CN104424431A - Method and device for resetting virtual machine user login password - Google Patents

Method and device for resetting virtual machine user login password Download PDF

Info

Publication number
CN104424431A
CN104424431A CN201310390519.0A CN201310390519A CN104424431A CN 104424431 A CN104424431 A CN 104424431A CN 201310390519 A CN201310390519 A CN 201310390519A CN 104424431 A CN104424431 A CN 104424431A
Authority
CN
China
Prior art keywords
virtual machine
password
user
machine user
logs
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201310390519.0A
Other languages
Chinese (zh)
Other versions
CN104424431B (en
Inventor
胡兴华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Tencent Cloud Computing Beijing Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201310390519.0A priority Critical patent/CN104424431B/en
Priority to PCT/CN2014/084891 priority patent/WO2015027852A1/en
Publication of CN104424431A publication Critical patent/CN104424431A/en
Application granted granted Critical
Publication of CN104424431B publication Critical patent/CN104424431B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2131Lost password, e.g. recovery of lost or forgotten passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a method and a device for resetting a virtual machine user login password. The method for resetting the virtual machine user login password includes: receiving a virtual machine user login password reset request which contains user identity information; verifying the user identity information, and judging whether the virtual machine user login password reset request is valid; if the virtual machine user login password reset request is valid, obtaining modifying operation authorization for disk data of a virtual machine according to a preset mode; replacing enciphered data of the virtual machine user login password, corresponding to the user identity information and stored in a disk of the virtual machine, with enciphered data of the virtual machine user login password, which is backed up after the virtual machine is created. The method and the device for resetting the virtual machine user login password can achieve reset of the virtual machine user login password, consume short time, save system resources of a host machine, and guarantee safety of the virtual machine due to the fact that other users have no permission to apply for the reset.

Description

A kind ofly reset method and the device that virtual machine user logs in password
Technical field
The present invention relates to field of computer technology, be specifically related to field of information security technology, particularly relate to and a kind ofly reset method and the device that virtual machine user logs in password.
Background technology
At present, the server (host) of virtual machine mounting software purchased can create one or more and be provided with the virtual machine logging in password.For same the virtual machine that server creates, user can input password to log in this virtual machine by means of terminal device, carries out a series of interactive command operation with this virtual machine, and different classes of user is different to the operating right of resource file on this virtual machine.Such as, the operation that the virtual machine root user under Linux or Unix operating system has increasing to resource file any on this virtual machine, deletes, changes, looks into.But once user have forgotten virtual machine corresponding with it log in password, then the virtual machine that cannot create by means of terminal device game server is to dispose associative operation.
For this reason, existing technology solves above problem by two kinds of modes usually.First kind of way is: server re-creates a virtual machine corresponding with this user; The second way is: server restarts the AD HOC of the virtual machine corresponding with this user, resets virtual machine login password.
To in the research and practice process of prior art, inventor finds that prior art at least exists following problem: above-mentioned first kind of way consumes a large amount of system resource of host, and consuming time longer, there is loss of data phenomenon; The above-mentioned second way can make any user enter the AD HOC of the virtual machine corresponding with this user by means of terminal device to reset virtual machine login password, and then the security of virtual machine can not be guaranteed, such as the virtual machine under (SuSE) Linux OS, non-root user can enter the single pattern of this virtual machine by means of terminal device, reset the virtual machine corresponding with root user and log in password and obtain the authority of super Admin Account.
Summary of the invention
In view of this, the embodiment of the present invention provides a kind of and resets method and the device that virtual machine user logs in password, solves the technical matters that above background technology part is mentioned.
On the one hand, embodiments provide and a kind ofly reset the method that virtual machine user logs in password, described method comprises:
The virtual machine user that receiving package contains subscriber identity information logs in password and resets request;
Described subscriber identity information is verified, judges whether described virtual machine user logs in password replacement request effective;
When described virtual machine user log in password reset request effective time, get the retouching operation authority to magnetic disk of virtual machine data according to preset mode;
The virtual machine user corresponding with described subscriber identity information stored in magnetic disk of virtual machine is logged in password encryption data to replace with the virtual machine user backed up when creating complete virtual machine and log in password encryption data.
On the one hand, the embodiment of the present invention also proposed and a kind ofly resets the device that virtual machine user logs in password, and described device comprises:
Request receiving module, the virtual machine user containing subscriber identity information for receiving package logs in password replacement request;
Request judge module, for verifying described subscriber identity information, judges whether described virtual machine user logs in password replacement request effective;
Authority acquiring module, for log in when described virtual machine user password reset request effective time, get the retouching operation authority to magnetic disk of virtual machine data according to preset mode;
Crypted password replacement module, replaces with the virtual machine user backed up when creating complete virtual machine log in password encryption data for the virtual machine user corresponding with described subscriber identity information stored in magnetic disk of virtual machine being logged in password encryption data.
A kind of virtual machine user that resets that the embodiment of the present invention proposes logs in the method for password and device has following features: by judge virtual machine user log in password reset ask effective time, the retouching operation authority to magnetic disk of virtual machine data is got according to preset mode, the virtual machine user corresponding with subscriber identity information stored in magnetic disk of virtual machine is logged in password encryption data to replace with the virtual machine user that backs up when creating complete virtual machine and log in password encryption data, realize the replacement that virtual machine user logs in password, consuming time shorter, save the system resource of host, and other user's lack of competence applications reset, virtual machine security can be guaranteed.
Accompanying drawing explanation
Fig. 1 is that a kind of that first embodiment of the invention provides resets the schematic flow sheet that virtual machine user logs in the method for password;
Fig. 2 is that a kind of that second embodiment of the invention provides resets the schematic flow sheet that virtual machine user logs in the method for password;
Fig. 3 is that a kind of that third embodiment of the invention provides resets the schematic flow sheet that virtual machine user logs in the method for password;
Fig. 4 is that a kind of that fourth embodiment of the invention provides resets the structural representation that virtual machine user logs in the device of password;
Fig. 5 is that a kind of that fifth embodiment of the invention provides resets the structural representation that virtual machine user logs in the device of password;
Fig. 6 is that a kind of that sixth embodiment of the invention provides resets the structural representation that virtual machine user logs in the device of password;
Fig. 7 is the structural representation that can be used for the terminal device implementing the present invention program.
Embodiment
Below in conjunction with drawings and Examples, the present invention is described in further detail.Be understandable that, specific embodiment described herein is only for explaining the present invention, but not limitation of the invention.It also should be noted that, for convenience of description, illustrate only part related to the present invention in accompanying drawing but not full content.
Fig. 1 shows the first embodiment of the present invention.
Fig. 1 is that a kind of that first embodiment of the invention provides resets the schematic flow sheet that virtual machine user logs in the method for password.The method can be applicable to can create on the server (i.e. host) of virtual machine.See Fig. 1, details are as follows for the realization flow of described method:
The virtual machine user that step S101, receiving package contain subscriber identity information logs in password and resets request.
The various requests that host real-time sense terminals equipment sends, when detected request correspond to virtual machine user log in password reset request time, receive and extract the subscriber identity information comprised in this request.In the present embodiment, described request can be that the replacement virtual machine user from terminal device that the self-service Web page on host receives logs in password request, and described subscriber identity information includes but not limited to: user identity label, user fingerprints information or user images information.Wherein, user identity label is can the character string (such as ID (identity number) card No.) of identifying user unique identities, the finger print data of user of user fingerprints information for being gathered by fingerprint acquisition device (such as fingerprint sensor), the face image data of user of user images information for being gathered by image collecting device (such as camera).Certain those of ordinary skill in the art should be understood that described subscriber identity information also can be other forms of can identifying user identity and can the information that identifies by host, such as user speech information.
Step S102, verify subscriber identity information, whether judging virtual machine user to log in password, to reset request effective.
Receive the virtual machine user including subscriber identity information log in password reset request after, host is verified the subscriber identity information comprised in this request, judge whether it has replacement authority virtual machine user being logged in password, if had, then judge that the virtual machine user received logs in password and resets request effectively.Such as, when received request for include a certain subscriber identity information to the virtual machine root user of (SuSE) Linux OS log in password reset request time, according to the presets list, host judges whether described subscriber identity information has the replacement authority virtual machine root user of (SuSE) Linux OS being logged in password, if had, then judge that this request is effective.Wherein, record the different classes of subscriber identity information corresponding to each virtual machine that host creates in the presets list.
Step S103, when virtual machine user log in password reset request effective time, get the retouching operation authority to magnetic disk of virtual machine data according to preset mode.
After the virtual machine user judging to include subscriber identity information logs in password replacement request effectively, host obtains the retouching operation authority to magnetic disk of virtual machine data according to preset mode.One of the present embodiment preferred embodiment described in preset mode comprise: send shutdown command to virtual machine, the virtual machine that measures to be checked is when being in off-mode, mount virtual machine disk.
Certain those of ordinary skill in the art should understand, when virtual machine user log in password reset request effective time, if detect that virtual machine is now in off-mode, the above-mentioned step to virtual machine transmission shutdown command can be omitted, and not the present embodiment institute is necessary.
Step S104, the virtual machine user corresponding with subscriber identity information stored logged in password encryption data replace with the virtual machine user backed up when creating complete virtual machine and log in password encryption data in magnetic disk of virtual machine.
Host can be preset a virtual machine user to virtual machine when creating virtual machine and log in password, when virtual machine creating is complete, virtual machine can generate a virtual machine user and log in password encryption data, and this enciphered data is encrypted for logging in password to default virtual machine user the data that computing generates.In this enforcement, the virtual machine user that virtual machine generates when creating complete virtual machine by host logs in password encryption data and backs up.
When user by means of terminal device first game server create corresponding with it virtual machine time, this user adopts default virtual machine to log in password and can enter virtual machine and carry out associative operation, described operation can be log in the virtual machine corresponding with this user the retouching operation that password carries out, and the virtual machine user corresponding to this user that now virtual machine stores logs in password encryption data can by corresponding amendment.
In this enforcement, when user forgets that virtual machine corresponding with it logs in password, host receives the virtual machine user including subscriber identity information and logs in password and reset and ask and after verifying that this request is effective, first host gets the retouching operation authority to magnetic disk of virtual machine data according to preset mode, then the memory location that virtual machine user corresponding with subscriber identity information in magnetic disk of virtual machine logs in password encryption data is searched, and then the data on this memory location are replaced with the virtual machine user backed up when creating complete virtual machine and log in password encryption data.For the virtual machine under (SuSE) Linux OS, the memory location that its root user logs in password encryption data for root inside/etc/shadow file capable.
One of the present embodiment preferred embodiment in, also comprise after step s 104: the default virtual machine user when creating virtual machine is logged in password and logs in password prompt to user as new virtual machine user.Described prompting can be send to the terminal device at user place to include the interface that new virtual machine user logs in password and come, and also can send new virtual machine user according to the user profile that host stores (such as subscriber mailbox) to user and log in password.Like this, user just can log in code entry virtual machine by means of terminal device with new virtual machine user, and then completes and operate with the interactive command of virtual machine.
The present embodiment by judge virtual machine user log in password reset request effective time, the retouching operation authority to magnetic disk of virtual machine data is got according to preset mode, the virtual machine user corresponding with subscriber identity information stored in magnetic disk of virtual machine is logged in password encryption data to replace with the virtual machine user that backs up when creating complete virtual machine and log in password encryption data, realize the replacement that virtual machine user logs in password, consuming time shorter, save the system resource of host, and other user's lack of competence applications reset, virtual machine security can be guaranteed.
Fig. 2 shows the second embodiment of the present invention.
Fig. 2 is that a kind of that second embodiment of the invention provides resets the schematic flow sheet that virtual machine user logs in the method for password.The method can be applicable to can create on the server (i.e. host) of virtual machine.See Fig. 2, details are as follows for the realization flow of described method:
The virtual machine user that step S201, receiving package contain subscriber identity information logs in password and resets request.
Step S202, verify subscriber identity information, whether judging virtual machine user to log in password, to reset request effective.
Step S203, when virtual machine user log in password reset request effective time, get the retouching operation authority to magnetic disk of virtual machine data according to preset mode.
Step S204, the virtual machine user corresponding with described subscriber identity information stored logged in password encryption data replace with the virtual machine user backed up when creating complete virtual machine and log in password encryption data in magnetic disk of virtual machine.
Step S205, generate new virtual machine user and log in password.
Step S206, be used in default virtual machine user when creating virtual machine and log in code entry to virtual machine, virtual machine user is logged in password and reset to described new virtual machine user and log in password.
Step S207, described new virtual machine user is logged in password prompt to user.
In the present embodiment, step S201-step S204 is corresponding identical with the step S101-step S104 in the first embodiment, repeats no more here.
In the present embodiment, host generates new virtual machine user by the password generating algorithm preset and logs in password, and the character string that such as stochastic generation 12 includes numeral, letter and/or special symbol logs in password as new virtual machine user.
After the new virtual machine user of generation logs in password, host sends start-up command to virtual machine, the virtual machine that measures to be checked is when being in open state, be used in default virtual machine user when creating virtual machine and log in code entry to virtual machine, virtual machine user is logged in password and reset to generated new virtual machine user and log in password.For the virtual machine under (SuSE) Linux OS, host resets new virtual machine user by passwd order and logs in password.
The present embodiment by judge virtual machine user log in password reset request effective time, the retouching operation authority to magnetic disk of virtual machine data is got according to preset mode, the virtual machine user corresponding with subscriber identity information stored in magnetic disk of virtual machine is logged in password encryption data to replace with the virtual machine user that backs up when creating complete virtual machine and log in password encryption data, be used in default virtual machine user when creating virtual machine and log in code entry to virtual machine, and then complete replacement virtual machine user being logged in password, consuming time shorter, save the system resource of host, and other user's lack of competence applications reset, virtual machine security can be guaranteed.
Fig. 3 shows the third embodiment of the present invention.
Fig. 3 is that a kind of that third embodiment of the invention provides resets the schematic flow sheet that virtual machine user logs in the method for password.The method can be applicable to can create on the server (i.e. host) of virtual machine.See Fig. 3, details are as follows for the realization flow of described method:
Step S301, sink virtual machine user log in password and reset request, and described request includes subscriber identity information and new virtual machine user logs in password.
Step S302, verify subscriber identity information, whether judging virtual machine user to log in password, to reset request effective.
Step S303, when virtual machine user log in password reset request effective time, get the retouching operation authority to magnetic disk of virtual machine data according to preset mode.
Step S304, the virtual machine user corresponding with described subscriber identity information stored logged in password encryption data replace with the virtual machine user backed up when creating complete virtual machine and log in password encryption data in magnetic disk of virtual machine.
Step S305, be used in default virtual machine user when creating virtual machine and log in code entry to virtual machine, virtual machine user is logged in password and reset to the new virtual machine user comprised in described request and log in password.
In the present embodiment, step S302-step S204 is corresponding identical with the step S102-step S104 in the first embodiment, repeats no more here.
In order to ensure the security of password further, one of the present embodiment preferred embodiment in, receive virtual machine user at host to log in password and reset and ask and after verifying that this request is effective, resolve wherein comprised new virtual machine user and log in password, then this request is deleted, to avoid disabled user, Brute Force is carried out to it.
The present embodiment by judge virtual machine user log in password reset request effective time, the retouching operation authority to magnetic disk of virtual machine data is got according to preset mode, the virtual machine user corresponding with subscriber identity information stored in magnetic disk of virtual machine is logged in password encryption data to replace with the virtual machine user that backs up when creating complete virtual machine and log in password encryption data, be used in default virtual machine user when creating virtual machine and log in code entry to virtual machine, and then complete replacement virtual machine user being logged in password, consuming time shorter, save the system resource of host, and other user's lack of competence applications reset, virtual machine security can be guaranteed, virtual machine can be logged in simultaneously password reset to user to new virtual machine log in password, improve Consumer's Experience.
Fig. 4 shows the fourth embodiment of the present invention.
Fig. 4 is that a kind of that fourth embodiment of the invention provides resets the structural representation that virtual machine user logs in the device of password.See Fig. 4, described device comprises:
Request receiving module 401, the virtual machine user containing subscriber identity information for receiving package logs in password replacement request;
Request judge module 402, for verifying subscriber identity information, judges whether described virtual machine user logs in password replacement request effective;
Authority acquiring module 403, for log in when virtual machine user password reset request effective time, get the retouching operation authority to magnetic disk of virtual machine data according to preset mode;
Crypted password replacement module 404, replaces with the virtual machine user backed up when creating complete virtual machine log in password encryption data for the virtual machine user corresponding with described subscriber identity information stored in magnetic disk of virtual machine being logged in password encryption data.
In the present embodiment, the request receiving module 401 in real time various requests that send of sense terminals equipment, when detected request correspond to virtual machine user log in password reset request time, receive and extract the subscriber identity information comprised in this request.In the present embodiment, described request can be that the replacement virtual machine user from terminal device that the self-service Web page on host receives logs in password request, and described subscriber identity information includes but not limited to: user identity label, user fingerprints information or user images information.Wherein, user identity label is can the character string (such as ID (identity number) card No.) of identifying user unique identities, the finger print data of user of user fingerprints information for being gathered by fingerprint acquisition device (such as fingerprint sensor), the face image data of user of user images information for being gathered by image collecting device (such as camera).Certain those of ordinary skill in the art should be understood that described subscriber identity information also can be other forms of can identifying user identity and can the information that identifies by host, such as user speech information.
Request receiving module 401 receive the virtual machine user including subscriber identity information log in password reset request after, request judge module 402 is verified the subscriber identity information comprised in this request, judge whether it has replacement authority virtual machine user being logged in password, if had, then judge that the virtual machine user received logs in password and resets request effectively.Such as, when the request that request receiving module 401 receives for include a certain subscriber identity information to the virtual machine root user of (SuSE) Linux OS log in password reset request time, according to the presets list, request judge module 402 judges whether described subscriber identity information has the replacement authority virtual machine root user of (SuSE) Linux OS being logged in password, if had, then judge that this request is effective.Wherein, record the different classes of subscriber identity information corresponding to each virtual machine that host creates in the presets list.
After the virtual machine user of asking judge module 402 judgement to include subscriber identity information logs in password replacement request effectively, authority acquiring module 403 obtains the retouching operation authority to magnetic disk of virtual machine data according to preset mode.One of the present embodiment preferred embodiment described in preset mode comprise: send shutdown command to virtual machine, the virtual machine that measures to be checked is when being in off-mode, mount virtual machine disk.
Certain those of ordinary skill in the art should understand, when virtual machine user log in password reset request effective time, if authority acquiring module 403 detects that virtual machine is now in off-mode, the above-mentioned step to virtual machine transmission shutdown command can be omitted, and not the present embodiment institute is necessary.
In this enforcement, when user forgets that virtual machine corresponding with it logs in password, the virtual machine user that request receiving module 401 receiving package contains subscriber identity information logs in password and resets request, after request judge module 402 verifies this request effectively, first authority acquiring module 403 gets the retouching operation authority to magnetic disk of virtual machine data according to preset mode, Crypted password replacement module 404 searches the memory location that virtual machine user corresponding with subscriber identity information in magnetic disk of virtual machine logs in password encryption data, and then the data on this memory location are replaced with the virtual machine user backed up when creating complete virtual machine and log in password encryption data.For the virtual machine under (SuSE) Linux OS, the memory location that its root user logs in password encryption data for root inside/etc/shadow file capable.
One of the present embodiment preferred embodiment in, described device also comprises new password reminding module (not shown), for after Crypted password replacement module 404 executes replacement operation, the default virtual machine user when creating virtual machine is logged in password and logs in password prompt to user as new virtual machine user.Described prompting can be send to the terminal device at user place to include the interface that new virtual machine user logs in password and come, and also can send new virtual machine user according to the user profile that host stores (such as subscriber mailbox) to user and log in password.Like this, user just can log in code entry virtual machine by means of terminal device with new virtual machine user, and then completes and operate with the interactive command of virtual machine.
The present embodiment by judge virtual machine user log in password reset request effective time, the retouching operation authority to magnetic disk of virtual machine data is got according to preset mode, the virtual machine user corresponding with subscriber identity information stored in magnetic disk of virtual machine is logged in password encryption data to replace with the virtual machine user that backs up when creating complete virtual machine and log in password encryption data, realize the replacement that virtual machine user logs in password, consuming time shorter, save the system resource of host, and other user's lack of competence applications reset, virtual machine security can be guaranteed.
Fig. 5 shows the fifth embodiment of the present invention.
Fig. 5 is that a kind of that fifth embodiment of the invention provides resets the structural representation that virtual machine user logs in the device of password.See Fig. 5, described device comprises:
Request receiving module 501, the virtual machine user containing subscriber identity information for receiving package logs in password replacement request;
Request judge module 502, for verifying subscriber identity information, judges whether virtual machine user logs in password replacement request effective;
Authority acquiring module 503, for log in when virtual machine user password reset request effective time, get the retouching operation authority to magnetic disk of virtual machine data according to preset mode;
Crypted password replacement module 504, replaces with the virtual machine user backed up when creating complete virtual machine log in password encryption data for the virtual machine user corresponding with described subscriber identity information stored in magnetic disk of virtual machine being logged in password encryption data;
New password generation module 505, logs in password for generating new virtual machine user;
New password resets module 506, and when creating virtual machine for being used in, default virtual machine user logs in code entry to virtual machine, virtual machine user is logged in password and resets to described new virtual machine user and log in password;
New password reminding module 507, for logging in password prompt to user by described new virtual machine user.
In the present embodiment, request receiving module 501, request judge module 502, authority acquiring module 503, Crypted password replacement module 504 with the request receiving module 401 in the 4th embodiment, ask judge module 402, authority acquiring module 403, Crypted password replacement module 404 corresponding identical, repeat no more here.
In the present embodiment, new password generation module 505 generates new virtual machine user by the password generating algorithm preset and logs in password, and the character string that such as stochastic generation 12 includes numeral, letter and/or special symbol logs in password as new virtual machine user.
Generate after new virtual machine user logs in password at new password generation module 505, new password resets module 506 and sends start-up command to virtual machine, the virtual machine that measures to be checked is when being in open state, be used in default virtual machine user when creating virtual machine and log in code entry to virtual machine, virtual machine user is logged in password and reset to generated new virtual machine user and log in password.For the virtual machine under (SuSE) Linux OS, new password replacement module 506 resets new virtual machine user by passwd order and logs in password.
The present embodiment by judge virtual machine user log in password reset request effective time, the retouching operation authority to magnetic disk of virtual machine data is got according to preset mode, the virtual machine user corresponding with subscriber identity information stored in magnetic disk of virtual machine is logged in password encryption data to replace with the virtual machine user that backs up when creating complete virtual machine and log in password encryption data, be used in default virtual machine user when creating virtual machine and log in code entry to virtual machine, and then complete replacement virtual machine user being logged in password, consuming time shorter, save the system resource of host, and other user's lack of competence applications reset, virtual machine security can be guaranteed.
Fig. 6 shows the sixth embodiment of the present invention.
Fig. 6 is that a kind of that sixth embodiment of the invention provides resets the structural representation that virtual machine user logs in the device of password.See Fig. 6, described device comprises:
Request receiving module 601, log in password for sink virtual machine user and reset request, described request includes subscriber identity information and new virtual machine user logs in password;
Request judge module 602, for verifying subscriber identity information, judges whether virtual machine user logs in password replacement request effective;
Authority acquiring module 603, for log in when virtual machine user password reset request effective time, get the retouching operation authority to magnetic disk of virtual machine data according to preset mode;
Crypted password replacement module 604, replaces with the virtual machine user backed up when creating complete virtual machine log in password encryption data for the virtual machine user corresponding with described subscriber identity information stored in magnetic disk of virtual machine being logged in password encryption data;
New password resets module 605, and when creating virtual machine for being used in, default virtual machine user logs in code entry to virtual machine, virtual machine user is logged in password and resets to the new virtual machine user comprised in described request and log in password.
In the present embodiment, request judge module 602, authority acquiring module 603, Crypted password replacement module 604 and the request judge module 402 in the 4th embodiment, authority acquiring module 403, Crypted password replacement module 404 are corresponding identical, repeat no more here.
In order to ensure the security of password further, one of the present embodiment preferred embodiment in, receive virtual machine user in request receiving module 601 to log in password and reset request and after asking judge module 602 to verify that this request effectively, request judge module 602 is resolved wherein comprised new virtual machine user and is logged in password, then this request is deleted, to avoid disabled user, Brute Force is carried out to it.
The present embodiment by judge virtual machine user log in password reset request effective time, the retouching operation authority to magnetic disk of virtual machine data is got according to preset mode, the virtual machine user corresponding with subscriber identity information stored in magnetic disk of virtual machine is logged in password encryption data to replace with the virtual machine user that backs up when creating complete virtual machine and log in password encryption data, be used in default virtual machine user when creating virtual machine and log in code entry to virtual machine, and then complete replacement virtual machine user being logged in password, consuming time shorter, save the system resource of host, and other user's lack of competence applications reset, virtual machine security can be guaranteed, virtual machine can be logged in simultaneously password reset to user to new virtual machine log in password, improve Consumer's Experience.
Fig. 7 is the structural representation that can be used for the server implementing the present invention program.With reference to figure 7, this server comprises: radio frequency (Radio Frequency, RF) parts such as circuit 701, storer 702, input block 703, display unit 704, sensor 705, voicefrequency circuit 706, Wireless Fidelity (wireless fidelity, WiFi) module 707, processor 708 and power supply 709.It will be understood by those skilled in the art that the server architecture shown in Fig. 7 does not form the restriction to server, the parts more more or less than diagram can be comprised, or combine some parts, or different parts are arranged.
Concrete introduction is carried out below in conjunction with Fig. 7 each component parts to server:
RF circuit 701 can be used for receiving and sending messages or in communication process, the reception of signal and transmission, especially, after being received by the downlink information of base station, process to processor 708; In addition, the up data of design are sent to base station.Usually, RF circuit includes but not limited to antenna, at least one amplifier, transceiver, coupling mechanism, low noise amplifier (Low Noise Amplifier, LNA), diplexer etc.In addition, RF circuit 701 can also by radio communication and network and other devices communicatings.Above-mentioned radio communication can use arbitrary communication standard or agreement, include but not limited to global system for mobile communications (Global System of Mobilecommunication, GSM), general packet radio service (General Packet Radio Service, GPRS), CDMA (Code Division Multiple Access, CDMA), Wideband Code Division Multiple Access (WCDMA) (Wideband Code Division Multiple Access, WCDMA), Long Term Evolution (Long TermEvolution, LTE)), Email, Short Message Service (Short Messaging Service, SMS) etc.
Storer 702 can be used for storing software program and module, and processor 708 is stored in software program and the module of storer 702 by running, thus performs various function application and the data processing of server.Storer 702 mainly can comprise storage program district and store data field, and wherein, storage program district can store operating system, application program (such as sound-playing function, image player function etc.) etc. needed at least one function; Store data field and can store the data (such as voice data, phone directory etc.) etc. created according to the use of server.In addition, storer 702 can comprise high-speed random access memory, can also comprise nonvolatile memory, such as at least one disk memory, flush memory device or other volatile solid-state parts.
Input block 703 can be used for the numeral or the character information that receive input, and generation arranges with the user of server and function controls the input of relevant key signals.Particularly, input block 703 can comprise contact panel 7031 and other input equipments 7032.Contact panel 7031, also referred to as touch-screen, user can be collected or neighbouring touch operation (such as user uses any applicable object or the operations of annex on contact panel 7031 or near contact panel 7031 such as finger, stylus) thereon, and drive corresponding coupling arrangement according to the formula preset.Optionally, contact panel 7031 can comprise touch detecting apparatus and touch controller two parts.Wherein, touch detecting apparatus detects the touch orientation of user, and detects the signal that touch operation brings, and sends signal to touch controller; Touch controller receives touch information from touch detecting apparatus, and converts it to contact coordinate, then gives processor 708, and the order that energy receiving processor 708 is sent also is performed.In addition, the polytypes such as resistance-type, condenser type, infrared ray and surface acoustic wave can be adopted to realize contact panel 7031.Except contact panel 7031, input block 703 can also comprise other input equipments 7032.Particularly, other input equipments 7032 can include but not limited to one or more in physical keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse, control lever etc.
Display unit 704 can be used for the various menus showing information or the information being supplied to user and the server inputted by user.Display unit 704 can comprise display panel 7041, optionally, the forms such as liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode (Organic Light-EmittingDiode, OLED) can be adopted to configure display panel 7041.Further, contact panel 7031 can cover display panel 7041, when contact panel 7031 detects thereon or after neighbouring touch operation, send processor 708 to determine the type of touch event, on display panel 7041, provide corresponding vision to export with preprocessor 708 according to the type of touch event.Although in the figure 7, contact panel 7031 and display panel 7041 be as two independently parts to realize input and the input function of server, but in certain embodiments, can by integrated to contact panel 7031 and display panel 7041 and realize the input and output function of server.
Server also can comprise at least one sensor 705, such as optical sensor, motion sensor and other sensors.Particularly, optical sensor can comprise ambient light sensor and proximity transducer, and wherein, ambient light sensor the light and shade of environmentally light can regulate the brightness of display panel 7041, proximity transducer when server moves in one's ear, can cut out display panel 7041 and/or backlight.As the one of motion sensor, accelerometer sensor can detect the size of all directions (are generally three axles) acceleration, size and the direction of gravity can be detected time static, can be used for the application (such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating) of identified server attitude, Vibration identification correlation function (such as passometer, knock) etc.; As for server also other sensors such as configurable gyroscope, barometer, hygrometer, thermometer, infrared ray sensor, do not repeat them here.
Voicefrequency circuit 706, loudspeaker 710, microphone 711 can provide the audio interface between user and server.Voicefrequency circuit 706 can by receive voice data conversion after electric signal, be transferred to loudspeaker 710, by loudspeaker 710 be converted to voice signal export; On the other hand, the voice signal of collection is converted to electric signal by microphone 711, voice data is converted to after being received by voicefrequency circuit 706, after again voice data output processor 708 being processed, through RF circuit 701 to send to such as another server, or export voice data to storer 702 to process further.
WiFi belongs to short range wireless transmission technology, and server can help user to send and receive e-mail by WiFi module 707, browse webpage and access streaming video etc., and its broadband internet wireless for user provides is accessed.Although Fig. 7 shows WiFi module 707, be understandable that, it does not belong to must forming of server, can omit in the scope of essence not changing invention as required completely.
Processor 708 is control centers of server, utilize the various piece of various interface and the whole server of connection, software program in storer 702 and/or module is stored in by running or performing, and call the data be stored in storer 702, perform various function and the process data of server, thus integral monitoring is carried out to server.Optionally, processor 708 can comprise one or more processing unit; Preferably, processor 708 accessible site application processor and modem processor, wherein, application processor mainly processes operating system, user interface and application program etc., and modem processor mainly processes radio communication.Be understandable that, above-mentioned modem processor also can not be integrated in processor 708.
Server also comprises the power supply 709(such as battery of powering to all parts), preferably, power supply can be connected with processor 708 logic by power-supply management system, thus realizes the functions such as management charging, electric discharge and power managed by power-supply management system.
Although not shown, server can also comprise camera, bluetooth module etc., does not repeat them here.
One of ordinary skill in the art will appreciate that all or part of step realizing above-described embodiment can have been come by hardware, the hardware that also can carry out instruction relevant by program completes, this program can be stored in a computer-readable recording medium, and storage medium can comprise storer, disk or CD etc.
Note, above are only preferred embodiment of the present invention and institute's application technology principle.Skilled person in the art will appreciate that and the invention is not restricted to specific embodiment described here, various obvious change can be carried out for a person skilled in the art, readjust and substitute and can not protection scope of the present invention be departed from.Therefore, although be described in further detail invention has been by above embodiment, the present invention is not limited only to above embodiment, when not departing from the present invention's design, can also comprise other Equivalent embodiments more, and scope of the present invention is determined by appended right.

Claims (16)

1. reset the method that virtual machine user logs in password, it is characterized in that, described method comprises:
The virtual machine user that receiving package contains subscriber identity information logs in password and resets request;
Described subscriber identity information is verified, judges whether described virtual machine user logs in password replacement request effective;
When described virtual machine user log in password reset request effective time, get the retouching operation authority to magnetic disk of virtual machine data according to preset mode;
The virtual machine user corresponding with described subscriber identity information stored in magnetic disk of virtual machine is logged in password encryption data to replace with the virtual machine user backed up when creating complete virtual machine and log in password encryption data.
2. replacement virtual machine user according to claim 1 logs in the method for password, it is characterized in that, replace with after the virtual machine user backed up when creating complete virtual machine logs in the step of password encryption data also comprise in described password encryption data that the virtual machine user corresponding with described subscriber identity information stored in magnetic disk of virtual machine logged in: virtual machine user default when creating virtual machine is logged in password and logs in password prompt to user as new virtual machine user.
3. replacement virtual machine user according to claim 1 logs in the method for password, it is characterized in that, replace with after the virtual machine user backed up when creating complete virtual machine logs in the step of password encryption data also comprise in described password encryption data that the virtual machine user corresponding with described subscriber identity information stored in magnetic disk of virtual machine logged in:
Generate new virtual machine user and log in password;
Be used in default virtual machine user when creating virtual machine and log in code entry to virtual machine, virtual machine user is logged in password and reset to described new virtual machine user and log in password;
Described new virtual machine user is logged in password prompt to user.
4. replacement virtual machine user according to claim 1 logs in the method for password, it is characterized in that, described virtual machine user logs in password and resets request and also include new virtual machine user and log in password;
Replace with after the virtual machine user backed up when creating complete virtual machine logs in the step of password encryption data also comprise in described password encryption data that the virtual machine user corresponding with described subscriber identity information stored in magnetic disk of virtual machine logged in:
Be used in default virtual machine user when creating virtual machine and log in code entry to virtual machine, virtual machine user is logged in password and reset to described new virtual machine user and log in password.
5. the replacement virtual machine user according to any one of claim 2-4 logs in the method for password, it is characterized in that, described when creating complete virtual machine the virtual machine user that backs up log in password encryption data and be encrypted for logging in password to the default virtual machine user when creating virtual machine the data that computing generates.
6. replacement virtual machine user according to claim 1 logs in the method for password, it is characterized in that, described when described virtual machine user log in password reset request effective time to get according to preset mode the step of the retouching operation authority of magnetic disk of virtual machine data comprised:
When described virtual machine user log in password reset request effective time, to virtual machine send shutdown command;
When detecting that virtual machine is in off-mode, mount virtual machine disk.
7. replacement virtual machine user according to claim 1 logs in the method for password, it is characterized in that, verifies described subscriber identity information, judges that described virtual machine user logs in password and resets to ask whether effective step comprises:
Described subscriber identity information is verified, judge whether described subscriber identity information has replacement authority virtual machine user being logged in password, if had, judge that described virtual machine user logs in password and resets request effectively, otherwise, judge that described virtual machine user logs in password replacement request invalid.
8. replacement virtual machine user according to claim 1 logs in the method for password, it is characterized in that, described subscriber identity information is user identity label, user fingerprints information or user images information.
9. reset the device that virtual machine user logs in password, it is characterized in that, described device comprises:
Request receiving module, the virtual machine user containing subscriber identity information for receiving package logs in password replacement request;
Request judge module, for verifying described subscriber identity information, judges whether described virtual machine user logs in password replacement request effective;
Authority acquiring module, for log in when described virtual machine user password reset request effective time, get the retouching operation authority to magnetic disk of virtual machine data according to preset mode;
Crypted password replacement module, replaces with the virtual machine user backed up when creating complete virtual machine log in password encryption data for the virtual machine user corresponding with described subscriber identity information stored in magnetic disk of virtual machine being logged in password encryption data.
10. replacement virtual machine user according to claim 9 logs in the device of password, it is characterized in that, described device also comprises new password reminding module, replace with after the virtual machine user backed up when creating complete virtual machine logs in password encryption data at described Crypted password replacement module the virtual machine user corresponding with described subscriber identity information stored in magnetic disk of virtual machine being logged in password encryption data, the default virtual machine user when creating virtual machine is logged in password and logs in password as new virtual machine user, user is prompted to by human-computer interaction interface.
11. replacement virtual machine user according to claim 9 log in the device of password, and it is characterized in that, described device also comprises:
New password generation module, replacing with after the virtual machine user backed up when creating complete virtual machine logs in password encryption data at described Crypted password replacement module the virtual machine user corresponding with described subscriber identity information stored in magnetic disk of virtual machine being logged in password encryption data, generating new virtual machine user and logging in password;
New password resets module, and when creating virtual machine for being used in, default virtual machine user logs in code entry to virtual machine, virtual machine user is logged in password and resets to described new virtual machine user and log in password;
New password reminding module, is prompted to user for described new virtual machine user is logged in password by human-computer interaction interface.
12. replacement virtual machine user according to claim 9 log in the device of password, it is characterized in that, described virtual machine user logs in password and resets request and also include new virtual machine user and log in password;
Described device also comprises new password and resets module, replace with after the virtual machine user backed up when creating complete virtual machine logs in password encryption data at described Crypted password replacement module the virtual machine user corresponding with described subscriber identity information stored in magnetic disk of virtual machine being logged in password encryption data, be used in default virtual machine user when creating virtual machine and log in code entry to virtual machine, virtual machine user is logged in password and reset to described new virtual machine user and log in password.
13. replacement virtual machine user according to any one of claim 10-12 log in the device of password, it is characterized in that, described when creating complete virtual machine the virtual machine user that backs up log in password encryption data and be encrypted for logging in password to the default virtual machine user when creating virtual machine the data that computing generates.
14. replacement virtual machine user according to claim 9 log in the device of password, it is characterized in that, described authority acquiring module specifically for: when described virtual machine user log in password reset request effective time, shutdown command is sent to virtual machine, when detecting that virtual machine is in off-mode, mount virtual machine disk.
15. replacement virtual machine user according to claim 9 log in the device of password, it is characterized in that, described request judge module specifically for:
Described subscriber identity information is verified, judge whether described subscriber identity information has replacement authority virtual machine user being logged in password, if had, judge that described virtual machine user logs in password and resets request effectively, otherwise, judge that described virtual machine user logs in password replacement request invalid.
16. replacement virtual machine user according to claim 9 log in the device of password, it is characterized in that, described subscriber identity information is user tag, user fingerprints information or user images information.
CN201310390519.0A 2013-08-30 2013-08-30 A kind of method and device resetting virtual machine user modification logging Active CN104424431B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201310390519.0A CN104424431B (en) 2013-08-30 2013-08-30 A kind of method and device resetting virtual machine user modification logging
PCT/CN2014/084891 WO2015027852A1 (en) 2013-08-30 2014-08-21 Method and apparatus for resetting a user-login password for a virtual machine

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310390519.0A CN104424431B (en) 2013-08-30 2013-08-30 A kind of method and device resetting virtual machine user modification logging

Publications (2)

Publication Number Publication Date
CN104424431A true CN104424431A (en) 2015-03-18
CN104424431B CN104424431B (en) 2019-01-11

Family

ID=52585559

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310390519.0A Active CN104424431B (en) 2013-08-30 2013-08-30 A kind of method and device resetting virtual machine user modification logging

Country Status (2)

Country Link
CN (1) CN104424431B (en)
WO (1) WO2015027852A1 (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105117242A (en) * 2015-07-29 2015-12-02 广东欧珀移动通信有限公司 System resetting method and terminal
CN105260217A (en) * 2015-11-03 2016-01-20 国云科技股份有限公司 Method of password external reset of linux virtual machine
CN105530246A (en) * 2015-12-04 2016-04-27 华为技术有限公司 Method, device and system for managing virtual machine
CN105808317A (en) * 2016-03-07 2016-07-27 中标软件有限公司 Cloud computing platform virtual machine editing management method
CN110268406A (en) * 2017-02-09 2019-09-20 微软技术许可有限责任公司 Cipher safety
CN110266646A (en) * 2019-05-21 2019-09-20 东软集团股份有限公司 Service host, cipher management method and storage medium
CN111222106A (en) * 2019-12-26 2020-06-02 北京安码科技有限公司 Linux operating system password updating method, system, equipment and storage medium applied to remote maintenance

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107577516B (en) 2017-07-28 2020-08-14 华为技术有限公司 Virtual machine password resetting method, device and system
CN109002344B (en) * 2018-06-12 2021-01-15 广东睿江云计算股份有限公司 Method for resetting KVM (keyboard video mouse) virtual machine password by cloud management platform
CN112783609A (en) * 2021-01-30 2021-05-11 浪潮云信息技术股份公司 Method for automatically resetting password for virtual machine on ESXI (electronic service organization) host
CN116760546B (en) * 2023-08-18 2023-10-31 湖南省通信建设有限公司 Modularized password service method based on cloud environment

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101656718A (en) * 2008-08-18 2010-02-24 英业达股份有限公司 Network server system and method for establishing and starting virtual machine thereof
CN102402655A (en) * 2010-09-17 2012-04-04 上海中标软件有限公司 Virtual machine dynamic password setting method
CN102577315A (en) * 2011-12-21 2012-07-11 华为技术有限公司 Method, device and system for setting user access to virtual machine
CN102662783A (en) * 2012-03-20 2012-09-12 浪潮电子信息产业股份有限公司 Method for repairing virtual machine under desktop cloud environment
CN102662727A (en) * 2012-04-05 2012-09-12 北京天地云箱科技有限公司 Virtual machine creating method and virtual machine creating device
CN102902901A (en) * 2011-07-29 2013-01-30 鸿富锦精密工业(深圳)有限公司 Computer system and encryption device and encryption method thereof
US20130061293A1 (en) * 2011-09-02 2013-03-07 Wenbo Mao Method and apparatus for securing the full lifecycle of a virtual machine
CN103235909A (en) * 2013-04-25 2013-08-07 广东欧珀移动通信有限公司 Method and device for resetting password and mobile device

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100555298C (en) * 2007-06-08 2009-10-28 北京飞天诚信科技有限公司 The method and apparatus of virtulizing personal office environment
US9411970B2 (en) * 2011-08-19 2016-08-09 Microsoft Technology Licensing, Llc Sealing secret data with a policy that includes a sensor-based constraint

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101656718A (en) * 2008-08-18 2010-02-24 英业达股份有限公司 Network server system and method for establishing and starting virtual machine thereof
CN102402655A (en) * 2010-09-17 2012-04-04 上海中标软件有限公司 Virtual machine dynamic password setting method
CN102902901A (en) * 2011-07-29 2013-01-30 鸿富锦精密工业(深圳)有限公司 Computer system and encryption device and encryption method thereof
US20130061293A1 (en) * 2011-09-02 2013-03-07 Wenbo Mao Method and apparatus for securing the full lifecycle of a virtual machine
CN102577315A (en) * 2011-12-21 2012-07-11 华为技术有限公司 Method, device and system for setting user access to virtual machine
CN102662783A (en) * 2012-03-20 2012-09-12 浪潮电子信息产业股份有限公司 Method for repairing virtual machine under desktop cloud environment
CN102662727A (en) * 2012-04-05 2012-09-12 北京天地云箱科技有限公司 Virtual machine creating method and virtual machine creating device
CN103235909A (en) * 2013-04-25 2013-08-07 广东欧珀移动通信有限公司 Method and device for resetting password and mobile device

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105117242A (en) * 2015-07-29 2015-12-02 广东欧珀移动通信有限公司 System resetting method and terminal
CN105117242B (en) * 2015-07-29 2018-06-29 广东欧珀移动通信有限公司 System remapping method and terminal
CN105260217A (en) * 2015-11-03 2016-01-20 国云科技股份有限公司 Method of password external reset of linux virtual machine
CN105530246A (en) * 2015-12-04 2016-04-27 华为技术有限公司 Method, device and system for managing virtual machine
WO2017092671A1 (en) * 2015-12-04 2017-06-08 华为技术有限公司 Method of managing virtual machine, device and system
CN105530246B (en) * 2015-12-04 2018-10-09 华为技术有限公司 The methods, devices and systems of Virtual Machine Manager
CN105808317A (en) * 2016-03-07 2016-07-27 中标软件有限公司 Cloud computing platform virtual machine editing management method
CN110268406A (en) * 2017-02-09 2019-09-20 微软技术许可有限责任公司 Cipher safety
CN110268406B (en) * 2017-02-09 2023-06-16 微软技术许可有限责任公司 Password security
CN110266646A (en) * 2019-05-21 2019-09-20 东软集团股份有限公司 Service host, cipher management method and storage medium
CN111222106A (en) * 2019-12-26 2020-06-02 北京安码科技有限公司 Linux operating system password updating method, system, equipment and storage medium applied to remote maintenance
CN111222106B (en) * 2019-12-26 2022-08-12 北京安码科技有限公司 Linux operating system password updating method, system and equipment applied to remote maintenance and storage medium

Also Published As

Publication number Publication date
WO2015027852A1 (en) 2015-03-05
CN104424431B (en) 2019-01-11

Similar Documents

Publication Publication Date Title
CN104424431A (en) Method and device for resetting virtual machine user login password
US20180234237A1 (en) Key updating method, apparatus, and system
CN104134034B (en) Control the method and apparatus that application runs
CN103368958A (en) Method, device and system for detecting webpage
CN103634294A (en) Information verifying method and device
CN104978115A (en) Content display method and device
CN103400076A (en) Method, device and system for detecting malicious software on mobile terminal
CN106709347B (en) Using the method and device of operation
CN104519197A (en) User login method, user login device and terminal devices
CN104580167A (en) Data transmission method, device and system
CN104376353A (en) Two-dimension code generating method, terminal and server and two-dimension code reading method, terminal and server
CN105278937A (en) Method and device for displaying pop-up box messages
CN104468101A (en) User identity authentication method and device and authentication service system
CN105491067A (en) Key-based business security verification method and device
CN104571787A (en) Message display method and communication terminal
CN104571838A (en) Method and device for quickly starting application program
CN104238893A (en) Video preview image displaying method and device
CN104298666A (en) Web page sharing method and web page sharing device
CN104901805A (en) Identity authentication method and device and system
CN103366104A (en) Method and device for controlling accessing of application
CN104573437A (en) Information authentication method, device and terminal
CN105279433A (en) Application protection method and apparatus
CN104753672A (en) Account authentication method, account authentication device and terminal
CN104426848A (en) Method and system for logging in web application
CN105488433A (en) Terminal key generating method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20190730

Address after: 518057 Nanshan District science and technology zone, Guangdong, Zhejiang Province, science and technology in the Tencent Building on the 1st floor of the 35 layer

Co-patentee after: Tencent cloud computing (Beijing) limited liability company

Patentee after: Tencent Technology (Shenzhen) Co., Ltd.

Address before: Shenzhen Futian District City, Guangdong province 518044 Zhenxing Road, SEG Science Park 2 East Room 403

Patentee before: Tencent Technology (Shenzhen) Co., Ltd.

TR01 Transfer of patent right