CN107547610A - A kind of character-information processing method, server and terminal - Google Patents
A kind of character-information processing method, server and terminal Download PDFInfo
- Publication number
- CN107547610A CN107547610A CN201610497662.3A CN201610497662A CN107547610A CN 107547610 A CN107547610 A CN 107547610A CN 201610497662 A CN201610497662 A CN 201610497662A CN 107547610 A CN107547610 A CN 107547610A
- Authority
- CN
- China
- Prior art keywords
- character
- character string
- user
- input
- code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Abstract
The invention discloses a kind of character-information processing method, server and terminal, wherein, methods described includes:The first request is received, described first asks for report of user by the first file of third party's malice locking system login interface;The first character string is extracted from first file, the character that first character string can not be inputted by user is formed;Current systematic parameter is parsed from first file, code table is compared corresponding to according to the current system parameter adaptation;First character string is compared with the code table that compares, obtains comparison result;Preset strategy is extracted, and according to the preset strategy and the comparison result, first character string is converted to second character string that to compare code table related, the character that second character string can be inputted by user is formed.
Description
Technical field
The present invention relates to mechanics of communication, more particularly to a kind of character-information processing method, server and terminal.
Background technology
With the development of Internet technology, a large amount of popularizations of intelligent terminal, various applications, various services for life carry for user
For various using upper facility, meanwhile, various information security issues also emerge therewith.For example distort the login of user
Password (character for being revised as inputting by normal login password), user is seted to be taken advantage of from normal login system or application, hair
Information is cheated to user, user is unsatisfactory for requiring, does not allow for logging in system by user or application, due to being unable to login system or answering
With, very big puzzlement can be brought to the work and life of user, not simply fail to use the various services provided based on system or application,
And information security cannot also ensure.
However, in correlation technique, for the problem, effective solution there is no.
The content of the invention
In view of this, the embodiments of the invention provide a kind of character-information processing method, server and terminal, at least solve
The problem of prior art is present.
What the technical scheme of the embodiment of the present invention was realized in:
The embodiments of the invention provide a kind of character-information processing method, methods described includes:
The first request is received, described first asks for report of user by the of third party's malice locking system login interface
One file;
The first character string, the character institute that first character string can not be inputted by user are extracted from first file
Composition;
Current systematic parameter is parsed from first file, according to the current system parameter adaptation to correspondingly
Comparison code table;
First character string is compared with the code table that compares, obtains comparison result;
Preset strategy is extracted, and according to the preset strategy and the comparison result, first character string is converted to
To second character string that to compare code table related, the character that second character string can be inputted by user is formed.
The embodiment of the present invention additionally provides a kind of server, and the server includes:
Receiving unit, for the request of reception first, described first asks to be used for report of user by third party's malice locking system
First file of system login interface;
Extraction unit, for extracting the first character string from first file, first character string by user not
The character that can be inputted is formed;
Adaptation unit is parsed, for parsing current systematic parameter from first file, according to described current
System parameter adaptation compares code table corresponding to;
Comparing unit, for the first character string to be compared with the code table that compares, obtain comparison result;
Processing unit, for extracting preset strategy, and according to the preset strategy and the comparison result, by described first
Character string is converted to second character string that to compare code table related, the character institute that second character string can be inputted by user
Composition.
The embodiment of the present invention additionally provides a kind of character-information processing method, and methods described includes:
The first request is reported, described first asks for report of user by the of third party's malice locking system login interface
One file, first file include the first character string, and the character that first character string can not be inputted by user is formed;
The second character string is shown, the character that second character string can be inputted by user is formed, second character string
Server according to preset strategy and the comparison result with comparing code table, will state the first character string change it is resulting with than
The character string related to code table.
The embodiment of the present invention additionally provides a kind of terminal, and the terminal includes:
Reporting unit, for reporting the first request, described first asks to be used for report of user by third party's malice locking system
First file of system login interface, first file include the first character string, and first character string can not be defeated by user
The character entered is formed;
Display unit, for showing the second character string, the character that second character string can be inputted by user is formed, institute
State the second character string be server according to preset strategy and the comparison result with comparing code table, the first character string will be stated and changed
The resulting character string related to comparing code table.
The character-information processing method of the embodiment of the present invention, methods described include:Receive the first request, first request
For report of user by the first file of third party's malice locking system login interface;First is extracted from first file
Character string, the character that first character string can not be inputted by user are formed;Parsed from first file current
Systematic parameter, code table is compared corresponding to according to the current system parameter adaptation;First character string is compared into code with described
Table is compared, and obtains comparison result;Preset strategy is extracted, and according to the preset strategy and the comparison result, by described in
First character string is converted to second character string that to compare code table related, the word that second character string can be inputted by user
Symbol is formed.
Using the character-information processing method of the embodiment of the present invention, even if user has distorted user's by third party's malice
Login password, prevent user can also be by reporting fraud information request backstage to carry out from normal login system or application, user
Assist process, with solution must not login system or application the problem of, can not only use based on system or application provide it is various
Service, and the information security of itself can be ensured.
Brief description of the drawings
Fig. 1 is the one optional hardware architecture diagram of mobile terminal for realizing each embodiment of the present invention;
Fig. 2 is the communication system schematic diagram of mobile terminal as shown in Figure 1;
Fig. 3 is the schematic diagram for each side's hardware entities that information exchange is carried out in the embodiment of the present invention;
Fig. 4 is the terminal of the embodiment of the present invention one and the schematic diagram of server interaction;
Fig. 5 is to extort interface schematic diagram using the wooden horse of the embodiment of the present invention;
Fig. 6 is the schematic diagram using the first character string of the embodiment of the present invention;
Fig. 7 is using the second character string of the embodiment of the present invention and its schematic diagram of optional prompt message;
Fig. 8 is that the system of the embodiment of the present invention four forms structural representation;
Fig. 9 is the method flow schematic diagram using the scene of the embodiment of the present invention one.
Embodiment
The implementation to technical scheme is described in further detail below in conjunction with the accompanying drawings.
Describe to realize the mobile terminal of each embodiment of the present invention referring now to accompanying drawing.In follow-up description, use
For represent element such as " module ", " part " or " unit " suffix only for being advantageous to the explanation of the embodiment of the present invention,
Itself do not have specific meaning.Therefore, " module " can be used mixedly with " part ".
In the following detailed description, numerous details is set forth, thoroughly to understand the present invention.But, for
For one of ordinary skill in the art, it is clear that the present invention can be put into practice in the case of these no details.In other feelings
Under condition, disclosed known method, process, component, circuit and network are not described in detail, to avoid unnecessarily making embodiment
Various aspects are smudgy.
In addition, herein although term " first ", " second " etc. is employed many times describe various elements (or various threshold values or
Various applications or various instructions or various operations) etc., but these elements (or threshold value or application or instruction or operation) should not be by
The limitation of these terms.These terms are only intended to distinguish an element (or threshold value or application or instruction or operation) and another
Element (or threshold value or application or instruction or operation).For example, the first operation can be referred to as the second operation, the second operation can also
It is referred to as the first operation, without departing from the scope of the present invention, the first operation and the second operation are all operations, and simply the two is not
Identical operates.
Step in the embodiment of the present invention is not necessarily handled according to described step order, can be according to need
Ask and step is selectively upset into rearrangement, either delete the step in the step or increase embodiment in embodiment, the present invention
Step description in embodiment is optional sequential combination, does not represent all sequence of steps combination of the embodiment of the present invention,
Step order in embodiment is not construed as limiting the invention.
Term "and/or" in the embodiment of the present invention refers to including one or more of associated listed items
Any and whole possibility combination.It may also be noticed that:Where used in this disclosure, "comprises/comprising" specifies what is stated
Feature, integer, step, operation, the presence of element and/or component, but it is not excluded for other one or more features, integer, step
Suddenly, the presence or addition of operation, element and/or component and/or their group.
The intelligent terminal (such as mobile terminal) of the embodiment of the present invention can be implemented in a variety of manners.For example, the present invention is real
Apply mobile terminal described in example can include such as mobile phone, smart phone, notebook computer, digit broadcasting receiver,
Personal digital assistant (PDA, Personal Digital Assistant), tablet personal computer (PAD), portable media player
(PMP, Portable Media Player), guider etc. mobile terminal and digital TV, desktop computer etc.
Deng fixed terminal.Hereinafter it is assumed that terminal is mobile terminal.However, it will be understood by those skilled in the art that except especially using
Outside the element of mobile purpose, construction according to the embodiment of the present invention can also apply to the terminal of fixed type.
Fig. 1 is the one optional hardware architecture diagram of mobile terminal for realizing each embodiment of the present invention.
Mobile terminal 100 can include communication unit 110, audio/video (A/V) input block 120, user input unit
130th, reporting unit 140, output unit 150, display unit 151, memory cell 160, interface unit 170, the and of processing unit 180
Power subsystem 190 etc..Fig. 1 shows the mobile terminal with various assemblies, it should be understood that being not required for implementing institute
There is the component shown.More or less components can alternatively be implemented.The element of mobile terminal will be discussed in more detail below.
Communication unit 110 generally includes one or more assemblies, and it allows mobile terminal 100 and wireless communication system or net
Radio communication between network (if mobile terminal replaced with fixed terminal, it is logical can also to carry out electricity by wired mode
Letter).For example, communication unit can include when being specially wireless communication unit broadcast reception unit 111, mobile comm unit 112,
At least one in wireless interconnected net unit 113, short-range communication unit 114 and positional information unit 115, these units are optional
, can be with additions and deletions according to different demands.
Broadcast reception unit 111 receives broadcast singal and/or broadcast via broadcast channel from external broadcast management server
Relevant information.Broadcast channel can include satellite channel and/or terrestrial channel.Broadcast management server can be generated and sent
The broadcast singal and/or broadcast related information that the server or reception of broadcast singal and/or broadcast related information generate before
And send it to the server of terminal.Broadcast singal can include TV broadcast singals, radio signals, data broadcasting
Signal etc..Moreover, broadcast singal may further include the broadcast singal combined with TV or radio signals.Broadcast phase
Closing information can also provide via mobile communications network, and in this case, broadcast related information can be by mobile communication list
Member 112 receives.Broadcast singal can exist in a variety of manners, for example, its can with DMB (DMB,
Digital Multimedia Broadcasting) electronic program guides (EPG, Electronic Program Guide),
The electronic service guidebooks of digital video broadcast-handheld (DVB-H, Digital Video Broadcasting-Handheld)
The form of (ESG, Electronic Service Guide) etc. and exist.Broadcast reception unit 111 can be by using each
The broadcast system reception signal broadcast of type.Especially, broadcast reception unit 111 can be by using such as multi-media broadcast
- ground (DMB-T, Digital Multimedia Broadcasting-Terrestrial), DMB-is broadcast to defend
Star (DMB-S, Digital Multimedia Broadcasting-Satellite), digital video broadcast-handheld (DVB-H),
Radio Data System, the received terrestrial digital broadcasting synthesis of forward link media (MediaFLO, Media Forward Link Only)
The numeral for servicing (ISDB-T, Integrated Services Digital Broadcasting-Terrestrial) etc. is wide
Broadcast system receives digital broadcasting.Broadcast reception unit 111 may be constructed such that the various broadcast systems for being adapted to provide for broadcast singal
And above-mentioned digit broadcasting system.The broadcast singal and/or broadcast related information received via broadcast reception unit 111 can be deposited
Storage is in memory 160 (or other types of storage medium).
Mobile comm unit 112 sends radio signals to base station (for example, access point, node B etc.), exterior terminal
And at least one in server and/or receive from it radio signal.Such radio signal can lead to including voice
Talk about signal, video calling signal or the various types of data for sending and/or receiving according to text and/or Multimedia Message.
Wireless interconnected net unit 113 supports the Wi-Fi (Wireless Internet Access) of mobile terminal.The unit can be internally or externally
It is couple to terminal.Wi-Fi (Wireless Internet Access) technology involved by the unit can include WLAN (Wi-Fi, WLAN,
Wireless Local Area Networks), WiMAX (Wibro), worldwide interoperability for microwave accesses (Wimax), under high speed
Downlink packet access (HSDPA, High Speed Downlink Packet Access) etc..
Short-range communication unit 114 is the unit for supporting junction service.Some examples of short-range communication technology include indigo plant
Tooth, radio frequency identification (RFID, Radio Frequency Identification), Infrared Data Association (IrDA, Infrared
Data Association), ultra wide band (UWB, Ultra Wideband), purple honeybee etc..
Positional information unit 115 is the unit for checking or obtaining the positional information of mobile terminal.Positional information unit
Typical case be global positioning system (GPS, Global Positioning System).It is mono- according to current technology, GPS
Member 115 calculates range information from three or more satellites and correct time information and for the Information application three of calculating
Angle, so as to calculate according to longitude, latitude and highly accurately three-dimensional current location information.Currently, for calculation position
Three satellites and the position calculated by using other satellite correction and time are used with the method for temporal information
The error of information.In addition, GPS unit 115 can be by Continuous plus current location information in real time come calculating speed information.
A/V input blocks 120 are used to receive audio or video signal.A/V input blocks 120 can include the He of camera 121
Microphone 122, camera 121 in video acquisition mode or image capture mode by image capture apparatus obtain static images
Or the view data of video is handled.Picture frame after processing may be displayed on display unit 151.Handled through camera 121
Picture frame afterwards can be stored in memory cell 160 (or other storage mediums) or is transmitted via communication unit 110,
Two or more cameras 121 can be provided according to the construction of mobile terminal.Microphone 122 can be in telephone calling model, record
Sound (voice data) is received via microphone in pattern, speech recognition mode etc. operational mode, and can be by as
Acoustic processing is voice data.Audio (voice) data after processing can be converted in the case of telephone calling model can be through
The form that mobile communication base station is sent to by mobile comm unit 112 exports.Microphone 122 can implement various types of noises
(or suppression) algorithm is eliminated to eliminate (or suppression) caused noise or interference during receiving and sending audio signal.
User input unit 130 can control each of mobile terminal according to the order generation key input data that user inputs
Kind operation.User input unit 130 allows user to input various types of information, and can include keyboard, mouse, touch pad
(for example, sensitive component of detection change of resistance, pressure, electric capacity etc. caused by being touched), roller, rocking bar etc.
Deng.Especially, when touch pad is superimposed upon on display unit 151 in the form of layer, touch-screen can be formed.
Reporting unit 140, for reporting the first request, described first asks to be used for report of user by third party's malice locking
First file at system login interface, first file include the first character string, and first character string can not by user
The character of input is formed.Display unit 151, it is additionally operable to show the second character string, second character string can be inputted by user
Character formed, second character string be server according to preset strategy and the comparison result with comparing code table, will be stated
One character string carries out changing the resulting character string related to comparing code table.
Interface unit 170 is connected the interface that can pass through as at least one external device (ED) with mobile terminal 100.For example,
External device (ED) can include wired or wireless head-band earphone port, external power source (or battery charger) port, wired or nothing
Line FPDP, memory card port, the port for connecting the device with recognition unit, audio input/output (I/O) end
Mouth, video i/o port, ear port etc..Recognition unit can be that storage is used to verify that user uses each of mobile terminal 100
Kind of information and can include user identification unit (UIM, User Identify Module), client's recognition unit (SIM,
Subscriber Identity Module), Universal Subscriber recognition unit (USIM, Universal Subscriber
Identity Module) etc..In addition, the device with recognition unit (hereinafter referred to as " identification device ") can take intelligence
The form of card, therefore, identification device can be connected via port or other attachment means with mobile terminal 100.Interface unit 170
It can be used for receiving the input (for example, data message, electric power etc.) from external device (ED) and transmit the input received
One or more elements in mobile terminal 100 can be used for transmitting data between mobile terminal and external device (ED).
In addition, when mobile terminal 100 is connected with external base, interface unit 170 may be used as allowing by it by electricity
Power provides to the path of mobile terminal 100 from base or may be used as allowing to pass through it from the various command signals that base inputs
It is transferred to the path of mobile terminal.It may be used as being used to identify that mobile terminal is from the various command signals or electric power of base input
The no signal being accurately fitted within base.Output unit 150 is configured to defeated with the offer of vision, audio and/or tactile manner
Go out signal (for example, audio signal, vision signal, vibration signal etc.).Output unit 150 can include display unit 151, sound
Frequency output unit 152 etc..
Display unit 151 may be displayed in mobile terminal 100 information handled.For example, mobile terminal 100 can be shown
Relevant user interface (UI, User Interface) or graphic user interface (GUI, Graphical User Interface).
When mobile terminal 100 is in video calling pattern or image capture mode, display unit 151 can show the image of capture
And/or image, the UI or GUI etc. that show video or image and correlation function received.
Meanwhile when display unit 151 and touch pad in the form of layer it is superposed on one another to form touch-screen when, display unit
151 may be used as input unit and output device.Display unit 151 can include liquid crystal display (LCD, Liquid
Crystal Display), thin film transistor (TFT) LCD (TFT-LCD, Thin Film Transistor-LCD), organic light-emitting diodes
Manage in (OLED, Organic Light-Emitting Diode) display, flexible display, three-dimensional (3D) display etc.
It is at least one.Some in these displays may be constructed such that transparence to allow user to be watched from outside, and this is properly termed as
Transparent display, typical transparent display can be, for example, transparent organic light emitting diode (TOLED) display etc..According to
Specific desired embodiment, mobile terminal 100 can include two or more display units (or other display devices), example
Such as, mobile terminal can include outernal display unit (not shown) and inner display unit (not shown).Touch-screen can be used for examining
Survey touch input pressure and touch input position and touch input area.
Audio output unit 152 can mobile terminal be in call signal reception pattern, call mode, logging mode,
It is receiving or deposit in memory 160 by communication unit 110 when under the isotypes such as speech recognition mode, broadcast reception mode
The voice data transducing audio signal of storage and to export be sound.Moreover, audio output unit 152 can provide and mobile terminal
The related audio output of 100 specific functions performed (for example, call signal receives sound, message sink sound etc.).Audio
Output unit 152 can include loudspeaker, buzzer etc..
Memory cell 160 can store software program of the processing performed by processing unit 180 and control operation etc., or
Person can temporarily store oneself data (for example, telephone directory, message, still image, video etc.) through exporting or will export.
Moreover, memory cell 160 can store vibration and the audio letter of the various modes on being exported when touching and being applied to touch-screen
Number data.
Memory cell 160 can include the storage medium of at least one type, the storage medium include flash memory, hard disk,
Multimedia card, card-type memory (for example, SD or DX memories etc.), random access storage device (RAM, Random Access
Memory), static random-access memory (SRAM, Static Random Access Memory), read-only storage (ROM,
Read Only Memory), Electrically Erasable Read Only Memory (EEPROM, Electrically Erasable
Programmable Read Only Memory), programmable read only memory (PROM, Programmable Read Only
Memory), magnetic storage, disk, CD etc..Moreover, mobile terminal 100 can be with performing storage list by network connection
The network storage device cooperation of the store function of member 160.
Processing unit 180 generally controls the overall operation of mobile terminal.For example, processing unit 180 perform with voice call,
The related control and processing of data communication, video calling etc..And for example, processing unit 180 can with execution pattern identifying processing, with
Input is drawn into the handwriting input performed on the touchscreen or picture and are identified as character or image.
Power subsystem 190 receives external power or internal power under the control of processing unit 180 and provides operation respectively
Appropriate electric power needed for element and component.
Various embodiments described herein can be with use such as computer software, hardware or its any combination of calculating
Machine computer-readable recording medium is implemented.Implement for hardware, embodiment described herein can be by using application-specific IC
(ASIC, Application Specific Integrated Circuit), digital signal processor (DSP, Digital
Signal Processing), digital signal processing device (DSPD, Digital Signal Processing Device), can
Programmed logic device (PLD, Programmable Logic Device), field programmable gate array (FPGA, Field
Programmable Gate Array), processor, controller, microcontroller, microprocessor, be designed to perform it is described herein
At least one of the electronic unit of function implement, in some cases, such embodiment can be in controller 180
Middle implementation.For software implementation, the embodiment of such as process or function can be with allowing to perform at least one function or operation
Single software unit implement.Software code can be by the software application write with any appropriate programming language
(or program) is implemented, and software code can be stored in memory 160 and be performed by controller 180.
So far, oneself according to its function through describing mobile terminal.Below, for the sake of brevity, will description such as folded form,
Slide type mobile terminal in various types of mobile terminals of board-type, oscillating-type, slide type mobile terminal etc., which is used as, to be shown
Example.Therefore, the present invention can be applied to any kind of mobile terminal, and be not limited to slide type mobile terminal.
Mobile terminal 100 as shown in Figure 1 may be constructed such that using via frame or packet transmission data it is all if any
Line and wireless communication system and satellite-based communication system operate.
The communication system that can be operated referring now to Fig. 2 descriptions mobile terminal wherein according to embodiments of the present invention.
Such communication system can use different air interface and/or physical layer.For example, used by communication system
Air interface includes such as frequency division multiple access (FDMA, Frequency Division Multiple Access), time division multiple acess
(TDMA, Time Division Multiple Access), CDMA (CDMA, Code Division Multiple
Access) and UMTS (UMTS, Universal Mobile Telecommunications System) is (special
Not, Long Term Evolution (LTE, Long Term Evolution)), global system for mobile communications (GSM) etc..As unrestricted
Property example, following description is related to cdma communication system, but such teaching is equally applicable to other types of system.
With reference to figure 2, cdma wireless communication system can include multiple mobile terminals 100, multiple base station (BS, Base
Station) 270, base station controller (BSC, Base Station Controller) 275 and mobile switching centre (MSC,
Mobile Switching Center)280.MSC280 is configured to and Public Switched Telephony Network (PSTN, Public
Switched Telephone Network) 290 formation interfaces.MSC280 is also structured to can be coupled via back haul link
BSC275 to base station 270 forms interface.If back haul link can construct according to any of interface that Ganji knows, described
Interface includes such as E1/T1, ATM, IP, PPP, frame relay, HDSL, ADSL or xDSL.It will be appreciated that as shown in Figure 2
System can include multiple BSC275.
Each BS 270 can service one or more subregions (or region), by multidirectional antenna or the day of sensing specific direction
Each subregion of line covering is radially away from BS 270.Or each subregion can by two for diversity reception or more
Multiple antennas covers.Each BS 270, which may be constructed such that, supports multiple frequency distribution, and each frequency distribution has specific frequency
Compose (for example, 1.25MHz, 5MHz etc.).
What subregion and frequency were distributed, which intersects, can be referred to as CDMA Channel.BS 270 can also be referred to as base station transceiver
System (BTS, Base Transceiver Station) or other equivalent terms.In this case, term " base station "
It can be used for broadly representing single BSC275 and at least one BS 270.Base station can also be referred to as " cellular station ".It is or special
Multiple cellular stations can be referred to as by determining BS 270 each subregion.
As shown in Figure 2, broadcast singal is sent to by broadcsting transmitter (BT, Broadcast Transmitter) 295
The mobile terminal 100 of operation in system.Broadcast reception unit 111 as shown in Figure 1 is arranged at mobile terminal 100 to connect
Receive the broadcast singal sent by BT295.In fig. 2 it is shown that several satellites 300, such as global positioning system can be used
(GPS) satellite 300.The help of satellite 300 positions at least one in multiple mobile terminals 100.
In fig. 2, multiple satellites 300 are depicted, it is understood that, any number of satellite can be utilized to obtain useful
Location information.Positional information unit 115 as shown in Figure 1 is generally configured to coordinate what is to obtain wanted with satellite 300
Location information.Substitute GPS tracking techniques or outside GPS tracking techniques, the position that can track mobile terminal can be used
Other technologies.In addition, at least one gps satellite 300 can optionally or additionally handle satellite dmb transmission.
As a typical operation of wireless communication system, BS 270 receives the reverse strand from various mobile terminals 100
Road signal.Mobile terminal 100 generally participates in call, information receiving and transmitting and other types of communication.Certain base station 270 receives each
Reverse link signal is handled in specific BS 270.The data of acquisition are forwarded to the BSC275 of correlation.BSC provides logical
Talk about resource allocation and the mobile management function of the coordination including the soft switching process between BS 270.BSC275 will also be received
Data are routed to MSC280, and it provides the extra route service for forming interface with PSTN290.Similarly, PSTN290 with
MSC280 forms interface, and MSC and BSC275 form interface, and BSC275 correspondingly controls BS 270 with by forward link signals
It is sent to mobile terminal 100.
The mobile comm unit 112 of communication unit 110 is based on the access mobile communication built in mobile terminal in mobile terminal
Necessary data (including customer identification information and authentication information) the access movement of network (such as 2G/3G/4G mobile communications networks)
It is (including upper that the business such as communication network is the web page browsing of mobile terminal user, network multimedia plays transmit mobile data
Capable mobile data and descending mobile data).
The wireless interconnected net unit 113 of communication unit 110 realizes nothing by running the related protocol function of hotspot
The function of line focus, hotspot supports multiple mobile terminal (any mobile terminal outside mobile terminal) accesses, by multiple
Web page browsing, the net of mobile terminal user are connected as with the mobile communication between mobile comm unit 112 and mobile communications network
The business such as network multimedia transmission mobile data (including up mobile data and descending mobile communication number
According to), because mobile terminal is substantially the mobile communication connection transmission mobile communication between multiplexing mobile terminal and communication network
Data, therefore the flow of the mobile data of mobile terminal consumption is included in mobile terminal by the charging entity of communication network side
Post and telecommunication tariff, so as to consume the data traffic for the mobile data that the post and telecommunication tariff that uses of mobile terminal signing includes.
Fig. 3 is the schematic diagram for each side's hardware entities that information exchange is carried out in the embodiment of the present invention, and Fig. 3 includes:Service
Device 11, terminal device 21-24, terminal device 21-24 carry out information exchange by cable network or wireless network with server,
Terminal device includes the types such as mobile phone, desktop computer, PC, all-in-one.The embodiment of the present invention is used, if terminal device 21-24 quilts
Malicious third parties have distorted system login password, lead to not normal login system, can be by the first file (such as wooden horse file, wood
Marvin's part contains fraud information) server is reported by the first request, server receives the first request, and first request is used
It can be directed to the first request by the first file of third party's malice locking system login interface, server in report of user and be carried out as walking
Processing procedure shown in rapid S1-S4.Mark 10 represents to allow the processing procedure in server internal.The processing procedure includes:
Step S1, the first character string, the character institute that first character string can not be inputted by user are extracted from first file
Composition;Step S2, current systematic parameter is parsed from first file, is arrived according to the current system parameter adaptation
Corresponding comparison code table (this example is with WINDOWS systems, however not excluded that also have the possibility of other systems, such as mobile phone A ndroid and
The possibility of IOS systems, the comparison code table of corresponding WINDOWS systems can be ASCII character table);Step S3, by the first character string with
The comparison code table is compared, and obtains comparison result;Step S4, preset strategy is extracted, and according to the preset strategy and institute
Comparison result is stated, first character string is converted to and second character string that to compare code table related, second character
The character that going here and there can be inputted by user is formed.For example, can not input ascii table inside points corresponding to character is converted to
Coding, is made up of a numeral, and the coded strings being made up of the coding of each character in corresponding character string form the second character
String, the character that the second character string can be inputted by user forms, as the combination in digital 0-9 forms.By outside ascii table not
Character can be inputted and be converted to corresponding coding, be made up of two numerals.Finally, server by the second character string (by the first character
Go here and there obtained coding after this character conversion that can not be inputted, encode and formed by character can be inputted, can be used in digital 0-9
Formed) terminal device 21-24 is showed by appropriate mode.For exhibition method, in second character string,
For the corresponding coded strings for identifying any one character in each first character string, separator (such as punctuation marks used to enclose the title, or bracket be present
Etc.), can clearly distinguish:Which can not input word in corresponding first character string of which coded strings in second character string
Symbol.Certainly, in each coded strings of the second character string, (one in corresponding first character string of such as each coded strings can not input word
Symbol) in can also not need separator.As long as this long string of second character string is inputted, user need not know in fact
Which of corresponding first character string of which coded strings can not input character in second character string.
Above-mentioned Fig. 3 example is a system architecture example for realizing the embodiment of the present invention, and the embodiment of the present invention is not
It is limited to the system architecture described in above-mentioned Fig. 3, based on the hardware configuration of mobile terminal 100 described in above-mentioned Fig. 1, the communication described in Fig. 2
System and the system architecture described in Fig. 3, propose each embodiment of the inventive method.
Embodiment one:
A kind of character-information processing method of the embodiment of the present invention, as shown in figure 4, methods described includes:User utilizes and stepped on
Record the operating system of password login terminal (such as mobile phone, PC, notebook, tablet personal computer), can not login system, receive comprising distorting
First prompt message of the normal login password of user, send first according to first prompt message and ask to server, with request
Solving the problems, such as can not register system (step 101).Specifically, before initiating the first request, user can be close using logging in
The operating system of code registration terminal (such as mobile phone, PC, notebook, tablet personal computer), operating system are not limited to Windows systems, also
Can be IOS systems or android system.User first inputs normal login Windows, and (password of operating system, as a result finds
Login system is unable to, code error, after one or many input errors, receives the first prompt message, the first prompt message
Showing allows the password of login system, and the password shown in first prompt message distorts normal login for malicious third parties
The password obtained after the password of Windows operating system.The purpose that malicious third parties distort password is to send fraud
Information,, can not login system if being unsatisfactory for third-party requirement by the system login interface locking of user to user.With
Exemplified by Windows operating system, wooden horse extortion interface is illustrated in figure 5, is inputted when A1 show logging in system by user in Fig. 5 close
The position of code, the password represent that the position shown in A2 shown in dashed box is to receive the login that malicious third parties are sent to user with M1
The position of password, the password represent with M2, and it is convenient and use that dashed box is intended merely to description, in practical application and is not present the void
Frame.M2 is obtained after malicious third parties distort M1, and M2 is included as what A3 was identified can not input character, it is this can not
Character is inputted, user is can not to be inputted by currently inputting the state of password, such as, this, which can not input character, to be
Some Chinese character, and in the currently state of input password, by password is generally made up of the combination of number and or symbol, then
Default user can input the combining characters such as numeral or symbol, and the total length for inputting character is conditional, in this state
Under can not input Chinese character.If it is intended to input Chinese character, must switch current input method state to the Chinese for supporting input Chinese character
Input state, but, due to systems inspection to the current state for input password, do not allow to be switched in support input Chinese character
Literary input state.User can not normal login system in the scene of foregoing description.The first of server receiving terminal transmission please
Ask, described first asks for report of user by the first file (step 102) of third party's malice locking system login interface.The
One file can be Windows wooden horse files, as shown in figure 3, the reporting of user wooden horse file, request server processing, with
To the password that can log in Windows systems.Specifically, for the wooden horse file, its essence is malicious third parties by repairing
Use instead family normally log in Windows login password make user can not login system, and then realize fraud to user, such as remind
Otherwise user charges or contact malicious third parties, the system for locking user always, can not permitted with asking for the password of login system
Perhaps logging in system by user.And existing solution is:The amended Windows login passwords of wooden horse are extracted, instruct victim
The password is inputted with into operating system.However, change of secret code can not be inputted character (such as A3 institutes in Fig. 5 by a kind of wooden horse
Mark can not input character), this to input character, user is can not to be inputted by currently inputting the state of password
, also it is difficult to input even if password is cracked out.User, have to be by supplementary means, i.e., due to being unable to login system:Report the wood
Marvin's part, request server processing.For example active user is to use terminal (such as computer) login system, discovery receives the
The fraud information of tripartite and can not login system, can be connected using the computer direct report wooden horse file to server;Or find
The computer can not report wooden horse file, then forward wooden horse file to server by another terminal (such as mobile phone) of user, will
The fraud information that third party sends (such as wooden horse file, is specially that " character change window password can not be inputted by uploading use
Wooden horse file ") transfer to server to be handled.In this scene, it is related to the interaction of cross-terminal, i.e.,:Locked system is stepped on
The computer at interface is recorded, mobile phone will be sent to comprising the wooden horse file that can not input character, mobile phone, which includes this, can not input character
Wooden horse file report background server and analyzed, can be used for unlocking so that server can parse from wooden horse file
The new login password (new login password is represented with M2) of system interface, new login password M2 are exactly that third party normally steps on to user
Record password (normal login password is represented with M1) carries out the new login password generated after malice is distorted, and new login password M2 is just
It is where the reason for causing user to be unable to login system interface.Server extracts the first character string from first file,
The character that first character string can not be inputted by user forms (step 103).Extracting mode includes:Carried by static analysis
Password is taken, or by way of password is extracted in dynamic behaviour, also obtains the side of password including the use of other any means certainly
Formula.Still by taking above-mentioned application scenarios as an example, the first character string is new login password M2, and the first file can be wooden horse file.From institute
State and current systematic parameter is parsed in the first file, code table is compared corresponding to according to the current system parameter adaptation
(step 104).The embodiment of the present invention is described by taking Windows systems as an example, now, under Windows systems, according to described
It can be ASCII character table that current system parameter adaptation compares code table corresponding to.In order to not limit scope, however not excluded that there is it
His system, such as android system and the possibility of IOS systems, all in the protection domain of the embodiment of the present invention.Server is by first
Character string is compared with the code table that compares, and obtains comparison result, extracts preset strategy, and according to the preset strategy and institute
Comparison result is stated, first character string is converted to and second character string that to compare code table related, second character
The character that going here and there can be inputted by user forms (step 105).Specifically, by taking Windows systems as an example, under Windows systems,
It is in the scene of ASCII character table, by ascii table inside points according to the current system parameter adaptation to corresponding comparison code table
The character that can not input be converted to corresponding coding, be made up of a numeral, by the coding of each character in corresponding character string
The coded strings formed form the second character string, and the character that the second character string can be inputted by user forms, in digital 0-9
Formed.The character that can not input outside ascii table is converted into corresponding coding, is made up of two numerals.Server will
(coding that will be obtained after this character conversion that can not be inputted of the first character string, is encoded by that can input character structure second character string
Into the combination in digital 0-9 being used to be formed) terminal is sent to, and show terminal device to enter by appropriate mode
Row shows (step 106).After second character string is supplied to terminal to be shown by server, terminal can be according to described
Two character string system for unlocking login interfaces, sign in in system.For exhibition method, in second character string, for pair
The coded strings of any one character in each first character string should be identified, separator (such as punctuation marks used to enclose the title, or bracket etc.) be present,
Can clearly distinguish:Which can not input character in corresponding first character string of which coded strings in second character string.Certainly,
In each coded strings (one in such as each corresponding first character string of coded strings can not input character) of the second character string
Separator can not needed.As long as this long string of second character string is inputted, user need not know the second word in fact
Which of corresponding first character string of which coded strings can not input character in symbol string.
Embodiment two
A kind of character-information processing method of the embodiment of the present invention, methods described include:User is logged in using login password
The operating system of terminal (such as mobile phone, PC, notebook, tablet personal computer), can not login system, receive and normally step on comprising distorting user
The first prompt message of password is recorded, sending first according to first prompt message asks to server, to ask solution not step on
The problem of recording operating system.Specifically, initiate first request before, user can utilize login password registration terminal (such as mobile phone,
PC, notebook, tablet personal computer) operating system, operating system is not limited to Windows systems, can also be IOS systems or
Android system.User first inputs normal login Windows, and (password of operating system, as a result discovery is unable to login system, close
Code mistake, after one or many input errors, the first prompt message is received, the first prompt message, which shows to allow to log in, is
The password of system, the password shown in first prompt message distort the normal Windows operating system that logs in for malicious third parties
The password obtained after password.The purpose that malicious third parties distort password is in order to send fraud information to user, by user
System login interface locking, can not login system if being unsatisfactory for third-party requirement.Using Windows operating system as
Example, be illustrated in figure 5 wooden horse extortion interface, input the position of password when A1 show logging in system by user in Fig. 5, the password with
M1 represents that the position shown in A2 shown in dashed box is the position for receiving the login password that malicious third parties are sent to user, the password
Represented with M2, it is convenient and use that dashed box is intended merely to description, in practical application and is not present the dashed box.M2 is malicious third parties
Obtained after M1 is distorted, and M2 is included as what A3 was identified can not input character, this to input character, user is nothing
What method was inputted by currently inputting the state of password, such as, this, which can not input character, to be some Chinese character, and current
Input in the state of password, by password is generally made up of the combination of number and or symbol, then default user can input number
The combining characters such as word or symbol, and the total length for inputting character is conditional, can not input Chinese character in this state.
If it is intended to input Chinese character, must switch current input method state to the input in Chinese state for supporting input Chinese character, but, due to being
System checks the current state for input password, does not allow to be switched to the input in Chinese state for supporting input Chinese character.User is upper
Stating can not normal login system in the scene of description.The first request that server receiving terminal is sent, described first asks to be used for
Report of user is by the first file of third party's malice locking system login interface.First file can be Windows wooden horse files,
As shown in figure 3, the reporting of user wooden horse file, request server processing, to obtain that the password of Windows systems can be logged in.Tool
Body, for the wooden horse file, its essence be malicious third parties by change user normally log in Windows login it is close
Code make user can not login system, and then realize fraud to user, such as remind user charges or contact malicious third parties with rope
Otherwise take, the system for locking user always, can not allow logging in system by user with the password of login system.And existing solution
Scheme is:The amended Windows login passwords of wooden horse are extracted, instruct victim to input the password with into operating system.So
And a kind of wooden horse can by change of secret code for can not input character (as in Fig. 5 A3 identified can not input character), it is this can not
Character is inputted, user is can not to be inputted by currently inputting the state of password, is also difficult to input even if password is cracked out.
User, have to be by supplementary means, i.e., due to being unable to login system:Report the wooden horse file, request server processing.Such as
Active user is to use terminal (such as computer) login system, and discovery receives third-party fraud information and can not log in and be
System, report wooden horse file can be connected using the computer direct to server;Or find that the computer can not report wooden horse file, then
Forwarding wooden horse file by another terminal (such as mobile phone) of user, the fraud information for sending third party is (such as wood to server
Marvin's part, it is specially " the wooden horse file of character change window password can not be inputted by uploading use ") transfer to server to carry out
Processing.In this scene, it is related to the interaction of cross-terminal, i.e.,:The computer at locked system login interface, will include to input
The wooden horse file of character is sent to mobile phone, and this is reported background server comprising the wooden horse file that can not input character and entered by mobile phone
Row analysis, it can be used for the new login password (new login at system for unlocking interface so that server can parse from wooden horse file
Password is represented with M2), new login password M2 is exactly third party to the normal login password of user (normal login password M1 tables
Show) the new login password that generates after malice is distorted is carried out, new login password M2 is exactly to cause user to be unable to login system interface
The reason for where.Server extracts the first character string from first file, and first character string can not be defeated by user
The character entered is formed.Extracting mode includes:Password is extracted by static analysis, or the side of password is extracted by dynamic behaviour
Formula, the mode of password is also obtained including the use of other any means certainly.Still by taking above-mentioned application scenarios as an example, the first character string is
New login password M2, the first file can be wooden horse file.Current systematic parameter is parsed from first file, according to
The current system parameter adaptation compares code table corresponding to.The embodiment of the present invention is described by taking Windows systems as an example,
Now, under Windows systems, it can be ASCII character to compare code table corresponding to according to the current system parameter adaptation
Table.In order to not limit scope, however not excluded that also have other systems, such as android system and the possibility of IOS systems, all in the present invention
In the protection domain of embodiment.First character string is compared server with the code table that compares, and obtains comparison result, extraction
Preset strategy, and according to the preset strategy and the comparison result, first character string is converted to and compares code with described
The second related character string of table, the character that second character string can be inputted by user are formed.Wherein, the preset strategy bag
Include:Judge character that the user included in first character string can not input whether the comparison code table numerical value model
In enclosing, if the character that the user can not input in number range, is directly converted to first character string correspondingly
Comparison code form coded strings;If the character portion that the user can not input is in number range, directly by described
The partial character of one character string is converted to the corresponding coded strings for comparing code form, by beyond the remainder character of number range
With being changed again after at least one Coding and description for comparing yard form related to comparing code table.That is, in numerical value model
In enclosing, character can not be inputted for some in the first character string, is indicated as comparing coding corresponding to one in code table;
Without in number range, for some in the first character string can not input character, then needing with comparison code table
At least one coded representation, two codings such as adjacent thereto represent, can just be converted to corresponding to compare code form
Coded strings.Specifically, by taking Windows systems as an example, under Windows systems, according to the current system parameter adaptation
To corresponding comparison code table in the scene of ASCII character table, by can not inputting corresponding to character is converted to for ascii table inside points
Coding, is made up of a numeral, and the coded strings being made up of the coding of each character in corresponding character string form the second character
String, the character that the second character string can be inputted by user forms, as the combination in digital 0-9 forms.By outside ascii table not
Character can be inputted and be converted to corresponding coding, be made up of two numerals.Server is (this by the first character string by the second character string
The coding obtained after the character conversion that can not be inputted, encodes and is formed by that can input character, can use the combination institute in digital 0-9
Composition) terminal is sent to, and show terminal device to be shown by appropriate mode.Server is by second character string
After being supplied to terminal to be shown, terminal can be signed in in system according to the second character string system for unlocking login interface.
For exhibition method, in second character string, any one character in each first character string is identified for corresponding
Coded strings, separator (such as punctuation marks used to enclose the title, or bracket etc.) be present, can clearly distinguish:Which coded strings in second character string
Which can not input character in corresponding first character string.Certainly, in each coded strings (such as each coded strings of the second character string
One in corresponding first character string can not input character) in can also not need separator.As long as this long string of second
Character string inputs, and user need not know which in corresponding first character string of which coded strings in the second character string in fact
It is individual to input character.
So that some in the first character string can not input character in ascii table number range as an example, citing description is such as
Under:
The extraction preset strategy, and according to the preset strategy and the comparison result, first character string is turned
Be changed to second character string that to compare code table related, including:When detecting what it was included in first character string
The first character code in the character that the user can not input<When=127, judge first character code in ASCII
In the number range of table, then first character code is converted directly into the coding A, the coding A of corresponding ASCII forms
It is made up of a numeral.That is, in ascii table number range, one is represented with the coding A of an ASCII form
The Chinese character that can not be inputted, i.e.,:If in the range of standard ascii table, this character of Coding and description corresponding to character is used.
Character can not be inputted not in ascii table number range (or beyond ASCII with some in the first character string
Table number range) exemplified by, citing is described as follows:
The extraction preset strategy, and according to the preset strategy and the comparison result, first character string is turned
Be changed to second character string that to compare code table related, including:When detecting what it was included in first character string
During the first character code > 127 in the character that the user can not input, judge that first character code exceeds ASCII
The number range of table, the then two neighboring coded representation by first character code by corresponding ASCII forms, and being converted to
Corresponding coding B, the coding B are made up of two numerals.That is, exceed ascii table number range, with two ASCII
The coding B of form represents a Chinese character that can not be inputted, i.e.,:If not in the range of standard ascii table, continue to take
Character late is encoded, and a Chinese character is determined using two numerals, if first character is encoded to A, second character is compiled
Code is B, then corresponding Chinese character is encoded to 256*A+B.
Above-mentioned 2 examples, only it is extracted the corresponding coding that can not input character.Alternative solution pair can input character
Extraction coding, only can also can not input the coding of character in extraction part, extraction scope not necessarily with it is completely the same in this programme.
Embodiment three:
A kind of character-information processing method of the embodiment of the present invention, methods described include:User is logged in using login password
The operating system of terminal (such as mobile phone, PC, notebook, tablet personal computer), can not login system, receive and normally step on comprising distorting user
The first prompt message of password is recorded, sending first according to first prompt message asks to server, to ask solution not step on
The problem of recording operating system, described first asks the first text by third party's malice locking system login interface for report of user
Part, first file include the first character string, and the character that first character string can not be inputted by user is formed.Specifically
, before initiating the first request, user can utilize the behaviour of login password registration terminal (such as mobile phone, PC, notebook, tablet personal computer)
Make system, operating system is not limited to Windows systems, can also be IOS systems or android system.User first inputs normally
Windows is logged in (password of operating system, as a result to find to be unable to login system, code error, in one or many input errors
Afterwards, the first prompt message is received, the first prompt message shows the password for allowing login system, shown in first prompt message
The password shown is that malicious third parties distort the password obtained after the normal password for logging in Windows operating system.Malicious third parties
A purpose for distorting password is to send fraud information to user, the system login interface of user is locked, if discontented
The third-party requirement of foot, then can not login system.By taking Windows operating system as an example, wooden horse extortion interface is illustrated in figure 5,
The position of password is inputted when A1 show logging in system by user in Fig. 5, the password is represented with M1, the position shown in A2 shown in dashed box
To receive the position that malicious third parties are sent to the login password of user, the password represents that dashed box is intended merely to description side with M2
Just use, in practical application and be not present the dashed box.M2 is obtained after malicious third parties distort M1, and M2 includes
As what A3 was identified can not input character, this to input character, user is can not to be entered by currently inputting the state of password
Row input, such as, it can be some Chinese character that this, which can not input character, and in the currently state of input password, due to password
Generally it is made up of the combination of number and or symbol, then default user can input the combining characters such as numeral or symbol, and input
The total length of character is conditional, can not input Chinese character in this state.If it is intended to input Chinese character, must switch and work as
Preceding input method status to the input in Chinese state for supporting input Chinese character, but, due to systems inspection to current to input password
State, do not allow to be switched to the input in Chinese state for supporting input Chinese character.User can not normally step in the scene of foregoing description
Recording system.The first request that server receiving terminal is sent, described first asks to be used for report of user by third party's malice locking
First file at system login interface.First file can be Windows wooden horse files, as shown in figure 3, the reporting of user wooden horse
File, request server processing, to obtain that the password of Windows systems can be logged in.Specifically, for the wooden horse file,
Its essence be malicious third parties normally logged in by changing user Windows login password make user can not login system, enter
And the fraud to user is realized, such as remind user charges or contact malicious third parties can be no with the password of login system to ask for
Then, the system for locking user always, does not allow logging in system by user.And existing solution is:It is amended to extract wooden horse
Windows login passwords, victim is instructed to input the password with into operating system.However, a kind of wooden horse can be by change of secret code
For can not input character (as in Fig. 5 A3 identified can not input character), this to input character, user is to pass through
What the state of current input password was inputted, also it is difficult to input even if password is cracked out.User is due to being unable to login system, only
It is good by supplementary means, i.e.,:Report the wooden horse file, request server processing.For example active user is to use a terminal
(such as computer) login system, discovery receive third-party fraud information and can not login system, can be connected using the computer direct
Wooden horse file is reported to server;Or find that the computer can not report wooden horse file, then by another terminal of user (such as
Mobile phone) for forwarding wooden horse file to server, the fraud information that third party is sent (such as wooden horse file, is specially " to upload use
The wooden horse file of character change window password can not be inputted ") transfer to server to be handled.In this scene, be related to across
The interaction of terminal, i.e.,:The computer at locked system login interface, will be sent to hand comprising the wooden horse file that can not input character
This is included and can not input the wooden horse file of character and report background server and analyzed by machine, mobile phone, so that server can be from
The new login password (new login password is represented with M2) that can be used for system for unlocking interface is parsed in wooden horse file, new login is close
Code M2 is exactly that third party carries out generating after malice is distorted to the normal login password of user (normal login password is represented with M1)
New login password, new login password M2 be exactly the reason for causing user to be unable to login system interface where.Server is from institute
State and the first character string is extracted in the first file, the character that first character string can not be inputted by user is formed.Extraction side
Formula includes:Password is extracted by static analysis, or by way of password is extracted in dynamic behaviour, certainly also including the use of other
Any means obtain the mode of password.Still by taking above-mentioned application scenarios as an example, the first character string is new login password M2, the first file
It can be wooden horse file.Current systematic parameter is parsed from first file, is fitted according to the current systematic parameter
Code table is compared corresponding to being fitted on.The embodiment of the present invention is described by taking Windows systems as an example, now, in Windows systems
Under, it can be ASCII character table to compare code table corresponding to according to the current system parameter adaptation.In order to not limit scope,
Also other systems are not excluded for, such as android system and the possibility of IOS systems, all in the protection domain of the embodiment of the present invention.
First character string is compared server with the code table that compares, and obtains comparison result, extracts preset strategy, and according to described
Preset strategy and the comparison result, by first character string be converted to second character string that to compare code table related,
The character that second character string can be inputted by user is formed.Specifically, by taking Windows systems as an example, in Windows systems
Under, it is in the scene of ASCII character table, by ascii table according to the current system parameter adaptation to corresponding comparison code table
The partial character that can not input is converted to corresponding coding, is made up of a numeral, by each character in corresponding character string
The formed coded strings of coding form the second character string, and the character that the second character string can be inputted by user forms, such as digital 0-9
In combination formed.The character that can not input outside ascii table is converted into corresponding coding, is made up of two numerals.Service
By the second character string, (coding that will be obtained after this character conversion that can not be inputted of the first character string, is encoded by that can input word device
Symbol is formed, and the combination in digital 0-9 can be used to be formed) terminal is sent to, and show terminal to set by appropriate mode
It is standby to be shown.After second character string is supplied to terminal to be shown by server, terminal shows the second character string, described
The character that second character string can be inputted by user is formed, and second character string is server according to preset strategy and with comparing
The comparison result of code table, the first character string will be stated and carry out changing the resulting character string related to comparing code table.Terminal can be with
According to the second character string system for unlocking login interface, sign in in system.For exhibition method, such as second character string
In, for the corresponding coded strings for identifying any one character in each first character string, exist separator (such as punctuation marks used to enclose the title, or
Bracket etc.), can clearly distinguish:Which can not be inputted in corresponding first character string of which coded strings in second character string
Character.Certainly, in each coded strings of the second character string, (one in corresponding first character string of such as each coded strings can not input
Character) in can also not need separator.As long as this long string of second character string is inputted, user need not know in fact
Which of corresponding first character string of which coded strings can not input character in the character string of road second.
An example for showing the second character string in terminal is:When second character string is by the coded strings of comparison code form
When being represented with list separator, at least one coded strings Mi described in being divided by list separator (such as bracket) is shown, that is to say, that
Password is shown in terminal page, for character can not be inputted, is encoded and is placed in bracket, show user in order.It is each
It is individual by the list separator divide description coded strings Mi, according to sequentially correspond respectively in the first character string accordingly can not be defeated
Enter character, be shown to terminal user in sequence.Second character string is formed by least one coded strings Mi.By can not
An example of the first character string that character is formed is inputted, (position that A4 corresponds to that dashed box is identified in figure is first as shown in Figure 6
The position of character string, in addition, dashed box is intended merely to conveniently state, in actual applications and the dashed box need not be shown).By service
The conversion of device, (A5 corresponds to dashed box and identified an example of the second character string formed by that can input character in figure as shown in Figure 7
Position be the second character string position, in addition, dashed box is intended merely to conveniently state, in actual applications and the void need not be shown
Frame, the position that A6 is identified are the position where prompt message), in Fig. 7, list separator passes through bracket point using bracket
Every at least one coded strings, sequentially user is showed to look into by corresponding to the order that can not accordingly input character in the first character string
Read, as shown in fig. 7, each coded strings Mi in bracket, can be identical or different.In Fig. 7, the prompting that A6 is identified is believed
Terminal user is shown to together with ceasing the second character string that can be identified for option, prompt message with A5, can also only be shown
Show the second character string that A5 is identified to terminal user.
In the case where prompt message and the second character string are shown to the scene of terminal user together, methods described also includes:Obtain
Prompt message simultaneously shows that the prompt message is used to characterize the trigger condition for inputting second character string.According to the triggering
Condition performs the first operation on triggering button (such as keyboard Alt key), keeps first operation constant (as pressed lower keyboard
Alt key is not put), while the second operation is performed, described second operates the correspondence that second character string is sequentially inputted for characterizing
User can input character.First operation of the release on the triggering button, the input of character can be inputted by terminating corresponding user.
That is, method of the user according to coding input password is known on the page, i.e.,:Do not put by lower keyboard Alt key, it is small on right side
The numeral inputted in keyboard in bracket, then decontrol Alt key, you can a character corresponding to input in password box.
It is to be herein pointed out in a scheme, in the character string of terminal display first and for the first character string solution
During the second character string obtained by code, an only optional example is shown using bracket as list separator.Replace
The second character string can be gone forward side by side with the insertion of other list separators (such as punctuation marks used to enclose the title) including the use of other list separators for scheme
Row displaying, as long as the corresponding relation that character is corresponded in the second character string and the first character string can be shown, such as using Fig. 7 as
Example, as long as can know that corresponding coding (45287) and corresponding can not input between character (or password can not be inputted)
The list separator of corresponding relation is belonged within the protection domain of the embodiment of the present invention., can also in terminal in another scheme
Only show to the second character string obtained by the decoding of the first character string, do not show to the first character string, such as only tell user
The obtained character string of correspondence first of decoding how is inputted, i.e., can not input the coding (i.e. the of character (or password can not be inputted)
Two character strings), so that user can be with login system.
It is above-mentioned how to show the first character string, the second character string and/or prompt message method it is merely exemplary, substitute
Scheme can also carry out the input explanation of the second character string otherwise, can also be in other random times (including user
Submit sample before) just illustrated to how to input the second character string, can also default user known the method without
Add explanation, these are belonged within the protection domain of the embodiment of the present invention.
Example IV
A kind of character processing system of the embodiment of the present invention, as shown in figure 8, including terminal 31 and server 32, wherein, institute
Stating terminal 31 includes:Reporting unit 311, for reporting the first request, described first asks to be disliked by third party for report of user
Anticipate the first file of locking system login interface, first file includes the first character string, first character string by with
The character that family can not input is formed;Display unit 312, for showing the second character string, second character string can by user
The character of input is formed, and second character string is server according to preset strategy and the comparison result with comparing code table, general
The first character string is stated to carry out changing the resulting character string related to comparing code table.Server 32 includes:Receiving unit 321,
For receiving the first request, described first asks the first text by third party's malice locking system login interface for report of user
Part;Extraction unit 322, for extracting the first character string from first file, first character string can not by user
The character of input is formed;Adaptation unit 323 is parsed, for parsing current systematic parameter, root from first file
Code table is compared corresponding to according to the current system parameter adaptation;Comparing unit 324, for by the first character string and the ratio
Code table is compared, obtains comparison result;Processing unit 325, for extracting preset strategy, and according to the preset strategy and
The comparison result, first character string is converted to and second character string that to compare code table related, second word
The character that symbol string can be inputted by user is formed.
In practical application, user utilizes the operation of login password registration terminal (such as mobile phone, PC, notebook, tablet personal computer)
System, can not login system, receive comprising the first prompt message of the normal login password of user is distorted, believed according to first prompting
Breath sends and first asked to server, so that ask to solve the problems, such as can not register system.Specifically, initiate the first request
Before, user can utilize the operating system of login password registration terminal (such as mobile phone, PC, notebook, tablet personal computer), and operating system is not
It is limited to Windows systems, can also is IOS systems or android system.User first inputs the normal Windows that logs in and (operates system
The password of system, as a result find to be unable to login system, code error, after one or many input errors, receive the first prompting
Information, the first prompt message show the password for allowing login system, and the password shown in first prompt message is malice the
Tripartite distorts the password obtained after the normal password for logging in Windows operating system.Malicious third parties distort a use of password
Meaning is to send fraud information to user, and the system login interface of user is locked, if being unsatisfactory for third-party requirement,
Can not login system.By taking Windows operating system as an example, wooden horse extortion interface is illustrated in figure 5, A1 show user in Fig. 5
The position of password is inputted during login system, the password is represented with M1, and the position shown in A2 shown in dashed box is to receive malicious third parties
The position of the login password of user is sent to, the password is represented with M2, and dashed box is intended merely to description and conveniently used, and actually should
Simultaneously the dashed box is not present in used time.M2 is obtained after malicious third parties distort M1, and M2 include as A3 identified can not
Character is inputted, this to input character, user is can not to be inputted by currently inputting the state of password, such as, should
It can be some Chinese character that character, which can not be inputted, and in the currently state of input password, because password is generally by numeral and/or symbol
Number combination formed, then default user can input numeral or the combining characters such as symbol, and the total length for inputting character is that have
Limitation, Chinese character can not be inputted in this state.If it is intended to input Chinese character, must switch current input method state to branch
The input in Chinese state of input Chinese character is held, but, because systems inspection is to the current state for input password, do not allow to be switched to
Support the input in Chinese state of input Chinese character.User can not normal login system in the scene of foregoing description.Server receives
The first request that terminal is sent, described first asks for report of user by the first of third party's malice locking system login interface
File.First file can be Windows wooden horse files, as shown in figure 3, the reporting of user wooden horse file, at request server
Reason, to obtain that the password of Windows systems can be logged in.Specifically, for the wooden horse file, its essence is malicious third parties
Normally logged in by changing user Windows login password make user can not login system, and then realize fraud to user,
Such as reminding user charges or contact malicious third parties can be with the password of login system to ask for, and otherwise, lock user always is
System, does not allow logging in system by user.And existing solution is:The amended Windows login passwords of wooden horse are extracted, are instructed
Victim inputs the password with into operating system.However, change of secret code can not be inputted character (such as Fig. 5 by a kind of wooden horse
What middle A3 was identified can not input character), this to input character, user is can not to be entered by currently inputting the state of password
Row input, also it is difficult to input even if password is cracked out.User, have to be by supplementary means, i.e., due to being unable to login system:On
Report the wooden horse file, request server processing.For example active user is to use terminal (such as computer) login system, find
Receive third-party fraud information and can not login system, report wooden horse file can be connected using the computer direct to server;Or
Person, it is found that the computer can not report wooden horse file, then wooden horse file is forwarded to clothes by another terminal (such as mobile phone) of user
Business device, the fraud information that third party is sent (such as wooden horse file, are specially that " character change can not be inputted by uploading use
The wooden horse file of window password ") transfer to server to be handled.In this scene, it is related to the interaction of cross-terminal, i.e.,:Quilt
The computer of locking system login interface, mobile phone will be sent to comprising the wooden horse file that can not input character, mobile phone includes this not
The wooden horse file that character can be inputted reports background server and analyzed, so as to server can parse from wooden horse file can
For the new login password (new login password is represented with M2) at system for unlocking interface, new login password M2 be exactly third party to
The normal login password in family (normal login password is represented with M1) carries out the new login password generated after malice is distorted, the Xindeng
Record password M2 is exactly where the reason for causing user to be unable to login system interface.Server extracts from first file
One character string, the character that first character string can not be inputted by user are formed.Extracting mode includes:Carried by static analysis
Password is taken, or by way of password is extracted in dynamic behaviour, also obtains the side of password including the use of other any means certainly
Formula.Still by taking above-mentioned application scenarios as an example, the first character string is new login password M2, and the first file can be wooden horse file.From institute
State and current systematic parameter is parsed in the first file, code table is compared corresponding to according to the current system parameter adaptation.
The embodiment of the present invention is described by taking Windows systems as an example, now, under Windows systems, according to the current system
It can be ASCII character table that parameter adaptation compares code table corresponding to.In order to not limit scope, however not excluded that also have other systems, such as
The possibility of android system and IOS systems, all in the protection domain of the embodiment of the present invention.Server by the first character string with
The comparison code table is compared, and obtains comparison result, extracts preset strategy, and tie according to the preset strategy and described compare
Fruit, by first character string be converted to second character string that to compare code table related, second character string is by user
The character that can be inputted is formed.The preset strategy includes:Judge that the user included in first character string can not be defeated
Whether the character entered is in the number range of the comparison code table, if the character that the user can not input is in number range
It is interior, then first character string is directly converted into the corresponding coded strings for comparing code form;If what the user can not input
The partial character of first character string is then directly converted to corresponding comparison code form by character portion in number range
Coded strings, by beyond the remainder character of number range with least one coding that compares yard form related to comparing code table
Changed again after description.Specifically, by taking Windows systems as an example, under Windows systems, according to the current system
Parameter adaptation is in the scene of ASCII character table to corresponding comparison code table, and ascii table inside points can not be inputted into character conversion
For corresponding coding, it is made up of a numeral, the coded strings being made up of the coding of each character in corresponding character string are formed
Second character string, the character that the second character string can be inputted by user form, as the combination in digital 0-9 forms.By ASCII
The character that can not input of off-balancesheet is converted to corresponding coding, is made up of two numerals.Server is by the second character string (by the first word
The coding obtained after this character conversion that can not be inputted of symbol string, encodes and is formed by that can input character, can be used in digital 0-9
Combination formed) be sent to terminal, and show terminal device to be shown by appropriate mode.Server is by described
After two character strings are supplied to terminal to be shown, terminal can log according to the second character string system for unlocking login interface
Into system.It is any one in each first character string for correspondingly identifying in second character string for exhibition method
The coded strings of individual character, separator (such as punctuation marks used to enclose the title, or bracket etc.) be present, can clearly distinguish:In second character string which
Which can not input character in corresponding first character string of individual coded strings.Certainly, it is (such as every in each coded strings of the second character string
One in corresponding first character string of individual coded strings can not input character) in can also not need separator.As long as this is grown
The second character string input of string, user need not know corresponding first character string of which coded strings in the second character string in fact
Which of can not input character.
In the embodiment of the embodiment of the present invention one, the server also includes:Transmitting element, for sending described second
Character string, it is supplied to terminal to be shown second character string, terminal is stepped on according to the second character string system for unlocking
Interface is recorded, is signed in in system.
In the embodiment of the embodiment of the present invention one, the parsing adaptation unit in the server, it is further used for:Work as institute
When to state current systematic parameter be Windows systems, be adapted to out corresponding to compare code table be ascii table.
In the embodiment of the embodiment of the present invention one, the processing unit in the server, it is further used for:When described
The first character code in the character that its described user included can not input is detected in first character string<When=127, sentence
Break and first character code in the number range of ascii table, be then converted directly into first character code correspondingly
ASCII forms coding A, the coding A is made up of a numeral.
In the embodiment of the embodiment of the present invention one, the processing unit in the server, it is further used for:When described
When the first character code > 127 in the character that its described user included can not input is detected in the first character string, sentence
Break and the number range that first character code exceeds ascii table, then by first character code by corresponding ASCII shapes
The two neighboring coded representation of formula, and corresponding coding B is converted to, the coding B is made up of two numerals.
In the embodiment of the embodiment of the present invention one, the display unit in the terminal, it is further used for:When described second
When character string is represented by the coded strings and list separator of comparison code form, show by least the one of list separator division description
Individual coded strings Mi;Each is divided the coded strings Mi of description by the list separator, according to sequentially corresponding respectively to the first character
Character can not be accordingly inputted in string, is shown to terminal user in sequence;It is made up of at least one coded strings Mi described
Second character string.
In the embodiment of the embodiment of the present invention one, the display unit in the terminal, it is further used for:Obtain prompting letter
Cease and show, the prompt message is used to characterize the trigger condition for inputting second character string.The terminal also includes:Operation
Execution unit, for performing the first operation on triggering button according to the trigger condition, keep first operation not
Become, while perform the second operation, described second operate for characterize sequentially input the corresponding user of second character string can be defeated
Enter character;And operation releasing unit, for discharging the first operation on the triggering button, terminating corresponding user can input
The input of character.
It is to be herein pointed out in the above embodiment of the present invention, when being related to the first request, first request except
First file (such as wooden horse file) can be included, can also be the account (such as QQ number) or of malicious third parties
The feature samples (such as characteristic value of wooden horse file) of one file.In a word, the information content that the first request is carried by is not fixed,
There are a variety of implementations:1) specific file (such as wooden horse file) can be reported by the user that malicious third parties are cheated;2)
The account of malicious third parties is reported by the user that malicious third parties are cheated, so that server is by inquiring about the account
To navigate to before the malicious third parties All Files being once transmitted through, therefrom to find out specific file (such as wooden horse text
Part);3) a certain of the specific file (such as wooden horse file) can be described by being reported by the user cheated by malicious third parties
Individual or multiple characteristic values, so that server inquires specific file (such as wooden horse text according to one or more characteristic values
Part)." directly the reporting for file " of first way is different from, latter two mode is locked and inquired about by ad hoc fashion
To the specific file, realize " reporting indirectly for file ".
Can also be the tablet personal computer such as PAD it is to be herein pointed out above-mentioned terminal can be this electronic equipments of PC,
It this mancarried electronic aid of laptop computer, can also be such as this intelligent mobile terminal of mobile phone, be not limited to description here;It is described
Server can be made up of group system, to realize that each unit function merges into one or each unit function split settings
Electronic equipment, terminal and server all comprise at least the processor for the database of data storage and for data processing,
Or including the storage medium being arranged in server or the storage medium being independently arranged.
Wherein, for the processor for data processing, when performing processing, microprocessor, center can be used
Processor (CPU, Central Processing Unit), digital signal processor (DSP, Digital Singnal
Processor) or programmable logic array (FPGA, Field-Programmable Gate Array) is realized;It is situated between for storage
For matter, comprising operational order, the operational order can be computer-executable code, be realized by the operational order
State each step in information processing method flow of the embodiment of the present invention.
It need to be noted that be:Above is referred to the description of terminal and server entry, be with above method description it is similar,
Beneficial effect with method describes, and does not repeat.For the ins and outs not disclosed in terminal of the present invention and server example,
It refer to content described by the embodiment of the inventive method flow description.
The embodiment of the present invention is described below by taking a practical application scene as an example:
During logging in system by user, in the scene that password is distorted by malicious third parties, using the embodiment of the present invention, for it is a kind of from
Dynamic extraction can not input the scheme of character password coding.Several technical termses description one in advance first to being related in this scene
Under:1) character can be inputted:The character inputted, including capital and small letter English alphabet, numeral, part can be clicked directly on keyboard
Symbol etc..2) character can not be inputted:The other characters that can be inputted beyond character.
This scene can be for a kind of common Windows wooden horses, and its means of doing evil is modification Windows login passwords
To realize extortion.In the prior art, it is the extraction amended Windows login passwords of wooden horse, shows user, allow user stepping on
Record and input is compareed in dialog box, to instruct victim to input the password with into operating system.However, one type wooden horse can incite somebody to action
Change of secret code is can not input character, as shown in fig. 6, the password that A4 is identified includes that character can not be inputted, even if cracking out close
Code is also difficult to input.That is, using prior art, when the character shown is that Chinese etc. can not input character, use
Family can not directly input in dialog boxes for login, can not switch over the operation such as input method, thus cannot be introduced into system.This
The embodiment of the present invention is applied in scape, in simple terms, the wood of character change window password can not be inputted when user uploads use
After horse, server can automatically extract the login password of its setting, and server first detects being usurped by malicious third parties for user's submission
Whether contain in the login password changed can not input character.Then the character that can not input of ascii table inside points is changed and solved
Code is corresponding coding (this, which is encoded to, can input character), is made up of a numeral, and the character that can not input outside ascii table is turned
Corresponding coding is changed to, is made up of two numerals.Finally, the coding after conversion is shown by appropriate exhibition method, and can
Choosing, can by prompt message come instruct user according to coding input decode to obtain it is close by the login that character forms can be inputted
Code, as shown in fig. 7, to showing that the usage of result illustrates, victim is instructed according to the description of the explanation to input the password
With into operating system, so that user can smooth register system.
Specifically, the embodiment of the present invention is applied in this scene, as shown in figure 9, specific implementation step includes:
The login password for the login Windows operating system that step 301, extraction wooden horse are set.
Step 302, whether check in password containing character can not be inputted, if it is, performing step 303, otherwise, perform
Step 306.
Here, for the relation of ascii table and the Chinese character of its corresponding conversion, ascii table is to be based on the Latin alphabet
A set of computer code's system.It is mainly used in showing current english, defines 128 characters, character highest altogether up to now
Position is 0.These characters are not that all can be transferred through keyboard to be inputted.In order that computer can encode substantial amounts of middle word
Symbol, coding is extended on the basis of ASCII.Microsoft uses Codepage 936 in simplified form of Chinese Character operating system
As character set standard, compatible most GBK characters.Codepage 936 is a kind of double-byte character set (DBCS), in order to
Compatible with ascii character-set, it is provided:Ascii character part uses single byte, and its value is from 0x00 to 0x7F;Chinese character portion
Divide and use double byte, the value of first character section is from 0x81 to 0xFE.In order to simplify processing, first character section can be directly judged
Highest order, it is ASCII compatibility characters when being 0;For 1 when, collectively constitute Chinese character with its latter byte.
Step 303, inspection can not input character whether in the range of standard ascii table, and inspection method is password for inquiry word
Whether the coding of symbol is less than or equal to 127.If it is, performing step 304, otherwise, step 305 is performed.
Step 304, in the range of standard ascii table, then using this character of Coding and description corresponding to character.Afterwards, it is transferred to
Perform step 306.
Step 305, not in the range of standard ascii table, then continue to take next character code, use two numeral determine
One Chinese character, if first character is encoded to A, second character code is B, then corresponding Chinese character is encoded to 256*
A+B。
Step 306, password is shown on the page, for character can not be inputted, encoded and be placed in bracket, opened up in order
Show to user.
Step 307, explanation of the user according to coding input password is known on the page, i.e.,:By lower keyboard Alt key not
Put, the numeral inputted in the keypad of right side in bracket, then decontrol Alt key, you can a word corresponding to input in password box
Symbol.
The embodiment of the present invention is applied in this scene, user can be allowed quickly to understand code content and input method, can be with
Password is voluntarily inputted in dialog boxes for login according to the content of displaying, so as to smooth register system, can also lift server
For the Detection results of wooden horse, as test sample, a set of sample safety detecting system is formd in the detection.The system is in void
Usage behavior activating system lures that sample runs out dynamic behaviour as much as possible into near-ring border, then capture and key monitoring its
In high suspicious abnormal behaviour, so as to efficiently identify out malice sample.For such wooden horse, the abnormal behaviour of sample
Including newly-built user account number, modification login username, modification login password etc., sample can be captured using the system of the present embodiment
This performs the parameter used during these behaviors, and therefrom extracts amended password, including the password that can not be inputted, to continue
Provide the user with bigger facility.
In several embodiments provided herein, it should be understood that disclosed apparatus and method, it can be passed through
Its mode is realized.Apparatus embodiments described above are only schematical, for example, the division of the unit, is only
A kind of division of logic function, there can be other dividing mode when actually realizing, such as:Multiple units or component can combine, or
Another system is desirably integrated into, or some features can be ignored, or do not perform.In addition, shown or discussed each composition portion
Point mutual coupling or direct-coupling or communication connection can be the INDIRECT COUPLINGs by some interfaces, equipment or unit
Or communication connection, can be electrical, mechanical or other forms.
The above-mentioned unit illustrated as separating component can be or may not be physically separate, show as unit
The part shown can be or may not be physical location, you can positioned at a place, can also be distributed to multiple network lists
In member;Partly or entirely unit therein can be selected to realize the purpose of this embodiment scheme according to the actual needs.
In addition, each functional unit in various embodiments of the present invention can be fully integrated into a processing unit, also may be used
To be each unit individually as a unit, can also two or more units it is integrated in a unit;It is above-mentioned
Integrated unit can both be realized in the form of hardware, can also be realized in the form of hardware adds SFU software functional unit.
One of ordinary skill in the art will appreciate that:Realizing all or part of step of above method embodiment can pass through
Programmed instruction related hardware is completed, and foregoing program can be stored in a computer read/write memory medium, the program
Upon execution, the step of execution includes above method embodiment;And foregoing storage medium includes:It is movable storage device, read-only
Memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disc or
Person's CD etc. is various can be with the medium of store program codes.
Or if the above-mentioned integrated unit of the present invention is realized in the form of SFU software functional unit and is used as independent product
Sale in use, can also be stored in a computer read/write memory medium.Based on such understanding, the present invention is implemented
The part that the technical scheme of example substantially contributes to prior art in other words can be embodied in the form of software product,
The computer software product is stored in a storage medium, including some instructions are causing a computer equipment (can be with
It is personal computer, server or network equipment etc.) perform all or part of each embodiment methods described of the present invention.
And foregoing storage medium includes:Movable storage device, ROM, RAM, magnetic disc or CD etc. are various can be with store program codes
Medium.
The foregoing is only a specific embodiment of the invention, but protection scope of the present invention is not limited thereto, any
Those familiar with the art the invention discloses technical scope in, change or replacement can be readily occurred in, should all be contained
Cover within protection scope of the present invention.Therefore, protection scope of the present invention should be based on the protection scope of the described claims.
Claims (18)
1. a kind of character-information processing method, it is characterised in that methods described includes:
The first request is received, described first asks the first text by third party's malice locking system login interface for report of user
Part;
The first character string, the character institute group that first character string can not be inputted by user are extracted from first file
Into;
Current systematic parameter is parsed from first file, is compared according to the current system parameter adaptation corresponding to
To code table;
First character string is compared with the code table that compares, obtains comparison result;
Preset strategy is extracted, and according to the preset strategy and the comparison result, first character string is converted to and institute
State and compare the second related character string of code table, the character that second character string can be inputted by user is formed.
2. according to the method for claim 1, it is characterised in that methods described also includes:
Second character string is sent, is supplied to terminal to be shown second character string, makes terminal according to described second
Character string system for unlocking login interface, signs in in system.
3. method according to claim 1 or 2, it is characterised in that the preset strategy includes:
Judge character that the user included in first character string can not input whether the comparison code table numerical value
In the range of, if the character that the user can not input in number range, is directly converted to first character string pair
The coded strings for the comparison code form answered;If the character portion that the user can not input is in number range, directly by described in
The partial character of first character string is converted to the corresponding coded strings for comparing code form, by beyond the remainder word of number range
Symbol with being changed again after at least one Coding and description for comparing yard form related to comparing code table.
4. method according to claim 1 or 2, it is characterised in that according to the current system parameter adaptation to correspondingly
Comparison code table, including:
When the current systematic parameter is Windows systems, it is ascii table to be adapted to out the corresponding code table that compares.
5. according to the method for claim 4, it is characterised in that the extraction preset strategy, and according to the preset strategy
With the comparison result, by first character string be converted to second character string that to compare code table related, including:
When detected in first character string the first character in the character that its described user included can not input compile
Code<When=127, judge first character code in the number range of ascii table, then it is first character code is straight
Switch through the coding A of ASCII forms corresponding to being changed to, the coding A is made up of a numeral.
6. according to the method for claim 4, it is characterised in that the extraction preset strategy, and according to the preset strategy
With the comparison result, by first character string be converted to second character string that to compare code table related, including:
When detected in first character string the first character in the character that its described user included can not input compile
Code>When 127, judge that first character code exceeds the number range of ascii table, then by first character code by right
The two neighboring coded representation for the ASCII forms answered, and corresponding coding B is converted to, the coding B is made up of two numerals.
7. a kind of server, it is characterised in that the server includes:
Receiving unit, for receiving the first request, described first asks to be stepped on by third party's malice locking system for report of user
Record first file at interface;
Extraction unit, for extracting the first character string from first file, first character string can not be defeated by user
The character entered is formed;
Adaptation unit is parsed, for parsing current systematic parameter from first file, according to the current system
Parameter adaptation compares code table corresponding to;
Comparing unit, for the first character string to be compared with the code table that compares, obtain comparison result;
Processing unit, for extracting preset strategy, and according to the preset strategy and the comparison result, by first character
String is converted to second character string that to compare code table related, the character institute group that second character string can be inputted by user
Into.
8. server according to claim 7, it is characterised in that the server also includes:
Transmitting element, for sending second character string, it is supplied to terminal to be shown second character string, makes terminal
According to the second character string system for unlocking login interface, sign in in system.
9. the server according to claim 7 or 8, it is characterised in that the preset strategy includes:
Judge character that the user included in first character string can not input whether the comparison code table numerical value
In the range of, if the character that the user can not input in number range, is directly converted to first character string pair
The coded strings for the comparison code form answered;If the character portion that the user can not input is in number range, directly by described in
The partial character of first character string is converted to the corresponding coded strings for comparing code form, by beyond the remainder word of number range
Symbol with being changed again after at least one Coding and description for comparing yard form related to comparing code table.
10. the server according to claim 7 or 8, it is characterised in that the parsing adaptation unit, be further used for:
When the current systematic parameter is Windows systems, it is ascii table to be adapted to out the corresponding code table that compares.
11. server according to claim 10, it is characterised in that the processing unit, be further used for:
When detected in first character string the first character in the character that its described user included can not input compile
Code<When=127, judge first character code in the number range of ascii table, then it is first character code is straight
Switch through the coding A of ASCII forms corresponding to being changed to, the coding A is made up of a numeral.
12. server according to claim 10, it is characterised in that the processing unit, be further used for:
When detected in first character string the first character in the character that its described user included can not input compile
Code>When 127, judge that first character code exceeds the number range of ascii table, then by first character code by right
The two neighboring coded representation for the ASCII forms answered, and corresponding coding B is converted to, the coding B is made up of two numerals.
13. a kind of character-information processing method, it is characterised in that methods described includes:
The first request is reported, described first asks the first text by third party's malice locking system login interface for report of user
Part, first file include the first character string, and the character that first character string can not be inputted by user is formed;
The second character string is shown, the character that second character string can be inputted by user is formed, and second character string is clothes
Device be engaged according to preset strategy and the comparison result with comparing code table, will state the first character string change it is resulting with comparing code
The related character string of table.
14. according to the method for claim 13, it is characterised in that the second character string of the display, including:
When second character string is represented by the coded strings and list separator of comparison code form, show and drawn by the list separator
Divide at least one coded strings Mi of description;
Each is divided the coded strings Mi of description by the list separator, according to the phase sequentially corresponded respectively in the first character string
Character should can not be inputted, is shown to terminal user in sequence;
Second character string is formed by least one coded strings Mi.
15. the method according to claim 13 or 14, it is characterised in that methods described also includes:
Obtain prompt message and show, the prompt message is used to characterize the trigger condition for inputting second character string;
The first operation on triggering button is performed according to the trigger condition, keeps first operation constant, holds simultaneously
Row second operates, and described second operates and sequentially input the corresponding user of second character string for characterizing and can input character;
First operation of the release on the triggering button, the input of character can be inputted by terminating corresponding user.
16. a kind of terminal, it is characterised in that the terminal includes:
Reporting unit, for reporting the first request, described first asks to be stepped on by third party's malice locking system for report of user
First file at interface is recorded, first file includes the first character string, what first character string can not be inputted by user
Character is formed;
Display unit, for showing the second character string, the character that second character string can be inputted by user is formed, and described
Two character strings are servers according to preset strategy and the comparison result with comparing code table, will be stated obtained by the first character string changed
To the character string related to comparing code table.
17. terminal according to claim 16, it is characterised in that the display unit, be further used for:
When second character string is represented by the coded strings and list separator of comparison code form, show and drawn by the list separator
Divide at least one coded strings Mi of description;
Each is divided the coded strings Mi of description by the list separator, according to the phase sequentially corresponded respectively in the first character string
Character should can not be inputted, is shown to terminal user in sequence;
Second character string is formed by least one coded strings Mi.
18. the terminal according to claim 16 or 17, it is characterised in that the display unit, be further used for:
Obtain prompt message and show, the prompt message is used to characterize the trigger condition for inputting second character string;
The terminal also includes:
Operation execution unit, for performing the first operation on triggering button according to the trigger condition, keep described the
One operation is constant, while performs the second operation, and described second operates the correspondence that second character string is sequentially inputted for characterizing
User can input character;
Releasing unit is operated, for discharging the first operation on the triggering button, character can be inputted by terminating corresponding user
Input.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610497662.3A CN107547610B (en) | 2016-06-29 | 2016-06-29 | Character information processing method, server and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610497662.3A CN107547610B (en) | 2016-06-29 | 2016-06-29 | Character information processing method, server and terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107547610A true CN107547610A (en) | 2018-01-05 |
CN107547610B CN107547610B (en) | 2020-02-28 |
Family
ID=60966395
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610497662.3A Active CN107547610B (en) | 2016-06-29 | 2016-06-29 | Character information processing method, server and terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107547610B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108319589A (en) * | 2018-03-14 | 2018-07-24 | 腾讯科技(深圳)有限公司 | Parameter string processing method, apparatus, computer readable storage medium and equipment |
CN113688380A (en) * | 2021-10-26 | 2021-11-23 | 苏州浪潮智能科技有限公司 | Password protection method, device and medium |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2169898A1 (en) * | 2008-09-25 | 2010-03-31 | Fraunhofer-Gesellschaft zur Förderung der angewandten Forschung e.V. | Method of and telecommunication apparatus for mitigating Distributed Denial-of-Service attacks in SIP packet networks |
CN103745156A (en) * | 2014-01-07 | 2014-04-23 | 北京奇虎科技有限公司 | Method and device for prompting risk information in search engine |
CN105306467A (en) * | 2015-10-30 | 2016-02-03 | 北京奇虎科技有限公司 | Method and device for analyzing webpage data tampering |
-
2016
- 2016-06-29 CN CN201610497662.3A patent/CN107547610B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2169898A1 (en) * | 2008-09-25 | 2010-03-31 | Fraunhofer-Gesellschaft zur Förderung der angewandten Forschung e.V. | Method of and telecommunication apparatus for mitigating Distributed Denial-of-Service attacks in SIP packet networks |
CN103745156A (en) * | 2014-01-07 | 2014-04-23 | 北京奇虎科技有限公司 | Method and device for prompting risk information in search engine |
CN105306467A (en) * | 2015-10-30 | 2016-02-03 | 北京奇虎科技有限公司 | Method and device for analyzing webpage data tampering |
Non-Patent Citations (2)
Title |
---|
电脑管家哈勃分析系统: "哈勃专家教你破解Petya敲诈木马", 《腾讯哈勃分析系统,HTTPS://HABO.QQ.COM/NEWS/DETAIL/ADEGYQ%3D%3D》 * |
电脑管家哈勃分析系统: "敲诈木马锁死电脑 腾信哈勃助用户找回密码", 《腾讯哈勃分析系统,HTTPS://HABO.QQ.COM/NEWS/DETAIL/ADCGZQ%3D%3D》 * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108319589A (en) * | 2018-03-14 | 2018-07-24 | 腾讯科技(深圳)有限公司 | Parameter string processing method, apparatus, computer readable storage medium and equipment |
CN108319589B (en) * | 2018-03-14 | 2021-08-10 | 腾讯科技(深圳)有限公司 | Parameter string processing method, device, computer readable storage medium and equipment |
CN113688380A (en) * | 2021-10-26 | 2021-11-23 | 苏州浪潮智能科技有限公司 | Password protection method, device and medium |
Also Published As
Publication number | Publication date |
---|---|
CN107547610B (en) | 2020-02-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104834462A (en) | Unlocking method for terminal equipment and terminal equipment | |
CN106331055B (en) | Identifier generating means and method | |
CN105722059A (en) | Mobile terminal and communication method for double-modem system | |
US11637795B1 (en) | Techniques for templated messages | |
CN101022657B (en) | Mobile communication equipment and the method controlled is used to the selectivity of communication path | |
CN106331767A (en) | Data error correcting processing method, terminal, server, and system | |
CN105718405B (en) | The method that the USB interface of mobile terminal and its processor is multiplexed | |
WO2016123822A1 (en) | Data transmission method and device, and terminal | |
CN103489025A (en) | Method and device for sending contact information | |
CN105682083B (en) | A kind of communication means of mobile terminal and duplex MODEM system | |
CN107547610A (en) | A kind of character-information processing method, server and terminal | |
CN105992201A (en) | Data transmission terminal, method and system | |
CN106452483A (en) | Method and apparatus for information interaction | |
CN101553043B (en) | Method for establishing communication from a mobile terminal in dual mode | |
US20150281212A1 (en) | Method for providing confidential data-based login service | |
CN102652439A (en) | Smart card security feature profile in home subscriber server | |
CN108768965A (en) | A kind of education cloud open service application integrating system and method | |
CN105955832B (en) | A kind of method and system communicated with each other between the device screen page and subpage frame | |
CN101197710A (en) | Intelligent terminal and user maintenance method | |
CN106686527A (en) | WIFI information identification method and terminal | |
CN106909395A (en) | A kind of interface call method and terminal | |
KR100459040B1 (en) | Registration Method of Access Number to Mobile Contents by a Combined Mobile User Agent and a Alpha-Numeric Keypad | |
CN105611067A (en) | Mobile terminal and upgrading method thereof | |
US20190297036A1 (en) | Method for establishing communication within a closed network | |
CN105611068B (en) | Mobile terminal and method for upgrading system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |