CN107547610A - A kind of character-information processing method, server and terminal - Google Patents

A kind of character-information processing method, server and terminal Download PDF

Info

Publication number
CN107547610A
CN107547610A CN201610497662.3A CN201610497662A CN107547610A CN 107547610 A CN107547610 A CN 107547610A CN 201610497662 A CN201610497662 A CN 201610497662A CN 107547610 A CN107547610 A CN 107547610A
Authority
CN
China
Prior art keywords
character
character string
user
input
code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610497662.3A
Other languages
Chinese (zh)
Other versions
CN107547610B (en
Inventor
刘钊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201610497662.3A priority Critical patent/CN107547610B/en
Publication of CN107547610A publication Critical patent/CN107547610A/en
Application granted granted Critical
Publication of CN107547610B publication Critical patent/CN107547610B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention discloses a kind of character-information processing method, server and terminal, wherein, methods described includes:The first request is received, described first asks for report of user by the first file of third party's malice locking system login interface;The first character string is extracted from first file, the character that first character string can not be inputted by user is formed;Current systematic parameter is parsed from first file, code table is compared corresponding to according to the current system parameter adaptation;First character string is compared with the code table that compares, obtains comparison result;Preset strategy is extracted, and according to the preset strategy and the comparison result, first character string is converted to second character string that to compare code table related, the character that second character string can be inputted by user is formed.

Description

A kind of character-information processing method, server and terminal
Technical field
The present invention relates to mechanics of communication, more particularly to a kind of character-information processing method, server and terminal.
Background technology
With the development of Internet technology, a large amount of popularizations of intelligent terminal, various applications, various services for life carry for user For various using upper facility, meanwhile, various information security issues also emerge therewith.For example distort the login of user Password (character for being revised as inputting by normal login password), user is seted to be taken advantage of from normal login system or application, hair Information is cheated to user, user is unsatisfactory for requiring, does not allow for logging in system by user or application, due to being unable to login system or answering With, very big puzzlement can be brought to the work and life of user, not simply fail to use the various services provided based on system or application, And information security cannot also ensure.
However, in correlation technique, for the problem, effective solution there is no.
The content of the invention
In view of this, the embodiments of the invention provide a kind of character-information processing method, server and terminal, at least solve The problem of prior art is present.
What the technical scheme of the embodiment of the present invention was realized in:
The embodiments of the invention provide a kind of character-information processing method, methods described includes:
The first request is received, described first asks for report of user by the of third party's malice locking system login interface One file;
The first character string, the character institute that first character string can not be inputted by user are extracted from first file Composition;
Current systematic parameter is parsed from first file, according to the current system parameter adaptation to correspondingly Comparison code table;
First character string is compared with the code table that compares, obtains comparison result;
Preset strategy is extracted, and according to the preset strategy and the comparison result, first character string is converted to To second character string that to compare code table related, the character that second character string can be inputted by user is formed.
The embodiment of the present invention additionally provides a kind of server, and the server includes:
Receiving unit, for the request of reception first, described first asks to be used for report of user by third party's malice locking system First file of system login interface;
Extraction unit, for extracting the first character string from first file, first character string by user not The character that can be inputted is formed;
Adaptation unit is parsed, for parsing current systematic parameter from first file, according to described current System parameter adaptation compares code table corresponding to;
Comparing unit, for the first character string to be compared with the code table that compares, obtain comparison result;
Processing unit, for extracting preset strategy, and according to the preset strategy and the comparison result, by described first Character string is converted to second character string that to compare code table related, the character institute that second character string can be inputted by user Composition.
The embodiment of the present invention additionally provides a kind of character-information processing method, and methods described includes:
The first request is reported, described first asks for report of user by the of third party's malice locking system login interface One file, first file include the first character string, and the character that first character string can not be inputted by user is formed;
The second character string is shown, the character that second character string can be inputted by user is formed, second character string Server according to preset strategy and the comparison result with comparing code table, will state the first character string change it is resulting with than The character string related to code table.
The embodiment of the present invention additionally provides a kind of terminal, and the terminal includes:
Reporting unit, for reporting the first request, described first asks to be used for report of user by third party's malice locking system First file of system login interface, first file include the first character string, and first character string can not be defeated by user The character entered is formed;
Display unit, for showing the second character string, the character that second character string can be inputted by user is formed, institute State the second character string be server according to preset strategy and the comparison result with comparing code table, the first character string will be stated and changed The resulting character string related to comparing code table.
The character-information processing method of the embodiment of the present invention, methods described include:Receive the first request, first request For report of user by the first file of third party's malice locking system login interface;First is extracted from first file Character string, the character that first character string can not be inputted by user are formed;Parsed from first file current Systematic parameter, code table is compared corresponding to according to the current system parameter adaptation;First character string is compared into code with described Table is compared, and obtains comparison result;Preset strategy is extracted, and according to the preset strategy and the comparison result, by described in First character string is converted to second character string that to compare code table related, the word that second character string can be inputted by user Symbol is formed.
Using the character-information processing method of the embodiment of the present invention, even if user has distorted user's by third party's malice Login password, prevent user can also be by reporting fraud information request backstage to carry out from normal login system or application, user Assist process, with solution must not login system or application the problem of, can not only use based on system or application provide it is various Service, and the information security of itself can be ensured.
Brief description of the drawings
Fig. 1 is the one optional hardware architecture diagram of mobile terminal for realizing each embodiment of the present invention;
Fig. 2 is the communication system schematic diagram of mobile terminal as shown in Figure 1;
Fig. 3 is the schematic diagram for each side's hardware entities that information exchange is carried out in the embodiment of the present invention;
Fig. 4 is the terminal of the embodiment of the present invention one and the schematic diagram of server interaction;
Fig. 5 is to extort interface schematic diagram using the wooden horse of the embodiment of the present invention;
Fig. 6 is the schematic diagram using the first character string of the embodiment of the present invention;
Fig. 7 is using the second character string of the embodiment of the present invention and its schematic diagram of optional prompt message;
Fig. 8 is that the system of the embodiment of the present invention four forms structural representation;
Fig. 9 is the method flow schematic diagram using the scene of the embodiment of the present invention one.
Embodiment
The implementation to technical scheme is described in further detail below in conjunction with the accompanying drawings.
Describe to realize the mobile terminal of each embodiment of the present invention referring now to accompanying drawing.In follow-up description, use For represent element such as " module ", " part " or " unit " suffix only for being advantageous to the explanation of the embodiment of the present invention, Itself do not have specific meaning.Therefore, " module " can be used mixedly with " part ".
In the following detailed description, numerous details is set forth, thoroughly to understand the present invention.But, for For one of ordinary skill in the art, it is clear that the present invention can be put into practice in the case of these no details.In other feelings Under condition, disclosed known method, process, component, circuit and network are not described in detail, to avoid unnecessarily making embodiment Various aspects are smudgy.
In addition, herein although term " first ", " second " etc. is employed many times describe various elements (or various threshold values or Various applications or various instructions or various operations) etc., but these elements (or threshold value or application or instruction or operation) should not be by The limitation of these terms.These terms are only intended to distinguish an element (or threshold value or application or instruction or operation) and another Element (or threshold value or application or instruction or operation).For example, the first operation can be referred to as the second operation, the second operation can also It is referred to as the first operation, without departing from the scope of the present invention, the first operation and the second operation are all operations, and simply the two is not Identical operates.
Step in the embodiment of the present invention is not necessarily handled according to described step order, can be according to need Ask and step is selectively upset into rearrangement, either delete the step in the step or increase embodiment in embodiment, the present invention Step description in embodiment is optional sequential combination, does not represent all sequence of steps combination of the embodiment of the present invention, Step order in embodiment is not construed as limiting the invention.
Term "and/or" in the embodiment of the present invention refers to including one or more of associated listed items Any and whole possibility combination.It may also be noticed that:Where used in this disclosure, "comprises/comprising" specifies what is stated Feature, integer, step, operation, the presence of element and/or component, but it is not excluded for other one or more features, integer, step Suddenly, the presence or addition of operation, element and/or component and/or their group.
The intelligent terminal (such as mobile terminal) of the embodiment of the present invention can be implemented in a variety of manners.For example, the present invention is real Apply mobile terminal described in example can include such as mobile phone, smart phone, notebook computer, digit broadcasting receiver, Personal digital assistant (PDA, Personal Digital Assistant), tablet personal computer (PAD), portable media player (PMP, Portable Media Player), guider etc. mobile terminal and digital TV, desktop computer etc. Deng fixed terminal.Hereinafter it is assumed that terminal is mobile terminal.However, it will be understood by those skilled in the art that except especially using Outside the element of mobile purpose, construction according to the embodiment of the present invention can also apply to the terminal of fixed type.
Fig. 1 is the one optional hardware architecture diagram of mobile terminal for realizing each embodiment of the present invention.
Mobile terminal 100 can include communication unit 110, audio/video (A/V) input block 120, user input unit 130th, reporting unit 140, output unit 150, display unit 151, memory cell 160, interface unit 170, the and of processing unit 180 Power subsystem 190 etc..Fig. 1 shows the mobile terminal with various assemblies, it should be understood that being not required for implementing institute There is the component shown.More or less components can alternatively be implemented.The element of mobile terminal will be discussed in more detail below.
Communication unit 110 generally includes one or more assemblies, and it allows mobile terminal 100 and wireless communication system or net Radio communication between network (if mobile terminal replaced with fixed terminal, it is logical can also to carry out electricity by wired mode Letter).For example, communication unit can include when being specially wireless communication unit broadcast reception unit 111, mobile comm unit 112, At least one in wireless interconnected net unit 113, short-range communication unit 114 and positional information unit 115, these units are optional , can be with additions and deletions according to different demands.
Broadcast reception unit 111 receives broadcast singal and/or broadcast via broadcast channel from external broadcast management server Relevant information.Broadcast channel can include satellite channel and/or terrestrial channel.Broadcast management server can be generated and sent The broadcast singal and/or broadcast related information that the server or reception of broadcast singal and/or broadcast related information generate before And send it to the server of terminal.Broadcast singal can include TV broadcast singals, radio signals, data broadcasting Signal etc..Moreover, broadcast singal may further include the broadcast singal combined with TV or radio signals.Broadcast phase Closing information can also provide via mobile communications network, and in this case, broadcast related information can be by mobile communication list Member 112 receives.Broadcast singal can exist in a variety of manners, for example, its can with DMB (DMB, Digital Multimedia Broadcasting) electronic program guides (EPG, Electronic Program Guide), The electronic service guidebooks of digital video broadcast-handheld (DVB-H, Digital Video Broadcasting-Handheld) The form of (ESG, Electronic Service Guide) etc. and exist.Broadcast reception unit 111 can be by using each The broadcast system reception signal broadcast of type.Especially, broadcast reception unit 111 can be by using such as multi-media broadcast - ground (DMB-T, Digital Multimedia Broadcasting-Terrestrial), DMB-is broadcast to defend Star (DMB-S, Digital Multimedia Broadcasting-Satellite), digital video broadcast-handheld (DVB-H), Radio Data System, the received terrestrial digital broadcasting synthesis of forward link media (MediaFLO, Media Forward Link Only) The numeral for servicing (ISDB-T, Integrated Services Digital Broadcasting-Terrestrial) etc. is wide Broadcast system receives digital broadcasting.Broadcast reception unit 111 may be constructed such that the various broadcast systems for being adapted to provide for broadcast singal And above-mentioned digit broadcasting system.The broadcast singal and/or broadcast related information received via broadcast reception unit 111 can be deposited Storage is in memory 160 (or other types of storage medium).
Mobile comm unit 112 sends radio signals to base station (for example, access point, node B etc.), exterior terminal And at least one in server and/or receive from it radio signal.Such radio signal can lead to including voice Talk about signal, video calling signal or the various types of data for sending and/or receiving according to text and/or Multimedia Message.
Wireless interconnected net unit 113 supports the Wi-Fi (Wireless Internet Access) of mobile terminal.The unit can be internally or externally It is couple to terminal.Wi-Fi (Wireless Internet Access) technology involved by the unit can include WLAN (Wi-Fi, WLAN, Wireless Local Area Networks), WiMAX (Wibro), worldwide interoperability for microwave accesses (Wimax), under high speed Downlink packet access (HSDPA, High Speed Downlink Packet Access) etc..
Short-range communication unit 114 is the unit for supporting junction service.Some examples of short-range communication technology include indigo plant Tooth, radio frequency identification (RFID, Radio Frequency Identification), Infrared Data Association (IrDA, Infrared Data Association), ultra wide band (UWB, Ultra Wideband), purple honeybee etc..
Positional information unit 115 is the unit for checking or obtaining the positional information of mobile terminal.Positional information unit Typical case be global positioning system (GPS, Global Positioning System).It is mono- according to current technology, GPS Member 115 calculates range information from three or more satellites and correct time information and for the Information application three of calculating Angle, so as to calculate according to longitude, latitude and highly accurately three-dimensional current location information.Currently, for calculation position Three satellites and the position calculated by using other satellite correction and time are used with the method for temporal information The error of information.In addition, GPS unit 115 can be by Continuous plus current location information in real time come calculating speed information.
A/V input blocks 120 are used to receive audio or video signal.A/V input blocks 120 can include the He of camera 121 Microphone 122, camera 121 in video acquisition mode or image capture mode by image capture apparatus obtain static images Or the view data of video is handled.Picture frame after processing may be displayed on display unit 151.Handled through camera 121 Picture frame afterwards can be stored in memory cell 160 (or other storage mediums) or is transmitted via communication unit 110, Two or more cameras 121 can be provided according to the construction of mobile terminal.Microphone 122 can be in telephone calling model, record Sound (voice data) is received via microphone in pattern, speech recognition mode etc. operational mode, and can be by as Acoustic processing is voice data.Audio (voice) data after processing can be converted in the case of telephone calling model can be through The form that mobile communication base station is sent to by mobile comm unit 112 exports.Microphone 122 can implement various types of noises (or suppression) algorithm is eliminated to eliminate (or suppression) caused noise or interference during receiving and sending audio signal.
User input unit 130 can control each of mobile terminal according to the order generation key input data that user inputs Kind operation.User input unit 130 allows user to input various types of information, and can include keyboard, mouse, touch pad (for example, sensitive component of detection change of resistance, pressure, electric capacity etc. caused by being touched), roller, rocking bar etc. Deng.Especially, when touch pad is superimposed upon on display unit 151 in the form of layer, touch-screen can be formed.
Reporting unit 140, for reporting the first request, described first asks to be used for report of user by third party's malice locking First file at system login interface, first file include the first character string, and first character string can not by user The character of input is formed.Display unit 151, it is additionally operable to show the second character string, second character string can be inputted by user Character formed, second character string be server according to preset strategy and the comparison result with comparing code table, will be stated One character string carries out changing the resulting character string related to comparing code table.
Interface unit 170 is connected the interface that can pass through as at least one external device (ED) with mobile terminal 100.For example, External device (ED) can include wired or wireless head-band earphone port, external power source (or battery charger) port, wired or nothing Line FPDP, memory card port, the port for connecting the device with recognition unit, audio input/output (I/O) end Mouth, video i/o port, ear port etc..Recognition unit can be that storage is used to verify that user uses each of mobile terminal 100 Kind of information and can include user identification unit (UIM, User Identify Module), client's recognition unit (SIM, Subscriber Identity Module), Universal Subscriber recognition unit (USIM, Universal Subscriber Identity Module) etc..In addition, the device with recognition unit (hereinafter referred to as " identification device ") can take intelligence The form of card, therefore, identification device can be connected via port or other attachment means with mobile terminal 100.Interface unit 170 It can be used for receiving the input (for example, data message, electric power etc.) from external device (ED) and transmit the input received One or more elements in mobile terminal 100 can be used for transmitting data between mobile terminal and external device (ED).
In addition, when mobile terminal 100 is connected with external base, interface unit 170 may be used as allowing by it by electricity Power provides to the path of mobile terminal 100 from base or may be used as allowing to pass through it from the various command signals that base inputs It is transferred to the path of mobile terminal.It may be used as being used to identify that mobile terminal is from the various command signals or electric power of base input The no signal being accurately fitted within base.Output unit 150 is configured to defeated with the offer of vision, audio and/or tactile manner Go out signal (for example, audio signal, vision signal, vibration signal etc.).Output unit 150 can include display unit 151, sound Frequency output unit 152 etc..
Display unit 151 may be displayed in mobile terminal 100 information handled.For example, mobile terminal 100 can be shown Relevant user interface (UI, User Interface) or graphic user interface (GUI, Graphical User Interface). When mobile terminal 100 is in video calling pattern or image capture mode, display unit 151 can show the image of capture And/or image, the UI or GUI etc. that show video or image and correlation function received.
Meanwhile when display unit 151 and touch pad in the form of layer it is superposed on one another to form touch-screen when, display unit 151 may be used as input unit and output device.Display unit 151 can include liquid crystal display (LCD, Liquid Crystal Display), thin film transistor (TFT) LCD (TFT-LCD, Thin Film Transistor-LCD), organic light-emitting diodes Manage in (OLED, Organic Light-Emitting Diode) display, flexible display, three-dimensional (3D) display etc. It is at least one.Some in these displays may be constructed such that transparence to allow user to be watched from outside, and this is properly termed as Transparent display, typical transparent display can be, for example, transparent organic light emitting diode (TOLED) display etc..According to Specific desired embodiment, mobile terminal 100 can include two or more display units (or other display devices), example Such as, mobile terminal can include outernal display unit (not shown) and inner display unit (not shown).Touch-screen can be used for examining Survey touch input pressure and touch input position and touch input area.
Audio output unit 152 can mobile terminal be in call signal reception pattern, call mode, logging mode, It is receiving or deposit in memory 160 by communication unit 110 when under the isotypes such as speech recognition mode, broadcast reception mode The voice data transducing audio signal of storage and to export be sound.Moreover, audio output unit 152 can provide and mobile terminal The related audio output of 100 specific functions performed (for example, call signal receives sound, message sink sound etc.).Audio Output unit 152 can include loudspeaker, buzzer etc..
Memory cell 160 can store software program of the processing performed by processing unit 180 and control operation etc., or Person can temporarily store oneself data (for example, telephone directory, message, still image, video etc.) through exporting or will export. Moreover, memory cell 160 can store vibration and the audio letter of the various modes on being exported when touching and being applied to touch-screen Number data.
Memory cell 160 can include the storage medium of at least one type, the storage medium include flash memory, hard disk, Multimedia card, card-type memory (for example, SD or DX memories etc.), random access storage device (RAM, Random Access Memory), static random-access memory (SRAM, Static Random Access Memory), read-only storage (ROM, Read Only Memory), Electrically Erasable Read Only Memory (EEPROM, Electrically Erasable Programmable Read Only Memory), programmable read only memory (PROM, Programmable Read Only Memory), magnetic storage, disk, CD etc..Moreover, mobile terminal 100 can be with performing storage list by network connection The network storage device cooperation of the store function of member 160.
Processing unit 180 generally controls the overall operation of mobile terminal.For example, processing unit 180 perform with voice call, The related control and processing of data communication, video calling etc..And for example, processing unit 180 can with execution pattern identifying processing, with Input is drawn into the handwriting input performed on the touchscreen or picture and are identified as character or image.
Power subsystem 190 receives external power or internal power under the control of processing unit 180 and provides operation respectively Appropriate electric power needed for element and component.
Various embodiments described herein can be with use such as computer software, hardware or its any combination of calculating Machine computer-readable recording medium is implemented.Implement for hardware, embodiment described herein can be by using application-specific IC (ASIC, Application Specific Integrated Circuit), digital signal processor (DSP, Digital Signal Processing), digital signal processing device (DSPD, Digital Signal Processing Device), can Programmed logic device (PLD, Programmable Logic Device), field programmable gate array (FPGA, Field Programmable Gate Array), processor, controller, microcontroller, microprocessor, be designed to perform it is described herein At least one of the electronic unit of function implement, in some cases, such embodiment can be in controller 180 Middle implementation.For software implementation, the embodiment of such as process or function can be with allowing to perform at least one function or operation Single software unit implement.Software code can be by the software application write with any appropriate programming language (or program) is implemented, and software code can be stored in memory 160 and be performed by controller 180.
So far, oneself according to its function through describing mobile terminal.Below, for the sake of brevity, will description such as folded form, Slide type mobile terminal in various types of mobile terminals of board-type, oscillating-type, slide type mobile terminal etc., which is used as, to be shown Example.Therefore, the present invention can be applied to any kind of mobile terminal, and be not limited to slide type mobile terminal.
Mobile terminal 100 as shown in Figure 1 may be constructed such that using via frame or packet transmission data it is all if any Line and wireless communication system and satellite-based communication system operate.
The communication system that can be operated referring now to Fig. 2 descriptions mobile terminal wherein according to embodiments of the present invention.
Such communication system can use different air interface and/or physical layer.For example, used by communication system Air interface includes such as frequency division multiple access (FDMA, Frequency Division Multiple Access), time division multiple acess (TDMA, Time Division Multiple Access), CDMA (CDMA, Code Division Multiple Access) and UMTS (UMTS, Universal Mobile Telecommunications System) is (special Not, Long Term Evolution (LTE, Long Term Evolution)), global system for mobile communications (GSM) etc..As unrestricted Property example, following description is related to cdma communication system, but such teaching is equally applicable to other types of system.
With reference to figure 2, cdma wireless communication system can include multiple mobile terminals 100, multiple base station (BS, Base Station) 270, base station controller (BSC, Base Station Controller) 275 and mobile switching centre (MSC, Mobile Switching Center)280.MSC280 is configured to and Public Switched Telephony Network (PSTN, Public Switched Telephone Network) 290 formation interfaces.MSC280 is also structured to can be coupled via back haul link BSC275 to base station 270 forms interface.If back haul link can construct according to any of interface that Ganji knows, described Interface includes such as E1/T1, ATM, IP, PPP, frame relay, HDSL, ADSL or xDSL.It will be appreciated that as shown in Figure 2 System can include multiple BSC275.
Each BS 270 can service one or more subregions (or region), by multidirectional antenna or the day of sensing specific direction Each subregion of line covering is radially away from BS 270.Or each subregion can by two for diversity reception or more Multiple antennas covers.Each BS 270, which may be constructed such that, supports multiple frequency distribution, and each frequency distribution has specific frequency Compose (for example, 1.25MHz, 5MHz etc.).
What subregion and frequency were distributed, which intersects, can be referred to as CDMA Channel.BS 270 can also be referred to as base station transceiver System (BTS, Base Transceiver Station) or other equivalent terms.In this case, term " base station " It can be used for broadly representing single BSC275 and at least one BS 270.Base station can also be referred to as " cellular station ".It is or special Multiple cellular stations can be referred to as by determining BS 270 each subregion.
As shown in Figure 2, broadcast singal is sent to by broadcsting transmitter (BT, Broadcast Transmitter) 295 The mobile terminal 100 of operation in system.Broadcast reception unit 111 as shown in Figure 1 is arranged at mobile terminal 100 to connect Receive the broadcast singal sent by BT295.In fig. 2 it is shown that several satellites 300, such as global positioning system can be used (GPS) satellite 300.The help of satellite 300 positions at least one in multiple mobile terminals 100.
In fig. 2, multiple satellites 300 are depicted, it is understood that, any number of satellite can be utilized to obtain useful Location information.Positional information unit 115 as shown in Figure 1 is generally configured to coordinate what is to obtain wanted with satellite 300 Location information.Substitute GPS tracking techniques or outside GPS tracking techniques, the position that can track mobile terminal can be used Other technologies.In addition, at least one gps satellite 300 can optionally or additionally handle satellite dmb transmission.
As a typical operation of wireless communication system, BS 270 receives the reverse strand from various mobile terminals 100 Road signal.Mobile terminal 100 generally participates in call, information receiving and transmitting and other types of communication.Certain base station 270 receives each Reverse link signal is handled in specific BS 270.The data of acquisition are forwarded to the BSC275 of correlation.BSC provides logical Talk about resource allocation and the mobile management function of the coordination including the soft switching process between BS 270.BSC275 will also be received Data are routed to MSC280, and it provides the extra route service for forming interface with PSTN290.Similarly, PSTN290 with MSC280 forms interface, and MSC and BSC275 form interface, and BSC275 correspondingly controls BS 270 with by forward link signals It is sent to mobile terminal 100.
The mobile comm unit 112 of communication unit 110 is based on the access mobile communication built in mobile terminal in mobile terminal Necessary data (including customer identification information and authentication information) the access movement of network (such as 2G/3G/4G mobile communications networks) It is (including upper that the business such as communication network is the web page browsing of mobile terminal user, network multimedia plays transmit mobile data Capable mobile data and descending mobile data).
The wireless interconnected net unit 113 of communication unit 110 realizes nothing by running the related protocol function of hotspot The function of line focus, hotspot supports multiple mobile terminal (any mobile terminal outside mobile terminal) accesses, by multiple Web page browsing, the net of mobile terminal user are connected as with the mobile communication between mobile comm unit 112 and mobile communications network The business such as network multimedia transmission mobile data (including up mobile data and descending mobile communication number According to), because mobile terminal is substantially the mobile communication connection transmission mobile communication between multiplexing mobile terminal and communication network Data, therefore the flow of the mobile data of mobile terminal consumption is included in mobile terminal by the charging entity of communication network side Post and telecommunication tariff, so as to consume the data traffic for the mobile data that the post and telecommunication tariff that uses of mobile terminal signing includes.
Fig. 3 is the schematic diagram for each side's hardware entities that information exchange is carried out in the embodiment of the present invention, and Fig. 3 includes:Service Device 11, terminal device 21-24, terminal device 21-24 carry out information exchange by cable network or wireless network with server, Terminal device includes the types such as mobile phone, desktop computer, PC, all-in-one.The embodiment of the present invention is used, if terminal device 21-24 quilts Malicious third parties have distorted system login password, lead to not normal login system, can be by the first file (such as wooden horse file, wood Marvin's part contains fraud information) server is reported by the first request, server receives the first request, and first request is used It can be directed to the first request by the first file of third party's malice locking system login interface, server in report of user and be carried out as walking Processing procedure shown in rapid S1-S4.Mark 10 represents to allow the processing procedure in server internal.The processing procedure includes: Step S1, the first character string, the character institute that first character string can not be inputted by user are extracted from first file Composition;Step S2, current systematic parameter is parsed from first file, is arrived according to the current system parameter adaptation Corresponding comparison code table (this example is with WINDOWS systems, however not excluded that also have the possibility of other systems, such as mobile phone A ndroid and The possibility of IOS systems, the comparison code table of corresponding WINDOWS systems can be ASCII character table);Step S3, by the first character string with The comparison code table is compared, and obtains comparison result;Step S4, preset strategy is extracted, and according to the preset strategy and institute Comparison result is stated, first character string is converted to and second character string that to compare code table related, second character The character that going here and there can be inputted by user is formed.For example, can not input ascii table inside points corresponding to character is converted to Coding, is made up of a numeral, and the coded strings being made up of the coding of each character in corresponding character string form the second character String, the character that the second character string can be inputted by user forms, as the combination in digital 0-9 forms.By outside ascii table not Character can be inputted and be converted to corresponding coding, be made up of two numerals.Finally, server by the second character string (by the first character Go here and there obtained coding after this character conversion that can not be inputted, encode and formed by character can be inputted, can be used in digital 0-9 Formed) terminal device 21-24 is showed by appropriate mode.For exhibition method, in second character string, For the corresponding coded strings for identifying any one character in each first character string, separator (such as punctuation marks used to enclose the title, or bracket be present Etc.), can clearly distinguish:Which can not input word in corresponding first character string of which coded strings in second character string Symbol.Certainly, in each coded strings of the second character string, (one in corresponding first character string of such as each coded strings can not input word Symbol) in can also not need separator.As long as this long string of second character string is inputted, user need not know in fact Which of corresponding first character string of which coded strings can not input character in second character string.
Above-mentioned Fig. 3 example is a system architecture example for realizing the embodiment of the present invention, and the embodiment of the present invention is not It is limited to the system architecture described in above-mentioned Fig. 3, based on the hardware configuration of mobile terminal 100 described in above-mentioned Fig. 1, the communication described in Fig. 2 System and the system architecture described in Fig. 3, propose each embodiment of the inventive method.
Embodiment one:
A kind of character-information processing method of the embodiment of the present invention, as shown in figure 4, methods described includes:User utilizes and stepped on Record the operating system of password login terminal (such as mobile phone, PC, notebook, tablet personal computer), can not login system, receive comprising distorting First prompt message of the normal login password of user, send first according to first prompt message and ask to server, with request Solving the problems, such as can not register system (step 101).Specifically, before initiating the first request, user can be close using logging in The operating system of code registration terminal (such as mobile phone, PC, notebook, tablet personal computer), operating system are not limited to Windows systems, also Can be IOS systems or android system.User first inputs normal login Windows, and (password of operating system, as a result finds Login system is unable to, code error, after one or many input errors, receives the first prompt message, the first prompt message Showing allows the password of login system, and the password shown in first prompt message distorts normal login for malicious third parties The password obtained after the password of Windows operating system.The purpose that malicious third parties distort password is to send fraud Information,, can not login system if being unsatisfactory for third-party requirement by the system login interface locking of user to user.With Exemplified by Windows operating system, wooden horse extortion interface is illustrated in figure 5, is inputted when A1 show logging in system by user in Fig. 5 close The position of code, the password represent that the position shown in A2 shown in dashed box is to receive the login that malicious third parties are sent to user with M1 The position of password, the password represent with M2, and it is convenient and use that dashed box is intended merely to description, in practical application and is not present the void Frame.M2 is obtained after malicious third parties distort M1, and M2 is included as what A3 was identified can not input character, it is this can not Character is inputted, user is can not to be inputted by currently inputting the state of password, such as, this, which can not input character, to be Some Chinese character, and in the currently state of input password, by password is generally made up of the combination of number and or symbol, then Default user can input the combining characters such as numeral or symbol, and the total length for inputting character is conditional, in this state Under can not input Chinese character.If it is intended to input Chinese character, must switch current input method state to the Chinese for supporting input Chinese character Input state, but, due to systems inspection to the current state for input password, do not allow to be switched in support input Chinese character Literary input state.User can not normal login system in the scene of foregoing description.The first of server receiving terminal transmission please Ask, described first asks for report of user by the first file (step 102) of third party's malice locking system login interface.The One file can be Windows wooden horse files, as shown in figure 3, the reporting of user wooden horse file, request server processing, with To the password that can log in Windows systems.Specifically, for the wooden horse file, its essence is malicious third parties by repairing Use instead family normally log in Windows login password make user can not login system, and then realize fraud to user, such as remind Otherwise user charges or contact malicious third parties, the system for locking user always, can not permitted with asking for the password of login system Perhaps logging in system by user.And existing solution is:The amended Windows login passwords of wooden horse are extracted, instruct victim The password is inputted with into operating system.However, change of secret code can not be inputted character (such as A3 institutes in Fig. 5 by a kind of wooden horse Mark can not input character), this to input character, user is can not to be inputted by currently inputting the state of password , also it is difficult to input even if password is cracked out.User, have to be by supplementary means, i.e., due to being unable to login system:Report the wood Marvin's part, request server processing.For example active user is to use terminal (such as computer) login system, discovery receives the The fraud information of tripartite and can not login system, can be connected using the computer direct report wooden horse file to server;Or find The computer can not report wooden horse file, then forward wooden horse file to server by another terminal (such as mobile phone) of user, will The fraud information that third party sends (such as wooden horse file, is specially that " character change window password can not be inputted by uploading use Wooden horse file ") transfer to server to be handled.In this scene, it is related to the interaction of cross-terminal, i.e.,:Locked system is stepped on The computer at interface is recorded, mobile phone will be sent to comprising the wooden horse file that can not input character, mobile phone, which includes this, can not input character Wooden horse file report background server and analyzed, can be used for unlocking so that server can parse from wooden horse file The new login password (new login password is represented with M2) of system interface, new login password M2 are exactly that third party normally steps on to user Record password (normal login password is represented with M1) carries out the new login password generated after malice is distorted, and new login password M2 is just It is where the reason for causing user to be unable to login system interface.Server extracts the first character string from first file, The character that first character string can not be inputted by user forms (step 103).Extracting mode includes:Carried by static analysis Password is taken, or by way of password is extracted in dynamic behaviour, also obtains the side of password including the use of other any means certainly Formula.Still by taking above-mentioned application scenarios as an example, the first character string is new login password M2, and the first file can be wooden horse file.From institute State and current systematic parameter is parsed in the first file, code table is compared corresponding to according to the current system parameter adaptation (step 104).The embodiment of the present invention is described by taking Windows systems as an example, now, under Windows systems, according to described It can be ASCII character table that current system parameter adaptation compares code table corresponding to.In order to not limit scope, however not excluded that there is it His system, such as android system and the possibility of IOS systems, all in the protection domain of the embodiment of the present invention.Server is by first Character string is compared with the code table that compares, and obtains comparison result, extracts preset strategy, and according to the preset strategy and institute Comparison result is stated, first character string is converted to and second character string that to compare code table related, second character The character that going here and there can be inputted by user forms (step 105).Specifically, by taking Windows systems as an example, under Windows systems, It is in the scene of ASCII character table, by ascii table inside points according to the current system parameter adaptation to corresponding comparison code table The character that can not input be converted to corresponding coding, be made up of a numeral, by the coding of each character in corresponding character string The coded strings formed form the second character string, and the character that the second character string can be inputted by user forms, in digital 0-9 Formed.The character that can not input outside ascii table is converted into corresponding coding, is made up of two numerals.Server will (coding that will be obtained after this character conversion that can not be inputted of the first character string, is encoded by that can input character structure second character string Into the combination in digital 0-9 being used to be formed) terminal is sent to, and show terminal device to enter by appropriate mode Row shows (step 106).After second character string is supplied to terminal to be shown by server, terminal can be according to described Two character string system for unlocking login interfaces, sign in in system.For exhibition method, in second character string, for pair The coded strings of any one character in each first character string should be identified, separator (such as punctuation marks used to enclose the title, or bracket etc.) be present, Can clearly distinguish:Which can not input character in corresponding first character string of which coded strings in second character string.Certainly, In each coded strings (one in such as each corresponding first character string of coded strings can not input character) of the second character string Separator can not needed.As long as this long string of second character string is inputted, user need not know the second word in fact Which of corresponding first character string of which coded strings can not input character in symbol string.
Embodiment two
A kind of character-information processing method of the embodiment of the present invention, methods described include:User is logged in using login password The operating system of terminal (such as mobile phone, PC, notebook, tablet personal computer), can not login system, receive and normally step on comprising distorting user The first prompt message of password is recorded, sending first according to first prompt message asks to server, to ask solution not step on The problem of recording operating system.Specifically, initiate first request before, user can utilize login password registration terminal (such as mobile phone, PC, notebook, tablet personal computer) operating system, operating system is not limited to Windows systems, can also be IOS systems or Android system.User first inputs normal login Windows, and (password of operating system, as a result discovery is unable to login system, close Code mistake, after one or many input errors, the first prompt message is received, the first prompt message, which shows to allow to log in, is The password of system, the password shown in first prompt message distort the normal Windows operating system that logs in for malicious third parties The password obtained after password.The purpose that malicious third parties distort password is in order to send fraud information to user, by user System login interface locking, can not login system if being unsatisfactory for third-party requirement.Using Windows operating system as Example, be illustrated in figure 5 wooden horse extortion interface, input the position of password when A1 show logging in system by user in Fig. 5, the password with M1 represents that the position shown in A2 shown in dashed box is the position for receiving the login password that malicious third parties are sent to user, the password Represented with M2, it is convenient and use that dashed box is intended merely to description, in practical application and is not present the dashed box.M2 is malicious third parties Obtained after M1 is distorted, and M2 is included as what A3 was identified can not input character, this to input character, user is nothing What method was inputted by currently inputting the state of password, such as, this, which can not input character, to be some Chinese character, and current Input in the state of password, by password is generally made up of the combination of number and or symbol, then default user can input number The combining characters such as word or symbol, and the total length for inputting character is conditional, can not input Chinese character in this state. If it is intended to input Chinese character, must switch current input method state to the input in Chinese state for supporting input Chinese character, but, due to being System checks the current state for input password, does not allow to be switched to the input in Chinese state for supporting input Chinese character.User is upper Stating can not normal login system in the scene of description.The first request that server receiving terminal is sent, described first asks to be used for Report of user is by the first file of third party's malice locking system login interface.First file can be Windows wooden horse files, As shown in figure 3, the reporting of user wooden horse file, request server processing, to obtain that the password of Windows systems can be logged in.Tool Body, for the wooden horse file, its essence be malicious third parties by change user normally log in Windows login it is close Code make user can not login system, and then realize fraud to user, such as remind user charges or contact malicious third parties with rope Otherwise take, the system for locking user always, can not allow logging in system by user with the password of login system.And existing solution Scheme is:The amended Windows login passwords of wooden horse are extracted, instruct victim to input the password with into operating system.So And a kind of wooden horse can by change of secret code for can not input character (as in Fig. 5 A3 identified can not input character), it is this can not Character is inputted, user is can not to be inputted by currently inputting the state of password, is also difficult to input even if password is cracked out. User, have to be by supplementary means, i.e., due to being unable to login system:Report the wooden horse file, request server processing.Such as Active user is to use terminal (such as computer) login system, and discovery receives third-party fraud information and can not log in and be System, report wooden horse file can be connected using the computer direct to server;Or find that the computer can not report wooden horse file, then Forwarding wooden horse file by another terminal (such as mobile phone) of user, the fraud information for sending third party is (such as wood to server Marvin's part, it is specially " the wooden horse file of character change window password can not be inputted by uploading use ") transfer to server to carry out Processing.In this scene, it is related to the interaction of cross-terminal, i.e.,:The computer at locked system login interface, will include to input The wooden horse file of character is sent to mobile phone, and this is reported background server comprising the wooden horse file that can not input character and entered by mobile phone Row analysis, it can be used for the new login password (new login at system for unlocking interface so that server can parse from wooden horse file Password is represented with M2), new login password M2 is exactly third party to the normal login password of user (normal login password M1 tables Show) the new login password that generates after malice is distorted is carried out, new login password M2 is exactly to cause user to be unable to login system interface The reason for where.Server extracts the first character string from first file, and first character string can not be defeated by user The character entered is formed.Extracting mode includes:Password is extracted by static analysis, or the side of password is extracted by dynamic behaviour Formula, the mode of password is also obtained including the use of other any means certainly.Still by taking above-mentioned application scenarios as an example, the first character string is New login password M2, the first file can be wooden horse file.Current systematic parameter is parsed from first file, according to The current system parameter adaptation compares code table corresponding to.The embodiment of the present invention is described by taking Windows systems as an example, Now, under Windows systems, it can be ASCII character to compare code table corresponding to according to the current system parameter adaptation Table.In order to not limit scope, however not excluded that also have other systems, such as android system and the possibility of IOS systems, all in the present invention In the protection domain of embodiment.First character string is compared server with the code table that compares, and obtains comparison result, extraction Preset strategy, and according to the preset strategy and the comparison result, first character string is converted to and compares code with described The second related character string of table, the character that second character string can be inputted by user are formed.Wherein, the preset strategy bag Include:Judge character that the user included in first character string can not input whether the comparison code table numerical value model In enclosing, if the character that the user can not input in number range, is directly converted to first character string correspondingly Comparison code form coded strings;If the character portion that the user can not input is in number range, directly by described The partial character of one character string is converted to the corresponding coded strings for comparing code form, by beyond the remainder character of number range With being changed again after at least one Coding and description for comparing yard form related to comparing code table.That is, in numerical value model In enclosing, character can not be inputted for some in the first character string, is indicated as comparing coding corresponding to one in code table; Without in number range, for some in the first character string can not input character, then needing with comparison code table At least one coded representation, two codings such as adjacent thereto represent, can just be converted to corresponding to compare code form Coded strings.Specifically, by taking Windows systems as an example, under Windows systems, according to the current system parameter adaptation To corresponding comparison code table in the scene of ASCII character table, by can not inputting corresponding to character is converted to for ascii table inside points Coding, is made up of a numeral, and the coded strings being made up of the coding of each character in corresponding character string form the second character String, the character that the second character string can be inputted by user forms, as the combination in digital 0-9 forms.By outside ascii table not Character can be inputted and be converted to corresponding coding, be made up of two numerals.Server is (this by the first character string by the second character string The coding obtained after the character conversion that can not be inputted, encodes and is formed by that can input character, can use the combination institute in digital 0-9 Composition) terminal is sent to, and show terminal device to be shown by appropriate mode.Server is by second character string After being supplied to terminal to be shown, terminal can be signed in in system according to the second character string system for unlocking login interface. For exhibition method, in second character string, any one character in each first character string is identified for corresponding Coded strings, separator (such as punctuation marks used to enclose the title, or bracket etc.) be present, can clearly distinguish:Which coded strings in second character string Which can not input character in corresponding first character string.Certainly, in each coded strings (such as each coded strings of the second character string One in corresponding first character string can not input character) in can also not need separator.As long as this long string of second Character string inputs, and user need not know which in corresponding first character string of which coded strings in the second character string in fact It is individual to input character.
So that some in the first character string can not input character in ascii table number range as an example, citing description is such as Under:
The extraction preset strategy, and according to the preset strategy and the comparison result, first character string is turned Be changed to second character string that to compare code table related, including:When detecting what it was included in first character string The first character code in the character that the user can not input<When=127, judge first character code in ASCII In the number range of table, then first character code is converted directly into the coding A, the coding A of corresponding ASCII forms It is made up of a numeral.That is, in ascii table number range, one is represented with the coding A of an ASCII form The Chinese character that can not be inputted, i.e.,:If in the range of standard ascii table, this character of Coding and description corresponding to character is used.
Character can not be inputted not in ascii table number range (or beyond ASCII with some in the first character string Table number range) exemplified by, citing is described as follows:
The extraction preset strategy, and according to the preset strategy and the comparison result, first character string is turned Be changed to second character string that to compare code table related, including:When detecting what it was included in first character string During the first character code > 127 in the character that the user can not input, judge that first character code exceeds ASCII The number range of table, the then two neighboring coded representation by first character code by corresponding ASCII forms, and being converted to Corresponding coding B, the coding B are made up of two numerals.That is, exceed ascii table number range, with two ASCII The coding B of form represents a Chinese character that can not be inputted, i.e.,:If not in the range of standard ascii table, continue to take Character late is encoded, and a Chinese character is determined using two numerals, if first character is encoded to A, second character is compiled Code is B, then corresponding Chinese character is encoded to 256*A+B.
Above-mentioned 2 examples, only it is extracted the corresponding coding that can not input character.Alternative solution pair can input character Extraction coding, only can also can not input the coding of character in extraction part, extraction scope not necessarily with it is completely the same in this programme.
Embodiment three:
A kind of character-information processing method of the embodiment of the present invention, methods described include:User is logged in using login password The operating system of terminal (such as mobile phone, PC, notebook, tablet personal computer), can not login system, receive and normally step on comprising distorting user The first prompt message of password is recorded, sending first according to first prompt message asks to server, to ask solution not step on The problem of recording operating system, described first asks the first text by third party's malice locking system login interface for report of user Part, first file include the first character string, and the character that first character string can not be inputted by user is formed.Specifically , before initiating the first request, user can utilize the behaviour of login password registration terminal (such as mobile phone, PC, notebook, tablet personal computer) Make system, operating system is not limited to Windows systems, can also be IOS systems or android system.User first inputs normally Windows is logged in (password of operating system, as a result to find to be unable to login system, code error, in one or many input errors Afterwards, the first prompt message is received, the first prompt message shows the password for allowing login system, shown in first prompt message The password shown is that malicious third parties distort the password obtained after the normal password for logging in Windows operating system.Malicious third parties A purpose for distorting password is to send fraud information to user, the system login interface of user is locked, if discontented The third-party requirement of foot, then can not login system.By taking Windows operating system as an example, wooden horse extortion interface is illustrated in figure 5, The position of password is inputted when A1 show logging in system by user in Fig. 5, the password is represented with M1, the position shown in A2 shown in dashed box To receive the position that malicious third parties are sent to the login password of user, the password represents that dashed box is intended merely to description side with M2 Just use, in practical application and be not present the dashed box.M2 is obtained after malicious third parties distort M1, and M2 includes As what A3 was identified can not input character, this to input character, user is can not to be entered by currently inputting the state of password Row input, such as, it can be some Chinese character that this, which can not input character, and in the currently state of input password, due to password Generally it is made up of the combination of number and or symbol, then default user can input the combining characters such as numeral or symbol, and input The total length of character is conditional, can not input Chinese character in this state.If it is intended to input Chinese character, must switch and work as Preceding input method status to the input in Chinese state for supporting input Chinese character, but, due to systems inspection to current to input password State, do not allow to be switched to the input in Chinese state for supporting input Chinese character.User can not normally step in the scene of foregoing description Recording system.The first request that server receiving terminal is sent, described first asks to be used for report of user by third party's malice locking First file at system login interface.First file can be Windows wooden horse files, as shown in figure 3, the reporting of user wooden horse File, request server processing, to obtain that the password of Windows systems can be logged in.Specifically, for the wooden horse file, Its essence be malicious third parties normally logged in by changing user Windows login password make user can not login system, enter And the fraud to user is realized, such as remind user charges or contact malicious third parties can be no with the password of login system to ask for Then, the system for locking user always, does not allow logging in system by user.And existing solution is:It is amended to extract wooden horse Windows login passwords, victim is instructed to input the password with into operating system.However, a kind of wooden horse can be by change of secret code For can not input character (as in Fig. 5 A3 identified can not input character), this to input character, user is to pass through What the state of current input password was inputted, also it is difficult to input even if password is cracked out.User is due to being unable to login system, only It is good by supplementary means, i.e.,:Report the wooden horse file, request server processing.For example active user is to use a terminal (such as computer) login system, discovery receive third-party fraud information and can not login system, can be connected using the computer direct Wooden horse file is reported to server;Or find that the computer can not report wooden horse file, then by another terminal of user (such as Mobile phone) for forwarding wooden horse file to server, the fraud information that third party is sent (such as wooden horse file, is specially " to upload use The wooden horse file of character change window password can not be inputted ") transfer to server to be handled.In this scene, be related to across The interaction of terminal, i.e.,:The computer at locked system login interface, will be sent to hand comprising the wooden horse file that can not input character This is included and can not input the wooden horse file of character and report background server and analyzed by machine, mobile phone, so that server can be from The new login password (new login password is represented with M2) that can be used for system for unlocking interface is parsed in wooden horse file, new login is close Code M2 is exactly that third party carries out generating after malice is distorted to the normal login password of user (normal login password is represented with M1) New login password, new login password M2 be exactly the reason for causing user to be unable to login system interface where.Server is from institute State and the first character string is extracted in the first file, the character that first character string can not be inputted by user is formed.Extraction side Formula includes:Password is extracted by static analysis, or by way of password is extracted in dynamic behaviour, certainly also including the use of other Any means obtain the mode of password.Still by taking above-mentioned application scenarios as an example, the first character string is new login password M2, the first file It can be wooden horse file.Current systematic parameter is parsed from first file, is fitted according to the current systematic parameter Code table is compared corresponding to being fitted on.The embodiment of the present invention is described by taking Windows systems as an example, now, in Windows systems Under, it can be ASCII character table to compare code table corresponding to according to the current system parameter adaptation.In order to not limit scope, Also other systems are not excluded for, such as android system and the possibility of IOS systems, all in the protection domain of the embodiment of the present invention. First character string is compared server with the code table that compares, and obtains comparison result, extracts preset strategy, and according to described Preset strategy and the comparison result, by first character string be converted to second character string that to compare code table related, The character that second character string can be inputted by user is formed.Specifically, by taking Windows systems as an example, in Windows systems Under, it is in the scene of ASCII character table, by ascii table according to the current system parameter adaptation to corresponding comparison code table The partial character that can not input is converted to corresponding coding, is made up of a numeral, by each character in corresponding character string The formed coded strings of coding form the second character string, and the character that the second character string can be inputted by user forms, such as digital 0-9 In combination formed.The character that can not input outside ascii table is converted into corresponding coding, is made up of two numerals.Service By the second character string, (coding that will be obtained after this character conversion that can not be inputted of the first character string, is encoded by that can input word device Symbol is formed, and the combination in digital 0-9 can be used to be formed) terminal is sent to, and show terminal to set by appropriate mode It is standby to be shown.After second character string is supplied to terminal to be shown by server, terminal shows the second character string, described The character that second character string can be inputted by user is formed, and second character string is server according to preset strategy and with comparing The comparison result of code table, the first character string will be stated and carry out changing the resulting character string related to comparing code table.Terminal can be with According to the second character string system for unlocking login interface, sign in in system.For exhibition method, such as second character string In, for the corresponding coded strings for identifying any one character in each first character string, exist separator (such as punctuation marks used to enclose the title, or Bracket etc.), can clearly distinguish:Which can not be inputted in corresponding first character string of which coded strings in second character string Character.Certainly, in each coded strings of the second character string, (one in corresponding first character string of such as each coded strings can not input Character) in can also not need separator.As long as this long string of second character string is inputted, user need not know in fact Which of corresponding first character string of which coded strings can not input character in the character string of road second.
An example for showing the second character string in terminal is:When second character string is by the coded strings of comparison code form When being represented with list separator, at least one coded strings Mi described in being divided by list separator (such as bracket) is shown, that is to say, that Password is shown in terminal page, for character can not be inputted, is encoded and is placed in bracket, show user in order.It is each It is individual by the list separator divide description coded strings Mi, according to sequentially correspond respectively in the first character string accordingly can not be defeated Enter character, be shown to terminal user in sequence.Second character string is formed by least one coded strings Mi.By can not An example of the first character string that character is formed is inputted, (position that A4 corresponds to that dashed box is identified in figure is first as shown in Figure 6 The position of character string, in addition, dashed box is intended merely to conveniently state, in actual applications and the dashed box need not be shown).By service The conversion of device, (A5 corresponds to dashed box and identified an example of the second character string formed by that can input character in figure as shown in Figure 7 Position be the second character string position, in addition, dashed box is intended merely to conveniently state, in actual applications and the void need not be shown Frame, the position that A6 is identified are the position where prompt message), in Fig. 7, list separator passes through bracket point using bracket Every at least one coded strings, sequentially user is showed to look into by corresponding to the order that can not accordingly input character in the first character string Read, as shown in fig. 7, each coded strings Mi in bracket, can be identical or different.In Fig. 7, the prompting that A6 is identified is believed Terminal user is shown to together with ceasing the second character string that can be identified for option, prompt message with A5, can also only be shown Show the second character string that A5 is identified to terminal user.
In the case where prompt message and the second character string are shown to the scene of terminal user together, methods described also includes:Obtain Prompt message simultaneously shows that the prompt message is used to characterize the trigger condition for inputting second character string.According to the triggering Condition performs the first operation on triggering button (such as keyboard Alt key), keeps first operation constant (as pressed lower keyboard Alt key is not put), while the second operation is performed, described second operates the correspondence that second character string is sequentially inputted for characterizing User can input character.First operation of the release on the triggering button, the input of character can be inputted by terminating corresponding user. That is, method of the user according to coding input password is known on the page, i.e.,:Do not put by lower keyboard Alt key, it is small on right side The numeral inputted in keyboard in bracket, then decontrol Alt key, you can a character corresponding to input in password box.
It is to be herein pointed out in a scheme, in the character string of terminal display first and for the first character string solution During the second character string obtained by code, an only optional example is shown using bracket as list separator.Replace The second character string can be gone forward side by side with the insertion of other list separators (such as punctuation marks used to enclose the title) including the use of other list separators for scheme Row displaying, as long as the corresponding relation that character is corresponded in the second character string and the first character string can be shown, such as using Fig. 7 as Example, as long as can know that corresponding coding (45287) and corresponding can not input between character (or password can not be inputted) The list separator of corresponding relation is belonged within the protection domain of the embodiment of the present invention., can also in terminal in another scheme Only show to the second character string obtained by the decoding of the first character string, do not show to the first character string, such as only tell user The obtained character string of correspondence first of decoding how is inputted, i.e., can not input the coding (i.e. the of character (or password can not be inputted) Two character strings), so that user can be with login system.
It is above-mentioned how to show the first character string, the second character string and/or prompt message method it is merely exemplary, substitute Scheme can also carry out the input explanation of the second character string otherwise, can also be in other random times (including user Submit sample before) just illustrated to how to input the second character string, can also default user known the method without Add explanation, these are belonged within the protection domain of the embodiment of the present invention.
Example IV
A kind of character processing system of the embodiment of the present invention, as shown in figure 8, including terminal 31 and server 32, wherein, institute Stating terminal 31 includes:Reporting unit 311, for reporting the first request, described first asks to be disliked by third party for report of user Anticipate the first file of locking system login interface, first file includes the first character string, first character string by with The character that family can not input is formed;Display unit 312, for showing the second character string, second character string can by user The character of input is formed, and second character string is server according to preset strategy and the comparison result with comparing code table, general The first character string is stated to carry out changing the resulting character string related to comparing code table.Server 32 includes:Receiving unit 321, For receiving the first request, described first asks the first text by third party's malice locking system login interface for report of user Part;Extraction unit 322, for extracting the first character string from first file, first character string can not by user The character of input is formed;Adaptation unit 323 is parsed, for parsing current systematic parameter, root from first file Code table is compared corresponding to according to the current system parameter adaptation;Comparing unit 324, for by the first character string and the ratio Code table is compared, obtains comparison result;Processing unit 325, for extracting preset strategy, and according to the preset strategy and The comparison result, first character string is converted to and second character string that to compare code table related, second word The character that symbol string can be inputted by user is formed.
In practical application, user utilizes the operation of login password registration terminal (such as mobile phone, PC, notebook, tablet personal computer) System, can not login system, receive comprising the first prompt message of the normal login password of user is distorted, believed according to first prompting Breath sends and first asked to server, so that ask to solve the problems, such as can not register system.Specifically, initiate the first request Before, user can utilize the operating system of login password registration terminal (such as mobile phone, PC, notebook, tablet personal computer), and operating system is not It is limited to Windows systems, can also is IOS systems or android system.User first inputs the normal Windows that logs in and (operates system The password of system, as a result find to be unable to login system, code error, after one or many input errors, receive the first prompting Information, the first prompt message show the password for allowing login system, and the password shown in first prompt message is malice the Tripartite distorts the password obtained after the normal password for logging in Windows operating system.Malicious third parties distort a use of password Meaning is to send fraud information to user, and the system login interface of user is locked, if being unsatisfactory for third-party requirement, Can not login system.By taking Windows operating system as an example, wooden horse extortion interface is illustrated in figure 5, A1 show user in Fig. 5 The position of password is inputted during login system, the password is represented with M1, and the position shown in A2 shown in dashed box is to receive malicious third parties The position of the login password of user is sent to, the password is represented with M2, and dashed box is intended merely to description and conveniently used, and actually should Simultaneously the dashed box is not present in used time.M2 is obtained after malicious third parties distort M1, and M2 include as A3 identified can not Character is inputted, this to input character, user is can not to be inputted by currently inputting the state of password, such as, should It can be some Chinese character that character, which can not be inputted, and in the currently state of input password, because password is generally by numeral and/or symbol Number combination formed, then default user can input numeral or the combining characters such as symbol, and the total length for inputting character is that have Limitation, Chinese character can not be inputted in this state.If it is intended to input Chinese character, must switch current input method state to branch The input in Chinese state of input Chinese character is held, but, because systems inspection is to the current state for input password, do not allow to be switched to Support the input in Chinese state of input Chinese character.User can not normal login system in the scene of foregoing description.Server receives The first request that terminal is sent, described first asks for report of user by the first of third party's malice locking system login interface File.First file can be Windows wooden horse files, as shown in figure 3, the reporting of user wooden horse file, at request server Reason, to obtain that the password of Windows systems can be logged in.Specifically, for the wooden horse file, its essence is malicious third parties Normally logged in by changing user Windows login password make user can not login system, and then realize fraud to user, Such as reminding user charges or contact malicious third parties can be with the password of login system to ask for, and otherwise, lock user always is System, does not allow logging in system by user.And existing solution is:The amended Windows login passwords of wooden horse are extracted, are instructed Victim inputs the password with into operating system.However, change of secret code can not be inputted character (such as Fig. 5 by a kind of wooden horse What middle A3 was identified can not input character), this to input character, user is can not to be entered by currently inputting the state of password Row input, also it is difficult to input even if password is cracked out.User, have to be by supplementary means, i.e., due to being unable to login system:On Report the wooden horse file, request server processing.For example active user is to use terminal (such as computer) login system, find Receive third-party fraud information and can not login system, report wooden horse file can be connected using the computer direct to server;Or Person, it is found that the computer can not report wooden horse file, then wooden horse file is forwarded to clothes by another terminal (such as mobile phone) of user Business device, the fraud information that third party is sent (such as wooden horse file, are specially that " character change can not be inputted by uploading use The wooden horse file of window password ") transfer to server to be handled.In this scene, it is related to the interaction of cross-terminal, i.e.,:Quilt The computer of locking system login interface, mobile phone will be sent to comprising the wooden horse file that can not input character, mobile phone includes this not The wooden horse file that character can be inputted reports background server and analyzed, so as to server can parse from wooden horse file can For the new login password (new login password is represented with M2) at system for unlocking interface, new login password M2 be exactly third party to The normal login password in family (normal login password is represented with M1) carries out the new login password generated after malice is distorted, the Xindeng Record password M2 is exactly where the reason for causing user to be unable to login system interface.Server extracts from first file One character string, the character that first character string can not be inputted by user are formed.Extracting mode includes:Carried by static analysis Password is taken, or by way of password is extracted in dynamic behaviour, also obtains the side of password including the use of other any means certainly Formula.Still by taking above-mentioned application scenarios as an example, the first character string is new login password M2, and the first file can be wooden horse file.From institute State and current systematic parameter is parsed in the first file, code table is compared corresponding to according to the current system parameter adaptation. The embodiment of the present invention is described by taking Windows systems as an example, now, under Windows systems, according to the current system It can be ASCII character table that parameter adaptation compares code table corresponding to.In order to not limit scope, however not excluded that also have other systems, such as The possibility of android system and IOS systems, all in the protection domain of the embodiment of the present invention.Server by the first character string with The comparison code table is compared, and obtains comparison result, extracts preset strategy, and tie according to the preset strategy and described compare Fruit, by first character string be converted to second character string that to compare code table related, second character string is by user The character that can be inputted is formed.The preset strategy includes:Judge that the user included in first character string can not be defeated Whether the character entered is in the number range of the comparison code table, if the character that the user can not input is in number range It is interior, then first character string is directly converted into the corresponding coded strings for comparing code form;If what the user can not input The partial character of first character string is then directly converted to corresponding comparison code form by character portion in number range Coded strings, by beyond the remainder character of number range with least one coding that compares yard form related to comparing code table Changed again after description.Specifically, by taking Windows systems as an example, under Windows systems, according to the current system Parameter adaptation is in the scene of ASCII character table to corresponding comparison code table, and ascii table inside points can not be inputted into character conversion For corresponding coding, it is made up of a numeral, the coded strings being made up of the coding of each character in corresponding character string are formed Second character string, the character that the second character string can be inputted by user form, as the combination in digital 0-9 forms.By ASCII The character that can not input of off-balancesheet is converted to corresponding coding, is made up of two numerals.Server is by the second character string (by the first word The coding obtained after this character conversion that can not be inputted of symbol string, encodes and is formed by that can input character, can be used in digital 0-9 Combination formed) be sent to terminal, and show terminal device to be shown by appropriate mode.Server is by described After two character strings are supplied to terminal to be shown, terminal can log according to the second character string system for unlocking login interface Into system.It is any one in each first character string for correspondingly identifying in second character string for exhibition method The coded strings of individual character, separator (such as punctuation marks used to enclose the title, or bracket etc.) be present, can clearly distinguish:In second character string which Which can not input character in corresponding first character string of individual coded strings.Certainly, it is (such as every in each coded strings of the second character string One in corresponding first character string of individual coded strings can not input character) in can also not need separator.As long as this is grown The second character string input of string, user need not know corresponding first character string of which coded strings in the second character string in fact Which of can not input character.
In the embodiment of the embodiment of the present invention one, the server also includes:Transmitting element, for sending described second Character string, it is supplied to terminal to be shown second character string, terminal is stepped on according to the second character string system for unlocking Interface is recorded, is signed in in system.
In the embodiment of the embodiment of the present invention one, the parsing adaptation unit in the server, it is further used for:Work as institute When to state current systematic parameter be Windows systems, be adapted to out corresponding to compare code table be ascii table.
In the embodiment of the embodiment of the present invention one, the processing unit in the server, it is further used for:When described The first character code in the character that its described user included can not input is detected in first character string<When=127, sentence Break and first character code in the number range of ascii table, be then converted directly into first character code correspondingly ASCII forms coding A, the coding A is made up of a numeral.
In the embodiment of the embodiment of the present invention one, the processing unit in the server, it is further used for:When described When the first character code > 127 in the character that its described user included can not input is detected in the first character string, sentence Break and the number range that first character code exceeds ascii table, then by first character code by corresponding ASCII shapes The two neighboring coded representation of formula, and corresponding coding B is converted to, the coding B is made up of two numerals.
In the embodiment of the embodiment of the present invention one, the display unit in the terminal, it is further used for:When described second When character string is represented by the coded strings and list separator of comparison code form, show by least the one of list separator division description Individual coded strings Mi;Each is divided the coded strings Mi of description by the list separator, according to sequentially corresponding respectively to the first character Character can not be accordingly inputted in string, is shown to terminal user in sequence;It is made up of at least one coded strings Mi described Second character string.
In the embodiment of the embodiment of the present invention one, the display unit in the terminal, it is further used for:Obtain prompting letter Cease and show, the prompt message is used to characterize the trigger condition for inputting second character string.The terminal also includes:Operation Execution unit, for performing the first operation on triggering button according to the trigger condition, keep first operation not Become, while perform the second operation, described second operate for characterize sequentially input the corresponding user of second character string can be defeated Enter character;And operation releasing unit, for discharging the first operation on the triggering button, terminating corresponding user can input The input of character.
It is to be herein pointed out in the above embodiment of the present invention, when being related to the first request, first request except First file (such as wooden horse file) can be included, can also be the account (such as QQ number) or of malicious third parties The feature samples (such as characteristic value of wooden horse file) of one file.In a word, the information content that the first request is carried by is not fixed, There are a variety of implementations:1) specific file (such as wooden horse file) can be reported by the user that malicious third parties are cheated;2) The account of malicious third parties is reported by the user that malicious third parties are cheated, so that server is by inquiring about the account To navigate to before the malicious third parties All Files being once transmitted through, therefrom to find out specific file (such as wooden horse text Part);3) a certain of the specific file (such as wooden horse file) can be described by being reported by the user cheated by malicious third parties Individual or multiple characteristic values, so that server inquires specific file (such as wooden horse text according to one or more characteristic values Part)." directly the reporting for file " of first way is different from, latter two mode is locked and inquired about by ad hoc fashion To the specific file, realize " reporting indirectly for file ".
Can also be the tablet personal computer such as PAD it is to be herein pointed out above-mentioned terminal can be this electronic equipments of PC, It this mancarried electronic aid of laptop computer, can also be such as this intelligent mobile terminal of mobile phone, be not limited to description here;It is described Server can be made up of group system, to realize that each unit function merges into one or each unit function split settings Electronic equipment, terminal and server all comprise at least the processor for the database of data storage and for data processing, Or including the storage medium being arranged in server or the storage medium being independently arranged.
Wherein, for the processor for data processing, when performing processing, microprocessor, center can be used Processor (CPU, Central Processing Unit), digital signal processor (DSP, Digital Singnal Processor) or programmable logic array (FPGA, Field-Programmable Gate Array) is realized;It is situated between for storage For matter, comprising operational order, the operational order can be computer-executable code, be realized by the operational order State each step in information processing method flow of the embodiment of the present invention.
It need to be noted that be:Above is referred to the description of terminal and server entry, be with above method description it is similar, Beneficial effect with method describes, and does not repeat.For the ins and outs not disclosed in terminal of the present invention and server example, It refer to content described by the embodiment of the inventive method flow description.
The embodiment of the present invention is described below by taking a practical application scene as an example:
During logging in system by user, in the scene that password is distorted by malicious third parties, using the embodiment of the present invention, for it is a kind of from Dynamic extraction can not input the scheme of character password coding.Several technical termses description one in advance first to being related in this scene Under:1) character can be inputted:The character inputted, including capital and small letter English alphabet, numeral, part can be clicked directly on keyboard Symbol etc..2) character can not be inputted:The other characters that can be inputted beyond character.
This scene can be for a kind of common Windows wooden horses, and its means of doing evil is modification Windows login passwords To realize extortion.In the prior art, it is the extraction amended Windows login passwords of wooden horse, shows user, allow user stepping on Record and input is compareed in dialog box, to instruct victim to input the password with into operating system.However, one type wooden horse can incite somebody to action Change of secret code is can not input character, as shown in fig. 6, the password that A4 is identified includes that character can not be inputted, even if cracking out close Code is also difficult to input.That is, using prior art, when the character shown is that Chinese etc. can not input character, use Family can not directly input in dialog boxes for login, can not switch over the operation such as input method, thus cannot be introduced into system.This The embodiment of the present invention is applied in scape, in simple terms, the wood of character change window password can not be inputted when user uploads use After horse, server can automatically extract the login password of its setting, and server first detects being usurped by malicious third parties for user's submission Whether contain in the login password changed can not input character.Then the character that can not input of ascii table inside points is changed and solved Code is corresponding coding (this, which is encoded to, can input character), is made up of a numeral, and the character that can not input outside ascii table is turned Corresponding coding is changed to, is made up of two numerals.Finally, the coding after conversion is shown by appropriate exhibition method, and can Choosing, can by prompt message come instruct user according to coding input decode to obtain it is close by the login that character forms can be inputted Code, as shown in fig. 7, to showing that the usage of result illustrates, victim is instructed according to the description of the explanation to input the password With into operating system, so that user can smooth register system.
Specifically, the embodiment of the present invention is applied in this scene, as shown in figure 9, specific implementation step includes:
The login password for the login Windows operating system that step 301, extraction wooden horse are set.
Step 302, whether check in password containing character can not be inputted, if it is, performing step 303, otherwise, perform Step 306.
Here, for the relation of ascii table and the Chinese character of its corresponding conversion, ascii table is to be based on the Latin alphabet A set of computer code's system.It is mainly used in showing current english, defines 128 characters, character highest altogether up to now Position is 0.These characters are not that all can be transferred through keyboard to be inputted.In order that computer can encode substantial amounts of middle word Symbol, coding is extended on the basis of ASCII.Microsoft uses Codepage 936 in simplified form of Chinese Character operating system As character set standard, compatible most GBK characters.Codepage 936 is a kind of double-byte character set (DBCS), in order to Compatible with ascii character-set, it is provided:Ascii character part uses single byte, and its value is from 0x00 to 0x7F;Chinese character portion Divide and use double byte, the value of first character section is from 0x81 to 0xFE.In order to simplify processing, first character section can be directly judged Highest order, it is ASCII compatibility characters when being 0;For 1 when, collectively constitute Chinese character with its latter byte.
Step 303, inspection can not input character whether in the range of standard ascii table, and inspection method is password for inquiry word Whether the coding of symbol is less than or equal to 127.If it is, performing step 304, otherwise, step 305 is performed.
Step 304, in the range of standard ascii table, then using this character of Coding and description corresponding to character.Afterwards, it is transferred to Perform step 306.
Step 305, not in the range of standard ascii table, then continue to take next character code, use two numeral determine One Chinese character, if first character is encoded to A, second character code is B, then corresponding Chinese character is encoded to 256* A+B。
Step 306, password is shown on the page, for character can not be inputted, encoded and be placed in bracket, opened up in order Show to user.
Step 307, explanation of the user according to coding input password is known on the page, i.e.,:By lower keyboard Alt key not Put, the numeral inputted in the keypad of right side in bracket, then decontrol Alt key, you can a word corresponding to input in password box Symbol.
The embodiment of the present invention is applied in this scene, user can be allowed quickly to understand code content and input method, can be with Password is voluntarily inputted in dialog boxes for login according to the content of displaying, so as to smooth register system, can also lift server For the Detection results of wooden horse, as test sample, a set of sample safety detecting system is formd in the detection.The system is in void Usage behavior activating system lures that sample runs out dynamic behaviour as much as possible into near-ring border, then capture and key monitoring its In high suspicious abnormal behaviour, so as to efficiently identify out malice sample.For such wooden horse, the abnormal behaviour of sample Including newly-built user account number, modification login username, modification login password etc., sample can be captured using the system of the present embodiment This performs the parameter used during these behaviors, and therefrom extracts amended password, including the password that can not be inputted, to continue Provide the user with bigger facility.
In several embodiments provided herein, it should be understood that disclosed apparatus and method, it can be passed through Its mode is realized.Apparatus embodiments described above are only schematical, for example, the division of the unit, is only A kind of division of logic function, there can be other dividing mode when actually realizing, such as:Multiple units or component can combine, or Another system is desirably integrated into, or some features can be ignored, or do not perform.In addition, shown or discussed each composition portion Point mutual coupling or direct-coupling or communication connection can be the INDIRECT COUPLINGs by some interfaces, equipment or unit Or communication connection, can be electrical, mechanical or other forms.
The above-mentioned unit illustrated as separating component can be or may not be physically separate, show as unit The part shown can be or may not be physical location, you can positioned at a place, can also be distributed to multiple network lists In member;Partly or entirely unit therein can be selected to realize the purpose of this embodiment scheme according to the actual needs.
In addition, each functional unit in various embodiments of the present invention can be fully integrated into a processing unit, also may be used To be each unit individually as a unit, can also two or more units it is integrated in a unit;It is above-mentioned Integrated unit can both be realized in the form of hardware, can also be realized in the form of hardware adds SFU software functional unit.
One of ordinary skill in the art will appreciate that:Realizing all or part of step of above method embodiment can pass through Programmed instruction related hardware is completed, and foregoing program can be stored in a computer read/write memory medium, the program Upon execution, the step of execution includes above method embodiment;And foregoing storage medium includes:It is movable storage device, read-only Memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disc or Person's CD etc. is various can be with the medium of store program codes.
Or if the above-mentioned integrated unit of the present invention is realized in the form of SFU software functional unit and is used as independent product Sale in use, can also be stored in a computer read/write memory medium.Based on such understanding, the present invention is implemented The part that the technical scheme of example substantially contributes to prior art in other words can be embodied in the form of software product, The computer software product is stored in a storage medium, including some instructions are causing a computer equipment (can be with It is personal computer, server or network equipment etc.) perform all or part of each embodiment methods described of the present invention. And foregoing storage medium includes:Movable storage device, ROM, RAM, magnetic disc or CD etc. are various can be with store program codes Medium.
The foregoing is only a specific embodiment of the invention, but protection scope of the present invention is not limited thereto, any Those familiar with the art the invention discloses technical scope in, change or replacement can be readily occurred in, should all be contained Cover within protection scope of the present invention.Therefore, protection scope of the present invention should be based on the protection scope of the described claims.

Claims (18)

1. a kind of character-information processing method, it is characterised in that methods described includes:
The first request is received, described first asks the first text by third party's malice locking system login interface for report of user Part;
The first character string, the character institute group that first character string can not be inputted by user are extracted from first file Into;
Current systematic parameter is parsed from first file, is compared according to the current system parameter adaptation corresponding to To code table;
First character string is compared with the code table that compares, obtains comparison result;
Preset strategy is extracted, and according to the preset strategy and the comparison result, first character string is converted to and institute State and compare the second related character string of code table, the character that second character string can be inputted by user is formed.
2. according to the method for claim 1, it is characterised in that methods described also includes:
Second character string is sent, is supplied to terminal to be shown second character string, makes terminal according to described second Character string system for unlocking login interface, signs in in system.
3. method according to claim 1 or 2, it is characterised in that the preset strategy includes:
Judge character that the user included in first character string can not input whether the comparison code table numerical value In the range of, if the character that the user can not input in number range, is directly converted to first character string pair The coded strings for the comparison code form answered;If the character portion that the user can not input is in number range, directly by described in The partial character of first character string is converted to the corresponding coded strings for comparing code form, by beyond the remainder word of number range Symbol with being changed again after at least one Coding and description for comparing yard form related to comparing code table.
4. method according to claim 1 or 2, it is characterised in that according to the current system parameter adaptation to correspondingly Comparison code table, including:
When the current systematic parameter is Windows systems, it is ascii table to be adapted to out the corresponding code table that compares.
5. according to the method for claim 4, it is characterised in that the extraction preset strategy, and according to the preset strategy With the comparison result, by first character string be converted to second character string that to compare code table related, including:
When detected in first character string the first character in the character that its described user included can not input compile Code<When=127, judge first character code in the number range of ascii table, then it is first character code is straight Switch through the coding A of ASCII forms corresponding to being changed to, the coding A is made up of a numeral.
6. according to the method for claim 4, it is characterised in that the extraction preset strategy, and according to the preset strategy With the comparison result, by first character string be converted to second character string that to compare code table related, including:
When detected in first character string the first character in the character that its described user included can not input compile Code>When 127, judge that first character code exceeds the number range of ascii table, then by first character code by right The two neighboring coded representation for the ASCII forms answered, and corresponding coding B is converted to, the coding B is made up of two numerals.
7. a kind of server, it is characterised in that the server includes:
Receiving unit, for receiving the first request, described first asks to be stepped on by third party's malice locking system for report of user Record first file at interface;
Extraction unit, for extracting the first character string from first file, first character string can not be defeated by user The character entered is formed;
Adaptation unit is parsed, for parsing current systematic parameter from first file, according to the current system Parameter adaptation compares code table corresponding to;
Comparing unit, for the first character string to be compared with the code table that compares, obtain comparison result;
Processing unit, for extracting preset strategy, and according to the preset strategy and the comparison result, by first character String is converted to second character string that to compare code table related, the character institute group that second character string can be inputted by user Into.
8. server according to claim 7, it is characterised in that the server also includes:
Transmitting element, for sending second character string, it is supplied to terminal to be shown second character string, makes terminal According to the second character string system for unlocking login interface, sign in in system.
9. the server according to claim 7 or 8, it is characterised in that the preset strategy includes:
Judge character that the user included in first character string can not input whether the comparison code table numerical value In the range of, if the character that the user can not input in number range, is directly converted to first character string pair The coded strings for the comparison code form answered;If the character portion that the user can not input is in number range, directly by described in The partial character of first character string is converted to the corresponding coded strings for comparing code form, by beyond the remainder word of number range Symbol with being changed again after at least one Coding and description for comparing yard form related to comparing code table.
10. the server according to claim 7 or 8, it is characterised in that the parsing adaptation unit, be further used for:
When the current systematic parameter is Windows systems, it is ascii table to be adapted to out the corresponding code table that compares.
11. server according to claim 10, it is characterised in that the processing unit, be further used for:
When detected in first character string the first character in the character that its described user included can not input compile Code<When=127, judge first character code in the number range of ascii table, then it is first character code is straight Switch through the coding A of ASCII forms corresponding to being changed to, the coding A is made up of a numeral.
12. server according to claim 10, it is characterised in that the processing unit, be further used for:
When detected in first character string the first character in the character that its described user included can not input compile Code>When 127, judge that first character code exceeds the number range of ascii table, then by first character code by right The two neighboring coded representation for the ASCII forms answered, and corresponding coding B is converted to, the coding B is made up of two numerals.
13. a kind of character-information processing method, it is characterised in that methods described includes:
The first request is reported, described first asks the first text by third party's malice locking system login interface for report of user Part, first file include the first character string, and the character that first character string can not be inputted by user is formed;
The second character string is shown, the character that second character string can be inputted by user is formed, and second character string is clothes Device be engaged according to preset strategy and the comparison result with comparing code table, will state the first character string change it is resulting with comparing code The related character string of table.
14. according to the method for claim 13, it is characterised in that the second character string of the display, including:
When second character string is represented by the coded strings and list separator of comparison code form, show and drawn by the list separator Divide at least one coded strings Mi of description;
Each is divided the coded strings Mi of description by the list separator, according to the phase sequentially corresponded respectively in the first character string Character should can not be inputted, is shown to terminal user in sequence;
Second character string is formed by least one coded strings Mi.
15. the method according to claim 13 or 14, it is characterised in that methods described also includes:
Obtain prompt message and show, the prompt message is used to characterize the trigger condition for inputting second character string;
The first operation on triggering button is performed according to the trigger condition, keeps first operation constant, holds simultaneously Row second operates, and described second operates and sequentially input the corresponding user of second character string for characterizing and can input character;
First operation of the release on the triggering button, the input of character can be inputted by terminating corresponding user.
16. a kind of terminal, it is characterised in that the terminal includes:
Reporting unit, for reporting the first request, described first asks to be stepped on by third party's malice locking system for report of user First file at interface is recorded, first file includes the first character string, what first character string can not be inputted by user Character is formed;
Display unit, for showing the second character string, the character that second character string can be inputted by user is formed, and described Two character strings are servers according to preset strategy and the comparison result with comparing code table, will be stated obtained by the first character string changed To the character string related to comparing code table.
17. terminal according to claim 16, it is characterised in that the display unit, be further used for:
When second character string is represented by the coded strings and list separator of comparison code form, show and drawn by the list separator Divide at least one coded strings Mi of description;
Each is divided the coded strings Mi of description by the list separator, according to the phase sequentially corresponded respectively in the first character string Character should can not be inputted, is shown to terminal user in sequence;
Second character string is formed by least one coded strings Mi.
18. the terminal according to claim 16 or 17, it is characterised in that the display unit, be further used for:
Obtain prompt message and show, the prompt message is used to characterize the trigger condition for inputting second character string;
The terminal also includes:
Operation execution unit, for performing the first operation on triggering button according to the trigger condition, keep described the One operation is constant, while performs the second operation, and described second operates the correspondence that second character string is sequentially inputted for characterizing User can input character;
Releasing unit is operated, for discharging the first operation on the triggering button, character can be inputted by terminating corresponding user Input.
CN201610497662.3A 2016-06-29 2016-06-29 Character information processing method, server and terminal Active CN107547610B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610497662.3A CN107547610B (en) 2016-06-29 2016-06-29 Character information processing method, server and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610497662.3A CN107547610B (en) 2016-06-29 2016-06-29 Character information processing method, server and terminal

Publications (2)

Publication Number Publication Date
CN107547610A true CN107547610A (en) 2018-01-05
CN107547610B CN107547610B (en) 2020-02-28

Family

ID=60966395

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610497662.3A Active CN107547610B (en) 2016-06-29 2016-06-29 Character information processing method, server and terminal

Country Status (1)

Country Link
CN (1) CN107547610B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108319589A (en) * 2018-03-14 2018-07-24 腾讯科技(深圳)有限公司 Parameter string processing method, apparatus, computer readable storage medium and equipment
CN113688380A (en) * 2021-10-26 2021-11-23 苏州浪潮智能科技有限公司 Password protection method, device and medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2169898A1 (en) * 2008-09-25 2010-03-31 Fraunhofer-Gesellschaft zur Förderung der angewandten Forschung e.V. Method of and telecommunication apparatus for mitigating Distributed Denial-of-Service attacks in SIP packet networks
CN103745156A (en) * 2014-01-07 2014-04-23 北京奇虎科技有限公司 Method and device for prompting risk information in search engine
CN105306467A (en) * 2015-10-30 2016-02-03 北京奇虎科技有限公司 Method and device for analyzing webpage data tampering

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2169898A1 (en) * 2008-09-25 2010-03-31 Fraunhofer-Gesellschaft zur Förderung der angewandten Forschung e.V. Method of and telecommunication apparatus for mitigating Distributed Denial-of-Service attacks in SIP packet networks
CN103745156A (en) * 2014-01-07 2014-04-23 北京奇虎科技有限公司 Method and device for prompting risk information in search engine
CN105306467A (en) * 2015-10-30 2016-02-03 北京奇虎科技有限公司 Method and device for analyzing webpage data tampering

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
电脑管家哈勃分析系统: "哈勃专家教你破解Petya敲诈木马", 《腾讯哈勃分析系统,HTTPS://HABO.QQ.COM/NEWS/DETAIL/ADEGYQ%3D%3D》 *
电脑管家哈勃分析系统: "敲诈木马锁死电脑 腾信哈勃助用户找回密码", 《腾讯哈勃分析系统,HTTPS://HABO.QQ.COM/NEWS/DETAIL/ADCGZQ%3D%3D》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108319589A (en) * 2018-03-14 2018-07-24 腾讯科技(深圳)有限公司 Parameter string processing method, apparatus, computer readable storage medium and equipment
CN108319589B (en) * 2018-03-14 2021-08-10 腾讯科技(深圳)有限公司 Parameter string processing method, device, computer readable storage medium and equipment
CN113688380A (en) * 2021-10-26 2021-11-23 苏州浪潮智能科技有限公司 Password protection method, device and medium

Also Published As

Publication number Publication date
CN107547610B (en) 2020-02-28

Similar Documents

Publication Publication Date Title
CN104834462A (en) Unlocking method for terminal equipment and terminal equipment
CN106331055B (en) Identifier generating means and method
CN105722059A (en) Mobile terminal and communication method for double-modem system
US11637795B1 (en) Techniques for templated messages
CN101022657B (en) Mobile communication equipment and the method controlled is used to the selectivity of communication path
CN106331767A (en) Data error correcting processing method, terminal, server, and system
CN105718405B (en) The method that the USB interface of mobile terminal and its processor is multiplexed
WO2016123822A1 (en) Data transmission method and device, and terminal
CN103489025A (en) Method and device for sending contact information
CN105682083B (en) A kind of communication means of mobile terminal and duplex MODEM system
CN107547610A (en) A kind of character-information processing method, server and terminal
CN105992201A (en) Data transmission terminal, method and system
CN106452483A (en) Method and apparatus for information interaction
CN101553043B (en) Method for establishing communication from a mobile terminal in dual mode
US20150281212A1 (en) Method for providing confidential data-based login service
CN102652439A (en) Smart card security feature profile in home subscriber server
CN108768965A (en) A kind of education cloud open service application integrating system and method
CN105955832B (en) A kind of method and system communicated with each other between the device screen page and subpage frame
CN101197710A (en) Intelligent terminal and user maintenance method
CN106686527A (en) WIFI information identification method and terminal
CN106909395A (en) A kind of interface call method and terminal
KR100459040B1 (en) Registration Method of Access Number to Mobile Contents by a Combined Mobile User Agent and a Alpha-Numeric Keypad
CN105611067A (en) Mobile terminal and upgrading method thereof
US20190297036A1 (en) Method for establishing communication within a closed network
CN105611068B (en) Mobile terminal and method for upgrading system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant