CN107592289B - Password setting method and device - Google Patents

Password setting method and device Download PDF

Info

Publication number
CN107592289B
CN107592289B CN201610540966.3A CN201610540966A CN107592289B CN 107592289 B CN107592289 B CN 107592289B CN 201610540966 A CN201610540966 A CN 201610540966A CN 107592289 B CN107592289 B CN 107592289B
Authority
CN
China
Prior art keywords
user identifier
preset
user
trusted
trusted friend
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610540966.3A
Other languages
Chinese (zh)
Other versions
CN107592289A (en
Inventor
李素宁
梁焯佳
唐永彬
岑丽芳
颜俊鸿
孙骁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201610540966.3A priority Critical patent/CN107592289B/en
Publication of CN107592289A publication Critical patent/CN107592289A/en
Application granted granted Critical
Publication of CN107592289B publication Critical patent/CN107592289B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Information Transfer Between Computers (AREA)

Abstract

The invention discloses a password setting method and device, and belongs to the technical field of networks. The method comprises the following steps: when a password resetting request for a first user identifier is received, at least one trusted friend user identifier preset by the first user identifier is obtained; determining a trusted friend user identifier which is subjected to a preset auxiliary verification operation in the at least one trusted friend user identifier, wherein the preset auxiliary verification operation is used for assisting in verifying the identity of the first user identifier; and when the number of the trusted friend user identifications executing the preset auxiliary verification operation is determined to reach the preset number, providing a password setting page of the first user identification, wherein the password setting page is used for setting the password of the first user identification. According to the invention, the mobile phone number is not bound, but at least one trusted friend identifier is preset, so that the flexibility of a password resetting scene is improved, the problem that the password cannot be reset when the bound mobile phone number is cancelled is solved, and the safety is improved.

Description

Password setting method and device
Technical Field
The present invention relates to the field of network technologies, and in particular, to a password setting method and apparatus.
Background
With the increasing sophistication of the functions of internet applications, the user size is gradually expanding. In order to manage a large user group, the internet application usually requires a user to register a user identifier and a password, and only by inputting the registered user identifier and password, the user can log in the internet application and use the functions provided by the internet application.
In order to prevent forgetting the password, the user can bind the user identifier with the mobile phone number in advance in a state of logging in the internet application based on the user identifier and the password, when the user forgets the password, a password resetting request for the user identifier can be triggered in the internet application, when the internet application server receives the password resetting request, a short message containing an authentication code is sent to the mobile phone number bound with the user identifier, after the user checks the authentication code in the short message on the mobile phone, the authentication code can be input in the internet application, when the internet application server determines that the authentication code input by the user is matched with the issued authentication code, a password setting page of the user identifier is provided for the user, and the user can reset the password of the user identifier on the password equipment page.
In the process of implementing the invention, the inventor finds that the prior art has at least the following problems: when the mobile phone number bound by the user identification is cancelled, the password cannot be reset by adopting the mode.
Disclosure of Invention
In order to solve the problems in the prior art, embodiments of the present invention provide a password setting method and apparatus. The technical scheme is as follows:
in a first aspect, a password setting method is provided, where the method includes:
when a password resetting request for a first user identifier is received through an internet application, at least one trusted friend user identifier preset by the first user identifier is obtained, and the password resetting request is used for requesting to reset the password of the first user identifier in a state that the internet application is not logged in;
determining a trusted friend user identifier which is subjected to a preset auxiliary verification operation in the at least one trusted friend user identifier, wherein the preset auxiliary verification operation is used for assisting in verifying the identity of the first user identifier;
and when the number of the trusted friend user identifications executing the preset auxiliary verification operation is determined to reach a preset number, providing a password setting page of the first user identification, wherein the password setting page is used for setting the password of the first user identification.
In a second aspect, a password setting method is provided, and the method includes:
displaying an auxiliary verification message received by a second user identifier based on the state that the second user identifier logs in the internet application, wherein the auxiliary verification message carries a first user identifier requesting to reset a password, and the second user identifier is a trusted friend user identifier preset by the first user identifier;
when a confirmation operation on the auxiliary verification message is detected, sending a confirmation auxiliary verification message to the first user identification.
In a third aspect, there is provided a password setting apparatus, the apparatus including:
the trusted identity acquisition module is used for acquiring at least one trusted friend user identity preset by a first user identity when a password resetting request for the first user identity is received through an Internet application, wherein the password resetting request is used for requesting to reset the password of the first user identity in a state that the Internet application is not logged in;
the determining module is used for determining the trusted friend user identifier which is subjected to preset auxiliary verification operation in the at least one trusted friend user identifier, wherein the preset auxiliary verification operation is used for assisting in verifying the identity of the first user identifier;
and the page providing module is used for providing a password setting page of the first user identifier when the number of the trusted friend user identifiers which execute the preset auxiliary verification operation reaches a preset number, and the password setting page is used for setting the password of the first user identifier.
In a fourth aspect, there is provided a password setting apparatus, the apparatus comprising:
the display module is used for displaying an auxiliary verification message received by a second user identifier based on the state that the second user identifier logs in the internet application, wherein the auxiliary verification message carries a first user identifier requesting to reset a password, and the second user identifier is a trusted friend user identifier preset by the first user identifier;
a sending module, configured to send a confirmation auxiliary verification message to the first subscriber identity when a confirmation operation on the auxiliary verification message is detected.
The technical scheme provided by the embodiment of the invention has the following beneficial effects:
according to the method and the device provided by the embodiment of the invention, when a password resetting request for a first user identifier is received through Internet application, at least one trusted friend user identifier preset by the first user identifier is obtained, the trusted friend user identifier which is subjected to the preset auxiliary verification operation in the at least one trusted friend user identifier is determined, and when the number of the trusted friend user identifiers subjected to the preset auxiliary verification operation is determined to reach the preset number, a password setting page of the first user identifier is provided, and the password is reset. The invention provides a method for resetting a password, which does not need to bind a mobile phone number, but presets at least one trusted friend identifier, when a user forgets the password, the identity of a first user can be confirmed by the at least one trusted friend user identifier through executing a preset auxiliary verification operation, so that the password is reset, the flexibility of a password resetting scene is improved, the problem that the password cannot be reset when the bound mobile phone number is cancelled is solved, the verification is assisted by a preset number of trusted friends, and the safety is improved.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
FIG. 1 is a schematic illustration of an implementation environment provided by an embodiment of the invention;
fig. 2 is a flowchart of a password setting method according to an embodiment of the present invention;
fig. 3 is a flowchart of a password setting method according to an embodiment of the present invention;
fig. 4 is a flowchart of a password setting method according to an embodiment of the present invention;
fig. 5A is a schematic diagram of a trusted buddy entry according to an embodiment of the present invention;
fig. 5B is a schematic diagram of a trusted friend setting page according to an embodiment of the present invention;
fig. 5C is a schematic diagram of another trusted buddy setting page according to an embodiment of the present invention;
FIG. 5D is a diagram illustrating a user relationship chain according to an embodiment of the invention;
FIG. 5E is a schematic diagram of a verification indication page provided by an embodiment of the invention;
FIG. 5F is a diagram of a guidance page according to an embodiment of the present invention;
FIG. 5G is a schematic diagram of a service page provided by an embodiment of the invention;
FIG. 5H is a schematic diagram of a details page provided by an embodiment of the invention;
FIG. 5I is a schematic diagram of a submit page provided by an embodiment of the present invention;
FIG. 6 is a flow chart of another password setting method provided by the embodiment of the invention;
FIG. 7 is a flowchart of a further password setting method according to an embodiment of the present invention;
fig. 8 is a schematic structural diagram of a password setting apparatus according to an embodiment of the present invention;
fig. 9 is a schematic structural diagram of a password setting apparatus according to an embodiment of the present invention;
fig. 10 is a schematic structural diagram of a terminal according to an embodiment of the present invention;
fig. 11 is a schematic structural diagram of a server according to an embodiment of the present invention;
fig. 12 is a schematic structural diagram of an interactive system according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Fig. 1 is a schematic diagram of an implementation environment provided by an embodiment of the present invention, where the implementation environment includes: the internet application server is used for providing services for internet applications, and may be one server, a server cluster composed of a plurality of servers, or a cloud computing service center. The plurality of terminals are all provided with the internet application and are connected with the internet application server through the internet application.
The plurality of terminals can log in the internet application based on corresponding user identifications, wherein the user identifications refer to user nicknames, user accounts, telephone numbers and the like, and the embodiment of the invention does not limit the user nicknames, the user accounts, the telephone numbers and the like. Taking the first terminal as an example, the first terminal may log in the internet application based on the first user identifier, and the user identifiers logged in by the other terminals are located in the user relationship chain of the first terminal and are friend user identifiers of the first user identifier.
The first terminal can set at least one trusted friend user identifier from a plurality of friend user identifiers in a login state based on the first user identifier, and then, in a state that the first terminal does not log in the internet application, when a first user forgets a password of the first user identifier and wants to reset the password, a password resetting request for the first user identifier can be triggered, the trusted friend user identifier is invited to execute a preset auxiliary verification operation to help verify the identity of the first user, and when the preset auxiliary verification operation is executed by more than the preset number of trusted friend user identifiers, the identity verification of the first user passes, and the first user can be allowed to reset the password for the first user identifier.
The first user refers to a current user of the first terminal, and when the first user is actually applied, the first user may be an original user of the first user identifier, or may be another malicious user who obtains the first terminal after the first terminal is lost.
Fig. 2 is a flowchart of a password setting method according to an embodiment of the present invention. The execution subject of the embodiment of the present invention is the first terminal or the internet application server, referring to fig. 2, the method includes:
201. when a password resetting request for a first user identification is received through internet application, at least one trusted friend user identification preset by the first user identification is obtained.
The internet application server is a server providing services for the internet application, and may be a social application server, a payment application server, a shopping application server, and the like, which are not limited in the embodiments of the present invention.
The password resetting request is used for requesting to reset the password of the first user identification in a state of not logging in the internet application, and can be triggered by the first user on the first terminal.
The first terminal is a terminal which inputs the first user identification on a login page of the internet application at present, and the first user is the current user of the first terminal. The first user identifier may be input by the first user on a login page of the first terminal at present, or when the first terminal has logged in the internet application based on the first user identifier, the first user identifier may also be input by the first terminal by default according to a historical login record, which is not limited in the embodiment of the present invention.
When the first user clicks the key on the first terminal, the first terminal receives a password resetting request for the first user identifier through the internet application.
In the embodiment of the present invention, in a state where the first user identifier logs in the internet application, at least one trusted friend user identifier has been set in advance, which indicates that the trusted friend user identifiers are friends trusted by the first user, and then, when the first user wants to reset a password of the first user identifier, the identity of the first user may be verified by the at least one trusted friend user identifier.
The execution subject of the embodiment of the present invention may be the first terminal or the internet application server, and based on the difference of the execution subject, step 201 may include any one of the following:
1. the first terminal stores at least one trusted friend user identifier preset by the first user identifier, and acquires the at least one trusted friend user identifier when receiving a password resetting request of the first user identifier through Internet application.
2. The internet application server stores at least one trusted friend user identifier preset by the first user identifier, when the first terminal receives a password resetting request for the first user identifier through internet application, the password resetting request is sent to the internet application server, and when the password resetting request is received by the internet application server, the at least one trusted friend user identifier is obtained.
When a terminal logs in the internet application based on the first user identifier and sets at least one trusted friend user identifier, the set trusted friend user identifier can be sent to the internet application server and stored by the internet application server. In the subsequent process, the terminal with the trusted friend user identifier or any other terminal can be used as the first terminal, a password resetting request for the first user identifier is triggered, and the internet application server acquires the stored at least one trusted friend user identifier.
202. And determining the trusted friend user identification which is subjected to the preset auxiliary verification operation in the at least one trusted friend user identification.
The preset auxiliary verification operation is used to assist in verifying the identity of the first user identifier, and is executed by the at least one trusted friend user identifier, which may be an operation of confirming an auxiliary verification message or some preset operation, which is not limited in the embodiments of the present invention. And when a certain trusted friend user identifier executes the preset auxiliary verification operation, the trusted friend user identifier is used for confirming that the first user is the original user of the first user identifier.
203. And when the number of the trusted friend user identifications executing the preset auxiliary verification operation is determined to reach the preset number, providing a password setting page of the first user identification, wherein the password setting page is used for setting the password of the first user identification.
When it is determined that the number of the trusted friend user identifiers which have performed the preset auxiliary verification operation reaches the preset number, and the identity verification of the first user passes, the password setting page of the first user identifier may be provided to the first user, and the password of the first user identifier is reset by the first user.
The execution subject of the embodiment of the present invention may be the first terminal or the internet application server, and based on the difference of the execution subject, step 203 may include any one of the following:
1. the first terminal counts the number of the trusted friend user identifications executing the preset auxiliary verification operation, and when the number is determined to reach the preset number, a password setting page of the first user identification is displayed; or,
2. the internet application server counts the number of the trusted friend user identifications executing the preset auxiliary verification operation, and when the number is determined to reach the preset number, the internet application server sends a password setting page of the first user identification to the first terminal, and the password setting page is displayed by the first terminal. Or, the internet application server provides an entrance of the password setting page for the first terminal, and when the first user clicks the entrance, the first terminal displays the password setting page.
According to the method provided by the embodiment of the invention, when a password resetting request for a first user identifier is received through Internet application, at least one trusted friend user identifier preset by the first user identifier is obtained, the trusted friend user identifier which is subjected to preset auxiliary verification operation in the at least one trusted friend user identifier is determined, and when the number of the trusted friend user identifiers subjected to the preset auxiliary verification operation is determined to reach the preset number, a password setting page of the first user identifier is provided, and the password is reset. The invention provides a method for resetting a password, which does not need to bind a mobile phone number, but presets at least one trusted friend identifier, when a user forgets the password, the identity of a first user can be confirmed by the at least one trusted friend user identifier through executing a preset auxiliary verification operation, so that the password is reset, the flexibility of a password resetting scene is improved, the problem that the password cannot be reset when the bound mobile phone number is cancelled is solved, the verification is assisted by a preset number of trusted friends, and the safety is improved.
Optionally, the preset auxiliary verification operation is a confirmation operation on the auxiliary verification message; the determining that the trusted friend user identifier of the at least one trusted friend user identifier has executed the preset auxiliary verification operation includes:
sending an auxiliary verification message to the at least one trusted friend user identifier, wherein the auxiliary verification message carries the first user identifier;
and when receiving a confirmation auxiliary verification message sent by any trusted friend user identifier, determining that the trusted friend user identifier sending the confirmation auxiliary verification message executes the preset auxiliary verification operation.
Optionally, the preset auxiliary verification operation is an operation of sending a preset message to the first user identifier; the determining that the trusted friend user identifier of the at least one trusted friend user identifier has executed the preset auxiliary verification operation includes:
providing operation prompt information in a prompt information display area, wherein the operation prompt information is used for prompting a trusted friend user identifier to send the preset message to the first user identifier;
and when detecting that any trusted friend user identifier sends the preset message to the first user identifier, determining that the trusted friend user identifier executes the preset auxiliary verification operation.
Optionally, the preset auxiliary verification operation is an operation of sending a preset message to a specified public identity; the determining that the trusted friend user identifier of the at least one trusted friend user identifier has executed the preset auxiliary verification operation includes:
providing operation prompt information in a prompt information display area, wherein the operation prompt information is used for prompting the trusted friend user identifier to send the preset message to the specified public identifier;
and when detecting that any trusted friend user identifier sends the preset message to the appointed public identifier, determining that the trusted friend user identifier executes the preset auxiliary verification operation.
Optionally, the method further comprises:
providing a trusted friend setting page when receiving a trusted friend setting request in a state of logging in the internet application based on the first user identifier;
when the operation of adding a trusted friend is detected in the trusted friend setting page, providing a user relation chain of the first user identification, wherein the user relation chain comprises at least one friend user identification;
and adding the friend user identification selected from the user relationship chain to a trusted user relationship chain of the first user identification, wherein the trusted user relationship chain comprises the trusted friend user identification of the first user identification.
Optionally, the adding the friend user identifier selected from the user relationship chain to the trusted user relationship chain of the first user identifier includes:
acquiring a friend user identifier selected from the user relationship chain;
generating backlogs, wherein the backlogs comprise the first user identification and the selected friend user identification;
and after the preset effective time length of the backlog is generated, adding the selected friend user identifier to the trusted user relationship chain of the first user identifier according to the backlog.
Optionally, the method further comprises:
and providing the trusted friend user identification which executes the preset auxiliary verification operation in the verification progress display area.
All the above-mentioned optional technical solutions can be combined arbitrarily to form the optional embodiments of the present invention, and are not described herein again.
Fig. 3 is a flowchart of a password setting method according to an embodiment of the present invention. The execution subject of the embodiment of the present invention is the second terminal, and referring to fig. 3, the method includes:
301. and displaying an auxiliary verification message received by a second user identifier based on the state that the second user identifier logs in the internet application, wherein the auxiliary verification message carries a first user identifier requesting to reset the password, and the second user identifier is a trusted friend user identifier preset by the first user identifier.
302. When a confirmation operation on the auxiliary verification message is detected, a confirmation auxiliary verification message is sent to the first user identification.
In the embodiment of the present invention, the first terminal may initiate a password resetting request for the first user identifier, where the password resetting request is used to request that the password of the first user identifier is reset in a state where the internet application is not logged in, and at this time, an auxiliary verification message may be sent to at least one friend user identifier for which the first user identifier has been preset, and the at least one friend user identifier assists in verifying the identity of the first user.
And the second user identifier is one of the trusted friend user identifiers preset by the first user identifier, and the second terminal receives the auxiliary verification message and displays the auxiliary verification message in a state of logging in the internet application based on the second user identifier. At this time, the second user may contact the first user, verify the identity of the first user, trigger a confirmation operation on the auxiliary authentication message when confirming that the first user is the original user of the first user identifier, and send a confirmation auxiliary authentication message to the first user identifier when the second terminal detects the confirmation operation, so as to indicate that the second user confirms the identity of the first user.
In the method provided by the embodiment of the invention, the second user identifier is set as the trusted friend user identifier in advance through the first user identifier, and when the first user identifier initiates a password resetting request, the second user identifier confirms the received auxiliary verification message and returns the confirmed auxiliary verification message. The invention provides a method for resetting a password, which does not need to bind a mobile phone number, but can confirm the identity of a first user by confirming an auxiliary verification message by at least one trusted friend user identifier through presetting at least one trusted friend identifier when the user forgets the password, thereby resetting the password, improving the flexibility of a password resetting scene, avoiding the problem that the password cannot be reset when the bound mobile phone number is cancelled, and improving the safety by using a preset number of trusted friends for auxiliary verification.
Optionally, the displaying the received auxiliary verification message includes:
when the activation operation of the appointed public identification is detected, displaying a service page of the appointed public identification;
in the service page, the received secondary authentication message is displayed.
Optionally, the method further comprises:
when the click operation on the auxiliary verification message is detected, displaying the first user identification and a confirmation option;
when the click operation on the confirmation option is detected, the confirmation operation on the auxiliary verification message is determined to be detected.
All the above-mentioned optional technical solutions can be combined arbitrarily to form the optional embodiments of the present invention, and are not described herein again.
Fig. 4 is a flowchart of a password setting method according to an embodiment of the present invention. The execution main bodies of the embodiment of the invention are the first terminal, the internet application server and the second terminal, the embodiment of the invention only takes the preset auxiliary verification operation as the confirmation operation of the auxiliary verification message as an example, and any trusted friend user identifier executes the confirmation operation on the received auxiliary verification message, namely, the trusted friend user identifier is considered to execute the preset auxiliary verification operation. Referring to fig. 4, the method includes:
401. when the first terminal receives a password resetting request for the first user identification through the Internet application, at least one trusted friend user identification preset by the first user identification is obtained, and the password resetting request is used for requesting to reset the password of the first user identification in a state that the first terminal does not log in the Internet application.
In the embodiment of the invention, the first terminal stores at least one trusted friend user identifier preset by the first user identifier, and when the first user forgets the password of the first user identifier and triggers a password resetting request for the first user identifier, the first terminal acquires the at least one trusted friend user identifier so as to assist in verifying the identity of the first user by the at least one trusted friend user identifier.
Before step 401, at least one trusted friend user identifier of the first user identifier needs to be preset, and the setting process may be executed by any terminal that logs in the internet application based on the first user identifier.
The first terminal stores a user relation chain of the first user identification and a trusted user relation chain, wherein the user relation chain comprises at least one friend user identification, and the trusted user relation chain comprises a trusted friend user identification of the first user identification. And when receiving a trusted friend setting request in a state that the first terminal logs in the internet application based on the first user identification, providing a trusted friend setting page, wherein the trusted friend setting page can be used for checking the trusted friend user identification or setting the trusted friend user identification.
Referring to fig. 5A, the first terminal provides a "trusted friend" portal, and when the first user clicks the "trusted friend" portal, the first terminal displays a trusted friend setup page as shown in fig. 5B, which includes an add option "+" and a delete option "-". In addition, if the trusted friend user identifier has been set for the first user identifier, the trusted friend setting page further includes the set trusted friend user identifier, as shown in fig. 5C.
The process of setting the trusted friend user identifier in the trusted friend setting page includes the following steps 4011 of adding the trusted friend user identifier or 4012 of deleting the trusted friend user identifier:
4011. when the first terminal detects the operation of adding the trusted friend in the trusted friend setting page, a user relationship chain of the first user identification is provided, and the first terminal adds the friend user identification selected from the user relationship chain to the trusted user relationship chain of the first user identification.
Referring to fig. 5B, when the first user clicks the add option "+", the first terminal displays the user relationship chain shown in fig. 5D for the first user to select, the first user selects the user identifier to be set as the trusted friend user identifier in the user relationship chain, and clicks the determination option, the first terminal obtains the friend user identifier selected by the user, adds the friend user identifier to the trusted friend user relationship chain of the first user identifier, and displays the trusted friend setting page shown in fig. 5C.
Or, when the first terminal detects an operation of adding a trusted friend in the trusted friend setting page, a search bar may also be provided, a user identifier input in the search bar is acquired, and the user identifier is added to the trusted user relationship chain of the first user identifier, where the input user identifier may or may not include the user relationship chain of the first user identifier, and the embodiment of the present invention does not limit this.
It should be noted that, in the embodiment of the present invention, the number of the set trusted friend user identifiers may be limited according to the minimum number and the maximum number, and if the number of the trusted friend user identifiers set by the first terminal is smaller than the minimum number or larger than the maximum number, the first terminal displays a prompt message to prompt the user. As shown in fig. 5B, the minimum number is 3 and the maximum number is 5.
4012. The first terminal displays the relationship chain of the trusted user on the trusted friend setting page, namely displays all set user identifications of the trusted friends, and deletes the user identification of the trusted friends, to which the deletion operation is directed, from the relationship chain of the trusted friends when the deletion operation of any user identification of the trusted friends is detected.
Referring to fig. 5C, when the first user clicks the delete option "-", the first terminal displays the set trusted friend user identifier for the first user to select, the first user selects the trusted friend user identifier to be deleted, and clicks the determination option, and the first terminal obtains the trusted friend user identifier selected by the user and deletes the trusted friend user identifier from the trusted user relationship chain of the first user identifier.
Further, in order to prevent other users from adding the trusted friend user identifier by using the first terminal without the consent of the original user of the first terminal, the process of adding the trusted friend user identifier may be delayed to take effect. That is, the step 4011 may further include: and after the preset effective duration of the backlog is generated, the selected friend user identification is added to the credible user relation chain of the first user identification according to the backlog.
In addition, when the selected friend user identifier is added to the trusted user relationship chain, prompt information can be displayed on the first terminal to prompt that the added trusted friend user identifier is valid.
When the trusted friend user identification is added, the trusted friend user identification is effective after the effective time length is preset, so that certain malicious operation cannot be immediately executed through the trusted friend user identification when the trusted friend user identification is added by using the first terminal under the condition that other users do not agree with the original user. And the prompt can be carried out when the user identifier is valid, so that the original user can find the operation of adding the trusted friend user identifier in time and delete the trusted friend user identifier privately added by other users in time.
402. And the first terminal sends the password resetting request and the at least one trusted friend user identifier to the Internet application server.
403. And when the internet application server receives the password resetting request and the at least one trusted friend user identifier, sending an auxiliary verification message to the at least one trusted friend user identifier, wherein the auxiliary verification message carries the first user identifier.
In order to assist the trusted friend user identifier in verifying the identity of the first user, the internet application server may generate an auxiliary verification message when receiving the password resetting request and the at least one trusted friend user identifier, where the auxiliary verification message carries the first user identifier and sends the auxiliary verification message to the at least one trusted friend user identifier.
In practical applications, the first user may contact the preset at least one trusted friend user, for example, by making a call, sending a short message, chatting on the internet, and the like, to request the at least one trusted friend user to trigger the confirmation operation of the auxiliary verification message, and the at least one trusted friend user confirms the identity of the first user by contact, that is, the confirmation operation of the auxiliary verification message may be triggered to assist the first user in verifying.
Further, in order to facilitate prompting the first user to contact a trusted friend to assist in authentication, the first terminal may display an authentication indication page when receiving the password resetting request, and display operation prompt information in a prompt information display area of the authentication indication page. The operation prompt information may include a specific operation mode in which the trusted friend user identifier performs a confirmation operation on the auxiliary verification message, and the first user may notify the trusted friend user of the operation mode when contacting the trusted friend after viewing the operation prompt information, and the trusted friend user completes the confirmation operation according to the operation mode.
Referring to fig. 5E, the first terminal displays a verification indication page, a prompt information display area is above the verification indication page, and the operation steps (i) and (ii) of the first user are displayed in the prompt information display area, where the step (ii) is an operation mode of the confirmation operation, the first user can click a "detailed guidance" button, and the first terminal displays a guidance page as shown in fig. 5F, so as to intuitively display the operation mode of the confirmation operation. After the first user checks the operation mode, the first user can contact the trusted friend and inform the trusted friend of the operation mode.
It should be noted that, the embodiment of the present invention presets the user identifier of the trusted friend, so that the user identifier has a certain privacy, and the first user identifier is required to contact the preset trusted friend in the verification process. The first terminal does not display the at least one trusted friend user identifier, and only the original user of the first user identifier can know which trusted friend user identifiers are preset, and the first terminal is connected with the trusted friend users for auxiliary verification. And even if other users can obtain the first terminal, the other users cannot know the preset trusted friend user identification, cannot contact the trusted friend users, and cannot pass verification. Therefore, the safety is improved by adopting the mode.
In addition, the embodiment of the present invention is described only by taking the step 401 as an example, and actually, in another embodiment, the step 401 may be performed by the internet application server.
That is, the steps 401-403 may be replaced by the following steps: when the first terminal receives a password resetting request for the first user identification through the Internet application, the password resetting request is sent to the Internet application server, when the password resetting request is received by the Internet application server, at least one trusted friend user identification preset by the first user identification is obtained, and an auxiliary verification message is sent to the at least one trusted friend user identification.
The trusted user relationship chain is stored by the internet application server, when the first terminal detects the operation of adding or deleting the trusted friend user identifier, the first terminal informs the internet application server, and the internet application server adds or deletes the trusted friend user identifier in the trusted user relationship chain.
404. And when the second terminal receives the auxiliary verification message, displaying the auxiliary verification message.
The second terminal is a terminal which logs in the internet application server based on a second user identifier in the at least one trusted friend user identifier. In fact, for a terminal that logs in the internet application server based on each trusted friend user identifier, the operation performed is similar to that of the second terminal, and details are not described here.
405. And when the second terminal detects the confirmation operation of the auxiliary verification message, sending a confirmation auxiliary verification message to the Internet application server.
The second terminal may display the secondary authentication message when receiving the secondary authentication message, and the second user triggers a confirmation operation of the secondary authentication message when confirming the identity of the first user.
In particular, the internet application server may provide a designated public identity, which may provide a service of resetting a password. And when the second terminal detects the activation operation of the specified public identity, displaying a service page of the specified public identity, and displaying the auxiliary verification message in the service page. When the click operation on the auxiliary verification message is detected, the first user identification and the confirmation option are displayed, when the click operation on the confirmation option is detected, the confirmation operation on the auxiliary verification message is determined to be detected, and then the confirmation auxiliary verification message is sent to the Internet application server, wherein the confirmation auxiliary verification message carries the first user identification.
The second terminal may add the entry of the specified public identifier to the address book in advance, or obtain the entry of the specified public identifier by searching, and trigger the activation operation of the specified public identifier by clicking the entry. In addition, when the second terminal detects the click operation on the auxiliary verification message and displays the first user identifier, the second terminal may also display information of the first user identifier, such as an avatar of the first user identifier, a current geographic location of the first terminal, a remark name set by the second user identifier for the first user identifier, and the like.
Referring to fig. 5G, the second terminal displays the auxiliary verification message in a service page of a designated public identifier "service team", when the second user clicks the auxiliary verification message, the second terminal displays a detail page as shown in fig. 5H, displays the first user identifier and a confirmation option "trust this time operation", when the second user confirms that the first user to reset the password is the original user of the first user identifier by contact, the confirmation option "trust this time operation" may be clicked, and then the second terminal sends a confirmation auxiliary verification message to the internet application server and displays a submit page as shown in fig. 5I.
It should be noted that, the internet application server may also not actively send the auxiliary verification message to the second terminal, but first store the auxiliary verification message as the message to be sent to the second terminal for the specified public identifier, send the message acquisition request for the specified public identifier to the internet application server when the second terminal displays the service page of the specified public identifier, and send the auxiliary verification message to the second terminal when the internet application server receives the message acquisition request.
406. The internet application server receives a confirmation auxiliary verification message sent by any trusted friend user identification, counts the number of the trusted friend user identifications which have sent the confirmation auxiliary verification message, and sends a password setting page to the first terminal when determining that the number reaches a preset number.
The at least one trusted friend user identifier can send a confirmation auxiliary verification message to the internet application server, the internet application server can receive the confirmation auxiliary verification message sent by any trusted friend user identifier, and count the number of the trusted friend user identifiers sending the confirmation auxiliary verification message, when the number reaches a preset number, the number indicates that a plurality of trusted friends all confirm the identity of the first user, and the first user can be considered as an original user of the first user identifier, and the verification is passed.
The preset number may be predetermined by the first user identifier and stored in the internet application server, or determined by default by the internet application server, and the preset number may be a specific numerical value, such as 2 or 3, and may also be the total number of the trusted friend user identifiers of the first user identifier, or may also be determined according to the total number of the trusted friend user identifiers of the first user identifier and a specific ratio, and the characteristic ratio may be 1 or one-half, which is not limited in the embodiment of the present invention.
Further, a certain time needs to be consumed for the confirmation of the plurality of trusted friend user identifications, in order to improve the verification speed and shorten the verification time, the internet application server can also set a preset verification time length, when an auxiliary verification message is sent to at least one trusted friend user identification, timing is started, if the counted time length reaches the preset verification time length but the number of the trusted friend user identifications which have sent the confirmation auxiliary verification message does not reach the preset number, the verification fails, and a verification failure message is sent to the first terminal to prompt the first user to initiate the verification again.
Correspondingly, when the first terminal displays the verification indication page, the displayed operation prompt information may further include the preset verification duration, so that the first user can know the validity period of the verification, and in the verification process, the first terminal may further display countdown in the verification indication page along with the lapse of time, so that the first user can know the verification remaining time.
In the process of confirming the plurality of trusted friend user identifiers, in order to enable the first user to know the current verification progress, the internet application server may send the trusted friend user identifier of the auxiliary verification message sent to the first terminal, and the first terminal may provide the trusted friend user identifier of the auxiliary verification message sent to the verification progress display area of the verification indication page, so that the first user knows which trusted friend user identifiers are currently verified, as shown in the lower area of fig. 5E.
407. And when the first terminal receives the password setting page, displaying the password setting page, and resetting the password of the first user identifier through the password setting page.
When the first user passes the verification, the first user is allowed to reset the password of the first user identifier, the internet application server provides a password setting page for the first terminal, the first terminal displays the password setting page, and the first user can reset the password of the first user identifier on the password setting page.
Optionally, the first terminal displays the trusted friend user identifier that has sent the verification assisting message in the verification indication page, when the number of the trusted friend user identifiers that have sent the verification assisting message reaches the preset number, the internet application server provides an entry of a password setting page for the first terminal, and the first user can display the password setting page by clicking the entry, and reset the password of the first user identifier in the password setting page.
The password setting page may include a first input field, a second input field, and a submit button, where a first user may input a password set in this order in the first input field and the second input field, and click the submit button, and at this time, the first terminal determines that the passwords input in the first input field and the second input field are identical, and sends the password to the internet application server, and the internet application server may store the first user identifier and the password correspondingly, and delete the original password of the first user identifier.
It should be noted that, the embodiment of the present invention is only described by taking the process of performing statistics by the internet application server as an example, and in another embodiment, the process of performing statistics may also be performed by the first terminal, that is, the step 406 and the step 407 may be replaced by the following steps: the internet application server forwards the confirmation auxiliary verification message to the first terminal when receiving the confirmation auxiliary verification message sent by any trusted friend user identifier, and when the first terminal receives the confirmation auxiliary verification message, the verification number of the first user identifier is added by 1 until the verification number reaches the preset number, the verification number indicates that the number of the trusted friend user identifiers which have sent the confirmation auxiliary verification message reaches the preset number, a pre-stored password setting page is displayed, and the password of the first user identifier is reset through the password setting page.
The method provided by the embodiment of the invention obtains at least one trusted friend user identifier preset by a first user identifier when receiving a password resetting request of the first user identifier through Internet application, determines the trusted friend user identifier which has executed the confirmation operation of the auxiliary verification message in the at least one trusted friend user identifier, and provides a password setting page of the first user identifier and resets the password when determining that the number of the trusted friend user identifiers which have executed the confirmation operation reaches the preset number. According to the invention, at least one trusted friend identifier is preset, when the user forgets the password, the identity of the first user can be confirmed by the at least one trusted friend user identifier through executing confirmation operation, so that the password is reset, the flexibility of password resetting scenes is improved, and the verification is assisted by the preset number of trusted friends, so that the safety is improved.
It should be noted that, the above embodiment is only described by taking an interaction among the first terminal, the internet application server, and the second terminal as an example, where the first terminal is an initiator for resetting a password, and the second terminal is an assistant for resetting the password, so as to help a user of the first terminal perform assistant authentication. In fact, the second terminal may also serve as an initiator for resetting the password, and the first terminal may also serve as an auxiliary for resetting the password.
For any terminal, the terminal can be compatible with roles of an initiator and an assistant, that is, the terminal can be used as an initiator for resetting a password to invite a preset trusted friend to perform assistant verification, and can also be used as a trusted friend of other terminals to accept invitations of other terminals to perform assistant verification for other terminals.
Fig. 6 is a flowchart of a password setting method according to an embodiment of the present invention. The execution main body of the embodiment of the invention is the first terminal, the Internet application server and the second terminal, the Internet application server provides a session function, and any two user identifications which are friends can send messages through the Internet application server. The embodiment of the invention is only explained by taking a preset auxiliary verification operation as an example of sending a preset message to a first user identifier, and when any trusted friend user identifier sends the preset message to the first user identifier, the trusted friend user identifier is determined to execute the preset auxiliary verification operation. Referring to fig. 6, the method includes:
601. when the first terminal receives a password resetting request for the first user identification through the Internet application, at least one trusted friend user identification preset by the first user identification is obtained, and the password resetting request is used for requesting to reset the password of the first user identification in a state that the first terminal does not log in the Internet application.
602. And the first terminal sends the password resetting request and the at least one trusted friend user identifier to the Internet application server.
Step 601-602 is similar to step 401-402, and will not be described herein again.
603. And when the internet application server receives the password resetting request and the at least one trusted friend user identifier, monitoring whether a preset message sent to the first user identifier by any trusted friend user identifier is received or not.
The internet application server may obtain the preset message and send the preset message to the first terminal when receiving the password resetting request and the at least one trusted friend user identifier, and the first terminal may display a verification indication page, and display operation prompt information in a prompt information display area in the verification indication page, where the operation prompt information may include the preset message, for prompting the trusted friend user identifier to send the preset message to the first user identifier. After the first user views the operation prompt message, the first user may contact the at least one trusted friend user identifier, for example, by making a call, sending a short message, chatting on the internet, and the like, and request the at least one trusted friend user identifier to send a preset message to the first user identifier through the internet application, so as to verify the identity of the first user.
The internet application server monitors the message sent to the first user identification, when the message sent to the first user identification is monitored, the user identification sending the message is determined, if the message is determined to be the preset message and the preset message is sent to the first user identification by any trusted friend user identification in the at least one trusted friend user identification, the trusted friend user identification can be determined to execute the preset auxiliary verification operation.
The preset message may be a preset verification code or the first user identifier itself, or may also be a verification code generated for the first user identifier by the internet application, which is not limited in the embodiment of the present invention.
604. And the second terminal displays a conversation page with the first user identifier, acquires a preset message input by the second user in the conversation page, and sends the preset message to the Internet application server.
The second terminal is a terminal logged in based on any user identifier in at least one trusted friend user identifier, after the first user contacts with the second user, the second user can open a session page of the second user identifier and the first user identifier on the second terminal, and input the preset message in the session page, so that the second terminal obtains the preset message and sends the preset message to the internet application server.
For each user identifier in the at least one trusted buddy user identifier, the steps executed by the logged-in terminal are similar to those of the second terminal, and are not described herein again.
605. The internet application server receives a preset message sent to the first user identifier by a terminal logged in based on any trusted friend user identifier, counts the number of the trusted friend user identifiers sending the preset message to the first user identifier, and sends a password setting page to the first terminal when the number is determined to reach the preset number.
606. And when the first terminal receives the password setting page, displaying the password setting page, and resetting the password of the first user identifier through the password setting page.
Steps 605-606 are similar to steps 406-407 described above and will not be described herein.
In another embodiment, the auxiliary verification operation may also be an operation of sending a preset message to a specified public identity, and referring to fig. 7, the step 603-:
607. and when the internet application server receives the password resetting request and the at least one trusted friend user identifier, monitoring whether a preset message sent to the specified public identifier by any trusted friend user identifier is received or not.
The internet application server can obtain the preset message and send the preset message to the first terminal when receiving the password resetting request and the at least one trusted friend user identifier, the first terminal can display a verification indication page, and operation prompt information is displayed in a prompt information display area in the verification indication page, wherein the operation prompt information can comprise the preset message and is used for prompting the trusted friend user identifier to send the preset message to the specified public identifier. After the first user views the operation prompt message, the first user may contact the at least one trusted friend user identifier, for example, by making a call, sending a short message, chatting on the internet, and the like, and request the at least one trusted friend user identifier to send a preset message to the specified public identifier through the internet application, so as to verify the identity of the first user.
The internet application server monitors the message sent to the first user identification, when the message sent to the first user identification is monitored, the user identification sending the message is determined, if the message is determined to be the preset message and the preset message is sent to the appointed public identification by any trusted friend user identification in the at least one trusted friend user identification, the trusted friend user identification can be determined to execute the preset auxiliary verification operation.
608. And the second terminal displays the service page of the specified public identification, acquires a preset message input by the second user in the service page, and sends the preset message to the Internet application server.
609. The internet application server receives a preset message sent to the appointed public identification by at least one terminal logged in by the credible friend user identification, counts the number of the credible friend user identifications sending the preset message to the appointed public identification, and sends a password setting page to the first terminal when the number is determined to reach the preset number.
Of course, in addition to the operation of sending the preset message to the first user identifier or the designated public identifier, the preset auxiliary verification operation may be other operations, which is not limited in the embodiment of the present invention, and it is only required to ensure that the internet application server can detect the preset auxiliary verification operation when the terminal based on any trusted friend user identifier performs the preset auxiliary verification operation.
According to the method provided by the embodiment of the invention, when a password resetting request for a first user identifier is received through Internet application, at least one trusted friend user identifier preset by the first user identifier is obtained, the trusted friend user identifier which is subjected to preset auxiliary verification operation in the at least one trusted friend user identifier is determined, and when the number of the trusted friend user identifiers subjected to the preset auxiliary verification operation is determined to reach the preset number, a password setting page of the first user identifier is provided, and the password is reset. According to the invention, at least one trusted friend identifier is preset, when the user forgets the password, the identity of the first user can be confirmed by executing the preset auxiliary verification operation through the at least one trusted friend user identifier, so that the password is reset, the flexibility of password resetting scenes is improved, and the verification is assisted by the preset number of trusted friends, so that the safety is improved.
Fig. 8 is a schematic structural diagram of a password setting apparatus provided in an embodiment of the present invention, and referring to fig. 8, the apparatus includes:
a trusted identity obtaining module 801, configured to obtain at least one trusted friend user identity preset by a first user identity when a password resetting request for the first user identity is received through an internet application, where the password resetting request is used to request that a password of the first user identity is reset in a state where the internet application is not logged in;
a determining module 802, configured to determine a trusted friend user identifier that has performed a preset auxiliary verification operation in the at least one trusted friend user identifier, where the preset auxiliary verification operation is used to assist in verifying an identity of the first user identifier;
a page providing module 803, configured to provide a password setting page of the first user identifier when it is determined that the number of the trusted friend user identifiers that have performed the preset auxiliary verification operation reaches a preset number, where the password setting page is used to set a password of the first user identifier.
Optionally, the preset auxiliary verification operation is a confirmation operation on the auxiliary verification message;
the determining module 802 is configured to send an auxiliary verification message to the at least one trusted friend user identifier, where the auxiliary verification message carries the first user identifier; and when receiving a confirmation auxiliary verification message sent by any trusted friend user identifier, determining that the trusted friend user identifier sending the confirmation auxiliary verification message executes the preset auxiliary verification operation.
Optionally, the preset auxiliary verification operation is an operation of sending a preset message to the first user identifier;
the determining module 802 is configured to provide operation prompt information in a prompt information display area, where the operation prompt information is used to prompt the trusted friend user identifier to send the preset message to the first user identifier; and when detecting that any trusted friend user identifier sends the preset message to the first user identifier, determining that the trusted friend user identifier executes the preset auxiliary verification operation.
Optionally, the preset auxiliary verification operation is an operation of sending a preset message to a specified public identity;
the determining module 802 is configured to provide operation prompt information in a prompt information display area, where the operation prompt information is used to prompt the trusted friend user identifier to send the preset message to the specified public identifier; and when detecting that any trusted friend user identifier sends the preset message to the appointed public identifier, determining that the trusted friend user identifier executes the preset auxiliary verification operation.
Optionally, the apparatus further comprises:
the page providing module 803 is configured to, in a state where the internet application is logged in based on the first user identifier, provide a trusted friend setting page when a trusted friend setting request is received;
the relation chain providing module is used for providing a user relation chain of the first user identification when the operation of adding the trusted friend is detected in the trusted friend setting page, and the user relation chain comprises at least one friend user identification;
and the adding module is used for adding the friend user identification selected from the user relationship chain to a trusted user relationship chain of the first user identification, wherein the trusted user relationship chain comprises the trusted friend user identification of the first user identification.
Optionally, the adding module is configured to obtain a friend user identifier selected from the user relationship chain; generating backlogs, wherein the backlogs comprise the first user identification and the selected friend user identification; and after the preset effective time length of the backlog is generated, adding the selected friend user identifier to the trusted user relationship chain of the first user identifier according to the backlog.
Optionally, the apparatus further comprises:
and the completion identifier providing module is used for providing the trusted friend user identifier which executes the preset auxiliary verification operation in the verification progress display area.
Fig. 9 is a schematic structural diagram of a password setting apparatus provided in an embodiment of the present invention, and referring to fig. 9, the apparatus includes:
a display module 901, configured to display an auxiliary verification message received by a second user identifier in a state where the second user identifier logs in to an internet application, where the auxiliary verification message carries a first user identifier that requests to reset a password, and the second user identifier is a trusted friend user identifier preset by the first user identifier;
a sending module 902, configured to send a confirmation secondary authentication message to the first subscriber identity when a confirmation operation on the secondary authentication message is detected.
Optionally, the display module 901 is configured to display a service page of a specified public identity when an activation operation of the specified public identity is detected; in the service page, the received secondary authentication message is displayed.
Optionally, the apparatus further comprises:
the display module 901 is further configured to display the first user identifier and a confirmation option when a click operation on the secondary verification message is detected;
and the determining module is used for determining that the confirmation operation on the auxiliary verification message is detected when the clicking operation on the confirmation option is detected.
It should be noted that: in practical applications, the above function distribution may be completed by different function modules according to needs, that is, the internal structures of the terminal and the server are divided into different function modules to complete all or part of the above described functions. In addition, the password setting device and the password setting method provided by the above embodiments belong to the same concept, and specific implementation processes thereof are detailed in the method embodiments and are not described herein again.
Fig. 10 is a schematic structural diagram of a terminal according to an embodiment of the present invention. The terminal may be configured to implement the functions performed by the first terminal and the second terminal in the password setting method shown in the above-described embodiment. Specifically, the method comprises the following steps:
terminal 1000 can include RF (Radio Frequency) circuitry 110, memory 120 including one or more computer-readable storage media, input unit 130, display unit 140, sensor 150, audio circuitry 160, transmission module 170, processor 180 including one or more processing cores, and power supply 190. Those skilled in the art will appreciate that the terminal structure shown in fig. 10 is not intended to be limiting and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components. Wherein:
the RF circuit 110 may be used for receiving and transmitting signals during information transmission and reception or during a call, and in particular, receives downlink information from a base station and then sends the received downlink information to the one or more processors 180 for processing; in addition, data relating to uplink is transmitted to the base station. In general, the RF circuitry 110 includes, but is not limited to, an antenna, at least one Amplifier, a tuner, one or more oscillators, a Subscriber Identity Module (SIM) card, a transceiver, a coupler, an LNA (Low Noise Amplifier), a duplexer, and the like. In addition, the RF circuitry 110 may also communicate with networks and other terminals via wireless communications. The wireless communication may use any communication standard or protocol, including but not limited to GSM (Global System for Mobile communications), GPRS (General Packet Radio Service), CDMA (Code Division Multiple Access), WCDMA (Wideband Code Division Multiple Access), LTE (Long Term Evolution), e-mail, SMS (short messaging Service), etc.
The memory 120 may be used to store software programs and modules, such as the software programs and modules corresponding to the terminal shown in the above exemplary embodiment, and the processor 180 executes various functional applications and data processing, such as implementing video-based interaction, by running the software programs and modules stored in the memory 120. The memory 120 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the terminal 1000, and the like. Further, the memory 120 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device. Accordingly, the memory 120 may further include a memory controller to provide the processor 180 and the input unit 130 with access to the memory 120.
The input unit 130 may be used to receive input numeric or character information and generate keyboard, mouse, joystick, optical or trackball signal inputs related to user settings and function control. In particular, input unit 130 may include a touch-sensitive surface 131 as well as other input terminals 132. The touch-sensitive surface 131, also referred to as a touch display screen or a touch pad, may collect touch operations by a user on or near the touch-sensitive surface 131 (e.g., operations by a user on or near the touch-sensitive surface 131 using a finger, a stylus, or any other suitable object or attachment), and drive the corresponding link device according to a predetermined program. Alternatively, the touch sensitive surface 131 may comprise two parts, a touch detection means and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, sends the touch point coordinates to the processor 180, and can receive and execute commands sent by the processor 180. Additionally, the touch-sensitive surface 131 may be implemented using various types of resistive, capacitive, infrared, and surface acoustic waves. In addition to the touch-sensitive surface 131, the input unit 130 may also include other input terminals 132. In particular, other input terminals 132 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control keys, switch keys, etc.), a trackball, a mouse, a joystick, and the like.
Display unit 140 can be used to display information entered by or provided to a user as well as various graphical user interfaces of terminal 1000, which can be made up of graphics, text, icons, video, and any combination thereof. The Display unit 140 may include a Display panel 141, and optionally, the Display panel 141 may be configured in the form of an LCD (Liquid Crystal Display), an OLED (Organic Light-Emitting Diode), or the like. Further, the touch-sensitive surface 131 may cover the display panel 141, and when a touch operation is detected on or near the touch-sensitive surface 131, the touch operation is transmitted to the processor 180 to determine the type of the touch event, and then the processor 180 provides a corresponding visual output on the display panel 141 according to the type of the touch event. Although in FIG. 10, touch-sensitive surface 131 and display panel 141 are shown as two separate components to implement input and output functions, in some embodiments, touch-sensitive surface 131 may be integrated with display panel 141 to implement input and output functions.
Terminal 1000 can also include at least one sensor 150, such as a light sensor, motion sensor, and other sensors. Specifically, the light sensor may include an ambient light sensor that adjusts the brightness of the display panel 141 according to the brightness of ambient light, and a proximity sensor that turns off the display panel 141 and/or a backlight when the terminal 1000 moves to the ear. As one of the motion sensors, the gravity acceleration sensor can detect the magnitude of acceleration in each direction (generally, three axes), can detect the magnitude and direction of gravity when the mobile phone is stationary, and can be used for applications of recognizing the posture of the mobile phone (such as horizontal and vertical screen switching, related games, magnetometer posture calibration), vibration recognition related functions (such as pedometer and tapping), and the like; other sensors such as a gyroscope, a barometer, a hygrometer, a thermometer, and an infrared sensor that can be configured for terminal 1000 are not described herein.
Audio circuitry 160, speaker 161, and microphone 162 can provide an audio interface between a user and terminal 1000. The audio circuit 160 may transmit the electrical signal converted from the received audio data to the speaker 161, and convert the electrical signal into a sound signal for output by the speaker 161; on the other hand, the microphone 162 converts the collected sound signal into an electric signal, converts the electric signal into audio data after being received by the audio circuit 160, and then outputs the audio data to the processor 180 for processing, and then to the RF circuit 110 to be transmitted to, for example, another terminal, or outputs the audio data to the memory 120 for further processing. Audio circuitry 160 may also include an earbud jack to provide communication of peripheral headphones with terminal 1000.
Terminal 1000 via transmission module 170 can facilitate user emailing, web browsing, and streaming media access, etc., which provides wireless or wired broadband internet access to the user. Although fig. 10 shows the transmission module 170, it is understood that it does not belong to the essential constitution of the terminal 1000 and can be omitted entirely as needed within the scope not changing the essence of the invention.
Processor 180 is the control center of terminal 1000, links various parts of the entire handset using various interfaces and lines, and performs various functions of terminal 1000 and processes data by running or executing software programs and/or modules stored in memory 120 and calling data stored in memory 120, thereby performing overall monitoring of the handset. Optionally, processor 180 may include one or more processing cores; preferably, the processor 180 may integrate an application processor, which mainly handles operating systems, user interfaces, application programs, etc., and a modem processor, which mainly handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor 180.
Terminal 1000 can also include a power supply 190 (e.g., a battery) for powering the various components, which can be logically coupled to processor 180 via a power management system to manage charging, discharging, and power consumption management functions via the power management system. The power supply 190 may also include any component including one or more of a dc or ac power source, a recharging system, a power failure detection circuit, a power converter or inverter, a power status indicator, and the like.
Although not shown, terminal 1000 can also include a camera, a bluetooth module, etc., which are not described in detail herein. Specifically, in this embodiment, the display unit of the terminal is a touch screen display, the terminal further includes a memory, and one or more programs, where the one or more programs are stored in the memory, and the one or more programs configured to be executed by the one or more processors include instructions for implementing operations performed by the first terminal and the second terminal in the above embodiments.
Fig. 11 is a schematic structural diagram of a server 1100 according to an embodiment of the present invention, where the server 1100 may have a relatively large difference due to different configurations or performances, and may include one or more Central Processing Units (CPUs) 1122 (e.g., one or more processors) and a memory 1132, and one or more storage media 1130 (e.g., one or more mass storage devices) for storing an application program 1142 or data 1144. Memory 1132 and storage media 1130 may be, among other things, transient storage or persistent storage. The program stored on the storage medium 1130 may include one or more modules (not shown), each of which may include a series of instruction operations for the server. Still further, the central processor 1122 may be provided in communication with the storage medium 1130 to execute a series of instruction operations in the storage medium 1130 on the server 1100.
The Server 1100 may also include one or more power supplies 1126, one or more wired or wireless network interfaces 1150, one or more input-output interfaces 1158, one or more keyboards 1156, and/or one or more operating systems 1141, such as a Windows ServerTM,Mac OS XTM,UnixTM,LinuxTM,FreeBSDTMAnd so on.
The server 1100 may be configured to perform the steps performed by the internet application server in the password setting method provided in the above-described embodiment.
Fig. 12 is a schematic structural diagram of an interactive system provided in an embodiment of the present invention, and referring to fig. 12, the interactive system includes: a first terminal 1201, a second terminal 1202 and an internet application server 1203;
the first terminal 1201 is configured to perform the steps performed by the first terminal in the above-described embodiment;
the second terminal 1202 is configured to perform the steps performed by the second terminal in the above-described embodiment;
the internet application server 1203 is configured to perform the steps performed by the internet application server in the above embodiments.
It will be understood by those skilled in the art that all or part of the steps for implementing the above embodiments may be implemented by hardware, or may be implemented by a program instructing relevant hardware, where the program may be stored in a computer-readable storage medium, and the above-mentioned storage medium may be a read-only memory, a magnetic disk or an optical disk, etc.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that fall within the spirit and principle of the present invention are intended to be included therein.

Claims (12)

1. A password setting method, characterized in that the method comprises:
providing a trusted friend setting page when a trusted friend setting request is received in a state of logging in an internet application based on a first user identifier;
when the operation of adding a trusted friend is detected in the trusted friend setting page, providing a user relation chain of the first user identification, wherein the user relation chain comprises at least one friend user identification;
acquiring a friend user identifier selected from the user relationship chain;
generating backlogs, wherein the backlogs comprise the first user identification and the selected friend user identification;
after the preset effective duration of the backlog is generated, adding the selected friend user identifier to a trusted user relationship chain of the first user identifier according to the backlog, and displaying prompt information, wherein the trusted user relationship chain comprises the trusted friend user identifier of the first user identifier, and the prompt information is used for prompting that the added trusted friend user identifier is effective;
when a password resetting request for the first user identifier is received through the Internet application, the at least one trusted friend user identifier preset by the first user identifier is obtained, and the password resetting request is used for requesting to reset the password of the first user identifier in a state of not logging in the Internet application;
determining a trusted friend user identifier which is subjected to a preset auxiliary verification operation in the at least one trusted friend user identifier, wherein the preset auxiliary verification operation is used for assisting in verifying the identity of the first user identifier;
and when the number of the trusted friend user identifications executing the preset auxiliary verification operation is determined to reach a preset number, providing a password setting page of the first user identification, wherein the password setting page is used for setting the password of the first user identification.
2. The method according to claim 1, wherein the preset auxiliary authentication operation is a confirmation operation for an auxiliary authentication message; the determining that the trusted friend user identifier of the at least one trusted friend user identifier has performed the preset auxiliary verification operation includes:
sending an auxiliary verification message to the at least one trusted friend user identifier, wherein the auxiliary verification message carries the first user identifier;
and when receiving a confirmation auxiliary verification message sent by any trusted friend user identifier, determining that the trusted friend user identifier sending the confirmation auxiliary verification message executes the preset auxiliary verification operation.
3. The method according to claim 1, wherein the preset auxiliary authentication operation is an operation of sending a preset message to the first subscriber identity; the determining that the trusted friend user identifier of the at least one trusted friend user identifier has performed the preset auxiliary verification operation includes:
providing operation prompt information in a prompt information display area, wherein the operation prompt information is used for prompting a trusted friend user identifier to send the preset message to the first user identifier;
and when detecting that any trusted friend user identifier sends the preset message to the first user identifier, determining that the trusted friend user identifier executes the preset auxiliary verification operation.
4. The method according to claim 1, wherein the preset auxiliary authentication operation is an operation of sending a preset message to a specified public identity; the determining that the trusted friend user identifier of the at least one trusted friend user identifier has performed the preset auxiliary verification operation includes:
providing operation prompt information in a prompt information display area, wherein the operation prompt information is used for prompting a trusted friend user identifier to send the preset message to the specified public identifier;
and when detecting that any trusted friend user identifier sends the preset message to the appointed public identifier, determining that the trusted friend user identifier executes the preset auxiliary verification operation.
5. The method of claim 1, further comprising:
and providing the identification of the trusted friend user who has executed the preset auxiliary verification operation in a verification progress display area.
6. A password setting apparatus, characterized in that the apparatus comprises:
the page providing module is used for providing a trusted friend setting page when receiving a trusted friend setting request in a state of logging in the Internet application based on the first user identification;
a relationship chain providing module, configured to provide a user relationship chain of the first user identifier when an operation of adding a trusted friend is detected in the trusted friend setting page, where the user relationship chain includes at least one friend user identifier;
the adding module is used for acquiring the friend user identification selected from the user relationship chain; generating backlogs, wherein the backlogs comprise the first user identification and the selected friend user identification; after the preset effective duration of the backlog is generated, adding the selected friend user identifier to a trusted user relationship chain of the first user identifier according to the backlog, and displaying prompt information, wherein the trusted user relationship chain comprises the trusted friend user identifier of the first user identifier, and the prompt information is used for prompting that the added trusted friend user identifier is effective;
the trusted identity acquisition module is used for acquiring the at least one trusted friend user identity preset by the first user identity when a password resetting request for the first user identity is received through the Internet application, wherein the password resetting request is used for requesting to reset the password of the first user identity in a state of not logging in the Internet application;
the determining module is used for determining the trusted friend user identifier which is subjected to preset auxiliary verification operation in the at least one trusted friend user identifier, wherein the preset auxiliary verification operation is used for assisting in verifying the identity of the first user identifier;
the page providing module is configured to provide a password setting page of the first user identifier when it is determined that the number of the trusted friend user identifiers that have performed the preset auxiliary verification operation reaches a preset number, where the password setting page is used to set a password of the first user identifier.
7. The apparatus according to claim 6, wherein the preset secondary authentication operation is a confirmation operation for a secondary authentication message;
the determining module is configured to send an auxiliary verification message to the at least one trusted friend user identifier, where the auxiliary verification message carries the first user identifier; and when receiving a confirmation auxiliary verification message sent by any trusted friend user identifier, determining that the trusted friend user identifier sending the confirmation auxiliary verification message executes the preset auxiliary verification operation.
8. The apparatus according to claim 6, wherein the preset auxiliary authentication operation is an operation of sending a preset message to the first subscriber identity;
the determining module is used for providing operation prompt information in a prompt information display area, wherein the operation prompt information is used for prompting a trusted friend user identifier to send the preset message to the first user identifier; and when detecting that any trusted friend user identifier sends the preset message to the first user identifier, determining that the trusted friend user identifier executes the preset auxiliary verification operation.
9. The apparatus according to claim 6, wherein the preset auxiliary authentication operation is an operation of sending a preset message to a specified public identity;
the determining module is used for providing operation prompt information in a prompt information display area, and the operation prompt information is used for prompting a trusted friend user identifier to send the preset message to the specified public identifier; and when detecting that any trusted friend user identifier sends the preset message to the appointed public identifier, determining that the trusted friend user identifier executes the preset auxiliary verification operation.
10. The apparatus of claim 6, further comprising:
and the completion identifier providing module is used for providing the trusted friend user identifier which executes the preset auxiliary verification operation in the verification progress display area.
11. A computer device comprising a processor and a memory, the memory having stored therein at least one program, the at least one program being loaded and executed by the processor to implement the password setting method of any of claims 1 to 5.
12. A computer-readable storage medium, wherein at least one program is stored in the storage medium, the at least one program being executed by a processor to implement the password setting method of any one of claims 1 to 5.
CN201610540966.3A 2016-07-08 2016-07-08 Password setting method and device Active CN107592289B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610540966.3A CN107592289B (en) 2016-07-08 2016-07-08 Password setting method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610540966.3A CN107592289B (en) 2016-07-08 2016-07-08 Password setting method and device

Publications (2)

Publication Number Publication Date
CN107592289A CN107592289A (en) 2018-01-16
CN107592289B true CN107592289B (en) 2020-09-11

Family

ID=61045410

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610540966.3A Active CN107592289B (en) 2016-07-08 2016-07-08 Password setting method and device

Country Status (1)

Country Link
CN (1) CN107592289B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108600220A (en) * 2018-04-24 2018-09-28 上海掌门科技有限公司 The method and apparatus given for change for log-on message
CN109862008B (en) * 2019-01-31 2020-11-20 北京深思数盾科技股份有限公司 Key recovery method and device, electronic equipment and storage medium
CN112351030B (en) * 2020-11-04 2024-01-05 广州腾讯科技有限公司 Data processing method and computer equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101051928A (en) * 2006-04-07 2007-10-10 华为技术有限公司 Equipment configuration method in digital user line connection net
CN104378343A (en) * 2014-05-21 2015-02-25 腾讯科技(深圳)有限公司 Network account password regain method, device and system
CN105608396A (en) * 2015-11-16 2016-05-25 小米科技有限责任公司 Screen-locking password configuration method and apparatus

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103179098B (en) * 2011-12-23 2017-03-01 阿里巴巴集团控股有限公司 A kind of password method for retrieving of network account and device
US9256725B2 (en) * 2014-02-26 2016-02-09 Emc Corporation Credential recovery with the assistance of trusted entities
CN105323219B (en) * 2014-07-01 2020-06-16 腾讯科技(深圳)有限公司 Method and device for verifying user account identity information
CN104754516B (en) * 2015-03-31 2016-05-11 努比亚技术有限公司 Client password method for retrieving, device and system based on LBS

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101051928A (en) * 2006-04-07 2007-10-10 华为技术有限公司 Equipment configuration method in digital user line connection net
CN104378343A (en) * 2014-05-21 2015-02-25 腾讯科技(深圳)有限公司 Network account password regain method, device and system
CN105608396A (en) * 2015-11-16 2016-05-25 小米科技有限责任公司 Screen-locking password configuration method and apparatus

Also Published As

Publication number Publication date
CN107592289A (en) 2018-01-16

Similar Documents

Publication Publication Date Title
US11057376B2 (en) Method, apparatus, and system for controlling intelligent device, and storage medium
CN111066284B (en) Service certificate management method, terminal and server
CN104518875B (en) A kind of method that authentication and account obtain, mobile terminal
CN106534072B (en) user information authorization method, device, equipment and system
US10958459B2 (en) Method and apparatus for processing group chat message
WO2017118437A1 (en) Service processing method, device, and system
CN105024984B (en) Authority setting method, apparatus and system
CN106776124B (en) Data backup method and device
CN106936676B (en) Household equipment control method and device
CN111478849B (en) Service access method, device and storage medium
US10993090B2 (en) Network access method, apparatus, and system
US10691819B2 (en) Method and apparatus for remotely deleting information
CN109714298B (en) Verification method, verification device and storage medium
WO2016078504A1 (en) Identity authentication method and device
WO2018095216A1 (en) Relationship chain processing method, terminal and storage medium
CN111357245B (en) Information searching method, terminal, network equipment and system
CN110418311B (en) Interconnection method and device based on multiple terminals and terminal
CN107592289B (en) Password setting method and device
CN107995151B (en) Login verification method, device and system
CN104917905B (en) Processing method, terminal and the server of Stranger Calls
CN104202301B (en) Numeric value transfer and device
CN106020945B (en) Shortcut item adding method and device
CN109600340B (en) Operation authorization method, device, terminal and server
CN107995150B (en) Identity verification method and device
CN107148011B (en) Method, device and system for executing target service

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant