Method and system for quickly obtaining temporary password

A temporary password and fast technology, applied in transmission systems, digital transmission systems, collaborative devices, etc., can solve problems such as hidden security risks, inability to obtain temporary passwords, users do not know the time of the device, etc., to achieve the effect of high security

Pending Publication Date: 2020-04-21
ZHEJIANG UNIVIEW TECH
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, it is not convenient enough to obtain the temporary password through 400 telephone
In addition, the security of calling 400 is not high. The serial number of the device is pasted on the device body, and if there is no abnormality in the device, the time of the device will be the current date. It is impossible to determine the ownership of the equipment, which poses a security risk
In addition, if the device time is out of order and the user does not know the device time, the temporary password cannot be obtained even by calling 400, and it can only be sent back to the manufacturer for resolution.
[0005] In addition, websites or applications that log in through the Internet also support the use of reserved email addresses or mobile phone numbers to obtain temporary passwords. However, this method has limited scope of application and cannot be applied to network hard disk video recorders NVR, network cameras IPC, wireless routers, etc. embedded device

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for quickly obtaining temporary password

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The technical solution of the present invention will be described in further detail below in conjunction with the accompanying drawings and embodiments, and the following embodiments do not constitute a limitation of the present invention.

[0031] In this embodiment, a method for quickly obtaining a temporary password, such as figure 1 shown, including:

[0032] Step S1. When the device starts up for the first time, guide the user to fill in the account number for receiving the temporary password.

[0033] In the technical fields such as the Internet, communications, video surveillance, and the Internet of Things, there are a large number of networking devices. For example, in a video surveillance system, there are network cameras IPC, network hard disk video recorders NVR, etc. These devices generally have a login password for users to log in to the device and configure the device. In this embodiment, a monitoring device in a video monitoring system is taken as an e...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and system for quickly obtaining a temporary password, and the method comprises the steps: a user is guided to fill in an account for receiving the temporary passwordwhen equipment is started for the first time, the account for receiving the temporary password and information for generating the temporary password are encrypted to generate a dynamic two-dimensionalcode, and the dynamic two-dimensional code is displayed on an equipment login interface; when the user forgets the login password and needs to obtain the temporary password, the user scans the two-dimensional code to obtain the encrypted account for receiving the temporary password and the information for generating the temporary password, and sends the encrypted account and the information to acloud server; the cloud server reversely decrypts the received encrypted information, obtains information used for generating the temporary password to calculate the temporary password, and sends thetemporary password to the account used for receiving the temporary password; and after the user obtains the temporary password, the user logs in the equipment by adopting the obtained temporary password. According to the method and the system, the temporary password is more convenient to acquire, the acquisition of the temporary password is not limited by equipment side networking, and the security is higher.

Description

technical field [0001] The invention belongs to the technical field of temporary password login, and in particular relates to a method and system for quickly obtaining a temporary password. Background technique [0002] Many devices have original default passwords. The default passwords are generally relatively simple. For security reasons, many manufacturers will force you to change to a strong password before using the device, or change to a strong password when crossing network segments and public networks. However, after the password is changed, it is easy to forget the password. At this time, how to quickly and safely retrieve the password is particularly important. [0003] At present, password recovery in the industry is usually to give the user a temporary password to log in, and then the user modifies the password by himself. The common way to obtain the temporary password is to use the temporary password calculation tool to calculate the temporary password that th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L29/06H04L29/08G06K17/00
CPCH04L9/0863H04L63/0838H04L67/10H04L9/0866G06K17/0022
Inventor 祁菊萍
Owner ZHEJIANG UNIVIEW TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products