Patent classifications
G06F2221/2131
Network monitoring device, method, apparatus and system for resetting password thereof, and server
Disclosed are a network monitoring device, a method, apparatus and system for resetting a password of the network monitoring device, and a server. The method for resetting the password of the network monitoring device includes: a first characteristic code is generated according to encrypted content; the first characteristic code is sent to a server; a password resetting command from the server and a reset password from a client are received, wherein the password resetting command is obtained by encrypting the first characteristic code with adoption of a first key, and returned by the server after receiving the first characteristic code; and the password resetting command is decrypted by adopting a second key, and the password of the network monitoring device is reset by utilizing the reset password, wherein the first key and the second key are a pair of keys in an asymmetric encryption algorithm.
System and apparatus for secure password recovery and identity verification
A secure method for resetting the password for an account is disclosed. During the setup of the account, the user can provide the service provider with a media file, and when the user asks the service provider to reset the password for the account, the user will be prompted with several media files. The user can be asked to identify the media file that the user provided to the service provider at the time of the setup of the account. If the user properly identifies the media file, the password will be reset.
Secure password lock and recovery
Secure password lock and recovery is provided. A user password is received to access a secure resource protected by a data processing system. It is determined whether a match exists between a retrieved user password verification string corresponding to a valid user password from a storage of a software token and a generated user password verification string corresponding to the user password. In response to determining that a match does not exist between the retrieved user password verification string and the generated user password verification string, it is determined whether a defined number of user password authentication attempts has been exceeded. In response to determining that the defined number of user password authentication attempts has been exceeded, the retrieved user password verification string is set to a preestablished sequence of values locking the valid user password on the storage of the software token. Access to the secure resource is denied.
PREVENTING ACCOUNT LOCKOUT THROUGH REQUEST THROTTLING
A server to provide single sign on services. The server includes a processor and a memory storing an attempt table. The server, in response to receiving a first password for a user account, forwards the first password to an authentication device. The server determines that the first password is not valid for the user account. The server stores the first password in association with the user account in the attempt table. In response to receiving a second password for the user account, the server determines whether the second password matches the first password. When the second password does not match the first password, the server forwards the second password to the authentication device.
Performing authentication
Preference data is received. The received preference data is compared to stored preference data associated with a user with which the received preference data is associated. A determination is made whether to authorize an action based at least on the comparison. The preference data is received as a selection.
Attestation management
Embodiments disclosed herein are related to computing systems, computer program products, and methods for selecting and providing an attestation in response to a request from an entity. A request is received from an entity for attestation that included in various attestations related to an owner of the attestations. The attestations define information about the owner of the attestations that the entity desires to obtain. The request includes request metadata that identifies a type of the attestation that is being requested. The request metadata is analyzed to determine the attestation that is being requested. Based on the analysis, the attestation is selected. Access to the attestation is provided to the entity making the request.
Identity Verification and Verifying Device
An identity verification method and a verifying device, where the verifying device receives an account for requesting password reset. When the account is invalid, the verifying device sends a fake identification and a first verification request to a requesting device. The verification request mentioned requests a user to determine whether to send verification information to a first communication address. The fake identification and the first communication address are associated with the first account.
Automating password change management
A password management service provides automated password management. In one embodiment, a method for automating password changes begins in response to a determination that automated password changes are authorized. In response, a data mining session is initiated. Within the data mining session, a set of third party applications or sites are identified. Then, and responsive to receipt of a password reset flow authorization, a password reset flow to one or more of the third party applications or sites is initiated by the service. Thereafter, and still within the data mining session, and for each of the one or more third party applications or sites, a determination is made whether a password reset confirmation link has been received by the service. In response to a determination that a password reset confirmation link has been received for a given third party application or site, the service uses the password reset confirmation link to perform an automated password reset and thereby obtain a new user password for the application or site.
Autonomous hint generator
Embodiments define a secure code hint generator that determine an occurrence of security word text content within electronic message body text that is descriptive of a security token required to open a secured file referenced by the message. The embodiments distinguish a security phrase subset words of the body text content from a remainder of an entirety of the body text content that include the security word content as a function of determining that the security phrase is more related to describing the security token; generate hint text content that differs from the security phrase and is chosen to reveal the security phrase text content to a user as a function of knowledge of user profile data; and associate the hint to the secured file for display to the user in response to a request for access to the secured file.
Password protection question setting method and device
A method and an apparatus for setting a password protection question are disclosed. The method includes: receiving a password protection question set request for a password, the set request including a user identifier; extracting one or more pieces of setting information corresponding to the user identifier; individually acquiring one or more password protection questions that match the one or more pieces of setting information; and outputting the one or more password protection questions. The embodiments of the present disclosure can output password protection questions related to preference or interest of a user when the user sets a password protection question, which reinforces the impression of the user on the password protection question, thereby reducing situations that the user forgets the set password protection question and an answer thereof, and improving the practicability of the password protection question.