CN104424431B - A kind of method and device resetting virtual machine user modification logging - Google Patents

A kind of method and device resetting virtual machine user modification logging Download PDF

Info

Publication number
CN104424431B
CN104424431B CN201310390519.0A CN201310390519A CN104424431B CN 104424431 B CN104424431 B CN 104424431B CN 201310390519 A CN201310390519 A CN 201310390519A CN 104424431 B CN104424431 B CN 104424431B
Authority
CN
China
Prior art keywords
virtual machine
modification logging
machine user
user modification
resetting
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310390519.0A
Other languages
Chinese (zh)
Other versions
CN104424431A (en
Inventor
胡兴华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Tencent Cloud Computing Beijing Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201310390519.0A priority Critical patent/CN104424431B/en
Priority to PCT/CN2014/084891 priority patent/WO2015027852A1/en
Publication of CN104424431A publication Critical patent/CN104424431A/en
Application granted granted Critical
Publication of CN104424431B publication Critical patent/CN104424431B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2131Lost password, e.g. recovery of lost or forgotten passwords

Abstract

The invention discloses a kind of method and devices for resetting virtual machine user modification logging, which comprises reception includes the virtual machine user modification logging resetting request of subscriber identity information;Subscriber identity information is verified, judges whether the resetting request of virtual machine user modification logging is effective;When the resetting request of virtual machine user modification logging is effective, the modification operating right to magnetic disk of virtual machine data is got according to preset mode;The virtual machine user modification logging encryption data corresponding with subscriber identity information stored in magnetic disk of virtual machine is replaced with to the virtual machine user modification logging encryption data backed up when creation finishes virtual machine.It can be realized the resetting of virtual machine user modification logging through the invention, it is time-consuming shorter, the system resource of host is saved, and other users lack of competence application is reset, virtual machine security can be guaranteed.

Description

A kind of method and device resetting virtual machine user modification logging
Technical field
The present invention relates to field of computer technology, and in particular to field of information security technology more particularly to a kind of resetting are empty The method and device of quasi- machine user modification logging.
Background technique
Currently, purchase virtual machine installation software server (host) can create one or more be equipped with log in it is close The virtual machine of code.For the same virtual machine that server is created, user can input password by means of terminal device to log in The virtual machine carries out a series of interactive command operation with the virtual machine, and different classes of user is to resource text on the virtual machine The operating right of part is different.Take up an official post for example, the virtual machine root user under Linux or Unix operating system possesses to the virtual machine The increasing of what resource file, the operation deleting, change, looking into.However, once user has forgotten corresponding virtual machine modification logging, then Relevant operation can not be disposed by means of virtual machine that terminal device game server is created.
For this purpose, existing technology usually solves problem above by two ways.First way are as follows: server is again Create a virtual machine corresponding with the user;The second way are as follows: server restarts void corresponding with the user The AD HOC of quasi- machine, resets virtual machine entry password.
In the research and practice process to the prior art, the inventor finds that the existing technology has at least the following problems: on The first way consumption a large amount of system resource of host is stated, and is taken a long time, there are loss of data phenomenons;Above-mentioned second Mode can make any user enter the AD HOC of virtual machine corresponding with the user by means of terminal device to set again Virtual machine entry password is set, and then the safety of virtual machine cannot be guaranteed, such as virtual under (SuSE) Linux OS Machine, non-root user can enter the single mode of the virtual machine by means of terminal device, to reset and root user's phase Corresponding virtual machine modification logging and the permission for obtaining super keepe account.
Summary of the invention
In view of this, the embodiment of the present invention provides a kind of method and device for resetting virtual machine user modification logging, to solve The technical issues of certainly background section above is mentioned.
On the one hand, the embodiment of the invention provides a kind of method for resetting virtual machine user modification logging, the method packets It includes:
Reception includes the virtual machine user modification logging resetting request of subscriber identity information;
The subscriber identity information is verified, judges whether the virtual machine user modification logging resetting request has Effect;
When virtual machine user modification logging resetting request is effective, got according to preset mode to magnetic disk of virtual machine The modification operating right of data;
The virtual machine user modification logging corresponding with the subscriber identity information stored in magnetic disk of virtual machine is encrypted Data replace with the virtual machine user modification logging encryption data backed up when creation finishes virtual machine.
On the one hand, the embodiment of the present invention also proposed a kind of device for resetting virtual machine user modification logging, described device Include:
Request receiving module, for receive include subscriber identity information virtual machine user modification logging resetting request;
Request judgment module that it is close to judge that the virtual machine user logs in for verifying to the subscriber identity information Whether code resetting request is effective;
Authority acquiring module is used for when virtual machine user modification logging resetting request is effective, according to preset mode Get the modification operating right to magnetic disk of virtual machine data;
Crypted password replacement module, the void corresponding with the subscriber identity information for will be stored in magnetic disk of virtual machine Quasi- machine user modification logging encryption data replaces with the virtual machine user modification logging backed up when creation finishes virtual machine and adds Ciphertext data.
A kind of method and device for resetting virtual machine user modification logging that the embodiment of the present invention proposes has a characteristic that When by judging that the resetting request of virtual machine user modification logging is effective, got according to preset mode to magnetic disk of virtual machine data Operating right is modified, the virtual machine user modification logging corresponding with subscriber identity information stored in magnetic disk of virtual machine is encrypted Data replace with the virtual machine user modification logging encryption data backed up when creation finishes virtual machine, to realize that virtual machine is used The resetting of family modification logging, it is time-consuming shorter, the system resource of host is saved, and other users lack of competence application is reset, it is empty Quasi- machine security performance accesses guarantee.
Detailed description of the invention
Fig. 1 is a kind of process signal of the method for resetting virtual machine user modification logging that first embodiment of the invention provides Figure;
Fig. 2 is a kind of process signal of the method for resetting virtual machine user modification logging that second embodiment of the invention provides Figure;
Fig. 3 is a kind of process signal of the method for resetting virtual machine user modification logging that third embodiment of the invention provides Figure;
Fig. 4 is a kind of structural representation of the device for resetting virtual machine user modification logging that fourth embodiment of the invention provides Figure;
Fig. 5 is a kind of structural representation of the device for resetting virtual machine user modification logging that fifth embodiment of the invention provides Figure;
Fig. 6 is a kind of structural representation of the device for resetting virtual machine user modification logging that sixth embodiment of the invention provides Figure;
Fig. 7 is the structural schematic diagram that can be used for implementing the terminal device of the present invention program.
Specific embodiment
The present invention is described in further detail with reference to the accompanying drawings and examples.It is understood that this place is retouched The specific embodiment stated is used only for explaining the present invention rather than limiting the invention.It also should be noted that in order to just In description, only some but not all contents related to the present invention are shown in the drawings.
Fig. 1 shows the first embodiment of the present invention.
Fig. 1 is a kind of process signal of the method for resetting virtual machine user modification logging that first embodiment of the invention provides Figure.This method can be applied to create on the server (i.e. host) of virtual machine.Referring to Fig. 1, the realization stream of the method Details are as follows for journey:
Step S101, reception includes the virtual machine user modification logging resetting request of subscriber identity information.
Various requests transmitted by host real-time detection terminal device are used when detected request corresponds to virtual machine When the resetting request of family modification logging, receives and extract subscriber identity information included in the request.In the present embodiment, described The received resetting virtual machine user modification logging from terminal device of self-service Web page that can be on host is requested to be asked It asks, the subscriber identity information includes but is not limited to: user identity label, user fingerprints information or user images information.Wherein, User identity label is the character string (such as ID card No.) that can be identified for that user's unique identities, and user fingerprints information is to pass through The finger print data of fingerprint acquisition device (such as fingerprint sensor) user collected, user images information are to pass through Image Acquisition The face image data of device (such as camera) user collected.Certainly it should be appreciated by those skilled in the art that institute State subscriber identity information can also by the information that can be identified for that user identity and can be identified by host of other forms, such as User speech information.
Step S102, subscriber identity information is verified, judges whether the resetting request of virtual machine user modification logging has Effect.
Receive include subscriber identity information virtual machine user modification logging resetting request after, host asks this Subscriber identity information included in asking is verified, and judges whether it has the power of the resetting to virtual machine user modification logging Limit, if so, then judging that the received virtual machine user modification logging resetting request of institute is effective.For example, when received request is It include a certain subscriber identity information when requesting virtual machine root user's modification logging resetting of (SuSE) Linux OS, place Host judges whether the subscriber identity information has according to the presets list and steps on to the virtual machine root user of (SuSE) Linux OS The resetting permission of land password, if so, then judging that the request is effective.Wherein, record what host was created in the presets list Different classes of subscriber identity information corresponding to each virtual machine.
Step S103, it when the resetting request of virtual machine user modification logging is effective, is got according to preset mode to virtual The modification operating right of machine data in magnetic disk.
After judgement includes the virtual machine user modification logging resetting request effectively of subscriber identity information, host root The modification operating right to magnetic disk of virtual machine data is obtained according to preset mode.In a preferred embodiment of the present embodiment Described in preset mode include: to send shutdown command to virtual machine, to be checked when measuring virtual machine and being in off-mode, mount virtual Machine disk.
Certainly it should be appreciated by those skilled in the art that when the resetting request of virtual machine user modification logging is effective, such as Fruit detects that virtual machine has been in off-mode at this time, and above-mentioned the step of sending shutdown command to virtual machine can be omitted, and Non- the present embodiment institute is necessary.
Step S104, the virtual machine user modification logging corresponding with subscriber identity information that will be stored in magnetic disk of virtual machine Encryption data replaces with the virtual machine user modification logging encryption data backed up when creation finishes virtual machine.
Host can preset a virtual machine user modification logging when creating virtual machine to virtual machine, to virtual machine creating Virtual machine can generate a virtual machine user modification logging encryption data when finishing, which is to default virtual machine User's modification logging carries out cryptographic calculation data generated.In this embodiment, host will be empty when creation finishes virtual machine Quasi- machine virtual machine user modification logging encryption data generated is backed up.
When user is by means of the terminal device corresponding virtual machine that game server is created for the first time, which is adopted Virtual machine can be entered with default virtual machine modification logging and carry out relevant operation, it is described operate can be to the user couple The modification operation that the virtual machine modification logging answered carries out, the virtual machine user corresponding with the user that virtual machine is stored at this time are stepped on Password encryption data in land can be modified accordingly.
In this embodiment, when user forgets corresponding virtual machine modification logging, host is received comprising useful Family identity information virtual machine user modification logging resetting request and verify the request it is effective after, host according to preset mode head The modification operating right to magnetic disk of virtual machine data is first got, is then searched opposite with subscriber identity information in magnetic disk of virtual machine The storage location for the virtual machine user modification logging encryption data answered, and then the data in the storage location are replaced with and are being created The virtual machine user modification logging encryption data backed up when finishing virtual machine.For the virtual machine under (SuSE) Linux OS, The storage location of root user's modification logging encryption data is /etc/shadow file the inside root row.
In a preferred embodiment of the present embodiment, after step s 104 further include: will be in creation virtual machine When default virtual machine user modification logging as new virtual machine user modification logging be prompted to user.The prompt can be with It is to be completed to the terminal device transmission where user includes the interface of new virtual machine user modification logging, it can also be according to place The user information (such as subscriber mailbox) stored on host sends new virtual machine user modification logging to user.In this way, user Virtual machine can be logged in new virtual machine user modification logging by means of terminal device, and then complete the interaction with virtual machine Command operation.
When the present embodiment is by judge that the resetting of virtual machine user modification logging requests effective, got pair according to preset mode The modification operating right of magnetic disk of virtual machine data, the virtual machine corresponding with subscriber identity information that will be stored in magnetic disk of virtual machine User's modification logging encryption data replaces with the virtual machine user modification logging backed up when creation finishes virtual machine and encrypts number According to, it is time-consuming shorter to realize the resetting of virtual machine user modification logging, save the system resource of host, and other users Lack of competence application resetting, virtual machine security can be guaranteed.
Fig. 2 shows the second embodiment of the present invention.
Fig. 2 is a kind of process signal of the method for resetting virtual machine user modification logging that second embodiment of the invention provides Figure.This method can be applied to create on the server (i.e. host) of virtual machine.Referring to fig. 2, the realization stream of the method Details are as follows for journey:
Step S201, reception includes the virtual machine user modification logging resetting request of subscriber identity information.
Step S202, subscriber identity information is verified, judges whether the resetting request of virtual machine user modification logging has Effect.
Step S203, it when the resetting request of virtual machine user modification logging is effective, is got according to preset mode to virtual The modification operating right of machine data in magnetic disk.
Step S204, the virtual machine user corresponding with the subscriber identity information stored in magnetic disk of virtual machine is logged in Password encryption data replace with the virtual machine user modification logging encryption data backed up when creation finishes virtual machine.
Step S205, new virtual machine user modification logging is generated.
Step S206, virtual machine is logged on to using virtual machine user modification logging default when creating virtual machine, it will Virtual machine user modification logging resets to the new virtual machine user modification logging.
Step S207, the new virtual machine user modification logging is prompted to user.
In the present embodiment, step S201- step S204 phase corresponding with the step S101- step S104 in first embodiment Together, which is not described herein again.
In the present embodiment, host can be generated by preset password generation algorithm new virtual machine user log in it is close Code, such as random generation 12 include that digital, alphabetical and/or additional character character string is logged in as new virtual machine user Password.
After generating new virtual machine user modification logging, host sends power-on instruction to virtual machine, to be checked to measure void When quasi- machine is in open state, virtual machine is logged on to using virtual machine user modification logging default when creating virtual machine, Virtual machine user modification logging is reset into new virtual machine user modification logging generated.For under (SuSE) Linux OS Virtual machine, host can reset new virtual machine user modification logging by passwd order.
When the present embodiment is by judge that the resetting of virtual machine user modification logging requests effective, got pair according to preset mode The modification operating right of magnetic disk of virtual machine data, the virtual machine corresponding with subscriber identity information that will be stored in magnetic disk of virtual machine User's modification logging encryption data replaces with the virtual machine user modification logging backed up when creation finishes virtual machine and encrypts number According to logging on to virtual machine using virtual machine user modification logging default when creating virtual machine, and then complete to virtual machine The resetting of user's modification logging, it is time-consuming shorter, the system resource of host is saved, and other users lack of competence application is reset, Virtual machine security can be guaranteed.
Fig. 3 shows the third embodiment of the present invention.
Fig. 3 is a kind of process signal of the method for resetting virtual machine user modification logging that third embodiment of the invention provides Figure.This method can be applied to create on the server (i.e. host) of virtual machine.Referring to Fig. 3, the realization stream of the method Details are as follows for journey:
Step S301, receive virtual machine user modification logging resetting request, the request packet contain subscriber identity information and New virtual machine user modification logging.
Step S302, subscriber identity information is verified, judges whether the resetting request of virtual machine user modification logging has Effect.
Step S303, it when the resetting request of virtual machine user modification logging is effective, is got according to preset mode to virtual The modification operating right of machine data in magnetic disk.
Step S304, the virtual machine user corresponding with the subscriber identity information stored in magnetic disk of virtual machine is logged in Password encryption data replace with the virtual machine user modification logging encryption data backed up when creation finishes virtual machine.
Step S305, virtual machine is logged on to using virtual machine user modification logging default when creating virtual machine, it will Virtual machine user modification logging resets to virtual machine user modification logging new included in the request.
In the present embodiment, step S302- step S204 phase corresponding with the step S102- step S104 in first embodiment Together, which is not described herein again.
In order to further ensure the safety of password, in a preferred embodiment of the present embodiment, in host Receive the resetting of virtual machine user modification logging request and verify the request it is effective after, parse new virtual machine included in it User's modification logging then deletes the request, carries out Brute Force to it to avoid illegal user.
When the present embodiment is by judge that the resetting of virtual machine user modification logging requests effective, got pair according to preset mode The modification operating right of magnetic disk of virtual machine data, the virtual machine corresponding with subscriber identity information that will be stored in magnetic disk of virtual machine User's modification logging encryption data replaces with the virtual machine user modification logging backed up when creation finishes virtual machine and encrypts number According to logging on to virtual machine using virtual machine user modification logging default when creating virtual machine, and then complete to virtual machine The resetting of user's modification logging, it is time-consuming shorter, the system resource of host is saved, and other users lack of competence application is reset, Virtual machine security can be guaranteed, at the same virtual machine modification logging can be reset to user to new virtual machine step on Land password, improves user experience.
Fig. 4 shows the fourth embodiment of the present invention.
Fig. 4 is a kind of structural representation of the device for resetting virtual machine user modification logging that fourth embodiment of the invention provides Figure.Referring to fig. 4, described device includes:
Request receiving module 401, for receive include subscriber identity information virtual machine user modification logging resetting ask It asks;
Judgment module 402 is requested to judge the virtual machine user modification logging for verifying to subscriber identity information Whether resetting request is effective;
Authority acquiring module 403, for being obtained according to preset mode when the resetting request of virtual machine user modification logging is effective Get the modification operating right to magnetic disk of virtual machine data;
Crypted password replacement module 404, for corresponding with the subscriber identity information by what is stored in magnetic disk of virtual machine Virtual machine user modification logging encryption data replace with the virtual machine user that is backed up when creation finishes virtual machine log in it is close Code encryption data.
In the present embodiment, various requests transmitted by 401 real-time detection terminal device of request receiving module, when being detected To request correspond to virtual machine user modification logging resetting request when, receive and extract user identity included in the request Information.In the present embodiment, the request can be the received resetting from terminal device of self-service Web page on host The request of virtual machine user modification logging, the subscriber identity information includes but is not limited to: user identity label, user fingerprints information Or user images information.Wherein, user identity label is character string (such as the identification card number that can be identified for that user's unique identities Code), user fingerprints information is the finger print data by fingerprint acquisition device (such as fingerprint sensor) user collected, user Image information is the face image data by image collecting device (such as camera) user collected.Certain this field One of ordinary skill appreciates that the subscriber identity information can also for other forms can be identified for that user identity and can be by place The information that host is identified, such as user speech information.
Request receiving module 401 receive include subscriber identity information virtual machine user modification logging resetting request Afterwards, request judgment module 402 verifies subscriber identity information included in the request, judges whether it has to virtual The resetting permission of machine user's modification logging, if so, then judging that the received virtual machine user modification logging resetting request of institute is effective. For example, when 401 received request of request receiving module is to include a certain subscriber identity information to (SuSE) Linux OS When the resetting request of virtual machine root user's modification logging, judgment module 402 is requested to judge the user identity according to the presets list Whether information has the resetting permission to virtual machine root user's modification logging of (SuSE) Linux OS, if so, then judgement should Request is effective.Wherein, user's body different classes of corresponding to each virtual machine that host is created is record in the presets list Part information.
Have in the virtual machine user modification logging resetting request that the request judgement of judgment module 402 includes subscriber identity information After effect, authority acquiring module 403 obtains the modification operating right to magnetic disk of virtual machine data according to preset mode.In this reality Applying preset mode described in a preferred embodiment of example includes: to send shutdown command to virtual machine, to be checked to measure virtually When machine is in off-mode, mount virtual machine disk.
Certainly it should be appreciated by those skilled in the art that when the resetting request of virtual machine user modification logging is effective, such as Fruit authority acquiring module 403 detects that virtual machine has been in off-mode at this time, above-mentioned to send shutdown command to virtual machine Step can be omitted, and not the present embodiment institute is necessary.
In this embodiment, when user forgets corresponding virtual machine modification logging, request receiving module 401 receives packet Virtual machine user modification logging containing subscriber identity information resets request, and it is effective to verify the request in request judgment module 402 Afterwards, authority acquiring module 403 gets the modification operating right to magnetic disk of virtual machine data according to preset mode first, encrypts close Code replacement module 404 searches virtual machine user modification logging encryption data corresponding with subscriber identity information in magnetic disk of virtual machine Storage location, and then the data in the storage location are replaced with into the virtual machine user that is backed up when creation finishes virtual machine Modification logging encryption data.For the virtual machine under (SuSE) Linux OS, the storage of root user's modification logging encryption data Position is /etc/shadow file the inside root row.
In a preferred embodiment of the present embodiment, described device further includes that new password cue module (is not shown Out), for after Crypted password replacement module 404 has executed replacement operation, will when creating virtual machine default virtual machine User's modification logging is prompted to user as new virtual machine user modification logging.The prompt can be to the end where user End equipment transmission includes the interface of new virtual machine user modification logging to complete, can also be according to the user stored on host Information (such as subscriber mailbox) sends new virtual machine user modification logging to user.In this way, user can be by means of terminal Equipment logs in virtual machine with new virtual machine user modification logging, and then completes to operate with the interactive command of virtual machine.
When the present embodiment is by judge that the resetting of virtual machine user modification logging requests effective, got pair according to preset mode The modification operating right of magnetic disk of virtual machine data, the virtual machine corresponding with subscriber identity information that will be stored in magnetic disk of virtual machine User's modification logging encryption data replaces with the virtual machine user modification logging backed up when creation finishes virtual machine and encrypts number According to, it is time-consuming shorter to realize the resetting of virtual machine user modification logging, save the system resource of host, and other users Lack of competence application resetting, virtual machine security can be guaranteed.
Fig. 5 shows the fifth embodiment of the present invention.
Fig. 5 is a kind of structural representation of the device for resetting virtual machine user modification logging that fifth embodiment of the invention provides Figure.Referring to Fig. 5, described device includes:
Request receiving module 501, for receive include subscriber identity information virtual machine user modification logging resetting ask It asks;
Judgment module 502 is requested, for verifying to subscriber identity information, judges that virtual machine user modification logging is reset It whether effective requests;
Authority acquiring module 503, for being obtained according to preset mode when the resetting request of virtual machine user modification logging is effective Get the modification operating right to magnetic disk of virtual machine data;
Crypted password replacement module 504, for corresponding with the subscriber identity information by what is stored in magnetic disk of virtual machine Virtual machine user modification logging encryption data replace with the virtual machine user that is backed up when creation finishes virtual machine log in it is close Code encryption data;
New password generation module 505, for generating new virtual machine user modification logging;
New password resets module 506, for using the default virtual machine user modification logging when creating virtual machine to step on Virtual machine user modification logging is reset to the new virtual machine user modification logging to virtual machine by land;
New password cue module 507, for the new virtual machine user modification logging to be prompted to user.
In the present embodiment, request receiving module 501, request judgment module 502, authority acquiring module 503, Crypted password are replaced Change the mold request receiving module 401, request judgment module 402, the authority acquiring module 403, encryption in block 504 and fourth embodiment The correspondence of password replacement module 404 is identical, and which is not described herein again.
In the present embodiment, new password generation module 505 can be generated new virtual by preset password generation algorithm Machine user's modification logging, such as random generation 12 include the character string of number, letter and/or additional character as new void Quasi- machine user modification logging.
After generating new virtual machine user modification logging in new password generation module 505, new password resets module 506 to void Quasi- machine sends power-on instruction, to be checked when measuring virtual machine and be in open state, using when creating virtual machine it is default virtually Machine user's modification logging logs on to virtual machine, and virtual machine user modification logging is reset to new virtual machine user generated and is stepped on Land password.For the virtual machine under (SuSE) Linux OS, new password resetting module 506 can be reset newly by passwd order Virtual machine user modification logging.
When the present embodiment is by judge that the resetting of virtual machine user modification logging requests effective, got pair according to preset mode The modification operating right of magnetic disk of virtual machine data, the virtual machine corresponding with subscriber identity information that will be stored in magnetic disk of virtual machine User's modification logging encryption data replaces with the virtual machine user modification logging backed up when creation finishes virtual machine and encrypts number According to logging on to virtual machine using virtual machine user modification logging default when creating virtual machine, and then complete to virtual machine The resetting of user's modification logging, it is time-consuming shorter, the system resource of host is saved, and other users lack of competence application is reset, Virtual machine security can be guaranteed.
Fig. 6 shows the sixth embodiment of the present invention.
Fig. 6 is a kind of structural representation of the device for resetting virtual machine user modification logging that sixth embodiment of the invention provides Figure.Referring to Fig. 6, described device includes:
Request receiving module 601, for receiving the resetting request of virtual machine user modification logging, the request packet contains user Identity information and new virtual machine user modification logging;
Judgment module 602 is requested, for verifying to subscriber identity information, judges that virtual machine user modification logging is reset It whether effective requests;
Authority acquiring module 603, for being obtained according to preset mode when the resetting request of virtual machine user modification logging is effective Get the modification operating right to magnetic disk of virtual machine data;
Crypted password replacement module 604, for corresponding with the subscriber identity information by what is stored in magnetic disk of virtual machine Virtual machine user modification logging encryption data replace with the virtual machine user that is backed up when creation finishes virtual machine log in it is close Code encryption data;
New password resets module 605, for using the default virtual machine user modification logging when creating virtual machine to step on Land to virtual machine, by virtual machine user modification logging reset to virtual machine user new included in the request log in it is close Code.
In the present embodiment, judgment module 602, authority acquiring module 603, Crypted password replacement module 604 and the 4th are requested Request judgment module 402, authority acquiring module 403, the correspondence of Crypted password replacement module 404 in embodiment is identical, here not It repeats again.
In order to further ensure the safety of password connects in a preferred embodiment of the present embodiment in request After receipts module 601 receives virtual machine user modification logging resetting request and requests the verifying of judgment module 602 request effective, It requests judgment module 602 to parse new virtual machine user modification logging included in it, then deletes the request, with Illegal user is avoided to carry out Brute Force to it.
When the present embodiment is by judge that the resetting of virtual machine user modification logging requests effective, got pair according to preset mode The modification operating right of magnetic disk of virtual machine data, the virtual machine corresponding with subscriber identity information that will be stored in magnetic disk of virtual machine User's modification logging encryption data replaces with the virtual machine user modification logging backed up when creation finishes virtual machine and encrypts number According to logging on to virtual machine using virtual machine user modification logging default when creating virtual machine, and then complete to virtual machine The resetting of user's modification logging, it is time-consuming shorter, the system resource of host is saved, and other users lack of competence application is reset, Virtual machine security can be guaranteed, at the same virtual machine modification logging can be reset to user to new virtual machine step on Land password, improves user experience.
Fig. 7 is the structural schematic diagram that can be used for implementing the server of the present invention program.With reference to Fig. 7, which includes: to penetrate Frequently (Radio Frequency, RF) circuit 701, memory 702, input unit 703, display unit 704, sensor 705, sound The portions such as frequency circuit 706, Wireless Fidelity (wireless fidelity, WiFi) module 707, processor 708 and power supply 709 Part.It will be understood by those skilled in the art that server architecture shown in Fig. 7 does not constitute the restriction to server, can wrap It includes than illustrating more or fewer components, perhaps combines certain components or different component layouts.
It is specifically introduced below with reference to each component parts of the Fig. 7 to server:
RF circuit 701 can be used for receiving and sending messages or communication process in, signal sends and receivees, particularly, by base station After downlink information receives, handled to processor 708;In addition, the data for designing uplink are sent to base station.In general, RF circuit packet Include but be not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier (Low Noise Amplifier, LNA), duplexer etc..In addition, RF circuit 701 can also be communicated with network and other equipment by wireless communication. Any communication standard or agreement, including but not limited to global system for mobile communications (Global can be used in above-mentioned wireless communication System of Mobile communication, GSM), general packet radio service (General Packet Radio Service, GPRS), CDMA (Code Division Multiple Access, CDMA), wideband code division multiple access (Wideband Code Division Multiple Access, WCDMA), long term evolution (Long Term Evolution, LTE)), Email, short message service (Short Messaging Service, SMS) etc..
Memory 702 can be used for storing software program and module, and processor 708 is stored in memory 702 by operation Software program and module, thereby executing the various function application and data processing of server.Memory 702 can be wrapped mainly Include storing program area and storage data area, wherein storing program area can application needed for storage program area, at least one function Program (such as sound-playing function, image player function etc.) etc.;Storage data area can be stored is created according to using for server Data (such as audio data, phone directory etc.) built etc..In addition, memory 702 may include high-speed random access memory, also It may include nonvolatile memory, a for example, at least disk memory, flush memory device or the storage of other volatile solid-states Device.
Input unit 703 can be used for receiving the number or character information of input, and generate the user setting with server And the related key signals input of function control.Specifically, input unit 703 may include touch panel 7031 and other inputs Equipment 7032.Touch panel 7031, also referred to as touch screen collect touch operation (such as the user of user on it or nearby Use the behaviour of any suitable object or attachment such as finger, stylus on touch panel 7031 or near touch panel 7031 Make), and corresponding attachment device is driven according to preset formula.Optionally, touch panel 7031 may include touch detection Two parts of device and touch controller.Wherein, the touch orientation of touch detecting apparatus detection user, and detect touch operation band The signal come, transmits a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and by it It is converted into contact coordinate, then gives processor 708, and order that processor 708 is sent can be received and executed.In addition, can To realize touch panel 7031 using multiple types such as resistance-type, condenser type, infrared ray and surface acoustic waves.In addition to touch panel 7031, input unit 703 can also include other input equipments 7032.Specifically, other input equipments 7032 may include but One be not limited in physical keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse, operating stick etc. Kind is a variety of.
Display unit 704 can be used for showing information input by user or be supplied to user information and server it is each Kind menu.Display unit 704 may include display panel 7041, optionally, can use liquid crystal display (Liquid Crystal Display, LCD), the forms such as Organic Light Emitting Diode (Organic Light-Emitting Diode, OLED) it is aobvious to configure Show panel 7041.Further, touch panel 7031 can cover display panel 7041, when touch panel 7031 detects on it Or after neighbouring touch operation, processor 708 is sent to determine the type of touch event, is followed by subsequent processing device 708 according to touch The type of event provides corresponding visual output on display panel 7041.Although in Fig. 7, touch panel 7031 and display surface Plate 7041 is the input and input function for realizing server as two independent components, but in certain embodiments, it can That server is realized so that touch panel 7031 and display panel 7041 is integrated outputs and inputs function.
Server may also include at least one sensor 705, such as optical sensor, motion sensor and other sensings Device.Specifically, optical sensor may include ambient light sensor and proximity sensor, wherein ambient light sensor can be according to environment The light and shade of light adjusts the brightness of display panel 7041, and proximity sensor can close display when server is moved in one's ear Panel 7041 and/or backlight.As a kind of motion sensor, accelerometer sensor can detect (generally three in all directions Axis) acceleration size, can detect that size and the direction of gravity when static, can be used to identify server posture application (ratio Such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap);Extremely In other sensors such as gyroscope, barometer, hygrometer, thermometer, the infrared sensors that server can also configure, herein not It repeats again.
Voicefrequency circuit 706, loudspeaker 710, microphone 711 can provide the audio interface between user and server.Audio Electric signal after the audio data received conversion can be transferred to loudspeaker 710, be converted to sound by loudspeaker 710 by circuit 706 Sound signal output;On the other hand, the voice signal of collection is converted to electric signal by microphone 711, after being received by voicefrequency circuit 706 Audio data is converted to, then by after the processing of audio data output processor 708, such as another clothes are sent to through RF circuit 701 Business device, or audio data is exported to memory 702 to be further processed.
WiFi belongs to short range wireless transmission technology, and server can help user's transceiver electronics by WiFi module 707 Mail, browsing webpage and access streaming video etc., it provides wireless broadband internet access for user.Although Fig. 7 is shown WiFi module 707, but it is understood that, and it is not belonging to must be configured into for server, it can according to need completely Do not change in the range of the essence of invention and omits.
Processor 708 is the control centre of server, utilizes each portion of various interfaces and the entire server of connection Point, by running or execute the software program and/or module that are stored in memory 702, and calls and be stored in memory 702 Interior data, the various functions and processing data of execute server, to carry out integral monitoring to server.Optionally, it handles Device 708 may include one or more processing units;Preferably, processor 708 can integrate application processor and modulation /demodulation processing Device, wherein the main processing operation system of application processor, user interface and application program etc., modem processor is mainly located Reason wireless communication.It is understood that above-mentioned modem processor can not also be integrated into processor 708.
Server further includes the power supply 709(such as battery powered to all parts), it is preferred that power supply can pass through power supply Management system and processor 708 are logically contiguous, to realize management charging, electric discharge and power consumption pipe by power-supply management system The functions such as reason.
Although being not shown, server can also include camera, bluetooth module etc., and details are not described herein.
Those of ordinary skill in the art will appreciate that realizing that all or part of the steps of above-described embodiment can pass through hardware It completes, relevant hardware can also be instructed to complete by program, which can store in a computer-readable storage medium In matter, storage medium may include memory, disk or CD etc..
Note that the above is only a better embodiment of the present invention and the applied technical principle.It will be appreciated by those skilled in the art that The invention is not limited to the specific embodiments described herein, be able to carry out for a person skilled in the art it is various it is apparent variation, It readjusts and substitutes without departing from protection scope of the present invention.Therefore, although being carried out by above embodiments to the present invention It is described in further detail, but the present invention is not limited to the above embodiments only, without departing from the inventive concept, also It may include more other equivalent embodiments, and the scope of the invention is determined by the scope of the appended claims.

Claims (16)

1. a kind of method for resetting virtual machine user modification logging, which is characterized in that the described method includes:
Various requests transmitted by real-time detection terminal device, when detected request corresponds to virtual machine user login password When resetting request, receives and extract subscriber identity information included in the request;The subscriber identity information is verified, Judge whether the virtual machine user modification logging resetting request is effective according to the presets list;Place is record in described the presets list Different classes of subscriber identity information corresponding to each virtual machine that host is created;
When virtual machine user modification logging resetting request is effective, parses new virtual machine user included in it and log in Password then deletes the request;It specifically includes:
The modification operating right to magnetic disk of virtual machine data is got according to preset mode;
The virtual machine user modification logging encryption data corresponding with the subscriber identity information that will be stored in magnetic disk of virtual machine Replace with the virtual machine user modification logging encryption data backed up when creation finishes virtual machine.
2. it is according to claim 1 resetting virtual machine user modification logging method, which is characterized in that it is described will be virtual The virtual machine user modification logging encryption data corresponding with the subscriber identity information stored in machine disk, which replaces with, to be created After the step of building the virtual machine user modification logging encryption data backed up when finishing virtual machine further include: will be virtual in creation Default virtual machine user modification logging is prompted to user as new virtual machine user modification logging when machine.
3. it is according to claim 1 resetting virtual machine user modification logging method, which is characterized in that it is described will be virtual The virtual machine user modification logging encryption data corresponding with the subscriber identity information stored in machine disk, which replaces with, to be created After the step of building the virtual machine user modification logging encryption data backed up when finishing virtual machine further include:
Generate new virtual machine user modification logging;
Virtual machine is logged on to using virtual machine user modification logging default when creating virtual machine, virtual machine user is logged in Password resets to the new virtual machine user modification logging;
The new virtual machine user modification logging is prompted to user.
4. the method for resetting virtual machine user modification logging according to claim 1, which is characterized in that the virtual machine is used Modification logging resetting request in family also includes new virtual machine user modification logging;
Add in the virtual machine user modification logging corresponding with the subscriber identity information that will be stored in magnetic disk of virtual machine Ciphertext data is gone back after replacing with the step of virtual machine user modification logging encryption data backed up when creation finishes virtual machine Include:
Virtual machine is logged on to using virtual machine user modification logging default when creating virtual machine, virtual machine user is logged in Password resets to the new virtual machine user modification logging.
5. the method for resetting virtual machine user modification logging according to any one of claim 2-4, which is characterized in that institute State the virtual machine user modification logging encryption data that is backed up when creation finishes virtual machine be to when create virtual machine in advance If virtual machine user modification logging carry out cryptographic calculation data generated.
6. the method for resetting virtual machine user modification logging according to claim 1, which is characterized in that described to work as the void Quasi- machine user modification logging resetting gets the modification operating rights to magnetic disk of virtual machine data according to preset mode when requesting effective The step of limit includes:
When virtual machine user modification logging resetting request is effective, shutdown command is sent to virtual machine;
When detecting that virtual machine is in off-mode, mount virtual machine disk.
7. the method for resetting virtual machine user modification logging according to claim 1, which is characterized in that user's body Part information is verified, and judges whether effective step includes: for the virtual machine user modification logging resetting request
The subscriber identity information is verified, judge the subscriber identity information whether have virtual machine user is logged in it is close Otherwise the resetting permission of code, judges described virtual if so, judging the virtual machine user modification logging resetting request effectively The resetting request of machine user's modification logging is invalid.
8. the method for resetting virtual machine user modification logging according to claim 1, which is characterized in that the user identity Information is user identity label, user fingerprints information or user images information.
9. a kind of device for resetting virtual machine user modification logging, which is characterized in that described device includes:
Request receiving module, for various requests transmitted by real-time detection terminal device, when detected request corresponds to When the resetting request of virtual machine user login password, receives and extract subscriber identity information included in the request;Reception includes There is the virtual machine user modification logging resetting request of subscriber identity information;
Judgment module is requested, for verifying to the subscriber identity information, judges that the virtual machine is used according to the presets list Whether modification logging resetting request in family is effective;It records in described the presets list corresponding to each virtual machine that host is created Different classes of subscriber identity information;Be also used to verify the request it is effective when, parse new virtual machine included in it and use Family login password then deletes the request;
Authority acquiring module, for being obtained according to preset mode when virtual machine user modification logging resetting request is effective To the modification operating right to magnetic disk of virtual machine data;
Crypted password replacement module, the virtual machine corresponding with the subscriber identity information for will be stored in magnetic disk of virtual machine User's modification logging encryption data replaces with the virtual machine user modification logging backed up when creation finishes virtual machine and encrypts number According to.
10. the device of resetting virtual machine user modification logging according to claim 9, which is characterized in that described device is also Including new password cue module, in the Crypted password replacement module by being stored in magnetic disk of virtual machine with user's body The corresponding virtual machine user modification logging encryption data of part information replace with backed up when creation finishes virtual machine it is virtual After machine user's modification logging encryption data, using virtual machine user modification logging default when creating virtual machine as new Virtual machine user modification logging is prompted to user by human-computer interaction interface.
11. the device of resetting virtual machine user modification logging according to claim 9, which is characterized in that described device is also Include:
New password generation module, in the Crypted password replacement module by being stored in magnetic disk of virtual machine with user's body The corresponding virtual machine user modification logging encryption data of part information replace with backed up when creation finishes virtual machine it is virtual After machine user's modification logging encryption data, new virtual machine user modification logging is generated;
New password resets module, for using the default virtual machine user modification logging when creating virtual machine to log on to virtually Virtual machine user modification logging is reset to the new virtual machine user modification logging by machine;
New password cue module, for the new virtual machine user modification logging to be prompted to use by human-computer interaction interface Family.
12. the device of resetting virtual machine user modification logging according to claim 9, which is characterized in that the virtual machine The resetting request of user's modification logging also includes new virtual machine user modification logging;
Described device further includes new password resetting module, for will store in magnetic disk of virtual machine in the Crypted password replacement module Virtual machine user modification logging encryption data corresponding with the subscriber identity information replace with and finish virtual machine in creation When the virtual machine user modification logging encryption data that is backed up after, use virtual machine user default when creating virtual machine Modification logging logs on to virtual machine, and virtual machine user modification logging is reset to the new virtual machine user modification logging.
13. the device of resetting virtual machine user modification logging described in any one of 0-12, feature exist according to claim 1 In the virtual machine user modification logging encryption data backed up when creation finishes virtual machine is to when creating virtual machine Default virtual machine user modification logging carries out cryptographic calculation data generated.
14. the device of resetting virtual machine user modification logging according to claim 9, which is characterized in that the permission obtains Modulus block is specifically used for: when virtual machine user modification logging resetting request is effective, shutdown command is sent to virtual machine, When detecting that virtual machine is in off-mode, mount virtual machine disk.
15. the device of resetting virtual machine user modification logging according to claim 9, which is characterized in that the request is sentenced Disconnected module is specifically used for:
The subscriber identity information is verified, judge the subscriber identity information whether have virtual machine user is logged in it is close Otherwise the resetting permission of code, judges described virtual if so, judging the virtual machine user modification logging resetting request effectively The resetting request of machine user's modification logging is invalid.
16. the device of resetting virtual machine user modification logging according to claim 9, which is characterized in that user's body Part information is user tag, user fingerprints information or user images information.
CN201310390519.0A 2013-08-30 2013-08-30 A kind of method and device resetting virtual machine user modification logging Active CN104424431B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201310390519.0A CN104424431B (en) 2013-08-30 2013-08-30 A kind of method and device resetting virtual machine user modification logging
PCT/CN2014/084891 WO2015027852A1 (en) 2013-08-30 2014-08-21 Method and apparatus for resetting a user-login password for a virtual machine

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310390519.0A CN104424431B (en) 2013-08-30 2013-08-30 A kind of method and device resetting virtual machine user modification logging

Publications (2)

Publication Number Publication Date
CN104424431A CN104424431A (en) 2015-03-18
CN104424431B true CN104424431B (en) 2019-01-11

Family

ID=52585559

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310390519.0A Active CN104424431B (en) 2013-08-30 2013-08-30 A kind of method and device resetting virtual machine user modification logging

Country Status (2)

Country Link
CN (1) CN104424431B (en)
WO (1) WO2015027852A1 (en)

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105117242B (en) * 2015-07-29 2018-06-29 广东欧珀移动通信有限公司 System remapping method and terminal
CN105260217A (en) * 2015-11-03 2016-01-20 国云科技股份有限公司 Method of password external reset of linux virtual machine
CN105530246B (en) * 2015-12-04 2018-10-09 华为技术有限公司 The methods, devices and systems of Virtual Machine Manager
CN105808317B (en) * 2016-03-07 2020-01-10 中标软件有限公司 Cloud computing platform virtual machine editing management method
US10404689B2 (en) * 2017-02-09 2019-09-03 Microsoft Technology Licensing, Llc Password security
CN107577516B (en) 2017-07-28 2020-08-14 华为技术有限公司 Virtual machine password resetting method, device and system
CN109002344B (en) * 2018-06-12 2021-01-15 广东睿江云计算股份有限公司 Method for resetting KVM (keyboard video mouse) virtual machine password by cloud management platform
CN110266646A (en) * 2019-05-21 2019-09-20 东软集团股份有限公司 Service host, cipher management method and storage medium
CN111222106B (en) * 2019-12-26 2022-08-12 北京安码科技有限公司 Linux operating system password updating method, system and equipment applied to remote maintenance and storage medium
CN112783609A (en) * 2021-01-30 2021-05-11 浪潮云信息技术股份公司 Method for automatically resetting password for virtual machine on ESXI (electronic service organization) host
CN116760546B (en) * 2023-08-18 2023-10-31 湖南省通信建设有限公司 Modularized password service method based on cloud environment

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101656718A (en) * 2008-08-18 2010-02-24 英业达股份有限公司 Network server system and method for establishing and starting virtual machine thereof
CN102402655A (en) * 2010-09-17 2012-04-04 上海中标软件有限公司 Dynamic password setting method for virtual machine
CN102577315A (en) * 2011-12-21 2012-07-11 华为技术有限公司 Method, device and system for setting user access to virtual machine
CN102662783A (en) * 2012-03-20 2012-09-12 浪潮电子信息产业股份有限公司 Method for repairing virtual machine under desktop cloud environment
CN102662727A (en) * 2012-04-05 2012-09-12 北京天地云箱科技有限公司 Virtual machine creating method and virtual machine creating device
CN102902901A (en) * 2011-07-29 2013-01-30 鸿富锦精密工业(深圳)有限公司 Computer system and encryption device and encryption method thereof
CN103235909A (en) * 2013-04-25 2013-08-07 广东欧珀移动通信有限公司 Method and device for resetting password and mobile device

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100555298C (en) * 2007-06-08 2009-10-28 北京飞天诚信科技有限公司 The method and apparatus of virtulizing personal office environment
US9411970B2 (en) * 2011-08-19 2016-08-09 Microsoft Technology Licensing, Llc Sealing secret data with a policy that includes a sensor-based constraint
US20130061293A1 (en) * 2011-09-02 2013-03-07 Wenbo Mao Method and apparatus for securing the full lifecycle of a virtual machine

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101656718A (en) * 2008-08-18 2010-02-24 英业达股份有限公司 Network server system and method for establishing and starting virtual machine thereof
CN102402655A (en) * 2010-09-17 2012-04-04 上海中标软件有限公司 Dynamic password setting method for virtual machine
CN102902901A (en) * 2011-07-29 2013-01-30 鸿富锦精密工业(深圳)有限公司 Computer system and encryption device and encryption method thereof
CN102577315A (en) * 2011-12-21 2012-07-11 华为技术有限公司 Method, device and system for setting user access to virtual machine
CN102662783A (en) * 2012-03-20 2012-09-12 浪潮电子信息产业股份有限公司 Method for repairing virtual machine under desktop cloud environment
CN102662727A (en) * 2012-04-05 2012-09-12 北京天地云箱科技有限公司 Virtual machine creating method and virtual machine creating device
CN103235909A (en) * 2013-04-25 2013-08-07 广东欧珀移动通信有限公司 Method and device for resetting password and mobile device

Also Published As

Publication number Publication date
CN104424431A (en) 2015-03-18
WO2015027852A1 (en) 2015-03-05

Similar Documents

Publication Publication Date Title
CN104424431B (en) A kind of method and device resetting virtual machine user modification logging
US20210336780A1 (en) Key updating method, apparatus, and system
CN105933904B (en) Network connection method and device
EP3200487B1 (en) Message processing method and apparatus
WO2015158300A1 (en) Methods and terminals for generating and reading 2d barcode and servers
CN106709347B (en) Using the method and device of operation
US9940448B2 (en) Unlock processing method and device
CN105468952A (en) Authentication method and apparatus
CN111142930B (en) Installation package file packaging method and device, terminal device and storage medium
CN104965722B (en) A kind of method and device of display information
WO2018214748A1 (en) Method and apparatus for displaying application interface, terminal and storage medium
CN109257336A (en) It is a kind of based on the encrypted message processing method of block chain, terminal device
US20170323115A1 (en) Method and apparatus for remotely deleting information
CN103366104A (en) Method and device for controlling accessing of application
CN104573437B (en) Information authentication method, device and terminal
CN104426848B (en) The method and system of log-on webpage application
CN110457935A (en) A kind of authority configuring method and terminal device
CN103824003B (en) application program protecting method, device and terminal
CN106815510B (en) Data processing method and terminal
CN107993300A (en) A kind of Work attendance method and device based on intelligent terminal
CN107909682A (en) A kind of access control method, device and antitheft door
CN111159738A (en) Permission configuration method, application login method and device
CN108737341B (en) Service processing method, terminal and server
CN104104508B (en) Method of calibration, device and terminal device
CN110851408A (en) File compression method, file decompression method and electronic equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20190730

Address after: 518057 Nanshan District science and technology zone, Guangdong, Zhejiang Province, science and technology in the Tencent Building on the 1st floor of the 35 layer

Co-patentee after: Tencent cloud computing (Beijing) limited liability company

Patentee after: Tencent Technology (Shenzhen) Co., Ltd.

Address before: Shenzhen Futian District City, Guangdong province 518044 Zhenxing Road, SEG Science Park 2 East Room 403

Patentee before: Tencent Technology (Shenzhen) Co., Ltd.