CN105007269A - Recovery method of user password - Google Patents

Recovery method of user password Download PDF

Info

Publication number
CN105007269A
CN105007269A CN201510376727.4A CN201510376727A CN105007269A CN 105007269 A CN105007269 A CN 105007269A CN 201510376727 A CN201510376727 A CN 201510376727A CN 105007269 A CN105007269 A CN 105007269A
Authority
CN
China
Prior art keywords
user
service provider
password
provider network
management server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510376727.4A
Other languages
Chinese (zh)
Other versions
CN105007269B (en
Inventor
沈群华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Science and Technology Liaoning USTL
Original Assignee
沈群华
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 沈群华 filed Critical 沈群华
Priority to CN201510376727.4A priority Critical patent/CN105007269B/en
Publication of CN105007269A publication Critical patent/CN105007269A/en
Application granted granted Critical
Publication of CN105007269B publication Critical patent/CN105007269B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • H04L67/1044Group management mechanisms 
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/40Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass for recovering from a failure of a protocol instance or entity, e.g. service redundancy protocols, protocol state redundancy or protocol service redirection

Abstract

The invention relates to the technical field of computers, and in particular relates to a recovery method of a user password. The method is characterized by comprising the following steps: step one, user online information is transmitted; step two, service provider network equipment compares the user online information with user online information stored in a service provider network equipment database; if the user online information is inconsistent with the user online information in the service provider network equipment database, a service provider management server sends the online information of the user stored in the service provider management server to the service provider network equipment database, and sends login information to a user computer. The recovery method disclosed by the invention has the beneficial effects that the user password is no longer an initial value when the service provider network equipment is in fault or replaced, so that an user account is safer; individual privacy cannot be leaked, the user can recover the password without consuming plenty of time; the recovery cannot cause the congestion of the telephone network of the service provider; a worker of an operator is unnecessary to consume plenty of time and vigor to recover the password, and the complain of the user in the recovery process is greatly reduced.

Description

A kind of restoration methods of user cipher
the application is that name is called: a kind of restoration methods, application number of user cipher are: 201210231321.3, the applying date is: the divisional application of the patent of invention of on 07 05th, 2012.
Technical field
the present invention relates to field of computer technology, especially relate to a kind of restoration methods of user cipher.
Background technology
along with popularizing of computer internet broadband, Internet user gets more and more, and existing network access has multiple, and conventional is that user inputs account number and password, can be accessed by network through system validation rear.Conventional is have a provider network equipment in subscriber unit outside, user is connected to provider network equipment by the network interface of computer or user side network interface and grid line, after service on net is opened in user's application, distribute to user by service provider and log in account number and password; When needing Modify password, user can at service provider's sales counter with perfect instrument, by the open modify feature of the related personnel of service provider's supervisory computer, by amended Password Input service provider management server, then, by service provider's management server, account number and password are transferred to provider network equipment together.Account number in the account number of input when user surfs the Net and password and provider network equipment and password compare, if consistent time; allow online, otherwise, occur pointing out, if code name is the type of error etc. of 691.
due to provider network equipment being connected with a large amount of users, be generally several to several thousand; Therefore, when the network equipment is changed, because account number in the network equipment and password have not existed, therefore, Internet user can recover function of surfing the Net in the following manner: service provider of 1, making a phone call, and allows it that password is set to initial value; 2, to make a phone call service provider, tell its password, allow its input password be sent on provider network equipment; 3, service provider's sales counter amendment is gone.
above-mentioned three kinds of alter modes all existing defects: password is set to initial value by mode one, and user account number is dangerous; Mode two individual privacy is leaked; Mode three needs to spend user's plenty of time.And mode one and mode two can cause blocking up of telephone network; Mode one to mode three all can spend plenty of time and the energy of operator staff; And in recovery process, usually can suffer a large amount of complaints of user.
Summary of the invention
for solving the problem, the present invention discloses a kind of restoration methods of user cipher, and it is achieved through the following technical solutions.
a kind of restoration methods of user cipher, it is characterized in that it is realized by following steps: the first step: send user internet information: user sends to provider network equipment 2 to require internet information by the network interface 1 of subscriber computer and grid line, comprises online account number and password; Second step: the user's internet information in user's internet information that the first step obtains by provider network equipment and provider network device databases compares, if time consistent, agree to online and logon information is sent to subscriber computer, and the information of having surfed the Net is sent to service provider's management server 3; If time inconsistent, error message is sent to service provider's management server, this is kept at the internet information of this user in service provider's management server by service provider's management server, the account number and the password that comprise this user are sent in provider network device databases together, and logon information is sent to subscriber computer.
a kind of restoration methods of user cipher, it is characterized in that it is realized by following steps: the first step: send user internet information: user sends to provider network equipment 2 to require internet information by the network interface 1 of subscriber computer and grid line, comprises online account number and password; Second step: the user's internet information in user's internet information that the first step obtains by provider network equipment and provider network device databases compares, if time consistent, agree to online and logon information is sent to subscriber computer, and the information of having surfed the Net is sent to service provider's management server 3; If time inconsistent, error message is sent to service provider's management server, this is kept at the internet information of this user in service provider's management server by service provider's management server, the account number and the password that comprise this user are sent in provider network device databases together, and logon information is sent to subscriber computer; 3rd step: account number that service provider's management server extracts and other the multiple user be on same provider network equipment of the user described in second step surfs the Net and password are as original value, and the above-mentioned user transferring correspondence in provider network device databases surfs the Net, account number and password compare, if when there is more than 2 differences, then the user name involved by this provider network equipment corresponding in service provider's management server and password are all write in provider network device databases.
a kind of restoration methods of user cipher, it is characterized in that it is realized by following steps: the first step: send user internet information: user sends to provider network equipment 2 to require internet information by the network interface 1 of subscriber computer and grid line, comprises online account number and password; Second step: the user's internet information in user's internet information that the first step obtains by provider network equipment and provider network device databases compares, if time consistent, agree to online and logon information is sent to subscriber computer, and the information of having surfed the Net is sent to service provider's management server 3; If time inconsistent, error message is sent in subscriber computer; 3rd step: user is after service provider's supervisory computer 4 place Modify password, the internet information of this user that service provider's management server will be kept in service provider's management server, the account number and the password that comprise this user are sent in provider network device databases together.
a kind of restoration methods of user cipher, it is characterized in that it is realized by following steps: the first step: send user internet information: user sends to provider network equipment 2 to require internet information by the network interface 1 of subscriber computer and grid line, comprises online account number and password; Second step: the user's internet information in user's internet information that the first step obtains by provider network equipment and provider network device databases compares, if time consistent, agree to online and logon information is sent to subscriber computer, and the information of having surfed the Net is sent to service provider's management server 3; If time inconsistent, error message is sent in subscriber computer; 3rd step: user is after service provider's supervisory computer 4 place Modify password, the internet information of this user that service provider's management server will be kept in service provider's management server, the account number and the password that comprise this user are sent in provider network device databases together; 4th step: account number that service provider's management server extracts and other the multiple user be on same provider network equipment of the user described in the 3rd step surfs the Net and password are as original value, and the above-mentioned user transferring correspondence in provider network device databases surfs the Net, account number and password compare, if when there is more than 2 differences, then the user name involved by this provider network equipment corresponding in service provider's management server and password are all write in provider network device databases.
a kind of restoration methods of user cipher, it is characterized in that it is realized by following steps: the first step: send user internet information: user, by being connected to user terminal network appliance 5 on the network interface 1 of subscriber computer and grid line sends to provider network equipment 2 to require internet information, comprises online account number and password; Second step: the user's internet information in user's internet information that the first step obtains by provider network equipment and provider network device databases compares, if time consistent, agree to online and logon information is sent to subscriber computer, and the information of having surfed the Net is sent to service provider's management server 3; If time inconsistent, error message is sent to service provider's management server, this is kept at the internet information of this user in service provider's management server by service provider's management server, the account number and the password that comprise this user are sent in provider network device databases together, and logon information is sent to subscriber computer.
a kind of restoration methods of user cipher, it is characterized in that it is realized by following steps: the first step: send user internet information: user, by being connected to user terminal network appliance 5 on the network interface 1 of subscriber computer and grid line sends to provider network equipment 2 to require internet information, comprises online account number and password; Second step: the user's internet information in user's internet information that the first step obtains by provider network equipment and provider network device databases compares, if time consistent, agree to online and logon information is sent to subscriber computer, and the information of having surfed the Net is sent to service provider's management server 3; If time inconsistent, error message is sent to service provider's management server, this is kept at the internet information of this user in service provider's management server by service provider's management server, the account number and the password that comprise this user are sent in provider network device databases together, and logon information is sent to subscriber computer; 3rd step: account number that service provider's management server extracts and other the multiple user be on same provider network equipment of the user described in second step surfs the Net and password are as original value, and the above-mentioned user transferring correspondence in provider network device databases surfs the Net, account number and password compare, if when there is more than 2 differences, then the user name involved by this provider network equipment corresponding in service provider's management server and password are all write in provider network device databases.
a kind of restoration methods of user cipher, it is characterized in that it is realized by following steps: the first step: send user internet information: user, by being connected to user terminal network appliance 5 on the network interface 1 of subscriber computer and grid line sends to provider network equipment 2 to require internet information, comprises online account number and password; Second step: the user's internet information in user's internet information that the first step obtains by provider network equipment and provider network device databases compares, if time consistent, agree to online and logon information is sent to subscriber computer, and the information of having surfed the Net is sent to service provider's management server 3; If time inconsistent, error message is sent in subscriber computer; 3rd step: user is after service provider's supervisory computer 4 place Modify password, the internet information of this user that service provider's management server will be kept in service provider's management server, the account number and the password that comprise this user are sent in provider network device databases together.
a kind of restoration methods of user cipher, it is characterized in that it is realized by following steps: the first step: send user internet information: user, by being connected to user terminal network appliance 5 on the network interface 1 of subscriber computer and grid line sends to provider network equipment 2 to require internet information, comprises online account number and password; Second step: the user's internet information in user's internet information that the first step obtains by provider network equipment and provider network device databases compares, if time consistent, agree to online and logon information is sent to subscriber computer, and the information of having surfed the Net is sent to service provider's management server 3; If time inconsistent, error message is sent in subscriber computer; 3rd step: user is after service provider's supervisory computer 4 place Modify password, the internet information of this user that service provider's management server will be kept in service provider's management server, the account number and the password that comprise this user are sent in provider network device databases together; 4th step: account number that service provider's management server extracts and other the multiple user be on same provider network equipment of the user described in the 3rd step surfs the Net and password are as original value, and the above-mentioned user transferring correspondence in provider network device databases surfs the Net, account number and password compare, if when there is more than 2 differences, then the user name involved by this provider network equipment corresponding in service provider's management server and password are all write in provider network device databases.
the restoration methods of any one user cipher described above, is further characterized in that user wirelessly connects into provider network equipment.
a restoration methods for user cipher, is characterized in that it has been come by following steps: the first step: provider network equipment 2 sends to service provider's management server 3 and copies password request; Second step: service provider's management server identification the request of the respond services business network equipment, the password of the user account number be stored in the database of service provider's management server and correspondence is sent to provider network equipment, described user account number and password be single to or multipair, be the Internet user's that the provider network equipment that sends request is corresponding time multipair; 3rd step: provider network equipment receives the data that service provider's management server sends, and writes in provider network device databases.
in the present invention, by simple method, make user cipher obtain fast quick-recovery, and can overallly recover, bring great convenience to user.
therefore, the present invention has following Advantageous Effects: when provider network equipment fault or replacing, user cipher is no longer set to initial value, makes user account number safer; And individual privacy can not be leaked; User does not need the cost plenty of time to recover; Blocking up of service provider's telephone network can not be caused thus; Operator staff no longer needs cost plenty of time and energy to carry out password recovery; And user's complaint greatly reduces in recovery process.
Accompanying drawing explanation
fig. 1 is the theory diagram of the invention process example 1.
fig. 2 is the theory diagram of the invention process example 2.
Embodiment
embodiment 1
ask for an interview Fig. 1, a kind of restoration methods of user cipher, it is characterized in that it is realized by following steps: the first step: send user internet information: user sends to provider network equipment 2 to require internet information by the network interface 1 of subscriber computer and grid line, comprises online account number and password; Second step: the user's internet information in user's internet information that the first step obtains by provider network equipment and provider network device databases compares, if time consistent, agree to online and logon information is sent to subscriber computer, and the information of having surfed the Net is sent to service provider's management server 3; If time inconsistent, error message is sent to service provider's management server, this is kept at the internet information of this user in service provider's management server by service provider's management server, the account number and the password that comprise this user are sent in provider network device databases together, and logon information is sent to subscriber computer.
ask for an interview Fig. 1, a kind of restoration methods of user cipher, it is characterized in that it is realized by following steps: the first step: send user internet information: user sends to provider network equipment 2 to require internet information by the network interface 1 of subscriber computer and grid line, comprises online account number and password; Second step: the user's internet information in user's internet information that the first step obtains by provider network equipment and provider network device databases compares, if time consistent, agree to online and logon information is sent to subscriber computer, and the information of having surfed the Net is sent to service provider's management server 3; If time inconsistent, error message is sent to service provider's management server, this is kept at the internet information of this user in service provider's management server by service provider's management server, the account number and the password that comprise this user are sent in provider network device databases together, and logon information is sent to subscriber computer; 3rd step: account number that service provider's management server extracts and other the multiple user be on same provider network equipment of the user described in second step surfs the Net and password are as original value, and the above-mentioned user transferring correspondence in provider network device databases surfs the Net, account number and password compare, if when there is more than 2 differences, then the user name involved by this provider network equipment corresponding in service provider's management server and password are all write in provider network device databases.
ask for an interview Fig. 1, a kind of restoration methods of user cipher, it is characterized in that it is realized by following steps: the first step: send user internet information: user sends to provider network equipment 2 to require internet information by the network interface 1 of subscriber computer and grid line, comprises online account number and password; Second step: the user's internet information in user's internet information that the first step obtains by provider network equipment and provider network device databases compares, if time consistent, agree to online and logon information is sent to subscriber computer, and the information of having surfed the Net is sent to service provider's management server 3; If time inconsistent, error message is sent in subscriber computer; 3rd step: user is after service provider's supervisory computer 4 place Modify password, the internet information of this user that service provider's management server will be kept in service provider's management server, the account number and the password that comprise this user are sent in provider network device databases together.
ask for an interview Fig. 1, a kind of restoration methods of user cipher, it is characterized in that it is realized by following steps: the first step: send user internet information: user sends to provider network equipment 2 to require internet information by the network interface 1 of subscriber computer and grid line, comprises online account number and password; Second step: the user's internet information in user's internet information that the first step obtains by provider network equipment and provider network device databases compares, if time consistent, agree to online and logon information is sent to subscriber computer, and the information of having surfed the Net is sent to service provider's management server 3; If time inconsistent, error message is sent in subscriber computer; 3rd step: user is after service provider's supervisory computer 4 place Modify password, the internet information of this user that service provider's management server will be kept in service provider's management server, the account number and the password that comprise this user are sent in provider network device databases together; 4th step: account number that service provider's management server extracts and other the multiple user be on same provider network equipment of the user described in the 3rd step surfs the Net and password are as original value, and the above-mentioned user transferring correspondence in provider network device databases surfs the Net, account number and password compare, if when there is more than 2 differences, then the user name involved by this provider network equipment corresponding in service provider's management server and password are all write in provider network device databases.
embodiment 2
ask for an interview Fig. 2, a kind of restoration methods of user cipher, it is characterized in that it is realized by following steps: the first step: send user internet information: user, by being connected to user terminal network appliance 5 on the network interface 1 of subscriber computer and grid line sends to provider network equipment 2 to require internet information, comprises online account number and password; Second step: the user's internet information in user's internet information that the first step obtains by provider network equipment and provider network device databases compares, if time consistent, agree to online and logon information is sent to subscriber computer, and the information of having surfed the Net is sent to service provider's management server 3; If time inconsistent, error message is sent to service provider's management server, this is kept at the internet information of this user in service provider's management server by service provider's management server, the account number and the password that comprise this user are sent in provider network device databases together, and logon information is sent to subscriber computer.
ask for an interview Fig. 2, a kind of restoration methods of user cipher, it is characterized in that it is realized by following steps: the first step: send user internet information: user, by being connected to user terminal network appliance 5 on the network interface 1 of subscriber computer and grid line sends to provider network equipment 2 to require internet information, comprises online account number and password; Second step: the user's internet information in user's internet information that the first step obtains by provider network equipment and provider network device databases compares, if time consistent, agree to online and logon information is sent to subscriber computer, and the information of having surfed the Net is sent to service provider's management server 3; If time inconsistent, error message is sent to service provider's management server, this is kept at the internet information of this user in service provider's management server by service provider's management server, the account number and the password that comprise this user are sent in provider network device databases together, and logon information is sent to subscriber computer; 3rd step: account number that service provider's management server extracts and other the multiple user be on same provider network equipment of the user described in second step surfs the Net and password are as original value, and the above-mentioned user transferring correspondence in provider network device databases surfs the Net, account number and password compare, if when there is more than 2 differences, then the user name involved by this provider network equipment corresponding in service provider's management server and password are all write in provider network device databases.
ask for an interview Fig. 2, a kind of restoration methods of user cipher, it is characterized in that it is realized by following steps: the first step: send user internet information: user, by being connected to user terminal network appliance 5 on the network interface 1 of subscriber computer and grid line sends to provider network equipment 2 to require internet information, comprises online account number and password; Second step: the user's internet information in user's internet information that the first step obtains by provider network equipment and provider network device databases compares, if time consistent, agree to online and logon information is sent to subscriber computer, and the information of having surfed the Net is sent to service provider's management server 3; If time inconsistent, error message is sent in subscriber computer; 3rd step: user is after service provider's supervisory computer 4 place Modify password, the internet information of this user that service provider's management server will be kept in service provider's management server, the account number and the password that comprise this user are sent in provider network device databases together.
ask for an interview Fig. 2, a kind of restoration methods of user cipher, it is characterized in that it is realized by following steps: the first step: send user internet information: user, by being connected to user terminal network appliance 5 on the network interface 1 of subscriber computer and grid line sends to provider network equipment 2 to require internet information, comprises online account number and password; Second step: the user's internet information in user's internet information that the first step obtains by provider network equipment and provider network device databases compares, if time consistent, agree to online and logon information is sent to subscriber computer, and the information of having surfed the Net is sent to service provider's management server 3; If time inconsistent, error message is sent in subscriber computer; 3rd step: user is after service provider's supervisory computer 4 place Modify password, the internet information of this user that service provider's management server will be kept in service provider's management server, the account number and the password that comprise this user are sent in provider network device databases together; 4th step: account number that service provider's management server extracts and other the multiple user be on same provider network equipment of the user described in the 3rd step surfs the Net and password are as original value, and the above-mentioned user transferring correspondence in provider network device databases surfs the Net, account number and password compare, if when there is more than 2 differences, then the user name involved by this provider network equipment corresponding in service provider's management server and password are all write in provider network device databases.
the restoration methods of any one user cipher described above, is further characterized in that user wirelessly connects into provider network equipment.
a restoration methods for user cipher, is characterized in that it has been come by following steps: the first step: provider network equipment 2 sends to service provider's management server 3 and copies password request; Second step: service provider's management server identification the request of the respond services business network equipment, the password of the user account number be stored in the database of service provider's management server and correspondence is sent to provider network equipment, described user account number and password be single to or multipair, be the Internet user's that the provider network equipment that sends request is corresponding time multipair; 3rd step: provider network equipment receives the data that service provider's management server sends, and writes in provider network device databases.
in the present invention, by simple method, make user cipher obtain fast quick-recovery, and can overallly recover, bring great convenience to user.
therefore, the present invention has following Advantageous Effects: when provider network equipment fault or replacing, user cipher is no longer set to initial value, makes user account number safer; And individual privacy can not be leaked; User does not need the cost plenty of time to recover; Blocking up of service provider's telephone network can not be caused thus; Operator staff no longer needs cost plenty of time and energy to carry out password recovery; And user's complaint greatly reduces in recovery process.
the present invention is not limited to above-mentioned preferred forms, and should be appreciated that design of the present invention can be implemented to use by other various forms, they drop in protection scope of the present invention equally.

Claims (3)

1. the restoration methods of a user cipher, it is characterized in that it is realized by following steps: the first step: send user internet information: user sends to provider network equipment (2) to require internet information by the network interface (1) of subscriber computer and grid line, comprises online account number and password; Second step: the user's internet information in user's internet information that the first step obtains by provider network equipment and provider network device databases compares, if time consistent, agree to online and logon information is sent to subscriber computer, and the information of having surfed the Net is sent to service provider's management server (3); If time inconsistent, error message is sent in subscriber computer; 3rd step: user is after service provider's supervisory computer (4) place Modify password, the internet information of this user that service provider's management server will be kept in service provider's management server, the account number and the password that comprise this user are sent in provider network device databases together; 4th step: account number that service provider's management server extracts and other the multiple user be on same provider network equipment of the user described in the 3rd step surfs the Net and password are as original value, and the above-mentioned user transferring correspondence in provider network device databases surfs the Net, account number and password compare, if when there is more than 2 differences, then the user name involved by this provider network equipment corresponding in service provider's management server and password are all write in provider network device databases.
2. the restoration methods of a kind of user cipher according to claim 1, is further characterized in that user wirelessly connects into provider network equipment.
3. the restoration methods of a user cipher, it is characterized in that it is realized by following steps: the first step: send user internet information: user sends to provider network equipment (2) to require internet information by the network interface (1) of subscriber computer and grid line, comprises online account number and password; Second step: the user's internet information in user's internet information that the first step obtains by provider network equipment and provider network device databases compares, if time consistent, agree to online and logon information is sent to subscriber computer, and the information of having surfed the Net is sent to service provider's management server (3); If time inconsistent, error message is sent to service provider's management server, this is kept at the internet information of this user in service provider's management server by service provider's management server, the account number and the password that comprise this user are sent in provider network device databases together, and logon information is sent to subscriber computer.
CN201510376727.4A 2012-07-05 2012-07-05 A kind of restoration methods of user cipher Expired - Fee Related CN105007269B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510376727.4A CN105007269B (en) 2012-07-05 2012-07-05 A kind of restoration methods of user cipher

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201210231321.3A CN102799820B (en) 2012-07-05 2012-07-05 A kind of restoration methods of user cipher
CN201510376727.4A CN105007269B (en) 2012-07-05 2012-07-05 A kind of restoration methods of user cipher

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN201210231321.3A Division CN102799820B (en) 2012-07-05 2012-07-05 A kind of restoration methods of user cipher

Publications (2)

Publication Number Publication Date
CN105007269A true CN105007269A (en) 2015-10-28
CN105007269B CN105007269B (en) 2017-12-26

Family

ID=47198925

Family Applications (4)

Application Number Title Priority Date Filing Date
CN201510376727.4A Expired - Fee Related CN105007269B (en) 2012-07-05 2012-07-05 A kind of restoration methods of user cipher
CN201510376728.9A Expired - Fee Related CN104980443B (en) 2012-07-05 2012-07-05 A kind of quick recovery method of user cipher
CN201510376726.XA Expired - Fee Related CN105007268B (en) 2012-07-05 2012-07-05 A kind of group restoration methods of user cipher
CN201210231321.3A Active CN102799820B (en) 2012-07-05 2012-07-05 A kind of restoration methods of user cipher

Family Applications After (3)

Application Number Title Priority Date Filing Date
CN201510376728.9A Expired - Fee Related CN104980443B (en) 2012-07-05 2012-07-05 A kind of quick recovery method of user cipher
CN201510376726.XA Expired - Fee Related CN105007268B (en) 2012-07-05 2012-07-05 A kind of group restoration methods of user cipher
CN201210231321.3A Active CN102799820B (en) 2012-07-05 2012-07-05 A kind of restoration methods of user cipher

Country Status (1)

Country Link
CN (4) CN105007269B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102945337A (en) * 2012-11-27 2013-02-27 国电南瑞科技股份有限公司 On-line self-help management method and system of Subversion user password
CN103902919B (en) * 2012-12-24 2016-12-28 北大方正集团有限公司 A kind of method and device recovering log-on message
CN103533563B (en) * 2013-10-21 2016-08-17 深圳市金立通信设备有限公司 The restoration methods of a kind of WLAN account and terminal
CN104580118B (en) * 2013-10-28 2018-08-17 深圳市腾讯计算机系统有限公司 A kind of recommendation method and device of password modification mode
US10404689B2 (en) * 2017-02-09 2019-09-03 Microsoft Technology Licensing, Llc Password security

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007310630A (en) * 2006-05-18 2007-11-29 Bank Of Tokyo-Mitsubishi Ufj Ltd Recovery system and method for function of personal identification
CN101252472A (en) * 2008-03-14 2008-08-27 深圳华为通信技术有限公司 Apparatus and method for processing digital household network fault
CN101453325A (en) * 2007-11-30 2009-06-10 环达电脑(上海)有限公司 Method for remotely modifying login keyword
US20100199099A1 (en) * 2009-02-05 2010-08-05 Junling Wu User friendly Authentication and Login Method Using Multiple X509 Digital Certificates

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1946102A (en) * 2006-10-18 2007-04-11 华为技术有限公司 Method and device for forcibly revising cipher code
CN101753313A (en) * 2008-12-11 2010-06-23 中国移动通信集团安徽有限公司 Password management method, password management system and password management server

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007310630A (en) * 2006-05-18 2007-11-29 Bank Of Tokyo-Mitsubishi Ufj Ltd Recovery system and method for function of personal identification
CN101453325A (en) * 2007-11-30 2009-06-10 环达电脑(上海)有限公司 Method for remotely modifying login keyword
CN101252472A (en) * 2008-03-14 2008-08-27 深圳华为通信技术有限公司 Apparatus and method for processing digital household network fault
US20100199099A1 (en) * 2009-02-05 2010-08-05 Junling Wu User friendly Authentication and Login Method Using Multiple X509 Digital Certificates

Also Published As

Publication number Publication date
CN104980443A (en) 2015-10-14
CN105007268A (en) 2015-10-28
CN104980443B (en) 2017-10-31
CN102799820B (en) 2015-09-09
CN102799820A (en) 2012-11-28
CN105007268B (en) 2018-01-02
CN105007269B (en) 2017-12-26

Similar Documents

Publication Publication Date Title
US7826597B2 (en) Methods and apparatus to handle customer support requests
CN102799820B (en) A kind of restoration methods of user cipher
CN108365961A (en) The response method and server that interface call method and terminal device, interface call
CN109361753A (en) A kind of Internet of things system framework and encryption method
CN101557427A (en) Method for providing diffluent information and realizing the diffluence of clients, system and server thereof
US10164944B1 (en) System, method, and computer program for implementing a virtual obfuscation service in a network
WO2020228531A1 (en) Consortium blockchain governance method and apparatus, computer device and storage medium
CN103179099A (en) Unified certification method for accessing to open website platforms and website platform
CN103457802A (en) Information transmission system and method
CN106993009A (en) A kind of method and apparatus for loading webpage in a browser
CN110457629A (en) Permission processing, authority control method and device
US10027569B1 (en) System, method, and computer program for testing virtual services
CN114240409A (en) Cross-chain asset interaction method based on improved Hash time lock
US9652630B2 (en) Enhanced view compliance tool
CN108011870B (en) A kind of remote software online upgrading information automatic identification management method
CN111597584B (en) Privacy protection and data sharing method, device and equipment based on blockchain
CN103391303B (en) Service fault noticing method and server using same
CN111045928A (en) Interface data testing method, device, terminal and storage medium
CN106713289A (en) Communication method and system for borrowing articles
CN108960454A (en) Generation method, device and the storage medium of maintenance program
CN110941412B (en) Method, system and terminal for realizing multi-terminal animation collaborative browsing based on pictures
US20220004403A1 (en) Methods of providing an integrated interface that includes a virtual mobile device
CN107819624A (en) A kind of determination method and device of content delivery network node distributed intelligence
CN203027296U (en) Device and system for transmitting information
CN107463568A (en) A kind of history accesses the acquisition methods and device of data

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB03 Change of inventor or designer information
CB03 Change of inventor or designer information

Inventor after: Dai Hong

Inventor before: Shen Qunhua

TA01 Transfer of patent application right

Effective date of registration: 20171129

Address after: 114051 Anshan city of Liaoning Province Qianshan Road No. 185

Applicant after: Dai Hong

Address before: Suzhou City, Jiangsu Province, 215554 Changshou City Shang Hu Zhen Da he Cun Shen Tang Wan Tao (28) No. 79

Applicant before: Shen Qunhua

TA01 Transfer of patent application right
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20180316

Address after: 114051 No. 185 Qianshan Middle Road, hi tech Zone, Liaoning, Anshan

Patentee after: Liaoning Science and Technology Univ.

Address before: 114051 Anshan city of Liaoning Province Qianshan Road No. 185

Patentee before: Dai Hong

CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20171226

Termination date: 20180705