Specific embodiment
In order that those skilled in the art more fully understand the technical scheme in the application, below in conjunction with the embodiment of the present application
Accompanying drawing, the technical scheme in the embodiment of the present application is clearly and completely described it is clear that described embodiment only
It is some embodiments of the present application, rather than whole embodiments.Based on the embodiment in the application, ordinary skill people
The every other embodiment that member is obtained under the premise of not making creative work, all should belong to the scope of the application protection.
General, user typically requires when being related to the business operation of fund property and carries out authentication, specific authentication
It is close that mode can include the checking that the server of operation system inputs in client to the user receiving in most of application scenarios
Code is verified.Under normal circumstances, the server of described operation system can be stored with the presetting cipher data that user pre-sets.
Server described in herein described method can store multigroup presetting cipher data of user, and different presetting cipher data can be right
Should different execution operation behaviors.The situation possible to judge user of the checking password that server can be inputted by identifying user,
And then carry out corresponding business operation, the person of maximized protection user and property safety.
Below in conjunction with the accompanying drawings a kind of code data processing method described herein is described in detail.Fig. 1 is the application institute
State a kind of a kind of method flow diagram of embodiment of code data processing method.Although this application provides as following embodiments or flow process
The described method operating procedure of figure, but based on conventional or without performing creative labour can include in the process more or
Less operating procedure.Logicality does not exist in necessary causal step, the execution sequence of these steps is not limited to this
The execution sequence providing in application embodiment.When the device in practice of described method or end product execution, can be according to
Embodiment or method shown in the drawings carry out order execute or executed in parallel (such as parallel processor or multiple threads
Environment).
A kind of a kind of embodiment of code data processing method that specific the application provides is as shown in figure 1, methods described can be wrapped
Include:
S1:Obtain the checking code data of input.
Described checking code data can include the code data information that user inputs on the terminal device, and for example user is in bank
Six bit digital bank card password of ATM ATM input.Described acquisition verifies that the mode of code data can be according to tool
The terminal distribution of the authentication system of body or communication modes are configured.As obtained checking password described in application scenes
Data can include the checking code data that client obtains user input, and then described client can be by described checking password number
According to sending to server, such as carry out such as banking system of authentication etc..Now described server can receive and test described in acquisition
Card code data.
Certainly, in other examples, user can directly on the terminal unit of server input validation code data carry out
Authentication is it may not be necessary to obtain described checking code data by C/S communication mode.In specific application scenarios, described
Server can include being configured with authentication system insurance cabinet equipment, be provided with the application encryption of fund property PC end or
The terminal of mobile terminal, the business service system of financial institution etc..Can be direct including the terminal in the above-mentioned application scenarios enumerated
Obtain checking code data.As previously mentioned the application be not precluded from the terminal described in above-mentioned application scenarios as client obtain test
Card code data, then can send described checking code data to corresponding server, then carry out body by described server
Part checking.
Checking code data described herein specifically can set according to the application scenarios of operation system.If user is in bank
In card sales counter or ATM the deposit or the withdrawal service, the password of input can be the pure digi-tal combination of six.In mobile terminal or
In the online payment system of bank, described checking code data can be fixed bit number or presetting digit capacity scope (such as 6 to 11
Position) letter, symbol, the combination of numeral etc..
In some embodiments of the present application, described checking code data can include following at least one type:
Numeral, letter, symbol, user motion track on the touchscreen, pressing fingerprint.
Described password to be verified can also include the code data information that motion track on the touchscreen obtains according to user.Figure
2 is a kind of schematic diagram of a scenario of the herein described checking code data obtaining user's motion track on the touchscreen.Specifically
As shown in Fig. 2 being formed after moving according to certain order in the digital nine grids of terminal touch display screen as user in application scenarios
Movement locus code data information, in such as Fig. 2, the movement locus of user's movement such as arrow indicates, the password to be verified of formation
Can be 1457.Fig. 3 is another kind of field of the herein described checking code data obtaining user's motion track on the touchscreen
Scape schematic diagram, if user moves according to the order of arrow instruction in Fig. 3, then the password described to be verified of formation can be
1475.
Therefore, the motion track on the touchscreen of the user described in a kind of code data processing method described herein can wrap
Include:The code data information being obtained based on user's motion track on the touchscreen.
Need explanation, the checking code data described in this example can include the described letter of the code data based on motion track
Breath is it is also possible to include the described code data information based on motion track acquisition and other information data such as letter, character, numeral
Deng one or more combination situations.As when authentication is carried out to user, the checking password number of the user input of acquisition
According to the identification password data that can be " motion track+six bit digital passwords of digital nine grids ".Body described herein
Part checking data processing method can apply in financial institution using digital, alphabetical etc. as checking password carry out authentication from
Help in service business system it is also possible to be carried out by the slip in application interface in the APP application in mobile terminal such as mobile phone
Implement in the application scenarios of authentication.
The code data processing method that the application provides can be not only used for the self-service terminal of such as banking system, also may be used
To apply the password authentification applied on mobile terminals, and in the application scenarios of page password authentification on browser.Even, originally
In another kind of embodiment of application, described checking code data can include pressing fingerprint.Specifically, herein described method
Can be used in the application scenarios being processed by the code data of fingerprint recognition, specifically for example by when identifying palm pressing being
Pressing order from thumb to little finger or the pressing order from little finger to thumb are close to judge, to determine the checking inputting
First password data in the presetting cipher data of the corresponding storage of code data or the second code data, and then execute corresponding behaviour
Make.
Server can be with direct access or the checking code data receiving the user input that client sends.Described herein
Checking code data can include but is not limited to numeral, letter, symbol, user motion track on the touchscreen, press and refer to
One of stricture of vagina or the form of polytype combination.
S2:According to predetermined cryptographic algorithm, described checking code data is calculated, the encryption obtaining described checking code data is close
Code.
In one of the application embodiment, described server end storage user pre-set password when generally can be by
According to the plaintext to user input for certain algorithm original password be encrypted after store.If user is in bank service net
The original password of point setting is P, and described original password can be the clear-text passwords data of the user setup of not encrypted process.
Can be generated by predetermined cryptographic algorithm or certain function F (P) in original password P described in server storage and be ultimately stored on
Password PA after encryption in service storage unit.Therefore, in checking cipher processing method described herein, use obtaining
After the checking code data of family input, the presetting cipher in order to be able to server storage compares, can be according to predetermined cryptographic algorithm pair
Described checking code data is calculated, and obtains the Crypted password of described checking code data.
Specifically in a kind of embodiment, the original password that described predetermined cryptographic algorithm can include user setup is encrypted
The AES of Shi Caiyong.The predetermined cryptographic algorithm that such as server adopts in storage can be put down to digital original password for taking
Three bit digital taking highest order and lowest order behind side respectively are combined into presetting cipher data and are stored.So, the embodiment of the present application
The middle checking code data obtaining user input is 123456, and above-mentioned predetermined cryptographic algorithm equally can be taken close to described checking
Code data 123456 obtains 15241383936 after carrying out square calculating, can acquire described checking code data 123456
Crypted password 152936.
Predetermined cryptographic algorithm described in the present embodiment can include the original password that server calculates the plaintext of storage user setup
When the AES taken.In prior art, the checking code data of direct access generally cannot be entered with the password after the encryption of storage
Row successive appraximation calculates, and described checking code data can be calculated, obtain identical with presetting cipher data in the present embodiment
The Crypted password of the checking code data of cipher mode.The specific cipher mode of predetermined cryptographic algorithm described in the present embodiment is permissible
It is configured according to encryption requirements.It is related in the operation system of user's fund property it will usually be calculated using certain encryption in majority
Method preserves the code data of user.Described in the present embodiment, the clear-text passwords of checking code data or user is through described predetermined calculation
Code data after method calculating is processed, after being encrypted accordingly.In application scenes, described checking code data
One group of corresponding Crypted password can be obtained after described pre-defined algorithm calculating is processed.And described pre-defined algorithm is in great majority
Can be confidential in application scenarios.
According to predetermined cryptographic algorithm, described checking code data is calculated, obtain the Crypted password of described checking code data.
S3:Inquire about described Crypted password in the presetting cipher data of storage, determined and described Crypted password pair according to Query Result
The execute instruction answered.
After calculating the encryption data obtaining described checking code data, can be by the presetting cipher number of described encryption data and storage
According to being compared, whether inquiry has described Crypted password corresponding presetting cipher data in the presetting cipher data of described storage.
The code data of user setup can be prestored by the memory element of terminal unit, such as banking system in the embodiment of the present application
Server can store the bank card password that user pre-sets.Certainly, memory element can also store simultaneously use for checking
Other related informations of family identity legitimacy, the such as account name of user, login name, Transaction Account number etc..Described herein close
In code data processing method, server can prestore multigroup presetting cipher data.In described multigroup presetting cipher data
Each group of presetting cipher data can correspond to the execute instruction of certain operation of execution pre-setting.Can be determined according to Query Result
The corresponding execute instruction of described Crypted password.What presetting cipher data described herein can include user setup can be normal
The original password of business processing flow.
Accordingly, the checking code data of described acquisition can include aforementioned in one of multiple passwords or multiple combination,
In herein described method, the presetting cipher data of described storage can also include following at least one type:
Numeral, letter, symbol, user motion track on the touchscreen, pressing fingerprint.
As aforementioned described, it is related in the operation system of user's fund property it will usually be preserved using certain AES in majority
The code data of user.In a kind of embodiment of herein described method, the presetting cipher data of described storage can include:
The code data of storage after the original password obtaining being encrypted according to pre-defined algorithm.
Specifically can described in the server storage of operation system presetting cipher data.Described server is obtaining user setup
After original password P, store again after described original password is encrypted, so can improve the close of server storage
The safety of code.Specific AES can be set in advance, for example, can arrange the encryption side of described predetermined cryptographic algorithm
Formula is F (X), and accordingly, described original password P calculates, through described predetermined cryptographic algorithm, the password number obtaining after (F (P))
According to can be PA.Then can by described server using the code data of the original password after encryption as preset close
Code data is stored.
In a kind of preferred embodiment of herein described method, in order to be leaked to the true password of disabled user in being forced of being likely to occur
In the case of reduce the property loss of user as far as possible, and timely retrieve user's loss, can be in advance in herein described method
Store multigroup presetting cipher data.Password in view of the user storing during application in financial service system for the application is typically
Code data after encryption, therefore, the application is specifically in a kind of embodiment, the presetting cipher data of described storage
Can include:
First password data after the original password of user setup is encrypted;
With,
The second code data after the encryption of execution assigned operation.
Specific storage mode can be stored it is also possible to be included by depositing on special server by the memory element of server
Storage unit is stored, or on other servers, memory module is stored.In the present embodiment can by user setup can
Using the original password of arm's length dealing corresponding presetting cipher data as first password data.It is then possible to again can be according to described
Original password arranges and stores second code data of least one set user.The second described code data can be according to actual industry
Business system application scenarios are configured, such as, in banking system, described second code data could be arranged to rob in experience
The code data of the specific operation of execution under the abnormal exchanges such as misfortune.
In the Application Example of the application, in addition to the first password data after the encryption of the correct transaction of storage user, can also deposit
Store up the second code data after the encryption of system of performance operation under multigroup abnormal exchanges.In a kind of embodiment of the application, it is
Facilitate user's memory checking code data, one group of second code data can be set.Second code data described herein
The mode producing can include two ways.In first kind of way, described second code data can be to be docked according to pre-defined algorithm
The code data that the standby password of the user setup received is formed after being encrypted.In this case, user can arrange arm's length dealing
First password, the such as trading password 123456 of banking system, can also actively be arranged on to execute under particular context and specify behaviour
The standby password made, such as 234567, then described standby password 23456 is encrypted with formation the second code data.Second
In mode, standby password, Ran Houzai can be generated after being calculated according to the original password of user setup by server processing unit
It is encrypted the second code data that storage generates.
Certainly, the second code data described herein is in other examples it can also be provided that generate according to other rules
Code data, such as in original password 123456, last three locative prepositions can be formed standby password 456123, Ran Houzai
Described standby password is encrypted with the described second code data PB of formation.
In order to improve the convenience of user cipher memory further, in application scenes, described standby password is generally permissible
With the original password of user, there is certain relatedness.The application provides a kind of preferred embodiment, described the second code data
The inverted order code data that the original password to described user setup is reformulated after inverted order arrangement can be included, then again to institute
State the encryption storage of inverted order code data.Accordingly, it is preferred that in embodiment, the second described code data can include:
The inverted order password that the original password inverted order of described user setup is rearranged is encrypted the code data of generation.
In the application scenarios of banking system as described above, the original password of user setup is 123456, and server can be deposited
Store up first password data PA after the encryption of this original password.Meanwhile, the inverted order that described original password 123456 inverted order rearranges
Password is 654321, described inverted order password 654321 can be encrypted with the described second code data PB of generation, then
Store described second code data.So, user is in input second code data contrary with the original password character sequence of setting
Afterwards, banking system can still be entered, then banking system operates further according to setting execution in advance is corresponding.
Presetting cipher data described in each embodiment described above can be stored in the server of operation system.Obtaining
After the Crypted password of described checking code data, the presetting cipher data of described Crypted password and storage can be compared,
Described Crypted password is inquired about in the presetting cipher data of storage.Can according to described Crypted password looking in described presetting cipher data
Ask result and determine the execute instruction corresponding to described checking code data.Code data processing method described herein, Ke Yi
The different execute instructions corresponding to presetting cipher data are pre-set, these execute instructions can have to be held accordingly in server
Row operation.Especially the application involuntary in the case of user reveal encrypted message for example by ruffian stress say bank card business dealing
Steal in the application scenarios of user's fund property, the corresponding standby password of the second code data can be told illegal use by user
Family.Method described herein can arrange the instruction of the operation of the second code data execution of abnormal exchanges in advance in server
Information.When the checking code data that described Query Result is user input is the second code data, improper friendship can be entered
Easy operating process, reaches the personal safety and safety of property of protection user, and the purpose retrieving user's loss in time.
The described checking corresponding execute instruction of code data, can be configured in different application scenarios according to demand.Upper
State user to suffer to coerce in the application scenarios of abnormal exchanges revealing bank transaction card trading password, the service of banking system
Can pre-set in device guarantee user's personal safety, simultaneously again maximized protection user's fund property safety operation measure.
For example can arrange judge described checking code data be original password in the second code data inverted order password when, clothes can be set
Business device carries out the execute instruction of the operation behaviors of abnormal exchanges such as network alarm, user account amount of money automatic hidden.Certainly,
Can include Password Input mistake or errors number reach reservation threshold after locked account etc. execute instruction.
S4:According to the corresponding operation of described execute instruction execution.
Crypted password according to above-mentioned checking code data determines after execute instruction with the comparative result of preset secret data, can hold
Operation corresponding to the described execute instruction of row.In a kind of embodiment of the application, can will user's normal sequence input checking close
The first password data to storage for the code data, corresponds to described first password in comparative result for the code data to be verified of user input
The operation of arm's length dealing process during data, can be carried out.The corresponding behaviour of second code data under abnormal exchanges can be set simultaneously
The execute instruction made.Execute instruction described in the present embodiment can include but is not limited at least one of following:
Show account balance information according to pre-defined rule;
Send warning message to specified public security networked system;
Current trading activity is entered note checking mode.
When obtaining described execute instruction, corresponding operation can be executed.As server can obtain above-mentioned execute instruction, can
With according to the execution of described execute instruction includes following at least one operate:
Show account balance information according to pre-defined rule;
Send warning message to specified public security networked system;
Current trading activity is entered note checking mode.
The regular automatic hidden that can include according to pre-defined rule display account balance information according to setting in advance described in above-mentioned
Hide most of amount of money of user, transactional operation terminal can only show the balance amount information after described pre-defined rule process.For example,
10000 yuans are had in user account, when judging the password of user input for the corresponding password of the second code data, permissible
The 90% of hiding user account remaining sum, can show 1000 yuan of remaining sum in transactional operation terminal.Described pre-defined rule also may be used
To be set to other display modes according to demand, remaining sum as true in user is 145752 yuan, can hide more than user Wan Yuan
The amount of money, display remaining sum be 5752 yuan.
Described server can be with access public security networked system.In such as user input inverted order password, server is networked by public security
The user of the system prompt account can suffer from plunder etc. illegal event, reach and alarm purpose.Certainly, described warning
The identity information of account holder, cellphone information, the positional information of transactional operation terminal can also further be included in information
Deng, so that treatment people quickly positions, process in time.
In embodiments herein, described execute instruction can also include for current trading activity carrying out note calibration mode
Formula.Described note verification, can include the withdrawal of current and subsequent user, operation the needs checking transmission such as transfer accounts to being reserved in
The check code of phone number in operation system.In application scenes, by the communication network of the mobile terminals such as mobile phone can be
Quickly provide clear and definite and unfortunate localization machine meeting for public security, the efficiency prevented abnormal exchanges behavior and retrieve a loss can be improved.
In some embodiments of the present application, including not being but to be compared using directly overall by the way of being compared by turn by function
The application scenarios of the mode of the password after the encryption deposited in advance, can improve safety and efficiency.The application is in such as user's wealth
Produce in the embodiment of management, described cipher mode can include by a weighter factor (as accounts information, preset algorithm etc.),
Even if guaranteeing that clear-text passwords is identical, but the password deposited after the encryption of password can be different and uniqueness it can also be ensured that
Solve the problems, such as many individual's same password.
In the code data processing method that the application provides, user can arrange at least two groups presetting cipher data.Can be by not
Same presetting cipher data execution is corresponding to be operated, and is illegally handed over according to one of which presetting cipher data running into disabled user
The property loss of user can effectively be reduced when easily, improve the success rate retrieving user's property.The application method is particularly suited for
The clear-text passwords of user is encrypted in the financial service system of storage, contrasts by turn compared to clear-text passwords of the prior art
Mode more can improve while user cipher safety protect user property safety.
One group of inverted order password contrary with arm's length dealing sequence of coden can be set in preferred embodiment.Described inverted order password exists
The order that when terminal is traded, disabled user cannot perceive password is inverted order or normal sequence, in applying that user is coerced
Reduce the fund property loss of user as far as possible while user's personal safety can be ensured in scene.In addition, it is herein described
Code data processing method can apply in financial service system, be cannot to obtain to input originally before disabled user is grabbed
Password be normal first password data or abnormal exchanges the second code data, the password of the positive sequence of arm's length dealing in this way
Or inverted order password, improves disabled user and carry out black risk, disabled user in above-mentioned application scenarios can be reduced real
Apply the probability of illegal act.
Based on a kind of code data processing method described in each embodiment of the application, the application is also provided at a kind of code data
Reason device.Fig. 4 is a kind of modular structure schematic diagram of embodiment of a kind of code data processing meanss that the application provides, such as Fig. 4
Shown, described device can include:
Password acquisition module 101, can be used for obtaining the checking code data of input;
Cryptographic calculations module 102, can be used for according to predetermined cryptographic algorithm, described checking code data being calculated, obtains institute
State the Crypted password of checking code data;
Memory module 103, can be used for storing presetting cipher data;
Enquiry module 104, can be used for inquiring about described Crypted password corresponding presetting cipher data in described memory module 103,
And the corresponding execute instruction of described Crypted password is determined according to Query Result;
Command process module 105, can be used for the corresponding operation of execute instruction execution determining according to described enquiry module 104.
In certain embodiments, in herein described device, password acquisition module 101 obtains checking code data and/or described deposit
Storage module 103 storage presetting cipher data can include following at least one:
Numeral, letter, symbol, user motion track on the touchscreen, pressing fingerprint.
In most application scenarios, if the presetting cipher data of storage is a certain or multiple format combination in server,
Generally user can input the presetting cipher data identical lattice with storage in server in input validation code data
Formula, the presetting cipher data form identical checking code data that server can obtain and store.As preset in server storage
Password is six digit word formats, general, and user can input the checking code data of six bit digital, service when inputting password
Device can receive the checking code data obtaining this six bit digital.Certainly, above are only one of the application implementation,
The code data to be verified that whole server obtains can determine according to the input of user.
A kind of code data processing meanss that the application provides, when can be used for operating including the fund property of financial industry such as bank
Authentication, such as bank ATM is it is also possible to be applied in the application of mobile terminal, or the authentication of page operation.
In above-mentioned application scenarios, the original clear-text passwords to user setup in server, can be adopted to deposit after being encrypted
Storage, so both can realize the kept secure to user cipher for the such as bank, can also be to the checking of Crypted password.Specific one
Plant in embodiment, server can store the first password data after the encryption of user's arm's length dealing, can also store pre-
The second code data that can execute after the encryption of assigned operation behavior first arranging.Fig. 5 is that one kind described herein is close
The modular structure schematic diagram of a kind of embodiment of memory module 103 in code data processing equipment, as shown in figure 5, described storage mould
Block 103 can include:
First password memory element 1031, can be used for storing first close after the original password of user setup is encrypted
Code data;
Second password storage unit 1032, can be used for storing the second password number after the encryption of setting execution assigned operation
According to.
In preferred embodiment, memory for the convenience of the user, can readily remember described second in the case of urgent or stress
The original password of user setup can be carried out the password after inverted order arrangement in the present embodiment and make by the corresponding standby password of code data
For standby password, then it is encrypted storage to the second password storage unit.The original password of user's arm's length dealing as storage is
123456, it is PA according to the first password data generating after predetermined cryptographic algorithm encryption, described first can be stored in close
In code memory unit 1031.At this point it is possible to the character sequence inverted order arrangement form inverted order password by described original password 123456
654321, then generate the second code data PB of inverted order password further according to predetermined cryptographic algorithm encryption, can be stored in
In described second password storage unit 1032.Therefore, in another kind of embodiment of herein described device, described second is close
Code data can include:
The inverted order password that the original password inverted order of described user setup is rearranged is encrypted the code data of generation.
When obtaining the checking code data of user input, general cannot be straight in the operation system being provided without clear-text passwords storage
Tap into the contrast of capable password by turn, complete authentication.Can be close to described checking using described predetermined cryptographic algorithm in the application
Code data is encrypted.The predetermined cryptographic algorithm in described cryptographic calculations module 102 in herein described device can include:
The AES adopting when the original password of user setup is encrypted.
After above-mentioned enquiry module 104 determines the execute instruction needing to be operated, described command process module 105 can be according to institute
State execute instruction execution corresponding operating.Fig. 6 is one kind of command process module 105 in herein described code data processing meanss
The modular structure schematic diagram of embodiment.Specifically as shown in fig. 6, the another kind of of herein described code data processing meanss is implemented
Example in, described command process module 105 can include following at least one processing unit:
Remaining sum hidden unit 1051, can be used for showing account balance information according to pre-defined rule.
The account balance information of described display generally can include according to pre-defined rule process after display less than the true remaining sum of user
Information, such as only amount of money of less than ten thousand yuan of display etc..The pre-defined rule of specific display account balance information can be according to design need
Ask and be configured.
Alarm unit 1052, can be used for sending warning message to specified public security networked system.
Described alarm unit 1052 can use inverted order close in such as user with public security system networking that is local or specifying
When second code datas such as code are traded to Public Security Organss system send warning message, inform user may meet with abduction or
User's property is just suffering illegal transaction.
Note verification unit 1053, can be used for for current trading activity entering note checking mode.
In the present embodiment, trading activity is carried out note transaction modules, it is possible to use the communication network of mobile communication terminal is quickly right
User terminal is positioned, thus more fast and accurately positioning the position of customer location or disabled user.Can significantly carry
Height retrieves the probability of user's loss.
Code data processing meanss described in each embodiment of the application, can ensure use in the application scenarios that user is coerced
Reduce the fund property loss of user as far as possible while the personal safety of family.Especially can make illegal when illegal identity is verified
User protects the property safety of user in the case of unaware, and illegal checking can be processed in time, significantly
Improve the probability retrieving user's loss.
Code data treating method and apparatus described herein can be used for server including banking system, mobile terminal
In the multiple terminal equipment such as APP application.Therefore, the application also provides a kind of code data processing equipment, specifically described equipment
Can include:
Memorizer, can be used for storing presetting cipher data and the execute instruction corresponding with described presetting cipher data;
Processor;
Described processor is configured to:
Can be used for obtaining the checking code data of input;Can be also used for according to predetermined cryptographic algorithm to described checking code data
Calculated, obtained the Crypted password of described checking code data;Can be also used for inquiring about in which memory and described encryption
The corresponding execute instruction of password;Can be also used for according to the corresponding operation of execute instruction execution inquiring.
Described memorizer can include the physical medium with store function.Described processor can include PC terminal, shifting
The CPU of the types such as the Intel in dynamic terminal etc., valiant dragon, or other have can be with the unit of execution logic process instruction, such as
Gate, Programmable Logic Controller etc..
Certainly, code data described herein is processed in setting, and the presetting cipher data of described storage can include:
First password data after the original password of user setup is encrypted;
With,
The second code data after the encryption of execution assigned operation.
In preferential embodiment, the second described code data can include:
The inverted order password that the original password inverted order of described user setup is rearranged is encrypted the code data of generation.
The application provides a kind of code data processing method, device and equipment, especially in the gold being related to user's fund property safety
Melt in operation system, disabled user can be made when illegal identity is verified to reduce the wealth of user in the case of unaware as far as possible
Produce loss, and illegal checking can be processed in time, improve the success rate retrieving user's loss.
Although that mentions the data communication of C/S communication, data storage, predetermined encryption calculation etc. in teachings herein, processes etc retouches
State, but, the application is not limited to must be the data communication of complete standard or mentioned method, the mode processing.
In the application, the foregoing description involved by each embodiment is only the application in some embodiments in the application, some standards,
On the basis of method, amended slightly processing method can also carry out the scheme of each embodiment of above-mentioned the application.Certainly, meeting
Other no creative deformation of process method step described in the application the various embodiments described above, still can realize identical
Application, will not be described here.
Although this application provides the method operating procedure as described in embodiment or flow chart, based on conventional or no creative
Means can include more or less operating procedure.The sequence of steps enumerated in embodiment is only numerous step execution sequences
One of mode, do not represent unique execution sequence.When device in practice or client production execution, can be according to reality
Apply example or method shown in the drawings order execution or executed in parallel (environment of such as parallel processor or multiple threads).
Unit or module that above-described embodiment illustrates, specifically can be realized by computer chip or entity, or by having certain work(
Can product realizing.For convenience of description, it is divided into various modules to be respectively described with function when describing apparatus above.Certainly,
The function of each module can be realized in same or multiple softwares and/or hardware when implementing the application it is also possible to will realize same
The module of one function is realized by the combination of multiple submodule or subelement.
It is also known in the art that in addition to controller is realized in pure computer readable program code mode, completely permissible
Make controller by method and step is carried out programming in logic with gate, switch, special IC, FPGA control
The form of device processed and embedded microcontroller etc. is realizing identical function.Therefore this controller is considered a kind of Hardware Subdivision
Part, and the device for realizing various functions that its inside is included can also be considered as the structure in hardware component.Or even,
The device being used for realizing various functions can be considered as not only being the software module of implementation method but also can be in hardware component
Structure.
The application can be described in the general context of computer executable instructions, such as program module.
Usually, program module include executing particular task or realize the routine of particular abstract data type, program, object, assembly,
Data structure, class etc..The application can also be put into practice in a distributed computing environment, in these distributed computing environment, by
The remote processing devices connected by communication network are executing task.In a distributed computing environment, program module can position
In in the local and remote computer-readable storage medium including storage device.
As seen through the above description of the embodiments, those skilled in the art can be understood that the application can be by soft
Part adds the mode of necessary general hardware platform to realize.Based on such understanding, the technical scheme of the application is substantially in other words
What prior art was contributed partly can be embodied in the form of software product, and this computer software product can be stored in
In storage medium, such as ROM/RAM, magnetic disc, CD etc., including some instructions with so that a computer equipment is (permissible
Be personal computer, mobile terminal, server, or the network equipment etc.) execution each embodiment of the application or embodiment
Some partly described methods.
Each embodiment in this specification is described by the way of going forward one by one, same or analogous partly mutual between each embodiment
Referring to what each embodiment stressed is the difference with other embodiment.The application can be used for numerous general or
In special computing system environments or configuration.For example:Personal computer, server computer, handheld device or portable set
Standby, laptop device, mobile communication terminal, multicomputer system, the system based on microprocessor, programmable electronic equipment,
Network PC, minicomputer, mainframe computer, distributed computing environment of inclusion any of the above system or equipment etc..
Although the application is depicted by embodiment, it will be appreciated by the skilled addressee that the application have many deformation and a change and
Without departing from spirit herein it is desirable to appended claim includes these deformation and change without deviating from spirit herein.