CN108197461A - A kind of cipher code protection method, mobile terminal and computer readable storage medium - Google Patents
A kind of cipher code protection method, mobile terminal and computer readable storage medium Download PDFInfo
- Publication number
- CN108197461A CN108197461A CN201711464780.5A CN201711464780A CN108197461A CN 108197461 A CN108197461 A CN 108197461A CN 201711464780 A CN201711464780 A CN 201711464780A CN 108197461 A CN108197461 A CN 108197461A
- Authority
- CN
- China
- Prior art keywords
- password
- mobile terminal
- destination application
- server
- identification information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Telephone Function (AREA)
Abstract
The invention discloses a kind of cipher code protection method, the method includes:It receives and is directed to the first password of target account input at the interface of destination application;Obtain the identification information of the destination application and the identification information of the mobile terminal;The identification information of the first password, the identification information of the destination application and the mobile terminal is mapped as by the second password according to default mapping ruler;Second password is sent to server.In addition, invention additionally discloses a kind of mobile terminal and computer readable storage mediums.In this way; cipher code protection method provided by the invention can will be mapped as different password for the same password of different application; so that the password that server storage receives is different; in this way; even if account and the password leakage of application program; malicious person can not also use the account of the leakage and other accounts of password login user, so as to effectively prevent causing damages to user.
Description
Technical field
The present invention relates to a kind of Ciphor safety technology field more particularly to cipher code protection method, mobile terminal and computers
Readable storage medium storing program for executing.
Background technology
With the continuous development of electronic technology, mobile terminal (such as smart mobile phone, tablet computer etc.) is to people’s lives
And work brings very big convenience.People are required for registering the account of various application programs respectively, for different
Application program, people may use same information as account information, such as all use phone number as account, for close
Code, remembers for convenience, and people also tend to set identical password.
So, if the account of a certain application program (such as shared bicycle account) and password leakage, malicious person can
With the account and other accounts (such as Web bank's account) of password login user revealed according to this, easily caused to user
Loss.As it can be seen that in the prior art, there are larger security risks using identical account and password for different application.
Invention content
In view of this, the present invention proposes a kind of cipher code protection method, mobile terminal and computer readable storage medium, with solution
Certainly above-mentioned technical problem.
First, to achieve the above object, the present invention proposes a kind of cipher code protection method, applied to mobile terminal, the side
Method includes:
It receives and is directed to the first password of target account input at the interface of destination application;
Obtain the identification information of the destination application and the identification information of the mobile terminal;
According to default mapping ruler by the first password, the identification information of the destination application and the movement
The identification information of terminal is mapped as the second password;
Second password is sent to server.
Optionally, described receive is directed to the first password of target account input at the interface of destination application, including:
It receives and is directed to the first password of target account input at the password setting interface of destination application.
Optionally, it is described to send second password to server, including:
The password that second password is carried to server transmission sets request, for asking the server by described in
Second password is set as the password of the target account of the destination application.
Optionally, described receive is directed to the first password of target account input at the interface of destination application, including:
The interface for password input received in destination application is directed to the first password of target account input.
Optionally, it is described to send second password to server, including:
The Password Input that second password is carried to server transmission is asked, for asking the server authentication institute
State the second password whether with the password match of the target account of the destination application that is stored in the server.
Optionally, the identification information of the destination application includes the identification code of the destination application, wherein, no
Same application program corresponds to different identification codes.
Optionally, the identification information of the mobile terminal includes the International Mobile Equipment Identity code of the mobile terminal
IMEI。
Optionally, the identification information of the mobile terminal includes the user identity identification SIM card on the mobile terminal
International mobile subscriber identity IMSI.
Further, to achieve the above object, the present invention also provides a kind of mobile terminal, the mobile terminal includes storage
Device, at least one processor and at least one journey that is stored on the memory and can be performed at least one processor
Sequence, at least one program realize the step in method described in any one of the above embodiments when being performed by least one processor
Suddenly.
Further, to achieve the above object, the present invention also provides a kind of computer readable storage medium, the computers
Readable storage medium storing program for executing is stored at least one program that computer can perform, and at least one program is performed by the computer
When the computer is made to perform the step in the above method.
Compared to the prior art, cipher code protection method proposed by the invention reception is directed at the interface of destination application
The first password of target account input;Obtain the identification information of the destination application and the mark letter of the mobile terminal
Breath;According to default mapping ruler by the first password, the identification information of the destination application and the mobile terminal
Identification information be mapped as the second password;Second password is sent to server.In this way, cryptoguard side provided by the invention
Method can will be mapped as different password for the same password of different application so that the password that server storage receives
It is different, in this way, even if account and the password leakage of application program, malicious person can not also use the account of the leakage
And other accounts of password login user, existed so as to effectively eliminate different application using identical account and password
Security risk, effectively prevent causing damages to user.
Description of the drawings
Fig. 1 is a kind of hardware architecture diagram for the mobile terminal for realizing each embodiment of the present invention;
Fig. 2 is a kind of communications network system Organization Chart provided in an embodiment of the present invention;
Fig. 3 is a kind of flow diagram of cipher code protection method provided in an embodiment of the present invention;
Fig. 4 is the flow diagram of another cipher code protection method provided in an embodiment of the present invention;
Fig. 5 is the flow diagram of another cipher code protection method provided in an embodiment of the present invention;
Fig. 6 is a kind of hardware architecture diagram of mobile terminal provided in an embodiment of the present invention;
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
In subsequent description, using for representing that the suffix of such as " module ", " component " or " unit " of element is only
Be conducive to the explanation of the present invention, itself there is no a specific meaning.Therefore, " module ", " component " or " unit " can mix
Ground uses.
Terminal can be implemented in a variety of manners.For example, terminal described in the present invention can include such as mobile phone, tablet
Computer, laptop, palm PC, personal digital assistant (Personal Digital Assistant, PDA), portable
The shiftings such as media player (Portable Media Player, PMP), navigation device, wearable device, Intelligent bracelet, pedometer
The dynamic fixed terminals such as terminal and number TV, desktop computer.
It will be illustrated by taking mobile terminal as an example in subsequent descriptions, it will be appreciated by those skilled in the art that in addition to special
For moving except the element of purpose, construction according to the embodiment of the present invention can also apply to the terminal of fixed type.
Referring to Fig. 1, a kind of hardware architecture diagram of its mobile terminal of each embodiment to realize the present invention, the shifting
Dynamic terminal 100 can include:RF (Radio Frequency, radio frequency) unit 101, WiFi module 102, audio output unit
103rd, A/V (audio/video) input unit 104, sensor 105, display unit 106, user input unit 107, interface unit
108th, the components such as memory 109, processor 110 and power supply 111, the number of the processor 110 is at least one.Ability
Field technique personnel are appreciated that the mobile terminal structure shown in Fig. 1 does not form the restriction to mobile terminal, and mobile terminal can
To include either combining certain components or different components arrangement than illustrating more or fewer components.
The all parts of mobile terminal are specifically introduced with reference to Fig. 1:
Radio frequency unit 101 can be used for receive and send messages or communication process in, signal sends and receivees, specifically, by base station
Downlink information receive after, handled to processor 110;In addition, the data of uplink are sent to base station.In general, radio frequency unit 101
Including but not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier, duplexer etc..In addition, it penetrates
Frequency unit 101 can also communicate with network and other equipment by radio communication.Above-mentioned wireless communication can use any communication
Standard or agreement, including but not limited to GSM (Global System of Mobile communication, global system for mobile telecommunications
System), GPRS (General Packet Radio Service, general packet radio service), CDMA2000 (Code
Division Multiple Access 2000, CDMA 2000), WCDMA (Wideband Code Division
Multiple Access, wideband code division multiple access), TD-SCDMA (Time Division-Synchronous Code
Division Multiple Access, TD SDMA), FDD-LTE (Frequency Division
Duplexing-Long Term Evolution, frequency division duplex long term evolution) and TDD-LTE (Time Division
Duplexing-Long Term Evolution, time division duplex long term evolution) etc..
WiFi belongs to short range wireless transmission technology, and mobile terminal can help user to receive and dispatch electricity by WiFi module 102
Sub- mail, browsing webpage and access streaming video etc., it has provided wireless broadband internet to the user and has accessed.Although Fig. 1 shows
Go out WiFi module 102, but it is understood that, and must be configured into for mobile terminal is not belonging to, it completely can be according to need
It to be omitted in the range for the essence for not changing invention.
Audio output unit 103 can be in call signal reception pattern, call mode, record mould in mobile terminal 100
Formula, speech recognition mode, broadcast reception mode when under isotypes, it is that radio frequency unit 101 or WiFi module 102 are received or
The audio data stored in memory 109 is converted into audio signal and exports as sound.Moreover, audio output unit 103
The relevant audio output of specific function performed with mobile terminal 100 can also be provided (for example, call signal receives sound, disappears
Breath receives sound etc.).Audio output unit 103 can include loud speaker, buzzer etc..
A/V input units 104 are used to receive audio or video signal.A/V input units 104 can include graphics processor
(Graphics Processing Unit, GPU) 1041 and microphone 1042, graphics processor 1041 is in video acquisition mode
Or the static images or the image data of video obtained in image capture mode by image capture apparatus (such as camera) carry out
Reason.Treated, and picture frame may be displayed on display unit 106.Through graphics processor 1041, treated that picture frame can be deposited
Storage is sent in memory 109 (or other storage mediums) or via radio frequency unit 101 or WiFi module 102.Mike
Wind 1042 can connect in telephone calling model, logging mode, speech recognition mode etc. operational mode via microphone 1042
Quiet down sound (audio data), and can be audio data by such acoustic processing.Audio that treated (voice) data can
To be converted to the form output that mobile communication base station can be sent to via radio frequency unit 101 in the case of telephone calling model.
Microphone 1042 can implement various types of noises elimination (or inhibition) algorithms and send and receive sound to eliminate (or inhibition)
The noise generated during frequency signal or interference.
Mobile terminal 100 further includes at least one sensor 105, such as optical sensor, motion sensor and other biographies
Sensor.Specifically, optical sensor includes ambient light sensor and proximity sensor, wherein, ambient light sensor can be according to environment
The light and shade of light adjusts the brightness of display panel 1061, and proximity sensor can close when mobile terminal 100 is moved in one's ear
Display panel 1061 and/or backlight.As one kind of motion sensor, accelerometer sensor can detect in all directions (general
For three axis) size of acceleration, size and the direction of gravity are can detect that when static, can be used to identify the application of mobile phone posture
(such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, percussion) etc.;
The fingerprint sensor that can also configure as mobile phone, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer,
The other sensors such as hygrometer, thermometer, infrared ray sensor, details are not described herein.
Display unit 106 is used to show by information input by user or be supplied to the information of user.Display unit 106 can wrap
Display panel 1061 is included, liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode may be used
Display panel 1061 is configured in forms such as (Organic Light-Emitting Diode, OLED).
User input unit 107 can be used for receiving the number inputted or character information and generation and the use of mobile terminal
The key signals input that family is set and function control is related.Specifically, user input unit 107 may include touch panel 1071 with
And other input equipments 1072.Touch panel 1071, also referred to as touch screen collect user on it or neighbouring touch operation
(for example user uses any suitable objects such as finger, stylus or attachment on touch panel 1071 or in touch panel 1071
Neighbouring operation), and corresponding attachment device is driven according to preset formula.Touch panel 1071 may include touch detection
Two parts of device and touch controller.Wherein, the touch orientation of touch detecting apparatus detection user, and detect touch operation band
The signal come, transmits a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and by it
Contact coordinate is converted into, then gives processor 110, and the order that processor 110 is sent can be received and performed.It in addition, can
To realize touch panel 1071 using multiple types such as resistance-type, condenser type, infrared ray and surface acoustic waves.In addition to touch panel
1071, user input unit 107 can also include other input equipments 1072.Specifically, other input equipments 1072 can wrap
It includes but is not limited to physical keyboard, in function key (such as volume control button, switch key etc.), trace ball, mouse, operating lever etc.
It is one or more, do not limit herein specifically.
Further, touch panel 1071 can cover display panel 1061, when touch panel 1071 detect on it or
After neighbouring touch operation, processor 110 is sent to determine the type of touch event, is followed by subsequent processing device 110 according to touch thing
The type of part provides corresponding visual output on display panel 1061.Although in Fig. 1, touch panel 1071 and display panel
1061 be the component independent as two to realize the function that outputs and inputs of mobile terminal, but in certain embodiments, it can
The function that outputs and inputs of mobile terminal is realized so that touch panel 1071 and display panel 1061 is integrated, is not done herein specifically
It limits.
Interface unit 108 be used as at least one external device (ED) connect with mobile terminal 100 can by interface.For example,
External device (ED) can include wired or wireless head-band earphone port, external power supply (or battery charger) port, wired or nothing
Line data port, memory card port, the port for device of the connection with identification module, audio input/output (I/O) end
Mouth, video i/o port, ear port etc..Interface unit 108 can be used for receiving the input from external device (ED) (for example, number
It is believed that breath, electric power etc.) and at least one element that the input received is transferred in mobile terminal 100 or can use
In transmitting data between mobile terminal 100 and external device (ED).
Memory 109 can be used for storage software program and various data.Memory 109 can mainly include storing program area
And storage data field, wherein, storing program area can storage program area, application program (such as the sound needed at least one function
Sound playing function, image player function etc.) etc.;Storage data field can store according to mobile phone use created data (such as
Audio data, phone directory etc.) etc..In addition, memory 109 can include high-speed random access memory, can also include non-easy
The property lost memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Processor 110 is the control centre of mobile terminal, utilizes each of various interfaces and the entire mobile terminal of connection
A part is stored in storage by running or performing the software program being stored in memory 109 and/or module and call
Data in device 109 perform the various functions of mobile terminal and processing data, so as to carry out integral monitoring to mobile terminal.Place
Reason device 110 may include at least one processing unit;Preferably, processor 110 can integrate application processor and modulation /demodulation processing
Device, wherein, the main processing operation system of application processor, user interface and application program etc., modem processor is mainly located
Reason wireless communication.It is understood that above-mentioned modem processor can not also be integrated into processor 110.
Mobile terminal 100 can also include the power supply 111 (such as battery) powered to all parts, it is preferred that power supply 111
Can be logically contiguous by power-supply management system and processor 110, so as to realize management charging by power-supply management system, put
The functions such as electricity and power managed.
Although Fig. 1 is not shown, mobile terminal 100 can also be including bluetooth module etc., and details are not described herein.
For the ease of understanding the embodiment of the present invention, below to the communications network system that is based on of mobile terminal of the present invention into
Row description.
Referring to Fig. 2, Fig. 2 is a kind of communications network system Organization Chart provided in an embodiment of the present invention, the communication network system
The LTE system united as universal mobile communications technology, the LTE system include the UE (User Equipment, the use that communicate connection successively
Family equipment) 201, E-UTRAN (Evolved UMTS Terrestrial Radio Access Network, evolved UMTS lands
Ground wireless access network) 202, EPC (Evolved Packet Core, evolved packet-based core networks) 203 and operator IP operation
204。
Specifically, UE201 can be above-mentioned terminal 100, and details are not described herein again.
E-UTRAN202 includes eNodeB2021 and other eNodeB2022 etc..Wherein, eNodeB2021 can be by returning
Journey (backhaul) (such as X2 interface) is connect with other eNodeB2022, and eNodeB2021 is connected to EPC203,
ENodeB2021 can provide the access of UE201 to EPC203.
EPC203 can include MME (Mobility Management Entity, mobility management entity) 2031, HSS
(Home Subscriber Server, home subscriber server) 2032, other MME2033, SGW (Serving Gate Way,
Gateway) 2034, PGW (PDN Gate Way, grouped data network gateway) 2035 and PCRF (Policy and
Charging Rules Function, policy and rate functional entity) 2036 etc..Wherein, MME2031 be processing UE201 and
The control node of signaling, provides carrying and connection management between EPC203.HSS2032 is all to manage for providing some registers
Such as the function of home location register (not shown) etc, and some are preserved in relation to use such as service features, data rates
The dedicated information in family.All customer data can be sent by SGW2034, and PGW2035 can provide the IP of UE 201
Address is distributed and other functions, and PCRF2036 is business data flow and the strategy of IP bearing resources and charging control strategic decision-making
Point, it selects and provides available strategy and charging control decision with charge execution function unit (not shown) for strategy.
IP operation 204 can include internet, Intranet, IMS (IP Multimedia Subsystem, IP multimedia
System) or other IP operations etc..
Although above-mentioned be described by taking LTE system as an example, those skilled in the art it is to be understood that the present invention not only
Suitable for LTE system, be readily applicable to other wireless communication systems, such as GSM, CDMA2000, WCDMA, TD-SCDMA with
And following new network system etc., it does not limit herein.
Based on above-mentioned 100 hardware configuration of mobile terminal and communications network system, each embodiment of the method for the present invention is proposed.
Refering to Fig. 3, Fig. 3 is a kind of step flow chart of cipher code protection method provided in an embodiment of the present invention, the method
Applied in a mobile terminal, as shown in figure 3, the method includes:
Step 301 receives the first password for the input of target account at the interface of destination application.
In the step, the method receives is directed to the first password of target account input at the interface of destination application.
In the embodiment of the present invention, user can set first password at the interface of destination application for target account, i.e. user can
To input first password for target account at the password of destination application setting interface, the method receives user described
The password setting interface of destination application is directed to the first password of target account input.User can also be in destination application
Interface for target account input first password, for ask the target account is logged on the destination application,
I.e. user can input first password in the interface for password input of destination application for target account, and the method, which receives, to be used
Family is directed to the first password of target account input in the interface for password input of the target and application program.
The identification information of step 302, the identification information for obtaining the destination application and the mobile terminal.
In the step, the method obtains the identification information of the destination application and the mark of the mobile terminal
Information.The identification information of the destination application can be the identification code of the destination application, it is to be understood that no
Same application program corresponds to different identification codes, and the same application domain on different mobile terminal, identification code phase
Together.
The identification information of the mobile terminal can be IMEI (the International Mobile of the mobile terminal
Equipment Identity, International Mobile Equipment Identity code).Specifically, the method obtains the destination application
The IMEI of identification code and the mobile terminal.The identification information of the mobile terminal can also be on the mobile terminal
IMSI (the International of SIM (Subscriber Identification Module, user identity identification) cards
Mobile Subscriber Identification Number, international mobile subscriber identification code).Specifically, the method obtains
Take the identification code of the destination application and the IMSI of the SIM card of the mobile terminal.The mark letter of the mobile terminal
Breath can also be the IMEI code of the mobile terminal and the IMSI of the SIM card on the mobile terminal.
Step 303, according to default mapping ruler by the first password, the destination application identification information and
The identification information of the mobile terminal is mapped as the second password.
In the step, the method is according to default mapping ruler by the first password, the mark of the destination application
The identification information for knowing information and the mobile terminal is mapped as the second password.Specifically, the method can be according to preset
Cipher mode adds the identification information of the first password, the identification information of the destination application and the mobile terminal
Close is the second password.
It is understood that in the step, for identical first password, if the identification information of the destination application
And/or the identification information of the mobile terminal is different, the second password of generation differs.That is, in the step, it is described
Method can will be mapped as the second different passwords for the identical first password that different application is set.
Step 304 sends second password to server.
In the step, the method sends second password to server, it is to be understood that the server can be with
It is the server that service is provided for the destination application.The method sends second password to the server can be with
Be the password for the target account that second password is set as the destination application by the request server or
Ask the second password described in the server authentication whether the password match with the target account of the destination application.Accordingly
Ground, the method can send the password setting request for carrying second password to the server, described for asking
Described second setting password is set as the target account and password of the destination application by server;The method can also
The Password Input that second password is carried to server transmission is asked, for asking described in the server authentication the
Two passwords whether with the password match of the target account of the destination application that is stored in the server.
Specifically, if the first password that the method receives is set for user in the password of the destination application
The first password that interface is directed to the input of target account is put, the method carries second password to server transmission
Password setting request, for asking the server that second password is set as to the target account of the destination application
Password, after the server receives password setting request, second password is set as the intended application journey
The password of the target account of sequence.If the first password that the method receives is user in the close of the destination application
Code input interface is directed to the first password of target account input, and to carry described second close to server transmission for the method
The Password Input request of code, for ask the second password described in the server authentication whether with the institute that is stored in the server
The password match of the target account of destination application is stated, after the server receives second password, verification described the
Whether two passwords match with the password of the target account of the destination application stored in the server, if matching, institute
Stating server allows the target account of the destination application to log in, if mismatching, the server refuses the target should
It is logged in the target account of program.In this way, even if when second password is leaked in the server end, malicious person is in user
Terminal inputs second password for the destination application can not also log in the target account of the destination application.
In the present embodiment, the cipher code protection method is received at the interface of destination application for the input of target account
First password;Obtain the identification information of the destination application and the identification information of the mobile terminal;It is reflected according to default
Rule is penetrated to map the identification information of the first password, the identification information of the destination application and the mobile terminal
For the second password;Second password is sent to server.In this way, cipher code protection method provided by the invention can will be directed to not
Same password with application program is mapped as different password so that and the password that server storage receives is different, in this way,
Even if account and the password leakage of application program, malicious person also can not use the account of the leakage and password login to use
Other accounts at family so as to effectively eliminate different application using security risk existing for identical account and password, have
Effect prevents from causing damages to user.
Optionally, the identification information of the destination application includes the identification code of the destination application, wherein, no
Same application program corresponds to different identification codes.
Optionally, the identification information of the mobile terminal includes the International Mobile Equipment Identity code of the mobile terminal
IMEI。
Optionally, the identification information of the mobile terminal includes the user identity identification SIM card on the mobile terminal
International mobile subscriber identity IMSI.
Referring to Fig. 4, Fig. 4 is the flow diagram of another cipher code protection method provided in an embodiment of the present invention, such as Fig. 4 institutes
Show, the method includes:
Step 401 receives the first password for the input of target account at the password setting interface of destination application.
In the step, the method is received at the password setting interface of destination application for the of the input of target account
One password.In the embodiment, user can set first password, i.e. user at the interface of destination application for target account
Interface can be set to input first password for target account in the password of destination application, the method receives user in institute
The password setting interface for stating destination application is directed to the first password of target account input.
The identification information of step 402, the identification information for obtaining the destination application and the mobile terminal.
In the step, the method obtains the identification information of the destination application and the mark of the mobile terminal
Information.The identification information of the destination application can be the identification code of the destination application, it is to be understood that no
Same application program corresponds to different identification codes, and the same application domain on different mobile terminal, identification code phase
Together.
The identification information of the mobile terminal can be IMEI (the International Mobile of the mobile terminal
Equipment Identity, International Mobile Equipment Identity code).Specifically, the method obtains the destination application
The IMEI of identification code and the mobile terminal.The identification information of the mobile terminal can also be on the mobile terminal
IMSI (the International of SIM (Subscriber Identification Module, user identity identification) cards
Mobile Subscriber Identification Number, international mobile subscriber identification code).Specifically, the method obtains
Take the identification code of the destination application and the IMSI of the SIM card of the mobile terminal.The mark letter of the mobile terminal
Breath can also be the IMEI code of the mobile terminal and the IMSI of the SIM card on the mobile terminal.
Step 403, according to default mapping ruler by the first password, the destination application identification information and
The identification information of the mobile terminal is mapped as the second password.
In the step, the method is according to default mapping ruler by the first password, the mark of the destination application
The identification information for knowing information and the mobile terminal is mapped as the second password.Specifically, the method can be according to preset
Cipher mode adds the identification information of the first password, the identification information of the destination application and the mobile terminal
Close is the second password.
It is understood that in the step, for identical first password, if the identification information of the destination application
And/or the identification information of the mobile terminal is different, the second password of generation differs.That is, in the step, it is described
Method can will be mapped as the second different passwords for the identical first password that different application is set.
Step 404 sends second password to server.
In the step, the method sends second password to server, it is to be understood that the server can be with
It is the server that service is provided for the destination application.In the embodiment, the first password that the method receives is uses
Family is directed to the first password of target account input at the password setting interface of the destination application, and the method is to the clothes
It can be that second password is set as the destination application by the request server that business device, which sends second password,
Target account password.Correspondingly, the method can send the password for carrying second password to the server
Setting request, for the target account that the server is asked password to be set to be set as the destination application by described second
And password.
Specifically, the method can send the password setting request for carrying second password to the server,
For ask the server second password is set as the destination application target account password, the clothes
After business device receives the password setting request, second password is set as to the target account of the destination application
Password.In this way, even if when second password is leaked in the server end, malicious person is directed to the target in user terminal
Application program, which inputs second password, can not also log in the target account of the destination application.
In the present embodiment, the cipher code protection method receives the interface for password input in destination application for target account
Number input first password;Obtain the identification information of the destination application and the identification information of the mobile terminal;Root
According to default mapping ruler by the mark of the first password, the identification information of the destination application and the mobile terminal
Information MAP is the second password;Second password is sent to server.In this way, cipher code protection method provided by the invention can be with
Different password will be mapped as the same password of different application so that the mutual not phase of the password that server storage receives
Together, in this way, even if account and the password leakage of application program, malicious person can not also use the account of the leakage and close
Other accounts of code login user use safety existing for identical account and password so as to effectively eliminate different application
Hidden danger effectively prevent causing damages to user.
Optionally, it is described to send second password to server, including:
The password that second password is carried to server transmission sets request, for asking the server by described in
Second password is set as the password of the target account of the destination application.
Referring to Fig. 5, Fig. 5 is the flow diagram of another cipher code protection method provided in an embodiment of the present invention, such as Fig. 5 institutes
Show, the method includes:
Step 501, reception are directed to the first password of target account input in the interface for password input of destination application.
In the step, the method receives the interface for password input in destination application for the of the input of target account
One password.In the embodiment, user can input first password at the interface of destination application for target account, for asking
It asks and the target account is logged on the destination application, is i.e. user can be in the interface for password input of destination application
First password is inputted for target account, the method receives interface for password input needle of the user in the target and application program
To the first password of target account input.
The identification information of step 502, the identification information for obtaining the destination application and the mobile terminal.
In the step, the method obtains the identification information of the destination application and the mark of the mobile terminal
Information.The identification information of the destination application can be the identification code of the destination application, it is to be understood that no
Same application program corresponds to different identification codes, and the same application domain on different mobile terminal, identification code phase
Together.
The identification information of the mobile terminal can be IMEI (the International Mobile of the mobile terminal
Equipment Identity, International Mobile Equipment Identity code).Specifically, the method obtains the destination application
The IMEI of identification code and the mobile terminal.The identification information of the mobile terminal can also be on the mobile terminal
IMSI (the International of SIM (Subscriber Identification Module, user identity identification) cards
Mobile Subscriber Identification Number, international mobile subscriber identification code).Specifically, the method obtains
Take the identification code of the destination application and the IMSI of the SIM card of the mobile terminal.The mark letter of the mobile terminal
Breath can also be the IMEI code of the mobile terminal and the IMSI of the SIM card on the mobile terminal.
Step 503, according to default mapping ruler by the first password, the destination application identification information and
The identification information of the mobile terminal is mapped as the second password.
In the step, the method is according to default mapping ruler by the first password, the mark of the destination application
The identification information for knowing information and the mobile terminal is mapped as the second password.Specifically, the method can be according to preset
Cipher mode adds the identification information of the first password, the identification information of the destination application and the mobile terminal
Close is the second password.
It is understood that in the step, for identical first password, if the identification information of the destination application
And/or the identification information of the mobile terminal is different, the second password of generation differs.That is, in the step, it is described
Method can will be mapped as the second different passwords for the identical first password that different application is set.
Step 504 sends second password to server.
In the step, the method sends second password to server, it is to be understood that the server can be with
It is the server that service is provided for the destination application.In the embodiment, the first password that the method receives
The first password of target account input is directed in the interface for password input of the destination application for user, the method can be with
The Password Input that second password is carried to server transmission is asked, for asking described in the server authentication the
Two passwords whether with the password match of the target account of the destination application that is stored in the server.
Specifically, the method carries the Password Input request of second password to server transmission, is used for
Ask the second password described in the server authentication whether with the target of the destination application that is stored in the server
The password match of account after the server receives second password, is verified in second password and the server
Whether the password of the target account of the destination application of storage matches, if matching, the server allows the target
The target account of application program logs in, if mismatching, the target account that the server refuses the destination application logs in.
In this way, even if when second password is leaked in the server end, malicious person is directed to the intended application in user terminal
Program, which inputs second password, can not also log in the target account of the destination application.
In the present embodiment, the cipher code protection method receives the interface for password input in destination application for target account
Number input first password;Obtain the identification information of the destination application and the identification information of the mobile terminal;Root
According to default mapping ruler by the mark of the first password, the identification information of the destination application and the mobile terminal
Information MAP is the second password;Second password is sent to server.In this way, cipher code protection method provided by the invention can be with
Different password will be mapped as the same password of different application so that the mutual not phase of the password that server storage receives
Together, in this way, even if account and the password leakage of application program, malicious person can not also use the account of the leakage and close
Other accounts of code login user use safety existing for identical account and password so as to effectively eliminate different application
Hidden danger effectively prevent causing damages to user.
Optionally, it is described to send second password to server, including:
The Password Input that second password is carried to server transmission is asked, for asking the server authentication institute
State the second password whether with the password match of the target account of the destination application that is stored in the server.
The present invention also provides a kind of mobile terminal, referring to Fig. 6, Fig. 6 is mobile terminal provided in an embodiment of the present invention
Hardware architecture diagram, as shown in fig. 6, the mobile terminal 600 includes at least one processor 601 and memory 602, institute
It states memory 602 and can be used for storage software program and various data.Memory 602 can mainly include storing program area and storage
Data field, wherein, storing program area can storage program area, (for example sound plays the application program needed at least one function
Function, image player function etc.) etc.;Storage data field can be stored uses created data (such as audio number according to mobile phone
According to, phone directory etc.) etc..In addition, memory 602 can include high-speed random access memory, non-volatile deposit can also be included
Reservoir, for example, at least a disk memory, flush memory device or other volatile solid-state parts.As shown in fig. 6, institute
It states mobile terminal 600 and further includes and be stored on the processor 602, and can be performed by the processor 601 at least one
Computer program, at least one program realize following steps when being performed by least one processor 601:
It receives and is directed to the first password of target account input at the interface of destination application;
Obtain the identification information of the destination application and the identification information of the mobile terminal;
According to default mapping ruler by the first password, the identification information of the destination application and the movement
The identification information of terminal is mapped as the second password;
Second password is sent to server.
Optionally, described receive is directed to the first password of target account input at the interface of destination application, including:
It receives and is directed to the first password of target account input at the password setting interface of destination application.
Optionally, it is described to send second password to server, including:
The password that second password is carried to server transmission sets request, for asking the server by described in
Second password is set as the password of the target account of the destination application.
Optionally, described receive is directed to the first password of target account input at the interface of destination application, including:
The interface for password input received in destination application is directed to the first password of target account input.
Optionally, it is described to send second password to server, including:
The Password Input that second password is carried to server transmission is asked, for asking the server authentication institute
State the second password whether with the password match of the target account of the destination application that is stored in the server.
Optionally, the identification information of the destination application includes the identification code of the destination application, wherein, no
Same application program corresponds to different identification codes.
Optionally, the identification information of the mobile terminal includes the International Mobile Equipment Identity code of the mobile terminal
IMEI。
Optionally, the identification information of the mobile terminal includes the user identity identification SIM card on the mobile terminal
International mobile subscriber identity IMSI.
One of ordinary skill in the art will appreciate that all or part of step for realizing above-described embodiment method is can be with
It is completed by the relevant hardware of at least one program instruction, at least one program can be stored in one and computer-readable deposit
In storage media, which is performed, and includes the following steps:
It receives and is directed to the first password of target account input at the interface of destination application;
Obtain the identification information of the destination application and the identification information of the mobile terminal;
According to default mapping ruler by the first password, the identification information of the destination application and the movement
The identification information of terminal is mapped as the second password;
Second password is sent to server.
Optionally, described receive is directed to the first password of target account input at the interface of destination application, including:
It receives and is directed to the first password of target account input at the password setting interface of destination application.
Optionally, it is described to send second password to server, including:
The password that second password is carried to server transmission sets request, for asking the server by described in
Second password is set as the password of the target account of the destination application.
Optionally, described receive is directed to the first password of target account input at the interface of destination application, including:
The interface for password input received in destination application is directed to the first password of target account input.
Optionally, it is described to send second password to server, including:
The Password Input that second password is carried to server transmission is asked, for asking the server authentication institute
State the second password whether with the password match of the target account of the destination application that is stored in the server.
Optionally, the identification information of the destination application includes the identification code of the destination application, wherein, no
Same application program corresponds to different identification codes.
Optionally, the identification information of the mobile terminal includes the International Mobile Equipment Identity code of the mobile terminal
IMEI。
Optionally, the identification information of the mobile terminal includes the user identity identification SIM card on the mobile terminal
International mobile subscriber identity IMSI.
It should be noted that herein, term " comprising ", "comprising" or its any other variant are intended to non-row
His property includes, so that process, method, article or device including a series of elements not only include those elements, and
And it further includes other elements that are not explicitly listed or further includes intrinsic for this process, method, article or device institute
Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including this
Also there are other identical elements in the process of element, method, article or device.
The embodiments of the present invention are for illustration only, do not represent the quality of embodiment.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases
The former is more preferably embodiment.Based on such understanding, technical scheme of the present invention substantially in other words does the prior art
Going out the part of contribution can be embodied in the form of software product, which is stored in a storage medium
In (such as ROM/RAM, magnetic disc, CD), used including some instructions so that a station terminal equipment (can be mobile phone, computer takes
Be engaged in device, air conditioner or the network equipment etc.) perform method described in each embodiment of the present invention.
It these are only the preferred embodiment of the present invention, be not intended to limit the scope of the invention, it is every to utilize this hair
The equivalent structure or equivalent flow shift that bright specification and accompanying drawing content are made directly or indirectly is used in other relevant skills
Art field, is included within the scope of the present invention.
Claims (10)
1. a kind of cipher code protection method, applied to mobile terminal, which is characterized in that the method includes:
It receives and is directed to the first password of target account input at the interface of destination application;
Obtain the identification information of the destination application and the identification information of the mobile terminal;
According to default mapping ruler by the first password, the identification information of the destination application and the mobile terminal
Identification information be mapped as the second password;
Second password is sent to server.
2. cipher code protection method as described in claim 1, which is characterized in that the interface needle received in destination application
To target account input first password, including:
It receives and is directed to the first password of target account input at the password setting interface of destination application.
3. cipher code protection method as claimed in claim 2, which is characterized in that it is described to send second password to server,
Including:
The password that second password is carried to server transmission sets request, for asking the server by described second
Password is set as the password of the target account of the destination application.
4. cipher code protection method as described in claim 1, which is characterized in that the interface needle received in destination application
To target account input first password, including:
The interface for password input received in destination application is directed to the first password of target account input.
5. cipher code protection method as claimed in claim 4, which is characterized in that it is described to send second password to server,
Including:
The Password Input that second password is carried to server transmission is asked, for asking described in the server authentication the
Two passwords whether with the password match of the target account of the destination application that is stored in the server.
6. such as cipher code protection method described in any one of claim 1 to 5, which is characterized in that the mark of the destination application
Know the identification code that information includes the destination application, wherein, different application programs corresponds to different identification codes.
7. such as cipher code protection method described in any one of claim 1 to 5, which is characterized in that the mark letter of the mobile terminal
Breath includes the International Mobile Equipment Identity code IMEI of the mobile terminal.
8. such as cipher code protection method described in any one of claim 1 to 5, which is characterized in that the mark letter of the mobile terminal
Breath includes the international mobile subscriber identity IMSI of the user identity identification SIM card on the mobile terminal.
9. a kind of mobile terminal, which is characterized in that the mobile terminal includes memory, at least one processor and is stored in institute
At least one program stated on memory and can performed at least one processor, at least one program by it is described extremely
A few processor realizes the step in 1~8 any one of them method of the claims when performing.
10. a kind of computer readable storage medium, the computer-readable recording medium storage has computer to can perform at least
One program, which is characterized in that at least one program makes the computer perform above-mentioned power when being performed by the computer
Profit requires the step in 1~8 any one of them method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711464780.5A CN108197461A (en) | 2017-12-28 | 2017-12-28 | A kind of cipher code protection method, mobile terminal and computer readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711464780.5A CN108197461A (en) | 2017-12-28 | 2017-12-28 | A kind of cipher code protection method, mobile terminal and computer readable storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108197461A true CN108197461A (en) | 2018-06-22 |
Family
ID=62585629
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711464780.5A Withdrawn CN108197461A (en) | 2017-12-28 | 2017-12-28 | A kind of cipher code protection method, mobile terminal and computer readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108197461A (en) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104091134A (en) * | 2014-07-16 | 2014-10-08 | 谭皓文 | Password inputting method with combination of safety and convenience |
KR101473640B1 (en) * | 2014-01-08 | 2014-12-17 | 주식회사 네오패드 | Touch device and method for password generating on touch device |
CN105812140A (en) * | 2014-12-31 | 2016-07-27 | 上海庆科信息技术有限公司 | Authorization access method |
CN105844145A (en) * | 2016-04-19 | 2016-08-10 | 广州三星通信技术研究有限公司 | Method and equipment for managing passwords |
CN106453245A (en) * | 2016-08-30 | 2017-02-22 | 北京小米移动软件有限公司 | Method and apparatus for verifying identity |
CN106549759A (en) * | 2015-09-16 | 2017-03-29 | 阿里巴巴集团控股有限公司 | Identity identifying method and device |
CN107315610A (en) * | 2017-06-21 | 2017-11-03 | 深圳白骑士大数据有限公司 | Realize method, device and the computer-readable recording medium of cryptographic function |
-
2017
- 2017-12-28 CN CN201711464780.5A patent/CN108197461A/en not_active Withdrawn
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101473640B1 (en) * | 2014-01-08 | 2014-12-17 | 주식회사 네오패드 | Touch device and method for password generating on touch device |
CN104091134A (en) * | 2014-07-16 | 2014-10-08 | 谭皓文 | Password inputting method with combination of safety and convenience |
CN105812140A (en) * | 2014-12-31 | 2016-07-27 | 上海庆科信息技术有限公司 | Authorization access method |
CN106549759A (en) * | 2015-09-16 | 2017-03-29 | 阿里巴巴集团控股有限公司 | Identity identifying method and device |
CN105844145A (en) * | 2016-04-19 | 2016-08-10 | 广州三星通信技术研究有限公司 | Method and equipment for managing passwords |
CN106453245A (en) * | 2016-08-30 | 2017-02-22 | 北京小米移动软件有限公司 | Method and apparatus for verifying identity |
CN107315610A (en) * | 2017-06-21 | 2017-11-03 | 深圳白骑士大数据有限公司 | Realize method, device and the computer-readable recording medium of cryptographic function |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107527200A (en) | A kind of payment management method, mobile terminal and computer-readable recording medium | |
CN109558718A (en) | Application program login method, computer end, mobile terminal, system and storage medium | |
CN107395850A (en) | A kind of social communication information guard method, device and computer-readable recording medium | |
CN108282771A (en) | A kind of network access management method, mobile terminal and computer readable storage medium | |
CN107734128A (en) | One kind swindle number identification method and equipment | |
CN109800602A (en) | Method for secret protection, mobile terminal and computer readable storage medium | |
CN108196762A (en) | A kind of terminal control method, terminal and computer readable storage medium | |
CN107896287A (en) | Phone number risk monitoring method and mobile terminal | |
CN107343272A (en) | A kind of data traffic sharing method and mobile terminal | |
CN107240157A (en) | Near-field communication method of controlling security, mobile terminal and computer-readable recording medium | |
CN107846675A (en) | Register method, terminal, registrar and computer-readable recording medium | |
CN108011887A (en) | A kind of account management method and equipment | |
CN107276991A (en) | Load method, equipment and the computer-readable recording medium of Web page | |
CN108012270A (en) | A kind of method of information processing, equipment and computer-readable recording medium | |
CN107347117A (en) | A kind of message management method, mobile terminal and computer-readable recording medium | |
CN107330313A (en) | Application control method, mobile terminal and readable storage medium storing program for executing | |
CN108012029A (en) | A kind of information processing method, equipment and computer-readable recording medium | |
CN108062669A (en) | A kind of method of payment, terminal and computer readable storage medium | |
CN107330314A (en) | Authorization method, mobile terminal and readable storage medium storing program for executing based on biological characteristic | |
CN107346392A (en) | Terminal system change recognition methods, device and readable storage medium storing program for executing | |
CN108650281A (en) | A kind of data managing method, device and computer readable storage medium | |
CN108366303A (en) | A kind of video broadcasting method, mobile terminal and computer readable storage medium | |
CN108196773A (en) | Control method, terminal and the computer readable storage medium of flexible screen terminal | |
CN107194217A (en) | User data access control method, equipment and computer-readable recording medium | |
CN106888225A (en) | A kind of control method of single-sign-on application, mobile terminal and computer-readable medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20180622 |