CN111182483B - Terminal and method and system for resetting password of call restriction supplementary service thereof - Google Patents
Terminal and method and system for resetting password of call restriction supplementary service thereof Download PDFInfo
- Publication number
- CN111182483B CN111182483B CN201911308072.1A CN201911308072A CN111182483B CN 111182483 B CN111182483 B CN 111182483B CN 201911308072 A CN201911308072 A CN 201911308072A CN 111182483 B CN111182483 B CN 111182483B
- Authority
- CN
- China
- Prior art keywords
- password
- new password
- new
- terminal
- old
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/16—Communication-related supplementary services, e.g. call-transfer or call-hold
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/041—Key generation or derivation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/068—Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Telephonic Communication Services (AREA)
Abstract
The application discloses a method for resetting a password of a call restriction supplementary service. The method comprises the following steps: the terminal receives a password obtaining request from a network terminal after starting the reset password; the terminal responds to the password obtaining request and receives an old password, a new password and a confirmed new password input by a user; the terminal judges whether the new password is consistent with the confirmed new password; and when the new password is consistent with the confirmed new password, the terminal sends the old password and the new password to the network terminal at one time, so that the network terminal replaces the old password with the new password to realize password resetting. The method and the device for verifying the consistency of the new password and the confirmed new password locally achieve the consistency verification of the new password and the confirmed new password at the terminal, and after the verification is passed, the old password and the new password are sent to the network terminal for resetting the password at one time, so that the network transmission burden brought by sending data for many times is reduced.
Description
Technical Field
The present application relates to the field of communications, and in particular, to a terminal and a method and system for resetting a password of a call barring supplementary service thereof.
Background
According to the 3GPP TS24.088 protocol (Call Barring (CB) supplementary service), if a mobile subscriber chooses to use a password controlled Call Barring service by the subscriber when signing a Call Barring supplementary service, the subscriber must register a Call Barring password. In addition, the mobile user can change the call restriction password at any time through the registration procedure. When the password is modified, the user needs to continuously input the old password, the new password and the confirmed new password on the password modification interface of the mobile phone, and then the mobile phone initiates a new password registration process to the network terminal. The network end sends three requests to require the mobile end to send the old password, the new password and the confirmed new password respectively to complete the password modification process. However, the old password, the new password and the confirmed new password are input once, but the mobile phone sends the new password to the network end three times, which greatly consumes time and network end resources.
Disclosure of Invention
In view of the above, the present application provides a terminal and a method and a system for resetting a password of a call barring supplementary service thereof to solve the above technical problem.
The method for resetting the password of the call restriction supplementary service provided by the embodiment of the application comprises the following steps:
the terminal receives a password obtaining request from a network terminal after starting the reset password;
the terminal responds to the password obtaining request and receives an old password, a new password and a confirmed new password input by a user;
the terminal judges whether the new password is consistent with the confirmed new password; and
and when the new password is consistent with the confirmed new password, the terminal sends the old password and the new password to the network terminal at one time, so that the network terminal replaces the old password with the new password to realize password resetting.
The system for resetting the password of the call restriction supplementary service comprises a terminal and a network terminal, wherein the terminal sends a password resetting request to the network terminal; the network terminal receives the password resetting request and responds to the password resetting request to send a password obtaining request to the terminal; the terminal responds to the password obtaining request and receives an old password, a new password and a confirmed new password input by the user; the terminal judges whether the new password is consistent with the confirmed new password; when the new password is consistent with the confirmed new password, the terminal sends the old password and the new password to the network terminal at one time; and the network terminal replaces the old password with the new password to realize password resetting.
The application provides a terminal, including processing unit, input unit and communication unit, wherein:
the processing unit receives a password obtaining request from a network terminal through the communication unit after the reset password is started;
the processing unit responds to the password obtaining request and controls the input unit to receive an old password, a new password and a confirmed new password input by a user;
the processing unit judges whether the new password is consistent with the confirmed new password; and
and when the new password is consistent with the confirmed new password, the processing unit controls the communication unit to send the old password and the new password to the network terminal at one time, so that the network terminal replaces the old password with the new password to realize password resetting.
The method and the device for verifying the new password and the new password locally realize the verification of the new password and the confirmation of the new password at the terminal, and send the old password and the new password to the network terminal for resetting the password once after the verification is passed, so that the network transmission burden caused by multiple times of sending is reduced.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a flowchart of a method for resetting a password for a call barring supplementary service according to an embodiment of the present application.
Fig. 2 is a block diagram of a system for resetting a password for call barring supplementary services in an embodiment of the present application.
FIG. 3 is a sub-flowchart of step 15 shown in FIG. 1 according to an embodiment of the present application.
Fig. 4 is a block diagram of a terminal according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions of the embodiments of the present application are described clearly and completely below with reference to the drawings of the embodiments of the present application. It is to be understood that the described embodiments are merely exemplary of some, and not all, of the present application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Unless defined otherwise, technical or scientific terms used herein shall have the ordinary meaning as understood by one of ordinary skill in the art to which this application belongs. As used in this application, "first," "second," and the like are used to distinguish between different objects and not to describe a particular order, quantity, or importance. Similarly, the use of the terms "a," "an," or "the" do not denote a limitation of quantity, but rather are used to denote the presence of at least one. The word "comprising" or "comprises", and the like, means that the element or item preceding the word covers the element or item listed after the word and its equivalents, but does not exclude other elements or items. The terms "connected" or "coupled," and the like, are not restricted to physical or mechanical connections, but may include electrical connections, whether direct or indirect.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the application. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is explicitly and implicitly understood by one skilled in the art that the embodiments described herein can be combined with other embodiments.
Referring to fig. 1, fig. 1 is a flowchart illustrating a method for resetting a password for a call barring supplementary service according to an embodiment of the present application. The order of execution of the method is not limited to that shown in fig. 1. The method comprises the following steps:
step 11: the terminal 100 sends a reset password request to the network side 200.
Step 12: the network 200 receives the reset password request and sends a password obtaining request to the terminal 100 in response to the reset password request.
Step 13: the terminal 100 receives the user's input of the old password, the new password, and the confirmation of the new password in response to the get password request.
Step 14: the terminal 100 determines whether the new password and the confirmation new password are identical. If so, step 15 is entered.
Step 15: when the new password is consistent with the confirmed new password, the terminal 100 sends the old password and the new password to the network 200 at one time.
Step 16: the network 200 replaces the old password with the new password to realize password resetting.
Therefore, the method and the device realize the verification of the new password and the confirmation of the new password locally at the terminal 100, and send the old password and the new password to the network end 200 for resetting the password once after the verification is passed, thereby reducing the network transmission burden caused by sending data for many times.
Further, in one embodiment, step 14 further includes:
if not, step 17 is entered.
And step 17: when the new password is inconsistent with the confirmed new password, the terminal 100 prompts the user to input the new password again and confirm the new password, and returns to step 14 again, that is: judging whether the new password is consistent with the new password for confirmation, and entering step 15 when the new password is consistent with the new password for confirmation, namely: and sending the old password and the new password to the network 200 at one time, so that the network 200 replaces the old password with the new password to realize password resetting.
Therefore, the method and the device can realize the consistency verification of the new password and the confirmed new password locally at the terminal, and after the verification is passed, the old password and the new password are sent to the network end 200 at one time to realize password resetting, so that the network transmission burden caused by multiple sending of the old password, the new password and the confirmed new password is avoided.
To avoid the risk caused by transmitting the password in plaintext, in one embodiment, please refer to fig. 3, and step 15 specifically includes:
step 151: when the new password is consistent with the confirmed new password, the terminal 100 respectively performs hash function conversion on the old password and the new password into a first character string with a fixed length and a second character string with a fixed length, wherein the first character string and the second character string conform to a call restriction supplementary service protocol;
the Hash function, also called Hash (Hash) algorithm, is a one-way mathematical function, that is, input data with any length is converted into data with fixed length by the Hash algorithm and output. This one-way nature of the hash function and the fixed length nature of the output data allow it to generate "data fingerprints" of data for use in authentication and digital signatures in cryptography. Common hash functions are MD4, MD5, SHA-1, and others. Specifically, MD4(RFC 1320) was designed by the MIT's Ronald l.rivest in 1990, and MD is an abbreviation for Message Digest, which is implemented based on bit operations of 32-bit operands. MD5(RFC 1321) is a modified version of MD4 by Rivest in 1991. It still groups the inputs with 512 bits and its output is a concatenation of 4 32-bit words, the same as MD 4. MD5 is more complex than MD4 and slower than MD4, but safer and better at resisting analysis and resisting differentiation. SHA1 is designed by NIST NSA for use with DSA, and produces hash values of 160 bits in length for inputs of less than 264, and is therefore more resistant to brute-force.
Step 152: the terminal 100 sends the first character string and the second character string to the network 200, so that the network 200 realizes password resetting according to the first character string and the second character string.
Therefore, the old password and the new password which are input by the user and are in the form of the plaintext password are converted into the first character string and the second character string which have fixed lengths through the hash function, so that the plaintext password input by the user is protected. Even if the first character string and the second character string are intercepted by a third party in the transmission process, the third party cannot deduce the original plaintext password, and the safety of network transmission is improved.
It will be appreciated that in other embodiments, protection of the plaintext cipher may be achieved by an encryption algorithm, rather than by a hash function. Further, step 15 specifically includes:
when the new password is consistent with the confirmed new password, the terminal 100 encrypts the old password and the new password by using an encryption algorithm through a key, and sends the encrypted data to the network 200, so that the network 200 realizes password resetting according to the encrypted data and the key, wherein the network 200 obtains the key in a form of sharing the key. The Encryption Algorithm may be, but is not limited to, a symmetric Encryption Algorithm such as AES (Advanced Encryption Standard), DES (Data Encryption Algorithm), etc., which requires an Encryption key to generate a cipher text, and the Encryption key is generally obtained by agreement in advance or transmission through other means.
Further, in one embodiment, the method further includes the steps of:
when the terminal 100 starts the reset password, the user is prompted to input the old password, the new password and the confirmed new password. The operation of starting the reset password may be, but is not limited to, manually inputting a start instruction, voice inputting a start instruction, and the like. And after the reset password is started, controlling to display a reset password dialog box. It will be appreciated that the reset password dialog includes an old password entry box, a new password entry box, and a confirm new password entry box. And the old password input box, the new password input box and the new password confirmation input box are respectively used for a user to input the old password, the new password and the new password confirmation.
Further, in one embodiment, the method further comprises the steps of:
when the terminal 100 starts the reset password, performing authority verification of the reset password, wherein the authority verification comprises at least one of identity verification, dynamic code verification and biological password verification;
and when the authority verification is passed, reminding the user to input the old password, the new password and the confirmed new password.
The identity authentication is to verify whether the password is reset for the user by inputting identity authentication information input by the user in advance when the reset password is started; the dynamic code verification is to obtain a dynamic code by inputting a mobile phone number to verify whether a password is reset on the terminal held by the user; the biometric password verification is to verify whether the password is reset for the user by comparing the biometric characteristics of the user with the biometric characteristics input in advance, and the biometric password verification includes but is not limited to fingerprint verification, face recognition verification, iris recognition verification, palm print recognition verification, artery recognition verification and the like. Through at least one of identity authentication, dynamic code authentication and biological password authentication, the behavior that other people except the terminal holder are unauthorized to reset the password can be effectively eliminated, and the safety of information, property and the like of the user is ensured.
It will be appreciated that in other embodiments, the method further comprises the steps of:
when the terminal 100 starts the reset password, performing authority verification of the reset password, wherein the authority verification comprises at least one of identity verification, dynamic code verification and biological password verification;
and when the authority passes the verification, the old password is input by default, and the user is reminded to input the new password and confirm the new password.
The authentication, the dynamic code authentication and the biometric code authentication are discussed above, and are not described herein again.
The terminal 100 may pre-store a correspondence table in which the old password is associated with the user authentication and the biometric password authentication. Therefore, after the terminal 100 is authenticated by the authority of the reset password, the old password is input by default, and at the same time, the reset password dialog box includes only the new password input box and the confirmation new password input box. And the new password input box and the new password confirmation input box are respectively used for a user to input the new password and the new password confirmation. Therefore, the speed of resetting the password is increased, and the operation flow of resetting the password is shortened.
Referring to fig. 2, fig. 2 is a block diagram illustrating a system for resetting a password for a call barring supplementary service according to an embodiment of the present application. The system 300 includes a terminal 100 and a network 200. The network elements involved in the network 200 mainly include: MSC, VLR and HLR. The MSC mainly sends the information received by the terminal 10 to the VLR, and sends the information of the VLR to the terminal 10. The VLR mainly carries out information transmission with the MSC/HLR. The HLR mainly handles the password registration process and sends a password acquisition request to the VLR.
The terminal 100 sends a reset password request to the network side 200.
The network 200 receives the reset password request and sends a password obtaining request to the terminal 100 in response to the reset password request.
The terminal 100 receives the user's input of the old password, the new password, and the confirmation of the new password in response to the get password request.
The terminal 100 determines whether the new password and the confirmation new password are identical.
When the new password is consistent with the confirmed new password, the terminal 100 sends the old password and the new password to the network 200 at one time.
The network 200 replaces the old password with the new password to realize password resetting.
Therefore, the method and the device realize the verification of the new password and the confirmation of the new password locally at the terminal 100, and send the old password and the new password to the network 200 for resetting the password once after the verification is passed, thereby reducing the network transmission burden caused by sending data for many times.
Further, in one embodiment, when the new password is inconsistent with the new password for confirmation, the terminal 100 prompts the user to input the new password and confirm the new password again, and judges whether the new password is consistent with the new password for confirmation again, until the new password is consistent with the new password for confirmation, the terminal sends the old password and the new password to the network 200 at one time, and the network 200 replaces the old password with the new password to reset the password.
Therefore, the method and the device can realize the consistency verification of the new password and the confirmed new password locally at the terminal, and after the verification is passed, the old password and the new password are sent to the network end 200 at one time to realize password resetting, so that the network transmission burden caused by multiple sending of the old password, the new password and the confirmed new password is avoided.
In order to avoid the risk brought by the plaintext transmission, in one embodiment, when the new password is consistent with the confirmation new password, the terminal 100 respectively performs a hash function on the old password and the new password to convert the old password and the new password into a first character string and a second character string, wherein the first character string and the second character string are of fixed lengths and conform to a call barring supplementary service protocol; the terminal 100 sends the first character string and the second character string to the network 200, so that the network 200 realizes password resetting according to the first character string and the second character string. Therefore, the old password and the new password which are input by the user and are in the form of the plaintext password are converted into the first character string and the second character string which have fixed lengths through the hash function, so that the plaintext password input by the user is protected. Even if the first character string and the second character string are intercepted by a third party in the transmission process, the third party cannot deduce the original plaintext password, and the safety of network transmission is improved.
It will be appreciated that in other embodiments, protection of the plaintext cipher may be achieved by an encryption algorithm, rather than by a hash function. Specifically, when the new password is consistent with the confirmed new password, the terminal 100 encrypts the old password and the new password by using an encryption algorithm through a key, and sends encrypted data to the network 200, so that the network 200 realizes password resetting according to the encrypted data and the key, wherein the network 200 obtains the key in a form of sharing the key. The Encryption Algorithm may be, but is not limited to, a symmetric Encryption Algorithm such as AES (Advanced Encryption Standard), DES (Data Encryption Algorithm), etc., which requires an Encryption key to generate a ciphertext, and the Encryption key is generally obtained by agreement in advance or transmission through other means.
Further, in one embodiment, the terminal 100 prompts the user to input the old password, the new password and the confirmed new password when the reset password is started. The operation of starting the reset password may be, but is not limited to, manually inputting a start instruction, voice inputting a start instruction, and the like. After the reset password is started, controlling to display a reset password dialog box. It will be appreciated that the reset password dialog includes an old password entry box, a new password entry box, and a confirm new password entry box. And the old password input box, the new password input box and the new password confirmation input box are respectively used for a user to input the old password, the new password and the new password confirmation.
Further, in one embodiment, when the reset password is started, the terminal 100 performs authority verification of the reset password, where the authority verification includes at least one of identity verification, dynamic code verification, and biometric password verification; and when the authority verification is passed, reminding the user to input the old password, the new password and the confirmed new password. The identity authentication is to verify whether the password is reset for the user by inputting identity authentication information input by the user in advance when the reset password is started; the dynamic code verification is to obtain a dynamic code by inputting a mobile phone number to verify whether a password is reset on the terminal held by the user; the biometric password verification is to verify whether the password is reset for the user by comparing the biometric characteristics of the user with the biometric characteristics input in advance, and the biometric password verification includes but is not limited to fingerprint verification, face recognition verification, iris recognition verification, palm print recognition verification, artery recognition verification and the like. Through at least one of identity authentication, dynamic code authentication and biological password authentication, the behavior that other people except the terminal holder are unauthorized to reset the password can be effectively eliminated, and the safety of information, property and the like of the user is ensured.
Further, in one embodiment, when the reset password is started, the terminal 100 performs authority verification of the reset password, where the authority verification includes at least one of identity verification, dynamic code verification, and biometric password verification; and when the authority passes the verification, the old password is input by default, and the user is reminded to input the new password and confirm the new password. The discussion of the identity verification, the dynamic code verification and the biometric password verification is the same as above, and the details are not repeated here. The terminal 100 may pre-store a correspondence table in which the old password is associated with the user authentication and the biometric password authentication. Therefore, after the terminal 100 is authenticated by the authority of the reset password, the old password is input by default, and at the same time, the reset password dialog box includes only the new password input box and the confirmation new password input box. And the new password input box and the new password confirmation input box are respectively used for a user to input the new password and the new password confirmation. Therefore, the speed of resetting the password is increased, and the operation flow of resetting the password is shortened.
Referring to fig. 4, fig. 4 is a block diagram of a terminal 100 according to an embodiment of the present application. The terminal 100 includes a processing unit 11, a storage unit 12, an input unit 13, and a communication unit 14. The Processing Unit 11 may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic device, discrete hardware component, etc. The general-purpose processor may be a microprocessor or the general-purpose processor may be any conventional processor or the like, and the processing unit 11 is a control center of the terminal 100 and connects various parts of the entire terminal 100 using various interfaces and lines. The memory unit 12 may include a high speed random access memory, and may also include a non-volatile memory, such as a hard disk, a memory, a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), a plurality of magnetic disk storage devices, a Flash memory device, or other volatile solid state storage devices. The input unit 30 may be a mechanical key type input unit, a touch screen type input unit, a touch panel type input unit, or the like. The communication unit 14 is a network device that can communicate with the internet (internet), an On-Demand virtual private network (On-Demand virtual Line), a wireless network (wireless network) including WIFI and bluetooth, a telephone network including a GPRS network and a CDMA network, a broadcast network, and the like.
The processing unit 11 receives a password obtaining request from the network end through the communication unit 14 after the reset password is started.
The processing unit 11 controls the input unit 13 to receive the old password, the new password and the confirmation new password input by the user in response to the get password request.
The processing unit 11 determines whether the new password and the confirmation new password coincide.
When the new password is consistent with the confirmed new password, the processing unit 11 controls the communication unit 14 to send the old password and the new password to the network 200 at one time, so that the network 200 replaces the old password with the new password to reset the password.
Therefore, the method and the device realize the verification of the new password and the confirmation of the new password locally at the terminal 100, and send the old password and the new password to the network end 200 for resetting the password once after the verification is passed, thereby reducing the network transmission burden caused by multiple times of sending.
Further, in one embodiment, the terminal 100 further includes a prompting unit 15. It is understood that the prompting unit 15 may be a sound output unit, an image output unit, or a light output unit, and is not limited herein. When the new password is inconsistent with the new password for confirmation, the processing unit 11 controls the prompting unit 15 to prompt the user to input the new password and confirm the new password again, and judges whether the new password is consistent with the new password for confirmation again, until the new password is consistent with the new password for confirmation, the old password and the new password are sent to the network end 200 at one time, so that the network end 200 replaces the old password with the new password to realize password resetting.
Therefore, the method and the device can realize the consistency verification of the new password and the confirmed new password locally at the terminal, and after the verification is passed, the old password and the new password are sent to the network end 200 through the network end at one time to realize password resetting, so that the network transmission burden caused by multiple sending of the old password, the new password and the confirmed new password is avoided.
Further, in one embodiment, in order to avoid the risk caused by transmitting a password in plaintext, when the new password and the confirmation new password are identical, the processing unit 11 respectively performs a hash function on the old password and the new password to convert the old password and the new password into a first character string and a second character string, which are consistent with the call barring supplementary service protocol and have fixed lengths, respectively. The processing unit 11 further controls the communication unit 14 to send the first character string and the second character string to the network 200, so that the network 200 realizes password resetting according to the first character string and the second character string. Therefore, the old password and the new password which are input by the user and are in the form of the plaintext password are converted into the first character string and the second character string which have fixed lengths through the hash function, so that the plaintext password input by the user is protected. Even if the first character string and the second character string are intercepted by a third party in the transmission process, the third party cannot deduce the original plaintext password, and the safety of network transmission is improved.
It will be appreciated that in other embodiments, protection of the plaintext cipher may be achieved by an encryption algorithm, rather than by a hash function. When the new password is consistent with the confirmed new password, the processing unit 11 encrypts the old password and the new password by using an encryption algorithm through a key, and controls the communication unit 14 to send the encrypted data to the network 200 through the network, so that the network 200 realizes password resetting according to the encrypted data and the key, wherein the network 200 obtains the key in a form of sharing the key. The Encryption Algorithm may be, but is not limited to, a symmetric Encryption Algorithm such as AES (Advanced Encryption Standard), DES (Data Encryption Algorithm), etc., which requires an Encryption key to generate a cipher text, and the Encryption key is generally obtained by agreement in advance or transmission through other means.
Further, in one embodiment, the processing unit 11 controls the prompting unit 15 to prompt the user to input the old password, the new password and the confirmed new password when the reset password is started. The operation of starting the reset password may be, but is not limited to, manually inputting a start instruction, inputting a start instruction by voice, and the like. After the reset password is started, controlling to display a reset password dialog box. It will be appreciated that the reset password dialog includes an old password entry box, a new password entry box, and a confirm new password entry box. And the old password input box, the new password input box and the new password confirmation input box are respectively used for a user to input the old password, the new password and the new password confirmation. The processing unit 11 controls the prompting unit 15 to prompt the user to input the old password, the new password, and the confirmation new password in the old password input box, the new password input box, and the confirmation new password input box, respectively.
Further, in one embodiment, the processing unit 11 performs, when the reset password is started, an authorization verification of the reset password, where the authorization verification includes at least one of identity verification, dynamic code verification, and biometric password verification; and when the authority passes the verification, the prompting unit 15 is controlled to remind the user to input the old password, the new password and the confirmed new password. The identity authentication is to verify whether the password is reset for the user by inputting identity authentication information input by the user in advance when the reset password is started; the dynamic code verification is to obtain a dynamic code by inputting a mobile phone number to verify whether a password is reset on the terminal held by the user; the biometric password verification is to verify whether the password is reset for the user by comparing the biometric characteristics of the user with the biometric characteristics input in advance, and the biometric password verification includes but is not limited to fingerprint verification, face recognition verification, iris recognition verification, palm print recognition verification, artery recognition verification and the like. Through at least one of identity authentication, dynamic code authentication and biological password authentication, the behavior that other people except the terminal holder are unauthorized to reset the password can be effectively eliminated, and the safety of information, property and the like of the user is ensured.
Further, in one embodiment, the processing unit 11 performs, when the reset password is started, an authorization verification of the reset password, where the authorization verification includes at least one of identity verification, dynamic code verification, and biometric password verification; and when the authority passes the verification, the old password is input by default, and the prompting unit 15 is controlled to remind the user to input the new password and confirm the new password. The discussion of the identity verification, the dynamic code verification and the biometric password verification is the same as above, and the details are not repeated here. The storage unit 12 may pre-store a corresponding relationship table in which the old password is associated with the user authentication and the biometric password authentication. Therefore, the processing unit 11 will input the old password by default after the authentication of the authority of the reset password, and at the same time, the reset password dialog box includes only the new password input box and the confirmation new password input box. And the new password input box and the new password confirmation input box are respectively used for a user to input the new password and the new password confirmation. Therefore, the speed of resetting the password is increased, and the operation flow of resetting the password is shortened.
The above embodiments are only used for illustrating the technical solutions of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present application.
Claims (15)
1. A method for resetting a password for a call barring supplementary service, comprising the steps of:
the terminal receives a password obtaining request from a network terminal after starting the reset password;
the terminal responds to the password obtaining request and receives an old password, a new password and a confirmed new password input by a user;
the terminal judges whether the new password is consistent with the confirmed new password; and
when the new password is consistent with the confirmed new password, the terminal sends the old password and the new password to the network terminal at one time, so that the network terminal replaces the old password with the new password to realize password resetting, and the method comprises the following steps: when the new password is consistent with the confirmed new password, the terminal converts the old password and the new password into a first character string with a fixed length and a second character string with a fixed length which accord with a call restriction supplementary service protocol respectively through a hash function, wherein the old password and the new password are in a plaintext password form; and the terminal sends the first character string and the second character string to a network terminal, so that the network terminal realizes password resetting according to the first character string and the second character string.
2. The method according to claim 1, wherein the terminal prompts the user to input a new password and confirm the new password again when the new password is inconsistent with the confirmed new password, and judges whether the new password is consistent with the confirmed new password again until the new password is confirmed to be consistent with the confirmed new password, and sends the old password and the new password to the network once, so that the network replaces the old password with the new password to reset the password.
3. The method of claim 1, wherein the terminal initiating the reset password further comprises:
and starting a reset password to remind a user to input the old password, the new password and the confirmed new password.
4. The method of claim 1, wherein the terminal initiating the reset password further comprises:
starting a reset password, and performing authority verification of the reset password when the reset password is started, wherein the authority verification comprises at least one of identity verification, dynamic code verification and biological password verification;
and when the authority verification is passed, reminding the user to input the old password, the new password and the confirmed new password.
5. The method of claim 1, wherein the terminal initiating the reset password further comprises:
starting a reset password, and performing authority verification of the reset password when the reset password is started, wherein the authority verification comprises at least one of identity verification, dynamic code verification and biological password verification;
and when the authority passes the verification, the old password is input by default, and the user is reminded to input the new password and confirm the new password.
6. A system for resetting a password of a call restriction supplementary service is characterized by comprising a terminal and a network terminal, wherein the terminal sends a password resetting request to the network terminal; the network terminal receives the password resetting request and responds to the password resetting request to send a password obtaining request to the terminal; the terminal responds to the password obtaining request and receives an old password, a new password and a confirmed new password input by the user; the terminal judges whether the new password is consistent with the confirmed new password; when the new password is consistent with the confirmed new password, the terminal sends the old password and the new password to the network terminal at one time; the network terminal replaces the old password with the new password to realize password resetting;
when the new password is consistent with the confirmed new password, the terminal converts the old password and the new password into a first character string with a fixed length and a second character string with a fixed length, which conform to a call restriction supplementary service protocol, respectively through a hash function, wherein the old password and the new password are in a plaintext password form; and the terminal sends the first character string and the second character string to a network terminal, and the network terminal realizes password resetting according to the first character string and the second character string.
7. The system of claim 6, wherein when the new password is inconsistent with the new password for confirmation, the terminal prompts the user to input the new password and confirm the new password again, determines whether the new password is consistent with the new password for confirmation, and sends the old password and the new password to the network once until the new password is consistent with the new password for confirmation, and the network replaces the old password with the new password to reset the password.
8. The system of claim 6, wherein the terminal further prompts the user to input the old password, the new password and the confirmed new password when the reset password is started.
9. The system for resetting the password of claim 6, wherein when the terminal starts the reset password, the terminal further performs an authorization verification of the reset password, wherein the authorization verification comprises at least one of an identity verification, a dynamic code verification and a biometric password verification; and when the authority verification is passed, reminding the user to input the old password, the new password and the confirmed new password.
10. The system for resetting the password of claim 6, wherein when the terminal starts the reset password, the terminal further performs an authorization verification of the reset password, wherein the authorization verification comprises at least one of an identity verification, a dynamic code verification and a biometric password verification; and when the authority passes the verification, the old password is input by default, and the user is reminded to input the new password and confirm the new password.
11. A terminal comprises a processing unit, an input unit and a communication unit; wherein:
the processing unit receives a password obtaining request from a network terminal through the communication unit after the reset password is started;
the processing unit responds to the password obtaining request and controls the input unit to receive an old password, a new password and a confirmed new password input by a user;
the processing unit judges whether the new password is consistent with the confirmed new password; and
when the new password is consistent with the confirmed new password, the processing unit controls the communication unit to send the old password and the new password to the network terminal at one time, so that the network terminal replaces the old password with the new password to realize password resetting, and the method comprises the following steps: when the new password is consistent with the confirmed new password, the processing unit converts the old password and the new password into a first character string with a fixed length and a second character string with a fixed length which conform to a call restriction supplementary service protocol through a hash function respectively, wherein the old password and the new password are in a plaintext password form; the processing unit also controls the communication unit to send the first character string and the second character string to a network terminal, so that the network terminal can reset the password according to the first character string and the second character string.
12. The terminal according to claim 11, wherein the terminal further comprises a prompting unit, and when the new password is inconsistent with the confirmed new password, the processing unit controls the prompting unit to prompt the user to input a new password and confirm the new password again, and judge whether the new password is consistent with the confirmed new password again, until the new password is confirmed to be consistent with the confirmed new password, the old password and the new password are sent to the network once, so that the network replaces the old password with the new password to realize password resetting.
13. The terminal according to claim 11, wherein the terminal further comprises a prompting unit, and when the processing unit starts to reset the password, the processing unit controls the prompting unit to prompt the user to input the old password, the new password and the confirmed new password.
14. The terminal according to claim 11, wherein the terminal further comprises a prompting unit, and the processing unit performs authority verification of the reset password when the reset password is started, wherein the authority verification comprises at least one of identity verification, dynamic code verification and biological password verification; and when the authority verification passes, controlling the prompting unit to remind the user to input the old password, the new password and the confirmed new password.
15. The terminal according to claim 11, wherein the terminal further comprises a prompting unit, and the processing unit performs authority verification of the reset password when the reset password is started, wherein the authority verification comprises at least one of identity verification, dynamic code verification and biological password verification; and when the authority passes the verification, the old password is input by default, and the prompting unit is controlled to remind the user to input the new password and confirm the new password.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911308072.1A CN111182483B (en) | 2019-12-16 | 2019-12-16 | Terminal and method and system for resetting password of call restriction supplementary service thereof |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911308072.1A CN111182483B (en) | 2019-12-16 | 2019-12-16 | Terminal and method and system for resetting password of call restriction supplementary service thereof |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111182483A CN111182483A (en) | 2020-05-19 |
CN111182483B true CN111182483B (en) | 2022-07-05 |
Family
ID=70653967
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911308072.1A Active CN111182483B (en) | 2019-12-16 | 2019-12-16 | Terminal and method and system for resetting password of call restriction supplementary service thereof |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111182483B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113707155B (en) * | 2020-05-22 | 2024-06-14 | 中山市富深家用制品有限公司 | Voice password modification method and device |
CN115273276B (en) * | 2021-04-30 | 2024-02-06 | 云丁网络技术(北京)有限公司 | Method and device for authenticating a user |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1614982A (en) * | 2003-11-05 | 2005-05-11 | 华为技术有限公司 | Realizing method for strengthening meeting telephone service |
CN1838699A (en) * | 2006-04-18 | 2006-09-27 | 松讯达中科电子(深圳)有限公司 | Method for limiting handset call or answer |
CN101316220A (en) * | 2008-06-27 | 2008-12-03 | 华为技术有限公司 | Method, system and device for modifying cipher of virtual private net |
CN102902901A (en) * | 2011-07-29 | 2013-01-30 | 鸿富锦精密工业(深圳)有限公司 | Computer system and encryption device and encryption method thereof |
CN104618314A (en) * | 2013-12-24 | 2015-05-13 | 腾讯科技(深圳)有限公司 | Method, device and system for password reset |
CN104821941A (en) * | 2015-04-21 | 2015-08-05 | 南京邮电大学 | Smart card password authentication and password changing method |
CN105320278A (en) * | 2014-07-31 | 2016-02-10 | 精工爱普生株式会社 | Information analysis device, exercise analysis system, information display system, and information display method |
CN109088855A (en) * | 2018-07-12 | 2018-12-25 | 新华三信息安全技术有限公司 | A kind of identity authentication method and equipment |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101416538B1 (en) * | 2012-08-01 | 2014-07-09 | 주식회사 로웸 | System for processing lost password using user's long term memory and method thereof |
-
2019
- 2019-12-16 CN CN201911308072.1A patent/CN111182483B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1614982A (en) * | 2003-11-05 | 2005-05-11 | 华为技术有限公司 | Realizing method for strengthening meeting telephone service |
CN1838699A (en) * | 2006-04-18 | 2006-09-27 | 松讯达中科电子(深圳)有限公司 | Method for limiting handset call or answer |
CN101316220A (en) * | 2008-06-27 | 2008-12-03 | 华为技术有限公司 | Method, system and device for modifying cipher of virtual private net |
CN102902901A (en) * | 2011-07-29 | 2013-01-30 | 鸿富锦精密工业(深圳)有限公司 | Computer system and encryption device and encryption method thereof |
CN104618314A (en) * | 2013-12-24 | 2015-05-13 | 腾讯科技(深圳)有限公司 | Method, device and system for password reset |
CN105320278A (en) * | 2014-07-31 | 2016-02-10 | 精工爱普生株式会社 | Information analysis device, exercise analysis system, information display system, and information display method |
CN104821941A (en) * | 2015-04-21 | 2015-08-05 | 南京邮电大学 | Smart card password authentication and password changing method |
CN109088855A (en) * | 2018-07-12 | 2018-12-25 | 新华三信息安全技术有限公司 | A kind of identity authentication method and equipment |
Also Published As
Publication number | Publication date |
---|---|
CN111182483A (en) | 2020-05-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108810029B (en) | Authentication system and optimization method between micro-service architecture services | |
US8606234B2 (en) | Methods and apparatus for provisioning devices with secrets | |
CN111512608B (en) | Trusted execution environment based authentication protocol | |
US6192474B1 (en) | Method for establishing a key using over-the-air communication and password protocol and password protocol | |
CN111600869B (en) | Verification code authentication method and system based on biological characteristics | |
US20060288407A1 (en) | Security and privacy enhancements for security devices | |
US10511438B2 (en) | Method, system and apparatus using forward-secure cryptography for passcode verification | |
AU2015298224A1 (en) | Apparatus and method for sharing a hardware security module interface in a collaborative network | |
US10291588B2 (en) | Secure registration to a service provided by a web server | |
CN101621794A (en) | Method for realizing safe authentication of wireless application service system | |
US7913096B2 (en) | Method and system for the cipher key controlled exploitation of data resources, related network and computer program products | |
TWI640189B (en) | System for verifying a user's identity of telecommunication certification and method thereof | |
CN111182483B (en) | Terminal and method and system for resetting password of call restriction supplementary service thereof | |
CN113221128A (en) | Account and password storage method and registration management system | |
CN103037366A (en) | Mobile terminal user authentication method and mobile terminal based on asymmetric cryptographic technique | |
CN112020716A (en) | Remote biometric identification | |
WO2010139170A1 (en) | Method for locking card, subscriber identity module card and mobile terminal | |
US10785193B2 (en) | Security key hopping | |
CN116233832A (en) | Verification information sending method and device | |
RU2698424C1 (en) | Authorization control method | |
WO2014166193A1 (en) | Application encryption processing method, apparatus, and terminal | |
KR20140063014A (en) | Method for substituting password of certificate by using biometrics | |
WO2015124798A2 (en) | Method & system for enabling authenticated operation of a data processing device | |
CN109257177B (en) | Key generation method, system, mobile terminal, server and storage medium | |
CN110768792A (en) | Master key generation method and device and encryption and decryption method of sensitive security parameters |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |