Embodiment
Below in conjunction with drawings and Examples, the present invention is described in further detail.Be understandable that, specific embodiment described herein is only for explaining the present invention, but not limitation of the invention.It also should be noted that, for convenience of description, illustrate only part related to the present invention in accompanying drawing but not full content.
Fig. 1 shows the first embodiment of the present invention.
Fig. 1 is that a kind of that first embodiment of the invention provides resets the schematic flow sheet that virtual machine user logs in the method for password.The method can be applicable to can create on the server (i.e. host) of virtual machine.See Fig. 1, details are as follows for the realization flow of described method:
The virtual machine user that step S101, receiving package contain subscriber identity information logs in password and resets request.
The various requests that host real-time sense terminals equipment sends, when detected request correspond to virtual machine user log in password reset request time, receive and extract the subscriber identity information comprised in this request.In the present embodiment, described request can be that the replacement virtual machine user from terminal device that the self-service Web page on host receives logs in password request, and described subscriber identity information includes but not limited to: user identity label, user fingerprints information or user images information.Wherein, user identity label is can the character string (such as ID (identity number) card No.) of identifying user unique identities, the finger print data of user of user fingerprints information for being gathered by fingerprint acquisition device (such as fingerprint sensor), the face image data of user of user images information for being gathered by image collecting device (such as camera).Certain those of ordinary skill in the art should be understood that described subscriber identity information also can be other forms of can identifying user identity and can the information that identifies by host, such as user speech information.
Step S102, verify subscriber identity information, whether judging virtual machine user to log in password, to reset request effective.
Receive the virtual machine user including subscriber identity information log in password reset request after, host is verified the subscriber identity information comprised in this request, judge whether it has replacement authority virtual machine user being logged in password, if had, then judge that the virtual machine user received logs in password and resets request effectively.Such as, when received request for include a certain subscriber identity information to the virtual machine root user of (SuSE) Linux OS log in password reset request time, according to the presets list, host judges whether described subscriber identity information has the replacement authority virtual machine root user of (SuSE) Linux OS being logged in password, if had, then judge that this request is effective.Wherein, record the different classes of subscriber identity information corresponding to each virtual machine that host creates in the presets list.
Step S103, when virtual machine user log in password reset request effective time, get the retouching operation authority to magnetic disk of virtual machine data according to preset mode.
After the virtual machine user judging to include subscriber identity information logs in password replacement request effectively, host obtains the retouching operation authority to magnetic disk of virtual machine data according to preset mode.One of the present embodiment preferred embodiment described in preset mode comprise: send shutdown command to virtual machine, the virtual machine that measures to be checked is when being in off-mode, mount virtual machine disk.
Certain those of ordinary skill in the art should understand, when virtual machine user log in password reset request effective time, if detect that virtual machine is now in off-mode, the above-mentioned step to virtual machine transmission shutdown command can be omitted, and not the present embodiment institute is necessary.
Step S104, the virtual machine user corresponding with subscriber identity information stored logged in password encryption data replace with the virtual machine user backed up when creating complete virtual machine and log in password encryption data in magnetic disk of virtual machine.
Host can be preset a virtual machine user to virtual machine when creating virtual machine and log in password, when virtual machine creating is complete, virtual machine can generate a virtual machine user and log in password encryption data, and this enciphered data is encrypted for logging in password to default virtual machine user the data that computing generates.In this enforcement, the virtual machine user that virtual machine generates when creating complete virtual machine by host logs in password encryption data and backs up.
When user by means of terminal device first game server create corresponding with it virtual machine time, this user adopts default virtual machine to log in password and can enter virtual machine and carry out associative operation, described operation can be log in the virtual machine corresponding with this user the retouching operation that password carries out, and the virtual machine user corresponding to this user that now virtual machine stores logs in password encryption data can by corresponding amendment.
In this enforcement, when user forgets that virtual machine corresponding with it logs in password, host receives the virtual machine user including subscriber identity information and logs in password and reset and ask and after verifying that this request is effective, first host gets the retouching operation authority to magnetic disk of virtual machine data according to preset mode, then the memory location that virtual machine user corresponding with subscriber identity information in magnetic disk of virtual machine logs in password encryption data is searched, and then the data on this memory location are replaced with the virtual machine user backed up when creating complete virtual machine and log in password encryption data.For the virtual machine under (SuSE) Linux OS, the memory location that its root user logs in password encryption data for root inside/etc/shadow file capable.
One of the present embodiment preferred embodiment in, also comprise after step s 104: the default virtual machine user when creating virtual machine is logged in password and logs in password prompt to user as new virtual machine user.Described prompting can be send to the terminal device at user place to include the interface that new virtual machine user logs in password and come, and also can send new virtual machine user according to the user profile that host stores (such as subscriber mailbox) to user and log in password.Like this, user just can log in code entry virtual machine by means of terminal device with new virtual machine user, and then completes and operate with the interactive command of virtual machine.
The present embodiment by judge virtual machine user log in password reset request effective time, the retouching operation authority to magnetic disk of virtual machine data is got according to preset mode, the virtual machine user corresponding with subscriber identity information stored in magnetic disk of virtual machine is logged in password encryption data to replace with the virtual machine user that backs up when creating complete virtual machine and log in password encryption data, realize the replacement that virtual machine user logs in password, consuming time shorter, save the system resource of host, and other user's lack of competence applications reset, virtual machine security can be guaranteed.
Fig. 2 shows the second embodiment of the present invention.
Fig. 2 is that a kind of that second embodiment of the invention provides resets the schematic flow sheet that virtual machine user logs in the method for password.The method can be applicable to can create on the server (i.e. host) of virtual machine.See Fig. 2, details are as follows for the realization flow of described method:
The virtual machine user that step S201, receiving package contain subscriber identity information logs in password and resets request.
Step S202, verify subscriber identity information, whether judging virtual machine user to log in password, to reset request effective.
Step S203, when virtual machine user log in password reset request effective time, get the retouching operation authority to magnetic disk of virtual machine data according to preset mode.
Step S204, the virtual machine user corresponding with described subscriber identity information stored logged in password encryption data replace with the virtual machine user backed up when creating complete virtual machine and log in password encryption data in magnetic disk of virtual machine.
Step S205, generate new virtual machine user and log in password.
Step S206, be used in default virtual machine user when creating virtual machine and log in code entry to virtual machine, virtual machine user is logged in password and reset to described new virtual machine user and log in password.
Step S207, described new virtual machine user is logged in password prompt to user.
In the present embodiment, step S201-step S204 is corresponding identical with the step S101-step S104 in the first embodiment, repeats no more here.
In the present embodiment, host generates new virtual machine user by the password generating algorithm preset and logs in password, and the character string that such as stochastic generation 12 includes numeral, letter and/or special symbol logs in password as new virtual machine user.
After the new virtual machine user of generation logs in password, host sends start-up command to virtual machine, the virtual machine that measures to be checked is when being in open state, be used in default virtual machine user when creating virtual machine and log in code entry to virtual machine, virtual machine user is logged in password and reset to generated new virtual machine user and log in password.For the virtual machine under (SuSE) Linux OS, host resets new virtual machine user by passwd order and logs in password.
The present embodiment by judge virtual machine user log in password reset request effective time, the retouching operation authority to magnetic disk of virtual machine data is got according to preset mode, the virtual machine user corresponding with subscriber identity information stored in magnetic disk of virtual machine is logged in password encryption data to replace with the virtual machine user that backs up when creating complete virtual machine and log in password encryption data, be used in default virtual machine user when creating virtual machine and log in code entry to virtual machine, and then complete replacement virtual machine user being logged in password, consuming time shorter, save the system resource of host, and other user's lack of competence applications reset, virtual machine security can be guaranteed.
Fig. 3 shows the third embodiment of the present invention.
Fig. 3 is that a kind of that third embodiment of the invention provides resets the schematic flow sheet that virtual machine user logs in the method for password.The method can be applicable to can create on the server (i.e. host) of virtual machine.See Fig. 3, details are as follows for the realization flow of described method:
Step S301, sink virtual machine user log in password and reset request, and described request includes subscriber identity information and new virtual machine user logs in password.
Step S302, verify subscriber identity information, whether judging virtual machine user to log in password, to reset request effective.
Step S303, when virtual machine user log in password reset request effective time, get the retouching operation authority to magnetic disk of virtual machine data according to preset mode.
Step S304, the virtual machine user corresponding with described subscriber identity information stored logged in password encryption data replace with the virtual machine user backed up when creating complete virtual machine and log in password encryption data in magnetic disk of virtual machine.
Step S305, be used in default virtual machine user when creating virtual machine and log in code entry to virtual machine, virtual machine user is logged in password and reset to the new virtual machine user comprised in described request and log in password.
In the present embodiment, step S302-step S204 is corresponding identical with the step S102-step S104 in the first embodiment, repeats no more here.
In order to ensure the security of password further, one of the present embodiment preferred embodiment in, receive virtual machine user at host to log in password and reset and ask and after verifying that this request is effective, resolve wherein comprised new virtual machine user and log in password, then this request is deleted, to avoid disabled user, Brute Force is carried out to it.
The present embodiment by judge virtual machine user log in password reset request effective time, the retouching operation authority to magnetic disk of virtual machine data is got according to preset mode, the virtual machine user corresponding with subscriber identity information stored in magnetic disk of virtual machine is logged in password encryption data to replace with the virtual machine user that backs up when creating complete virtual machine and log in password encryption data, be used in default virtual machine user when creating virtual machine and log in code entry to virtual machine, and then complete replacement virtual machine user being logged in password, consuming time shorter, save the system resource of host, and other user's lack of competence applications reset, virtual machine security can be guaranteed, virtual machine can be logged in simultaneously password reset to user to new virtual machine log in password, improve Consumer's Experience.
Fig. 4 shows the fourth embodiment of the present invention.
Fig. 4 is that a kind of that fourth embodiment of the invention provides resets the structural representation that virtual machine user logs in the device of password.See Fig. 4, described device comprises:
Request receiving module 401, the virtual machine user containing subscriber identity information for receiving package logs in password replacement request;
Request judge module 402, for verifying subscriber identity information, judges whether described virtual machine user logs in password replacement request effective;
Authority acquiring module 403, for log in when virtual machine user password reset request effective time, get the retouching operation authority to magnetic disk of virtual machine data according to preset mode;
Crypted password replacement module 404, replaces with the virtual machine user backed up when creating complete virtual machine log in password encryption data for the virtual machine user corresponding with described subscriber identity information stored in magnetic disk of virtual machine being logged in password encryption data.
In the present embodiment, the request receiving module 401 in real time various requests that send of sense terminals equipment, when detected request correspond to virtual machine user log in password reset request time, receive and extract the subscriber identity information comprised in this request.In the present embodiment, described request can be that the replacement virtual machine user from terminal device that the self-service Web page on host receives logs in password request, and described subscriber identity information includes but not limited to: user identity label, user fingerprints information or user images information.Wherein, user identity label is can the character string (such as ID (identity number) card No.) of identifying user unique identities, the finger print data of user of user fingerprints information for being gathered by fingerprint acquisition device (such as fingerprint sensor), the face image data of user of user images information for being gathered by image collecting device (such as camera).Certain those of ordinary skill in the art should be understood that described subscriber identity information also can be other forms of can identifying user identity and can the information that identifies by host, such as user speech information.
Request receiving module 401 receive the virtual machine user including subscriber identity information log in password reset request after, request judge module 402 is verified the subscriber identity information comprised in this request, judge whether it has replacement authority virtual machine user being logged in password, if had, then judge that the virtual machine user received logs in password and resets request effectively.Such as, when the request that request receiving module 401 receives for include a certain subscriber identity information to the virtual machine root user of (SuSE) Linux OS log in password reset request time, according to the presets list, request judge module 402 judges whether described subscriber identity information has the replacement authority virtual machine root user of (SuSE) Linux OS being logged in password, if had, then judge that this request is effective.Wherein, record the different classes of subscriber identity information corresponding to each virtual machine that host creates in the presets list.
After the virtual machine user of asking judge module 402 judgement to include subscriber identity information logs in password replacement request effectively, authority acquiring module 403 obtains the retouching operation authority to magnetic disk of virtual machine data according to preset mode.One of the present embodiment preferred embodiment described in preset mode comprise: send shutdown command to virtual machine, the virtual machine that measures to be checked is when being in off-mode, mount virtual machine disk.
Certain those of ordinary skill in the art should understand, when virtual machine user log in password reset request effective time, if authority acquiring module 403 detects that virtual machine is now in off-mode, the above-mentioned step to virtual machine transmission shutdown command can be omitted, and not the present embodiment institute is necessary.
In this enforcement, when user forgets that virtual machine corresponding with it logs in password, the virtual machine user that request receiving module 401 receiving package contains subscriber identity information logs in password and resets request, after request judge module 402 verifies this request effectively, first authority acquiring module 403 gets the retouching operation authority to magnetic disk of virtual machine data according to preset mode, Crypted password replacement module 404 searches the memory location that virtual machine user corresponding with subscriber identity information in magnetic disk of virtual machine logs in password encryption data, and then the data on this memory location are replaced with the virtual machine user backed up when creating complete virtual machine and log in password encryption data.For the virtual machine under (SuSE) Linux OS, the memory location that its root user logs in password encryption data for root inside/etc/shadow file capable.
One of the present embodiment preferred embodiment in, described device also comprises new password reminding module (not shown), for after Crypted password replacement module 404 executes replacement operation, the default virtual machine user when creating virtual machine is logged in password and logs in password prompt to user as new virtual machine user.Described prompting can be send to the terminal device at user place to include the interface that new virtual machine user logs in password and come, and also can send new virtual machine user according to the user profile that host stores (such as subscriber mailbox) to user and log in password.Like this, user just can log in code entry virtual machine by means of terminal device with new virtual machine user, and then completes and operate with the interactive command of virtual machine.
The present embodiment by judge virtual machine user log in password reset request effective time, the retouching operation authority to magnetic disk of virtual machine data is got according to preset mode, the virtual machine user corresponding with subscriber identity information stored in magnetic disk of virtual machine is logged in password encryption data to replace with the virtual machine user that backs up when creating complete virtual machine and log in password encryption data, realize the replacement that virtual machine user logs in password, consuming time shorter, save the system resource of host, and other user's lack of competence applications reset, virtual machine security can be guaranteed.
Fig. 5 shows the fifth embodiment of the present invention.
Fig. 5 is that a kind of that fifth embodiment of the invention provides resets the structural representation that virtual machine user logs in the device of password.See Fig. 5, described device comprises:
Request receiving module 501, the virtual machine user containing subscriber identity information for receiving package logs in password replacement request;
Request judge module 502, for verifying subscriber identity information, judges whether virtual machine user logs in password replacement request effective;
Authority acquiring module 503, for log in when virtual machine user password reset request effective time, get the retouching operation authority to magnetic disk of virtual machine data according to preset mode;
Crypted password replacement module 504, replaces with the virtual machine user backed up when creating complete virtual machine log in password encryption data for the virtual machine user corresponding with described subscriber identity information stored in magnetic disk of virtual machine being logged in password encryption data;
New password generation module 505, logs in password for generating new virtual machine user;
New password resets module 506, and when creating virtual machine for being used in, default virtual machine user logs in code entry to virtual machine, virtual machine user is logged in password and resets to described new virtual machine user and log in password;
New password reminding module 507, for logging in password prompt to user by described new virtual machine user.
In the present embodiment, request receiving module 501, request judge module 502, authority acquiring module 503, Crypted password replacement module 504 with the request receiving module 401 in the 4th embodiment, ask judge module 402, authority acquiring module 403, Crypted password replacement module 404 corresponding identical, repeat no more here.
In the present embodiment, new password generation module 505 generates new virtual machine user by the password generating algorithm preset and logs in password, and the character string that such as stochastic generation 12 includes numeral, letter and/or special symbol logs in password as new virtual machine user.
Generate after new virtual machine user logs in password at new password generation module 505, new password resets module 506 and sends start-up command to virtual machine, the virtual machine that measures to be checked is when being in open state, be used in default virtual machine user when creating virtual machine and log in code entry to virtual machine, virtual machine user is logged in password and reset to generated new virtual machine user and log in password.For the virtual machine under (SuSE) Linux OS, new password replacement module 506 resets new virtual machine user by passwd order and logs in password.
The present embodiment by judge virtual machine user log in password reset request effective time, the retouching operation authority to magnetic disk of virtual machine data is got according to preset mode, the virtual machine user corresponding with subscriber identity information stored in magnetic disk of virtual machine is logged in password encryption data to replace with the virtual machine user that backs up when creating complete virtual machine and log in password encryption data, be used in default virtual machine user when creating virtual machine and log in code entry to virtual machine, and then complete replacement virtual machine user being logged in password, consuming time shorter, save the system resource of host, and other user's lack of competence applications reset, virtual machine security can be guaranteed.
Fig. 6 shows the sixth embodiment of the present invention.
Fig. 6 is that a kind of that sixth embodiment of the invention provides resets the structural representation that virtual machine user logs in the device of password.See Fig. 6, described device comprises:
Request receiving module 601, log in password for sink virtual machine user and reset request, described request includes subscriber identity information and new virtual machine user logs in password;
Request judge module 602, for verifying subscriber identity information, judges whether virtual machine user logs in password replacement request effective;
Authority acquiring module 603, for log in when virtual machine user password reset request effective time, get the retouching operation authority to magnetic disk of virtual machine data according to preset mode;
Crypted password replacement module 604, replaces with the virtual machine user backed up when creating complete virtual machine log in password encryption data for the virtual machine user corresponding with described subscriber identity information stored in magnetic disk of virtual machine being logged in password encryption data;
New password resets module 605, and when creating virtual machine for being used in, default virtual machine user logs in code entry to virtual machine, virtual machine user is logged in password and resets to the new virtual machine user comprised in described request and log in password.
In the present embodiment, request judge module 602, authority acquiring module 603, Crypted password replacement module 604 and the request judge module 402 in the 4th embodiment, authority acquiring module 403, Crypted password replacement module 404 are corresponding identical, repeat no more here.
In order to ensure the security of password further, one of the present embodiment preferred embodiment in, receive virtual machine user in request receiving module 601 to log in password and reset request and after asking judge module 602 to verify that this request effectively, request judge module 602 is resolved wherein comprised new virtual machine user and is logged in password, then this request is deleted, to avoid disabled user, Brute Force is carried out to it.
The present embodiment by judge virtual machine user log in password reset request effective time, the retouching operation authority to magnetic disk of virtual machine data is got according to preset mode, the virtual machine user corresponding with subscriber identity information stored in magnetic disk of virtual machine is logged in password encryption data to replace with the virtual machine user that backs up when creating complete virtual machine and log in password encryption data, be used in default virtual machine user when creating virtual machine and log in code entry to virtual machine, and then complete replacement virtual machine user being logged in password, consuming time shorter, save the system resource of host, and other user's lack of competence applications reset, virtual machine security can be guaranteed, virtual machine can be logged in simultaneously password reset to user to new virtual machine log in password, improve Consumer's Experience.
Fig. 7 is the structural representation that can be used for the server implementing the present invention program.With reference to figure 7, this server comprises: radio frequency (Radio Frequency, RF) parts such as circuit 701, storer 702, input block 703, display unit 704, sensor 705, voicefrequency circuit 706, Wireless Fidelity (wireless fidelity, WiFi) module 707, processor 708 and power supply 709.It will be understood by those skilled in the art that the server architecture shown in Fig. 7 does not form the restriction to server, the parts more more or less than diagram can be comprised, or combine some parts, or different parts are arranged.
Concrete introduction is carried out below in conjunction with Fig. 7 each component parts to server:
RF circuit 701 can be used for receiving and sending messages or in communication process, the reception of signal and transmission, especially, after being received by the downlink information of base station, process to processor 708; In addition, the up data of design are sent to base station.Usually, RF circuit includes but not limited to antenna, at least one amplifier, transceiver, coupling mechanism, low noise amplifier (Low Noise Amplifier, LNA), diplexer etc.In addition, RF circuit 701 can also by radio communication and network and other devices communicatings.Above-mentioned radio communication can use arbitrary communication standard or agreement, include but not limited to global system for mobile communications (Global System of Mobilecommunication, GSM), general packet radio service (General Packet Radio Service, GPRS), CDMA (Code Division Multiple Access, CDMA), Wideband Code Division Multiple Access (WCDMA) (Wideband Code Division Multiple Access, WCDMA), Long Term Evolution (Long TermEvolution, LTE)), Email, Short Message Service (Short Messaging Service, SMS) etc.
Storer 702 can be used for storing software program and module, and processor 708 is stored in software program and the module of storer 702 by running, thus performs various function application and the data processing of server.Storer 702 mainly can comprise storage program district and store data field, and wherein, storage program district can store operating system, application program (such as sound-playing function, image player function etc.) etc. needed at least one function; Store data field and can store the data (such as voice data, phone directory etc.) etc. created according to the use of server.In addition, storer 702 can comprise high-speed random access memory, can also comprise nonvolatile memory, such as at least one disk memory, flush memory device or other volatile solid-state parts.
Input block 703 can be used for the numeral or the character information that receive input, and generation arranges with the user of server and function controls the input of relevant key signals.Particularly, input block 703 can comprise contact panel 7031 and other input equipments 7032.Contact panel 7031, also referred to as touch-screen, user can be collected or neighbouring touch operation (such as user uses any applicable object or the operations of annex on contact panel 7031 or near contact panel 7031 such as finger, stylus) thereon, and drive corresponding coupling arrangement according to the formula preset.Optionally, contact panel 7031 can comprise touch detecting apparatus and touch controller two parts.Wherein, touch detecting apparatus detects the touch orientation of user, and detects the signal that touch operation brings, and sends signal to touch controller; Touch controller receives touch information from touch detecting apparatus, and converts it to contact coordinate, then gives processor 708, and the order that energy receiving processor 708 is sent also is performed.In addition, the polytypes such as resistance-type, condenser type, infrared ray and surface acoustic wave can be adopted to realize contact panel 7031.Except contact panel 7031, input block 703 can also comprise other input equipments 7032.Particularly, other input equipments 7032 can include but not limited to one or more in physical keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse, control lever etc.
Display unit 704 can be used for the various menus showing information or the information being supplied to user and the server inputted by user.Display unit 704 can comprise display panel 7041, optionally, the forms such as liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode (Organic Light-EmittingDiode, OLED) can be adopted to configure display panel 7041.Further, contact panel 7031 can cover display panel 7041, when contact panel 7031 detects thereon or after neighbouring touch operation, send processor 708 to determine the type of touch event, on display panel 7041, provide corresponding vision to export with preprocessor 708 according to the type of touch event.Although in the figure 7, contact panel 7031 and display panel 7041 be as two independently parts to realize input and the input function of server, but in certain embodiments, can by integrated to contact panel 7031 and display panel 7041 and realize the input and output function of server.
Server also can comprise at least one sensor 705, such as optical sensor, motion sensor and other sensors.Particularly, optical sensor can comprise ambient light sensor and proximity transducer, and wherein, ambient light sensor the light and shade of environmentally light can regulate the brightness of display panel 7041, proximity transducer when server moves in one's ear, can cut out display panel 7041 and/or backlight.As the one of motion sensor, accelerometer sensor can detect the size of all directions (are generally three axles) acceleration, size and the direction of gravity can be detected time static, can be used for the application (such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating) of identified server attitude, Vibration identification correlation function (such as passometer, knock) etc.; As for server also other sensors such as configurable gyroscope, barometer, hygrometer, thermometer, infrared ray sensor, do not repeat them here.
Voicefrequency circuit 706, loudspeaker 710, microphone 711 can provide the audio interface between user and server.Voicefrequency circuit 706 can by receive voice data conversion after electric signal, be transferred to loudspeaker 710, by loudspeaker 710 be converted to voice signal export; On the other hand, the voice signal of collection is converted to electric signal by microphone 711, voice data is converted to after being received by voicefrequency circuit 706, after again voice data output processor 708 being processed, through RF circuit 701 to send to such as another server, or export voice data to storer 702 to process further.
WiFi belongs to short range wireless transmission technology, and server can help user to send and receive e-mail by WiFi module 707, browse webpage and access streaming video etc., and its broadband internet wireless for user provides is accessed.Although Fig. 7 shows WiFi module 707, be understandable that, it does not belong to must forming of server, can omit in the scope of essence not changing invention as required completely.
Processor 708 is control centers of server, utilize the various piece of various interface and the whole server of connection, software program in storer 702 and/or module is stored in by running or performing, and call the data be stored in storer 702, perform various function and the process data of server, thus integral monitoring is carried out to server.Optionally, processor 708 can comprise one or more processing unit; Preferably, processor 708 accessible site application processor and modem processor, wherein, application processor mainly processes operating system, user interface and application program etc., and modem processor mainly processes radio communication.Be understandable that, above-mentioned modem processor also can not be integrated in processor 708.
Server also comprises the power supply 709(such as battery of powering to all parts), preferably, power supply can be connected with processor 708 logic by power-supply management system, thus realizes the functions such as management charging, electric discharge and power managed by power-supply management system.
Although not shown, server can also comprise camera, bluetooth module etc., does not repeat them here.
One of ordinary skill in the art will appreciate that all or part of step realizing above-described embodiment can have been come by hardware, the hardware that also can carry out instruction relevant by program completes, this program can be stored in a computer-readable recording medium, and storage medium can comprise storer, disk or CD etc.
Note, above are only preferred embodiment of the present invention and institute's application technology principle.Skilled person in the art will appreciate that and the invention is not restricted to specific embodiment described here, various obvious change can be carried out for a person skilled in the art, readjust and substitute and can not protection scope of the present invention be departed from.Therefore, although be described in further detail invention has been by above embodiment, the present invention is not limited only to above embodiment, when not departing from the present invention's design, can also comprise other Equivalent embodiments more, and scope of the present invention is determined by appended right.