Specific embodiment
The present invention is described in further detail with reference to the accompanying drawings and examples.It is understood that this place is retouched
The specific embodiment stated is used only for explaining the present invention rather than limiting the invention.It also should be noted that in order to just
In description, only some but not all contents related to the present invention are shown in the drawings.
Fig. 1 shows the first embodiment of the present invention.
Fig. 1 is a kind of process signal of the method for resetting virtual machine user modification logging that first embodiment of the invention provides
Figure.This method can be applied to create on the server (i.e. host) of virtual machine.Referring to Fig. 1, the realization stream of the method
Details are as follows for journey:
Step S101, reception includes the virtual machine user modification logging resetting request of subscriber identity information.
Various requests transmitted by host real-time detection terminal device are used when detected request corresponds to virtual machine
When the resetting request of family modification logging, receives and extract subscriber identity information included in the request.In the present embodiment, described
The received resetting virtual machine user modification logging from terminal device of self-service Web page that can be on host is requested to be asked
It asks, the subscriber identity information includes but is not limited to: user identity label, user fingerprints information or user images information.Wherein,
User identity label is the character string (such as ID card No.) that can be identified for that user's unique identities, and user fingerprints information is to pass through
The finger print data of fingerprint acquisition device (such as fingerprint sensor) user collected, user images information are to pass through Image Acquisition
The face image data of device (such as camera) user collected.Certainly it should be appreciated by those skilled in the art that institute
State subscriber identity information can also by the information that can be identified for that user identity and can be identified by host of other forms, such as
User speech information.
Step S102, subscriber identity information is verified, judges whether the resetting request of virtual machine user modification logging has
Effect.
Receive include subscriber identity information virtual machine user modification logging resetting request after, host asks this
Subscriber identity information included in asking is verified, and judges whether it has the power of the resetting to virtual machine user modification logging
Limit, if so, then judging that the received virtual machine user modification logging resetting request of institute is effective.For example, when received request is
It include a certain subscriber identity information when requesting virtual machine root user's modification logging resetting of (SuSE) Linux OS, place
Host judges whether the subscriber identity information has according to the presets list and steps on to the virtual machine root user of (SuSE) Linux OS
The resetting permission of land password, if so, then judging that the request is effective.Wherein, record what host was created in the presets list
Different classes of subscriber identity information corresponding to each virtual machine.
Step S103, it when the resetting request of virtual machine user modification logging is effective, is got according to preset mode to virtual
The modification operating right of machine data in magnetic disk.
After judgement includes the virtual machine user modification logging resetting request effectively of subscriber identity information, host root
The modification operating right to magnetic disk of virtual machine data is obtained according to preset mode.In a preferred embodiment of the present embodiment
Described in preset mode include: to send shutdown command to virtual machine, to be checked when measuring virtual machine and being in off-mode, mount virtual
Machine disk.
Certainly it should be appreciated by those skilled in the art that when the resetting request of virtual machine user modification logging is effective, such as
Fruit detects that virtual machine has been in off-mode at this time, and above-mentioned the step of sending shutdown command to virtual machine can be omitted, and
Non- the present embodiment institute is necessary.
Step S104, the virtual machine user modification logging corresponding with subscriber identity information that will be stored in magnetic disk of virtual machine
Encryption data replaces with the virtual machine user modification logging encryption data backed up when creation finishes virtual machine.
Host can preset a virtual machine user modification logging when creating virtual machine to virtual machine, to virtual machine creating
Virtual machine can generate a virtual machine user modification logging encryption data when finishing, which is to default virtual machine
User's modification logging carries out cryptographic calculation data generated.In this embodiment, host will be empty when creation finishes virtual machine
Quasi- machine virtual machine user modification logging encryption data generated is backed up.
When user is by means of the terminal device corresponding virtual machine that game server is created for the first time, which is adopted
Virtual machine can be entered with default virtual machine modification logging and carry out relevant operation, it is described operate can be to the user couple
The modification operation that the virtual machine modification logging answered carries out, the virtual machine user corresponding with the user that virtual machine is stored at this time are stepped on
Password encryption data in land can be modified accordingly.
In this embodiment, when user forgets corresponding virtual machine modification logging, host is received comprising useful
Family identity information virtual machine user modification logging resetting request and verify the request it is effective after, host according to preset mode head
The modification operating right to magnetic disk of virtual machine data is first got, is then searched opposite with subscriber identity information in magnetic disk of virtual machine
The storage location for the virtual machine user modification logging encryption data answered, and then the data in the storage location are replaced with and are being created
The virtual machine user modification logging encryption data backed up when finishing virtual machine.For the virtual machine under (SuSE) Linux OS,
The storage location of root user's modification logging encryption data is /etc/shadow file the inside root row.
In a preferred embodiment of the present embodiment, after step s 104 further include: will be in creation virtual machine
When default virtual machine user modification logging as new virtual machine user modification logging be prompted to user.The prompt can be with
It is to be completed to the terminal device transmission where user includes the interface of new virtual machine user modification logging, it can also be according to place
The user information (such as subscriber mailbox) stored on host sends new virtual machine user modification logging to user.In this way, user
Virtual machine can be logged in new virtual machine user modification logging by means of terminal device, and then complete the interaction with virtual machine
Command operation.
When the present embodiment is by judge that the resetting of virtual machine user modification logging requests effective, got pair according to preset mode
The modification operating right of magnetic disk of virtual machine data, the virtual machine corresponding with subscriber identity information that will be stored in magnetic disk of virtual machine
User's modification logging encryption data replaces with the virtual machine user modification logging backed up when creation finishes virtual machine and encrypts number
According to, it is time-consuming shorter to realize the resetting of virtual machine user modification logging, save the system resource of host, and other users
Lack of competence application resetting, virtual machine security can be guaranteed.
Fig. 2 shows the second embodiment of the present invention.
Fig. 2 is a kind of process signal of the method for resetting virtual machine user modification logging that second embodiment of the invention provides
Figure.This method can be applied to create on the server (i.e. host) of virtual machine.Referring to fig. 2, the realization stream of the method
Details are as follows for journey:
Step S201, reception includes the virtual machine user modification logging resetting request of subscriber identity information.
Step S202, subscriber identity information is verified, judges whether the resetting request of virtual machine user modification logging has
Effect.
Step S203, it when the resetting request of virtual machine user modification logging is effective, is got according to preset mode to virtual
The modification operating right of machine data in magnetic disk.
Step S204, the virtual machine user corresponding with the subscriber identity information stored in magnetic disk of virtual machine is logged in
Password encryption data replace with the virtual machine user modification logging encryption data backed up when creation finishes virtual machine.
Step S205, new virtual machine user modification logging is generated.
Step S206, virtual machine is logged on to using virtual machine user modification logging default when creating virtual machine, it will
Virtual machine user modification logging resets to the new virtual machine user modification logging.
Step S207, the new virtual machine user modification logging is prompted to user.
In the present embodiment, step S201- step S204 phase corresponding with the step S101- step S104 in first embodiment
Together, which is not described herein again.
In the present embodiment, host can be generated by preset password generation algorithm new virtual machine user log in it is close
Code, such as random generation 12 include that digital, alphabetical and/or additional character character string is logged in as new virtual machine user
Password.
After generating new virtual machine user modification logging, host sends power-on instruction to virtual machine, to be checked to measure void
When quasi- machine is in open state, virtual machine is logged on to using virtual machine user modification logging default when creating virtual machine,
Virtual machine user modification logging is reset into new virtual machine user modification logging generated.For under (SuSE) Linux OS
Virtual machine, host can reset new virtual machine user modification logging by passwd order.
When the present embodiment is by judge that the resetting of virtual machine user modification logging requests effective, got pair according to preset mode
The modification operating right of magnetic disk of virtual machine data, the virtual machine corresponding with subscriber identity information that will be stored in magnetic disk of virtual machine
User's modification logging encryption data replaces with the virtual machine user modification logging backed up when creation finishes virtual machine and encrypts number
According to logging on to virtual machine using virtual machine user modification logging default when creating virtual machine, and then complete to virtual machine
The resetting of user's modification logging, it is time-consuming shorter, the system resource of host is saved, and other users lack of competence application is reset,
Virtual machine security can be guaranteed.
Fig. 3 shows the third embodiment of the present invention.
Fig. 3 is a kind of process signal of the method for resetting virtual machine user modification logging that third embodiment of the invention provides
Figure.This method can be applied to create on the server (i.e. host) of virtual machine.Referring to Fig. 3, the realization stream of the method
Details are as follows for journey:
Step S301, receive virtual machine user modification logging resetting request, the request packet contain subscriber identity information and
New virtual machine user modification logging.
Step S302, subscriber identity information is verified, judges whether the resetting request of virtual machine user modification logging has
Effect.
Step S303, it when the resetting request of virtual machine user modification logging is effective, is got according to preset mode to virtual
The modification operating right of machine data in magnetic disk.
Step S304, the virtual machine user corresponding with the subscriber identity information stored in magnetic disk of virtual machine is logged in
Password encryption data replace with the virtual machine user modification logging encryption data backed up when creation finishes virtual machine.
Step S305, virtual machine is logged on to using virtual machine user modification logging default when creating virtual machine, it will
Virtual machine user modification logging resets to virtual machine user modification logging new included in the request.
In the present embodiment, step S302- step S204 phase corresponding with the step S102- step S104 in first embodiment
Together, which is not described herein again.
In order to further ensure the safety of password, in a preferred embodiment of the present embodiment, in host
Receive the resetting of virtual machine user modification logging request and verify the request it is effective after, parse new virtual machine included in it
User's modification logging then deletes the request, carries out Brute Force to it to avoid illegal user.
When the present embodiment is by judge that the resetting of virtual machine user modification logging requests effective, got pair according to preset mode
The modification operating right of magnetic disk of virtual machine data, the virtual machine corresponding with subscriber identity information that will be stored in magnetic disk of virtual machine
User's modification logging encryption data replaces with the virtual machine user modification logging backed up when creation finishes virtual machine and encrypts number
According to logging on to virtual machine using virtual machine user modification logging default when creating virtual machine, and then complete to virtual machine
The resetting of user's modification logging, it is time-consuming shorter, the system resource of host is saved, and other users lack of competence application is reset,
Virtual machine security can be guaranteed, at the same virtual machine modification logging can be reset to user to new virtual machine step on
Land password, improves user experience.
Fig. 4 shows the fourth embodiment of the present invention.
Fig. 4 is a kind of structural representation of the device for resetting virtual machine user modification logging that fourth embodiment of the invention provides
Figure.Referring to fig. 4, described device includes:
Request receiving module 401, for receive include subscriber identity information virtual machine user modification logging resetting ask
It asks;
Judgment module 402 is requested to judge the virtual machine user modification logging for verifying to subscriber identity information
Whether resetting request is effective;
Authority acquiring module 403, for being obtained according to preset mode when the resetting request of virtual machine user modification logging is effective
Get the modification operating right to magnetic disk of virtual machine data;
Crypted password replacement module 404, for corresponding with the subscriber identity information by what is stored in magnetic disk of virtual machine
Virtual machine user modification logging encryption data replace with the virtual machine user that is backed up when creation finishes virtual machine log in it is close
Code encryption data.
In the present embodiment, various requests transmitted by 401 real-time detection terminal device of request receiving module, when being detected
To request correspond to virtual machine user modification logging resetting request when, receive and extract user identity included in the request
Information.In the present embodiment, the request can be the received resetting from terminal device of self-service Web page on host
The request of virtual machine user modification logging, the subscriber identity information includes but is not limited to: user identity label, user fingerprints information
Or user images information.Wherein, user identity label is character string (such as the identification card number that can be identified for that user's unique identities
Code), user fingerprints information is the finger print data by fingerprint acquisition device (such as fingerprint sensor) user collected, user
Image information is the face image data by image collecting device (such as camera) user collected.Certain this field
One of ordinary skill appreciates that the subscriber identity information can also for other forms can be identified for that user identity and can be by place
The information that host is identified, such as user speech information.
Request receiving module 401 receive include subscriber identity information virtual machine user modification logging resetting request
Afterwards, request judgment module 402 verifies subscriber identity information included in the request, judges whether it has to virtual
The resetting permission of machine user's modification logging, if so, then judging that the received virtual machine user modification logging resetting request of institute is effective.
For example, when 401 received request of request receiving module is to include a certain subscriber identity information to (SuSE) Linux OS
When the resetting request of virtual machine root user's modification logging, judgment module 402 is requested to judge the user identity according to the presets list
Whether information has the resetting permission to virtual machine root user's modification logging of (SuSE) Linux OS, if so, then judgement should
Request is effective.Wherein, user's body different classes of corresponding to each virtual machine that host is created is record in the presets list
Part information.
Have in the virtual machine user modification logging resetting request that the request judgement of judgment module 402 includes subscriber identity information
After effect, authority acquiring module 403 obtains the modification operating right to magnetic disk of virtual machine data according to preset mode.In this reality
Applying preset mode described in a preferred embodiment of example includes: to send shutdown command to virtual machine, to be checked to measure virtually
When machine is in off-mode, mount virtual machine disk.
Certainly it should be appreciated by those skilled in the art that when the resetting request of virtual machine user modification logging is effective, such as
Fruit authority acquiring module 403 detects that virtual machine has been in off-mode at this time, above-mentioned to send shutdown command to virtual machine
Step can be omitted, and not the present embodiment institute is necessary.
In this embodiment, when user forgets corresponding virtual machine modification logging, request receiving module 401 receives packet
Virtual machine user modification logging containing subscriber identity information resets request, and it is effective to verify the request in request judgment module 402
Afterwards, authority acquiring module 403 gets the modification operating right to magnetic disk of virtual machine data according to preset mode first, encrypts close
Code replacement module 404 searches virtual machine user modification logging encryption data corresponding with subscriber identity information in magnetic disk of virtual machine
Storage location, and then the data in the storage location are replaced with into the virtual machine user that is backed up when creation finishes virtual machine
Modification logging encryption data.For the virtual machine under (SuSE) Linux OS, the storage of root user's modification logging encryption data
Position is /etc/shadow file the inside root row.
In a preferred embodiment of the present embodiment, described device further includes that new password cue module (is not shown
Out), for after Crypted password replacement module 404 has executed replacement operation, will when creating virtual machine default virtual machine
User's modification logging is prompted to user as new virtual machine user modification logging.The prompt can be to the end where user
End equipment transmission includes the interface of new virtual machine user modification logging to complete, can also be according to the user stored on host
Information (such as subscriber mailbox) sends new virtual machine user modification logging to user.In this way, user can be by means of terminal
Equipment logs in virtual machine with new virtual machine user modification logging, and then completes to operate with the interactive command of virtual machine.
When the present embodiment is by judge that the resetting of virtual machine user modification logging requests effective, got pair according to preset mode
The modification operating right of magnetic disk of virtual machine data, the virtual machine corresponding with subscriber identity information that will be stored in magnetic disk of virtual machine
User's modification logging encryption data replaces with the virtual machine user modification logging backed up when creation finishes virtual machine and encrypts number
According to, it is time-consuming shorter to realize the resetting of virtual machine user modification logging, save the system resource of host, and other users
Lack of competence application resetting, virtual machine security can be guaranteed.
Fig. 5 shows the fifth embodiment of the present invention.
Fig. 5 is a kind of structural representation of the device for resetting virtual machine user modification logging that fifth embodiment of the invention provides
Figure.Referring to Fig. 5, described device includes:
Request receiving module 501, for receive include subscriber identity information virtual machine user modification logging resetting ask
It asks;
Judgment module 502 is requested, for verifying to subscriber identity information, judges that virtual machine user modification logging is reset
It whether effective requests;
Authority acquiring module 503, for being obtained according to preset mode when the resetting request of virtual machine user modification logging is effective
Get the modification operating right to magnetic disk of virtual machine data;
Crypted password replacement module 504, for corresponding with the subscriber identity information by what is stored in magnetic disk of virtual machine
Virtual machine user modification logging encryption data replace with the virtual machine user that is backed up when creation finishes virtual machine log in it is close
Code encryption data;
New password generation module 505, for generating new virtual machine user modification logging;
New password resets module 506, for using the default virtual machine user modification logging when creating virtual machine to step on
Virtual machine user modification logging is reset to the new virtual machine user modification logging to virtual machine by land;
New password cue module 507, for the new virtual machine user modification logging to be prompted to user.
In the present embodiment, request receiving module 501, request judgment module 502, authority acquiring module 503, Crypted password are replaced
Change the mold request receiving module 401, request judgment module 402, the authority acquiring module 403, encryption in block 504 and fourth embodiment
The correspondence of password replacement module 404 is identical, and which is not described herein again.
In the present embodiment, new password generation module 505 can be generated new virtual by preset password generation algorithm
Machine user's modification logging, such as random generation 12 include the character string of number, letter and/or additional character as new void
Quasi- machine user modification logging.
After generating new virtual machine user modification logging in new password generation module 505, new password resets module 506 to void
Quasi- machine sends power-on instruction, to be checked when measuring virtual machine and be in open state, using when creating virtual machine it is default virtually
Machine user's modification logging logs on to virtual machine, and virtual machine user modification logging is reset to new virtual machine user generated and is stepped on
Land password.For the virtual machine under (SuSE) Linux OS, new password resetting module 506 can be reset newly by passwd order
Virtual machine user modification logging.
When the present embodiment is by judge that the resetting of virtual machine user modification logging requests effective, got pair according to preset mode
The modification operating right of magnetic disk of virtual machine data, the virtual machine corresponding with subscriber identity information that will be stored in magnetic disk of virtual machine
User's modification logging encryption data replaces with the virtual machine user modification logging backed up when creation finishes virtual machine and encrypts number
According to logging on to virtual machine using virtual machine user modification logging default when creating virtual machine, and then complete to virtual machine
The resetting of user's modification logging, it is time-consuming shorter, the system resource of host is saved, and other users lack of competence application is reset,
Virtual machine security can be guaranteed.
Fig. 6 shows the sixth embodiment of the present invention.
Fig. 6 is a kind of structural representation of the device for resetting virtual machine user modification logging that sixth embodiment of the invention provides
Figure.Referring to Fig. 6, described device includes:
Request receiving module 601, for receiving the resetting request of virtual machine user modification logging, the request packet contains user
Identity information and new virtual machine user modification logging;
Judgment module 602 is requested, for verifying to subscriber identity information, judges that virtual machine user modification logging is reset
It whether effective requests;
Authority acquiring module 603, for being obtained according to preset mode when the resetting request of virtual machine user modification logging is effective
Get the modification operating right to magnetic disk of virtual machine data;
Crypted password replacement module 604, for corresponding with the subscriber identity information by what is stored in magnetic disk of virtual machine
Virtual machine user modification logging encryption data replace with the virtual machine user that is backed up when creation finishes virtual machine log in it is close
Code encryption data;
New password resets module 605, for using the default virtual machine user modification logging when creating virtual machine to step on
Land to virtual machine, by virtual machine user modification logging reset to virtual machine user new included in the request log in it is close
Code.
In the present embodiment, judgment module 602, authority acquiring module 603, Crypted password replacement module 604 and the 4th are requested
Request judgment module 402, authority acquiring module 403, the correspondence of Crypted password replacement module 404 in embodiment is identical, here not
It repeats again.
In order to further ensure the safety of password connects in a preferred embodiment of the present embodiment in request
After receipts module 601 receives virtual machine user modification logging resetting request and requests the verifying of judgment module 602 request effective,
It requests judgment module 602 to parse new virtual machine user modification logging included in it, then deletes the request, with
Illegal user is avoided to carry out Brute Force to it.
When the present embodiment is by judge that the resetting of virtual machine user modification logging requests effective, got pair according to preset mode
The modification operating right of magnetic disk of virtual machine data, the virtual machine corresponding with subscriber identity information that will be stored in magnetic disk of virtual machine
User's modification logging encryption data replaces with the virtual machine user modification logging backed up when creation finishes virtual machine and encrypts number
According to logging on to virtual machine using virtual machine user modification logging default when creating virtual machine, and then complete to virtual machine
The resetting of user's modification logging, it is time-consuming shorter, the system resource of host is saved, and other users lack of competence application is reset,
Virtual machine security can be guaranteed, at the same virtual machine modification logging can be reset to user to new virtual machine step on
Land password, improves user experience.
Fig. 7 is the structural schematic diagram that can be used for implementing the server of the present invention program.With reference to Fig. 7, which includes: to penetrate
Frequently (Radio Frequency, RF) circuit 701, memory 702, input unit 703, display unit 704, sensor 705, sound
The portions such as frequency circuit 706, Wireless Fidelity (wireless fidelity, WiFi) module 707, processor 708 and power supply 709
Part.It will be understood by those skilled in the art that server architecture shown in Fig. 7 does not constitute the restriction to server, can wrap
It includes than illustrating more or fewer components, perhaps combines certain components or different component layouts.
It is specifically introduced below with reference to each component parts of the Fig. 7 to server:
RF circuit 701 can be used for receiving and sending messages or communication process in, signal sends and receivees, particularly, by base station
After downlink information receives, handled to processor 708;In addition, the data for designing uplink are sent to base station.In general, RF circuit packet
Include but be not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier (Low Noise
Amplifier, LNA), duplexer etc..In addition, RF circuit 701 can also be communicated with network and other equipment by wireless communication.
Any communication standard or agreement, including but not limited to global system for mobile communications (Global can be used in above-mentioned wireless communication
System of Mobile communication, GSM), general packet radio service (General Packet Radio
Service, GPRS), CDMA (Code Division Multiple Access, CDMA), wideband code division multiple access
(Wideband Code Division Multiple Access, WCDMA), long term evolution (Long Term Evolution,
LTE)), Email, short message service (Short Messaging Service, SMS) etc..
Memory 702 can be used for storing software program and module, and processor 708 is stored in memory 702 by operation
Software program and module, thereby executing the various function application and data processing of server.Memory 702 can be wrapped mainly
Include storing program area and storage data area, wherein storing program area can application needed for storage program area, at least one function
Program (such as sound-playing function, image player function etc.) etc.;Storage data area can be stored is created according to using for server
Data (such as audio data, phone directory etc.) built etc..In addition, memory 702 may include high-speed random access memory, also
It may include nonvolatile memory, a for example, at least disk memory, flush memory device or the storage of other volatile solid-states
Device.
Input unit 703 can be used for receiving the number or character information of input, and generate the user setting with server
And the related key signals input of function control.Specifically, input unit 703 may include touch panel 7031 and other inputs
Equipment 7032.Touch panel 7031, also referred to as touch screen collect touch operation (such as the user of user on it or nearby
Use the behaviour of any suitable object or attachment such as finger, stylus on touch panel 7031 or near touch panel 7031
Make), and corresponding attachment device is driven according to preset formula.Optionally, touch panel 7031 may include touch detection
Two parts of device and touch controller.Wherein, the touch orientation of touch detecting apparatus detection user, and detect touch operation band
The signal come, transmits a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and by it
It is converted into contact coordinate, then gives processor 708, and order that processor 708 is sent can be received and executed.In addition, can
To realize touch panel 7031 using multiple types such as resistance-type, condenser type, infrared ray and surface acoustic waves.In addition to touch panel
7031, input unit 703 can also include other input equipments 7032.Specifically, other input equipments 7032 may include but
One be not limited in physical keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse, operating stick etc.
Kind is a variety of.
Display unit 704 can be used for showing information input by user or be supplied to user information and server it is each
Kind menu.Display unit 704 may include display panel 7041, optionally, can use liquid crystal display (Liquid Crystal
Display, LCD), the forms such as Organic Light Emitting Diode (Organic Light-Emitting Diode, OLED) it is aobvious to configure
Show panel 7041.Further, touch panel 7031 can cover display panel 7041, when touch panel 7031 detects on it
Or after neighbouring touch operation, processor 708 is sent to determine the type of touch event, is followed by subsequent processing device 708 according to touch
The type of event provides corresponding visual output on display panel 7041.Although in Fig. 7, touch panel 7031 and display surface
Plate 7041 is the input and input function for realizing server as two independent components, but in certain embodiments, it can
That server is realized so that touch panel 7031 and display panel 7041 is integrated outputs and inputs function.
Server may also include at least one sensor 705, such as optical sensor, motion sensor and other sensings
Device.Specifically, optical sensor may include ambient light sensor and proximity sensor, wherein ambient light sensor can be according to environment
The light and shade of light adjusts the brightness of display panel 7041, and proximity sensor can close display when server is moved in one's ear
Panel 7041 and/or backlight.As a kind of motion sensor, accelerometer sensor can detect (generally three in all directions
Axis) acceleration size, can detect that size and the direction of gravity when static, can be used to identify server posture application (ratio
Such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap);Extremely
In other sensors such as gyroscope, barometer, hygrometer, thermometer, the infrared sensors that server can also configure, herein not
It repeats again.
Voicefrequency circuit 706, loudspeaker 710, microphone 711 can provide the audio interface between user and server.Audio
Electric signal after the audio data received conversion can be transferred to loudspeaker 710, be converted to sound by loudspeaker 710 by circuit 706
Sound signal output;On the other hand, the voice signal of collection is converted to electric signal by microphone 711, after being received by voicefrequency circuit 706
Audio data is converted to, then by after the processing of audio data output processor 708, such as another clothes are sent to through RF circuit 701
Business device, or audio data is exported to memory 702 to be further processed.
WiFi belongs to short range wireless transmission technology, and server can help user's transceiver electronics by WiFi module 707
Mail, browsing webpage and access streaming video etc., it provides wireless broadband internet access for user.Although Fig. 7 is shown
WiFi module 707, but it is understood that, and it is not belonging to must be configured into for server, it can according to need completely
Do not change in the range of the essence of invention and omits.
Processor 708 is the control centre of server, utilizes each portion of various interfaces and the entire server of connection
Point, by running or execute the software program and/or module that are stored in memory 702, and calls and be stored in memory 702
Interior data, the various functions and processing data of execute server, to carry out integral monitoring to server.Optionally, it handles
Device 708 may include one or more processing units;Preferably, processor 708 can integrate application processor and modulation /demodulation processing
Device, wherein the main processing operation system of application processor, user interface and application program etc., modem processor is mainly located
Reason wireless communication.It is understood that above-mentioned modem processor can not also be integrated into processor 708.
Server further includes the power supply 709(such as battery powered to all parts), it is preferred that power supply can pass through power supply
Management system and processor 708 are logically contiguous, to realize management charging, electric discharge and power consumption pipe by power-supply management system
The functions such as reason.
Although being not shown, server can also include camera, bluetooth module etc., and details are not described herein.
Those of ordinary skill in the art will appreciate that realizing that all or part of the steps of above-described embodiment can pass through hardware
It completes, relevant hardware can also be instructed to complete by program, which can store in a computer-readable storage medium
In matter, storage medium may include memory, disk or CD etc..
Note that the above is only a better embodiment of the present invention and the applied technical principle.It will be appreciated by those skilled in the art that
The invention is not limited to the specific embodiments described herein, be able to carry out for a person skilled in the art it is various it is apparent variation,
It readjusts and substitutes without departing from protection scope of the present invention.Therefore, although being carried out by above embodiments to the present invention
It is described in further detail, but the present invention is not limited to the above embodiments only, without departing from the inventive concept, also
It may include more other equivalent embodiments, and the scope of the invention is determined by the scope of the appended claims.