CN102880819B - The cipher set-up method of the outer user of system, system and password arrange center - Google Patents

The cipher set-up method of the outer user of system, system and password arrange center Download PDF

Info

Publication number
CN102880819B
CN102880819B CN201210281357.2A CN201210281357A CN102880819B CN 102880819 B CN102880819 B CN 102880819B CN 201210281357 A CN201210281357 A CN 201210281357A CN 102880819 B CN102880819 B CN 102880819B
Authority
CN
China
Prior art keywords
user
password
outer user
temporary password
request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201210281357.2A
Other languages
Chinese (zh)
Other versions
CN102880819A (en
Inventor
郭吉宏
王照远
任亚伦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING NINESTAR TECHNOLOGY JOINT-STOCK Co Ltd
Original Assignee
BEIJING NINESTAR TECHNOLOGY JOINT-STOCK Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING NINESTAR TECHNOLOGY JOINT-STOCK Co Ltd filed Critical BEIJING NINESTAR TECHNOLOGY JOINT-STOCK Co Ltd
Priority to CN201210281357.2A priority Critical patent/CN102880819B/en
Publication of CN102880819A publication Critical patent/CN102880819A/en
Application granted granted Critical
Publication of CN102880819B publication Critical patent/CN102880819B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention provides the cipher set-up method of the outer user of a kind of system, system and password and arrange center, method comprises: password that the outer user of the system that receives sends, the outer user profile of the system that carries resets request; The first system user generates the request of the temporary password that outer user profile is bound with described system; The request of the temporary password that second system user examination & verification is bound with the outer user profile of described system; Second system user suspends the operating right of the outer user of described system; The outer user of described system first login system time, system forces the outer user of described system to change temporary password; If audit successfully, the first system user generates the temporary password that outer user profile is bound with described system; Described temporary password is returned to and sends the outer user of described system that described password resets request; If the success of change temporary password, second system user recovers the operating right of the outer user of described system.

Description

The cipher set-up method of the outer user of system, system and password arrange center
Technical field
The present invention relates to field of information security technology, the cipher set-up method and the password that particularly relate to the outer user of a kind of system arrange center.
Background technology
Along with the high speed development of information network technique; network security problem has become Network Security Vulnerabilities maximum at present; the various aspects such as Web bank, payment platform, online secorities trading all relate to the individual privacy information of user, need relevant information security technology to carry out safeguard protection to transmitting these user profile in network.So password arises at the historic moment, as the widely used information Security Protection Technology of one, the authenticity of user can be ensured, thus ensure that the safety of process of exchange.
As user because forget the reason of login password, and cause user can not login system, when needing to reset it, this user needs to arrange center to password and applies for a new password, reusing for user.In the application process of this new password, user arranges center to password and sends one and be used to indicate password and arrange center again for it arranges the request of password, and with this user-dependent user profile, if password arranges the identity that this user profile is identified at center, by again for this user arranges a new password.
, but there is certain drawback in resetting for the outer user of system of this password.When the outer user of software simulation system of malice generates the request resetting password, and when generating corresponding user profile and send to password that center is set, password arranges receive centre to this request, after simple authentication, just for it generates new password.The outer user of real system now can be caused by original password cannot to be carried out the operation of correlation function, thus potential safety hazard can be brought to the management of the outer user of system, great economic loss may be brought to the outer user of system further.
Summary of the invention
The invention provides the cipher set-up method of the outer user of a kind of system, system and password and center is set, for the outer user of system provides a kind of method to set up of when password is forgotten, safer reliable password.
The invention provides the cipher set-up method of the outer user of a kind of system, it is characterized in that, comprising:
Password that the outer user of the system that receives sends, the outer user profile of the system that carries resets request;
The first system user generates the request of the temporary password that outer user profile is bound with described system;
The request of the temporary password that second system user examination & verification is bound with the outer user profile of described system;
Second system user suspends the operating right of the outer user of described system;
The outer user of described system first login system time, system forces the outer user of described system to change temporary password;
If audit successfully, the first system user generates the temporary password that outer user profile is bound with described system;
Described temporary password is returned to and sends the outer user of described system that described password resets request;
If the success of change temporary password, second system user recovers the operating right of the outer user of described system.
According to the preferred technical solution of the present invention, wherein, described method also comprises: if audit unsuccessfully, then send the failed information of examination & verification to user outside described the first system user and described system.
According to the preferred technical solution of the present invention, wherein, the temporary password that described generation and described system outer user profile bind or while change temporary password, also comprises: delete and described system original password of binding of user or temporary password outward.
According to the preferred technical solution of the present invention, wherein, described temporary password is returned to and sends while described password resets the outer user of described system of request, also comprise: user's accession number, address name, affiliated unit, operating right are returned to together with current operating temporal and sends the outer user of described system that described password resets request.
The present invention also provides a kind of password to arrange center, it is characterized in that, comprising:
First receiver module, resets request for receiving password that the outer user of a system sends, the outer user profile of the system that carries;
The first system module, for generating the request of the temporary password that outer user profile is bound with described system;
Second system module, for auditing the request of the temporary password that outer user profile is bound with described system, and for suspending the operating right of the outer user of described system;
Force change temporary password module, for the outer user of described system first login system time, system forces the outer user of described system to change temporary password;
The first system module, if for auditing successfully, generates the temporary password that outer user profile is bound with described system;
L. A. returns module, sends for being returned to by described temporary password the outer user of described system that described password resets request;
Second system module, if for the success of change temporary password, recover the operating right of the outer user of described system.
According to the preferred technical solution of the present invention, wherein, also comprising: the first sending module, if for auditing unsuccessfully, then sending the failed information of examination & verification to user outside described the first system module and described system.
According to the preferred technical solution of the present invention, wherein, also comprise: password removing module, for generating outer user profile bind with described system temporary password or while change temporary password, also comprising: delete and described system original password of binding of user or temporary password outward.
According to the preferred technical solution of the present invention, wherein, described L. A. returns module and also comprises:
Described temporary password is returned to and sends while described password resets the outer user of described system of request, also comprise: user's accession number, address name, affiliated unit, operating right are returned to together with current operating temporal and sends the outer user of described system that described password resets request.
The present invention also provides a kind of password to arrange system, comprising: the first system user, second system user and above-mentioned password arrange center.
The cipher set-up method of the outer user of system of the present invention, system and password arrange center, after resetting request by the password arranging user's transmission outside receive centre to system at password, the operation of second system user to the first system user is only had to audit successfully, just allow the temporary password that the outer user profile of the first system user generation and described system is bound and described temporary password is returned to and send the outer user of described system that described password resets request, by the first system user, second system user restricts just for it returns temporary password mutually, achieve the first system user, mutual exclusion characteristic between the operating right of second system user, the first system user is when generating the temporary password that the outer user profile with described system is bound, the temporary password of the outer user of the system that inevitably touches, in order to avert risks, the outer user of Operation system setting forced system changes the program of temporary password, namely before the outer user of system changes temporary password success, the operating right of the outer user of second system user Break-Up System, only after the success of change temporary password, the operating right of the outer user of second system user ability recovery system.The password of the outer user of system is made to arrange safer so the cipher set-up method of the outer user of system of the present invention, system and password arrange center, the economic loss of the outer user of the system that avoids.
Accompanying drawing explanation
In order to be illustrated more clearly in the embodiment of the present invention or technical scheme of the prior art, be briefly described to the accompanying drawing used required in embodiment or description of the prior art below, apparently, accompanying drawing in the following describes is some embodiments of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
Fig. 1 is the cipher set-up method embodiment process flow diagram of the outer user of present system;
Fig. 2 is that password of the present invention arranges Centric embodiment structural representation;
Fig. 3 is that password of the present invention arranges system embodiment structural representation.
Embodiment
For making the object of the embodiment of the present invention, technical scheme and advantage clearly, below in conjunction with the accompanying drawing in the embodiment of the present invention, technical scheme in the embodiment of the present invention is clearly and completely described, obviously, described embodiment is the present invention's part embodiment, instead of whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art, not making the every other embodiment obtained under creative work prerequisite, belong to the scope of protection of the invention.
Fig. 1 is the cipher set-up method embodiment process flow diagram of the outer user of present system, and as shown in Figure 1, the method for the present embodiment at least comprises the steps:
Step 100, password that the outer user of the system that receives sends, the outer user profile of the system that carries resets request;
Step 101, the first system user generates the request of the temporary password that outer user profile is bound with described system;
Step 102, the request of the temporary password that second system user examination & verification is bound with the outer user profile of described system, second system user suspends the operating right of the outer user of described system;
Step 103, the outer user of described system first login system time, system forces the outer user of described system to change temporary password;
Step 104, if audit successfully, the first system user generates the temporary password that outer user profile is bound with described system;
Step 105, returns to described temporary password and sends the outer user of described system that described password resets request; If the success of change temporary password, second system user recovers the operating right of the outer user of described system.
In an infosystem; especially higher to the requirement of security at one, the user profile (such as fund) that relates to is comparatively responsive, in the establishment of user and the stricter infosystem of the requirement of management; usually multiple user role can be comprised; such as comprise the outer user of system of common personal user, common enterprise customer, and the system user for managing the outer user of these systems.System user is the user that participating user Identity Management, rights management etc. are related to security of system activity; The outer user of system is engaged in the user of miscellaneous service operation or the service object of capital company/settlement center in capital company/settlement center.
In order to embody post check and control doctrine, system user can only perform the function such as user management, system management, can not perform concrete business operation; The outer user of system does not possess user management and system management function, can perform business operation after system user mandate.
Arrange the first system user and second system user in native system, the operating right function that each independent system user is corresponding different, each system user is shared out the work and help one another, and jointly manages all users in whole system simultaneously.
The operating right of the first system user is: generate the temporary password that outer user profile is bound with described system.
The operating right of second system user is: audit the operation of the first system user, suspends and recover the operating right of the outer user of described system.
For the outer user of system, password arranges center can arrange a password to it, this cryptographic assurance authenticity of the outer user of system.If the outer user of a certain system has forgotten password, the outer user of this system is by again having applied for, can obtaining password, to arrange center be the new password that it regenerates.But in practical application, if the process that the system outer user that is system regenerates password is rigorous not, when the request that the outer user's generating cipher of software simulation system of malice resets, and when outside the corresponding system of simulation generation, user profile sends to password to arrange center, password arranges receive centre to this request, after simply verifying, just for it generates new password, the outer user of real system now can be caused by original password cannot to be carried out the operation of correlation function, thus great economic loss may be brought to the outer user of system.
Therefore, in embodiments of the present invention, a kind of method to set up of safer reliable password is proposed.Particularly, system realizes the mutual exclusion characteristic between the operating right of the first system user, second system user, namely has " the first system user generating the temporary password that outer user profile is bound with described system " and must not have " operating right suspending and recover the outer user of described system " and " examination & verification authority "; Have " the second system user suspending and recover the operating right of the outer user of described system, examination & verification authority " must not have " generating the temporary password that outer user profile is bound with described system ".
The outer user of arbitrary system has forgotten password, when needing again to apply for a new password, arranges center send a password carrying its user profile and reset request to password.After password arranges receive centre to this request, learn that the password of the outer user of this system needs to reset, so, in order to more guarantee accuracy and the reliability of this request, password arranges center now not immediately for it generates new password, but by the first system user, second system user restricts just for it generates new password mutually, particularly, the first system user generates the request of the temporary password that outer user profile is bound with described system, the request of the temporary password that second system user examination & verification is bound with the outer user profile of described system, the operation of second system user to the first system user is only had to audit successfully, just allow the temporary password that the outer user profile of the first system user generation and described system is bound and described temporary password is returned to and send the outer user of described system that described password resets request, by the first system user, second system user restricts just for it returns temporary password mutually, achieve the first system user, mutual exclusion characteristic between the operating right of second system user, the first system user is when generating the temporary password that the outer user profile with described system is bound, the temporary password of the outer user of the system that inevitably touches, in order to avert risks, the outer user of Operation system setting forced system changes the program of temporary password, namely before the outer user of system changes temporary password success, the operating right of the outer user of second system user Break-Up System, only after the success of change temporary password, the operating right of the outer user of second system user ability recovery system.So the cipher set-up method of the outer user of system of the present invention makes the password of the outer user of system arrange safer, the economic loss of the outer user of the system that avoids.
The operation of second system user to the first system user and the outer user of system is audited, and by mutual inquiry or other mode, can be confirmed whether that the outer user of existence one system needs to reset password.If it is true to confirm this situation, then the operation of second system user to the first system user is audited successfully.
The first system user generates the temporary password generation method that the temporary password bound with user profile outside described system can be prior art.
Particularly, the temporary password that described generation and described system outer user profile bind or while change temporary password, also comprises: delete and described system original password of binding of user or temporary password outward.
Password arranges center after generate a new password for the outer user of system, operate to enable outer this new password of user's accurate application of this system, also need the original password corresponding with the outer user of this system stored before in its database or temporary password to delete, thus make the new password for the outer user of system preserved in its database.
Particularly, described method also comprises: if audit unsuccessfully, then send the failed information of examination & verification to user outside described the first system user and described system.
If the operation of second system user to the first system user is audited unsuccessfully, password arranges center then can send authentication failed information to the first system user and the outer user of system, to inform that this time checking is unsuccessful, it is all a untrue reliable request by thinking that the password this time received resets request that password arranges center, temporary password can not be performed to return to and to send the outer user of system that password resets request, thus can not perform as it generates the operation of new password.
Particularly, described temporary password is returned to and sends while described password resets the outer user of described system of request, also comprise: user's accession number, address name, affiliated unit, operating right are returned to together with current operating temporal and sends the outer user of described system that described password resets request.
The cipher set-up method of the outer user of system of the present embodiment, after resetting request by the password arranging user outside receive centre to system at password, password arranges center now not immediately for it generates new password, but by the first system user, second system user restricts just for it generates new password mutually, particularly, the first system user generates the temporary password that outer user profile is bound with described system, the temporary password that second system user examination & verification is bound with the outer user profile of described system, the operation of second system user to the first system user is only had to audit successfully, just allow the temporary password that the outer user profile of the first system user generation and described system is bound and described temporary password is returned to and send the outer user of described system that described password resets request, by the first system user, second system user restricts just for it returns temporary password mutually, achieve the first system user, mutual exclusion characteristic between the operating right of second system user, the first system user is when generating the temporary password that the outer user profile with described system is bound, the temporary password of the outer user of the system that inevitably touches, in order to avert risks, the outer user of Operation system setting forced system changes the program of temporary password, namely before the outer user of system changes temporary password success, the operating right of the outer user of second system user Break-Up System, only after the success of change temporary password, the operating right of the outer user of second system user ability recovery system.So the cipher set-up method of the outer user of system of the present invention makes the password of the outer user of system arrange safer, the economic loss of the outer user of the system that avoids.
One of ordinary skill in the art will appreciate that: all or part of step realizing said method embodiment can have been come by the hardware that programmed instruction is relevant, aforesaid program can be stored in a computer read/write memory medium, this program, when performing, performs the step comprising said method embodiment; And aforesaid storage medium comprises: ROM, RAM, magnetic disc or CD etc. various can be program code stored medium.
Fig. 2 is that password of the present invention arranges Centric embodiment structural representation, as shown in Figure 2, the password of the present embodiment arranges center and comprises: the first receiver module 200, the first system module 201, second system module 202, L. A. return module 203 and force change temporary password module 204.Wherein, the first receiver module 200 resets request for receiving password that the outer user of a system sends, the outer user profile of the system that carries; The first system module 201 is for generating the request of the temporary password that outer user profile bind with described system and generating and the described system temporary password bound of user profile outward; Second system module 202 for auditing the request of the temporary password that outer user profile is bound with described system, and for suspending the operating right of the outer user of described system, if the success of change temporary password, recovers the operating right of the outer user of described system; If L. A. returning module 203 for auditing successfully, described temporary password being returned to and sends the outer user of described system that described password resets request; Force change temporary password module 204 for the outer user of described system first login system time, system forces the outer user of described system to change temporary password.
Particularly, the specific works process involved by above-mentioned all modules in the present embodiment, the related content that can disclose with reference to the related embodiment involved by the cipher set-up method of the outer user of said system, does not repeat them here.
The password of the present embodiment arranges center, by the first receiver module 200 after the password that the outer user of the system that receives sends resets request, password arranges center now not immediately for it generates new password, but by the first system module 201, second system module 202 restricts mutually just for it generates new password, particularly, the first system module 201 generates the temporary password that outer user profile is bound with described system, second system module 202 audits the temporary password that outer user profile is bound with described system, the operation of second system module 202 pairs of the first system modules 201 is only had to audit successfully, just allow the temporary password that the outer user profile of the first system user generation and described system is bound and described temporary password is returned to and send the outer user of described system that described password resets request, by the first system module 201, second system module 202 restricts mutually just for it returns temporary password, achieve the first system module 201, mutual exclusion characteristic between the operating right of second system module 202, the first system module 201 is when generating the temporary password that the outer user profile with described system is bound, the temporary password of the outer user of the system that inevitably touches, in order to avert risks, password arranges center and is provided with pressure change temporary password module 204, namely before the outer user of system changes temporary password success, the operating right of the outer user of second system module 202 Break-Up System, only after the success of change temporary password, the operating right of the outer user of second system module 202 ability recovery system.The password of the outer user of system is made to arrange safer so password of the present invention arranges center, the economic loss of the outer user of the system that avoids.
Further, on the basis of technique scheme, the password of the present embodiment arranges center and can also comprise the first sending module 206 and password removing module 205.If wherein the first sending module 206 is for auditing unsuccessfully, then send the failed information of examination & verification to user outside described the first system module 201 and described system; Password removing module 205 is for generating outer user profile bind with described system temporary password or while change temporary password, also comprising: delete and original password that outside described system, user binds or temporary password.
Further, the L. A. that the present embodiment password arranges center returns module 203 and can also comprise further: returned to by described temporary password and send while described password resets the outer user of described system of request, also comprise: user's accession number, address name, affiliated unit, operating right are returned to together with current operating temporal and send the outer user of described system that described password resets request.
Particularly, the specific works process involved by above-mentioned all modules, the related content that can disclose with reference to the related embodiment involved by the cipher set-up method of the outer user of said system equally, does not repeat them here.
Fig. 3 is that password of the present invention arranges system embodiment structural representation, as shown in Figure 3, the password of the present embodiment arranges system and comprises: the first system user 302, second system user 303, and the password be connected with the first system user 302, second system user 303 arranges center 301.Particularly, password in the present embodiment arranges all functions module included in system, and the specific works process involved by these functional modules, the related content of the related embodiment disclosure involved by center can be set with reference to the cipher set-up method of the outer user of said system and password, not repeat them here.
The password of the outer user of system of the present embodiment arranges system, after resetting request by the password arranging user outside receive centre to system at password, password arranges center now not immediately for it generates new password, but by the first system user, second system user restricts just for it generates new password mutually, particularly, the first system user generates the temporary password that outer user profile is bound with described system, the temporary password that second system user examination & verification is bound with the outer user profile of described system, the operation of second system user to the first system user is only had to audit successfully, just described temporary password is returned to and send the outer user of described system that described password resets request, by the first system user, second system user restricts just for it returns temporary password mutually, achieve the first system user, mutual exclusion characteristic between the operating right of second system user, the first system user is when generating the temporary password that the outer user profile with described system is bound, the temporary password of the outer user of the system that inevitably touches, in order to avert risks, the outer user of Operation system setting forced system changes the program of temporary password, namely before the outer user of system changes temporary password success, the operating right of the outer user of second system user Break-Up System, only after the success of change temporary password, the operating right of the outer user of second system user ability recovery system.So the cipher set-up method of the outer user of system of the present invention makes the password of the outer user of system arrange safer, the economic loss of the outer user of the system that avoids.
Last it is noted that above embodiment is only in order to illustrate technical scheme of the present invention, be not intended to limit; Although with reference to previous embodiment to invention has been detailed description, those of ordinary skill in the art is to be understood that: it still can be modified to the technical scheme described in foregoing embodiments, or carries out equivalent replacement to wherein portion of techniques feature; And these amendments or replacement, do not make the essence of appropriate technical solution depart from the spirit and scope of various embodiments of the present invention technical scheme.

Claims (5)

1. the outer user's of a system cipher set-up method, is characterized in that, comprising:
Password that the outer user of the system that receives sends, the outer user profile of the system that carries resets request;
The first system user generates the request of the temporary password that outer user profile is bound with described system;
The request of the temporary password that second system user examination & verification is bound with the outer user profile of described system;
Second system user suspends the operating right of the outer user of described system;
The outer user of described system first login system time, system forces the outer user of described system to change temporary password;
If audit successfully, the first system user generates the temporary password that outer user profile is bound with described system;
Described temporary password is returned to and sends the outer user of described system that described password resets request;
If the success of change temporary password, second system user recovers the operating right of the outer user of described system; Described method also comprises: if audit unsuccessfully, then send the failed information of examination & verification to user outside described the first system user and described system; The temporary password that described generation and described system outer user profile bind or while change temporary password, also comprises: delete and described system original password of binding of user or temporary password outward.
2. the cipher set-up method of the outer user of system according to claim 1, is characterized in that, is returned to by described temporary password and sends while described password resets the outer user of described system of request, also comprise:
Operating right is returned to together with current operating temporal and sends the outer user of described system that described password resets request.
3. password arranges a center, it is characterized in that, comprising:
First receiver module, resets request for receiving password that the outer user of a system sends, the outer user profile of the system that carries;
The first system module, for generating the request of the temporary password that outer user profile is bound with described system;
Second system module, for auditing the request of the temporary password that outer user profile is bound with described system, and for suspending the operating right of the outer user of described system;
Force change temporary password module, for the outer user of described system first login system time, system forces the outer user of described system to change temporary password;
The first system module, if for auditing successfully, generates the temporary password that outer user profile is bound with described system;
L. A. returns module, sends for being returned to by described temporary password the outer user of described system that described password resets request;
Second system module, if for the success of change temporary password, recover the operating right of the outer user of described system; Described password arranges center and also comprises: the first sending module, if for auditing unsuccessfully, then sends the failed information of examination & verification to user outside described the first system module and described system; Password removing module, for generating outer user profile is bound with described system temporary password or while changing temporary password, also comprising:
Delete outer user binds with described system original password or temporary password.
4. password according to claim 3 arranges center, it is characterized in that,
Described L. A. returns module and also comprises:
Described temporary password is returned to and sends while described password resets the outer user of described system of request, also comprise:
Operating right is returned to together with current operating temporal and sends the outer user of described system that described password resets request.
5. password arranges a system, it is characterized in that, comprising: the first system user, second system user and as arbitrary in claim 3 ~ 4 as described in password center is set.
CN201210281357.2A 2012-08-08 2012-08-08 The cipher set-up method of the outer user of system, system and password arrange center Active CN102880819B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210281357.2A CN102880819B (en) 2012-08-08 2012-08-08 The cipher set-up method of the outer user of system, system and password arrange center

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210281357.2A CN102880819B (en) 2012-08-08 2012-08-08 The cipher set-up method of the outer user of system, system and password arrange center

Publications (2)

Publication Number Publication Date
CN102880819A CN102880819A (en) 2013-01-16
CN102880819B true CN102880819B (en) 2015-12-02

Family

ID=47482141

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210281357.2A Active CN102880819B (en) 2012-08-08 2012-08-08 The cipher set-up method of the outer user of system, system and password arrange center

Country Status (1)

Country Link
CN (1) CN102880819B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104883255A (en) * 2015-06-24 2015-09-02 郑州悉知信息技术有限公司 Password resetting method and device
CN104954383A (en) * 2015-06-24 2015-09-30 深圳市兰丁科技有限公司 Application program login method and system
CN107092843B (en) * 2017-04-18 2020-10-27 惠州Tcl移动通信有限公司 Screen unlocking method and system for preventing personal privacy of user from being revealed

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1946102A (en) * 2006-10-18 2007-04-11 华为技术有限公司 Method and device for forcibly revising cipher code
CN101047503A (en) * 2006-03-30 2007-10-03 腾讯科技(深圳)有限公司 Method and system for fetching cipher
EP2061179A1 (en) * 2006-08-24 2009-05-20 Huawei Technologies Co Ltd Method, system and password management server for managing user password of network device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101047503A (en) * 2006-03-30 2007-10-03 腾讯科技(深圳)有限公司 Method and system for fetching cipher
EP2061179A1 (en) * 2006-08-24 2009-05-20 Huawei Technologies Co Ltd Method, system and password management server for managing user password of network device
CN1946102A (en) * 2006-10-18 2007-04-11 华为技术有限公司 Method and device for forcibly revising cipher code

Also Published As

Publication number Publication date
CN102880819A (en) 2013-01-16

Similar Documents

Publication Publication Date Title
CN111383021B (en) Node management method, device, equipment and medium based on block chain network
CN107204957B (en) Account binding and service processing method and device
CN101741848B (en) Method and system for binding digital certificate of system users and digital certificate authentication center
CN104869175A (en) Cross-platform account resource sharing implementation method, device and system
CN104144419A (en) Identity authentication method, device and system
CN101351027A (en) Method and system for processing service authentication
CN104169952A (en) Network payment method, device and system
CN110087241B (en) Service authorization method, device and system
CN111222841B (en) Block chain-based data distribution method and equipment and storage medium thereof
CN104537562A (en) Financial self-service system processing method
CN103179176B (en) The call method that web applies under cloud/cluster environment, device and system
CN104883293A (en) Message interaction method, relevant apparatus and communication system
CN103973711A (en) Verification method and device
CN106296177A (en) Data processing method based on bank's Mobile solution and equipment
CN103905194A (en) Identity traceability authentication method and system
CN104580112A (en) Service authentication method and system, and server
CN103177388A (en) Stand-in authorization system and method
CN105099983A (en) Authorization method, authority setting method and devices
CN105704092A (en) User identity authentication method, device and system
KR101795450B1 (en) Verification mehod and appratus based on security tunnel
CN102880819B (en) The cipher set-up method of the outer user of system, system and password arrange center
CN107483477B (en) Account management method and account management system
CN105847292A (en) NFC-HCE cloud authentication method , device and system
CN104935548A (en) Identity verification method, device and system based on intelligent tattooing equipment
CN109213612B (en) Invoice issuing method and system based on webservice interface

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C56 Change in the name or address of the patentee
CP02 Change in the address of a patent holder

Address after: 100086, No. 11, building 2, building No. 43, West Third Ring Road, Haidian District, Beijing

Patentee after: Beijing NineStar Technology Joint-Stock Co., Ltd.

Address before: 100082, A, 0915, 12A15, Shougang International Building, No. 60, North Main Street, Haidian District, Beijing, Xizhimen

Patentee before: Beijing NineStar Technology Joint-Stock Co., Ltd.