Unlock instant, AI-driven research and patent intelligence for your innovation.

Password data processing method, apparatus and device

A technology of data processing device and data processing equipment, applied in the direction of digital data authentication, etc., can solve problems such as user property loss, user loss, difficulty in applying business systems, etc., and achieve the effect of reducing crime rate, improving recovery, and reducing the desire for infringement

Active Publication Date: 2017-02-22
ADVANCED NEW TECH CO LTD
View PDF5 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For the password data encrypted and stored, it is usually impossible to compare and verify each password
[0005] To sum up, the processing method for verifying password data in the prior art will often cause relatively large property losses to the user and cause irreparable losses to the user when the user is coerced to hand over the password.
Moreover, in the prior art, the digit-by-digit password comparison verification method can usually only be used for the plaintext storage of passwords in business systems, and is difficult to apply to the financial industry and most business systems that require user authentication, password confidentiality, and encryption.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Password data processing method, apparatus and device
  • Password data processing method, apparatus and device
  • Password data processing method, apparatus and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] In order to enable those skilled in the art to better understand the technical solutions in the present application, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described The embodiments are only some of the embodiments of the present application, but not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the scope of protection of this application.

[0033] In general, users usually need to perform identity verification when conducting business operations involving funds and properties. In most application scenarios, the specific identity verification method can include the server of the business system verifying the received verification password entered by the user on the client. Us...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a password data processing method, apparatus and device. The method can comprise the steps of obtaining input password verification data; calculating the password verification data according to a predetermined encryption algorithm to obtain an encrypted password of the password verification data; querying the encrypted password in stored preset password data, and determining an executive instruction corresponding to the encrypted password according to a query result; and performing corresponding operation according to the executive instruction. By utilizing the method, the apparatus and the device provided by embodiments of the invention, the property loss of a user can be reduced without perception of an illegal user during illegal identity verification, and illegal verification can be processed in time, so that the success rate of recovering the user loss is increased.

Description

technical field [0001] The present application belongs to the field of information data processing, and in particular relates to a cryptographic data processing method, device and equipment. Background technique [0002] When some illegal events such as robbery cases occur, users are often forced to hand over bank cards, passwords, etc. due to the threat of illegal users, causing great property losses to users. [0003] Generally, illegal users, such as robbers, can physically control users. When users often inform illegal users of password information out of coercion, illegal users can steal users' funds and properties through, for example, bank self-service terminal equipment. If the user waits until the user has the ability to call the police, it is very likely that the good opportunity of catching illegal users has been missed at this time, causing the user's property to be transferred or squandered, making it difficult to recover the user's property. [0004] Most serv...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/46
CPCG06F21/46
Inventor 钱剑波
Owner ADVANCED NEW TECH CO LTD