Password resetting method and device

A password and key pair technology, applied in the field of communication, can solve problems such as useless information and client reception, and achieve the effect of reducing the risk of being exposed

Inactive Publication Date: 2015-09-02
ZHENGZHOU XIZHI INFORMATION TECH
View PDF7 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, during the password reset process, there may be multiple interactions between the client and the server before the password can be reset. If the client's information is stolen and illegally used during the interaction, it may appear that the server simulates the The client sends messages maliciously, resulting in the client receiving a large amount of useless information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Password resetting method and device
  • Password resetting method and device
  • Password resetting method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059] The embodiment of the present application provides a password reset method and device, so as to reduce the information bombing of the client due to the exposure of the client's information during the password reset process, and also reduce the data resources of the server during the password reset process waste.

[0060]The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application. Obviously, the described embodiments are only a part of the embodiments of the present application, but not all of the embodiments. Based on the embodiments in the present application, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present application.

[0061] First, a method for resetting a password according to an embodiment of the present application is introduced.

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a password resetting method and device. The method comprises the steps of: generating a randomized number corresponding to a client end when receiving a password resetting demand sent by the client end; utilizing a preset secret key to carry out encryption on the randomized number, and obtaining first encryption verification data; sending the first encryption verification data to the client end for decryption; receiving second encryption verification data sent by the client end; when determining that the second encryption verification data is the data obtained in the encryption process of the randomized number, determining the second encryption verification data to be a reset password of the client end, and sending the password reset for the client end to the client end; and setting the randomized number to be unavailable. By adopting the method and the device, the cases that messages are sent to the client end maliciously in the password resetting process can be reduced.

Description

technical field [0001] The present application relates to the technical field of communication, and more specifically relates to a password reset method and device. Background technique [0002] In order to ensure the security of information resources, when users log in to the server through the client, they need to enter the user name and password, and the server allows the client to obtain the corresponding resources only after the user name and password are verified by the server. For example, the user enters the user name and password in the login interface of the instant messaging client, and only after the instant messaging server is authenticated, the user can establish a connection with the server through the client, and then realize sending and receiving instant messages. [0003] When the user forgets the login password for logging in to the server, or wishes to change the login password, the user can also reset the password through password reset. The user sends ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/32
Inventor 褚思凡常晓阳刘涛孟伟王路
Owner ZHENGZHOU XIZHI INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products