CN108197461A - A kind of cipher code protection method, mobile terminal and computer readable storage medium - Google Patents

A kind of cipher code protection method, mobile terminal and computer readable storage medium Download PDF

Info

Publication number
CN108197461A
CN108197461A CN201711464780.5A CN201711464780A CN108197461A CN 108197461 A CN108197461 A CN 108197461A CN 201711464780 A CN201711464780 A CN 201711464780A CN 108197461 A CN108197461 A CN 108197461A
Authority
CN
China
Prior art keywords
password
mobile terminal
destination application
server
identification information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201711464780.5A
Other languages
Chinese (zh)
Inventor
董德亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nubia Technology Co Ltd
Original Assignee
Nubia Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nubia Technology Co Ltd filed Critical Nubia Technology Co Ltd
Priority to CN201711464780.5A priority Critical patent/CN108197461A/en
Publication of CN108197461A publication Critical patent/CN108197461A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)

Abstract

The invention discloses a kind of cipher code protection method, the method includes:It receives and is directed to the first password of target account input at the interface of destination application;Obtain the identification information of the destination application and the identification information of the mobile terminal;The identification information of the first password, the identification information of the destination application and the mobile terminal is mapped as by the second password according to default mapping ruler;Second password is sent to server.In addition, invention additionally discloses a kind of mobile terminal and computer readable storage mediums.In this way; cipher code protection method provided by the invention can will be mapped as different password for the same password of different application; so that the password that server storage receives is different; in this way; even if account and the password leakage of application program; malicious person can not also use the account of the leakage and other accounts of password login user, so as to effectively prevent causing damages to user.

Description

A kind of cipher code protection method, mobile terminal and computer readable storage medium
Technical field
The present invention relates to a kind of Ciphor safety technology field more particularly to cipher code protection method, mobile terminal and computers Readable storage medium storing program for executing.
Background technology
With the continuous development of electronic technology, mobile terminal (such as smart mobile phone, tablet computer etc.) is to people’s lives And work brings very big convenience.People are required for registering the account of various application programs respectively, for different Application program, people may use same information as account information, such as all use phone number as account, for close Code, remembers for convenience, and people also tend to set identical password.
So, if the account of a certain application program (such as shared bicycle account) and password leakage, malicious person can With the account and other accounts (such as Web bank's account) of password login user revealed according to this, easily caused to user Loss.As it can be seen that in the prior art, there are larger security risks using identical account and password for different application.
Invention content
In view of this, the present invention proposes a kind of cipher code protection method, mobile terminal and computer readable storage medium, with solution Certainly above-mentioned technical problem.
First, to achieve the above object, the present invention proposes a kind of cipher code protection method, applied to mobile terminal, the side Method includes:
It receives and is directed to the first password of target account input at the interface of destination application;
Obtain the identification information of the destination application and the identification information of the mobile terminal;
According to default mapping ruler by the first password, the identification information of the destination application and the movement The identification information of terminal is mapped as the second password;
Second password is sent to server.
Optionally, described receive is directed to the first password of target account input at the interface of destination application, including:
It receives and is directed to the first password of target account input at the password setting interface of destination application.
Optionally, it is described to send second password to server, including:
The password that second password is carried to server transmission sets request, for asking the server by described in Second password is set as the password of the target account of the destination application.
Optionally, described receive is directed to the first password of target account input at the interface of destination application, including:
The interface for password input received in destination application is directed to the first password of target account input.
Optionally, it is described to send second password to server, including:
The Password Input that second password is carried to server transmission is asked, for asking the server authentication institute State the second password whether with the password match of the target account of the destination application that is stored in the server.
Optionally, the identification information of the destination application includes the identification code of the destination application, wherein, no Same application program corresponds to different identification codes.
Optionally, the identification information of the mobile terminal includes the International Mobile Equipment Identity code of the mobile terminal IMEI。
Optionally, the identification information of the mobile terminal includes the user identity identification SIM card on the mobile terminal International mobile subscriber identity IMSI.
Further, to achieve the above object, the present invention also provides a kind of mobile terminal, the mobile terminal includes storage Device, at least one processor and at least one journey that is stored on the memory and can be performed at least one processor Sequence, at least one program realize the step in method described in any one of the above embodiments when being performed by least one processor Suddenly.
Further, to achieve the above object, the present invention also provides a kind of computer readable storage medium, the computers Readable storage medium storing program for executing is stored at least one program that computer can perform, and at least one program is performed by the computer When the computer is made to perform the step in the above method.
Compared to the prior art, cipher code protection method proposed by the invention reception is directed at the interface of destination application The first password of target account input;Obtain the identification information of the destination application and the mark letter of the mobile terminal Breath;According to default mapping ruler by the first password, the identification information of the destination application and the mobile terminal Identification information be mapped as the second password;Second password is sent to server.In this way, cryptoguard side provided by the invention Method can will be mapped as different password for the same password of different application so that the password that server storage receives It is different, in this way, even if account and the password leakage of application program, malicious person can not also use the account of the leakage And other accounts of password login user, existed so as to effectively eliminate different application using identical account and password Security risk, effectively prevent causing damages to user.
Description of the drawings
Fig. 1 is a kind of hardware architecture diagram for the mobile terminal for realizing each embodiment of the present invention;
Fig. 2 is a kind of communications network system Organization Chart provided in an embodiment of the present invention;
Fig. 3 is a kind of flow diagram of cipher code protection method provided in an embodiment of the present invention;
Fig. 4 is the flow diagram of another cipher code protection method provided in an embodiment of the present invention;
Fig. 5 is the flow diagram of another cipher code protection method provided in an embodiment of the present invention;
Fig. 6 is a kind of hardware architecture diagram of mobile terminal provided in an embodiment of the present invention;
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
In subsequent description, using for representing that the suffix of such as " module ", " component " or " unit " of element is only Be conducive to the explanation of the present invention, itself there is no a specific meaning.Therefore, " module ", " component " or " unit " can mix Ground uses.
Terminal can be implemented in a variety of manners.For example, terminal described in the present invention can include such as mobile phone, tablet Computer, laptop, palm PC, personal digital assistant (Personal Digital Assistant, PDA), portable The shiftings such as media player (Portable Media Player, PMP), navigation device, wearable device, Intelligent bracelet, pedometer The dynamic fixed terminals such as terminal and number TV, desktop computer.
It will be illustrated by taking mobile terminal as an example in subsequent descriptions, it will be appreciated by those skilled in the art that in addition to special For moving except the element of purpose, construction according to the embodiment of the present invention can also apply to the terminal of fixed type.
Referring to Fig. 1, a kind of hardware architecture diagram of its mobile terminal of each embodiment to realize the present invention, the shifting Dynamic terminal 100 can include:RF (Radio Frequency, radio frequency) unit 101, WiFi module 102, audio output unit 103rd, A/V (audio/video) input unit 104, sensor 105, display unit 106, user input unit 107, interface unit 108th, the components such as memory 109, processor 110 and power supply 111, the number of the processor 110 is at least one.Ability Field technique personnel are appreciated that the mobile terminal structure shown in Fig. 1 does not form the restriction to mobile terminal, and mobile terminal can To include either combining certain components or different components arrangement than illustrating more or fewer components.
The all parts of mobile terminal are specifically introduced with reference to Fig. 1:
Radio frequency unit 101 can be used for receive and send messages or communication process in, signal sends and receivees, specifically, by base station Downlink information receive after, handled to processor 110;In addition, the data of uplink are sent to base station.In general, radio frequency unit 101 Including but not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier, duplexer etc..In addition, it penetrates Frequency unit 101 can also communicate with network and other equipment by radio communication.Above-mentioned wireless communication can use any communication Standard or agreement, including but not limited to GSM (Global System of Mobile communication, global system for mobile telecommunications System), GPRS (General Packet Radio Service, general packet radio service), CDMA2000 (Code Division Multiple Access 2000, CDMA 2000), WCDMA (Wideband Code Division Multiple Access, wideband code division multiple access), TD-SCDMA (Time Division-Synchronous Code Division Multiple Access, TD SDMA), FDD-LTE (Frequency Division Duplexing-Long Term Evolution, frequency division duplex long term evolution) and TDD-LTE (Time Division Duplexing-Long Term Evolution, time division duplex long term evolution) etc..
WiFi belongs to short range wireless transmission technology, and mobile terminal can help user to receive and dispatch electricity by WiFi module 102 Sub- mail, browsing webpage and access streaming video etc., it has provided wireless broadband internet to the user and has accessed.Although Fig. 1 shows Go out WiFi module 102, but it is understood that, and must be configured into for mobile terminal is not belonging to, it completely can be according to need It to be omitted in the range for the essence for not changing invention.
Audio output unit 103 can be in call signal reception pattern, call mode, record mould in mobile terminal 100 Formula, speech recognition mode, broadcast reception mode when under isotypes, it is that radio frequency unit 101 or WiFi module 102 are received or The audio data stored in memory 109 is converted into audio signal and exports as sound.Moreover, audio output unit 103 The relevant audio output of specific function performed with mobile terminal 100 can also be provided (for example, call signal receives sound, disappears Breath receives sound etc.).Audio output unit 103 can include loud speaker, buzzer etc..
A/V input units 104 are used to receive audio or video signal.A/V input units 104 can include graphics processor (Graphics Processing Unit, GPU) 1041 and microphone 1042, graphics processor 1041 is in video acquisition mode Or the static images or the image data of video obtained in image capture mode by image capture apparatus (such as camera) carry out Reason.Treated, and picture frame may be displayed on display unit 106.Through graphics processor 1041, treated that picture frame can be deposited Storage is sent in memory 109 (or other storage mediums) or via radio frequency unit 101 or WiFi module 102.Mike Wind 1042 can connect in telephone calling model, logging mode, speech recognition mode etc. operational mode via microphone 1042 Quiet down sound (audio data), and can be audio data by such acoustic processing.Audio that treated (voice) data can To be converted to the form output that mobile communication base station can be sent to via radio frequency unit 101 in the case of telephone calling model. Microphone 1042 can implement various types of noises elimination (or inhibition) algorithms and send and receive sound to eliminate (or inhibition) The noise generated during frequency signal or interference.
Mobile terminal 100 further includes at least one sensor 105, such as optical sensor, motion sensor and other biographies Sensor.Specifically, optical sensor includes ambient light sensor and proximity sensor, wherein, ambient light sensor can be according to environment The light and shade of light adjusts the brightness of display panel 1061, and proximity sensor can close when mobile terminal 100 is moved in one's ear Display panel 1061 and/or backlight.As one kind of motion sensor, accelerometer sensor can detect in all directions (general For three axis) size of acceleration, size and the direction of gravity are can detect that when static, can be used to identify the application of mobile phone posture (such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, percussion) etc.; The fingerprint sensor that can also configure as mobile phone, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer, The other sensors such as hygrometer, thermometer, infrared ray sensor, details are not described herein.
Display unit 106 is used to show by information input by user or be supplied to the information of user.Display unit 106 can wrap Display panel 1061 is included, liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode may be used Display panel 1061 is configured in forms such as (Organic Light-Emitting Diode, OLED).
User input unit 107 can be used for receiving the number inputted or character information and generation and the use of mobile terminal The key signals input that family is set and function control is related.Specifically, user input unit 107 may include touch panel 1071 with And other input equipments 1072.Touch panel 1071, also referred to as touch screen collect user on it or neighbouring touch operation (for example user uses any suitable objects such as finger, stylus or attachment on touch panel 1071 or in touch panel 1071 Neighbouring operation), and corresponding attachment device is driven according to preset formula.Touch panel 1071 may include touch detection Two parts of device and touch controller.Wherein, the touch orientation of touch detecting apparatus detection user, and detect touch operation band The signal come, transmits a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and by it Contact coordinate is converted into, then gives processor 110, and the order that processor 110 is sent can be received and performed.It in addition, can To realize touch panel 1071 using multiple types such as resistance-type, condenser type, infrared ray and surface acoustic waves.In addition to touch panel 1071, user input unit 107 can also include other input equipments 1072.Specifically, other input equipments 1072 can wrap It includes but is not limited to physical keyboard, in function key (such as volume control button, switch key etc.), trace ball, mouse, operating lever etc. It is one or more, do not limit herein specifically.
Further, touch panel 1071 can cover display panel 1061, when touch panel 1071 detect on it or After neighbouring touch operation, processor 110 is sent to determine the type of touch event, is followed by subsequent processing device 110 according to touch thing The type of part provides corresponding visual output on display panel 1061.Although in Fig. 1, touch panel 1071 and display panel 1061 be the component independent as two to realize the function that outputs and inputs of mobile terminal, but in certain embodiments, it can The function that outputs and inputs of mobile terminal is realized so that touch panel 1071 and display panel 1061 is integrated, is not done herein specifically It limits.
Interface unit 108 be used as at least one external device (ED) connect with mobile terminal 100 can by interface.For example, External device (ED) can include wired or wireless head-band earphone port, external power supply (or battery charger) port, wired or nothing Line data port, memory card port, the port for device of the connection with identification module, audio input/output (I/O) end Mouth, video i/o port, ear port etc..Interface unit 108 can be used for receiving the input from external device (ED) (for example, number It is believed that breath, electric power etc.) and at least one element that the input received is transferred in mobile terminal 100 or can use In transmitting data between mobile terminal 100 and external device (ED).
Memory 109 can be used for storage software program and various data.Memory 109 can mainly include storing program area And storage data field, wherein, storing program area can storage program area, application program (such as the sound needed at least one function Sound playing function, image player function etc.) etc.;Storage data field can store according to mobile phone use created data (such as Audio data, phone directory etc.) etc..In addition, memory 109 can include high-speed random access memory, can also include non-easy The property lost memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Processor 110 is the control centre of mobile terminal, utilizes each of various interfaces and the entire mobile terminal of connection A part is stored in storage by running or performing the software program being stored in memory 109 and/or module and call Data in device 109 perform the various functions of mobile terminal and processing data, so as to carry out integral monitoring to mobile terminal.Place Reason device 110 may include at least one processing unit;Preferably, processor 110 can integrate application processor and modulation /demodulation processing Device, wherein, the main processing operation system of application processor, user interface and application program etc., modem processor is mainly located Reason wireless communication.It is understood that above-mentioned modem processor can not also be integrated into processor 110.
Mobile terminal 100 can also include the power supply 111 (such as battery) powered to all parts, it is preferred that power supply 111 Can be logically contiguous by power-supply management system and processor 110, so as to realize management charging by power-supply management system, put The functions such as electricity and power managed.
Although Fig. 1 is not shown, mobile terminal 100 can also be including bluetooth module etc., and details are not described herein.
For the ease of understanding the embodiment of the present invention, below to the communications network system that is based on of mobile terminal of the present invention into Row description.
Referring to Fig. 2, Fig. 2 is a kind of communications network system Organization Chart provided in an embodiment of the present invention, the communication network system The LTE system united as universal mobile communications technology, the LTE system include the UE (User Equipment, the use that communicate connection successively Family equipment) 201, E-UTRAN (Evolved UMTS Terrestrial Radio Access Network, evolved UMTS lands Ground wireless access network) 202, EPC (Evolved Packet Core, evolved packet-based core networks) 203 and operator IP operation 204。
Specifically, UE201 can be above-mentioned terminal 100, and details are not described herein again.
E-UTRAN202 includes eNodeB2021 and other eNodeB2022 etc..Wherein, eNodeB2021 can be by returning Journey (backhaul) (such as X2 interface) is connect with other eNodeB2022, and eNodeB2021 is connected to EPC203, ENodeB2021 can provide the access of UE201 to EPC203.
EPC203 can include MME (Mobility Management Entity, mobility management entity) 2031, HSS (Home Subscriber Server, home subscriber server) 2032, other MME2033, SGW (Serving Gate Way, Gateway) 2034, PGW (PDN Gate Way, grouped data network gateway) 2035 and PCRF (Policy and Charging Rules Function, policy and rate functional entity) 2036 etc..Wherein, MME2031 be processing UE201 and The control node of signaling, provides carrying and connection management between EPC203.HSS2032 is all to manage for providing some registers Such as the function of home location register (not shown) etc, and some are preserved in relation to use such as service features, data rates The dedicated information in family.All customer data can be sent by SGW2034, and PGW2035 can provide the IP of UE 201 Address is distributed and other functions, and PCRF2036 is business data flow and the strategy of IP bearing resources and charging control strategic decision-making Point, it selects and provides available strategy and charging control decision with charge execution function unit (not shown) for strategy.
IP operation 204 can include internet, Intranet, IMS (IP Multimedia Subsystem, IP multimedia System) or other IP operations etc..
Although above-mentioned be described by taking LTE system as an example, those skilled in the art it is to be understood that the present invention not only Suitable for LTE system, be readily applicable to other wireless communication systems, such as GSM, CDMA2000, WCDMA, TD-SCDMA with And following new network system etc., it does not limit herein.
Based on above-mentioned 100 hardware configuration of mobile terminal and communications network system, each embodiment of the method for the present invention is proposed.
Refering to Fig. 3, Fig. 3 is a kind of step flow chart of cipher code protection method provided in an embodiment of the present invention, the method Applied in a mobile terminal, as shown in figure 3, the method includes:
Step 301 receives the first password for the input of target account at the interface of destination application.
In the step, the method receives is directed to the first password of target account input at the interface of destination application. In the embodiment of the present invention, user can set first password at the interface of destination application for target account, i.e. user can To input first password for target account at the password of destination application setting interface, the method receives user described The password setting interface of destination application is directed to the first password of target account input.User can also be in destination application Interface for target account input first password, for ask the target account is logged on the destination application, I.e. user can input first password in the interface for password input of destination application for target account, and the method, which receives, to be used Family is directed to the first password of target account input in the interface for password input of the target and application program.
The identification information of step 302, the identification information for obtaining the destination application and the mobile terminal.
In the step, the method obtains the identification information of the destination application and the mark of the mobile terminal Information.The identification information of the destination application can be the identification code of the destination application, it is to be understood that no Same application program corresponds to different identification codes, and the same application domain on different mobile terminal, identification code phase Together.
The identification information of the mobile terminal can be IMEI (the International Mobile of the mobile terminal Equipment Identity, International Mobile Equipment Identity code).Specifically, the method obtains the destination application The IMEI of identification code and the mobile terminal.The identification information of the mobile terminal can also be on the mobile terminal IMSI (the International of SIM (Subscriber Identification Module, user identity identification) cards Mobile Subscriber Identification Number, international mobile subscriber identification code).Specifically, the method obtains Take the identification code of the destination application and the IMSI of the SIM card of the mobile terminal.The mark letter of the mobile terminal Breath can also be the IMEI code of the mobile terminal and the IMSI of the SIM card on the mobile terminal.
Step 303, according to default mapping ruler by the first password, the destination application identification information and The identification information of the mobile terminal is mapped as the second password.
In the step, the method is according to default mapping ruler by the first password, the mark of the destination application The identification information for knowing information and the mobile terminal is mapped as the second password.Specifically, the method can be according to preset Cipher mode adds the identification information of the first password, the identification information of the destination application and the mobile terminal Close is the second password.
It is understood that in the step, for identical first password, if the identification information of the destination application And/or the identification information of the mobile terminal is different, the second password of generation differs.That is, in the step, it is described Method can will be mapped as the second different passwords for the identical first password that different application is set.
Step 304 sends second password to server.
In the step, the method sends second password to server, it is to be understood that the server can be with It is the server that service is provided for the destination application.The method sends second password to the server can be with Be the password for the target account that second password is set as the destination application by the request server or Ask the second password described in the server authentication whether the password match with the target account of the destination application.Accordingly Ground, the method can send the password setting request for carrying second password to the server, described for asking Described second setting password is set as the target account and password of the destination application by server;The method can also The Password Input that second password is carried to server transmission is asked, for asking described in the server authentication the Two passwords whether with the password match of the target account of the destination application that is stored in the server.
Specifically, if the first password that the method receives is set for user in the password of the destination application The first password that interface is directed to the input of target account is put, the method carries second password to server transmission Password setting request, for asking the server that second password is set as to the target account of the destination application Password, after the server receives password setting request, second password is set as the intended application journey The password of the target account of sequence.If the first password that the method receives is user in the close of the destination application Code input interface is directed to the first password of target account input, and to carry described second close to server transmission for the method The Password Input request of code, for ask the second password described in the server authentication whether with the institute that is stored in the server The password match of the target account of destination application is stated, after the server receives second password, verification described the Whether two passwords match with the password of the target account of the destination application stored in the server, if matching, institute Stating server allows the target account of the destination application to log in, if mismatching, the server refuses the target should It is logged in the target account of program.In this way, even if when second password is leaked in the server end, malicious person is in user Terminal inputs second password for the destination application can not also log in the target account of the destination application.
In the present embodiment, the cipher code protection method is received at the interface of destination application for the input of target account First password;Obtain the identification information of the destination application and the identification information of the mobile terminal;It is reflected according to default Rule is penetrated to map the identification information of the first password, the identification information of the destination application and the mobile terminal For the second password;Second password is sent to server.In this way, cipher code protection method provided by the invention can will be directed to not Same password with application program is mapped as different password so that and the password that server storage receives is different, in this way, Even if account and the password leakage of application program, malicious person also can not use the account of the leakage and password login to use Other accounts at family so as to effectively eliminate different application using security risk existing for identical account and password, have Effect prevents from causing damages to user.
Optionally, the identification information of the destination application includes the identification code of the destination application, wherein, no Same application program corresponds to different identification codes.
Optionally, the identification information of the mobile terminal includes the International Mobile Equipment Identity code of the mobile terminal IMEI。
Optionally, the identification information of the mobile terminal includes the user identity identification SIM card on the mobile terminal International mobile subscriber identity IMSI.
Referring to Fig. 4, Fig. 4 is the flow diagram of another cipher code protection method provided in an embodiment of the present invention, such as Fig. 4 institutes Show, the method includes:
Step 401 receives the first password for the input of target account at the password setting interface of destination application.
In the step, the method is received at the password setting interface of destination application for the of the input of target account One password.In the embodiment, user can set first password, i.e. user at the interface of destination application for target account Interface can be set to input first password for target account in the password of destination application, the method receives user in institute The password setting interface for stating destination application is directed to the first password of target account input.
The identification information of step 402, the identification information for obtaining the destination application and the mobile terminal.
In the step, the method obtains the identification information of the destination application and the mark of the mobile terminal Information.The identification information of the destination application can be the identification code of the destination application, it is to be understood that no Same application program corresponds to different identification codes, and the same application domain on different mobile terminal, identification code phase Together.
The identification information of the mobile terminal can be IMEI (the International Mobile of the mobile terminal Equipment Identity, International Mobile Equipment Identity code).Specifically, the method obtains the destination application The IMEI of identification code and the mobile terminal.The identification information of the mobile terminal can also be on the mobile terminal IMSI (the International of SIM (Subscriber Identification Module, user identity identification) cards Mobile Subscriber Identification Number, international mobile subscriber identification code).Specifically, the method obtains Take the identification code of the destination application and the IMSI of the SIM card of the mobile terminal.The mark letter of the mobile terminal Breath can also be the IMEI code of the mobile terminal and the IMSI of the SIM card on the mobile terminal.
Step 403, according to default mapping ruler by the first password, the destination application identification information and The identification information of the mobile terminal is mapped as the second password.
In the step, the method is according to default mapping ruler by the first password, the mark of the destination application The identification information for knowing information and the mobile terminal is mapped as the second password.Specifically, the method can be according to preset Cipher mode adds the identification information of the first password, the identification information of the destination application and the mobile terminal Close is the second password.
It is understood that in the step, for identical first password, if the identification information of the destination application And/or the identification information of the mobile terminal is different, the second password of generation differs.That is, in the step, it is described Method can will be mapped as the second different passwords for the identical first password that different application is set.
Step 404 sends second password to server.
In the step, the method sends second password to server, it is to be understood that the server can be with It is the server that service is provided for the destination application.In the embodiment, the first password that the method receives is uses Family is directed to the first password of target account input at the password setting interface of the destination application, and the method is to the clothes It can be that second password is set as the destination application by the request server that business device, which sends second password, Target account password.Correspondingly, the method can send the password for carrying second password to the server Setting request, for the target account that the server is asked password to be set to be set as the destination application by described second And password.
Specifically, the method can send the password setting request for carrying second password to the server, For ask the server second password is set as the destination application target account password, the clothes After business device receives the password setting request, second password is set as to the target account of the destination application Password.In this way, even if when second password is leaked in the server end, malicious person is directed to the target in user terminal Application program, which inputs second password, can not also log in the target account of the destination application.
In the present embodiment, the cipher code protection method receives the interface for password input in destination application for target account Number input first password;Obtain the identification information of the destination application and the identification information of the mobile terminal;Root According to default mapping ruler by the mark of the first password, the identification information of the destination application and the mobile terminal Information MAP is the second password;Second password is sent to server.In this way, cipher code protection method provided by the invention can be with Different password will be mapped as the same password of different application so that the mutual not phase of the password that server storage receives Together, in this way, even if account and the password leakage of application program, malicious person can not also use the account of the leakage and close Other accounts of code login user use safety existing for identical account and password so as to effectively eliminate different application Hidden danger effectively prevent causing damages to user.
Optionally, it is described to send second password to server, including:
The password that second password is carried to server transmission sets request, for asking the server by described in Second password is set as the password of the target account of the destination application.
Referring to Fig. 5, Fig. 5 is the flow diagram of another cipher code protection method provided in an embodiment of the present invention, such as Fig. 5 institutes Show, the method includes:
Step 501, reception are directed to the first password of target account input in the interface for password input of destination application.
In the step, the method receives the interface for password input in destination application for the of the input of target account One password.In the embodiment, user can input first password at the interface of destination application for target account, for asking It asks and the target account is logged on the destination application, is i.e. user can be in the interface for password input of destination application First password is inputted for target account, the method receives interface for password input needle of the user in the target and application program To the first password of target account input.
The identification information of step 502, the identification information for obtaining the destination application and the mobile terminal.
In the step, the method obtains the identification information of the destination application and the mark of the mobile terminal Information.The identification information of the destination application can be the identification code of the destination application, it is to be understood that no Same application program corresponds to different identification codes, and the same application domain on different mobile terminal, identification code phase Together.
The identification information of the mobile terminal can be IMEI (the International Mobile of the mobile terminal Equipment Identity, International Mobile Equipment Identity code).Specifically, the method obtains the destination application The IMEI of identification code and the mobile terminal.The identification information of the mobile terminal can also be on the mobile terminal IMSI (the International of SIM (Subscriber Identification Module, user identity identification) cards Mobile Subscriber Identification Number, international mobile subscriber identification code).Specifically, the method obtains Take the identification code of the destination application and the IMSI of the SIM card of the mobile terminal.The mark letter of the mobile terminal Breath can also be the IMEI code of the mobile terminal and the IMSI of the SIM card on the mobile terminal.
Step 503, according to default mapping ruler by the first password, the destination application identification information and The identification information of the mobile terminal is mapped as the second password.
In the step, the method is according to default mapping ruler by the first password, the mark of the destination application The identification information for knowing information and the mobile terminal is mapped as the second password.Specifically, the method can be according to preset Cipher mode adds the identification information of the first password, the identification information of the destination application and the mobile terminal Close is the second password.
It is understood that in the step, for identical first password, if the identification information of the destination application And/or the identification information of the mobile terminal is different, the second password of generation differs.That is, in the step, it is described Method can will be mapped as the second different passwords for the identical first password that different application is set.
Step 504 sends second password to server.
In the step, the method sends second password to server, it is to be understood that the server can be with It is the server that service is provided for the destination application.In the embodiment, the first password that the method receives The first password of target account input is directed in the interface for password input of the destination application for user, the method can be with The Password Input that second password is carried to server transmission is asked, for asking described in the server authentication the Two passwords whether with the password match of the target account of the destination application that is stored in the server.
Specifically, the method carries the Password Input request of second password to server transmission, is used for Ask the second password described in the server authentication whether with the target of the destination application that is stored in the server The password match of account after the server receives second password, is verified in second password and the server Whether the password of the target account of the destination application of storage matches, if matching, the server allows the target The target account of application program logs in, if mismatching, the target account that the server refuses the destination application logs in. In this way, even if when second password is leaked in the server end, malicious person is directed to the intended application in user terminal Program, which inputs second password, can not also log in the target account of the destination application.
In the present embodiment, the cipher code protection method receives the interface for password input in destination application for target account Number input first password;Obtain the identification information of the destination application and the identification information of the mobile terminal;Root According to default mapping ruler by the mark of the first password, the identification information of the destination application and the mobile terminal Information MAP is the second password;Second password is sent to server.In this way, cipher code protection method provided by the invention can be with Different password will be mapped as the same password of different application so that the mutual not phase of the password that server storage receives Together, in this way, even if account and the password leakage of application program, malicious person can not also use the account of the leakage and close Other accounts of code login user use safety existing for identical account and password so as to effectively eliminate different application Hidden danger effectively prevent causing damages to user.
Optionally, it is described to send second password to server, including:
The Password Input that second password is carried to server transmission is asked, for asking the server authentication institute State the second password whether with the password match of the target account of the destination application that is stored in the server.
The present invention also provides a kind of mobile terminal, referring to Fig. 6, Fig. 6 is mobile terminal provided in an embodiment of the present invention Hardware architecture diagram, as shown in fig. 6, the mobile terminal 600 includes at least one processor 601 and memory 602, institute It states memory 602 and can be used for storage software program and various data.Memory 602 can mainly include storing program area and storage Data field, wherein, storing program area can storage program area, (for example sound plays the application program needed at least one function Function, image player function etc.) etc.;Storage data field can be stored uses created data (such as audio number according to mobile phone According to, phone directory etc.) etc..In addition, memory 602 can include high-speed random access memory, non-volatile deposit can also be included Reservoir, for example, at least a disk memory, flush memory device or other volatile solid-state parts.As shown in fig. 6, institute It states mobile terminal 600 and further includes and be stored on the processor 602, and can be performed by the processor 601 at least one Computer program, at least one program realize following steps when being performed by least one processor 601:
It receives and is directed to the first password of target account input at the interface of destination application;
Obtain the identification information of the destination application and the identification information of the mobile terminal;
According to default mapping ruler by the first password, the identification information of the destination application and the movement The identification information of terminal is mapped as the second password;
Second password is sent to server.
Optionally, described receive is directed to the first password of target account input at the interface of destination application, including:
It receives and is directed to the first password of target account input at the password setting interface of destination application.
Optionally, it is described to send second password to server, including:
The password that second password is carried to server transmission sets request, for asking the server by described in Second password is set as the password of the target account of the destination application.
Optionally, described receive is directed to the first password of target account input at the interface of destination application, including:
The interface for password input received in destination application is directed to the first password of target account input.
Optionally, it is described to send second password to server, including:
The Password Input that second password is carried to server transmission is asked, for asking the server authentication institute State the second password whether with the password match of the target account of the destination application that is stored in the server.
Optionally, the identification information of the destination application includes the identification code of the destination application, wherein, no Same application program corresponds to different identification codes.
Optionally, the identification information of the mobile terminal includes the International Mobile Equipment Identity code of the mobile terminal IMEI。
Optionally, the identification information of the mobile terminal includes the user identity identification SIM card on the mobile terminal International mobile subscriber identity IMSI.
One of ordinary skill in the art will appreciate that all or part of step for realizing above-described embodiment method is can be with It is completed by the relevant hardware of at least one program instruction, at least one program can be stored in one and computer-readable deposit In storage media, which is performed, and includes the following steps:
It receives and is directed to the first password of target account input at the interface of destination application;
Obtain the identification information of the destination application and the identification information of the mobile terminal;
According to default mapping ruler by the first password, the identification information of the destination application and the movement The identification information of terminal is mapped as the second password;
Second password is sent to server.
Optionally, described receive is directed to the first password of target account input at the interface of destination application, including:
It receives and is directed to the first password of target account input at the password setting interface of destination application.
Optionally, it is described to send second password to server, including:
The password that second password is carried to server transmission sets request, for asking the server by described in Second password is set as the password of the target account of the destination application.
Optionally, described receive is directed to the first password of target account input at the interface of destination application, including:
The interface for password input received in destination application is directed to the first password of target account input.
Optionally, it is described to send second password to server, including:
The Password Input that second password is carried to server transmission is asked, for asking the server authentication institute State the second password whether with the password match of the target account of the destination application that is stored in the server.
Optionally, the identification information of the destination application includes the identification code of the destination application, wherein, no Same application program corresponds to different identification codes.
Optionally, the identification information of the mobile terminal includes the International Mobile Equipment Identity code of the mobile terminal IMEI。
Optionally, the identification information of the mobile terminal includes the user identity identification SIM card on the mobile terminal International mobile subscriber identity IMSI.
It should be noted that herein, term " comprising ", "comprising" or its any other variant are intended to non-row His property includes, so that process, method, article or device including a series of elements not only include those elements, and And it further includes other elements that are not explicitly listed or further includes intrinsic for this process, method, article or device institute Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including this Also there are other identical elements in the process of element, method, article or device.
The embodiments of the present invention are for illustration only, do not represent the quality of embodiment.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on such understanding, technical scheme of the present invention substantially in other words does the prior art Going out the part of contribution can be embodied in the form of software product, which is stored in a storage medium In (such as ROM/RAM, magnetic disc, CD), used including some instructions so that a station terminal equipment (can be mobile phone, computer takes Be engaged in device, air conditioner or the network equipment etc.) perform method described in each embodiment of the present invention.
It these are only the preferred embodiment of the present invention, be not intended to limit the scope of the invention, it is every to utilize this hair The equivalent structure or equivalent flow shift that bright specification and accompanying drawing content are made directly or indirectly is used in other relevant skills Art field, is included within the scope of the present invention.

Claims (10)

1. a kind of cipher code protection method, applied to mobile terminal, which is characterized in that the method includes:
It receives and is directed to the first password of target account input at the interface of destination application;
Obtain the identification information of the destination application and the identification information of the mobile terminal;
According to default mapping ruler by the first password, the identification information of the destination application and the mobile terminal Identification information be mapped as the second password;
Second password is sent to server.
2. cipher code protection method as described in claim 1, which is characterized in that the interface needle received in destination application To target account input first password, including:
It receives and is directed to the first password of target account input at the password setting interface of destination application.
3. cipher code protection method as claimed in claim 2, which is characterized in that it is described to send second password to server, Including:
The password that second password is carried to server transmission sets request, for asking the server by described second Password is set as the password of the target account of the destination application.
4. cipher code protection method as described in claim 1, which is characterized in that the interface needle received in destination application To target account input first password, including:
The interface for password input received in destination application is directed to the first password of target account input.
5. cipher code protection method as claimed in claim 4, which is characterized in that it is described to send second password to server, Including:
The Password Input that second password is carried to server transmission is asked, for asking described in the server authentication the Two passwords whether with the password match of the target account of the destination application that is stored in the server.
6. such as cipher code protection method described in any one of claim 1 to 5, which is characterized in that the mark of the destination application Know the identification code that information includes the destination application, wherein, different application programs corresponds to different identification codes.
7. such as cipher code protection method described in any one of claim 1 to 5, which is characterized in that the mark letter of the mobile terminal Breath includes the International Mobile Equipment Identity code IMEI of the mobile terminal.
8. such as cipher code protection method described in any one of claim 1 to 5, which is characterized in that the mark letter of the mobile terminal Breath includes the international mobile subscriber identity IMSI of the user identity identification SIM card on the mobile terminal.
9. a kind of mobile terminal, which is characterized in that the mobile terminal includes memory, at least one processor and is stored in institute At least one program stated on memory and can performed at least one processor, at least one program by it is described extremely A few processor realizes the step in 1~8 any one of them method of the claims when performing.
10. a kind of computer readable storage medium, the computer-readable recording medium storage has computer to can perform at least One program, which is characterized in that at least one program makes the computer perform above-mentioned power when being performed by the computer Profit requires the step in 1~8 any one of them method.
CN201711464780.5A 2017-12-28 2017-12-28 A kind of cipher code protection method, mobile terminal and computer readable storage medium Withdrawn CN108197461A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711464780.5A CN108197461A (en) 2017-12-28 2017-12-28 A kind of cipher code protection method, mobile terminal and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711464780.5A CN108197461A (en) 2017-12-28 2017-12-28 A kind of cipher code protection method, mobile terminal and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN108197461A true CN108197461A (en) 2018-06-22

Family

ID=62585629

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711464780.5A Withdrawn CN108197461A (en) 2017-12-28 2017-12-28 A kind of cipher code protection method, mobile terminal and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN108197461A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104091134A (en) * 2014-07-16 2014-10-08 谭皓文 Password inputting method with combination of safety and convenience
KR101473640B1 (en) * 2014-01-08 2014-12-17 주식회사 네오패드 Touch device and method for password generating on touch device
CN105812140A (en) * 2014-12-31 2016-07-27 上海庆科信息技术有限公司 Authorization access method
CN105844145A (en) * 2016-04-19 2016-08-10 广州三星通信技术研究有限公司 Method and equipment for managing passwords
CN106453245A (en) * 2016-08-30 2017-02-22 北京小米移动软件有限公司 Method and apparatus for verifying identity
CN106549759A (en) * 2015-09-16 2017-03-29 阿里巴巴集团控股有限公司 Identity identifying method and device
CN107315610A (en) * 2017-06-21 2017-11-03 深圳白骑士大数据有限公司 Realize method, device and the computer-readable recording medium of cryptographic function

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101473640B1 (en) * 2014-01-08 2014-12-17 주식회사 네오패드 Touch device and method for password generating on touch device
CN104091134A (en) * 2014-07-16 2014-10-08 谭皓文 Password inputting method with combination of safety and convenience
CN105812140A (en) * 2014-12-31 2016-07-27 上海庆科信息技术有限公司 Authorization access method
CN106549759A (en) * 2015-09-16 2017-03-29 阿里巴巴集团控股有限公司 Identity identifying method and device
CN105844145A (en) * 2016-04-19 2016-08-10 广州三星通信技术研究有限公司 Method and equipment for managing passwords
CN106453245A (en) * 2016-08-30 2017-02-22 北京小米移动软件有限公司 Method and apparatus for verifying identity
CN107315610A (en) * 2017-06-21 2017-11-03 深圳白骑士大数据有限公司 Realize method, device and the computer-readable recording medium of cryptographic function

Similar Documents

Publication Publication Date Title
CN107527200A (en) A kind of payment management method, mobile terminal and computer-readable recording medium
CN109558718A (en) Application program login method, computer end, mobile terminal, system and storage medium
CN107395850A (en) A kind of social communication information guard method, device and computer-readable recording medium
CN108282771A (en) A kind of network access management method, mobile terminal and computer readable storage medium
CN107734128A (en) One kind swindle number identification method and equipment
CN109800602A (en) Method for secret protection, mobile terminal and computer readable storage medium
CN108196762A (en) A kind of terminal control method, terminal and computer readable storage medium
CN107896287A (en) Phone number risk monitoring method and mobile terminal
CN107343272A (en) A kind of data traffic sharing method and mobile terminal
CN107240157A (en) Near-field communication method of controlling security, mobile terminal and computer-readable recording medium
CN107846675A (en) Register method, terminal, registrar and computer-readable recording medium
CN108011887A (en) A kind of account management method and equipment
CN107276991A (en) Load method, equipment and the computer-readable recording medium of Web page
CN108012270A (en) A kind of method of information processing, equipment and computer-readable recording medium
CN107347117A (en) A kind of message management method, mobile terminal and computer-readable recording medium
CN107330313A (en) Application control method, mobile terminal and readable storage medium storing program for executing
CN108012029A (en) A kind of information processing method, equipment and computer-readable recording medium
CN108062669A (en) A kind of method of payment, terminal and computer readable storage medium
CN107330314A (en) Authorization method, mobile terminal and readable storage medium storing program for executing based on biological characteristic
CN107346392A (en) Terminal system change recognition methods, device and readable storage medium storing program for executing
CN108650281A (en) A kind of data managing method, device and computer readable storage medium
CN108366303A (en) A kind of video broadcasting method, mobile terminal and computer readable storage medium
CN108196773A (en) Control method, terminal and the computer readable storage medium of flexible screen terminal
CN107194217A (en) User data access control method, equipment and computer-readable recording medium
CN106888225A (en) A kind of control method of single-sign-on application, mobile terminal and computer-readable medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20180622