CN104202171A - Password reset method employed after user password forgotten - Google Patents
Password reset method employed after user password forgotten Download PDFInfo
- Publication number
- CN104202171A CN104202171A CN201410503121.8A CN201410503121A CN104202171A CN 104202171 A CN104202171 A CN 104202171A CN 201410503121 A CN201410503121 A CN 201410503121A CN 104202171 A CN104202171 A CN 104202171A
- Authority
- CN
- China
- Prior art keywords
- user
- password
- cell
- server
- mobile phone
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Mobile Radio Communication Systems (AREA)
- Telephone Function (AREA)
Abstract
The invention provides a password reset method employed after a user password is forgotten. The password reset method employed after the user password is forgotten comprises the following steps: after a mobile phone number is adopted to replace the unique identity of a user, the authenticity of the mobile phone number can be identified through inputting a verification code issued downwards by a server, so as to determine whether the logged in computer equipment is the mobile phone; but a person adopting the mobile phone to log in is probably not the user per se; therefore, for the sake of the user account safety, inputting the user password is further required at the time of the log-in, so as to ascertain the person adopting the mobile phone to log in is the user per se. The invention aims to solve the technical problem to provide a simple password reset method; the user is enabled to entrust a trustworthy person to empty the original user in the server; then, the user is allowed to set a new password, so that the efficiency of the user password reset is improved.
Description
Technical field
Computer security, especially user account safety.
Background technology
At computer application field, it is generally the legal identity of determining user by the mode of authentication of users unique identification and user cipher.In traditional computer age, authentication of users unique identification and user cipher can carry out on any computer equipment.Problem is, once user's unique identification and user cipher are revealed, server just cannot judge on computer equipment that now user is true validated user, still usurps the pseudo-validated user of user's unique identification and user cipher.
Along with the development of mobile Internet, people carry out alternate user unique identification with cell-phone number more and more.The benefit of doing is like this can be distinguished and be logged in the cell-phone number true and false by the descending identifying code of input server on mobile phone, and the computer equipment that user is logged in is restricted to just user's oneself mobile phone, prevents that user's unique identification and user cipher from being usurped arbitrarily.
Summary of the invention
With after cell-phone number alternate user unique identification, on mobile phone, can distinguish the cell-phone number true and false by the descending identifying code of input server, determine that the computer equipment logging in is this mobile phone really.But, the not necessarily user itself of people who uses this mobile phone to log in.Therefore, for user account safety, also need in logging in, further require input user cipher, to determine that the people who uses this mobile phone to log in is exactly user itself.
Here the problem that relates to user cipher, is that user cipher is easily forgotten.Owing to can not preserve the expressly password of form on server, therefore, user cipher can not be given for change by giving mode for change after forgeing, and can only reset.
Replacement user cipher, empties original subscriber's password on server exactly, to allow user to reset new password.At present, the method for replacement user cipher is by manually checking user identity, then, in the situation that determining user identity, original subscriber's password on server is emptied.This is actually and is solving three problems, and the one, who has the right to empty original subscriber's password, and the 2nd, how to confirm user identity, the 3rd, how to distinguish that user identity data is correct.
Therefore, technical problem to be solved by this invention is to provide a kind of simple user cipher remapping method, not to check user identity by system service personnel, this often needs user that a large amount of proof of identification data is provided, but in user's mode easily, allow user's (being that user oneself has the right) entrust its people trusty (can naturally confirm user identity) original subscriber's password on server to be emptied to (remove from user carry proof of identification data go to business hall link), allow afterwards user that new password is set voluntarily, to improve user cipher replacement efficiency.
One of the technical solution adopted in the present invention:
The successful landfall process order of user on mobile phone, remapping method after its password is forgotten, feature is: the successful landfall process order 1 of user 1 on mobile phone 1, each user 1 logs in backed off after random program 1, program 1 is all by the cell-phone number list of automatically preserving in mobile phone 1 address list, and step is:
(1), user 1 selects login user 2 from cell-phone number list;
(2), program 1 sets up record automatically on server, data item is: user's 2 cell-phone numbers, user's 1 cell-phone number, wherein, user's 2 cell-phone numbers are index keys;
(3), user 1 notifies user 2, allows it pass through the program 2 on its mobile phone 2, the button in click program 2 sends password reset indication to server;
(4), program 2 taking user's 2 cell-phone numbers as keyword search record, obtains user's 1 cell-phone number on server, accordingly original subscriber's password of user on server 1 is emptied;
(5), program 1 after server learns that original subscriber's password of user 1 is cleared, point out user 1, user 1 can arrange new user cipher voluntarily.
Described user 1 selects login user 2 from cell-phone number list, and feature is, in cell-phone number list, may have cell-phone number corresponding be non-user or non-login user, this can learn from server real-time query.
Described login user, feature is,, and inputs user cipher and successfully logs in through identifying code checking as user's uniquely identified cell-phone number.
Described user 1 notifies user 2, and feature is, can allow user 2 distinguish user 1 by sound, image etc., as by Advise By Wire, inform etc. face to face.
Two of the technical solution adopted in the present invention:
The unsuccessful landfall process order of user on mobile phone, the remapping method after its password is forgotten, feature is:
(1), program by the password of server reset time qualified be 7 days after;
(2), when the time comes, user can arrange new user cipher voluntarily.
Described 7 days, just one was reasonably worth.Even hand-set from stolen, during this, true user also has sufficient time to again to handle Mobile phone card etc., thereby makes user account can be subject to enough protections.Described 7 days can be also other number of days.Described 7 days can also be to arrange in the time that user cipher is set.
The useful technique effect that the present invention has is, user forgets after user cipher, and replacement user cipher is simple, convenient, efficient, can save system manual service cost, remove complicated user identity compound nucleus process from, the user identity of avoiding user identity data to cause is examined mistake.
Accompanying drawing
Fig. 1 is technical solution of the present invention diagram.
Specific embodiment
The present invention provides cell-phone number described in technical scheme and is equal to user's unique identification, in concrete enforcement, can also set up one-to-one relationship with user's unique identification, can know cell-phone number by user's unique identification, carries out the processing procedure relevant to cell-phone number.
The present invention provides mobile phone described in technical scheme, and its verification mode is the descending identifying code of input server, to distinguish the true and false of corresponding cell-phone number.In concrete enforcement, verification mode can be other, comprises by mobile phone to the up checking note of server etc., or even the new technology that can rationally continue to use because of the appearance of new mechanics of communication.
The present invention provides cell-phone number list described in technical scheme both can be stored in this locality, was stored on mobile phone, also can be stored in high in the clouds, was stored on server.
The present invention provides cell-phone number list described in technical scheme and can also in the time that user arranges user cipher, input.
Above-mentioned various embodiment, all, in the claim of technical solution of the present invention, is used these embodiments, forms the present invention is encroached right.
Claims (7)
1. the successful landfall process order of user on mobile phone, remapping method after its password is forgotten, feature is: the successful landfall process order 1 of user 1 on mobile phone 1, each user 1 logs in backed off after random program 1, program 1 is all by the cell-phone number list of automatically preserving in mobile phone 1 address list, and step is:
(1), user 1 selects login user 2 from cell-phone number list;
(2), program 1 sets up record automatically on server, data item is: user's 2 cell-phone numbers, user's 1 cell-phone number, wherein, user's 2 cell-phone numbers are index keys;
(3), user 1 notifies user 2, allows it pass through the program 2 on its mobile phone 2, the button in click program 2 sends password reset indication to server;
(4), program 2 taking user's 2 cell-phone numbers as keyword search record, obtains user's 1 cell-phone number on server, accordingly original subscriber's password of user on server 1 is emptied;
(5), program 1 after server learns that original subscriber's password of user 1 is cleared, point out user 1, user 1 can arrange new user cipher voluntarily.
2. user 1 selects login user 2 from cell-phone number list according to claim 1, and feature is: in cell-phone number list, may have cell-phone number corresponding be non-user or non-login user, this can learn from server real-time query.
3. login user according to claim 1, feature is:, and input user cipher and successfully log in through identifying code checking as user's uniquely identified cell-phone number.
4. user 1 notifies user 2 according to claim 1, and feature is: can allow user 2 distinguish user 1 by sound, image etc., as by Advise By Wire, inform etc. face to face.
5. the unsuccessful landfall process order of user on mobile phone, the remapping method after its password is forgotten, feature is:
(1), program by the password of server reset time qualified be 7 days after;
(2), when the time comes, user can arrange new user cipher voluntarily.
6. according to claim 57 days, feature was: can be also other number of days.
7. according to claim 57 days, feature was: can also be to arrange in the time that user cipher is set.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410503121.8A CN104202171A (en) | 2014-09-28 | 2014-09-28 | Password reset method employed after user password forgotten |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410503121.8A CN104202171A (en) | 2014-09-28 | 2014-09-28 | Password reset method employed after user password forgotten |
Publications (1)
Publication Number | Publication Date |
---|---|
CN104202171A true CN104202171A (en) | 2014-12-10 |
Family
ID=52087401
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410503121.8A Pending CN104202171A (en) | 2014-09-28 | 2014-09-28 | Password reset method employed after user password forgotten |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104202171A (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030074585A1 (en) * | 2001-10-16 | 2003-04-17 | Marc Charbonneau | Method for supporting single sign on |
CN103338443A (en) * | 2013-05-29 | 2013-10-02 | 北京奇虎科技有限公司 | Terminal security protection method and system |
CN103457991A (en) * | 2013-05-29 | 2013-12-18 | 北京奇虎科技有限公司 | Terminal safety protection method and system |
CN103458396A (en) * | 2012-05-29 | 2013-12-18 | 盛乐信息技术(上海)有限公司 | Terminal locking and unlocking method and terminal locking and unlocking system |
-
2014
- 2014-09-28 CN CN201410503121.8A patent/CN104202171A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030074585A1 (en) * | 2001-10-16 | 2003-04-17 | Marc Charbonneau | Method for supporting single sign on |
CN103458396A (en) * | 2012-05-29 | 2013-12-18 | 盛乐信息技术(上海)有限公司 | Terminal locking and unlocking method and terminal locking and unlocking system |
CN103338443A (en) * | 2013-05-29 | 2013-10-02 | 北京奇虎科技有限公司 | Terminal security protection method and system |
CN103457991A (en) * | 2013-05-29 | 2013-12-18 | 北京奇虎科技有限公司 | Terminal safety protection method and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102638447B (en) | Method and device for system login based on autonomously generated password of user | |
US20150143483A1 (en) | Device and Method for Identity Authentication Management | |
US20150271167A1 (en) | Method of Altering Authentication Information to Multiple Systems | |
WO2015144058A1 (en) | Account binding processing method, apparatus and system | |
CN104468553B (en) | A kind of method, apparatus and system that public account logs in | |
CN103929411B (en) | Information displaying method, terminal, safety server and system | |
US8856954B1 (en) | Authenticating using organization based information | |
CN106161710B (en) | A kind of user account safety management system based on smart phone | |
CN106688220A (en) | Conditional access to services based on device claims | |
US9697346B2 (en) | Method and apparatus for identifying and associating devices using visual recognition | |
JP6171988B2 (en) | Authentication information management system, authentication information management device, and program | |
CN105790952A (en) | Verification system and verification method of user information | |
CN105337739B (en) | Safe login method, device, server and terminal | |
CN107517180B (en) | Login method and device | |
US20140281482A1 (en) | Secure storage and sharing of user objects | |
CN106534102A (en) | Device access method and device and electronic device | |
CN106295423A (en) | A kind of method for exhibiting data and client | |
US10565210B2 (en) | Generating and verifying a reputational profile | |
US20100310061A1 (en) | Account number security system with communication system | |
CN107005558A (en) | Location-based user's ambiguity is eliminated | |
JP2011100268A (en) | Service providing system, authentication device, service providing device, control method, and program | |
CN105827597A (en) | Method for managing internet account number and password | |
CN104239779A (en) | Resetting method used after user password forgetting | |
CN105530230A (en) | Fingerprint authentication method, device and server | |
CN106790114A (en) | A kind of code entry method with prompt facility |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20141210 |