/2 or USB port) for connecting akeyboard. The keyboard can be a standard alphanumeric keyboard with 101or 104 keys (including, but not limited to, alphabetic, numerical andpunctuation keys, a space bar, modifier keys), a laptop or notebookkeyboard, a thumb-sized keyboard, a virtual keyboard, or the like. Themouse controller 536 can also be coupled to a physical port 537 (forexample, mouse or USB port). The GPS card 538 provides communication toGPS satellites operating in space to receive location data. An antenna539 provides radio communications (or alternatively, a data port canreceive location information from a peripheral device). The I/Ointerfaces 540 are web interfaces and are coupled to a physical port541.

The memory 552 can be a RAM (Random Access Memory), a flash memory, anon-persistent memory device, or other devices capable of storingprogram instructions being executed. The memory 552 comprises anOperating System (OS) module 556 along with a web browser 554. In otherembodiments, the memory 552 comprises a calendar application thatmanages a plurality of appointments. The OS module 556 can be one ofMicrosoft Windows® family of operating systems (for example, Windows 95,98, Me, Windows NT, Windows 2000, Windows XP, Windows XP x64 Edition,Windows Vista, Windows CE, Windows Mobile), Linux, HP-UX, UNIX, Sun OS,Solaris, Mac OS X, Alpha OS, AIX, IRIX32, or IRIX64.

The web browser 554 can be a desktop web browser (for example, InternetExplorer, Mozilla, or Chrome), a mobile browser, or a web viewer builtintegrated into an application program. In an embodiment, a useraccesses a system on the World Wide Web (WWW) through a network such asthe Internet. The web browser 554 is used to download the web pages orother content in various formats including HTML, XML, text, PDF,postscript, python and PHP and may be used to upload information toother parts of the system. The web browser may use URLs (UniformResource Locators) to identify resources on the web and HTTP (HypertextTransfer Protocol) in transferring files to the web.

As described herein, computer software products can be written in any ofvarious suitable programming languages, such as C, C++, C#, Pascal,Fortran, Perl, Matlab (from MathWorks), SAS, SPSS, JavaScript, AJAX, andJava. The computer software product can be an independent applicationwith data input and data display modules. Alternatively, the computersoftware products can be classes that can be instantiated as distributedobjects. The computer software products can also be component software,for example Java Beans (from Sun Microsystems) or Enterprise Java Beans(EJB from Sun Microsystems). Much functionality described herein can beimplemented in computer software, computer hardware, or a combination.

Furthermore, a computer that is running the previously mentionedcomputer software can be connected to a network and can interface toother computers using the network. The network can be an intranet,internet, or the Internet, among others. The network can be a wirednetwork (for example, using copper), telephone network, packet network,an optical network (for example, using optical fiber), or a wirelessnetwork, or a combination of such networks. For example, data and otherinformation can be passed between the computer and components (or steps)of a system using a wireless network based on a protocol, for exampleWi-Fi (IEEE standards 802.11, 802.11a, 802.11b, 802.11e, 802.11g,802.11i, and 1802.11n). In one example, signals from the computer can betransferred, at least in part, wirelessly to components or othercomputers.

Advantageously, as the user controls the online user account, the methodminimizes misuse of hacked accounts. Typically, malicious users hijackthe online user account by getting access to user's cookies. A cookie isa small file of letters and numbers downloaded on to the user's computerwhen the user accesses certain websites. The websites transfers the filefrom the browser to the hard disk of the computer so that the websitescan remember the user. Here, the service provider erroneously assumesthat a genuine user is performing the user action. However, since anexplicit authentication is provided with an off-network query with theuser, such hijacks fail. Further, heuristic guessing whether a useronline account has been compromised or not is minimized as the user hascontrol on the online user account. Malicious users are not given accessto the online user account until the online user account is unlocked.Apparently, the online user account can be unlocked only by the userthrough his mobile device thereby reducing malicious access. Moreover,traditional web applications that grant all privileges to a user oncethe signs in surpassed.

It is to be understood that although various components are illustratedherein as separate entities, each illustrated component represents acollection of functionalities which can be implemented as software,hardware, firmware or any combination of these. Where a component isimplemented as software, it can be implemented as a standalone program,but can also be implemented in other ways, for example as part of alarger program, as a plurality of separate programs, as a kernelloadable module, as one or more device drivers or as one or morestatically or dynamically linked libraries.

As will be understood by those familiar with the art, the invention maybe embodied in other specific forms without departing from the spirit oressential characteristics thereof. Likewise, the particular naming anddivision of the portions, modules, agents, managers, components,functions, procedures, actions, layers, features, attributes,methodologies and other aspects are not mandatory or significant, andthe mechanisms that implement the invention or its features may havedifferent names, divisions and/or formats.

Furthermore, as will be apparent to one of ordinary skill in therelevant art, the portions, modules, agents, managers, components,functions, procedures, actions, layers, features, attributes,methodologies and other aspects of the invention can be implemented assoftware, hardware, firmware or any combination of the three. Of course,wherever a component of the present invention is implemented assoftware, the component can be implemented as a script, as a standaloneprogram, as part of a larger program, as a plurality of separate scriptsand/or programs, as a statically or dynamically linked library, as akernel loadable module, as a device driver, and/or in every and anyother way known now or in the future to those of skill in the art ofcomputer programming. Additionally, the present invention is in no waylimited to implementation in any specific programming language, or forany specific operating system or environment.

Furthermore, it will be readily apparent to those of ordinary skill inthe relevant art that where the present invention is implemented inwhole or in part in software, the software components thereof can bestored on computer readable media as computer program products. Any formof computer readable medium can be used in this context, such asmagnetic or optical storage media. Additionally, software portions ofthe present invention can be instantiated (for example as object code orexecutable images) within the memory of any programmable computingdevice.

Accordingly, the disclosure of the present invention is intended to beillustrative, but not limiting, of the scope of the invention, which isset forth in the following claims.

What is claimed is:
 1. A computer-implemented method for controllingonline user account using a mobile device, the computer-implementedmethod comprising: receiving an option to lock an online user account ofa user from a service provider; locking the online user account by usinga mobile device; initiating a user action at a later point of time;receiving an alert to unlock the online user account in order to performthe user action; obtaining an unlock password from the service provider;unlocking the online user account with the unlock password by using themobile device; and performing the user action subsequent to theunlocking, thereby controlling the online user account using the mobiledevice.
 2. The computer-implemented method as claimed in claim 1 furthercomprising: registering the mobile device with the service provider. 3.The computer-implemented method as claimed in claim 1, wherein thelocking is accomplished by one of using a service provider web site andby sending a Short Message Service from the mobile device registered tothe service provider number.
 4. The computer-implemented method asclaimed in claim 1 further comprising: providing authorization with theunlock password while the mobile device is located in an off-networkenvironment.
 5. The computer-implemented method as claimed in claim 1further comprising: identifying occurrence of a user action to beperformed by the service provider.
 6. The computer-implemented method asclaimed in claim 4 further comprising: storing a mobile device numberwith the service provider for authorization; and receiving an unlockpassword when the service provider identifies the user action.
 7. Thecomputer-implemented method as claimed in claim 4 further comprising:receiving a request from the service provider to unlock the user onlineaccount; discarding the request by the user; and denying the user actionidentified.
 8. The computer-implemented method as claimed in claim 7further comprising: receiving a message from the user upon discardingthe request.
 9. The computer-implemented method as claimed in claim 7wherein denying further comprising: blocking requests by the serviceprovider.
 10. The computer-implemented method as claimed in claim 1further comprising: utilizing online services subsequent to the locking.11. A computer program product stored on a non-transitorycomputer-readable medium that when executed by a processor, performs afor controlling online user account using a mobile device, comprising:receiving an option to lock an online user account of a user from aservice provider; locking the online user account by using a mobiledevice; initiating a user action at a later point of time; receiving analert to unlock the online user account in order to perform the useraction; obtaining an unlock password from the service provider;unlocking the online user account with the unlock password by using themobile device; and performing the user action subsequent to theunlocking, thereby controlling the online user account using the mobiledevice.
 12. The computer program product as claimed in claim 11, furthercomprising: registering the mobile device with the service provider. 13.The computer program product as claimed in claim 11, wherein the lockingis accomplished by one of using a service provider web site and bysending a Short Message Service from the mobile device registered to theservice provider number.
 14. The computer program product as claimed inclaim 11 further comprising: providing authorization with the unlockpassword even while the mobile device is located in an off-networkenvironment.
 15. The computer program product as claimed in claim 11further comprising: identifying occurrence of a user action by theservice provider.
 16. The computer program product as claimed in claim11 further comprising: storing mobile device number with the serviceprovider for authorization; and receiving an unlock password at thepoint of identifying from the service provider.
 17. The computer programproduct as claimed in claim 14 further comprising: receiving a requestfrom the service provider to unlock the user online account; discardingthe request by the user; and denying the user action identified.
 18. Thecomputer-implemented method as claimed in claim 17 further comprising:receiving a message from the user upon discarding the request.
 19. Thecomputer program product as claimed in claim 17 further comprising:blocking the request by the service provider.
 20. The computer programproduct as claimed in claim 11 further comprising: utilizing onlineservices subsequent to the locking.
 21. A system for controlling onlineuser account using a mobile device, the system comprising: a computingdevice to perform user actions on an online user account; a web browserinstalled on the computing device to load a plurality of web pages to auser; a service provider, communicatively coupled to the mobile device;and a mobile device in electronic communication with the serviceprovider, to lock and unlock the online user account thereby controllingthe online user account.
 22. The system of claim 21, wherein the mobiledevice is operable to perform: receiving an option to lock the onlineuser account from the service provider; and receiving an alert from theservice provider to unlock the online user account.