CN113079396A - Service control method, device, terminal equipment and storage medium - Google Patents

Service control method, device, terminal equipment and storage medium Download PDF

Info

Publication number
CN113079396A
CN113079396A CN202110291383.2A CN202110291383A CN113079396A CN 113079396 A CN113079396 A CN 113079396A CN 202110291383 A CN202110291383 A CN 202110291383A CN 113079396 A CN113079396 A CN 113079396A
Authority
CN
China
Prior art keywords
login
role
account
terminal
login account
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110291383.2A
Other languages
Chinese (zh)
Other versions
CN113079396B (en
Inventor
赵海亮
王庆杰
亓娜
王艳辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hainan Shilian Communication Technology Co ltd
Original Assignee
Hainan Shilian Communication Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hainan Shilian Communication Technology Co ltd filed Critical Hainan Shilian Communication Technology Co ltd
Priority to CN202110291383.2A priority Critical patent/CN113079396B/en
Publication of CN113079396A publication Critical patent/CN113079396A/en
Application granted granted Critical
Publication of CN113079396B publication Critical patent/CN113079396B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/258Client or end-user data management, e.g. managing client capabilities, user preferences or demographics, processing of multiple end-users preferences to derive collaborative data
    • H04N21/25808Management of client data
    • H04N21/25816Management of client data involving client authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/14Systems for two-way working
    • H04N7/15Conference systems
    • H04N7/155Conference systems involving storage of or access to video conference sessions

Abstract

The embodiment of the invention provides a service control method, a device, a terminal device and a storage medium, wherein the method comprises the following steps: receiving a login request sent by a video networking terminal, wherein the login request comprises a first login account and a first login password; verifying the first login account and the first login password respectively; if the first login account and the first login password pass the verification, determining a login role corresponding to the first login account and an operation authority corresponding to the login role according to the first login account; and sending a service opening instruction to the video networking terminal so that the video networking terminal executes a service corresponding to the operation authority according to the operation authority, wherein the service opening instruction at least comprises a login role corresponding to the first login account and an operation authority corresponding to the login role, and by logging in the account on the video networking terminal and setting the login role and the operation authority, the video networking service can be controlled, so that video networking resources can be saved, and information leakage can be avoided.

Description

Service control method, device, terminal equipment and storage medium
Technical Field
The present invention relates to the field of video networking technologies, and in particular, to a method and an apparatus for managing and controlling a service, a terminal device, and a storage medium.
Background
At present, when carrying out the video networking service, only need to go up the video networking terminal electricity, then the start just can carry out the service, like this, anyone can all use the video networking terminal, if this video networking terminal is in idle running state always, like this, can cause the video networking wasting of resources, perhaps if information leakage or equipment failure appear again, also can't trace back the user, can't carry out the business management and control to the video networking terminal.
Disclosure of Invention
In view of the above problems, embodiments of the present invention are proposed to provide a traffic management method, apparatus, terminal device and storage medium that overcome or at least partially solve the above problems.
In a first aspect, an embodiment of the present invention provides a method for managing and controlling a service, where the method includes:
receiving a login request sent by a video networking terminal, wherein the login request comprises a first login account and a first login password;
verifying the first login account and the first login password respectively;
if the first login account and the first login password pass the verification, determining a login role corresponding to the first login account and an operation authority corresponding to the login role according to the first login account;
and sending a service opening instruction to a video network terminal so that the video network terminal executes a service corresponding to the operation authority according to the operation authority, wherein the service opening instruction at least comprises a login role corresponding to the first login account and an operation authority corresponding to the login role.
Optionally, after the receiving the login request sent by the terminal of the video networking, the method further includes:
generating a login challenge character string according to the login request;
and sending the login adjustment character string to the video network terminal so that the video network terminal determines a first encryption character string according to the login challenge character string and the first login password.
Optionally, before the receiving the login request sent by the terminal of the video networking, the method further includes:
registering a preset login account;
configuring a preset login password, a first security level, a login role and an operation authority corresponding to the login role for the preset login account, wherein the login password at least comprises one or more of letters, numbers or special characters, and the login role at least comprises a system management role, a security audit role, a conference operation role or a video operation role;
and storing the preset login account, the preset login password, the first security level, the login role and the operation authority corresponding to the login role in a preset database.
Optionally, the respectively verifying the first login account and the first login password includes:
comparing the first login account with a preset login account in a preset database;
under the condition that the first login account passes the verification, acquiring the preset login password corresponding to the first login account from the preset database;
performing hash message authentication code calculation on the preset login password and the login challenge character string to obtain a second encryption character string;
comparing the first encrypted string and the second encrypted string.
Optionally, if the first login account and the first login password pass the verification, determining, according to the first login account, a login role corresponding to the login account and an operation authority corresponding to the login role, including:
if the first login account is the same as the preset login account and the first encryption character string is the same as the second encryption character string, searching a login role corresponding to the first login account and an operation authority corresponding to the login role in a preset database according to the first login account.
Optionally, before the receiving the login request sent by the terminal of the video networking, the method further includes:
and setting a second security level for the video network terminals, and sending the second security level to each video network terminal.
Optionally, the sending the service opening instruction to the video networking terminal includes:
comparing a first security level of the first login account with a second security level of the video networking terminal;
if the first security level is greater than or equal to the second security level, a service opening instruction is sent to the video networking terminal;
and if the first security level is less than the second security level, sending a service opening failure instruction to the video network terminal.
In a second aspect, an embodiment of the present invention provides a service management and control device, where the device includes:
the system comprises a receiving module, a login module and a login module, wherein the receiving module is used for receiving a login request sent by a video networking terminal, and the login request comprises a first login account and a first login password;
the verification module is used for respectively verifying the first login account and the first login password;
the determining module is used for determining a login role corresponding to the first login account and an operation authority corresponding to the login role according to the first login account if the first login account and the first login password pass the verification;
and the opening module is used for sending a service opening instruction to the video network terminal so that the video network terminal executes the service corresponding to the operation authority according to the operation authority, wherein the service opening instruction at least comprises a login role corresponding to the first login account and the operation authority corresponding to the login role.
Optionally, the apparatus further comprises a random generation module, configured to:
generating a login challenge character string according to the login request;
and sending the login adjustment character string to the video network terminal so that the video network terminal determines a first encryption character string according to the login challenge character string and the first login password.
Optionally, the apparatus further comprises a setting module, the setting module is configured to:
registering a preset login account;
configuring a preset login password, a first security level, a login role and an operation authority corresponding to the login role for the preset login account, wherein the login password at least comprises one or more of letters, numbers or special characters, and the login role at least comprises a system management role, a security audit role, a conference operation role or a video operation role;
and storing the preset login account, the preset login password, the first security level, the login role and the operation authority corresponding to the login role in a preset database.
Optionally, the verification module is configured to:
comparing the first login account with a preset login account in a preset database;
under the condition that the first login account passes the verification, acquiring the preset login password corresponding to the first login account from the preset database;
performing hash message authentication code calculation on the preset login password and the login challenge character string to obtain a second encryption character string;
comparing the first encrypted string and the second encrypted string.
Optionally, the determining module is configured to:
if the first login account is the same as the preset login account and the first encryption character string is the same as the second encryption character string, searching a login role corresponding to the first login account and an operation authority corresponding to the login role in a preset database according to the first login account.
Optionally, the setting module is further configured to:
and setting a second security level for the video network terminals, and sending the second security level to each video network terminal.
Optionally, the opening module is configured to:
comparing a first security level of the first login account with a second security level of the video networking terminal;
if the first security level is greater than or equal to the second security level, a service opening instruction is sent to the video networking terminal;
and if the first security level is less than the second security level, sending a service opening failure instruction to the video network terminal.
In a third aspect, an embodiment of the present invention provides a terminal device, including: at least one processor and memory;
the memory stores a computer program; the at least one processor executes the computer program stored in the memory to implement the traffic control method provided in the first aspect.
In a fourth aspect, an embodiment of the present invention provides a computer-readable storage medium, where a computer program is stored, and when the computer program is executed, the service management and control method provided in the first aspect is implemented.
According to the technical scheme provided by the embodiment of the invention, the login request sent by the video network terminal is received, wherein the login request comprises a first login account and a first login password; verifying the first login account and the first login password respectively; if the first login account and the first login password pass the verification, determining a login role corresponding to the first login account and an operation authority corresponding to the login role according to the first login account; and sending a service opening instruction to the video networking terminal so that the video networking terminal executes a service corresponding to the operation authority according to the operation authority, wherein the service opening instruction at least comprises a login role corresponding to the first login account and an operation authority corresponding to the login role, and by logging in the account on the video networking terminal and setting the login role and the operation authority, the video networking service can be controlled, so that video networking resources can be saved, and information leakage can be avoided.
Drawings
Fig. 1 is a flowchart illustrating steps of an embodiment of a method for managing and controlling services according to the present invention;
FIG. 2 is a flow chart of steps of another embodiment of a method for managing and controlling services according to the present invention;
FIG. 3 is a schematic structural diagram of an embodiment of a service management and control system according to the present invention;
fig. 4 is a block diagram of a service management and control apparatus according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of a terminal device of the present invention.
Detailed Description
In order to make the aforementioned objects, features and advantages of the present invention comprehensible, embodiments accompanied with figures are described in further detail below.
The nouns are explained as follows:
and (3) video networking: the entity network with a tree structure is formed by dividing regions, which is different from the existing Internet, the whole network does not use the traditional Internet IP technology, and the Beijing vision linkage force has completely independent intellectual property rights on the entity network. The central server of the video networking is deployed in Beijing, provincial servers are deployed in each province of the country, and urban servers are deployed in the grade city of each province and are already deployed to the grade of the village and the town at present.
The autonomous cloud is a basic substructure in a video networking network structure and is also a minimum structural unit for enabling the video networking to normally operate. Under the condition that the configuration is correct, one autonomous cloud can independently realize all functions of the video network in the autonomous cloud. Therefore, when the autonomous cloud cannot be connected with the upper and lower autonomous clouds due to communication faults, the video networking service can still be realized in the autonomous cloud. When the autonomous clouds can normally communicate with the autonomous clouds on the upper and lower layers, the autonomous clouds form a larger range of video networking, and the video networking service crossing the autonomous clouds can be realized.
The autonomous server: the system is also called a video network master control server, is a management core of the autonomous cloud, and each autonomous cloud means at least one autonomous server. The realized functions mainly comprise management and registration of equipment in the autonomous cloud, realization of video networking service logic inside the autonomous cloud and among the autonomous clouds, communication with a management network of the video networking so as to realize higher-level management and the like.
A sub-control server: a video network controller integrates video network audio and video forwarding, set top box control, registration and other functions, and is installed in a box type and portable in a hand-held mode.
The video network terminal: the video network service landing equipment, the actual participants or service persons of the video network service, include various conference set-top boxes, video telephone set-top boxes, operation teaching set-top boxes, streaming media gateways, storage gateways, media synthesizers, and the like. The terminal of the video network needs to be registered on the video network server to carry out normal service. An internet-of-view number is required.
The network management server: the core equipment on the video network controls the operations of opening and registering the services of the video network sub-control server by controlling the autonomous server, is the management brain of the video network, and provides a UI interface for the client to call.
Setting signaling: one of the two-way interactive commands, the signaling recipient, receives the signaling and then generally performs a "Set" action to change its own information. For example, after registering a device signaling, the main control server receives the signaling, analyzes information parameters in the signaling, writes the information parameters into a local file system and a memory, and returns operation result values (usually, whether two result values are used) to the signaling for sending.
And inquiring signaling: one of the two-way interactive commands, the signaling recipient, receives the signaling and then generally performs a "Get" action without changing its own information. For example, after inquiring the device signaling and the master control server receives the signaling, the device information stored in the file system is coded into the signaling parameters in a certain format, and the result is returned to the signaling sender.
Referring to fig. 1, a flowchart illustrating steps of an embodiment of a method for managing and controlling a service of the present invention is shown, where the method may specifically include the following steps:
s101, receiving a login request sent by a video network terminal, wherein the login request comprises a first login account and a first login password;
specifically, a startup login interface is added on the video network terminal, and an account input box and a password input box are arranged on the startup login interface. The video network terminal automatically enters a startup login interface after being started, so that a user can input a first login account and a first login password on the startup login interface, the video network terminal needs login verification and sends a login request to a network management server, and the login request comprises the first login account and the first login password. If the video network terminal does not play the picture effectively or does not have manual operation action within a preset time period, such as 3 minutes, after the video network terminal is started, the video network terminal automatically locks the screen, and the user needs to input the password again to unlock the screen after the screen is locked.
S102, verifying the first login account and the first login password respectively;
specifically, the network management server respectively verifies a first login account and a first login password, firstly judges whether the first login account exists in a preset database, and if the first login account exists, verifies the first login password.
S103, if the first login account and the first login password pass the verification, determining a login role corresponding to the first login account and an operation authority corresponding to the login role according to the first login account;
specifically, after verifying a first login account and a first login password, respectively, the network management server searches for the first login account in a preset database, verifies the first login password corresponding to the first login account, and if the first login password also passes the verification, searches for a login role corresponding to the first login account and an operation authority corresponding to the login role in the preset database, where the login role at least includes: system management, security audit, conference operation or video operation, wherein each login role corresponds to respective operation authority, or a terminal capable of performing data transmission is set for different login accounts, for example, for the system management role, the corresponding operation authority comprises login, locking, password modification, user management and equipment upgrade; for the security audit role, the corresponding operation authority comprises login, locking, password modification and running log viewing; or the first login account can log in the video networking terminal A, and the video networking terminal A can only perform service with the video networking terminal B, but cannot perform service with the video networking terminal C.
And S104, sending a service opening instruction to the video network terminal so that the video network terminal executes a service corresponding to the operation authority according to the operation authority, wherein the service opening instruction at least comprises a login role corresponding to the first login account and the operation authority corresponding to the login role.
Specifically, after determining a login role corresponding to a first login account and an operation authority corresponding to the login role, the network management server sends a service opening instruction to the video network terminal, wherein the service opening instruction comprises the login role corresponding to the first login account and the operation authority corresponding to the login role, and thus, the video network terminal executes a corresponding service according to the operation authority.
Exemplarily, if the first login account is a security audit role, after the account logs in the video networking terminal a, the account may have operation permissions including login, locking, password modification and running log viewing, that is, the network management server sends a service opening instruction to the video networking terminal a, where the instruction includes the running log viewing and the number of the video networking terminal B from which the running log is viewed, so that the video networking terminal a can view the running log on the video networking terminal B.
Exemplarily, if the video networking terminal a can perform a video telephony service with the video networking terminal B, but cannot perform the video telephony service with the video networking terminal C, in this case, the network management server sends a service opening instruction to the video networking terminal a, where the service opening instruction includes a video networking number and a service type of the video networking terminal B.
According to the service control method provided by the embodiment of the invention, a login request sent by a video network terminal is received, wherein the login request comprises a first login account and a first login password; verifying the first login account and the first login password respectively; if the first login account and the first login password pass the verification, determining a login role corresponding to the first login account and an operation authority corresponding to the login role according to the first login account; and sending a service opening instruction to the video networking terminal so that the video networking terminal executes a service corresponding to the operation authority according to the operation authority, wherein the service opening instruction at least comprises a login role corresponding to the first login account and an operation authority corresponding to the login role, and by logging in the account on the video networking terminal and setting the login role and the operation authority, the video networking service can be controlled, so that video networking resources can be saved, and information leakage can be avoided.
The present invention further provides a supplementary description on the service management and control method provided in the foregoing embodiment.
As shown in fig. 2, a flowchart of steps of another embodiment of a service management and control method according to the present invention is shown, where the service management and control method includes:
s201, registering a preset login account;
specifically, the user may create a preset login account on the network management server, where the preset login account is a user name, and the user name includes one or more of letters, numbers, underlines, short horizontal lines, and the like, and after the creation is successful, the preset login account is stored in a preset database of the network management server.
S202, configuring a preset login password, a first security level, a login role and an operation authority corresponding to the login role corresponding to the preset login account for the preset login account, wherein the login password at least comprises one or more of letters, numbers or special characters, and the login role at least comprises a system management role, a security audit role, a conference operation role or a video operation role;
specifically, a user sets a preset login password for each preset login account on the network management server, wherein the preset login password is at least 8 bits and contains letters, numbers and special characters, and the preset login account and the preset login password corresponding to the preset login account are stored in a preset database of the network management server. The preset login password is calculated by using a Hash-based Message Authentication Code (HMAC), and then stored. The preset login password is encrypted by adopting the HMAC, and is not stored in plain code, so that the password security is ensured.
In addition, a security level, namely a first security level, is set for each preset login account, wherein the first security level can be divided into normal, secret and secret, and can be set according to different requirements.
Further, the login roles at least include a system management role, a security audit role, a conference operation role or a video operation role, various operation permissions can be set on the network management server, each login role also has a respective corresponding operation permission, the login roles can be customized according to actual needs, the operation permissions corresponding to the login roles can be added or deleted according to actual needs, and the specific operation permissions are as follows:
the network management server creates some operation authorities:
authority ID Authority name Remarks for note
0x00010001 Login to Login system
0x00010002 Locking in Timeout locking
0x00010003 Modifying passwords
0x00010004 Viewing running logs
0x00010005 User management
0x00020001 Dialing video telephone
0x00020002 Answering video telephone
0x00020003 Initiating a conference
0x00020004 Participating in a conference
0x00020005 Publishing live broadcast
0x00020006 Watching live broadcast
0x00020007 Viewing on demand
0x00020008 Device upgrade
The operation authority owned by the "system management" role is as follows:
authority ID Authority name
0x00010001 Login to
0x00010002 Locking in
0x00010003 Modifying passwords
0x00010005 User management
0x00020008 Device upgrade
The operation authority owned by the role "security audit" is as follows:
authority ID Authority name
0x00010001 Login to
0x00010002 Locking in
0x00010003 Modifying passwords
0x00010004 Viewing running logs
The operation authority owned by the role "conference operation" is as follows:
authority ID Authority name
0x00010001 Login to
0x00010002 Locking in
0x00010003 Modifying passwords
0x00020003 Initiating a conference
0x00020004 Participating in a conference
The operation authority owned by the role "video operation" is as follows:
authority ID Authority name
0x00010001 Login to
0x00010002 Locking in
0x00010003 Modifying passwords
0x00020001 Dialing video telephone
0x00020002 Answering video telephone
0x00020007 Viewing on demand
0x00020005 Publishing live broadcast
0x00020006 Watching live broadcast
S203, storing the preset login account, the preset login password, the first security level, the login role and the operation authority corresponding to the login role in a preset database.
Specifically, a user can add, delete or query a preset login account in a database through a network management server; the network management server can also modify the preset login password of each video network terminal.
And S204, setting a second security level for the video network terminals, and sending the second security level to each video network terminal.
Specifically, the user performs a second security level on the network management server for each piece of video networking terminal equipment. Each preset login account also has a first security level, the high-level account can log in the low-level terminal, and the low-level account is not authorized to log in the high-level terminal.
S205, receiving a login request sent by a video network terminal, wherein the login request comprises a first login account and a first login password;
specifically, since step S205 is the same as step S101 in the embodiment shown in fig. 1. Step S101 has already been described in detail in fig. 1, and therefore step S205 is not described again here.
S206, generating a login challenge character string according to the login request; and sending the login adjustment character string to the video network terminal so that the video network terminal determines a first encryption character string according to the login challenge character string and the first login password.
Specifically, after receiving a "login request signaling" sent by a video network terminal, a network management server generates a login challenge character string, wherein the login challenge character string is a 32-bit random character string, and sends the login challenge character string to the video network terminal through a management transparent transmission signaling, and the network management server stores the login challenge character string in a database.
In the embodiment of the invention, the network management server generates a login challenge character string at any time after receiving the login request every time, namely the login challenge character string is changed randomly, and the confidentiality is higher;
the video network terminal performs Hash message authentication code calculation on the first login password and the login challenge character string, namely HMAC calculation, to obtain a first encryption character string, namely the video network terminal receives a random character string of 32 bytes in the login challenge, and performs HMAC calculation on the first login password input by the user and the random character string to obtain the first encryption character string, so that legal login of the login account can be ensured.
S207, verifying the first login account and the first login password respectively;
specifically, the step S207 specifically includes:
step 2071: comparing the first login account with a preset login account in a preset database;
step 2072: under the condition that the first login account passes the verification, acquiring a preset login password corresponding to the first login account from a preset database;
specifically, if the first login account is the same as the preset login account, it is determined that the first login account passes the verification, and further, the first login password is verified.
Specifically, the terminal of the video network splices a first login password input by a user and a login challenge character string of 32 bytes together, calculates an HMAC to obtain a first encryption character string, and sends the first encryption character string and the first login account to the network management server together.
The HMAC adopts SM3 algorithm to calculate, the password is encrypted in the transmission process, and the password in the login packet is different after being encrypted due to the existence of the random character string during each login, so that the difficulty in interception and decryption is greatly increased.
Step 2073: performing hash message authentication code calculation on the preset login password and the login challenge character string to obtain a second encryption character string;
specifically, the network management server obtains a preset login password corresponding to the first login account from a preset database, then splices the preset login password and the login challenge character string, and performs HMAC calculation to obtain a second encryption character string.
Step 2074: the first encrypted string and the second encrypted string are compared.
And S208, if the first login account is the same as the preset login account and the first encryption character string is the same as the second encryption character string, searching a login role corresponding to the first login account and an operation authority corresponding to the login role in a preset database according to the first login account.
Specifically, if the first login account is the same as the preset login account and the first encryption character string is the same as the second encryption character string, it is indicated that the login account passes the verification, and at this time, the network management server searches the login role corresponding to the first login account and the operation authority corresponding to the login role in a preset database according to the first login account.
Illustratively, after receiving a login request sent by a video networking terminal, a network management server:
a. verifying login account
Judging whether a login account exists or not; whether the login account number has a terminal login role or not; whether the 'authority range' of the login account number owns the terminal or not is judged; whether the login account is locked or not; b, checking and passing, and executing the step b; if the verification fails, the login is refused, and error information is sent to the terminal to indicate a specific error code.
b. Verifying login password
The network manager uses the 32-bit random string recorded in the step of network manager login challenge to query the database according to the login account name, obtains the password stored in the database in the first step, splices the password with the 32-byte random string together, and calculates the HMAC again:
after calculation, comparing character strings with the password sent by the terminal, if the character strings are consistent, allowing login, sending a login success signaling to the terminal, after the terminal receives the login success signaling, unlocking an interface, and operating the user to use the video networking resources; if the difference is not consistent, login is not allowed, error information is sent to the terminal, a specific error code is indicated, the man-machine interaction interface of the terminal is locked continuously, and the video network resources cannot be used.
Meanwhile, the network management server records a login log, wherein the login log comprises a login account, a login terminal, login time and login states (success and failure).
In the specific implementation process, the network management server allows the video network terminal to log in for 3 times of attempts.
The video network terminal fails to log in because of the failure of checking the login account number, does not limit the login times, and can retry all the time.
The video network terminal fails to log in due to failure of 'checking a login password', 3 attempts are allowed, an account is locked for more than 3 times, the account cannot log in, and the locking time is 2 hours. However, the account can log in other terminals with login authority because each terminal has its own login password.
S209, sending a service opening instruction to the video network terminal so that the video network terminal executes a service corresponding to the operation authority according to the operation authority, wherein the service opening instruction at least comprises a login role corresponding to the first login account and the operation authority corresponding to the login role.
The method specifically comprises the following steps:
a1, comparing the first security level of the first login account with the second security level of the video network terminal;
a2, if the first security level is greater than or equal to the second security level, sending a service opening instruction to the video network terminal;
and A3, if the first security level is less than the second security level, sending a service opening failure instruction to the video network terminal.
Specifically, because the high-level account can log in the low-level terminal, the low-level account does not have the right to log in the high-level terminal, the network management server judges the first security level and the second security level, if the first security level is greater than or equal to the second security level, a service opening instruction is sent to the video networking terminal, at this time, the first login account with the first security level can log in on the video networking terminal, and after the first login account logs in successfully, the network management server issues account authority to the video networking terminal: those video networking services (videophone, publishing live broadcast, watching live broadcast, participating in video conference, video networking contact list) can be used; who can do video networking services (and who can watch video telephone and watch live broadcast and take part in a conference initiated by the terminal as a chairman).
And if the first security level is less than the second security level, sending a service opening failure instruction to the video network terminal, and at this time, the video network terminal cannot log in the first login account.
After the user uses the video network terminal resources, the video network terminal can select to log out and quit; the video network terminal is automatically logged out without operation for 3 minutes. And after logging out, locking the screen of the man-machine interaction interface of the video network terminal.
Meanwhile, the video network terminal sends a 'reporting logout' signaling to the network management server, wherein the reporting logout signaling comprises the first login account. After receiving the logout signaling, the network management server does not need to reply.
The network management server records a log of logout, wherein the log of logout comprises a login account, a login terminal, a login time and a login state (success).
Fig. 3 is a schematic structural diagram of an embodiment of the service management and control system of the present invention, and as shown in fig. 3, when the video network terminal performs service management and control, the video network terminal adopts a login means to perform management and control, and a management transparent transmission protocol is adopted to implement the management and control. The network domain formed by the autonomous server (network card 2), the sub-control server and the video network terminal is called a video networking domain, and the domain is a core domain of the video network and isolates the traditional TCP/IP protocol. A network domain formed by the network management server and the autonomous server (network card 1) is called as a management domain. The network management software management signaling enters the autonomous server, is forwarded in the video networking domain through the management transparent transmission protocol of the autonomous server, and reaches the related video networking terminal.
In an exemplary manner, the first and second electrodes are,
1. the user authority range of the login account can be set as follows:
from the login account perspective: the network management server sets a login account, and allocates the login account to a login-capable operation terminal such as an admin _1 account, which can log in terminals A and C, and an admin _2 account, which can log in terminal B.
2. Device authority range:
angle of the video networking terminal: the video network terminal can execute the service of which service type with which video network terminal.
2.1 conference services
For example, the terminal a initiates a conference service:
Figure BDA0002982811540000161
the terminal B initiates a conference service:
Figure BDA0002982811540000162
c, the terminal initiates a conference service:
Figure BDA0002982811540000163
from the above, it is known that the terminal a initiates a conference, and the terminal B and the terminal C can participate in the conference. And the terminal A can enter the meeting in the meeting initiated by the terminal B. And C, the terminal A can enter the meeting.
The admin _1 can log in the terminal A, the terminal B and the terminal C; after the admin _1 user successfully logs in the terminal A, a conference can be initiated, and the terminal B and the terminal C can participate in the conference.
admin _1 logs in the terminal B, can initiate the conference, the terminal A can participate, the terminal C can not participate.
The admin _1 logs in the terminal C, can initiate the conference, the terminal A can participate, the terminal B can not participate.
2.2 videophone service
For example, the terminal a initiates a videophone service:
A B
for example, the terminal B initiates a videophone service:
B A
thus, the a terminal and the B terminal can only make video telephone with each other. The video telephone can not be carried between the terminal A and the terminal C, and between the terminal B and the terminal C.
In the embodiment of the invention, the video network terminal is additionally provided with the login interface and the locking interface to ensure that the terminal can be used truthfully, and the reasonable utilization of video network resources can be protected due to the addition of the terminal login function; for the video networking terminal service, the four factors of 'account number', 'role', 'authority range' and 'password' are adopted for comprehensive verification, so that the login safety is ensured, and the terminal service is ensured to be controllable; the terminal logs in, the password adopts cipher text to store, and adopt the random number to log in the challenge way, guarantee the password is relatively safe in the signalling transmission process, increase and decipher the difficulty; and recording a log of logging in and logging out of the terminal, counting and tracking the use frequency of the terminal, and ensuring the reasonable utilization of video networking resources. Each terminal has a login password, so that the login passwords are not interfered with each other, and the difficulty of retrying and deciphering is increased.
According to the service control method provided by the embodiment of the invention, a login request sent by a video network terminal is received, wherein the login request comprises a first login account and a first login password; verifying the first login account and the first login password respectively; if the first login account and the first login password pass the verification, determining a login role corresponding to the first login account and an operation authority corresponding to the login role according to the first login account; and sending a service opening instruction to the video networking terminal so that the video networking terminal executes a service corresponding to the operation authority according to the operation authority, wherein the service opening instruction at least comprises a login role corresponding to the first login account and an operation authority corresponding to the login role, and by logging in the account on the video networking terminal and setting the login role and the operation authority, the video networking service can be controlled, so that video networking resources can be saved, and information leakage can be avoided.
Another embodiment of the present invention provides a service management and control apparatus, configured to execute the service management and control method provided in the foregoing embodiment.
Referring to fig. 4, a block diagram of a service management and control apparatus according to an embodiment of the present invention is shown, including:
the receiving module 401 is configured to receive a login request sent by a video networking terminal, where the login request includes a first login account and a first login password;
the verification module 402 is configured to verify the first login account and the first login password respectively;
the determining module 403 is configured to determine, according to the first login account, a login role corresponding to the first login account and an operation authority corresponding to the login role if the first login account and the first login password pass authentication;
the opening module 404 is configured to send a service opening instruction to the video network terminal, so that the video network terminal executes a service corresponding to the operation authority according to the operation authority, where the service opening instruction at least includes a login role corresponding to the first login account and an operation authority corresponding to the login role.
The service control device provided by the embodiment of the invention receives a login request sent by a video network terminal, wherein the login request comprises a first login account and a first login password; verifying the first login account and the first login password respectively; if the first login account and the first login password pass the verification, determining a login role corresponding to the first login account and an operation authority corresponding to the login role according to the first login account; and sending a service opening instruction to the video networking terminal so that the video networking terminal executes a service corresponding to the operation authority according to the operation authority, wherein the service opening instruction at least comprises a login role corresponding to the first login account and an operation authority corresponding to the login role, and by logging in the account on the video networking terminal and setting the login role and the operation authority, the video networking service can be controlled, so that video networking resources can be saved, and information leakage can be avoided.
The present invention further provides a supplementary description for the service management and control apparatus provided in the foregoing embodiment.
Optionally, the apparatus further includes a random generation module, configured to:
generating a login challenge character string according to the login request;
and sending the login adjustment character string to the video network terminal so that the video network terminal determines a first encryption character string according to the login challenge character string and the first login password.
Optionally, the apparatus further comprises a setting module, the setting module is configured to:
registering a preset login account;
configuring a preset login password, a first security level, a login role and an operation authority corresponding to the login role corresponding to the preset login account for the preset login account, wherein the login password at least comprises one or more of letters, numbers or special characters, and the login role at least comprises a system management role, a security audit role, a conference operation role or a video operation role;
and storing the preset login account, the preset login password, the first security level, the login role and the operation authority corresponding to the login role in a preset database.
Optionally, the verification module is to:
comparing the first login account with a preset login account in a preset database;
under the condition that the first login account passes the verification, acquiring a preset login password corresponding to the first login account from a preset database;
performing hash message authentication code calculation on the preset login password and the login challenge character string to obtain a second encryption character string;
the first encrypted string and the second encrypted string are compared.
Optionally, the determining module is configured to:
and if the first login account is the same as the preset login account and the first encryption character string is the same as the second encryption character string, searching a login role corresponding to the first login account and an operation authority corresponding to the login role in a preset database according to the first login account.
Optionally, the setting module is further configured to:
and setting a second security level for the video network terminals, and sending the second security level to each video network terminal.
Optionally, the opening module is configured to:
comparing the first security level of the first login account with the second security level of the video networking terminal;
if the first security level is greater than or equal to the second security level, a service opening instruction is sent to the video networking terminal;
and if the first security level is less than the second security level, sending a service opening failure instruction to the video networking terminal.
It should be noted that the respective implementable modes in the present embodiment may be implemented individually, or may be implemented in combination in any combination without conflict, and the present application is not limited thereto.
For the device embodiment, since it is basically similar to the method embodiment, the description is simple, and for the relevant points, refer to the partial description of the method embodiment.
The service control device provided by the embodiment of the invention receives a login request sent by a video network terminal, wherein the login request comprises a first login account and a first login password; verifying the first login account and the first login password respectively; if the first login account and the first login password pass the verification, determining a login role corresponding to the first login account and an operation authority corresponding to the login role according to the first login account; and sending a service opening instruction to the video networking terminal so that the video networking terminal executes a service corresponding to the operation authority according to the operation authority, wherein the service opening instruction at least comprises a login role corresponding to the first login account and an operation authority corresponding to the login role, and by logging in the account on the video networking terminal and setting the login role and the operation authority, the video networking service can be controlled, so that video networking resources can be saved, and information leakage can be avoided.
Another embodiment of the present invention provides a terminal device, configured to execute the service management and control method provided in the foregoing embodiment.
Fig. 5 is a schematic structural diagram of a terminal device of the present invention, and as shown in fig. 5, the electronic device includes: at least one processor 501 and memory 502;
the memory stores a computer program; the at least one processor executes the computer program stored in the memory to implement the service management and control method provided by the above embodiments.
The terminal device provided by the embodiment receives a login request sent by a video network terminal, wherein the login request comprises a first login account and a first login password; verifying the first login account and the first login password respectively; if the first login account and the first login password pass the verification, determining a login role corresponding to the first login account and an operation authority corresponding to the login role according to the first login account; and sending a service opening instruction to the video networking terminal so that the video networking terminal executes a service corresponding to the operation authority according to the operation authority, wherein the service opening instruction at least comprises a login role corresponding to the first login account and an operation authority corresponding to the login role, and by logging in the account on the video networking terminal and setting the login role and the operation authority, the video networking service can be controlled, so that video networking resources can be saved, and information leakage can be avoided.
Yet another embodiment of the present application provides a computer-readable storage medium, in which a computer program is stored, and when the computer program is executed, the method for managing and controlling services provided in any of the above embodiments is implemented.
According to the computer-readable storage medium of the embodiment, a login request sent by a video network terminal is received, wherein the login request comprises a first login account and a first login password; verifying the first login account and the first login password respectively; if the first login account and the first login password pass the verification, determining a login role corresponding to the first login account and an operation authority corresponding to the login role according to the first login account; and sending a service opening instruction to the video networking terminal so that the video networking terminal executes a service corresponding to the operation authority according to the operation authority, wherein the service opening instruction at least comprises a login role corresponding to the first login account and an operation authority corresponding to the login role, and by logging in the account on the video networking terminal and setting the login role and the operation authority, the video networking service can be controlled, so that video networking resources can be saved, and information leakage can be avoided.
The embodiments in the present specification are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, apparatus, or computer program product. Accordingly, embodiments of the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, embodiments of the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
Embodiments of the present invention are described with reference to flowchart illustrations and/or block diagrams of methods, terminal devices (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing terminal to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing terminal, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing terminal to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing terminal to cause a series of operational steps to be performed on the computer or other programmable terminal to produce a computer implemented process such that the instructions which execute on the computer or other programmable terminal provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present invention have been described, additional variations and modifications of these embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all such alterations and modifications as fall within the scope of the embodiments of the invention.
Finally, it should also be noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or terminal that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or terminal. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or terminal that comprises the element.
The service management and control method and the service management and control device provided by the present invention are introduced in detail, and a specific example is applied in the text to explain the principle and the implementation of the present invention, and the description of the above embodiment is only used to help understanding the method and the core idea of the present invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.

Claims (10)

1. A method for managing and controlling services, the method comprising:
receiving a login request sent by a video networking terminal, wherein the login request comprises a first login account and a first login password;
verifying the first login account and the first login password respectively;
if the first login account and the first login password pass the verification, determining a login role corresponding to the first login account and an operation authority corresponding to the login role according to the first login account;
and sending a service opening instruction to a video network terminal so that the video network terminal executes a service corresponding to the operation authority according to the operation authority, wherein the service opening instruction at least comprises a login role corresponding to the first login account and an operation authority corresponding to the login role.
2. The method according to claim 1, wherein after the receiving the login request sent by the video networking terminal, the method further comprises:
generating a login challenge character string according to the login request;
and sending the login adjustment character string to the video network terminal so that the video network terminal determines a first encryption character string according to the login challenge character string and the first login password.
3. The method according to claim 2, wherein before said receiving the login request sent by the video networking terminal, the method further comprises:
registering a preset login account;
configuring a preset login password, a first security level, a login role and an operation authority corresponding to the login role for the preset login account, wherein the login password at least comprises one or more of letters, numbers or special characters, and the login role at least comprises a system management role, a security audit role, a conference operation role or a video operation role;
and storing the preset login account, the preset login password, the first security level, the login role and the operation authority corresponding to the login role in a preset database.
4. The method of claim 3, wherein the separately authenticating the first login account number and the first login password comprises:
comparing the first login account with a preset login account in a preset database;
under the condition that the first login account passes the verification, acquiring the preset login password corresponding to the first login account from the preset database;
performing hash message authentication code calculation on the preset login password and the login challenge character string to obtain a second encryption character string;
comparing the first encrypted string and the second encrypted string.
5. The method according to claim 4, wherein determining, if the first login account and the first login password are verified, a login role corresponding to the login account and an operation authority corresponding to the login role according to the first login account comprises:
if the first login account is the same as the preset login account and the first encryption character string is the same as the second encryption character string, searching a login role corresponding to the first login account and an operation authority corresponding to the login role in a preset database according to the first login account.
6. The method according to claim 1, wherein before said receiving the login request sent by the video networking terminal, the method further comprises:
and setting a second security level for the video network terminals, and sending the second security level to each video network terminal.
7. The method according to claim 6, wherein the sending the service opening instruction to the terminal of the video network comprises:
comparing a first security level of the first login account with a second security level of the video networking terminal;
if the first security level is greater than or equal to the second security level, a service opening instruction is sent to the video networking terminal;
and if the first security level is less than the second security level, sending a service opening failure instruction to the video network terminal.
8. A traffic management and control apparatus, comprising:
the system comprises a receiving module, a login module and a login module, wherein the receiving module is used for receiving a login request sent by a video networking terminal, and the login request comprises a first login account and a first login password;
the verification module is used for respectively verifying the first login account and the first login password;
the determining module is used for determining a login role corresponding to the first login account and an operation authority corresponding to the login role according to the first login account if the first login account and the first login password pass the verification;
and the opening module is used for sending a service opening instruction to the video network terminal so that the video network terminal executes the service corresponding to the operation authority according to the operation authority, wherein the service opening instruction at least comprises a login role corresponding to the first login account and the operation authority corresponding to the login role.
9. A terminal device, comprising: at least one processor and memory;
the memory stores a computer program; the at least one processor executes the memory-stored computer program to implement the traffic policing method of any of claims 1-7.
10. A computer-readable storage medium, wherein a computer program is stored in the computer-readable storage medium, and when executed, the computer program implements the traffic management method according to any one of claims 1 to 7.
CN202110291383.2A 2021-03-18 2021-03-18 Service management and control method and device, terminal equipment and storage medium Active CN113079396B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110291383.2A CN113079396B (en) 2021-03-18 2021-03-18 Service management and control method and device, terminal equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110291383.2A CN113079396B (en) 2021-03-18 2021-03-18 Service management and control method and device, terminal equipment and storage medium

Publications (2)

Publication Number Publication Date
CN113079396A true CN113079396A (en) 2021-07-06
CN113079396B CN113079396B (en) 2024-03-29

Family

ID=76613009

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110291383.2A Active CN113079396B (en) 2021-03-18 2021-03-18 Service management and control method and device, terminal equipment and storage medium

Country Status (1)

Country Link
CN (1) CN113079396B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113556400A (en) * 2021-07-21 2021-10-26 杭州华橙软件技术有限公司 Login method and login device of Internet of things platform and Internet of things system
CN114172713A (en) * 2021-12-02 2022-03-11 北京金山云网络技术有限公司 Login method, login device, electronic equipment and storage medium
CN114499859A (en) * 2022-03-22 2022-05-13 深圳壹账通智能科技有限公司 Password verification method, device, equipment and storage medium

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103001803A (en) * 2012-12-10 2013-03-27 上海斐讯数据通信技术有限公司 Method and system for achieving right management in network management
US20130232337A1 (en) * 2012-03-02 2013-09-05 Electronics And Telecommunications Research Institute User terminal and method for playing digital rights management content
CN104052616A (en) * 2013-03-15 2014-09-17 深圳市腾讯计算机系统有限公司 Method and system for managing services in Internet data center
CN104601532A (en) * 2013-10-31 2015-05-06 腾讯科技(深圳)有限公司 Method and device for logging in account
CN105162757A (en) * 2015-07-03 2015-12-16 成都怡云科技有限公司 External network log-in method for multi-authentication government virtual office platform
CN105577662A (en) * 2015-12-22 2016-05-11 深圳前海微众银行股份有限公司 Terminal environmental security control method and server
CN106973060A (en) * 2017-04-21 2017-07-21 宁波公众信息产业有限公司 A kind of video monitoring system
KR20170119052A (en) * 2016-04-18 2017-10-26 이니텍(주) Method for Interworking Various Security Technologies in Environment of Internet of Things
CN110730367A (en) * 2018-07-17 2020-01-24 中兴通讯股份有限公司 Video playing limiting method, device, system and storage medium
CN111107060A (en) * 2019-11-29 2020-05-05 视联动力信息技术股份有限公司 Login request processing method, server, electronic equipment and storage medium
CN111314745A (en) * 2020-01-17 2020-06-19 视联动力信息技术股份有限公司 Video network user management method and device
CN111416997A (en) * 2020-03-31 2020-07-14 百度在线网络技术(北京)有限公司 Video playing method and device, electronic equipment and storage medium
CN111464493A (en) * 2020-02-25 2020-07-28 视联动力信息技术股份有限公司 Method and device for managing user permission of video network
CN111507594A (en) * 2020-04-08 2020-08-07 微民保险代理有限公司 Data processing method and equipment
CN112153426A (en) * 2020-09-21 2020-12-29 腾讯科技(深圳)有限公司 Content account management method and device, computer equipment and storage medium

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130232337A1 (en) * 2012-03-02 2013-09-05 Electronics And Telecommunications Research Institute User terminal and method for playing digital rights management content
CN103001803A (en) * 2012-12-10 2013-03-27 上海斐讯数据通信技术有限公司 Method and system for achieving right management in network management
CN104052616A (en) * 2013-03-15 2014-09-17 深圳市腾讯计算机系统有限公司 Method and system for managing services in Internet data center
CN104601532A (en) * 2013-10-31 2015-05-06 腾讯科技(深圳)有限公司 Method and device for logging in account
CN105162757A (en) * 2015-07-03 2015-12-16 成都怡云科技有限公司 External network log-in method for multi-authentication government virtual office platform
CN105577662A (en) * 2015-12-22 2016-05-11 深圳前海微众银行股份有限公司 Terminal environmental security control method and server
KR20170119052A (en) * 2016-04-18 2017-10-26 이니텍(주) Method for Interworking Various Security Technologies in Environment of Internet of Things
CN106973060A (en) * 2017-04-21 2017-07-21 宁波公众信息产业有限公司 A kind of video monitoring system
CN110730367A (en) * 2018-07-17 2020-01-24 中兴通讯股份有限公司 Video playing limiting method, device, system and storage medium
CN111107060A (en) * 2019-11-29 2020-05-05 视联动力信息技术股份有限公司 Login request processing method, server, electronic equipment and storage medium
CN111314745A (en) * 2020-01-17 2020-06-19 视联动力信息技术股份有限公司 Video network user management method and device
CN111464493A (en) * 2020-02-25 2020-07-28 视联动力信息技术股份有限公司 Method and device for managing user permission of video network
CN111416997A (en) * 2020-03-31 2020-07-14 百度在线网络技术(北京)有限公司 Video playing method and device, electronic equipment and storage medium
CN111507594A (en) * 2020-04-08 2020-08-07 微民保险代理有限公司 Data processing method and equipment
CN112153426A (en) * 2020-09-21 2020-12-29 腾讯科技(深圳)有限公司 Content account management method and device, computer equipment and storage medium

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113556400A (en) * 2021-07-21 2021-10-26 杭州华橙软件技术有限公司 Login method and login device of Internet of things platform and Internet of things system
CN113556400B (en) * 2021-07-21 2023-09-26 杭州华橙软件技术有限公司 Login method and login device of Internet of things platform and Internet of things system
CN114172713A (en) * 2021-12-02 2022-03-11 北京金山云网络技术有限公司 Login method, login device, electronic equipment and storage medium
CN114499859A (en) * 2022-03-22 2022-05-13 深圳壹账通智能科技有限公司 Password verification method, device, equipment and storage medium

Also Published As

Publication number Publication date
CN113079396B (en) 2024-03-29

Similar Documents

Publication Publication Date Title
CN110032865B (en) Authority management method, device and storage medium
US11336631B2 (en) Authorization method
CN113079396B (en) Service management and control method and device, terminal equipment and storage medium
US20170353442A1 (en) Proximity-based authentication
US20090158394A1 (en) Super peer based peer-to-peer network system and peer authentication method thereof
CN101741860B (en) Computer remote security control method
CN109756446B (en) Access method and system for vehicle-mounted equipment
US20090187978A1 (en) Security and authentications in peer-to-peer networks
CN107204983B (en) System for wind power plant SCADA system safety data transmission based on SIP protocol
CN109462595A (en) Data-interface secure exchange method based on RestFul
GB2489676A (en) Overlay network comprising management node controlling access of subordinate nodes
US7428748B2 (en) Method and system for authentication in a business intelligence system
JP2017152880A (en) Authentication system, key processing coordination method, and key processing coordination program
CN102571874B (en) On-line audit method and device in distributed system
CN1633072A (en) A dual-server authentication scheme supporting weak password
KR20120134942A (en) Authentification agent and method for authentificating online service and system thereof
CN110247905A (en) The data backup memory method and system of secure authentication mode based on Token
CN110891067B (en) Revocable multi-server privacy protection authentication method and revocable multi-server privacy protection authentication system
CN113259350A (en) Cryptographic user authorization and authentication system based on key generation algorithm
CN102316119B (en) Security control method and equipment
US7631344B2 (en) Distributed authentication framework stack
CN114422106A (en) Internet of things system security authentication method and system under multi-server environment
CN116956247B (en) Information processing system based on BIM
US11943349B2 (en) Authentication through secure sharing of digital secrets previously established between devices
CN117318969A (en) Service communication method, device and system for realizing disaster recovery

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant