CN102799820B - A kind of restoration methods of user cipher - Google Patents

A kind of restoration methods of user cipher Download PDF

Info

Publication number
CN102799820B
CN102799820B CN201210231321.3A CN201210231321A CN102799820B CN 102799820 B CN102799820 B CN 102799820B CN 201210231321 A CN201210231321 A CN 201210231321A CN 102799820 B CN102799820 B CN 102799820B
Authority
CN
China
Prior art keywords
user
provider network
service provider
management server
sent
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201210231321.3A
Other languages
Chinese (zh)
Other versions
CN102799820A (en
Inventor
董旭春
李�浩
李来珍
刘志功
厉华梅
王浩
刘加香
刘浩
朱国梁
黄薇
毕晓伟
张萌
申晨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Corp of China SGCC
Rizhao Power Supply Co of State Grid Shandong Electric Power Co Ltd
Original Assignee
State Grid Corp of China SGCC
Rizhao Power Supply Co of State Grid Shandong Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Corp of China SGCC, Rizhao Power Supply Co of State Grid Shandong Electric Power Co Ltd filed Critical State Grid Corp of China SGCC
Priority to CN201510376727.4A priority Critical patent/CN105007269B/en
Priority to CN201510376726.XA priority patent/CN105007268B/en
Priority to CN201210231321.3A priority patent/CN102799820B/en
Priority to CN201510376728.9A priority patent/CN104980443B/en
Publication of CN102799820A publication Critical patent/CN102799820A/en
Application granted granted Critical
Publication of CN102799820B publication Critical patent/CN102799820B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • H04L67/1044Group management mechanisms 
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/40Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass for recovering from a failure of a protocol instance or entity, e.g. service redundancy protocols, protocol state redundancy or protocol service redirection

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Mathematical Physics (AREA)
  • Theoretical Computer Science (AREA)
  • Telephonic Communication Services (AREA)
  • Computer And Data Communications (AREA)

Abstract

The present invention relates to field of computer technology, especially relate to a kind of restoration methods of user cipher, it is characterized in that it is realized by following steps: the first step: send user's internet information; Second step: the user's internet information in above-mentioned user's internet information and provider network device databases compares by provider network equipment; Time inconsistent, the internet information of this user that this is kept in service provider's management server by service provider's management server is sent in provider network device databases, and logon information is sent to subscriber computer.The following beneficial effect of tool of the present invention: when provider network equipment failure or replacing, user cipher is no longer initial value, makes user account number safer; And individual privacy can not be leaked; User does not need the cost plenty of time to recover; Blocking up of service provider's telephone network can not be caused; Operator staff no longer needs cost plenty of time and energy to carry out password recovery; And user's complaint greatly reduces in rejuvenation.

Description

A kind of restoration methods of user cipher
Technical field
the present invention relates to field of computer technology, especially relate to a kind of restoration methods of user cipher.
Background technology
along with popularizing of computer internet broadband, Internet user gets more and more, and existing network access has multiple, and conventional is that user inputs account number and password, can be accessed by network through system validation rear.Conventional is have a provider network equipment in subscriber unit outside, user is connected to provider network equipment by the network interface of computing machine or user side network interface and grid line, after service on net is opened in user's application, distribute to user by service provider and log in account number and password; When needing Modify password, user can at service provider's sales counter with perfect instrument, by the open modify feature of the related personnel of service provider's supervisory computer, by amended Password Input service provider management server, then, by service provider's management server, account number and password are transferred to provider network equipment together.Account number in the account number of input when user surfs the Net and password and provider network equipment and password compare, if consistent time; allow online, otherwise, occur pointing out, if code name is the type of error etc. of 691.
due to provider network equipment being connected with a large amount of users, be generally several to several thousand; Therefore, when the network equipment is changed, because account number in the network equipment and password have not existed, therefore, Internet user can recover function of surfing the Net in the following manner: service provider of 1, making a phone call, and allows it that password is set to initial value; 2, to make a phone call service provider, tell its password, allow its input password be sent on provider network equipment; 3, service provider's sales counter amendment is gone.
above-mentioned three kinds of alter modes all existing defects: password is set to initial value by mode one, and user account number is dangerous; Mode two individual privacy is leaked; Mode three needs to spend user's plenty of time.And mode one and mode two can cause blocking up of telephone network; Mode one to mode three all can spend plenty of time and the energy of operator staff; And in rejuvenation, usually can suffer a large amount of complaints of user.
Summary of the invention
for solving the problem, the present invention discloses a kind of restoration methods of user cipher, and it is achieved through the following technical solutions.
a kind of restoration methods of user cipher, it is characterized in that it is realized by following steps: the first step: send user internet information: user sends to provider network equipment 2 to require internet information by the network interface 1 of subscriber computer and grid line, comprises online account number and password; Second step: the user's internet information in user's internet information that the first step obtains by provider network equipment and provider network device databases compares, if time consistent, agree to online and logon information is sent to subscriber computer, and the information of having surfed the Net is sent to service provider's management server 3; If time inconsistent, error message is sent to service provider's management server, this is kept at the internet information of this user in service provider's management server by service provider's management server, the account number and the password that comprise this user are sent in provider network device databases together, and logon information is sent to subscriber computer.
a kind of restoration methods of user cipher, it is characterized in that it is realized by following steps: the first step: send user internet information: user sends to provider network equipment 2 to require internet information by the network interface 1 of subscriber computer and grid line, comprises online account number and password; Second step: the user's internet information in user's internet information that the first step obtains by provider network equipment and provider network device databases compares, if time consistent, agree to online and logon information is sent to subscriber computer, and the information of having surfed the Net is sent to service provider's management server 3; If time inconsistent, error message is sent to service provider's management server, this is kept at the internet information of this user in service provider's management server by service provider's management server, the account number and the password that comprise this user are sent in provider network device databases together, and logon information is sent to subscriber computer; 3rd step: account number that service provider's management server is extracted and other the multiple user be on same provider network equipment of the user described in second step surfs the Net and password are as original value, and the above-mentioned user transferring correspondence in provider network device databases surfs the Net, account number and password compare, if when there is more than 2 differences, then the user name involved by this provider network equipment corresponding in service provider's management server and password are all write in provider network device databases.
a kind of restoration methods of user cipher, it is characterized in that it is realized by following steps: the first step: send user internet information: user sends to provider network equipment 2 to require internet information by the network interface 1 of subscriber computer and grid line, comprises online account number and password; Second step: the user's internet information in user's internet information that the first step obtains by provider network equipment and provider network device databases compares, if time consistent, agree to online and logon information is sent to subscriber computer, and the information of having surfed the Net is sent to service provider's management server 3; If time inconsistent, error message is sent in subscriber computer; 3rd step: user is after service provider's supervisory computer 4 place Modify password, the internet information of this user that service provider's management server will be kept in service provider's management server, the account number and the password that comprise this user are sent in provider network device databases together.
a kind of restoration methods of user cipher, it is characterized in that it is realized by following steps: the first step: send user internet information: user sends to provider network equipment 2 to require internet information by the network interface 1 of subscriber computer and grid line, comprises online account number and password; Second step: the user's internet information in user's internet information that the first step obtains by provider network equipment and provider network device databases compares, if time consistent, agree to online and logon information is sent to subscriber computer, and the information of having surfed the Net is sent to service provider's management server 3; If time inconsistent, error message is sent in subscriber computer; 3rd step: user is after service provider's supervisory computer 4 place Modify password, the internet information of this user that service provider's management server will be kept in service provider's management server, the account number and the password that comprise this user are sent in provider network device databases together; 4th step: account number that service provider's management server is extracted and other the multiple user be on same provider network equipment of the user described in the 3rd step surfs the Net and password are as original value, and the above-mentioned user transferring correspondence in provider network device databases surfs the Net, account number and password compare, if when there is more than 2 differences, then the user name involved by this provider network equipment corresponding in service provider's management server and password are all write in provider network device databases.
a kind of restoration methods of user cipher, it is characterized in that it is realized by following steps: the first step: send user internet information: user, by being connected to user terminal network appliance 5 on the network interface 1 of subscriber computer and grid line sends to provider network equipment 2 to require internet information, comprises online account number and password; Second step: the user's internet information in user's internet information that the first step obtains by provider network equipment and provider network device databases compares, if time consistent, agree to online and logon information is sent to subscriber computer, and the information of having surfed the Net is sent to service provider's management server 3; If time inconsistent, error message is sent to service provider's management server, this is kept at the internet information of this user in service provider's management server by service provider's management server, the account number and the password that comprise this user are sent in provider network device databases together, and logon information is sent to subscriber computer.
a kind of restoration methods of user cipher, it is characterized in that it is realized by following steps: the first step: send user internet information: user, by being connected to user terminal network appliance 5 on the network interface 1 of subscriber computer and grid line sends to provider network equipment 2 to require internet information, comprises online account number and password; Second step: the user's internet information in user's internet information that the first step obtains by provider network equipment and provider network device databases compares, if time consistent, agree to online and logon information is sent to subscriber computer, and the information of having surfed the Net is sent to service provider's management server 3; If time inconsistent, error message is sent to service provider's management server, this is kept at the internet information of this user in service provider's management server by service provider's management server, the account number and the password that comprise this user are sent in provider network device databases together, and logon information is sent to subscriber computer; 3rd step: account number that service provider's management server is extracted and other the multiple user be on same provider network equipment of the user described in second step surfs the Net and password are as original value, and the above-mentioned user transferring correspondence in provider network device databases surfs the Net, account number and password compare, if when there is more than 2 differences, then the user name involved by this provider network equipment corresponding in service provider's management server and password are all write in provider network device databases.
a kind of restoration methods of user cipher, it is characterized in that it is realized by following steps: the first step: send user internet information: user, by being connected to user terminal network appliance 5 on the network interface 1 of subscriber computer and grid line sends to provider network equipment 2 to require internet information, comprises online account number and password; Second step: the user's internet information in user's internet information that the first step obtains by provider network equipment and provider network device databases compares, if time consistent, agree to online and logon information is sent to subscriber computer, and the information of having surfed the Net is sent to service provider's management server 3; If time inconsistent, error message is sent in subscriber computer; 3rd step: user is after service provider's supervisory computer 4 place Modify password, the internet information of this user that service provider's management server will be kept in service provider's management server, the account number and the password that comprise this user are sent in provider network device databases together.
a kind of restoration methods of user cipher, it is characterized in that it is realized by following steps: the first step: send user internet information: user, by being connected to user terminal network appliance 5 on the network interface 1 of subscriber computer and grid line sends to provider network equipment 2 to require internet information, comprises online account number and password; Second step: the user's internet information in user's internet information that the first step obtains by provider network equipment and provider network device databases compares, if time consistent, agree to online and logon information is sent to subscriber computer, and the information of having surfed the Net is sent to service provider's management server 3; If time inconsistent, error message is sent in subscriber computer; 3rd step: user is after service provider's supervisory computer 4 place Modify password, the internet information of this user that service provider's management server will be kept in service provider's management server, the account number and the password that comprise this user are sent in provider network device databases together; 4th step: account number that service provider's management server is extracted and other the multiple user be on same provider network equipment of the user described in the 3rd step surfs the Net and password are as original value, and the above-mentioned user transferring correspondence in provider network device databases surfs the Net, account number and password compare, if when there is more than 2 differences, then the user name involved by this provider network equipment corresponding in service provider's management server and password are all write in provider network device databases.
the restoration methods of any one user cipher described above, is further characterized in that user wirelessly connects into provider network equipment.
a restoration methods for user cipher, is characterized in that it has been come by following steps: the first step: provider network equipment 2 sends to service provider's management server 3 and copies password request; Second step: service provider's management server identification the request of the respond services business network equipment, the password of the user account number be stored in the database of service provider's management server and correspondence is sent to provider network equipment, described user account number and password be single to or multipair, be the Internet user's that the provider network equipment that sends request is corresponding time multipair; 3rd step: provider network equipment receives the data that service provider's management server sends, and writes in provider network device databases.
in the present invention, by simple method, make user cipher obtain fast quick-recovery, and can overallly recover, bring great convenience to user.
therefore, the present invention has following Advantageous Effects: when provider network equipment failure or replacing, user cipher is no longer set to initial value, makes user account number safer; And individual privacy can not be leaked; User does not need the cost plenty of time to recover; Blocking up of service provider's telephone network can not be caused thus; Operator staff no longer needs cost plenty of time and energy to carry out password recovery; And user's complaint greatly reduces in rejuvenation.
Accompanying drawing explanation
fig. 1 is the theory diagram of the invention process example 1.
fig. 2 is the theory diagram of the invention process example 2.
Embodiment
embodiment 1
ask for an interview Fig. 1, a kind of restoration methods of user cipher, it is characterized in that it is realized by following steps: the first step: send user internet information: user sends to provider network equipment 2 to require internet information by the network interface 1 of subscriber computer and grid line, comprises online account number and password; Second step: the user's internet information in user's internet information that the first step obtains by provider network equipment and provider network device databases compares, if time consistent, agree to online and logon information is sent to subscriber computer, and the information of having surfed the Net is sent to service provider's management server 3; If time inconsistent, error message is sent to service provider's management server, this is kept at the internet information of this user in service provider's management server by service provider's management server, the account number and the password that comprise this user are sent in provider network device databases together, and logon information is sent to subscriber computer.
ask for an interview Fig. 1, a kind of restoration methods of user cipher, it is characterized in that it is realized by following steps: the first step: send user internet information: user sends to provider network equipment 2 to require internet information by the network interface 1 of subscriber computer and grid line, comprises online account number and password; Second step: the user's internet information in user's internet information that the first step obtains by provider network equipment and provider network device databases compares, if time consistent, agree to online and logon information is sent to subscriber computer, and the information of having surfed the Net is sent to service provider's management server 3; If time inconsistent, error message is sent to service provider's management server, this is kept at the internet information of this user in service provider's management server by service provider's management server, the account number and the password that comprise this user are sent in provider network device databases together, and logon information is sent to subscriber computer; 3rd step: account number that service provider's management server is extracted and other the multiple user be on same provider network equipment of the user described in second step surfs the Net and password are as original value, and the above-mentioned user transferring correspondence in provider network device databases surfs the Net, account number and password compare, if when there is more than 2 differences, then the user name involved by this provider network equipment corresponding in service provider's management server and password are all write in provider network device databases.
ask for an interview Fig. 1, a kind of restoration methods of user cipher, it is characterized in that it is realized by following steps: the first step: send user internet information: user sends to provider network equipment 2 to require internet information by the network interface 1 of subscriber computer and grid line, comprises online account number and password; Second step: the user's internet information in user's internet information that the first step obtains by provider network equipment and provider network device databases compares, if time consistent, agree to online and logon information is sent to subscriber computer, and the information of having surfed the Net is sent to service provider's management server 3; If time inconsistent, error message is sent in subscriber computer; 3rd step: user is after service provider's supervisory computer 4 place Modify password, the internet information of this user that service provider's management server will be kept in service provider's management server, the account number and the password that comprise this user are sent in provider network device databases together.
ask for an interview Fig. 1, a kind of restoration methods of user cipher, it is characterized in that it is realized by following steps: the first step: send user internet information: user sends to provider network equipment 2 to require internet information by the network interface 1 of subscriber computer and grid line, comprises online account number and password; Second step: the user's internet information in user's internet information that the first step obtains by provider network equipment and provider network device databases compares, if time consistent, agree to online and logon information is sent to subscriber computer, and the information of having surfed the Net is sent to service provider's management server 3; If time inconsistent, error message is sent in subscriber computer; 3rd step: user is after service provider's supervisory computer 4 place Modify password, the internet information of this user that service provider's management server will be kept in service provider's management server, the account number and the password that comprise this user are sent in provider network device databases together; 4th step: account number that service provider's management server is extracted and other the multiple user be on same provider network equipment of the user described in the 3rd step surfs the Net and password are as original value, and the above-mentioned user transferring correspondence in provider network device databases surfs the Net, account number and password compare, if when there is more than 2 differences, then the user name involved by this provider network equipment corresponding in service provider's management server and password are all write in provider network device databases.
embodiment 2
ask for an interview Fig. 2, a kind of restoration methods of user cipher, it is characterized in that it is realized by following steps: the first step: send user internet information: user, by being connected to user terminal network appliance 5 on the network interface 1 of subscriber computer and grid line sends to provider network equipment 2 to require internet information, comprises online account number and password; Second step: the user's internet information in user's internet information that the first step obtains by provider network equipment and provider network device databases compares, if time consistent, agree to online and logon information is sent to subscriber computer, and the information of having surfed the Net is sent to service provider's management server 3; If time inconsistent, error message is sent to service provider's management server, this is kept at the internet information of this user in service provider's management server by service provider's management server, the account number and the password that comprise this user are sent in provider network device databases together, and logon information is sent to subscriber computer.
ask for an interview Fig. 2, a kind of restoration methods of user cipher, it is characterized in that it is realized by following steps: the first step: send user internet information: user, by being connected to user terminal network appliance 5 on the network interface 1 of subscriber computer and grid line sends to provider network equipment 2 to require internet information, comprises online account number and password; Second step: the user's internet information in user's internet information that the first step obtains by provider network equipment and provider network device databases compares, if time consistent, agree to online and logon information is sent to subscriber computer, and the information of having surfed the Net is sent to service provider's management server 3; If time inconsistent, error message is sent to service provider's management server, this is kept at the internet information of this user in service provider's management server by service provider's management server, the account number and the password that comprise this user are sent in provider network device databases together, and logon information is sent to subscriber computer; 3rd step: account number that service provider's management server is extracted and other the multiple user be on same provider network equipment of the user described in second step surfs the Net and password are as original value, and the above-mentioned user transferring correspondence in provider network device databases surfs the Net, account number and password compare, if when there is more than 2 differences, then the user name involved by this provider network equipment corresponding in service provider's management server and password are all write in provider network device databases.
ask for an interview Fig. 2, a kind of restoration methods of user cipher, it is characterized in that it is realized by following steps: the first step: send user internet information: user, by being connected to user terminal network appliance 5 on the network interface 1 of subscriber computer and grid line sends to provider network equipment 2 to require internet information, comprises online account number and password; Second step: the user's internet information in user's internet information that the first step obtains by provider network equipment and provider network device databases compares, if time consistent, agree to online and logon information is sent to subscriber computer, and the information of having surfed the Net is sent to service provider's management server 3; If time inconsistent, error message is sent in subscriber computer; 3rd step: user is after service provider's supervisory computer 4 place Modify password, the internet information of this user that service provider's management server will be kept in service provider's management server, the account number and the password that comprise this user are sent in provider network device databases together.
ask for an interview Fig. 2, a kind of restoration methods of user cipher, it is characterized in that it is realized by following steps: the first step: send user internet information: user, by being connected to user terminal network appliance 5 on the network interface 1 of subscriber computer and grid line sends to provider network equipment 2 to require internet information, comprises online account number and password; Second step: the user's internet information in user's internet information that the first step obtains by provider network equipment and provider network device databases compares, if time consistent, agree to online and logon information is sent to subscriber computer, and the information of having surfed the Net is sent to service provider's management server 3; If time inconsistent, error message is sent in subscriber computer; 3rd step: user is after service provider's supervisory computer 4 place Modify password, the internet information of this user that service provider's management server will be kept in service provider's management server, the account number and the password that comprise this user are sent in provider network device databases together; 4th step: account number that service provider's management server is extracted and other the multiple user be on same provider network equipment of the user described in the 3rd step surfs the Net and password are as original value, and the above-mentioned user transferring correspondence in provider network device databases surfs the Net, account number and password compare, if when there is more than 2 differences, then the user name involved by this provider network equipment corresponding in service provider's management server and password are all write in provider network device databases.
the restoration methods of any one user cipher described above, is further characterized in that user wirelessly connects into provider network equipment.
a restoration methods for user cipher, is characterized in that it has been come by following steps: the first step: provider network equipment 2 sends to service provider's management server 3 and copies password request; Second step: service provider's management server identification the request of the respond services business network equipment, the password of the user account number be stored in the database of service provider's management server and correspondence is sent to provider network equipment, described user account number and password be single to or multipair, be the Internet user's that the provider network equipment that sends request is corresponding time multipair; 3rd step: provider network equipment receives the data that service provider's management server sends, and writes in provider network device databases.
in the present invention, by simple method, make user cipher obtain fast quick-recovery, and can overallly recover, bring great convenience to user.
therefore, the present invention has following Advantageous Effects: when provider network equipment failure or replacing, user cipher is no longer set to initial value, makes user account number safer; And individual privacy can not be leaked; User does not need the cost plenty of time to recover; Blocking up of service provider's telephone network can not be caused thus; Operator staff no longer needs cost plenty of time and energy to carry out password recovery; And user's complaint greatly reduces in rejuvenation.
the present invention is not limited to above-mentioned preferred forms, and should be appreciated that design of the present invention can be implemented to use by other various forms, they drop in protection scope of the present invention equally.

Claims (2)

1. the restoration methods of a user cipher, it is characterized in that it is realized by following steps: the first step: send user internet information: user sends to provider network equipment (2) to require internet information by the network interface (1) of subscriber computer and grid line, comprises online account number and password; Second step: the user's internet information in user's internet information that the first step obtains by provider network equipment and provider network device databases compares, if time consistent, agree to online and logon information is sent to subscriber computer, and the information of having surfed the Net is sent to service provider's management server (3); If time inconsistent, error message is sent to service provider's management server, this is kept at the internet information of this user in service provider's management server by service provider's management server, the account number and the password that comprise this user are sent in provider network device databases together, and logon information is sent to subscriber computer; 3rd step: account number that service provider's management server is extracted and other the multiple user be on same provider network equipment of the user described in second step surfs the Net and password are as original value, and the above-mentioned user transferring correspondence in provider network device databases surfs the Net, account number and password compare, if when there is more than 2 differences, then the user name involved by this provider network equipment corresponding in service provider's management server and password are all write in provider network device databases.
2. the restoration methods of a kind of user cipher according to claim 1, is further characterized in that user wirelessly connects into provider network equipment.
CN201210231321.3A 2012-07-05 2012-07-05 A kind of restoration methods of user cipher Active CN102799820B (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
CN201510376727.4A CN105007269B (en) 2012-07-05 2012-07-05 A kind of restoration methods of user cipher
CN201510376726.XA CN105007268B (en) 2012-07-05 2012-07-05 A kind of group restoration methods of user cipher
CN201210231321.3A CN102799820B (en) 2012-07-05 2012-07-05 A kind of restoration methods of user cipher
CN201510376728.9A CN104980443B (en) 2012-07-05 2012-07-05 A kind of quick recovery method of user cipher

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210231321.3A CN102799820B (en) 2012-07-05 2012-07-05 A kind of restoration methods of user cipher

Related Child Applications (3)

Application Number Title Priority Date Filing Date
CN201510376726.XA Division CN105007268B (en) 2012-07-05 2012-07-05 A kind of group restoration methods of user cipher
CN201510376728.9A Division CN104980443B (en) 2012-07-05 2012-07-05 A kind of quick recovery method of user cipher
CN201510376727.4A Division CN105007269B (en) 2012-07-05 2012-07-05 A kind of restoration methods of user cipher

Publications (2)

Publication Number Publication Date
CN102799820A CN102799820A (en) 2012-11-28
CN102799820B true CN102799820B (en) 2015-09-09

Family

ID=47198925

Family Applications (4)

Application Number Title Priority Date Filing Date
CN201210231321.3A Active CN102799820B (en) 2012-07-05 2012-07-05 A kind of restoration methods of user cipher
CN201510376728.9A Expired - Fee Related CN104980443B (en) 2012-07-05 2012-07-05 A kind of quick recovery method of user cipher
CN201510376727.4A Expired - Fee Related CN105007269B (en) 2012-07-05 2012-07-05 A kind of restoration methods of user cipher
CN201510376726.XA Expired - Fee Related CN105007268B (en) 2012-07-05 2012-07-05 A kind of group restoration methods of user cipher

Family Applications After (3)

Application Number Title Priority Date Filing Date
CN201510376728.9A Expired - Fee Related CN104980443B (en) 2012-07-05 2012-07-05 A kind of quick recovery method of user cipher
CN201510376727.4A Expired - Fee Related CN105007269B (en) 2012-07-05 2012-07-05 A kind of restoration methods of user cipher
CN201510376726.XA Expired - Fee Related CN105007268B (en) 2012-07-05 2012-07-05 A kind of group restoration methods of user cipher

Country Status (1)

Country Link
CN (4) CN102799820B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102945337A (en) * 2012-11-27 2013-02-27 国电南瑞科技股份有限公司 On-line self-help management method and system of Subversion user password
CN103902919B (en) * 2012-12-24 2016-12-28 北大方正集团有限公司 A kind of method and device recovering log-on message
CN103533563B (en) * 2013-10-21 2016-08-17 深圳市金立通信设备有限公司 The restoration methods of a kind of WLAN account and terminal
CN104580118B (en) * 2013-10-28 2018-08-17 深圳市腾讯计算机系统有限公司 A kind of recommendation method and device of password modification mode
US10404689B2 (en) * 2017-02-09 2019-09-03 Microsoft Technology Licensing, Llc Password security

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1946102A (en) * 2006-10-18 2007-04-11 华为技术有限公司 Method and device for forcibly revising cipher code
CN101453325A (en) * 2007-11-30 2009-06-10 环达电脑(上海)有限公司 Method for remotely modifying login keyword
CN101753313A (en) * 2008-12-11 2010-06-23 中国移动通信集团安徽有限公司 Password management method, password management system and password management server

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4943738B2 (en) * 2006-05-18 2012-05-30 株式会社三菱東京Ufj銀行 Recovery system and recovery method for user authentication function
CN101252472B (en) * 2008-03-14 2013-06-05 华为终端有限公司 Apparatus and method for processing digital household network fault
US20100199099A1 (en) * 2009-02-05 2010-08-05 Junling Wu User friendly Authentication and Login Method Using Multiple X509 Digital Certificates

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1946102A (en) * 2006-10-18 2007-04-11 华为技术有限公司 Method and device for forcibly revising cipher code
CN101453325A (en) * 2007-11-30 2009-06-10 环达电脑(上海)有限公司 Method for remotely modifying login keyword
CN101753313A (en) * 2008-12-11 2010-06-23 中国移动通信集团安徽有限公司 Password management method, password management system and password management server

Also Published As

Publication number Publication date
CN105007269A (en) 2015-10-28
CN105007269B (en) 2017-12-26
CN102799820A (en) 2012-11-28
CN105007268B (en) 2018-01-02
CN105007268A (en) 2015-10-28
CN104980443A (en) 2015-10-14
CN104980443B (en) 2017-10-31

Similar Documents

Publication Publication Date Title
CN108365961B (en) The response method and server that interface call method and terminal device, interface call
CN108734028B (en) Data management method based on block chain, block chain link point and storage medium
CN102546601B (en) The servicing unit of cloud computing terminal for accessing virtual machine
CN102799820B (en) A kind of restoration methods of user cipher
CN110912893B (en) Account number merging method
CN113011632B (en) Enterprise risk assessment method, device, equipment and computer readable storage medium
CN105872127B (en) A kind of IP address management system
CN112039868A (en) Firewall policy verification method, device, equipment and storage medium
CN105162756A (en) Method for implementing government virtual office platform
CN103457802A (en) Information transmission system and method
CN105656907B (en) A kind of router administration password recovery method and recovery system
CN107147711A (en) Application service update method and device
CN114240409A (en) Cross-chain asset interaction method based on improved Hash time lock
CN108011870B (en) A kind of remote software online upgrading information automatic identification management method
US9652630B2 (en) Enhanced view compliance tool
CN111597584B (en) Privacy protection and data sharing method, device and equipment based on blockchain
CN109299173A (en) Data transmission method, device and storage medium
CN106713289A (en) Communication method and system for borrowing articles
CN111045928A (en) Interface data testing method, device, terminal and storage medium
CN106294058A (en) The target strategy processing problems of operation document determines method and device
US20220004403A1 (en) Methods of providing an integrated interface that includes a virtual mobile device
CN110941412B (en) Method, system and terminal for realizing multi-terminal animation collaborative browsing based on pictures
CN112231612B (en) Method and device for transmitting configuration information, storage medium and electronic device
WO2016101424A1 (en) Method and apparatus for realizing terminal service information processing
CN107463568A (en) A kind of history accesses the acquisition methods and device of data

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
ASS Succession or assignment of patent right

Owner name: STATE GRID CORPORATION OF CHINA

Effective date: 20150806

Owner name: RIZHAO POWER SUPPLY COMPANY, STATE GRID SHANDONG E

Free format text: FORMER OWNER: SHEN QUNHUA

Effective date: 20150806

C41 Transfer of patent application or patent right or utility model
C53 Correction of patent for invention or patent application
CB03 Change of inventor or designer information

Inventor after: Dong Xuchun

Inventor after: Huang Wei

Inventor after: Bi Xiaowei

Inventor after: Zhang Meng

Inventor after: Shen Chen

Inventor after: Li Hao

Inventor after: Li Laizhen

Inventor after: Liu Zhigong

Inventor after: Li Huamei

Inventor after: Wang Hao

Inventor after: Liu Jiaxiang

Inventor after: Liu Hao

Inventor after: Zhu Guoliang

Inventor before: Shen Qunhua

COR Change of bibliographic data

Free format text: CORRECT: INVENTOR; FROM: SHEN QUNHUA TO: DONG XUCHUN LI HAO LI LAIZHEN LIU ZHIGONG LI HUAMEI WANG HAO LIU JIAXIANG LIU HAO ZHU GUOLIANG HUANG WEI BI XIAOWEI ZHANG MENG SHEN CHEN

TA01 Transfer of patent application right

Effective date of registration: 20150806

Address after: 276800 Rizhao City, Donggang Province, Yantai Road, No. 68 State Grid Shandong electric power company Rizhao Power Company

Applicant after: Rizhao Power Supply Company of State Grid Shandong Province Electric Power Company

Applicant after: State Grid Corporation of China

Address before: Suzhou City, Jiangsu Province, 215554 Changshou City Shang Hu Zhen Da he Cun Shen Tang Wan Tao (28) No. 79

Applicant before: Shen Qunhua

C14 Grant of patent or utility model
GR01 Patent grant