CN105100022A - Cipher processing method, server and system - Google Patents

Cipher processing method, server and system Download PDF

Info

Publication number
CN105100022A
CN105100022A CN201410214042.5A CN201410214042A CN105100022A CN 105100022 A CN105100022 A CN 105100022A CN 201410214042 A CN201410214042 A CN 201410214042A CN 105100022 A CN105100022 A CN 105100022A
Authority
CN
China
Prior art keywords
identification information
terminal
password
user
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410214042.5A
Other languages
Chinese (zh)
Inventor
吕宏
李庆丰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba Group Holding Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201410214042.5A priority Critical patent/CN105100022A/en
Publication of CN105100022A publication Critical patent/CN105100022A/en
Priority to HK16101464.7A priority patent/HK1213706A1/en
Pending legal-status Critical Current

Links

Abstract

The invention provides a cipher processing method, a server and a system. The method comprises the steps of receiving an operation request aiming at a cipher and sent by a terminal, acquiring the identification information of the terminal, determining whether the identification information of the terminal belongs to a first identification information or not, and conducting the operation on the cipher according to the operation request on the condition that the identification information of the terminal belongs to the first identification information, wherein the first identification information contains the pre-stored identification information for the operation on the cipher. According to the embodiments of the method, when the cipher is modified or reset, only the operation of a trusted terminal on the cipher is received. The identifier information of the trusted terminal is adopted as a legal credential for the operation on the cipher, so that the security is greatly improved.

Description

The processing method of password, server and system
Technical field
The application relates to field of information security technology, particularly relates to a kind of processing method of password, server and system.
Background technology
At present, in order to ensure information security, user has Modify password or resets the demand of password, such as, needs amendment or reset payment cipher etc. when payment account exists potential safety hazard.In correlation technique, when user applies for amendment or resets password, the answer of cryptoguard problem user being pointed out to input set, if the answer that user inputs is identical with the answer set, then receive the password amendment of user or reset, otherwise do not receive the password amendment of user or reset; Or also can to the sending short message by mobile phone identifying code of user account binding, prompting user inputs short message verification code, if the short message verification code of input is identical with the short message verification code of transmission, then receives the password amendment of user or reset, otherwise do not receive the password amendment of user or reset.
But there is following problem in correlation technique: the maximum drawback arranging cryptoguard problem makes user be easy to forget the answer set owing to not using for a long time, but also be easy to be cracked by guessing, thus bring potential safety hazard to user; The maximum drawback of carrying out password amendment or replacement by the sending short message by mobile phone identifying code bound to account be if hand-set from stolen or loss when, user account can be arbitrarily modified, and equally also brings potential safety hazard to user.
Summary of the invention
The application is intended to solve one of technical problem in correlation technique at least to a certain extent.
For this reason, first object of the application is the processing method proposing a kind of password.The method receives only the Password Operations from terminal trusty, uses the validation certificate of identification information as Password Operations of terminal trusty, drastically increases fail safe.
Second object of the application is to propose a kind of server.
3rd object of the application is the treatment system proposing a kind of password.
To achieve these goals, the processing method of the password of the application's first aspect embodiment, comprising: the operation requests for password that receiving terminal sends, and obtains the identification information of described terminal; Determine whether the identification information of described terminal belongs to the first identification information, described first identification information is the identification information that can operate described password preserved in advance; When determining that the identification information of described terminal belongs to the first identification information, according to described operation requests, described password is operated.
The processing method of the password of the embodiment of the present application, utilize terminal trusty transmission for the operation requests of password, such as, personal computer, notebook, panel computer, palmtop PC, self service terminal of bank etc., and whether the identification information determining this terminal is the identification information that can operate password preserved in advance, and after determining, according to operation requests, password is operated, due to the trusted characteristic of terminal, what the physical location of terminal was positioned at user can contact range, user operation is easy, and these terminals trusty are that non-virtual is (relative to the phone number in correlation technique, cryptoguard problem etc.), cannot be stolen, these terminals trusty are not carried with further, then cannot be stolen and not easily lose, therefore, when Modify password or when resetting password, receive only the retouching operation from these terminals trusty or replacement operation, use the validation certificate of identification information as Password Operations of these terminals trusty, drastically increase fail safe.
To achieve these goals, the server of the application's second aspect embodiment, comprising: the first receiver module, for the operation requests for password that receiving terminal sends; Acquisition module, for obtaining the terminal identification information of described terminal; Determination module, for determining whether the identification information of described terminal belongs to the first identification information, described first identification information is the terminal identification information that can operate described password of preserving in advance; Operational module, for when determining that the identification information of described terminal belongs to the first identification information, operates described password according to described operation requests.
The server of the embodiment of the present application, receive the operation requests for password that terminal trusty sends, such as, personal computer, notebook, panel computer, palmtop PC, self service terminal of bank etc., and whether the identification information determining this terminal is the identification information that can operate password preserved in advance, and after determining, according to operation requests, password is operated, due to the trusted characteristic of terminal, what the physical location of terminal was positioned at user can contact range, user operation is easy, and these terminals trusty are that non-virtual is (relative to the phone number in correlation technique, cryptoguard problem etc.), cannot be stolen, these terminals trusty are not carried with further, then cannot be stolen and not easily lose, therefore, when Modify password or when resetting password, receive only the retouching operation from these terminals trusty or replacement operation, use the validation certificate of identification information as Password Operations of these terminals trusty, drastically increase fail safe.
To achieve these goals, the treatment system of the password of the application's third aspect embodiment, comprising: terminal; With the server of the application's second aspect embodiment.
The treatment system of the password of the embodiment of the present application, utilize terminal trusty transmission for the operation requests of password, such as, personal computer, notebook, panel computer, palmtop PC, self service terminal of bank etc., and whether the identification information determining this terminal is the identification information that can operate password preserved in advance, and after determining, according to operation requests, password is operated, due to the trusted characteristic of terminal, what the physical location of terminal was positioned at user can contact range, user operation is easy, and these terminals trusty are that non-virtual is (relative to the phone number in correlation technique, cryptoguard problem etc.), cannot be stolen, these terminals trusty are not carried with further, then cannot be stolen and not easily lose, therefore, when Modify password or when resetting password, receive only the retouching operation from these terminals trusty or replacement operation, use the validation certificate of identification information as Password Operations of these terminals trusty, drastically increase fail safe.
The aspect that the application adds and advantage will part provide in the following description, and part will become obvious from the following description, or be recognized by the practice of the application.
Accompanying drawing explanation
The application above-mentioned and/or additional aspect and advantage will become obvious and easy understand from the following description of the accompanying drawings of embodiments, wherein,
Fig. 1 is the flow chart of the processing method of password according to the application's embodiment;
Fig. 2 is the flow chart of the processing method of password according to another embodiment of the application;
Fig. 3 is the structured flowchart of the server according to the application's embodiment;
Fig. 4 is the structured flowchart of the server according to another embodiment of the application;
Fig. 5 is the structured flowchart of the treatment system of password according to the application's embodiment.
Embodiment
Be described below in detail the embodiment of the application, the example of described embodiment is shown in the drawings, and wherein same or similar label represents same or similar element or has element that is identical or similar functions from start to finish.Being exemplary below by the embodiment be described with reference to the drawings, only for explaining the application, and the restriction to the application can not being interpreted as.On the contrary, the embodiment of the application comprise fall into attached claims spirit and intension within the scope of all changes, amendment and equivalent.
In the description of the application, it is to be appreciated that term " first ", " second " etc. are only for describing object, and instruction or hint relative importance can not be interpreted as.In the description of the application, it should be noted that, unless otherwise clearly defined and limited, term " is connected ", " connection " should be interpreted broadly, such as, can be fixedly connected with, also can be removably connect, or connect integratedly; Can be mechanical connection, also can be electrical connection; Can be directly be connected, also indirectly can be connected by intermediary.For the ordinary skill in the art, concrete condition above-mentioned term concrete meaning in this application can be understood.In addition, in the description of the application, except as otherwise noted, the implication of " multiple " is two or more.
Describe and can be understood in flow chart or in this any process otherwise described or method, represent and comprise one or more for realizing the module of the code of the executable instruction of the step of specific logical function or process, fragment or part, and the scope of the preferred implementation of the application comprises other realization, wherein can not according to order that is shown or that discuss, comprise according to involved function by the mode while of basic or by contrary order, carry out n-back test, this should understand by the embodiment person of ordinary skill in the field of the application.
In correlation technique, there is number of drawbacks when user's Modify password or when resetting password.In order to overcome the defect that correlation technique exists, the application mainly proposes the processing method of password, server and system based on following thinking: user can use its can in contact range, terminal trusty carries out password amendment or replacement (such as, the personal computer etc. of family), due to these terminals be trusty, unique identification can be had in contact range user, therefore overcome the defect of correlation technique, improve fail safe.Below with reference to the accompanying drawings the processing method of the password of the embodiment of the present application, server and system are described.
Fig. 1 is the flow chart of the processing method of password according to the application's embodiment.
As shown in Figure 1, the processing method of this password comprises:
S101, the operation requests for password that receiving terminal sends, and obtain the identification information of terminal.
In an embodiment of the application, terminal can be at least one in personal computer, notebook, panel computer, palmtop PC, self service terminal of bank etc., and personal computer, notebook, panel computer or palmtop PC are geographically generally positioned at family or the company of user.These terminals, in the scope removed of user, make operation than being easier to; And these terminals are non-virtual (relative to the phone number in correlation technique, cryptoguard problems etc.), cannot be stolen; These terminals are not generally carried with further, not easily lose.Should be understood that above-mentioned citing is to illustrate that terminal is presumable dissimilar, can not as the restriction of the terminal to the embodiment of the present application, as long as meet can remove in scope, embodiment that non-virtual and the terminal feature such as not carrying with all are applicable to the application.
In another embodiment of the application, the operation requests for password comprises password amendment or password replacement etc.Should be understood that it can also is other Password Operations, the embodiment of the application repeats no more.
Particularly, if user wants operator password, such as, Modify password or replacement password etc., the service (as payment services) that user can use website corresponding to terminal login or certain application program to provide, terminal receives the operation requests of user's input afterwards, such as, the service that user provides in the website of correspondence or certain application program clicks password amendment button or reset button etc. and get these requests to make terminal, operation requests is sent to the server corresponding to service that website or certain application program provide by terminal again, the operation requests that server receiving terminal sends.Should understand; payment services, password amendment button or reset button etc. that above-mentioned example is mentioned be only the embodiment of conveniently understanding the application for example; can not as the restriction to the application's protection range, the embodiment of the application can be applied to the various situation needing to carry out Password Operations.Server, after receiving operation requests, obtains the identification information of terminal, wherein, the identification information of terminal there is uniqueness.
In an embodiment of the application, the identification information of terminal comprises at least one in Media Access Control address (i.e. MAC (MediaAccessControl) address), mobile device international identity code (i.e. IMEI (InternationalMobileEquipmentIdentity)), mobile number.Usually, each terminal has unique identification information, such as, personal computer or the notebook of networking have unique MAC Address and IMEI, panel computer or the palmtop PC of networking have unique MAC Address and IMEI, panel computer or palmtop PC can also have mobile number (such as phone number etc.), and self service terminal of bank also has unique identification information.In reality is implemented, the identification information of at least one in these identification informations as terminal can be extracted, such as, can using MAC Address, the IMEI identification information as terminal together with mobile number in panel computer or palmtop PC.Should be understood that above-mentioned citing is the dissimilar identification information in order to terminal is described, can not limit as to the identification information of terminal in the embodiment of the present application, can as the identification information of terminal as long as meet uniqueness and the identification information of feature such as should not to revise.
In an embodiment of the application, obtain the identification information of terminal, comprising: extract the identification information carried in operation requests, and using the identification information of the identification information of extraction as terminal.Particularly, user is when terminal input operation request, the identification information corresponding to operation requests automatic acquisition terminal that terminal can input according to user, these identification informations can prestore in the terminal, can immediately extract from terminal, and when being sent to server, the identification information of extraction is joined in operation requests, after server obtains the operation requests of terminal transmission, can parse operation request, thus the identification information carried in extraction operation requests, and then obtain the identification information of terminal.
S102, determines whether the identification information of terminal belongs to the first identification information, and the first identification information is the identification information that can operate password preserved in advance.
Particularly, server, after the identification information obtaining terminal, determines whether the identification information of terminal belongs to the first identification information, wherein, first identification information can prestore in the server, and the first identification information is the identification information that can operate password preserved in advance.
S103, when determining that the identification information of terminal belongs to the first identification information, operates password according to operation requests.
Particularly, server when determining that the identification information of terminal belongs to the first identification information, operation response request, such as, when password resets, receive the new password of user's input, and use new password to replace Old Password, make user utilize new password to operate when next time uses.
The processing method of the password of the embodiment of the present application, utilize terminal trusty transmission for the operation requests of password, such as, personal computer, notebook, panel computer, palmtop PC, self service terminal of bank etc., and whether the identification information determining this terminal is the identification information that can operate password preserved in advance, and after determining, according to operation requests, password is operated, due to the trusted characteristic of terminal, what the physical location of terminal was positioned at user can contact range, user operation is easy, and these terminals trusty are that non-virtual is (relative to the phone number in correlation technique, cryptoguard problem etc.), cannot be stolen, these terminals trusty are not carried with further, then cannot be stolen and not easily lose, therefore, when Modify password or when resetting password, receive only the retouching operation from these terminals trusty or replacement operation, use the validation certificate of identification information as Password Operations of these terminals trusty, drastically increase fail safe.
Fig. 2 is the flow chart of the processing method of password according to another embodiment of the application.
In the embodiment of the application, the first identification information can prestore in the server, and particularly, as shown in Figure 2, the processing method of this password comprises:
S201, receives the registration request of user's input, and provides terminal registration interface according to registration request to user.
Particularly, after user logs in the service (as payment services) that corresponding website or certain application program provide, click the input registration requests such as corresponding registration request button, the server corresponding to service that corresponding website or certain application program provide can receive this registration request, and provide terminal registration interface, with the identification information making user arrange terminal trusty and this terminal online at the rear line of the registration request receiving user's input.
S202, receives the first identification information that user inputs on terminal registration interface.
Such as, user can input the identification information of at least one in the personal computer, notebook, panel computer, palmtop PC etc. of family expenses as the first identification information on terminal registration interface, or, the identification information of self service terminal of bank can also be inputted as the first identification information, wherein, the identification information of at least one in the personal computer, notebook, panel computer, palmtop PC etc. of family expenses and the identification information of self service terminal of bank with reference to described in above-described embodiment, can not repeat them here.User is after input first identification information, and the server corresponding to service that corresponding website or certain application program provide can receive this first identification information.
S203, verifies the first identification information.
Such as, can be that the contact staff of the service (as payment services) that corresponding website or certain application program provide visits and serves, thus the first identification information is confirmed, or the server corresponding to service that the website of correspondence or certain application program provide is searched in safety database, such as, if user have input the identification information of personal computer as the first identification information, can search and confirm that whether identification information that this user inputs is the home terminal etc. of user.Should be understood that above-mentioned example is only the process illustrating and verify the first identification information, any checking means are all applicable to the embodiment of the application, and to this, the embodiment of the application does not limit.
S204, after the first identification information is verified, preserves the first identification information.
Particularly, the first identification information, after the first identification information is verified, is preserved by the server corresponding to service that corresponding website or certain application program provide.
Should be understood that, in above-mentioned S201 to S203 step, user can arrange the first identification information under any scene.Such as, user can use set trusted terminal (such as, the personal computer of family expenses) service (as payment services) that logs in corresponding website or certain application program and provide arranges, the terminal of smart mobile phone or other occasions can also be used (such as, the computer etc. of public use) service (as payment services) that logs in corresponding website or certain application program and provide arranges, and the embodiment of the application does not limit this.
S205, the operation requests for password that receiving terminal sends, and obtain the identification information of terminal.
In an embodiment of the application, terminal can be at least one in personal computer, notebook, panel computer, palmtop PC, self service terminal of bank etc., with reference to described in above-described embodiment, can not repeat them here.
In another embodiment of the application, the operation requests for password comprises password amendment or password replacement etc.Should be understood that it can also is other Password Operations, the embodiment of the application repeats no more.
Particularly, if user wants operator password, such as, Modify password or replacement password etc., the service (as payment services) that user can use website corresponding to terminal login or certain application program to provide, terminal receives the operation requests of user's input afterwards, such as, the service that user provides in the website of correspondence or certain application program clicks password amendment button or reset button etc. and get these requests to make terminal, operation requests is sent to the server corresponding to service that website or certain application program provide by terminal again, the operation requests that server receiving terminal sends.Should understand; payment services, password amendment button or reset button etc. that above-mentioned example is mentioned be only the embodiment of conveniently understanding the application for example; can not as the restriction to the application's protection range, the embodiment of the application can be applied to the various situation needing to carry out Password Operations.Server, after receiving operation requests, obtains the identification information of terminal, wherein, the identification information of terminal there is uniqueness.
In an embodiment of the application, the identification information of terminal comprises at least one in Media Access Control address, mobile device international identity code, mobile number.With reference to described in above-described embodiment, can not repeat them here.
In an embodiment of the application, obtain the identification information of terminal, comprising: extract the identification information carried in operation requests, and using the identification information of the identification information of extraction as terminal.Particularly, user is when terminal input operation request, the identification information corresponding to operation requests automatic acquisition terminal that terminal can input according to user, these identification informations can prestore in the terminal, can immediately extract from terminal, and when being sent to server, the identification information of extraction is joined in operation requests, after server obtains the operation requests of terminal transmission, can parse operation request, thus the identification information carried in extraction operation requests, and then obtain the identification information of terminal.
S206, determines whether the identification information of terminal belongs to the first identification information, and the first identification information is the identification information that can operate password preserved in advance.
Particularly, server, after the identification information obtaining terminal, determines whether the identification information of terminal belongs to the first identification information, wherein, first identification information can prestore in the server, and the first identification information is the identification information that can operate password preserved in advance.
S207, when determining that the identification information of terminal belongs to the first identification information, operates password according to operation requests.
Particularly, server when determining that the identification information of terminal belongs to the first identification information, operation response request, such as, when password resets, receive the new password of user's input, and use new password to replace Old Password, make user utilize new password to operate when next time uses.
The processing method of the password of the embodiment of the present application, user can arrange the identification information of terminal trusty and terminal voluntarily, promotes Consumer's Experience, and improves fail safe further.
In an embodiment of the application, if the first identification information comprises multiple, the processing method of password also comprises (not shown): the priority arranging each first identification information, with determining the identification information of terminal is preferentially confirmed whether to belong to the first identification information of limit priority when whether belonging to the first identification information.Particularly, server allows user to arrange multiple first identification information, after user arranges multiple first identification information according to above-described embodiment, the priority of each first identification information can be specified, or the priority of each first identification information of server Lookup protocol, the priority of each first identification information is such as set according to setup times etc., thus determining the identification information of terminal is preferentially confirmed whether to belong to the first identification information of limit priority when whether belonging to the first identification information.
In an embodiment of the application, the processing method of password also comprises (not shown): the amendment request receiving user's input, and modifies to the first identification information according to amendment request.Particularly, server allows user to modify to the first identification information, the amendment request of server receives user input, and according to amendment request, the first identification information is modified, wherein, after amended first identification information of server receives user input, also need to verify amended first identification information, with reference to the verification mode described in above-described embodiment, can not repeat them here.
In order to realize above-described embodiment, the embodiment of the application also proposes a kind of server.
Fig. 3 is the structured flowchart of the server according to the application's embodiment.
As shown in Figure 3, server 100 comprises: the first receiver module 110, acquisition module 120, determination module 130 and operational module 140.
Particularly, the operation requests for password that sends for receiving terminal of the first receiver module 110.Acquisition module 120 is for obtaining the identification information of terminal.
In an embodiment of the application, terminal can be at least one in personal computer, notebook, panel computer, palmtop PC, self service terminal of bank etc., and personal computer, notebook, panel computer or palmtop PC are geographically generally positioned at family or the company of user.These terminals, in the scope removed of user, make operation than being easier to; And these terminals are non-virtual (relative to the phone number in correlation technique, cryptoguard problems etc.), cannot be stolen; These terminals are not generally carried with further, not easily lose.Should be understood that above-mentioned citing is to illustrate that terminal is presumable dissimilar, can not as the restriction of the terminal to the embodiment of the present application, as long as meet can remove in scope, embodiment that non-virtual and the terminal feature such as not carrying with all are applicable to the application.
In another embodiment of the application, the operation requests for password comprises password amendment or password replacement etc.Should be understood that it can also is other Password Operations, the embodiment of the application repeats no more.
More specifically, if user wants operator password, such as, Modify password or replacement password etc., the service (as payment services) that user can use website corresponding to terminal login or certain application program to provide, terminal receives the operation requests of user's input afterwards, such as, the service that user provides in the website of correspondence or certain application program clicks password amendment button or reset button etc. and get these requests to make terminal, operation requests is sent to the server 100 corresponding to service that website or certain application program provide by terminal again, the operation requests that first receiver module 110 receiving terminal sends.Should understand; payment services, password amendment button or reset button etc. that above-mentioned example is mentioned be only the embodiment of conveniently understanding the application for example; can not as the restriction to the application's protection range, the embodiment of the application can be applied to the various situation needing to carry out Password Operations.First receiver module 110 is after receiving operation requests, and acquisition module 120 obtains the identification information of terminal, wherein, the identification information of terminal there is uniqueness.
In an embodiment of the application, the identification information of terminal comprises at least one in Media Access Control address, mobile device international identity code, mobile number.Usually, each terminal has unique identification information, such as, personal computer or the notebook of networking have unique MAC Address and IMEI, panel computer or the palmtop PC of networking have unique MAC Address and IMEI, panel computer or palmtop PC can also have mobile number (such as phone number etc.), and self service terminal of bank also has unique identification information.In reality is implemented, the identification information of at least one in these identification informations as terminal can be extracted, such as, can using MAC Address, the IMEI identification information as terminal together with mobile number in panel computer or palmtop PC.Should be understood that above-mentioned citing is the dissimilar identification information in order to terminal is described, can not limit as to the identification information of terminal in the embodiment of the present application, can as the identification information of terminal as long as meet uniqueness and the identification information of feature such as should not to revise.
In an embodiment of the application, acquisition module 120 specifically for: extract in operation requests the identification information carried, and using the identification information that the extracts identification information as terminal.Particularly, user is when terminal input operation request, the identification information corresponding to operation requests automatic acquisition terminal that terminal can input according to user, these identification informations can prestore in the terminal, can immediately extract from terminal, and when being sent to server 100, the identification information of extraction is joined in operation requests, first receiver module 110 is after the operation requests receiving transmission, acquisition module 120 can parse operation request, thus the identification information carried in extraction operation requests, and then obtain the identification information of terminal.
Determination module 130 is for determining whether the identification information of terminal belongs to the first identification information, and the first identification information is the identification information that can operate password preserved in advance, and wherein, the first identification information can prestore in the server.
Operational module 140, for when determining that the identification information of terminal belongs to the first identification information, operates password according to operation requests.More specifically, operational module 140 when determining that the identification information of terminal belongs to the first identification information, operation response request, such as, when password resets, receive the new password of user's input, and use new password to replace Old Password, make user utilize new password to operate when next time uses.
The server of the password of the embodiment of the present application, receive the operation requests for password that terminal trusty sends, such as, personal computer, notebook, panel computer, palmtop PC, self service terminal of bank etc., and whether the identification information determining this terminal is the identification information that can operate password preserved in advance, and after determining, according to operation requests, password is operated, due to the trusted characteristic of terminal, what the physical location of terminal was positioned at user can contact range, user operation is easy, and these terminals trusty are that non-virtual is (relative to the phone number in correlation technique, cryptoguard problem etc.), cannot be stolen, these terminals trusty are not carried with further, then cannot be stolen and not easily lose, therefore, when Modify password or when resetting password, receive only the retouching operation from these terminals trusty or replacement operation, use the validation certificate of identification information as Password Operations of these terminals trusty, drastically increase fail safe.
Fig. 4 is the structured flowchart of the server according to another embodiment of the application.
As shown in Figure 4, server 100 comprises: the first receiver module 110, acquisition module 120, determination module 130, operational module 140, second receiver module 150, provide module 160, the 3rd receiver module 170, authentication module 180, preserve module 190, module 1100 and modified module 1110 are set.
Particularly, the second receiver module 150 is for receiving the registration request of user's input; There is provided module 160 for providing terminal registration interface according to registration request to user.More specifically, after user logs in the service (as payment services) that corresponding website or certain application program provide, click the input registration requests such as corresponding registration request button, second receiver module 150 can receive this registration request, and provide the rear line of the registration request of module 160 receiving user's input to provide terminal registration interface, with the identification information making user arrange terminal trusty and this terminal online.
The first identification information that 3rd receiver module 170 inputs on terminal registration interface for receiving user.Such as, user can input the identification information of at least one in the personal computer, notebook, panel computer, palmtop PC etc. of family expenses as the first identification information on terminal registration interface, or, the identification information of self service terminal of bank can also be inputted as the first identification information, wherein, the identification information of at least one in the personal computer, notebook, panel computer, palmtop PC etc. of family expenses and the identification information of self service terminal of bank with reference to described in above-described embodiment, can not repeat them here.User is after input first identification information, and the 3rd receiver module 170 receives this first identification information.
Authentication module 180 is for verifying the first identification information.Such as, can be that the contact staff of the service (as payment services) that corresponding website or certain application program provide visits and serves, thus the first identification information is confirmed, or authentication module 180 is searched in safety database, such as, if user have input the identification information of personal computer as the first identification information, can search and confirm that whether identification information that this user inputs is the home terminal etc. of user.Should be understood that above-mentioned example is only the process illustrating and verify the first identification information, any checking means are all applicable to the embodiment of the application, and to this, the embodiment of the application does not limit.
Preserve module 190 for after the first identification information is verified, the first identification information is preserved.
In an embodiment of the application, if the first identification information comprises multiple, server 100 also comprises: arrange module 1100, for arranging the priority of each first identification information, with determining the identification information of terminal is preferentially confirmed whether to belong to the first identification information of limit priority when whether belonging to the first identification information.Particularly, server 100 allows user to arrange multiple first identification information, after user arranges multiple first identification information according to above-described embodiment, the priority of each first identification information can be specified, or the priority of each first identification information of module 1100 Lookup protocol is set, the priority of each first identification information is such as set according to setup times etc., thus determining the identification information of terminal is preferentially confirmed whether to belong to the first identification information of limit priority when whether belonging to the first identification information.
In an embodiment of the application, server 100 also comprises: modified module 1110, for receiving the amendment request of user's input, and modifies to the first identification information according to amendment request.Particularly, server allows user to modify to the first identification information, modified module 1110 receives the amendment request of user's input, and according to amendment request, the first identification information is modified, wherein, modified module 1110 also needs to verify amended first identification information after receiving amended first identification information of user's input, with reference to the verification mode described in above-described embodiment, can not repeat them here.
In order to realize above-described embodiment, the embodiment of the application also proposes a kind for the treatment of system of password.
Fig. 5 is the structured flowchart of the treatment system of password according to the application's embodiment.
As shown in Figure 5, the treatment system 10 of password comprises: terminal 200 and server 100.Wherein, server 100 is the server described in above-mentioned any one embodiment, and terminal is the terminal described in above-mentioned any one embodiment, does not repeat them here.
The treatment system of the password of the embodiment of the present application, receive the operation requests for password that terminal trusty sends, such as, personal computer, notebook, panel computer, palmtop PC, self service terminal of bank etc., and whether the identification information determining this terminal is the identification information that can operate password preserved in advance, and after determining, according to operation requests, password is operated, due to the trusted characteristic of terminal, what the physical location of terminal was positioned at user can contact range, user operation is easy, and these terminals trusty are that non-virtual is (relative to the phone number in correlation technique, cryptoguard problem etc.), cannot be stolen, these terminals trusty are not carried with further, then cannot be stolen and not easily lose, therefore, when Modify password or when resetting password, receive only the retouching operation from these terminals trusty or replacement operation, use the validation certificate of identification information as Password Operations of these terminals trusty, drastically increase fail safe.
Should be appreciated that each several part of the application can realize with hardware, software, firmware or their combination.In the above-described embodiment, multiple step or method can with to store in memory and the software performed by suitable instruction execution system or firmware realize.Such as, if realized with hardware, the same in another embodiment, can realize by any one in following technology well known in the art or their combination: the discrete logic with the logic gates for realizing logic function to data-signal, there is the application-specific integrated circuit (ASIC) of suitable combinational logic gate circuit, programmable gate array (PGA), field programmable gate array (FPGA) etc.
In the description of this specification, at least one embodiment that specific features, structure, material or feature that the description of reference term " embodiment ", " some embodiments ", " example ", " concrete example " or " some examples " etc. means to describe in conjunction with this embodiment or example are contained in the application or example.In this manual, identical embodiment or example are not necessarily referred to the schematic representation of above-mentioned term.And the specific features of description, structure, material or feature can combine in an appropriate manner in any one or more embodiment or example.
Although illustrate and described the embodiment of the application, those having ordinary skill in the art will appreciate that: can carry out multiple change, amendment, replacement and modification to these embodiments when not departing from principle and the aim of the application, the scope of the application is by claim and equivalents thereof.

Claims (10)

1. a processing method for password, is characterized in that, comprising:
The operation requests for password that receiving terminal sends, and obtain the identification information of described terminal;
Determine whether the identification information of described terminal belongs to the first identification information, described first identification information is the identification information that can operate described password preserved in advance;
When determining that the identification information of described terminal belongs to the first identification information, according to described operation requests, described password is operated.
2. method according to claim 1, is characterized in that, also comprises:
Receive the registration request of user's input, and provide terminal registration interface according to described registration request to described user;
Receive the first identification information that described user inputs on described terminal registration interface;
Described first identification information is verified;
After described first identification information is verified, described first identification information is preserved.
3. method according to claim 2, is characterized in that, described first identification information comprises multiple, and described method also comprises:
The priority of each first identification information is set, with determining the identification information of described terminal is preferentially confirmed whether to belong to described first identification information of limit priority when whether belonging to the first identification information.
4. method according to claim 2, is characterized in that, also comprises:
Receive the amendment request of described user input, and according to described amendment request, described first identification information is modified.
5. method according to claim 1, is characterized in that, the identification information of the described terminal of described acquisition, comprising:
Extract the identification information carried in described operation requests, and using the identification information of the identification information of extraction as described terminal.
6. the method according to any one of claim 1 to 5, is characterized in that, the identification information of described terminal comprises at least one in Media Access Control address, mobile device international identity code, mobile number.
7. a server, is characterized in that, comprising:
First receiver module, for the operation requests for password that receiving terminal sends;
Acquisition module, for obtaining the terminal identification information of described terminal;
Determination module, for determining whether the identification information of described terminal belongs to the first identification information, described first identification information is the terminal identification information that can operate described password of preserving in advance;
Operational module, for when determining that the identification information of described terminal belongs to the first identification information, operates described password according to described operation requests.
8. server according to claim 7, is characterized in that, also comprises:
Second receiver module, for receiving the registration request of user's input;
There is provided module, for providing terminal registration interface according to described registration request to described user;
3rd receiver module, for receiving the first identification information that described user inputs on described terminal registration interface;
Authentication module, for verifying described first identification information;
Preserve module, for after described first identification information is verified, described first identification information is preserved.
9. server according to claim 8, is characterized in that, described first identification information comprises multiple, and described server also comprises:
Module is set, for arranging the priority of each first identification information, with determining the identification information of described terminal is preferentially confirmed whether to belong to described first identification information of limit priority when whether belonging to the first identification information.
10. a treatment system for password, is characterized in that, comprising:
Terminal; With
Server described in any one of claim 7-9.
CN201410214042.5A 2014-05-20 2014-05-20 Cipher processing method, server and system Pending CN105100022A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201410214042.5A CN105100022A (en) 2014-05-20 2014-05-20 Cipher processing method, server and system
HK16101464.7A HK1213706A1 (en) 2014-05-20 2016-02-06 Method for processing password, server and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410214042.5A CN105100022A (en) 2014-05-20 2014-05-20 Cipher processing method, server and system

Publications (1)

Publication Number Publication Date
CN105100022A true CN105100022A (en) 2015-11-25

Family

ID=54579578

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410214042.5A Pending CN105100022A (en) 2014-05-20 2014-05-20 Cipher processing method, server and system

Country Status (2)

Country Link
CN (1) CN105100022A (en)
HK (1) HK1213706A1 (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107085569A (en) * 2016-02-14 2017-08-22 西安中兴新软件有限责任公司 A kind of information access method and device
CN107135075A (en) * 2016-02-29 2017-09-05 深圳秀豹科技有限公司 A kind of authorization method and device operated to user
CN108564366A (en) * 2018-03-15 2018-09-21 阿里巴巴集团控股有限公司 Payment cipher remapping method, device and electronic equipment
CN108965577A (en) * 2018-05-28 2018-12-07 维沃移动通信有限公司 A kind of interface display method and terminal device
CN109948332A (en) * 2019-04-02 2019-06-28 山东浪潮云信息技术有限公司 A kind of physical machine login password remapping method and device
CN112737769A (en) * 2020-12-21 2021-04-30 浙江大华技术股份有限公司 Password resetting method and device, storage medium and electronic device
CN115866542A (en) * 2023-02-28 2023-03-28 北京沐融信息科技股份有限公司 Short message verification code application and verification method, device, equipment and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101256700A (en) * 2008-03-31 2008-09-03 浙江大学城市学院 ATM of mixed type user identification authentication
CN102497635A (en) * 2011-11-28 2012-06-13 宇龙计算机通信科技(深圳)有限公司 Server, terminal and account password acquisition method
CN103023886A (en) * 2012-11-26 2013-04-03 北京奇虎科技有限公司 Security data processing method and system
CN103457991A (en) * 2013-05-29 2013-12-18 北京奇虎科技有限公司 Terminal safety protection method and system
CN103473497A (en) * 2012-06-06 2013-12-25 苏州宝时得电动工具有限公司 Automatic walking equipment, code resetting method thereof and automatic walking system
CN103491532A (en) * 2013-09-24 2014-01-01 北京大学 Cooperative privacy protection method and system based on Android platform

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101256700A (en) * 2008-03-31 2008-09-03 浙江大学城市学院 ATM of mixed type user identification authentication
CN102497635A (en) * 2011-11-28 2012-06-13 宇龙计算机通信科技(深圳)有限公司 Server, terminal and account password acquisition method
CN103473497A (en) * 2012-06-06 2013-12-25 苏州宝时得电动工具有限公司 Automatic walking equipment, code resetting method thereof and automatic walking system
CN103023886A (en) * 2012-11-26 2013-04-03 北京奇虎科技有限公司 Security data processing method and system
CN103457991A (en) * 2013-05-29 2013-12-18 北京奇虎科技有限公司 Terminal safety protection method and system
CN103491532A (en) * 2013-09-24 2014-01-01 北京大学 Cooperative privacy protection method and system based on Android platform

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107085569B (en) * 2016-02-14 2022-01-25 西安中兴新软件有限责任公司 Information access method and device
CN107085569A (en) * 2016-02-14 2017-08-22 西安中兴新软件有限责任公司 A kind of information access method and device
CN107135075B (en) * 2016-02-29 2020-12-04 义乌兰思体育用品有限公司 Authorization method and device for user operation
CN107135075A (en) * 2016-02-29 2017-09-05 深圳秀豹科技有限公司 A kind of authorization method and device operated to user
US11132435B2 (en) 2018-03-15 2021-09-28 Advanced New Technologies Co., Ltd. Payment password reset method and apparatus, and electronic device
US10909233B2 (en) 2018-03-15 2021-02-02 Advanced New Technologies Co., Ltd. Payment password reset method and apparatus, and electronic device
CN108564366A (en) * 2018-03-15 2018-09-21 阿里巴巴集团控股有限公司 Payment cipher remapping method, device and electronic equipment
CN108965577B (en) * 2018-05-28 2021-05-28 维沃移动通信有限公司 Interface display method and terminal equipment
CN108965577A (en) * 2018-05-28 2018-12-07 维沃移动通信有限公司 A kind of interface display method and terminal device
CN109948332A (en) * 2019-04-02 2019-06-28 山东浪潮云信息技术有限公司 A kind of physical machine login password remapping method and device
CN112737769A (en) * 2020-12-21 2021-04-30 浙江大华技术股份有限公司 Password resetting method and device, storage medium and electronic device
CN112737769B (en) * 2020-12-21 2023-03-24 浙江大华技术股份有限公司 Password resetting method and device, storage medium and electronic device
CN115866542A (en) * 2023-02-28 2023-03-28 北京沐融信息科技股份有限公司 Short message verification code application and verification method, device, equipment and storage medium
CN115866542B (en) * 2023-02-28 2023-04-25 北京沐融信息科技股份有限公司 Short message verification code application and verification method, device, equipment and storage medium

Also Published As

Publication number Publication date
HK1213706A1 (en) 2016-07-08

Similar Documents

Publication Publication Date Title
US10223520B2 (en) System and method for integrating two-factor authentication in a device
US9628282B2 (en) Universal anonymous cross-site authentication
CN108768970B (en) Binding method of intelligent equipment, identity authentication platform and storage medium
CN105100022A (en) Cipher processing method, server and system
NZ751426A (en) Iot provisioning service
CN103152400B (en) The method, system and the cloud server that log in is carried out by mobile terminal
US10630488B2 (en) Method and apparatus for managing application identifier
CN105450643B (en) The authentication method of network insertion, apparatus and system
US9124571B1 (en) Network authentication method for secure user identity verification
US20150149777A1 (en) Mobile terminal, terminal and authentication method using security cookie
TWI632798B (en) Server, mobile terminal, and network real-name authentication system and method
US11843601B2 (en) Methods, systems, and computer readable mediums for securely establishing credential data for a computing device
US11455621B2 (en) Device-associated token identity
US20200196143A1 (en) Public key-based service authentication method and system
CN108322366B (en) Method, device and system for accessing network
CN104468457A (en) User logging-in method based on unified user system and registering method
CN105191208A (en) Methods for activation of an application on a user device
CN104247485A (en) Network application function authorisation in a generic bootstrapping architecture
CN104580237A (en) Method for logging into website, server used in method for logging into website, client terminal used in method for logging into website and peripheral used in method for logging into website
CN105357224A (en) Intelligent household gateway register, remove method and system
KR20190130206A (en) SECURITY ENHANCED THIRD PARTY'S SECURITY AUTHENTICATION SYSTEM OF IoT DEVICES IN CASE OF LOST AND METHOD THEREOF
KR20140090279A (en) Service security authentication method and web application server therof
CN103559430B (en) application account management method and device based on Android system
KR101879843B1 (en) Authentication mehtod and system using ip address and short message service
US11777742B2 (en) Network device authentication

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 1213706

Country of ref document: HK

RJ01 Rejection of invention patent application after publication

Application publication date: 20151125

RJ01 Rejection of invention patent application after publication
REG Reference to a national code

Ref country code: HK

Ref legal event code: WD

Ref document number: 1213706

Country of ref document: HK