CN106911659B - System, method and device for processing information of sub account number - Google Patents

System, method and device for processing information of sub account number Download PDF

Info

Publication number
CN106911659B
CN106911659B CN201610581320.XA CN201610581320A CN106911659B CN 106911659 B CN106911659 B CN 106911659B CN 201610581320 A CN201610581320 A CN 201610581320A CN 106911659 B CN106911659 B CN 106911659B
Authority
CN
China
Prior art keywords
sub
account
information
password information
password
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610581320.XA
Other languages
Chinese (zh)
Other versions
CN106911659A (en
Inventor
阳诚海
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Koubei Holding Ltd
Original Assignee
Koubei Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Koubei Holding Ltd filed Critical Koubei Holding Ltd
Priority to CN201610581320.XA priority Critical patent/CN106911659B/en
Priority to TW106121645A priority patent/TW201807614A/en
Publication of CN106911659A publication Critical patent/CN106911659A/en
Priority to PCT/CN2017/092909 priority patent/WO2018014785A1/en
Application granted granted Critical
Publication of CN106911659B publication Critical patent/CN106911659B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Information Transfer Between Computers (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)

Abstract

The application relates to the technical field of internet, in particular to a system, a method and a device for processing sub-account login information, which are used for reducing risks of tampering and leakage of the sub-account login information in a transmission process. The seed account information processing system provided by the embodiment of the application comprises: the system comprises main equipment, at least one piece of sub-equipment and a server, wherein the main equipment logs in application through a primary account; wherein: the main device is used for sending a sub-account information acquisition request to the server, receiving sub-account information returned by the server, wherein the sub-account information comprises password information of a sub-account, and sending the password information to the sub-device; the server is used for generating the sub-account information comprising password information according to the sub-account information acquisition request and transmitting the sub-account information to the main equipment; and the sub-equipment is used for receiving the password information sent by the main equipment.

Description

System, method and device for processing information of sub account number
Technical Field
The application relates to the technical field of internet, in particular to a system, a method and a device for processing information of a sub account number.
Background
Many linked stores typically have a need to create sub-accounts. The sub-account number is dependent on the primary account number, and in certain scenarios authorization by the primary account number may exercise partial rights, such as collection, transfer, etc., on behalf of the primary account number.
In general, key information such as the password of the sub-account can only be known by the sub-account holder, otherwise, risks caused by operations triggered by the factor account cannot be traced, and the anti-repudiation effect cannot be achieved. The existing sub-account creating and transmitting process mainly comprises the following steps: the main account holding entity creates a sub-account based on the main account login application system, sets some processing permissions of the sub-account and the login password of the sub-account, transmits the created information such as the login password of the sub-account to the sub-account holding entity in the modes of mails, short messages and the like, and the sub-account holding entity exercises related processing permissions through the sub-account.
Because the sub-account holder usually needs to bear the risk caused by the operation triggered by the sub-account, the sub-account holder has strict requirements on the confidentiality of the information such as the login password of the sub-account, and the above process cannot ensure that the primary account holder does not tamper with and reveal the information of the sub-account such as the login password of the sub-account.
Therefore, how to reduce the risk that the login information of the sub-account is tampered and leaked in the transmission process is a problem which needs to be solved urgently at present.
Disclosure of Invention
The embodiment of the application provides a system, a method and a device for processing sub-account information, which are used for reducing the risks of tampering and leakage of the sub-account login information in the transmission process.
The embodiment of the application provides a sub-account information processing system, which comprises a main device, at least one sub-device and a server, wherein the main device logs in an application through a main account; wherein:
the main device is used for sending a sub-account information acquisition request to the server, receiving sub-account information returned by the server, wherein the sub-account information comprises password information of a sub-account, and sending the password information to the sub-device;
the server is used for generating the sub-account information comprising password information according to the sub-account information acquisition request and transmitting the sub-account information to the main equipment;
and the sub-equipment is used for receiving the password information sent by the main equipment.
Another embodiment of the present application provides a method for processing seed account information, including:
the primary equipment logs in the application through a primary account;
sending a sub-account information acquisition request to a server, wherein the sub-account information acquisition request is used for requesting to acquire the password information of the sub-account;
receiving sub-account information returned by the server, wherein the sub-account information comprises password information of the sub-account;
and sending the password information to the sub-equipment.
Another embodiment of the present application provides a method for processing seed account information, including:
the method comprises the steps that a server receives a sub-account information acquisition request sent by a main device for logging in a primary account;
generating sub-account information including password information of the sub-account according to the sub-account information acquisition request;
and transmitting the sub-account information to the main equipment.
Another embodiment of the present application provides a method for processing seed account information, including:
receiving password information of a sub-account sent by a main device; the password information of the sub account is generated by the server;
logging in the application based on the received password information of the sub-account.
The embodiment of the application provides a terminal equipment for processing information of a seed account, which comprises:
the login module is used for logging in the application through the primary account;
the password request module is used for sending a sub-account information acquisition request to the server and requesting to acquire the password information of the sub-account;
the receiving module is used for receiving sub-account information returned by the server, wherein the sub-account information comprises password information of the sub-account;
and the password sending module is used for sending the password information to the sub-equipment.
Another embodiment of the present application provides a server for processing information of a seed account, including:
the receiving module is used for receiving a sub-account information acquisition request sent by a main device for logging in a primary account;
the generation module is used for generating sub-account information comprising the password information of the sub-account according to the sub-account information acquisition request;
and the sending module is used for transmitting the sub-account information to the main equipment.
Another embodiment of the present application provides a terminal device for processing sub-account information, including:
the receiving module is used for receiving the password information of the sub-account sent by the main equipment; the password information of the sub account is generated by the server;
and the login module is used for logging in the application based on the received password information of the sub-account.
In the embodiment of the application, the main device for logging in the main account does not have the authority for setting the password of the sub-account, but is generated by the server, and after the server transmits the generated password of the sub-account to the main device, the main device can directly transmit the generated password of the sub-account to the sub-device with the sub-account through the background. Therefore, the password of the sub-account is not set by the user of the primary account, so that the risk that the password of the sub-account is leaked by the user of the primary account can be reduced.
In addition, in a preferred embodiment, the password information of the sub-account can be transmitted through the NFC data transmission channel, and since the whole transmission process is completed by bringing two devices close to each other in the NFC transmission, it can be ensured that the password information of the sub-account is transmitted by the primary account holder and the sub-account acceptor on the same side, and the confidentiality and integrity of the password information are further ensured.
In addition, in a preferred embodiment, the server may encrypt the transmitted password information of the sub-account, and the primary device transmits the password information in the encrypted state to the sub-device after receiving the password information in the encrypted state, so that the confidentiality of the password information and the security during transmission can be further ensured.
Drawings
Fig. 1 is a schematic structural diagram of a sub-account information processing system according to an embodiment of the present disclosure;
fig. 2 is a flowchart of a method for processing sub-account information according to an embodiment of the present disclosure;
fig. 3 is a flowchart of a method for processing sub-account information according to a second embodiment of the present application;
fig. 4 is a schematic structural diagram of a terminal device for processing sub-account information according to a third embodiment of the present application;
fig. 5 is a schematic structural diagram of a server for processing sub-account information according to a fourth embodiment of the present application;
fig. 6 is a schematic structural diagram of a terminal device for processing sub-account information according to a fifth embodiment of the present application.
Detailed Description
The method and the device are applied to the scene that a primary account holder needs to set a plurality of sub-accounts to perform some authorization operations instead. For example, a primary account holder of a chain of stores may set up a plurality of sub-accounts, and chain branches distributed in various places may use one of the sub-accounts to perform collection and transfer operations. Since the sub-account is equivalent to an authorization operation for exercising the primary account, the operation result of the sub-account is recorded under the name of the primary account.
As shown in fig. 1, a sub-account information processing system 10 provided in the embodiment of the present application includes a primary device 11, at least one sub-device 12, and a server 13, where the primary device 11 logs in an application through a primary account; the main device 11 is configured to send a sub-account information acquisition request to the server 13, receive sub-account information returned by the server 13, where the sub-account information includes password information of a sub-account, and send the password information to the sub-device 12; the server 13 is configured to generate sub-account information including password information according to the sub-account information acquisition request, and transmit the sub-account information to the primary device 11; and the sub-device 12 is configured to receive the password information sent by the main device 11.
The embodiments of the present application will be described in further detail with reference to the drawings attached hereto.
Example one
As shown in fig. 2, a flowchart of a method for processing sub-account information provided in an embodiment of the present application includes the following steps:
s201: the primary equipment logs in the application through the primary account, and sends a sub-account information acquisition request to the server.
An application herein may refer to an APP, a website, a web page, etc. A user opens a login page of an APP, a website or a webpage through the main equipment, inputs a primary account and a primary account login password in the login page, and logs in the application.
In specific implementation, a user of the primary device may input basic information of the sub-account in a login application interface, such as information of the sub-account, processing permissions of the sub-account (options may be provided for the user to select), the number of the sub-accounts, and the like, and send the information to the server. Here, the sub-account may be created by the primary device, or may be created by the server, that is, the server may generate each sub-account and the corresponding password information for the primary device.
The server in the embodiment of the present application may refer to a server where a server of an application is located, or may be a server dedicated to providing password information. Generally, an application includes a server and a client, where the server of the application may be deployed on a server that provides cryptographic information in this embodiment of the application, or may be deployed on other servers, and the client of the application is deployed on a main device and a sub device in this embodiment of the application.
S202: and the server generates sub-account information including password information according to the sub-account information acquisition request and transmits the sub-account information to the main equipment.
In a specific implementation, the server may randomly generate password information for the sub-account and store the password information in the server, and then the server may transmit the state information of successful creation of the sub-account password and the generated password information corresponding to each sub-account to the primary device.
S203: the method comprises the steps that the main device receives sub-account information returned by a server, the sub-account information comprises password information of a sub-account, and the password information is sent to the sub-device.
In specific implementation, after receiving the sub-account information returned by the server, the main device can automatically store the password information of the sub-account in the background, and then send the automatically stored password information to the sub-device in the background; in the process, the password information of the sub-account is always in a state invisible to the user. Preferably, the stored password information may be in an encrypted state, where the encryption may include a first encryption described below, or a first encryption and a second encryption.
In specific implementation, after generating the sub-account information, the server may perform first encryption on the sub-account information, and transmit the sub-account information subjected to the first encryption to the primary device; the primary equipment receives first encrypted sub-account information returned by the server; and sending the first encrypted password information corresponding to the sub-account to the sub-equipment. Here, the sub-account information after the first encryption by the server may include the sub-account and the password information corresponding thereto, and the primary device may directly send the first encrypted sub-account and the password information corresponding thereto to the sub-device.
In addition, after receiving the first encrypted password information sent by the main device, the sub-device may perform first decryption on the password information through the opened application. In specific implementation, the client can be set in the application to decrypt only the password information from other clients but not the password information from the server, so that the main device can be ensured not to decrypt the password information after receiving the sub-account password information in the encrypted state sent by the server, and the security of the sub-account password information is further enhanced.
Preferably, after receiving the first encrypted sub-account information returned by the server, the primary device may further perform second encryption on the password information of the sub-account, and send the password information after the second encryption to the secondary device, so as to further improve the security in the password transmission process; and after receiving the second encrypted password information sent by the main equipment, the sub-equipment performs second decryption and first decryption on the password information.
The main device may transmit the password information of the sub-account to the sub-device through a plurality of communication methods, such as bluetooth, wireless fidelity (wifi), data connection, and the like. As a preferred embodiment, the main device may send the password information of the sub-account to the sub-device through a Near Field Communication (NFC) data transmission channel.
Because the communication distance of the NFC is usually within 10 centimeters, the password information of the sub-account is transmitted through a Peer-to-Peer (P2P) mode of the NFC, so that the password information of the sub-account is transmitted by the primary account holder and the sub-account acceptor on the same side, and the confidentiality and integrity of the password information are ensured; moreover, based on the NFC transmission mode, the whole transmission process can be completed only by enabling the two devices to be close to each other, and complicated and long searching and connecting pairing processes are not needed, so that the operation of a user on the mobile device is simplified. In a specific implementation, the master device may establish an NFC data transmission channel with the slave device by touching the slave device. The touch process is a novel interaction mode imitating handshake, can be regarded as a receiving and confirming process, and can play a role in preventing repudiation.
In a specific implementation, a decoding manner for decrypting the encrypted cryptographic information may be preset, or a decoding manner corresponding to a specific cryptographic transmission channel (such as an NFC data transmission channel, a bluetooth data transmission channel, or the like) may also be set in the application, and the sub-device determines the decoding manner according to the cryptographic transmission channel that receives the cryptographic information and decrypts the cryptographic information in the encrypted state based on the determined decoding manner. For example, a decoding mode corresponding to the NFC data transmission channel may be set, and after the host device sends the password information to the child device through the NFC data transmission channel, the child device determines that the password information is from the NFC data transmission channel, and decrypts according to the decoding mode corresponding to the NFC data transmission channel. In addition, the use permission of the decoding mode can be limited in the application, for example, only if the password information comes from the NFC data transmission channel, the password information can be decrypted by using the decoding mode corresponding to the NFC data transmission channel, so that the security of the password is further ensured.
In a specific implementation, after receiving the password information from the server, the main device may prompt the user on the premise that the password is not displayed, for example, prompt the user through a change of the brightness of the application interface (for example, after the main device initiates a request to the server, the brightness of the application interface becomes dark, and after receiving the password information fed back by the server, the brightness of the application interface becomes bright to indicate that the user can operate the application at this time), or directly prompt the user through information that the password is successfully obtained, and may send the password information to the sub device.
As a preferred embodiment, while transmitting the information of the sub-account (including password information, sub-account, etc.) to the sub-device, the main device may also send information of the application, such as a name or an identifier of the application, and may also be a character string for triggering opening of the application, to the sub-device. In this way, the sub-device may open the application based on the information of the application sent by the main device, and log in the sub-account based on the password information in the opened application, as described in detail with respect to S204. Of course, the sub-device may also actively open the application under the trigger of the user, without the information sent by the main device to trigger.
S204: the sub-device receives password information of the sub-account sent by the main device, and logs in the application based on the received password information of the sub-account.
In specific implementation, after receiving the sub-account and the corresponding password information sent by the main device, the sub-device sends the received sub-account and the corresponding password information to the server for authentication based on the opened application.
And the server compares the password information of the sub-account sent by the sub-equipment with the password information of the sub-account stored by the server before, and after the password information of the sub-account is determined to be consistent with the password information of the sub-account, the authentication is confirmed to be successful, and at the moment, the server allows the sub-equipment to successfully log in the application. After the child device successfully logs in, an initial password may be set, specifically, the default initial password of the system may be modified, or the initial password may be set on the basis that there is no default password.
Example two
Example two a preferred implementation is presented under the teachings of the present application.
As shown in fig. 3, a flowchart of a method for processing sub-account information according to the second embodiment of the present application includes:
s301: the main equipment logs in the main account and sends a sub-account information acquisition request to the server for requesting to acquire the password information of the sub-account.
Here, the primary device may or may not carry the sub-account created by the primary device in the sub-account information acquisition request, and the server creates the sub-account and the corresponding password information for the sub-account at the same time.
S302: and the server generates sub-account information, and transmits the sub-account information to the main equipment after first encryption. The sub-account information includes password information of the sub-account, or includes the sub-account and corresponding password information.
S303: and after receiving the sub-account information returned by the server, the main equipment carries out second encryption on the sub-account information and automatically stores the sub-account information through a background.
After the primary device acquires the sub-account information, the secondary account information is encrypted for the second time and then automatically stored in the memory through the background, and the user is prompted to establish an NFC data transmission channel.
S304: the main device initiates a request for establishing an NFC data transmission channel to the sub device by touching the sub device, and the sub device responds to the request to establish the NFC data transmission channel with the main device.
S305: and the main equipment sends the information of the application system and the second encrypted sub-account information to the sub-equipment through an NFC data transmission channel.
After the NFC data transmission channel is established, the main device sends the stored sub-account information to the sub-device through the background, and password information is not displayed for a user in the whole process.
S306: and the sub-equipment opens the application system and carries out second decryption on the second encrypted sub-account information.
S307: and the sub-equipment sends the decrypted sub-account information to a server for authentication. And the server authenticates the password information of the sub-account sent by the sub-equipment based on the password information of the sub-account stored before.
S308: and after the authentication is passed, the sub-equipment successfully logs in the sub-account.
S309: an initial password is set. In addition, the sub-device user can view own processing authority information and the like in the logged-in application system.
Based on the same inventive concept, the embodiment of the present application further provides a sub-account information transmission device corresponding to the sub-account information processing method, and as the principle of solving the problem of the device is similar to that of the sub-account information processing method of the embodiment of the present application, the implementation of the device may refer to the implementation of the method, and repeated details are not repeated.
EXAMPLE III
As shown in fig. 4, a schematic structural diagram of a terminal device for processing sub-account information provided in the third embodiment of the present application is shown, where the terminal device may specifically refer to the primary device in the foregoing embodiment, and the terminal device includes:
a login module 41, configured to log in an application through a primary account;
a password request module 42, configured to send a sub-account information obtaining request to a server to request to obtain password information of the sub-account;
a receiving module 43, configured to receive sub-account information returned by the server, where the sub-account information includes password information of the sub-account;
and the password sending module 44 is configured to send the password information to the child device.
Optionally, the password sending module 44 is specifically configured to:
and sending the password information to the sub-equipment through a Near Field Communication (NFC) data transmission channel.
Optionally, the receiving module 43 is specifically configured to:
receiving first encrypted sub-account information returned by the server;
the password sending module 44 is specifically configured to:
and sending the first encrypted password information corresponding to the sub account number to the sub equipment.
Optionally, the password sending module 44 is specifically configured to:
and carrying out second encryption on the password information, and sending the password information subjected to the second encryption to the sub-equipment.
Optionally, the password sending module 44 is specifically configured to:
after receiving the sub-account information returned by the server, automatically storing the password information of the sub-account in the background, and sending the password information automatically stored in the background to the sub-equipment; the password information automatically stored in the background is in an encrypted state.
Optionally, the password sending module 44 is specifically configured to:
and sending the sub-account number created by the main equipment and the password information of the sub-account number to the sub-equipment.
Example four
As shown in fig. 5, a schematic structural diagram of a server for processing sub-account information provided in the fourth embodiment of the present application includes:
a receiving module 51, configured to receive a sub-account information acquisition request sent by a primary device that logs in a primary account;
a generating module 52, configured to generate sub-account information including password information of a sub-account according to the sub-account information obtaining request;
and a sending module 53, configured to transmit the sub-account information to the primary device.
Optionally, the sending module 53 is specifically configured to:
and performing first encryption on the generated sub-account information, and transmitting the sub-account information subjected to the first encryption to the primary equipment.
EXAMPLE five
As shown in fig. 6, a schematic structural diagram of a terminal device for processing sub-account information provided in the fifth embodiment of the present application is shown, where the terminal device may specifically refer to a sub-device in the foregoing embodiment, and the terminal device includes:
the receiving module 61 is configured to receive password information of a sub-account sent by a master device; the password information of the sub account is generated by the server;
and a login module 62, configured to log in the application based on the received password information of the sub-account.
Optionally, the receiving module 61 is specifically configured to:
and receiving the password information of the sub-account sent by the main equipment through a Near Field Communication (NFC) data transmission channel.
Optionally, the receiving module 61 is specifically configured to:
receiving first encrypted password information sent by the main equipment; wherein the first encryption is encryption of password information by a server;
the terminal device further includes:
and a decryption module 63, configured to perform first decryption on the first encrypted cryptographic information through the application.
Optionally, the receiving module 61 is specifically configured to:
receiving second encrypted password information sent by the main equipment; the second encryption is the encryption of the first encrypted password information by the main device;
the decryption module 63 is further configured to:
and performing second decryption on the second encrypted password information.
Optionally, the receiving module 61 is specifically configured to:
receiving password information in an encrypted state sent by a main device;
the decryption module 63 is further configured to:
and determining a decoding mode according to the password transmission channel for receiving the password information, and decrypting the password information in the encrypted state based on the determined decoding mode.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While the preferred embodiments of the present application have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all alterations and modifications as fall within the scope of the application.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present application without departing from the spirit and scope of the application. Thus, if such modifications and variations of the present application fall within the scope of the claims of the present application and their equivalents, the present application is intended to include such modifications and variations as well.

Claims (24)

1. The information processing system of the sub account number is characterized by comprising a main device, at least one sub device and a server, wherein the main device logs in an application through the main account number; wherein:
the main device is used for sending a sub-account information acquisition request to the server, receiving sub-account information returned by the server, wherein the sub-account information comprises password information of a sub-account, and sending the password information to the sub-device;
the server is used for generating the sub-account information comprising password information according to the sub-account information acquisition request and transmitting the sub-account information to the main equipment;
the sub-equipment is used for receiving the password information sent by the main equipment;
the main device is specifically configured to send the password information to the sub device through a Near Field Communication (NFC) data transmission channel, bluetooth and/or wireless fidelity (wifi); and in the process of receiving the sub-account information returned by the server and sending the password information, the password information of the sub-account is in a state invisible to the user.
2. The system according to claim 1, wherein the server is specifically configured to, after generating the sub-account information, perform first encryption on the sub-account information, and transmit the sub-account information subjected to the first encryption to the primary device;
the sub-device is further configured to perform first decryption on the password information through the opened application after receiving the first encrypted password information sent by the main device.
3. The system according to claim 2, wherein the primary device is specifically configured to, after receiving the sub-account information returned by the server, perform second encryption on the password information of the sub-account, and send the password information after the second encryption to the sub-device;
and the sub-equipment is further used for carrying out second decryption on the password information after receiving the second encrypted password information sent by the main equipment.
4. The system according to claim 1, wherein the primary device is specifically configured to, after receiving the sub-account information returned by the server, automatically save the password information of the sub-account in the background, and send the password information automatically saved in the background to the secondary device; the password information automatically stored in the background is in an encrypted state.
5. A method for processing information of a seed account is characterized by comprising the following steps:
the primary equipment logs in the application through a primary account;
sending a sub-account information acquisition request to a server, wherein the sub-account information acquisition request is used for requesting to acquire the password information of the sub-account;
receiving sub-account information returned by the server, wherein the sub-account information comprises password information of the sub-account;
sending the password information to the sub-equipment through a Near Field Communication (NFC) data transmission channel, Bluetooth and/or wireless fidelity (wifi); and in the process of receiving the sub-account information returned by the server and sending the password information, the password information of the sub-account is in a state invisible to the user.
6. The method of claim 5, wherein the receiving the sub-account information returned by the server comprises:
receiving first encrypted sub-account information returned by the server;
the sending the password information to the child device includes:
and sending the first encrypted password information corresponding to the sub account number to the sub equipment.
7. The method of claim 6, wherein the sending the first encrypted password information corresponding to the sub-account number to the sub-device comprises:
and carrying out second encryption on the password information, and sending the password information subjected to the second encryption to the sub-equipment.
8. The method of claim 5, wherein the sending the cryptographic information to the child device comprises:
after receiving the sub-account information returned by the server, automatically storing the password information of the sub-account in the background, and sending the password information automatically stored in the background to the sub-equipment; the password information automatically stored in the background is in an encrypted state.
9. The method of any one of claims 5 to 8, wherein the sending the password information to the child device comprises:
and sending the sub-account number created by the main equipment and the password information of the sub-account number to the sub-equipment.
10. A method for processing information of a seed account is characterized by comprising the following steps:
the method comprises the steps that a server receives a sub-account information acquisition request sent by a main device for logging in a primary account;
generating sub-account information including password information of the sub-account according to the sub-account information acquisition request;
transmitting the sub-account information to the main equipment so that the main equipment can send the password information to the sub-equipment through a Near Field Communication (NFC) data transmission channel, Bluetooth and/or wireless fidelity (wifi); and in the process of sending the password information, the password information of the sub-account is in a state invisible to the user.
11. The method of claim 10, wherein transmitting the sub-account information to the primary device comprises:
and performing first encryption on the generated sub-account information, and transmitting the sub-account information subjected to the first encryption to the primary equipment.
12. A method for processing information of a seed account is characterized by comprising the following steps:
receiving password information of the sub-account sent by the main equipment through a Near Field Communication (NFC) data transmission channel, Bluetooth and/or wireless fidelity (wifi); in the process of sending the password information, the password information of the sub-account is in a user invisible state; the password information of the sub account is generated by the server;
logging in the application based on the received password information of the sub-account.
13. The method of claim 12, wherein the receiving of the password information of the sub-account sent by the primary device comprises:
receiving first encrypted password information sent by the main equipment; wherein the first encryption is encryption of password information by a server;
before logging in the application based on the received password information of the sub-account, the method further comprises the following steps:
and performing first decryption on the first encrypted password information through the application.
14. The method of claim 13, wherein the receiving of the password information of the sub-account sent by the primary device comprises:
receiving second encrypted password information sent by the main equipment; the second encryption is the encryption of the first encrypted password information by the main device;
before logging in the application based on the received password information of the sub-account, the method further comprises the following steps:
and performing second decryption on the second encrypted password information.
15. The method of claim 12, wherein receiving password information of the sub-account sent by the primary device comprises:
receiving password information in an encrypted state sent by a main device;
before logging in the application based on the received password information of the sub-account, the method further comprises the following steps:
and determining a decoding mode according to the password transmission channel for receiving the password information, and decrypting the password information in the encrypted state based on the determined decoding mode.
16. A terminal device for processing sub-account information is characterized in that the terminal device comprises:
the login module is used for logging in the application through the primary account;
the password request module is used for sending a sub-account information acquisition request to the server and requesting to acquire the password information of the sub-account;
the receiving module is used for receiving sub-account information returned by the server, wherein the sub-account information comprises password information of the sub-account;
the password sending module is used for sending the password information to the sub-equipment through a Near Field Communication (NFC) data transmission channel, Bluetooth and/or wireless fidelity (wifi); and in the process of receiving the sub-account information returned by the server and sending the password information, the password information of the sub-account is in a state invisible to the user.
17. The terminal device of claim 16, wherein the receiving module is specifically configured to:
receiving first encrypted sub-account information returned by the server;
the password sending module is specifically configured to:
and sending the first encrypted password information corresponding to the sub account number to the sub equipment.
18. The terminal device of claim 17, wherein the password sending module is specifically configured to:
and carrying out second encryption on the password information, and sending the password information subjected to the second encryption to the sub-equipment.
19. The terminal device of claim 16, wherein the password sending module is specifically configured to:
after receiving the sub-account information returned by the server, automatically storing the password information of the sub-account in the background, and sending the password information automatically stored in the background to the sub-equipment; the password information automatically stored in the background is in an encrypted state.
20. A server for processing information of a sub-account, the server comprising:
the receiving module is used for receiving a sub-account information acquisition request sent by a main device for logging in a primary account;
the generation module is used for generating sub-account information comprising the password information of the sub-account according to the sub-account information acquisition request;
the sending module is used for transmitting the sub-account information to the main equipment so that the main equipment can send the password information to the sub-equipment through a Near Field Communication (NFC) data transmission channel, Bluetooth and/or wireless fidelity (wifi); and in the process of sending the password information, the password information of the sub-account is in a state invisible to the user.
21. The server according to claim 20, wherein the sending module is specifically configured to:
and performing first encryption on the generated sub-account information, and transmitting the sub-account information subjected to the first encryption to the primary equipment.
22. A terminal device for processing sub-account information is characterized in that the terminal device comprises:
the receiving module is used for receiving the password information of the sub-account sent by the main equipment through a Near Field Communication (NFC) data transmission channel, Bluetooth and/or wireless fidelity (wifi); in the process of sending the password information, the password information of the sub-account is in a user invisible state; the password information of the sub account is generated by the server;
and the login module is used for logging in the application based on the received password information of the sub-account.
23. The terminal device of claim 22, wherein the receiving module is specifically configured to:
receiving first encrypted password information sent by the main equipment; wherein the first encryption is encryption of password information by a server;
the terminal device further includes:
and the decryption module is used for carrying out first decryption on the first encrypted password information through the application.
24. The terminal device of claim 23, wherein the receiving module is specifically configured to:
receiving second encrypted password information sent by the main equipment; the second encryption is the encryption of the first encrypted password information by the main device;
the decryption module is further configured to:
and performing second decryption on the second encrypted password information.
CN201610581320.XA 2016-07-21 2016-07-21 System, method and device for processing information of sub account number Active CN106911659B (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
CN201610581320.XA CN106911659B (en) 2016-07-21 2016-07-21 System, method and device for processing information of sub account number
TW106121645A TW201807614A (en) 2016-07-21 2017-06-28 System, method, and device for processing sub-account information
PCT/CN2017/092909 WO2018014785A1 (en) 2016-07-21 2017-07-14 System, method, and device for processing sub-account information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610581320.XA CN106911659B (en) 2016-07-21 2016-07-21 System, method and device for processing information of sub account number

Publications (2)

Publication Number Publication Date
CN106911659A CN106911659A (en) 2017-06-30
CN106911659B true CN106911659B (en) 2020-08-04

Family

ID=59206757

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610581320.XA Active CN106911659B (en) 2016-07-21 2016-07-21 System, method and device for processing information of sub account number

Country Status (3)

Country Link
CN (1) CN106911659B (en)
TW (1) TW201807614A (en)
WO (1) WO2018014785A1 (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106911659B (en) * 2016-07-21 2020-08-04 口碑控股有限公司 System, method and device for processing information of sub account number
CN113221128B (en) * 2020-01-21 2022-11-08 中国移动通信集团山东有限公司 Account and password storage method and registration management system
CN112967012A (en) * 2021-02-18 2021-06-15 江苏通付盾科技有限公司 Design method and system of enterprise cloud platform account
CN116723057B (en) * 2023-08-09 2023-11-10 上海凯翔信息科技有限公司 Cloud NAS multi-account storage system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102932341A (en) * 2012-10-25 2013-02-13 北京小米科技有限责任公司 Method, device and equipment for password processing
CN104283874A (en) * 2014-09-28 2015-01-14 小米科技有限责任公司 Data authority control method and device based on cloud server
US20160036805A1 (en) * 2010-01-27 2016-02-04 Keypasco Ab Network authentication method and device for implementing the same
CN105337933A (en) * 2014-07-03 2016-02-17 阿里巴巴集团控股有限公司 Method and system for creating sub-account, primary account device and sub-account device

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106911659B (en) * 2016-07-21 2020-08-04 口碑控股有限公司 System, method and device for processing information of sub account number

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160036805A1 (en) * 2010-01-27 2016-02-04 Keypasco Ab Network authentication method and device for implementing the same
CN102932341A (en) * 2012-10-25 2013-02-13 北京小米科技有限责任公司 Method, device and equipment for password processing
CN105337933A (en) * 2014-07-03 2016-02-17 阿里巴巴集团控股有限公司 Method and system for creating sub-account, primary account device and sub-account device
CN104283874A (en) * 2014-09-28 2015-01-14 小米科技有限责任公司 Data authority control method and device based on cloud server

Also Published As

Publication number Publication date
WO2018014785A1 (en) 2018-01-25
TW201807614A (en) 2018-03-01
CN106911659A (en) 2017-06-30

Similar Documents

Publication Publication Date Title
JP6399382B2 (en) Authentication system
EP3487142B1 (en) Providing and obtaining graphic payment code information
CN103235906B (en) A kind of application program encryption, decryption method and encryption, decryption device
CN106911659B (en) System, method and device for processing information of sub account number
CN108134789A (en) The method and Cloud Server of data synchronization between devices are carried out by cloud
CN103929307A (en) Password input method, intelligent secret key device and client device
CN103188221A (en) Application login method, application login device and mobile terminal
CN111130799B (en) Method and system for HTTPS protocol transmission based on TEE
CN111143474B (en) One-key binding changing method for mobile phone number based on block chain technology
CN109362074A (en) The method of h5 and server-side safety communication in a kind of mixed mode APP
CN103905204A (en) Data transmission method and transmission system
CN106685644B (en) Communication encryption method and device, gateway, server, intelligent terminal and system
CN110025955B (en) Information processing method, terminal, computer-readable storage medium, and computer device
CN104378388B (en) Executable file progress control method and device
CN104253801A (en) Method, device and system for realizing login authentication
CN104717224A (en) Login method and device
CN106817346A (en) Data transmission method and device and electronic equipment
CN102404337A (en) Data encryption method and device
JP5827724B2 (en) Method and apparatus for entering data
KR20170124953A (en) Method and system for automating user authentication with decrypting encrypted OTP using fingerprint in mobile phone
CN106685897B (en) Safe input method, device and system
EP3041188B1 (en) Method, device and system for controlling presentation of application
CN106161363B (en) SSL connection establishment method and system
CN110838919B (en) Communication method, storage method, operation method and device
CN109740319B (en) Digital identity verification method and server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant