CN109639724B - Password retrieving method, password retrieving device, computer device and storage medium - Google Patents
Password retrieving method, password retrieving device, computer device and storage medium Download PDFInfo
- Publication number
- CN109639724B CN109639724B CN201910031601.1A CN201910031601A CN109639724B CN 109639724 B CN109639724 B CN 109639724B CN 201910031601 A CN201910031601 A CN 201910031601A CN 109639724 B CN109639724 B CN 109639724B
- Authority
- CN
- China
- Prior art keywords
- login
- verification
- user
- password
- environment
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/18—Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
- H04L63/205—Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Telephonic Communication Services (AREA)
- Storage Device Security (AREA)
Abstract
The embodiment of the invention provides a password retrieving method, which comprises the following steps: detecting whether a login environment of an account is a common environment or not to judge the danger level of a user, wherein the login environment at least comprises a login place, a login terminal and a login Wi-Fi network; when the login environment is an emergency environment, judging that the danger level of the user is high; setting a plurality of verification strategies, wherein the plurality of verification strategies at least comprise short message verification, a plurality of friend verification, sound lock verification, face verification and problem verification; and when the plurality of kinds of verification are passed, the password of the account in the password library is sent to the user terminal. The password retrieving method provided by the embodiment of the invention provides convenience for a user to retrieve the password when the user forgets the password, and simultaneously improves the security of account login.
Description
Technical Field
The embodiment of the invention relates to the field of information security, in particular to a password retrieving method, a password retrieving device and a computer readable storage medium.
Background
Currently, the password recovery policy of the same software is fixed for different users, for example: and (5) verifying the mobile phone short message, and sending the message to a friend for verification. However, the same method is adopted for different users under different conditions, which sometimes brings great trouble to the users. Therefore, the invention aims to solve the problems that the password retrieving mode of different users is single under different conditions and the complexity of the retrieved password cannot be changed.
Disclosure of Invention
In view of the above, there is a need to provide a password retrieving method, a password retrieving apparatus, a computer device and a computer readable storage medium, which provide convenience for a user to retrieve a password when the user forgets the password, and simultaneously improve the security of account login.
In order to achieve the above object, an embodiment of the present invention provides a password recovering method, where the method includes:
whether the login environment of the account is a common environment is detected to judge the danger level of the user, wherein the login environment at least comprises: logging in a place, a terminal and a Wi-Fi network;
when the login environment is an emergency environment, judging that the danger level of the user is high;
setting a plurality of verified policies, wherein the plurality of verified policies at least comprises: short message verification, multiple friend verification, voice lock verification, face verification and problem verification; and
and when the plurality of kinds of verification are passed, the password of the account in the password library is sent to the user terminal.
Further, the method further comprises:
when the login environment is a common environment, judging that the danger level of the user is low;
setting a single verification strategy; and
and when the single verification passes, the password is sent to the user terminal so as to retrieve the login password.
Further, the step of detecting whether the login environment of the account is a common environment further includes:
detecting a login place of the account, an MAC address of a login terminal or a telephone number corresponding to the login terminal and port information for logging in a Wi-Fi network;
respectively calculating the login frequency of the account at the login place, the login terminal and the login Wi-Fi network; and
and if the login frequency is higher than a preset value, judging that the login environment of the account is a common environment.
Further, the setting of multiple verification strategies; and
when the multiple kinds of verification pass, the password is sent to the user terminal so as to retrieve the login password of the account, and the method further comprises the following steps:
when the account is logged in at an abnormal login place, randomly combining the multiple verification strategies to verify the user;
respectively obtaining verification results; and
and if the verification results pass, sending the password to the user terminal in a form of short message.
Further, the step of respectively obtaining the verification results further includes:
when the strategy comprises the short message verification, acquiring a transmitted instruction of acquiring a short message verification code, transmitting a preset verification code to the common terminal, acquiring the verification code input by the user, and when the verification code is consistent with the preset verification code, successfully verifying the short message;
when the policy comprises the verification of the friends, respectively obtaining the verification results of the friends, and when the verification results of the friends pass, the verification of the friends is successful;
when the strategy comprises the sound lock verification, obtaining the sound of the user, and when the sound is consistent with the preset sound stored in a sound database, the sound lock verification is successful;
when the strategy comprises the face verification, acquiring a face image of the user, and when the face image is consistent with a preset face image stored in a face database, the face verification is successful; and
and when the strategy comprises the question verification, acquiring the answer of the user, and when the answer is consistent with a preset answer stored in a question database, the question verification is successful.
Further, the user terminal at least comprises a common mobile phone and a common mailbox of the user.
Further, the step of setting a single verified policy further includes: and randomly selecting one of the plurality of verified strategies for setting.
In order to achieve the above object, an embodiment of the present invention further provides a password retrieving device, including:
the detection module is used for detecting whether the login environment of the account is a common environment or not so as to judge the danger level of the user, wherein the login environment at least comprises: logging in a place, a terminal and a Wi-Fi network;
the judging module is used for judging that the danger level of the user is high when the login environment is an emergency environment;
a setting module, configured to set a plurality of verified policies, where the plurality of verified policies at least include: short message verification, multiple friend verification, voice lock verification, face verification and problem verification; and
and the sending module is used for sending the password of the account in the password library to the user terminal when the plurality of kinds of verification are passed.
Further, the judging module is further configured to judge that the risk level of the user is low when the login environment is a common environment; the setting module is also used for setting a single verification strategy; and the sending module is also used for sending the password to the user terminal to retrieve the login password when the single authentication passes.
Further, the detection module is further configured to detect a login location of the account, an MAC address of a login terminal, or a phone number corresponding to the login terminal and port information of logging in the Wi-Fi network, calculate login frequencies of the account at the login location, the login terminal and the login Wi-Fi network, respectively, and when the login frequency is higher than a preset value, the determination module determines that a login environment of the account is a common environment.
The password retrieving device further comprises a combination module and an acquisition module, wherein the combination module is used for randomly combining the multiple verification strategies to verify the user when the account is logged in at an emergency login place; the acquisition module is used for respectively acquiring verification results; and the sending module is further used for sending the password to the user terminal in a form of short message if the verification results pass.
Further, the password retrieving device further comprises a verification module, which is used for acquiring a transmitted instruction of acquiring a short message verification code when the policy comprises short message verification, transmitting a preset verification code to the common terminal, acquiring the verification code input by the user, and when the verification code is consistent with the preset verification code, successfully verifying the short message; the verification module is further configured to obtain verification results of the friends respectively when the policy includes the verification of the friends, and when the verification results of the friends pass, the verification of the friends is successful; the verification module is further configured to obtain the voice of the user when the policy includes the voice lock verification, and when the voice is consistent with a preset voice stored in a voice database, the voice lock verification is successful; the verification module is further used for acquiring a face image of the user when the strategy comprises the face verification, and the face verification is successful when the face image is consistent with a preset face image stored in a face database; and the verification module is also used for acquiring the answer of the user when the strategy comprises the question verification, and when the answer is consistent with the preset answer stored in the question database, the question verification is successful.
Further, the user terminal at least comprises a common mobile phone and a common mailbox of the user.
Further, the setting module is further configured to randomly select one of the multiple verified policies for setting.
To achieve the above object, an embodiment of the present invention further provides a computer device, a memory of the computer device, a processor, and a computer program stored on the memory and executable on the processor, where the computer program, when executed by the processor, implements the steps of the password recovery method as described above.
To achieve the above object, an embodiment of the present invention further provides a computer-readable storage medium, in which a computer program is stored, where the computer program is executable by at least one processor to cause the at least one processor to execute the steps of the password recovery method.
According to the password retrieving method, the password retrieving device, the computer equipment and the computer readable storage medium provided by the embodiment of the invention, the danger level of the user is determined by detecting the login environment of the user, and the password is retrieved by using different password verification modes according to the danger level of the user, so that convenience is provided for the user to retrieve the password when the user forgets the password, and meanwhile, the security of account login is improved.
Drawings
Fig. 1 is a flowchart illustrating steps of a password recovery method according to an embodiment of the present invention.
Fig. 2 is a flowchart illustrating steps of a password retrieving method according to a second embodiment of the present invention.
FIG. 3 is a flowchart illustrating a third embodiment of a password recovery method according to the present invention.
Fig. 4 is a schematic diagram of a hardware architecture of a password recovery apparatus according to a fourth embodiment of the present invention.
Fig. 5 is a schematic diagram of program modules of a password recovery system according to a fifth embodiment of the present invention.
Reference numerals:
|
2 |
Memory device | 21 |
Processor with a memory having a plurality of memory cells | 22 |
Network interface | 23 |
|
20 |
Detection module | 201 |
Judging module | 202 |
Setting module | 203 |
Transmission module | 204 |
Combined module | 205 |
Acquisition module | 206 |
Verification module | 207 |
The implementation, functional features and advantages of the present invention will be further described with reference to the accompanying drawings.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that the description relating to "first", "second", etc. in the present invention is for descriptive purposes only and is not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature. In addition, technical solutions between the embodiments may be combined with each other, but must be based on the realization of the technical solutions by a person skilled in the art, and when the technical solutions are contradictory to each other or cannot be realized, such a combination should not be considered to exist, and is not within the protection scope of the present invention.
Example one
Referring to fig. 1, a flowchart illustrating steps of a password retrieving method according to a first embodiment of the invention is shown. It is to be understood that the flow charts in the embodiments of the present method are not intended to limit the order in which the steps are performed. It should be noted that the present embodiment is exemplarily described with the password recovering apparatus 2 as an execution subject. The details are as follows.
Step S100, detecting whether the login environment of the account is a common environment to determine the danger level of the user, if the login environment is an emergency environment, executing step S102, otherwise executing step S108. Wherein the login context comprises at least: login place, login terminal and login Wi-Fi network.
Specifically, before the password recovery device 2 detects whether the login environment of the account is a common environment, the password recovery device 2 obtains historical login information of the account, where the historical login information at least includes: a login terminal (e.g., a cell phone), a login Wi-Fi network, and a login location. The login place is identified by acquiring GPS positioning, the login terminal is identified by detecting the MAC address of the login terminal, and the Wi-Fi network is identified by detecting port information of the login Wi-Fi network. And then, respectively calculating the login frequency of the account in the login place, the login terminal and the login Wi-Fi network, and dividing the login terminal and the login network into a common environment and an unusual environment according to the login frequency. And when the login frequency is higher than a preset value, judging that the login environment of the account is a common environment, otherwise, judging that the login environment is an abnormal environment.
In another preferred embodiment, the user can also join the common environment by using a trusted login terminal with low login frequency and a login network. When the user forgets the login password of the account and needs to retrieve the password, the password retrieving device 2 detects whether the login environment of the account is a common environment, so as to set different password retrieving policies for the user to retrieve the password.
And step S102, judging that the danger level of the user is high.
In a preferred embodiment, the password recovery apparatus 2 can also verify the danger level of the user by voice asking questions and the like from the intelligent voice assistant. And when the user answers incorrectly, the danger level of the user is high, and when the user answers correctly, the danger level of the user is low.
Step S104, setting a plurality of verification strategies, wherein the plurality of verification strategies at least comprise: short message verification, multiple friend verification, voice lock verification, face verification and question verification.
And step S106, when the plurality of kinds of verification are passed, the password of the account in the password library is sent to the user terminal.
In a preferred embodiment, when the password retrieving device 2 detects that the account is logged in a different place, and at this time, it is determined that the user logged in the account is a high-risk user, a plurality of friend verification and face verification modes are set, and if both verification modes pass, the password in the password library is sent to the common mailbox of the user, and the password retrieval is successful. The password retrieving device 2 can determine whether the login environment of the account is an emergency environment by acquiring GPS positioning or network port information.
In another preferred embodiment, when the password retrieving device 2 detects that the account is logged in by an emergency mobile phone, and at this time, it is determined that the user logged in the account is a high-risk user, then voice lock authentication and face authentication are set, and if both authentication methods pass, the password in the password library is sent to the common mailbox of the user, and the password retrieval is successful.
In another preferred embodiment, when the password retrieving device 2 detects that the account is an emergency mobile phone and logs in at an emergency login location, and it is determined that the user logging in the account is a very high-risk user, a plurality of friend verification modes, face verification modes and voice verification modes are set, and when all of the plurality of friend verification modes, face verification modes and voice verification modes pass, the passwords in the password library are sent to the common mailbox of the user, and the password retrieving is successful.
In another preferred embodiment, when the password retrieving device 2 is successfully verified, the user can log in the account again by resetting the password, and the specific steps are as follows: firstly, sending information for setting a new password to a user terminal; then, acquiring a new password input by a user; and finally, storing the new password and sending the re-login information to the user terminal.
And step S108, judging that the danger level of the user is low.
Step S110, a single verification policy is set. Specifically, when the risk level of the user is determined to be low, the password retrieving device 2 randomly selects one of the plurality of authentication policies to perform setting, so as to authenticate the user.
And step S112, when the single verification passes, the password is sent to the user terminal so as to retrieve the login password.
Specifically, when the mobile phone of the login account is a common mobile phone or Wi-Fi is a common Wi-Fi when the user retrieves the password, one password retrieval mode of short message verification code verification, friend verification, sound lock verification and face verification is randomly set for the user to retrieve the password.
In a preferred embodiment, when the password retrieving device 2 detects that the account is logged in by a commonly used mobile phone, and at this time, it is determined that the user logged in the account is a low-level dangerous user, a short message verification mode is set, the verification code is sent to the commonly used mobile phone of the user by obtaining a command of "obtaining a short message verification code" sent by the user, and the password retrieving device 2 successfully retrieves the password by obtaining the verification code input by the user and sending the password in the password library to the commonly used mobile phone of the user after the verification code is successfully retrieved.
In another preferred embodiment, when the password retrieving device 2 detects that the account logging in the network is a normal Wi-Fi network, and it is determined that the user logging in the account is a low-level dangerous user, a face verification mode is set, and when the verification is successful, the password in the password library is sent to the user terminal, and the password retrieval is successful.
In another preferred embodiment, when the verification is successful, the password retrieving device 2 may also send the password in the password library to a regular mailbox, a regular mobile phone or a friend of the user, so as to enable the user to retrieve the password, which is not limited herein. The user common mailbox is a mailbox input by the user when the user retrieves the password or a mailbox filled by the user when registering the account.
According to the embodiment of the invention, whether the login environment of the user is a common environment is detected to determine the danger level of the user, and the account login password is retrieved by using different password verification modes according to the danger level of the user, so that convenience is provided for the user to retrieve the password when the password is forgotten, and meanwhile, the security of account login is improved.
Example two
Referring to fig. 2, a flowchart illustrating steps of a password retrieving method according to a second embodiment of the present invention is shown. The difference from the first embodiment is that the step of setting a plurality of authentication policies and sending the password to the user terminal to retrieve the login password of the account when the plurality of authentications are passed further includes steps S200 to S204.
And step S200, when the account is logged in at an emergency login place, randomly combining the multiple verification strategies to verify the user. For example: when the account is logged in at an abnormal login place, the danger level of the user is high, and the password retrieving device 2 randomly sets a plurality of verification strategies such as short message verification, multiple friend verification, voice lock verification, face verification and problem verification.
Step S202, respectively obtaining verification results. Specifically, according to the combination of several randomly set authentication strategies of the password recovery apparatus 2, corresponding authentication results are respectively obtained.
And step S204, if the verification results all pass, the password is sent to the user terminal in a short message mode. The user terminal may be a common mailbox of the user.
EXAMPLE III
Referring to fig. 3, a flowchart illustrating steps of a password retrieving method according to a third embodiment of the present invention is shown. The difference from the second embodiment is that the step of respectively obtaining the verification results further includes steps S300 to S308.
Step S300, when the strategy comprises the short message verification, acquiring a transmitted instruction of acquiring a short message verification code, transmitting a preset verification code to the common terminal, acquiring the verification code input by the user, and when the verification code is consistent with the preset verification code, successfully verifying the short message.
Step S302, when the strategy comprises the verification of the friends, the verification results of the friends are respectively obtained, and when the verification results of the friends all pass, the friends are verified successfully.
Step S304, when the policy includes the sound lock verification, obtaining the sound of the user, and when the sound is consistent with the preset sound stored in the sound database, the sound lock verification is successful.
Step S306, when the strategy comprises the face verification, the face image of the user is obtained, and when the face image is consistent with a preset face image stored in a face database, the face verification is successful.
Step S308, when the strategy comprises the question verification, the answer of the user is obtained, and when the answer is consistent with the preset answer stored in the question database, the question verification is successful.
Example four
Referring to fig. 4, a hardware architecture diagram of a password recovery apparatus according to a fourth embodiment of the present invention is shown. The password recovery apparatus 2 includes, but is not limited to, a memory 21, a processor 22, and a network interface 23 communicatively coupled to each other via a system bus, and fig. 2 shows only the password recovery apparatus 2 having components 21-23, but it is understood that not all of the shown components are required and that more or fewer components may be implemented instead.
The memory 21 includes at least one type of readable storage medium including a flash memory, a hard disk, a multimedia card, a card type memory (e.g., SD or DX memory, etc.), a Random Access Memory (RAM), a Static Random Access Memory (SRAM), a Read Only Memory (ROM), an Electrically Erasable Programmable Read Only Memory (EEPROM), a Programmable Read Only Memory (PROM), a magnetic memory, a magnetic disk, an optical disk, etc. In some embodiments, the memory 21 may be an internal storage unit of the password recovery apparatus 2, such as a hard disk or a memory of the password recovery apparatus 2. In other embodiments, the memory may also be an external storage device of the password recovery apparatus 2, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like, provided on the password recovery apparatus 2. Of course, the memory 21 may also comprise both an internal storage unit of the password recovery apparatus 2 and an external storage device thereof. In this embodiment, the memory 21 is generally used for storing an operating system installed in the password recovery apparatus 2 and various types of application software, such as program codes of the questionnaire survey sharing system 20. Further, the memory 21 may also be used to temporarily store various types of data that have been output or are to be output.
The processor 22 may be a Central Processing Unit (CPU), controller, microcontroller, microprocessor, or other data Processing chip in some embodiments. The processor 22 is typically used to control the overall operation of the password recovery apparatus 2. In this embodiment, the processor 22 is configured to run the program codes stored in the memory 21 or process data, for example, run the questionnaire survey sharing system 20.
The network interface 23 may comprise a wireless network interface or a wired network interface, and the network interface 23 is generally used to establish a communication connection between the password retrieving apparatus 2 and other electronic devices. For example, the network interface 23 is used to connect the password recovery apparatus 2 with an external terminal through a network, establish a data transmission channel and a communication connection between the password recovery apparatus 2 and the external terminal, and the like. The network may be a wireless or wired network such as an Intranet (Intranet), the Internet (Internet), a Global System of Mobile communication (GSM), wideband Code Division Multiple Access (WCDMA), a 4G network, a 5G network, bluetooth (Bluetooth), wi-Fi, and the like.
EXAMPLE five
Fig. 5 is a schematic diagram showing program modules of a password recovery system according to a fifth embodiment of the present invention. In this embodiment, the password recovery system 20 may include or be divided into one or more program modules, and the one or more program modules are stored in a storage medium and executed by one or more processors to implement the present invention and the above-described password recovery method. The program modules referred to in the embodiments of the present invention refer to a series of computer program instruction segments capable of performing specific functions, and are more suitable than the program itself for describing the execution process of the password recovery system 20 in the storage medium. The following description will specifically describe the functions of the program modules of the present embodiment:
the detection module 201 is configured to detect whether a login environment of an account is a common environment, so as to determine a risk level of a user, where the login environment at least includes: login place, login terminal and login Wi-Fi network.
Specifically, before the detection module 201 detects whether the login environment of the account is a common environment, the password recovery apparatus 2 obtains historical login information of the account, where the historical login information at least includes: a login terminal (e.g., a cell phone), a login Wi-Fi network, and a login location. The login place is identified by acquiring GPS positioning, the login terminal is identified by detecting the MAC address of the login terminal, and the Wi-Fi network is identified by detecting port information of the login Wi-Fi network. And then, respectively calculating the login frequency of the account in the login place, the login terminal and the login Wi-Fi network, and dividing the login terminal and the login network into a common environment and an unusual environment according to the login frequency. And when the login frequency is higher than a preset value, judging that the login environment of the account is a common environment, otherwise, judging that the login environment is an abnormal environment.
In another preferred embodiment, the user can also join the common environment by using a trusted login terminal with low login frequency and a login network. When the user forgets the login password of the account and needs to retrieve the password, the password retrieving device 2 detects whether the login environment of the account is a common environment, so as to set different password retrieving policies for the user to retrieve the password.
A determining module 202, configured to determine that the risk level of the user is high when the login environment is an emergency environment.
In a preferred embodiment, the password recovery apparatus 2 can also verify the danger level of the user by voice asking questions to the user by the intelligent voice assistant. When the user answers incorrectly, the determining module 202 determines that the risk level of the user is high, and when the user answers correctly, the determining module 202 determines that the risk level of the user is low.
A setting module 203, configured to set a plurality of verified policies, where the plurality of verified policies at least include: short message verification, multiple friend verification, sound lock verification, face verification and question verification.
A sending module 204, configured to send the password of the account in the password library to the user terminal when the multiple kinds of verification pass.
In a preferred embodiment, when the detection module 201 detects that the account is logged in different places, the determination module 202 determines that the user logged in the account is a high-risk user, the setting module 203 sets a plurality of friend verification and face verification modes, and if both verification modes pass, the sending module 204 sends the password in the password library to a common mailbox of the user, and the password recovery is successful. The determining module 202 may determine whether the login environment of the account is an emergency environment by acquiring GPS positioning or network port information.
In another preferred embodiment, when the detection module 201 detects that the account is logged in with an emergency mobile phone, the determination module 202 determines that the user logged in the account is a high-risk user, the setting module 203 sets a voice lock authentication mode and a face authentication mode, and if both the two authentication modes pass, the sending module 204 sends the password in the password library to the regular mailbox of the user, so that the password is retrieved successfully.
In another preferred embodiment, when the detection module 201 detects that the account is an emergency mobile phone and logs in at an emergency login location, the determination module 202 determines that the user logging in the account is a very high-risk user, the setting module 203 sets a plurality of friend verification modes, face verification modes and voice verification modes, and when the plurality of friend verification modes, the face verification modes and the voice verification modes pass, the sending module 204 sends the password in the password library to the common mailbox of the user, and the password is found successfully.
In another preferred embodiment, when the password retrieving device 2 is successfully verified, the user can log in the account again by resetting the password, specifically: firstly, sending information for setting a new password to a user terminal; then, acquiring a new password input by a user; and finally, storing the new password and sending the re-login information to the user terminal.
The determining module 202 is further configured to determine that the risk level of the user is low when the environment is a common environment.
The setting module 203 is further configured to set a single verified policy. Specifically, when the risk level of the user is determined to be low, the setting module 203 performs setting by randomly selecting one of the multiple verification policies, so as to verify the user.
The sending module 204 is further configured to send the password to the user terminal when the single authentication passes, so as to retrieve the login password.
Specifically, when the mobile phone of the login account is a common mobile phone or Wi-Fi is a common Wi-Fi when the user retrieves the password, one password retrieval mode of short message verification code verification, friend verification, sound lock verification and face verification is randomly set for the user to retrieve the password.
In a preferred embodiment, when the detection module 201 detects that the account is logged in by a commonly used mobile phone, the determination module 202 determines that the user logged in the account is a low-level dangerous user, the setting module 203 sets a short message verification mode, sends the verification code to the commonly used mobile phone of the user by obtaining a command of "obtaining a short message verification code" sent by the user, and the password retrieving device 2 successfully retrieves the password by obtaining the verification code input by the user and sending the password in the password library to the commonly used mobile phone of the user after the verification code is successfully retrieved.
In another preferred embodiment, when the detection module 201 detects that the account logs in the network as a common Wi-Fi network, the determination module 202 determines that the user logging in the account is a low-level dangerous user, the setting module 203 sets a face verification mode, and when the verification is successful, the password in the password library is sent to the user terminal, and the password recovery is successful.
In another preferred embodiment, when the verification is successful, the sending module 204 may also send the password in the password library to a regular mailbox, a regular mobile phone of the user, or to a friend of the user, so as to enable the user to retrieve the password, which is not limited herein. The user common mailbox is a mailbox input by the user when the user retrieves the password or a mailbox filled by the user when registering the account.
And the combination module 206 is used for randomly combining the multiple verification strategies to verify the user when the account is logged in at an emergency login place. For example: when the account is logged in at an abnormal login place, the risk level of the user is high, and the combination module 206 randomly sets several verification strategies such as short message verification, multiple friend verification, voice lock verification, face verification, question verification and the like.
An obtaining module 207, configured to obtain the verification results respectively. Specifically, according to the combination of several randomly set verification policies of the combination module 206, corresponding verification results are respectively obtained.
The sending module 204 is further configured to send the password to the user terminal in a form of a short message if the verification results all pass. The user terminal may be a common mailbox of the user.
The verification module 208 is configured to, when the verification policy includes the short message verification, obtain a sent instruction of "obtaining a short message verification code", send a preset verification code to the common terminal, obtain the verification code input by the user, and when the verification code is consistent with the preset verification code, successfully verify the short message; the verification module 208 is further configured to, when the verification policy includes verification by the friends, obtain verification results of the friends respectively, and when the verification results of the friends all pass, the friends successfully verify; the verification module 208 is further configured to obtain the sound of the user when the verification policy includes the sound lock verification, and when the sound is consistent with a preset sound stored in a sound database, the sound lock verification is successful; the verification module 208 is further configured to, when a verification policy includes the face verification, obtain a face image of the user, and when the face image is consistent with a preset face image stored in a face database, the face verification is successful; and the verification module 208 is further configured to obtain the answer of the user when the verification policy includes the question verification, and when the answer is consistent with a preset answer stored in the question database, the question verification is successful.
According to the embodiment of the invention, whether the login environment of the user is a common environment is detected to determine the danger level of the user, and the account login password is retrieved by using different password verification modes according to the danger level of the user, so that convenience is provided for the user to retrieve the password when the user forgets the password, and meanwhile, the account login safety is improved.
The present invention also provides a computer device, such as a smart phone, a tablet computer, a notebook computer, a desktop computer, a rack server, a blade server, a tower server or a rack server (including an independent server or a server cluster composed of a plurality of servers) capable of executing programs, and the like. The computer device of the embodiment at least includes but is not limited to: memory, processor, etc. communicatively coupled to each other via a system bus.
The present embodiment also provides a computer-readable storage medium, such as a flash memory, a hard disk, a multimedia card, a card-type memory (e.g., SD or DX memory, etc.), a Random Access Memory (RAM), a Static Random Access Memory (SRAM), a read-only memory (ROM), an electrically erasable programmable read-only memory (EEPROM), a programmable read-only memory (PROM), a magnetic memory, a magnetic disk, an optical disk, a server, an App application store, etc., on which a computer program is stored, which when executed by a processor implements corresponding functions. The computer-readable storage medium of the present embodiment is used for storing the password recovery system 20, and when executed by the processor, the password recovery method of the first, second, or third embodiment is implemented.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner.
The above description is only a preferred embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.
Claims (9)
1. A method for recovering a password, the method comprising the steps of:
whether the login environment of the account is a common environment is detected to judge the danger level of the user, wherein the login environment at least comprises: logging in a place, a terminal and a Wi-Fi network;
the common environment comprises a trusted login terminal or a trusted login network with low login frequency;
when the login environment is a common environment, judging that the danger level of the user is low;
setting a single verification policy; and
when the single verification passes, the password of the account is sent to the user terminal so as to retrieve the login password;
the extraordinary circumstances include at least one of the following:
the login place is a remote login or the login terminal is an emergency mobile phone;
the login terminal is an emergency mobile phone and the login location is an emergency login location;
when the login environment is an emergency environment, judging that the danger level of the user is high;
the method comprises the steps that a login place is judged to be a remote login or a login terminal is judged to be a login user with an abnormal mobile phone to be a high-risk user;
judging that the login user with the login terminal being the emergency mobile phone and the login location being the emergency login location is the extremely high-risk user;
setting a plurality of verification strategies, and when the plurality of verifications are passed, sending the password of the account number in a password library to the user terminal; wherein the plurality of verified policies at least comprises: short message verification, multiple friend verification, sound lock verification, face verification and question verification;
wherein, judge user's danger level still includes: and carrying out voice question on the user by the intelligent voice assistant to verify the danger level of the user.
2. The password recovery method of claim 1, wherein the step of detecting whether the login environment of the account is a common environment further comprises:
detecting a login place of the account, an MAC address of a login terminal or a telephone number corresponding to the login terminal and port information for logging in a Wi-Fi network;
respectively calculating the login frequency of the account at the login place, the login terminal and the login Wi-Fi network; and
and if the login frequency is higher than a preset value, judging that the login environment of the account is a common environment.
3. The method for retrieving the password according to claim 2, wherein the setting of a plurality of authentication policies and the sending of the password of the account in the password library to the user terminal when the plurality of authentications are all passed comprises:
when the account is logged in at an abnormal login place, randomly combining the multiple verification strategies to verify the user;
respectively obtaining verification results; and
and if the verification results pass, sending the password to the user terminal in a short message form.
4. The password recovery method according to claim 3, wherein the step of separately obtaining the authentication results further comprises:
when the strategy comprises the short message verification, acquiring a transmitted instruction of acquiring a short message verification code, transmitting a preset verification code to the user terminal, acquiring the verification code input by the user, and when the verification code is consistent with the preset verification code, successfully verifying the short message;
when the policy comprises the verification of the friends, respectively obtaining the verification results of the friends, and when the verification results of the friends pass, the verification of the friends is successful;
when the strategy comprises the sound lock verification, obtaining the sound of the user, and when the sound is consistent with the preset sound stored in a sound database, the sound lock verification is successful;
when the strategy comprises the face verification, acquiring a face image of the user, and when the face image is consistent with a preset face image stored in a face database, the face verification is successful; and
and when the strategy comprises the question verification, obtaining the answer of the user, and when the answer is consistent with a preset answer stored in a question database, the question verification is successful.
5. The password recovery method according to claim 1, wherein the user terminal comprises at least a common mobile phone of the user.
6. The password recovery method of claim 1, wherein the step of setting a single verified policy further comprises: and randomly selecting one of the plurality of verified strategies for setting.
7. A password recovery device, comprising:
the detection module is used for detecting whether the login environment of the account is a common environment or not so as to judge the danger level of the user, wherein the login environment at least comprises: logging in a place, a terminal and a Wi-Fi network;
the common environment comprises a trusted login terminal or a trusted login network with low login frequency;
when the login environment is a common environment, judging that the danger level of the user is low;
setting a single verification policy; and
when the single verification passes, the password of the account is sent to the user terminal so as to retrieve the login password;
the emergency environment includes at least one of the following:
the login place is a remote login or the login terminal is an emergency mobile phone;
the login terminal is an emergency mobile phone and the login place is an emergency login place;
the judging module is used for judging that the danger level of the user is high when the login environment is an emergency environment;
judging whether the login site is a remote login or the login terminal is a login user with a special mobile phone as a high-risk user; judging that the login user of which the login terminal is an emergency mobile phone and the login location is an emergency login location is a very high-risk user;
a setting module, configured to set a plurality of verified policies, where the plurality of verified policies at least include: short message verification, multiple friend verification, voice lock verification, face verification and problem verification; and
the sending module is used for sending the password of the account in the password library to the user terminal when the plurality of kinds of verification are passed;
wherein the judging module is further configured to: and carrying out voice question on the user by the intelligent voice assistant to verify the danger level of the user.
8. A computer device, characterized in that the computer device comprises: memory, processor and computer program stored on the memory and executable on the processor, which computer program, when being executed by the processor, carries out the steps of the cryptographic recovery method of any one of claims 1 to 6.
9. A computer-readable storage medium, in which a computer program is stored which is executable by at least one processor to cause the at least one processor to perform the steps of the password recovery method according to any one of claims 1 to 6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910031601.1A CN109639724B (en) | 2019-01-14 | 2019-01-14 | Password retrieving method, password retrieving device, computer device and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910031601.1A CN109639724B (en) | 2019-01-14 | 2019-01-14 | Password retrieving method, password retrieving device, computer device and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109639724A CN109639724A (en) | 2019-04-16 |
CN109639724B true CN109639724B (en) | 2023-04-07 |
Family
ID=66060739
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910031601.1A Active CN109639724B (en) | 2019-01-14 | 2019-01-14 | Password retrieving method, password retrieving device, computer device and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109639724B (en) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110691093B (en) * | 2019-10-08 | 2022-04-08 | 迈普通信技术股份有限公司 | Password retrieving method and device, network equipment and computer readable storage medium |
CN112995107A (en) * | 2019-12-17 | 2021-06-18 | 青岛海信宽带多媒体技术有限公司 | Communication method and device |
CN112968895B (en) * | 2021-02-23 | 2022-06-24 | 浙江大华技术股份有限公司 | Password resetting method and device, storage medium and electronic device |
CN113489741A (en) * | 2021-07-20 | 2021-10-08 | 深圳市灰度科技有限公司 | Password resetting method and device for Internet of things platform, Internet of things server and medium |
CN114422557A (en) * | 2021-12-17 | 2022-04-29 | 浙江零跑科技股份有限公司 | Method for remotely controlling automobile by mobile phone |
CN114898510A (en) * | 2022-05-11 | 2022-08-12 | 中国矿业大学 | Financial password acquisition method, system, financial equipment and storage medium |
CN116684092B (en) * | 2023-07-28 | 2023-10-13 | 新乡学院 | Network-based password storage and recovery method and password recovery device |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2015043491A1 (en) * | 2013-09-30 | 2015-04-02 | 腾讯科技(深圳)有限公司 | Method and system for performing security verification on login of internet account |
CN105450665A (en) * | 2015-12-30 | 2016-03-30 | 宇龙计算机通信科技(深圳)有限公司 | Secure login method, secure login device and terminal |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104579667B (en) * | 2013-10-28 | 2020-04-28 | 腾讯科技(深圳)有限公司 | Account password management method, related device and system |
CN104378343B (en) * | 2014-05-21 | 2016-04-13 | 腾讯科技(深圳)有限公司 | The password method for retrieving of network account, Apparatus and system |
CN105763520A (en) * | 2014-12-18 | 2016-07-13 | 阿里巴巴集团控股有限公司 | Network account password recovery method and device, client terminal device and server |
CN104754516B (en) * | 2015-03-31 | 2016-05-11 | 努比亚技术有限公司 | Client password method for retrieving, device and system based on LBS |
CN105141594B (en) * | 2015-08-11 | 2020-10-09 | 腾讯科技(深圳)有限公司 | Password retrieving method and device |
CN107665301B (en) * | 2016-07-28 | 2021-03-19 | 腾讯科技(深圳)有限公司 | Verification method and device |
-
2019
- 2019-01-14 CN CN201910031601.1A patent/CN109639724B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2015043491A1 (en) * | 2013-09-30 | 2015-04-02 | 腾讯科技(深圳)有限公司 | Method and system for performing security verification on login of internet account |
CN105450665A (en) * | 2015-12-30 | 2016-03-30 | 宇龙计算机通信科技(深圳)有限公司 | Secure login method, secure login device and terminal |
Also Published As
Publication number | Publication date |
---|---|
CN109639724A (en) | 2019-04-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109639724B (en) | Password retrieving method, password retrieving device, computer device and storage medium | |
CN109783249B (en) | Platform access method and device, terminal and computer readable storage medium | |
CN112039900B (en) | Network security risk detection method, system, computer device and storage medium | |
CN110691085B (en) | Login method, login device, password management system and computer readable medium | |
CN107154919B (en) | Safe login method and device | |
CN104901924B (en) | Internet account verification method and device | |
WO2009051336A1 (en) | Apparatus and method for managing terminal users | |
CN110635898A (en) | Encryption method and encryption system | |
WO2013173238A1 (en) | Electronic transaction notification system and method | |
CN112448956B (en) | Authority processing method and device of short message verification code and computer equipment | |
CN113468515A (en) | User identity authentication method and device, electronic equipment and storage medium | |
CN111294347B (en) | Safety management method and system for industrial control equipment | |
CN107872446B (en) | Communication account management method and device and server | |
CN106507300A (en) | A kind of method for giving loss terminal for change, device and terminal | |
CN105790949A (en) | Subscriber identity module card unlocking method and subscriber identity module card unlocking device | |
CN110717770A (en) | Anti-counterfeiting detection method, device, equipment and storage medium for vehicle parts | |
CN113923001B (en) | Identity verification method, system, device and equipment | |
CN113918905A (en) | Service processing method and device and electronic equipment | |
CN113595797B (en) | Alarm information processing method and device, electronic equipment and storage medium | |
CN111107089B (en) | Method and device for protecting data transmission safety of Android system | |
WO2017197689A1 (en) | Sim card processing method and apparatus, terminal, and esam chip | |
CN116707844A (en) | Behavior tracking method and device based on public account number, electronic equipment and medium | |
CN113099453A (en) | Authentication method, device and equipment for access server and readable storage medium | |
CN108200060B (en) | Single sign-on verification method based on web subsystem, server and storage medium | |
CN106131819A (en) | A kind of multistage authentication prevents the method for mobile phone malice brush machine |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |