CN106446667A - Password data processing method, apparatus and device - Google Patents

Password data processing method, apparatus and device Download PDF

Info

Publication number
CN106446667A
CN106446667A CN201510484866.9A CN201510484866A CN106446667A CN 106446667 A CN106446667 A CN 106446667A CN 201510484866 A CN201510484866 A CN 201510484866A CN 106446667 A CN106446667 A CN 106446667A
Authority
CN
China
Prior art keywords
code data
password
user
checking
data processing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510484866.9A
Other languages
Chinese (zh)
Other versions
CN106446667B (en
Inventor
钱剑波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Advantageous New Technologies Co Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201510484866.9A priority Critical patent/CN106446667B/en
Publication of CN106446667A publication Critical patent/CN106446667A/en
Application granted granted Critical
Publication of CN106446667B publication Critical patent/CN106446667B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention provides a password data processing method, apparatus and device. The method can comprise the steps of obtaining input password verification data; calculating the password verification data according to a predetermined encryption algorithm to obtain an encrypted password of the password verification data; querying the encrypted password in stored preset password data, and determining an executive instruction corresponding to the encrypted password according to a query result; and performing corresponding operation according to the executive instruction. By utilizing the method, the apparatus and the device provided by embodiments of the invention, the property loss of a user can be reduced without perception of an illegal user during illegal identity verification, and illegal verification can be processed in time, so that the success rate of recovering the user loss is increased.

Description

A kind of code data processing method, device and equipment
Technical field
The application belongs to information data process field, more particularly, to a kind of code data processing method, device and equipment.
Background technology
When the illegal event such as some robberies occur, often the threat for disabled user is forced to surrender bank card, password user Deng user is caused with great property loss.
General, ruffian of disabled user such as robbery etc. can carry out personal control to user, often informs for stress in user Disabled user's encrypted message, disabled user can steal the fund property of user by the terminal unit of such as bank self-help service. If until user has the ability to report to the police, now probably having had already passed by the good opportunity arresting disabled user, having led to the property of user It is transferred or spends freely, make the property of user be difficult to retrieve.
Most service terminal such as banking systems is arranged generally using the password based on contrast user input and on the server Checking password verifying the legitimacy of user, and the server of prior art carries out being usually taken user's during password authentification Checking password is contrasted by turn with the presetting cipher of storage on server.If the presetting cipher of storage is defeated with user on server The password of all corresponding digits of password entering is identical, then can pass through authentication.When the password having corresponding digit differs, Can carry out as the operation such as prompt cipher mistake or account locking.But, in prior art user to be in stress etc. unwilled In the case of reveal real verify password after, disabled user can steal the fund of user using true checking password.And existing skill It is that data is verified by turn that password authentification in art is typically directed to the password deposited in plain text.In the finance being related to fund property In operation system, it is in enterprise's internal control and information privacy, the checking password that user pre-sets typically is deposited after encryption Put.And the code data that encryption is deposited, verification of typically cannot realizing each password is compared.
In sum, verify in prior art in user, the processing method of code data suffers that stress is often surrendered in the case of password Larger property loss can be caused to user, user is caused with the loss being difficult to retrieve.And, password by turn in the prior art Contrast verification mode is generally only capable of situation about depositing for the decodement in operation system it is difficult to be suitable for financial industry and majority Need to carry out user's checking cryptosecurity, the operation system in encryption.
Content of the invention
The application purpose is to provide a kind of code data processing method, device and equipment, is especially being related to fund property peace In the password encryption system of full financial business, disabled user can be made to reduce in the case of unaware when illegal identity is verified The property loss of user, and illegal checking can be processed in time, improve the success rate retrieving user's loss.
A kind of code data processing method, device and the equipment that the application provides is realized in:
A kind of code data processing method, methods described includes:
Obtain the checking code data of input;
According to predetermined cryptographic algorithm, described checking code data is calculated, obtain the Crypted password of described checking code data;
Inquire about described Crypted password in the presetting cipher data of storage, determined according to Query Result corresponding with described Crypted password Execute instruction;
According to the corresponding operation of described execute instruction execution.
A kind of code data processing meanss, described device includes:
Password acquisition module, for obtaining the checking code data of input;
Cryptographic calculations module, for calculating to described checking code data according to predetermined cryptographic algorithm, obtains described checking close The Crypted password of code data;
Memory module, for storing presetting cipher data;
Enquiry module, for inquiring about described Crypted password corresponding presetting cipher data, and according to inquiry in described memory module Result determines the corresponding execute instruction of described Crypted password;
Command process module, the execute instruction execution for being determined according to described enquiry module is corresponding to be operated.
A kind of code data processing equipment, described equipment includes:
Memorizer, for storing presetting cipher data and the execute instruction corresponding with described presetting cipher data;
Processor;
Described processor is configured to:
For obtaining the checking code data of input;It is additionally operable to according to predetermined cryptographic algorithm, described checking code data be counted Calculate, obtain the Crypted password of described checking code data;It is additionally operable to inquire about in which memory corresponding with described Crypted password Execute instruction;It is additionally operable to according to the corresponding operation of execute instruction execution inquiring.
A kind of code data processing method, device and equipment that the application provides, can arrange multigroup preset checking information.This Shen Please can be used for the original password of user is encrypted in the operation system of storage.Can be by can in the case of user runs into stress Tell disabled user with the checking information such as inverted order bank card password etc. reported to the police.Because the application input can report to the police test Card information is carried out in the case of the unaware of disabled user scene, is cannot to learn to input originally before disabled user is grabbed Checking information be real checking information or pre-set for report to the police take precautions against checking information.So to a great extent Improve the crime risk of disabled user, disabled user's infringement desire can be substantially reduced, reduce crime rate.Test in illegal identity Make the predefined actions such as the checking information execution warning according to input in the case of unaware for the disabled user during card, timely make the 3rd Side obtains the property of user by the information of illegal invasion, improves the probability retrieving user's loss.
Brief description
In order to be illustrated more clearly that the embodiment of the present application or technical scheme of the prior art, below will be to embodiment or prior art In description the accompanying drawing of required use be briefly described it should be apparent that, drawings in the following description be only the application in remember Some embodiments carrying, for those of ordinary skill in the art, without having to pay creative labor, acceptable Other accompanying drawings are obtained according to these accompanying drawings.
Fig. 1 is a kind of a kind of schematic flow sheet of embodiment of the application code data processing method;
Fig. 2 is a kind of schematic diagram of a scenario of the herein described checking code data obtaining user's motion track on the touchscreen;
Fig. 3 is that another kind of scene of the herein described checking code data obtaining user's motion track on the touchscreen is illustrated Figure;
Fig. 4 is a kind of modular structure schematic diagram of embodiment of a kind of code data processing meanss that the application provides;
Fig. 5 is a kind of modular structure schematic diagram of embodiment of memory module in a kind of code data processing meanss described herein;
Fig. 6 is a kind of modular structure schematic diagram of embodiment of command process module in herein described code data processing meanss.
Specific embodiment
In order that those skilled in the art more fully understand the technical scheme in the application, below in conjunction with the embodiment of the present application Accompanying drawing, the technical scheme in the embodiment of the present application is clearly and completely described it is clear that described embodiment only It is some embodiments of the present application, rather than whole embodiments.Based on the embodiment in the application, ordinary skill people The every other embodiment that member is obtained under the premise of not making creative work, all should belong to the scope of the application protection.
General, user typically requires when being related to the business operation of fund property and carries out authentication, specific authentication It is close that mode can include the checking that the server of operation system inputs in client to the user receiving in most of application scenarios Code is verified.Under normal circumstances, the server of described operation system can be stored with the presetting cipher data that user pre-sets. Server described in herein described method can store multigroup presetting cipher data of user, and different presetting cipher data can be right Should different execution operation behaviors.The situation possible to judge user of the checking password that server can be inputted by identifying user, And then carry out corresponding business operation, the person of maximized protection user and property safety.
Below in conjunction with the accompanying drawings a kind of code data processing method described herein is described in detail.Fig. 1 is the application institute State a kind of a kind of method flow diagram of embodiment of code data processing method.Although this application provides as following embodiments or flow process The described method operating procedure of figure, but based on conventional or without performing creative labour can include in the process more or Less operating procedure.Logicality does not exist in necessary causal step, the execution sequence of these steps is not limited to this The execution sequence providing in application embodiment.When the device in practice of described method or end product execution, can be according to Embodiment or method shown in the drawings carry out order execute or executed in parallel (such as parallel processor or multiple threads Environment).
A kind of a kind of embodiment of code data processing method that specific the application provides is as shown in figure 1, methods described can be wrapped Include:
S1:Obtain the checking code data of input.
Described checking code data can include the code data information that user inputs on the terminal device, and for example user is in bank Six bit digital bank card password of ATM ATM input.Described acquisition verifies that the mode of code data can be according to tool The terminal distribution of the authentication system of body or communication modes are configured.As obtained checking password described in application scenes Data can include the checking code data that client obtains user input, and then described client can be by described checking password number According to sending to server, such as carry out such as banking system of authentication etc..Now described server can receive and test described in acquisition Card code data.
Certainly, in other examples, user can directly on the terminal unit of server input validation code data carry out Authentication is it may not be necessary to obtain described checking code data by C/S communication mode.In specific application scenarios, described Server can include being configured with authentication system insurance cabinet equipment, be provided with the application encryption of fund property PC end or The terminal of mobile terminal, the business service system of financial institution etc..Can be direct including the terminal in the above-mentioned application scenarios enumerated Obtain checking code data.As previously mentioned the application be not precluded from the terminal described in above-mentioned application scenarios as client obtain test Card code data, then can send described checking code data to corresponding server, then carry out body by described server Part checking.
Checking code data described herein specifically can set according to the application scenarios of operation system.If user is in bank In card sales counter or ATM the deposit or the withdrawal service, the password of input can be the pure digi-tal combination of six.In mobile terminal or In the online payment system of bank, described checking code data can be fixed bit number or presetting digit capacity scope (such as 6 to 11 Position) letter, symbol, the combination of numeral etc..
In some embodiments of the present application, described checking code data can include following at least one type:
Numeral, letter, symbol, user motion track on the touchscreen, pressing fingerprint.
Described password to be verified can also include the code data information that motion track on the touchscreen obtains according to user.Figure 2 is a kind of schematic diagram of a scenario of the herein described checking code data obtaining user's motion track on the touchscreen.Specifically As shown in Fig. 2 being formed after moving according to certain order in the digital nine grids of terminal touch display screen as user in application scenarios Movement locus code data information, in such as Fig. 2, the movement locus of user's movement such as arrow indicates, the password to be verified of formation Can be 1457.Fig. 3 is another kind of field of the herein described checking code data obtaining user's motion track on the touchscreen Scape schematic diagram, if user moves according to the order of arrow instruction in Fig. 3, then the password described to be verified of formation can be 1475.
Therefore, the motion track on the touchscreen of the user described in a kind of code data processing method described herein can wrap Include:The code data information being obtained based on user's motion track on the touchscreen.
Need explanation, the checking code data described in this example can include the described letter of the code data based on motion track Breath is it is also possible to include the described code data information based on motion track acquisition and other information data such as letter, character, numeral Deng one or more combination situations.As when authentication is carried out to user, the checking password number of the user input of acquisition According to the identification password data that can be " motion track+six bit digital passwords of digital nine grids ".Body described herein Part checking data processing method can apply in financial institution using digital, alphabetical etc. as checking password carry out authentication from Help in service business system it is also possible to be carried out by the slip in application interface in the APP application in mobile terminal such as mobile phone Implement in the application scenarios of authentication.
The code data processing method that the application provides can be not only used for the self-service terminal of such as banking system, also may be used To apply the password authentification applied on mobile terminals, and in the application scenarios of page password authentification on browser.Even, originally In another kind of embodiment of application, described checking code data can include pressing fingerprint.Specifically, herein described method Can be used in the application scenarios being processed by the code data of fingerprint recognition, specifically for example by when identifying palm pressing being Pressing order from thumb to little finger or the pressing order from little finger to thumb are close to judge, to determine the checking inputting First password data in the presetting cipher data of the corresponding storage of code data or the second code data, and then execute corresponding behaviour Make.
Server can be with direct access or the checking code data receiving the user input that client sends.Described herein Checking code data can include but is not limited to numeral, letter, symbol, user motion track on the touchscreen, press and refer to One of stricture of vagina or the form of polytype combination.
S2:According to predetermined cryptographic algorithm, described checking code data is calculated, the encryption obtaining described checking code data is close Code.
In one of the application embodiment, described server end storage user pre-set password when generally can be by According to the plaintext to user input for certain algorithm original password be encrypted after store.If user is in bank service net The original password of point setting is P, and described original password can be the clear-text passwords data of the user setup of not encrypted process. Can be generated by predetermined cryptographic algorithm or certain function F (P) in original password P described in server storage and be ultimately stored on Password PA after encryption in service storage unit.Therefore, in checking cipher processing method described herein, use obtaining After the checking code data of family input, the presetting cipher in order to be able to server storage compares, can be according to predetermined cryptographic algorithm pair Described checking code data is calculated, and obtains the Crypted password of described checking code data.
Specifically in a kind of embodiment, the original password that described predetermined cryptographic algorithm can include user setup is encrypted The AES of Shi Caiyong.The predetermined cryptographic algorithm that such as server adopts in storage can be put down to digital original password for taking Three bit digital taking highest order and lowest order behind side respectively are combined into presetting cipher data and are stored.So, the embodiment of the present application The middle checking code data obtaining user input is 123456, and above-mentioned predetermined cryptographic algorithm equally can be taken close to described checking Code data 123456 obtains 15241383936 after carrying out square calculating, can acquire described checking code data 123456 Crypted password 152936.
Predetermined cryptographic algorithm described in the present embodiment can include the original password that server calculates the plaintext of storage user setup When the AES taken.In prior art, the checking code data of direct access generally cannot be entered with the password after the encryption of storage Row successive appraximation calculates, and described checking code data can be calculated, obtain identical with presetting cipher data in the present embodiment The Crypted password of the checking code data of cipher mode.The specific cipher mode of predetermined cryptographic algorithm described in the present embodiment is permissible It is configured according to encryption requirements.It is related in the operation system of user's fund property it will usually be calculated using certain encryption in majority Method preserves the code data of user.Described in the present embodiment, the clear-text passwords of checking code data or user is through described predetermined calculation Code data after method calculating is processed, after being encrypted accordingly.In application scenes, described checking code data One group of corresponding Crypted password can be obtained after described pre-defined algorithm calculating is processed.And described pre-defined algorithm is in great majority Can be confidential in application scenarios.
According to predetermined cryptographic algorithm, described checking code data is calculated, obtain the Crypted password of described checking code data.
S3:Inquire about described Crypted password in the presetting cipher data of storage, determined and described Crypted password pair according to Query Result The execute instruction answered.
After calculating the encryption data obtaining described checking code data, can be by the presetting cipher number of described encryption data and storage According to being compared, whether inquiry has described Crypted password corresponding presetting cipher data in the presetting cipher data of described storage. The code data of user setup can be prestored by the memory element of terminal unit, such as banking system in the embodiment of the present application Server can store the bank card password that user pre-sets.Certainly, memory element can also store simultaneously use for checking Other related informations of family identity legitimacy, the such as account name of user, login name, Transaction Account number etc..Described herein close In code data processing method, server can prestore multigroup presetting cipher data.In described multigroup presetting cipher data Each group of presetting cipher data can correspond to the execute instruction of certain operation of execution pre-setting.Can be determined according to Query Result The corresponding execute instruction of described Crypted password.What presetting cipher data described herein can include user setup can be normal The original password of business processing flow.
Accordingly, the checking code data of described acquisition can include aforementioned in one of multiple passwords or multiple combination, In herein described method, the presetting cipher data of described storage can also include following at least one type:
Numeral, letter, symbol, user motion track on the touchscreen, pressing fingerprint.
As aforementioned described, it is related in the operation system of user's fund property it will usually be preserved using certain AES in majority The code data of user.In a kind of embodiment of herein described method, the presetting cipher data of described storage can include:
The code data of storage after the original password obtaining being encrypted according to pre-defined algorithm.
Specifically can described in the server storage of operation system presetting cipher data.Described server is obtaining user setup After original password P, store again after described original password is encrypted, so can improve the close of server storage The safety of code.Specific AES can be set in advance, for example, can arrange the encryption side of described predetermined cryptographic algorithm Formula is F (X), and accordingly, described original password P calculates, through described predetermined cryptographic algorithm, the password number obtaining after (F (P)) According to can be PA.Then can by described server using the code data of the original password after encryption as preset close Code data is stored.
In a kind of preferred embodiment of herein described method, in order to be leaked to the true password of disabled user in being forced of being likely to occur In the case of reduce the property loss of user as far as possible, and timely retrieve user's loss, can be in advance in herein described method Store multigroup presetting cipher data.Password in view of the user storing during application in financial service system for the application is typically Code data after encryption, therefore, the application is specifically in a kind of embodiment, the presetting cipher data of described storage Can include:
First password data after the original password of user setup is encrypted;
With,
The second code data after the encryption of execution assigned operation.
Specific storage mode can be stored it is also possible to be included by depositing on special server by the memory element of server Storage unit is stored, or on other servers, memory module is stored.In the present embodiment can by user setup can Using the original password of arm's length dealing corresponding presetting cipher data as first password data.It is then possible to again can be according to described Original password arranges and stores second code data of least one set user.The second described code data can be according to actual industry Business system application scenarios are configured, such as, in banking system, described second code data could be arranged to rob in experience The code data of the specific operation of execution under the abnormal exchanges such as misfortune.
In the Application Example of the application, in addition to the first password data after the encryption of the correct transaction of storage user, can also deposit Store up the second code data after the encryption of system of performance operation under multigroup abnormal exchanges.In a kind of embodiment of the application, it is Facilitate user's memory checking code data, one group of second code data can be set.Second code data described herein The mode producing can include two ways.In first kind of way, described second code data can be to be docked according to pre-defined algorithm The code data that the standby password of the user setup received is formed after being encrypted.In this case, user can arrange arm's length dealing First password, the such as trading password 123456 of banking system, can also actively be arranged on to execute under particular context and specify behaviour The standby password made, such as 234567, then described standby password 23456 is encrypted with formation the second code data.Second In mode, standby password, Ran Houzai can be generated after being calculated according to the original password of user setup by server processing unit It is encrypted the second code data that storage generates.
Certainly, the second code data described herein is in other examples it can also be provided that generate according to other rules Code data, such as in original password 123456, last three locative prepositions can be formed standby password 456123, Ran Houzai Described standby password is encrypted with the described second code data PB of formation.
In order to improve the convenience of user cipher memory further, in application scenes, described standby password is generally permissible With the original password of user, there is certain relatedness.The application provides a kind of preferred embodiment, described the second code data The inverted order code data that the original password to described user setup is reformulated after inverted order arrangement can be included, then again to institute State the encryption storage of inverted order code data.Accordingly, it is preferred that in embodiment, the second described code data can include:
The inverted order password that the original password inverted order of described user setup is rearranged is encrypted the code data of generation.
In the application scenarios of banking system as described above, the original password of user setup is 123456, and server can be deposited Store up first password data PA after the encryption of this original password.Meanwhile, the inverted order that described original password 123456 inverted order rearranges Password is 654321, described inverted order password 654321 can be encrypted with the described second code data PB of generation, then Store described second code data.So, user is in input second code data contrary with the original password character sequence of setting Afterwards, banking system can still be entered, then banking system operates further according to setting execution in advance is corresponding.
Presetting cipher data described in each embodiment described above can be stored in the server of operation system.Obtaining After the Crypted password of described checking code data, the presetting cipher data of described Crypted password and storage can be compared, Described Crypted password is inquired about in the presetting cipher data of storage.Can according to described Crypted password looking in described presetting cipher data Ask result and determine the execute instruction corresponding to described checking code data.Code data processing method described herein, Ke Yi The different execute instructions corresponding to presetting cipher data are pre-set, these execute instructions can have to be held accordingly in server Row operation.Especially the application involuntary in the case of user reveal encrypted message for example by ruffian stress say bank card business dealing Steal in the application scenarios of user's fund property, the corresponding standby password of the second code data can be told illegal use by user Family.Method described herein can arrange the instruction of the operation of the second code data execution of abnormal exchanges in advance in server Information.When the checking code data that described Query Result is user input is the second code data, improper friendship can be entered Easy operating process, reaches the personal safety and safety of property of protection user, and the purpose retrieving user's loss in time.
The described checking corresponding execute instruction of code data, can be configured in different application scenarios according to demand.Upper State user to suffer to coerce in the application scenarios of abnormal exchanges revealing bank transaction card trading password, the service of banking system Can pre-set in device guarantee user's personal safety, simultaneously again maximized protection user's fund property safety operation measure. For example can arrange judge described checking code data be original password in the second code data inverted order password when, clothes can be set Business device carries out the execute instruction of the operation behaviors of abnormal exchanges such as network alarm, user account amount of money automatic hidden.Certainly, Can include Password Input mistake or errors number reach reservation threshold after locked account etc. execute instruction.
S4:According to the corresponding operation of described execute instruction execution.
Crypted password according to above-mentioned checking code data determines after execute instruction with the comparative result of preset secret data, can hold Operation corresponding to the described execute instruction of row.In a kind of embodiment of the application, can will user's normal sequence input checking close The first password data to storage for the code data, corresponds to described first password in comparative result for the code data to be verified of user input The operation of arm's length dealing process during data, can be carried out.The corresponding behaviour of second code data under abnormal exchanges can be set simultaneously The execute instruction made.Execute instruction described in the present embodiment can include but is not limited at least one of following:
Show account balance information according to pre-defined rule;
Send warning message to specified public security networked system;
Current trading activity is entered note checking mode.
When obtaining described execute instruction, corresponding operation can be executed.As server can obtain above-mentioned execute instruction, can With according to the execution of described execute instruction includes following at least one operate:
Show account balance information according to pre-defined rule;
Send warning message to specified public security networked system;
Current trading activity is entered note checking mode.
The regular automatic hidden that can include according to pre-defined rule display account balance information according to setting in advance described in above-mentioned Hide most of amount of money of user, transactional operation terminal can only show the balance amount information after described pre-defined rule process.For example, 10000 yuans are had in user account, when judging the password of user input for the corresponding password of the second code data, permissible The 90% of hiding user account remaining sum, can show 1000 yuan of remaining sum in transactional operation terminal.Described pre-defined rule also may be used To be set to other display modes according to demand, remaining sum as true in user is 145752 yuan, can hide more than user Wan Yuan The amount of money, display remaining sum be 5752 yuan.
Described server can be with access public security networked system.In such as user input inverted order password, server is networked by public security The user of the system prompt account can suffer from plunder etc. illegal event, reach and alarm purpose.Certainly, described warning The identity information of account holder, cellphone information, the positional information of transactional operation terminal can also further be included in information Deng, so that treatment people quickly positions, process in time.
In embodiments herein, described execute instruction can also include for current trading activity carrying out note calibration mode Formula.Described note verification, can include the withdrawal of current and subsequent user, operation the needs checking transmission such as transfer accounts to being reserved in The check code of phone number in operation system.In application scenes, by the communication network of the mobile terminals such as mobile phone can be Quickly provide clear and definite and unfortunate localization machine meeting for public security, the efficiency prevented abnormal exchanges behavior and retrieve a loss can be improved.
In some embodiments of the present application, including not being but to be compared using directly overall by the way of being compared by turn by function The application scenarios of the mode of the password after the encryption deposited in advance, can improve safety and efficiency.The application is in such as user's wealth Produce in the embodiment of management, described cipher mode can include by a weighter factor (as accounts information, preset algorithm etc.), Even if guaranteeing that clear-text passwords is identical, but the password deposited after the encryption of password can be different and uniqueness it can also be ensured that Solve the problems, such as many individual's same password.
In the code data processing method that the application provides, user can arrange at least two groups presetting cipher data.Can be by not Same presetting cipher data execution is corresponding to be operated, and is illegally handed over according to one of which presetting cipher data running into disabled user The property loss of user can effectively be reduced when easily, improve the success rate retrieving user's property.The application method is particularly suited for The clear-text passwords of user is encrypted in the financial service system of storage, contrasts by turn compared to clear-text passwords of the prior art Mode more can improve while user cipher safety protect user property safety.
One group of inverted order password contrary with arm's length dealing sequence of coden can be set in preferred embodiment.Described inverted order password exists The order that when terminal is traded, disabled user cannot perceive password is inverted order or normal sequence, in applying that user is coerced Reduce the fund property loss of user as far as possible while user's personal safety can be ensured in scene.In addition, it is herein described Code data processing method can apply in financial service system, be cannot to obtain to input originally before disabled user is grabbed Password be normal first password data or abnormal exchanges the second code data, the password of the positive sequence of arm's length dealing in this way Or inverted order password, improves disabled user and carry out black risk, disabled user in above-mentioned application scenarios can be reduced real Apply the probability of illegal act.
Based on a kind of code data processing method described in each embodiment of the application, the application is also provided at a kind of code data Reason device.Fig. 4 is a kind of modular structure schematic diagram of embodiment of a kind of code data processing meanss that the application provides, such as Fig. 4 Shown, described device can include:
Password acquisition module 101, can be used for obtaining the checking code data of input;
Cryptographic calculations module 102, can be used for according to predetermined cryptographic algorithm, described checking code data being calculated, obtains institute State the Crypted password of checking code data;
Memory module 103, can be used for storing presetting cipher data;
Enquiry module 104, can be used for inquiring about described Crypted password corresponding presetting cipher data in described memory module 103, And the corresponding execute instruction of described Crypted password is determined according to Query Result;
Command process module 105, can be used for the corresponding operation of execute instruction execution determining according to described enquiry module 104.
In certain embodiments, in herein described device, password acquisition module 101 obtains checking code data and/or described deposit Storage module 103 storage presetting cipher data can include following at least one:
Numeral, letter, symbol, user motion track on the touchscreen, pressing fingerprint.
In most application scenarios, if the presetting cipher data of storage is a certain or multiple format combination in server, Generally user can input the presetting cipher data identical lattice with storage in server in input validation code data Formula, the presetting cipher data form identical checking code data that server can obtain and store.As preset in server storage Password is six digit word formats, general, and user can input the checking code data of six bit digital, service when inputting password Device can receive the checking code data obtaining this six bit digital.Certainly, above are only one of the application implementation, The code data to be verified that whole server obtains can determine according to the input of user.
A kind of code data processing meanss that the application provides, when can be used for operating including the fund property of financial industry such as bank Authentication, such as bank ATM is it is also possible to be applied in the application of mobile terminal, or the authentication of page operation. In above-mentioned application scenarios, the original clear-text passwords to user setup in server, can be adopted to deposit after being encrypted Storage, so both can realize the kept secure to user cipher for the such as bank, can also be to the checking of Crypted password.Specific one Plant in embodiment, server can store the first password data after the encryption of user's arm's length dealing, can also store pre- The second code data that can execute after the encryption of assigned operation behavior first arranging.Fig. 5 is that one kind described herein is close The modular structure schematic diagram of a kind of embodiment of memory module 103 in code data processing equipment, as shown in figure 5, described storage mould Block 103 can include:
First password memory element 1031, can be used for storing first close after the original password of user setup is encrypted Code data;
Second password storage unit 1032, can be used for storing the second password number after the encryption of setting execution assigned operation According to.
In preferred embodiment, memory for the convenience of the user, can readily remember described second in the case of urgent or stress The original password of user setup can be carried out the password after inverted order arrangement in the present embodiment and make by the corresponding standby password of code data For standby password, then it is encrypted storage to the second password storage unit.The original password of user's arm's length dealing as storage is 123456, it is PA according to the first password data generating after predetermined cryptographic algorithm encryption, described first can be stored in close In code memory unit 1031.At this point it is possible to the character sequence inverted order arrangement form inverted order password by described original password 123456 654321, then generate the second code data PB of inverted order password further according to predetermined cryptographic algorithm encryption, can be stored in In described second password storage unit 1032.Therefore, in another kind of embodiment of herein described device, described second is close Code data can include:
The inverted order password that the original password inverted order of described user setup is rearranged is encrypted the code data of generation.
When obtaining the checking code data of user input, general cannot be straight in the operation system being provided without clear-text passwords storage Tap into the contrast of capable password by turn, complete authentication.Can be close to described checking using described predetermined cryptographic algorithm in the application Code data is encrypted.The predetermined cryptographic algorithm in described cryptographic calculations module 102 in herein described device can include:
The AES adopting when the original password of user setup is encrypted.
After above-mentioned enquiry module 104 determines the execute instruction needing to be operated, described command process module 105 can be according to institute State execute instruction execution corresponding operating.Fig. 6 is one kind of command process module 105 in herein described code data processing meanss The modular structure schematic diagram of embodiment.Specifically as shown in fig. 6, the another kind of of herein described code data processing meanss is implemented Example in, described command process module 105 can include following at least one processing unit:
Remaining sum hidden unit 1051, can be used for showing account balance information according to pre-defined rule.
The account balance information of described display generally can include according to pre-defined rule process after display less than the true remaining sum of user Information, such as only amount of money of less than ten thousand yuan of display etc..The pre-defined rule of specific display account balance information can be according to design need Ask and be configured.
Alarm unit 1052, can be used for sending warning message to specified public security networked system.
Described alarm unit 1052 can use inverted order close in such as user with public security system networking that is local or specifying When second code datas such as code are traded to Public Security Organss system send warning message, inform user may meet with abduction or User's property is just suffering illegal transaction.
Note verification unit 1053, can be used for for current trading activity entering note checking mode.
In the present embodiment, trading activity is carried out note transaction modules, it is possible to use the communication network of mobile communication terminal is quickly right User terminal is positioned, thus more fast and accurately positioning the position of customer location or disabled user.Can significantly carry Height retrieves the probability of user's loss.
Code data processing meanss described in each embodiment of the application, can ensure use in the application scenarios that user is coerced Reduce the fund property loss of user as far as possible while the personal safety of family.Especially can make illegal when illegal identity is verified User protects the property safety of user in the case of unaware, and illegal checking can be processed in time, significantly Improve the probability retrieving user's loss.
Code data treating method and apparatus described herein can be used for server including banking system, mobile terminal In the multiple terminal equipment such as APP application.Therefore, the application also provides a kind of code data processing equipment, specifically described equipment Can include:
Memorizer, can be used for storing presetting cipher data and the execute instruction corresponding with described presetting cipher data;
Processor;
Described processor is configured to:
Can be used for obtaining the checking code data of input;Can be also used for according to predetermined cryptographic algorithm to described checking code data Calculated, obtained the Crypted password of described checking code data;Can be also used for inquiring about in which memory and described encryption The corresponding execute instruction of password;Can be also used for according to the corresponding operation of execute instruction execution inquiring.
Described memorizer can include the physical medium with store function.Described processor can include PC terminal, shifting The CPU of the types such as the Intel in dynamic terminal etc., valiant dragon, or other have can be with the unit of execution logic process instruction, such as Gate, Programmable Logic Controller etc..
Certainly, code data described herein is processed in setting, and the presetting cipher data of described storage can include:
First password data after the original password of user setup is encrypted;
With,
The second code data after the encryption of execution assigned operation.
In preferential embodiment, the second described code data can include:
The inverted order password that the original password inverted order of described user setup is rearranged is encrypted the code data of generation.
The application provides a kind of code data processing method, device and equipment, especially in the gold being related to user's fund property safety Melt in operation system, disabled user can be made when illegal identity is verified to reduce the wealth of user in the case of unaware as far as possible Produce loss, and illegal checking can be processed in time, improve the success rate retrieving user's loss.
Although that mentions the data communication of C/S communication, data storage, predetermined encryption calculation etc. in teachings herein, processes etc retouches State, but, the application is not limited to must be the data communication of complete standard or mentioned method, the mode processing. In the application, the foregoing description involved by each embodiment is only the application in some embodiments in the application, some standards, On the basis of method, amended slightly processing method can also carry out the scheme of each embodiment of above-mentioned the application.Certainly, meeting Other no creative deformation of process method step described in the application the various embodiments described above, still can realize identical Application, will not be described here.
Although this application provides the method operating procedure as described in embodiment or flow chart, based on conventional or no creative Means can include more or less operating procedure.The sequence of steps enumerated in embodiment is only numerous step execution sequences One of mode, do not represent unique execution sequence.When device in practice or client production execution, can be according to reality Apply example or method shown in the drawings order execution or executed in parallel (environment of such as parallel processor or multiple threads).
Unit or module that above-described embodiment illustrates, specifically can be realized by computer chip or entity, or by having certain work( Can product realizing.For convenience of description, it is divided into various modules to be respectively described with function when describing apparatus above.Certainly, The function of each module can be realized in same or multiple softwares and/or hardware when implementing the application it is also possible to will realize same The module of one function is realized by the combination of multiple submodule or subelement.
It is also known in the art that in addition to controller is realized in pure computer readable program code mode, completely permissible Make controller by method and step is carried out programming in logic with gate, switch, special IC, FPGA control The form of device processed and embedded microcontroller etc. is realizing identical function.Therefore this controller is considered a kind of Hardware Subdivision Part, and the device for realizing various functions that its inside is included can also be considered as the structure in hardware component.Or even, The device being used for realizing various functions can be considered as not only being the software module of implementation method but also can be in hardware component Structure.
The application can be described in the general context of computer executable instructions, such as program module. Usually, program module include executing particular task or realize the routine of particular abstract data type, program, object, assembly, Data structure, class etc..The application can also be put into practice in a distributed computing environment, in these distributed computing environment, by The remote processing devices connected by communication network are executing task.In a distributed computing environment, program module can position In in the local and remote computer-readable storage medium including storage device.
As seen through the above description of the embodiments, those skilled in the art can be understood that the application can be by soft Part adds the mode of necessary general hardware platform to realize.Based on such understanding, the technical scheme of the application is substantially in other words What prior art was contributed partly can be embodied in the form of software product, and this computer software product can be stored in In storage medium, such as ROM/RAM, magnetic disc, CD etc., including some instructions with so that a computer equipment is (permissible Be personal computer, mobile terminal, server, or the network equipment etc.) execution each embodiment of the application or embodiment Some partly described methods.
Each embodiment in this specification is described by the way of going forward one by one, same or analogous partly mutual between each embodiment Referring to what each embodiment stressed is the difference with other embodiment.The application can be used for numerous general or In special computing system environments or configuration.For example:Personal computer, server computer, handheld device or portable set Standby, laptop device, mobile communication terminal, multicomputer system, the system based on microprocessor, programmable electronic equipment, Network PC, minicomputer, mainframe computer, distributed computing environment of inclusion any of the above system or equipment etc..
Although the application is depicted by embodiment, it will be appreciated by the skilled addressee that the application have many deformation and a change and Without departing from spirit herein it is desirable to appended claim includes these deformation and change without deviating from spirit herein.

Claims (15)

1. a kind of code data processing method is it is characterised in that methods described includes:
Obtain the checking code data of input;
According to predetermined cryptographic algorithm, described checking code data is calculated, obtain the Crypted password of described checking code data;
Inquire about described Crypted password in the presetting cipher data of storage, determined according to Query Result corresponding with described Crypted password Execute instruction;
According to the corresponding operation of described execute instruction execution.
2. as claimed in claim 1 a kind of code data processing method it is characterised in that the presetting cipher number of described storage According to inclusion:
First password data after the original password of user setup is encrypted;
With,
The second code data after the encryption of execution assigned operation.
3. as claimed in claim 2 a kind of code data processing method it is characterised in that described the second code data bag Include:
The inverted order password that the original password inverted order of described user setup is rearranged is encrypted the code data of generation.
4. as claimed in claim 1 a kind of code data processing method it is characterised in that the presetting cipher of described storage Data include following at least one:
Numeral, letter, symbol, user motion track on the touchscreen, pressing fingerprint.
5. as claimed in claim 1 a kind of code data processing method it is characterised in that described predetermined cryptographic algorithm bag Include:
The AES adopting when the original password of user setup is encrypted.
6. as claimed in claim 1 a kind of code data processing method it is characterised in that described according to described execute instruction Execution corresponding operation includes executing following at least one operate:
Show account balance information according to pre-defined rule;
Send warning message to specified public security networked system;
Current trading activity is entered note checking mode.
7. a kind of code data processing meanss are it is characterised in that described device includes:
Password acquisition module, for obtaining the checking code data of input;
Cryptographic calculations module, for calculating to described checking code data according to predetermined cryptographic algorithm, obtains described checking close The Crypted password of code data;
Memory module, for storing presetting cipher data;
Enquiry module, for inquiring about described Crypted password corresponding presetting cipher data, and according to inquiry in described memory module Result determines the corresponding execute instruction of described Crypted password;
Command process module, the execute instruction execution for being determined according to described enquiry module is corresponding to be operated.
8. as described in claim 7 a kind of code data processing meanss it is characterised in that described memory module includes:
First password memory element, the first password data after the original password of user setup being encrypted for storage;
Second password storage unit, for the second code data after the encryption of storage setting execution assigned operation.
9. as described in claim 8 a kind of code data processing meanss it is characterised in that described second code data bag Include:
The inverted order password that the original password inverted order of described user setup is rearranged is encrypted the code data of generation.
10. as described in claim 7 a kind of code data processing meanss it is characterised in that described memory module storage Presetting cipher data include following at least one:
Numeral, letter, symbol, user motion track on the touchscreen, pressing fingerprint.
11. as described in claim 7 a kind of code data processing meanss it is characterised in that in described cryptographic calculations module Predetermined cryptographic algorithm include:
The AES adopting when the original password of user setup is encrypted.
12. as described in claim 7 a kind of code data processing meanss it is characterised in that described command process module Including at least one processing unit in following:
Remaining sum hidden unit, for showing account balance information according to pre-defined rule;
Alarm unit, for sending warning message to specified public security networked system;
Note verification unit, for entering note checking mode by current trading activity.
A kind of 13. code data processing equipments are it is characterised in that described equipment includes:
Memorizer, for storing presetting cipher data and the execute instruction corresponding with described presetting cipher data;
Processor;
Described processor is configured to:
For obtaining the checking code data of input;It is additionally operable to according to predetermined cryptographic algorithm, described checking code data be counted Calculate, obtain the Crypted password of described checking code data;It is additionally operable to inquire about in which memory corresponding with described Crypted password Execute instruction;It is additionally operable to according to the corresponding operation of execute instruction execution inquiring.
14. as claimed in claim 13 a kind of code data processing equipment it is characterised in that the presetting cipher of described storage Data includes:
First password data after the original password of user setup is encrypted;
With,
The second code data after the encryption of execution assigned operation.
15. as claimed in claim 14 a kind of code data processing equipment it is characterised in that described the second code data Including:
The inverted order password that the original password inverted order of described user setup is rearranged is encrypted the code data of generation.
CN201510484866.9A 2015-08-07 2015-08-07 Password data processing method, device and equipment Active CN106446667B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510484866.9A CN106446667B (en) 2015-08-07 2015-08-07 Password data processing method, device and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510484866.9A CN106446667B (en) 2015-08-07 2015-08-07 Password data processing method, device and equipment

Publications (2)

Publication Number Publication Date
CN106446667A true CN106446667A (en) 2017-02-22
CN106446667B CN106446667B (en) 2020-09-08

Family

ID=58092601

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510484866.9A Active CN106446667B (en) 2015-08-07 2015-08-07 Password data processing method, device and equipment

Country Status (1)

Country Link
CN (1) CN106446667B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106685995A (en) * 2017-02-23 2017-05-17 王锐 Data query system for leaked account based on hardware encryption
CN107704737A (en) * 2017-10-25 2018-02-16 维沃移动通信有限公司 Method, apparatus, mobile terminal and the computer-readable recording medium of safety verification
CN109979116A (en) * 2019-04-01 2019-07-05 深圳市摩线科技有限公司 A kind of offline cryptogram encryption method about equipment leasing
CN111342854A (en) * 2020-03-06 2020-06-26 上海航天测控通信研究所 Multi-point frequency signal receiving and processing device
CN112352237A (en) * 2018-02-15 2021-02-09 惠尔丰公司 System and method for authentication code entry
CN115643009A (en) * 2022-09-30 2023-01-24 深圳依时货拉拉科技有限公司 Password verification method and device, computer equipment and readable storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101702191A (en) * 2009-10-31 2010-05-05 浙江德施曼机电有限公司 Device and method for verifying passwords
CN103455737A (en) * 2012-05-28 2013-12-18 百度在线网络技术(北京)有限公司 User information protection method and device
US20140068733A1 (en) * 2012-08-31 2014-03-06 International Business Machines Corporation Managing password strength
CN104408363A (en) * 2014-12-25 2015-03-11 绵阳艾佳科技有限公司 Safe password system
CN104484596A (en) * 2015-01-07 2015-04-01 宇龙计算机通信科技(深圳)有限公司 Method and terminal for creating password in multi-operation system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101702191A (en) * 2009-10-31 2010-05-05 浙江德施曼机电有限公司 Device and method for verifying passwords
CN103455737A (en) * 2012-05-28 2013-12-18 百度在线网络技术(北京)有限公司 User information protection method and device
US20140068733A1 (en) * 2012-08-31 2014-03-06 International Business Machines Corporation Managing password strength
CN104408363A (en) * 2014-12-25 2015-03-11 绵阳艾佳科技有限公司 Safe password system
CN104484596A (en) * 2015-01-07 2015-04-01 宇龙计算机通信科技(深圳)有限公司 Method and terminal for creating password in multi-operation system

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106685995A (en) * 2017-02-23 2017-05-17 王锐 Data query system for leaked account based on hardware encryption
CN106685995B (en) * 2017-02-23 2020-11-03 王锐 Leakage account data query system based on hardware encryption
CN107704737A (en) * 2017-10-25 2018-02-16 维沃移动通信有限公司 Method, apparatus, mobile terminal and the computer-readable recording medium of safety verification
CN112352237A (en) * 2018-02-15 2021-02-09 惠尔丰公司 System and method for authentication code entry
CN109979116A (en) * 2019-04-01 2019-07-05 深圳市摩线科技有限公司 A kind of offline cryptogram encryption method about equipment leasing
CN109979116B (en) * 2019-04-01 2021-04-20 深圳市摩线科技有限公司 Offline password encryption method for equipment leasing
CN111342854A (en) * 2020-03-06 2020-06-26 上海航天测控通信研究所 Multi-point frequency signal receiving and processing device
CN115643009A (en) * 2022-09-30 2023-01-24 深圳依时货拉拉科技有限公司 Password verification method and device, computer equipment and readable storage medium

Also Published As

Publication number Publication date
CN106446667B (en) 2020-09-08

Similar Documents

Publication Publication Date Title
CN106446667A (en) Password data processing method, apparatus and device
US8843757B2 (en) One time PIN generation
US20160127134A1 (en) User authentication system and method
JP2019527950A (en) Communication device, point-of-sale terminal, payment device, and method
CN110458559B (en) Transaction data processing method, device, server and storage medium
CN104281794A (en) Password storing and verifying method and password storing and verifying device
CN109478221A (en) The safe transmission of sensitive data
CN104937626A (en) Authentication device and related methods
CN101221641A (en) On-line trading method and its safety affirmation equipment
US20230185898A1 (en) Systems and methods for authentication code entry using mobile electronic devices
KR20240024112A (en) System and method for contactless card communication and multi-device key pair cryptographic authentication
CN111461731A (en) Block chain monitoring system and method applied to financial transactions
US9348983B2 (en) Method for controlling the access to a specific type of services and authentication device for controlling the access to such type of services
US20160021102A1 (en) Method and device for authenticating persons
KR100835260B1 (en) Internet-banking controll method
CN114553573A (en) Identity authentication method and device
KR20060098412A (en) Timely variable password formation module and a floating password application method
KR20130117371A (en) Method to unlock screen and perform secret task by finger tapping for touch screen devices
CN106254067B (en) Operate intension recognizing method and its system
WO2021234476A1 (en) De-identified identity proofing methods and systems
KR101674314B1 (en) The method for authenticating one time security character using captcha
EP4095781A1 (en) Method and system for payment when network is blocked
KR102337801B1 (en) Method and system for payment when network is blocked
CN108989041A (en) Encryption method and device, decryption method and device
KR20070096277A (en) Password transaction system by reminding memory

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20200924

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Patentee after: Innovative advanced technology Co.,Ltd.

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Patentee before: Advanced innovation technology Co.,Ltd.

Effective date of registration: 20200924

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Patentee after: Advanced innovation technology Co.,Ltd.

Address before: Greater Cayman, British Cayman Islands

Patentee before: Alibaba Group Holding Ltd.