Unlock instant, AI-driven research and patent intelligence for your innovation.

Password reset method employed after user password forgotten

A user password and user technology, which is applied in the field of reset after user password is forgotten, can solve the problem of inability to determine whether the user is a legitimate user, etc., and achieve the effect of avoiding user identity verification errors, eliminating the review process, and saving labor service costs.

Inactive Publication Date: 2014-12-10
张忠义
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The problem is that once the user's unique ID and user password are leaked, the server cannot determine whether the user on the computer device is a real legitimate user at this time, or a fake legitimate user who has stolen the user's unique ID and user password

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Password reset method employed after user password forgotten

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The mobile phone number described in the technical solution provided by the present invention is equivalent to the user's unique identifier. In specific implementation, a one-to-one correspondence relationship can also be established with the user's unique identifier, and the mobile phone number can be known through the user's unique identifier, and the processing process related to the mobile phone number can be performed. .

[0029] The mobile phone described in the technical solution provided by the present invention is verified by inputting a server downlink verification code to distinguish the authenticity of the corresponding mobile phone number. In a specific implementation, the verification method can be other methods, including uplink verification of short messages from the mobile phone to the server, etc., or even a new technology that can be reasonably used due to the emergence of new communication technologies.

[0030] The mobile phone number list in the te...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a password reset method employed after a user password is forgotten. The password reset method employed after the user password is forgotten comprises the following steps: after a mobile phone number is adopted to replace the unique identity of a user, the authenticity of the mobile phone number can be identified through inputting a verification code issued downwards by a server, so as to determine whether the logged in computer equipment is the mobile phone; but a person adopting the mobile phone to log in is probably not the user per se; therefore, for the sake of the user account safety, inputting the user password is further required at the time of the log-in, so as to ascertain the person adopting the mobile phone to log in is the user per se. The invention aims to solve the technical problem to provide a simple password reset method; the user is enabled to entrust a trustworthy person to empty the original user in the server; then, the user is allowed to set a new password, so that the efficiency of the user password reset is improved.

Description

technical field [0001] Computer security, especially user account security. Background technique [0002] In the field of computer applications, the legal identity of the user is generally determined by verifying the user's unique ID and user password. In the traditional computer era, verifying the user's unique ID and user password can be performed on any computer device. The problem is that once the unique user ID and user password are leaked, the server cannot judge whether the user on the computer device is a real legal user or a fake legal user who has stolen the unique user ID and user password. [0003] With the development of the mobile Internet, people increasingly use mobile phone numbers to replace unique user identifiers. The advantage of this is that on the mobile phone, the authenticity of the login mobile phone number can be identified by entering the verification code downlinked by the server, and the computer equipment that the user logs in is limited to t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
Inventor 张忠义
Owner 张忠义