Method and system for fetching cipher
A password and consistent technology, applied in the Internet field, can solve problems such as unrealizable, difficult to complete identity authentication methods, and inability to authenticate, and achieve the effect of improving accuracy
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0039] The core idea of the present invention is: when the applicant applies for retrieving the password for the account, the contact person of the account will authenticate the applicant to determine whether the applicant is the owner of the account; Conclusion Determines whether to proceed with the password retrieval process for the applicant.
[0040] In order to make the purpose, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.
[0041] The accounts applied in the present invention may be various types of accounts, and for different types of accounts, the contacts have different forms. For example, for an instant messaging account, the contacts are other users in the friend list; for an email account, the contacts are other email addresses in the address book. In the following embodiments, the technical solution provi...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 