CN105245596A - Remote control method, server and network attached storage device - Google Patents

Remote control method, server and network attached storage device Download PDF

Info

Publication number
CN105245596A
CN105245596A CN201510642615.9A CN201510642615A CN105245596A CN 105245596 A CN105245596 A CN 105245596A CN 201510642615 A CN201510642615 A CN 201510642615A CN 105245596 A CN105245596 A CN 105245596A
Authority
CN
China
Prior art keywords
password
server
account
client
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510642615.9A
Other languages
Chinese (zh)
Other versions
CN105245596B (en
Inventor
董世绸
张日和
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHENZHEN ADVANCED RIVER SYSTEM TECHNOLOGY Co Ltd
Original Assignee
SHENZHEN ADVANCED RIVER SYSTEM TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHENZHEN ADVANCED RIVER SYSTEM TECHNOLOGY Co Ltd filed Critical SHENZHEN ADVANCED RIVER SYSTEM TECHNOLOGY Co Ltd
Priority to CN201510642615.9A priority Critical patent/CN105245596B/en
Publication of CN105245596A publication Critical patent/CN105245596A/en
Priority to PCT/CN2016/080664 priority patent/WO2017054443A1/en
Application granted granted Critical
Publication of CN105245596B publication Critical patent/CN105245596B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • H04L67/025Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/40Support for services or applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/141Setup of application sessions

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Information Transfer Between Computers (AREA)
  • Computer And Data Communications (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention discloses a remote control method. The remote control method comprises the following steps: logging a first server by a user to acquire an access mode of a second server, and establishing a P2P (Peer-To-Peer) connection with the second server by a client by using the access mode with the help of the first server, so that the client logs the second server and transmits a control signal to a terminal through the second server, the terminal receives the control signal and executes an operation according to the control signal. The invention further discloses a server and a network attached storage device. Through the above manner, even if the second server is located in an intranet or does not have a fixed IP (Internet Protocol), the P2P connection can still be established between the second server and the client with the help of the first server, so that the user can achieve remote management and control of the terminal through the second server.

Description

A kind of long-range control method, server and network attached storage equipment
Technical field
The present invention relates to network technology, particularly a kind of long-range control method, server, system and the network storage equipment.
Background technology
Under the background of Internet of Things high speed development, the increase of the data volume that the open quick and network interconnection of information-based high development, communication produces, makes the requirement of people to the fail safe of work living environment, comfortableness and efficiency improve.Smart Home is the certainty of computer technology, network technology and automatic control technology infiltration traditional home appliance industry development.
In the prior art, various household electrical appliance can be used in family life, user controls household electrical appliance by Infrared remote controller or manual mode, and thus user can only carry out the control of household electrical appliance at home, and this mode is not easy to the electrical equipment that user's device controls family whenever and wherever possible.
In current internet, applications, the server of the shared resource services such as the storage of cloud data, data processing and data management is provided to be called as publicly-owned Cloud Server in the public network.And in local area network, provide the server of the shared resource services such as data storage, data processing and data management to be called as privately owned Cloud Server.Privately owned cloud can control in family terminal by installing terminal interactive program, and user carries out the terminal in remote control home by the privately owned Cloud Server of remote access.But because IP resource is limited, privately owned Cloud Server is often positioned among Intranet, even if be positioned on public network, does not also have fixed ip address, also just can not realizes user and directly access privately owned cloud, the direct Long-distance Control of user to terminal in family can not be realized.
Summary of the invention
The technical problem that the present invention solves can not directly access privately owned cloud for the user existed in prior art and the problem manipulated terminal, a kind of long-range control method, server, system and network attached storage equipment are provided, user can not be realized directly access privately owned cloud and the problem of direct Long-distance Control to terminal for solving in prior art.
In order to solve the problems of the technologies described above, a technical scheme provided by the invention is: provide a kind of long-range control method, comprising: client uses the first account and first password to log in first server to obtain the access mode of corresponding second server; Client use access mode is set up P2P with second server and is connected under the help of first server; Client uses the second account and the second password login second server; Client is transmitted control signal to terminal by second server; Terminal reception control signal according to control signal executable operations.
Wherein, client logs first server comprises with the access mode obtaining second server: client uses the first account and first password to log in first server; Client is checked the addressable server list of use first account and is selected the second server of wish access to obtain the access mode of second server, or first account when only may have access to second server, client directly obtains the access mode of second server from first server.
Wherein, each addressable server runs several terminal interaction programs, and regularly to the mount message of first server reporting terminal interactive program, the addressable server list of the first account is used to be further listed in the terminal interaction program listing of addressable server installation, so that client is checked and managed.
Wherein, client use different account to log in authority that second server has is identical or different.
Wherein, the password needed for client logs first server and the password logged in needed for the 3rd server are the 3rd password; The step of client logs first server comprises: first server receives the logging request that client uses the first account and first password; First server obtains the access mode of the 3rd server and the 3rd corresponding account according to the first account; First server is according to access mode and the 3rd corresponding account request the 3rd server, and to obtain the 4th password, the 4th password uses the first non-reversible algorithm to obtain to the 3rd password; Mate the 4th password and the 5th password, wherein the 5th password is that first server uses the first non-reversible algorithm to obtain to first password; According to matching result response logging request, if the 4th password and the 5th password coupling, then client logs first server success, otherwise login failure.
Wherein, the password needed for client logs first server and the password logged in needed for the 3rd server are the 3rd password; The step of client logs first server comprises: first server receives the logging request that client uses the first account and first password; First server obtains the access mode of the 3rd server and the 3rd corresponding account according to the first account; First server is according to access mode and the 3rd corresponding account request the 3rd server, and to obtain the 4th password, the 4th password uses the first non-reversible algorithm to obtain to the 3rd password; Mate the 6th password and the 7th password, wherein the 6th password is that first server obtains the 4th password and the 8th password combination, 8th password is the password using the second non-reversible algorithm to obtain to the 3rd password that first server is preserved in advance, 7th password obtains the 5th password and the 9th password combination, wherein the 5th password is that first server uses the first non-reversible algorithm to obtain to first password, and the 9th password is that first server uses the second non-reversible algorithm to obtain to first password; According to matching result response logging request, if the 6th password and the 7th password coupling, then client logs first server success, otherwise login failure.
Wherein, second server runs several terminal interaction programs, the corresponding terminal of each terminal interaction program; Client to be transmitted control signal to terminal by second server and comprises: client-access second server, to send control signal to selected terminal interaction program; Second server reception control signal, sends to selected terminal interaction program by control signal; Terminal interaction process accepts control signal also sends to corresponding terminal.
Wherein, terminal also generates feedback signal according to the operating state of self and sends to corresponding terminal interaction program; Terminal interaction process accepts feedback signal more new state accordingly, check for client and manipulate.
Wherein, first server is publicly-owned Cloud Server, and second server is privately owned Cloud Server.
Wherein, first server is publicly-owned Cloud Server, and the 3rd server is privately owned Cloud Server.
In order to solve the problems of the technologies described above, another technical scheme provided by the invention is: provide a kind of long-range control method, comprising: first server receives also customer in response end and uses the logging request of the first account and first password; The access mode of the second server of correspondence is sent to client by first server; First server help client use access mode is set up P2P with second server and is connected, transmitted control signal to terminal by second server after using the second account and the second code entry second server to make client, terminal reception control signal according to control signal executable operations.
Wherein, the password needed for client logs first server and the password logged in needed for the 3rd server are the 3rd password; First server receives and the step of the logging request of customer in response end comprises: first server receives the logging request that client uses the first account and first password; First server obtains the access mode of the 3rd server and the 3rd corresponding account according to the first account; First server is according to access mode and the 3rd corresponding account request the 3rd server, and to obtain the 4th password, the 4th password uses the first non-reversible algorithm to obtain to the 3rd password; Mate the 4th password and the 5th password, wherein the 5th password is that first server uses the first non-reversible algorithm to obtain to first password; According to matching result response logging request, if the 4th password and the 5th password coupling, then client logs first server success, otherwise login failure.
Wherein, the password needed for client logs first server and the password logged in needed for the 3rd server are the 3rd password; First server receives and the step of the logging request of customer in response end comprises: first server receives the logging request that client uses the first account and first password; First server obtains the access mode of the 3rd server and the 3rd corresponding account according to the first account; First server is according to access mode and the 3rd corresponding account request the 3rd server, and to obtain the 4th password, the 4th password uses the first non-reversible algorithm to obtain to the 3rd password; Mate the 6th password and the 7th password, wherein the 6th password is that first server obtains the 4th password and the 8th password combination, 8th password is the password using the second non-reversible algorithm to obtain to the 3rd password that first server is preserved in advance, 7th password obtains the 5th password and the 9th password combination, wherein the 5th password is that first server uses the first non-reversible algorithm to obtain to first password, and the 9th password is that first server uses the second non-reversible algorithm to obtain to first password; According to matching result response logging request, if the 6th password and the 7th password coupling, then client logs first server success, otherwise login failure.
In order to solve the problems of the technologies described above, another technical scheme provided by the invention is: provide a kind of server, comprising: login response module, uses the logging request of the first account and first password for receiving also customer in response end; Sending module, the access mode for the second server by correspondence sends to client; Connect module, use access mode to set up P2P with second server for helping client to be connected, transmitted control signal to terminal by second server after using the second account and the second code entry second server to make client, terminal reception control signal according to control signal executable operations.
Wherein, the password needed for client logs first server and the password logged in needed for the 3rd server are the 3rd password; Login response module comprises: receiving element, uses the logging request of the first account and first password for receiving client; Selected cell, for obtaining access mode and the 3rd account of the 3rd server according to the first account; Acquiring unit, for the 3rd account request the 3rd server according to access mode and correspondence, to obtain the 4th password, the 4th password uses the first non-reversible algorithm to obtain to the 3rd password; Matching unit, for mating the 4th password and the 5th password, wherein the 5th password uses the first non-reversible algorithm to obtain to first password; Response unit, for responding logging request according to matching result, if the 4th password and the 5th password coupling, then the first account logins successfully, otherwise login failure.
Wherein, the password needed for client logs first server and the password logged in needed for the 3rd server are the 3rd password; Login response module comprises: receiving element, uses the logging request of the first account and first password for receiving client; Selected cell, for obtaining the access mode of the 3rd server and the 3rd corresponding account according to the first account; Acquiring unit, for the 3rd account request the 3rd server according to access mode and correspondence, to obtain the 4th password, the 4th password uses the first non-reversible algorithm to obtain to the 3rd password; Matching unit, for mating the 6th password and the 7th password, wherein the 6th password obtains the 4th password and the 8th password combination, 8th password is the pre-password using the second non-reversible algorithm to obtain to the 3rd password preserved, 7th password obtains the 5th password and the 9th password combination, wherein the 5th password uses the first non-reversible algorithm to obtain to first password, and the 9th password uses the second non-reversible algorithm to obtain to first password; Response unit, for responding logging request according to matching result, if the 6th password and the 7th password coupling, then the first account logins successfully, otherwise login failure.
In order to solve the problems of the technologies described above, another technical scheme provided by the invention is: provide a kind of server, comprising: processor, memory and network communications circuits, memory and network communications circuits connection handling device respectively; Processor is used for operation service program, the logging request of the first account and first password is used to be received also customer in response end by network communications circuits, the access mode of the second server of correspondence is sent to client by network communications circuits, help client to use access mode to set up P2P with second server by network communications circuits to be connected, transmitted control signal to terminal by second server after using the second account and the second code entry second server to make client, terminal reception control signal according to control signal executable operations.
Wherein processor is also for operation service program, to check and the control that administrative client application program, second server and second server are installed.
In order to solve the problems of the technologies described above, another technical scheme provided by the invention is: provide a kind of network attached storage equipment, comprising: processor, hard disk and routing circuit, hard disk and routing circuit connection handling device respectively; Processor is for running first service program, be connected to set up P2P by routing circuit and client under the help of first server, receive and the logging request of use second account sent by routing circuit of customer in response end and the second password, processor is also for running second service program, to be received the control signal that client sends by routing circuit, then by routing circuit, control signal is sent to terminal.
Wherein, processor for running several terminal interaction programs, the corresponding terminal of each terminal interaction program; Control signal, also for running second service program, to receive the control signal of the terminal interaction program that client is selected by the manipulation that routing circuit sends, is sent to selected terminal interaction program by processor; Processor, for running terminal interaction program, sends to corresponding terminal with reception control signal by routing circuit.
Wherein, processor, also for running terminal interaction program, to receive the feedback signal that corresponding terminal is sent by routing circuit, and according to feedback signal more new state, being checked for client and manipulating; Wherein feedback signal is that terminal generates according to the operating state of self.
The invention has the beneficial effects as follows: the access mode of first service management first account and corresponding second server, the access mode of second server can be obtained after making client use the first account to log in first server, and under the help of first server, set up P2P with second server be connected, make user can carry out remote control terminal by second server.Even if second server is among Intranet or does not possess fixing IP, also can under the help of first server with client's side link, and use client-access second server to realize remote control terminal.
Accompanying drawing explanation
Fig. 1 is the flow chart of the first embodiment of long-range control method of the present invention;
Fig. 2 is the schematic diagram of the second embodiment of long-range control method of the present invention;
Fig. 3 is the flow chart of the 4th embodiment of long-range control method of the present invention;
Fig. 4 is the flow chart of the 5th embodiment of long-range control method of the present invention;
Fig. 5 is the flow chart of the 6th embodiment of long-range control method of the present invention;
Fig. 6 is the schematic diagram of the 6th embodiment of long-range control method of the present invention;
Fig. 7 is the flow chart of the 7th embodiment of long-range control method of the present invention;
Fig. 8 is the flow chart of the 8th embodiment of long-range control method of the present invention;
Fig. 9 is the flow chart of the 9th embodiment of long-range control method of the present invention;
Figure 10 is the schematic diagram of the first embodiment of server of the present invention;
Figure 11 is the schematic diagram of the second embodiment of server of the present invention;
Figure 12 is the schematic diagram of the 3rd embodiment of server of the present invention;
Figure 13 is the schematic diagram of the 4th embodiment of server of the present invention;
Figure 14 is the schematic diagram of the first embodiment of network attached storage equipment of the present invention.
Embodiment
As shown in Figure 1, the first embodiment of long-range control method of the present invention comprises:
S110: client uses the first account and first password to log in first server to obtain the access mode of corresponding second server;
User logs in first server in upper input first account of client (as browser or application program) and first password, first server is run the database of the information for recording account and this account of use another server addressable, search the first account in a database, and obtain address and the port of corresponding second server, obtain the access mode of corresponding second server.
S120: client use access mode is set up P2P with second server and is connected under the help of first server;
If second server is positioned on public network, client can use the access mode of second server to connect second server.If client and second server lay respectively among two different Intranets, client uses address and the port of the second server obtained, the first connection request is sent to second server, owing to not communicating with second server before client, the network address translation (NetworkAddressTranslation, NAT) of second server side refuses the first connection request.Although request is refused, the NAT of client-side have recorded address and the port information of second server, and the client in this Intranet was once initiated to connect this information to second server.The address of the client that second server issues according to first server and port, the second connection request is initiated to client, NAT due to client-side retains the record of second server, and second server is regarded as the external host once crossed with client communication, and the second connection request is allowed through.Client end response request is also set up P2P with second server and is connected.
S130: client uses the second account and the second password login second server;
Client and second server are set up after P2P is connected, user inputs the second account and the second password login second server in client (as browser or application program), and the second password logging in second server can be the same or different with the first password logging in first server.
S140: client is transmitted control signal to terminal by second server;
User, after client Successful login second server, checks the terminal list that second server is listed, and choose certain terminal to make control action, client transmits control signal to second server, comprises the terminal and control action chosen in control signal.Second server receives the control signal that client sends, and then control signal is sent to selected terminal.Terminal refers to and for the equipment of manipulation, except the household electrical appliances such as air-conditioning, water heater, humidifier, TV, can also comprise the home equipment that other are controlled, such as light fixture, door lock, curtain etc.
S150: terminal reception control signal according to control signal executable operations.
The terminal chosen receives the control signal that second server is sent, and performs corresponding operating according to the control action in control signal.Such as, user is for logging in client, and by second server, terminal is carried out to the operation of " opening " or " closedown ": first, user is in the control signal of client input " opening " or " closedown ", and then the control signal of " opening " or " closedown " is sent to second server by client, the control signal of " opening " or " closedown " is sent to corresponding terminal by the second last server again, and terminal performs the operation of " opening " or " closedown " according to control signal.
From above embodiment, user inputs account and password login first server on the client, first server runtime database obtains the access mode of corresponding second server, access mode is sent to client by first server, client is set up P2P with second server and is connected under the help of first server, and client input account number cipher logs in second server.Thus, client just can directly communicate with second server, realizes the Long-distance Control to terminal and operation.
Second embodiment of long-range control method of the present invention is on the basis of the first embodiment, and client logs first server comprises with the access mode obtaining second server: client uses the first account and password login first server; Client is checked the addressable server list of use first account and is selected the second server of wish access to obtain the access mode of second server; Or first account when only may have access to second server, client directly obtains the access mode of second server from first server.
After client logs first server, in the user interface of client, the server list that use first account can be accessed can be viewed, the server list of namely binding with the first account.After viewing the server list that can access, select the server for access, selected server is second server, and obtains the access mode of second server.If use the first account to only have a second server that can access, client directly obtains the access mode of second server from first server, no longer select.
Each addressable server runs several terminal interaction programs, and regularly to the mount message of first server reporting terminal interactive program, the addressable server list of the first account is used to list the terminal interaction program listing of each addressable server installation, as shown in Figure 2, so that client is checked and managed.
The terminal interaction program of the addressable server of first server unified management and upper installation thereof, addressable server is regularly to the mount message of first server reporting terminal interactive program, therefore addressable server list can be further listed in the terminal interaction program listing that addressable server is installed, and selects for client.
3rd embodiment of long-range control method of the present invention is on the basis of the first embodiment, the authority that client uses different account login second servers to have is identical or different, if any account can manage all terminal interaction programs that second server is installed, and some accounts can only manage wherein a part of terminal interaction program that second server is installed.Such as use head of a family account can manage all terminal interaction programs, the account of child can not the terminal interaction program of Management Television machine, guest's account terminal interaction program that can not manage door lock etc.
As shown in Figure 3, in the 4th embodiment of long-range control method of the present invention, the password of client logs first server and the password of login the 3rd server are the 3rd password, and the step of client logs first server comprises:
S111: first server receives the logging request that client uses the first account and first password;
User on the client (as browser or application program) inputs the first account and first password and attempts to log in first server, first server operation service program, further can also runtime database.
S112: first server obtains the access mode of the 3rd server and the 3rd corresponding account according to the first account;
Client logs first server and the 3rd server use same password.Have recorded the first account, another server of the use same password corresponding to the first account and the information of another corresponding account in the database of first server, verify for acquisition password.First server searches the first account in a database, and obtains the 3rd account of the address of the 3rd server corresponding to this account, port information and correspondence.
S113: first server is according to access mode and the 3rd corresponding account request the 3rd server, and to obtain the 4th password, the 4th password uses the first non-reversible algorithm to obtain to the 3rd password;
First server connects according to the address port information of the 3rd server of correspondence and the 3rd server, and send the request of acquisition the 4th password to the 3rd server, the 4th password is the password using the first non-reversible algorithm to obtain to the 3rd password.Generally speaking, the first non-reversible algorithm refers to Hash (Hash) algorithm or salt adding hash algorithm, can use MD5, SHA1, SHA2, SHA256, SHA512, PBKDF2 wherein any one as hash algorithm.The user cipher that user confirms when completing the arranging of the first account is the 3rd password, logs in the password that first server and the 3rd server use and is the 3rd password.
S114: coupling the 4th password and the 5th password, wherein the 5th password is that first server uses the first non-reversible algorithm to obtain to first password;
First server uses the first non-reversible algorithm to obtain the 5th password to the first password that user inputs, and mates the 4th password and the 5th password, judges that the 4th password or both sides relation whether identical with the 5th password meets predetermined condition.
S115: according to matching result response logging request, if the 4th password and the 5th password coupling, then client logs first server success, otherwise login failure;
If the match is successful for the 4th password and the 5th password, judge that first password or both sides relation identical with the 3rd password meets predetermined condition, namely password or the both sides relation identical with user cipher of user's input meets predetermined condition, first server is by the logging request of client, otherwise the logging request of first server refusal client, and return miscue.
Client logs the 3rd server and first server use same password, the 3rd server preserves complete password, first server does not preserve password.When user logs in first server, first server obtains complete password to the 3rd server request, and verifies the password of user's input accordingly.Even if first server is broken like this, also cannot obtains user cipher with visiting the 3rd server, ensure that the fail safe of the 3rd server data.
As shown in Figure 4, in the 5th embodiment of long-range control method of the present invention, the password of client logs first server and the password of login the 3rd server are the 3rd password, and the step of client logs first server comprises:
S121: first server receives the logging request that client uses the first account and first password;
User on the client (as browser or application program) inputs the first account and first password and attempts to log in first server, first server operation service program, further can also runtime database.
S122: first server obtains the access mode of the 3rd server and the 3rd corresponding account according to the first account;
Client logs first server and the 3rd server use same password.Have recorded the first account, another server of the use same password corresponding to the first account and the information of another corresponding account in the database of first server, verify for acquisition password.First server searches the first account in a database, and obtains the 3rd account of the address of the 3rd server corresponding to this account, port information and correspondence.
S123: first server is according to access mode and the 3rd corresponding account request the 3rd server, and to obtain the 4th password, the 4th password uses the first non-reversible algorithm to obtain to the 3rd password;
First server connects according to the address port information of the 3rd server of correspondence and the 3rd server, and send the request of acquisition the 4th password to the 3rd server, the 4th password is the password using the first non-reversible algorithm to obtain to the 3rd password.Generally speaking, the first non-reversible algorithm refers to Hash (Hash) algorithm or salt adding hash algorithm, can use MD5, SHA1, SHA2, SHA256, SHA512, PBKDF2 wherein any one as hash algorithm.The user cipher that user confirms when completing the arranging of the first account is the 3rd password, logs in the password that first server and the 3rd server use and is the 3rd password.3rd server can preserve the 3rd password, sends to first server after using the first non-reversible algorithm to obtain the 4th password after receiving the request of first server to the 3rd password; Also can the first non-reversible algorithm be used to obtain the 4th password to the 3rd password and preserve the 4th password, the request receiving first server directly sends the 4th password afterwards.Oppositely can not calculating according to the 4th password and draw the 3rd password, preventing the leakage being caused user cipher in data transmission procedure by intercepting and capturing.
S124: coupling the 6th password and the 7th password, wherein the 6th password is that first server obtains the 4th password and the 8th password combination, 8th password is the password using the second non-reversible algorithm to obtain to the 3rd password that first server is preserved in advance, 7th password obtains the 5th password and the 9th password combination, wherein the 5th password is that first server uses the first non-reversible algorithm to obtain to first password, and the 9th password is that first server uses the second non-reversible algorithm to obtain to first password;
First server is preserved in advance the 8th password, each user confirms to revise first server after user cipher and just uses the second non-reversible algorithm obtain the 8th password and preserve to the 3rd password after revising; First server obtains the 6th password to the 4th password and the 8th password combination.Use the second non-reversible algorithm refer to extracting part quantile after re-use hash algorithm or salt adding hash algorithm processes.Combination can be the 4th password and the 8th password are stitched together, and also can refer to and use hash algorithm or salt adding hash algorithm to process by after the 4th password and the splicing of the 8th password.First server also uses the first non-reversible algorithm to obtain the 5th password to the first password of user's input, uses the second non-reversible algorithm to obtain the 9th password, then obtain the 7th password to the 5th password and the 9th password combination to first password; Then first server is mated the 6th password and the 7th password, judges that the 6th password or both sides relation whether identical with the 7th password meets predetermined condition.
S125: according to matching result response logging request, if the 6th password and the 7th password coupling, then client logs first server success, otherwise login failure;
If the match is successful for the 6th password and the 7th password, judge that first password or both sides relation identical with the 3rd password meets predetermined condition, namely the password inputted or both sides relation identical with user cipher meets predetermined condition, first server is by the logging request of client, otherwise return the logging request of first server refusal client, and return miscue.Such as an account is provided with a main password and at least one subcipher, corresponding relation is there is between subcipher and main password, such as subcipher is a part for main password, the first password of user's input also can Successful login when being any one subcipher, and now the relation of the relation of the 6th password and the 7th password, first password and the 3rd password meets predetermined condition.
From above embodiment, password needed for client logs first server and the password logged in needed for the 3rd server are the 3rd password, 3rd server preserves complete password, first server is only preserved the password through non-reversible algorithm process, and complete password can not be obtained according to the password that first server is preserved.When user logs in first server, first server obtains complete password to the 3rd server request, and verifies the password of user's input accordingly.Even if first server is broken like this, also cannot obtains user cipher with visiting the 3rd server, ensure that the fail safe of the 3rd server data.
As shown in Figure 5 and Figure 6, in the 6th embodiment of long-range control method of the present invention, second server runs several terminal interaction programs, the corresponding terminal of each terminal interaction program; Client to be transmitted control signal to terminal by second server and comprises:
S210: client-access second server, to send control signal to selected terminal interaction program;
Client checks the terminal interaction program listing on second server, and select for terminal interaction program corresponding to the terminal of manipulation and make control action, client transmits control signal to selected terminal interaction program.
S220: second server reception control signal, sends to selected terminal interaction program by control signal;
Second server receives the control signal that client is sent, and then the control signal of terminal interaction program selected for manipulation is sent to selected terminal interaction program.
S230: terminal interaction process accepts control signal also sends to corresponding terminal;
Control signal is also sent to corresponding terminal by selected terminal interaction process accepts control signal, and terminal performs corresponding operating according to control signal.
S240: terminal generates feedback signal according to the operating state of self and sends to corresponding terminal interaction program;
After terminal performs corresponding operating according to control signal, its operating state may change, and now terminal generates feedback signal according to the operating state of self, and sends to corresponding terminal interaction program.
S250: terminal interaction process accepts feedback signal more new state accordingly, checks for client and manipulates;
The feedback signal that the terminal that terminal interaction process accepts is corresponding sends, and according to feedback signal more new state, make terminal interaction program can reflect the operating state of counterpart terminal in real time, check for client and manipulate.
As seen from the above embodiment, client is set up P2P with second server and is connected under the help of first server, client directly can log in second server, is checked and control terminal, realize the long-range direct control and operation to terminal by the terminal interaction program in second server.
In an embodiment of long-range control method of the present invention, first server is publicly-owned Cloud Server, and second server is privately owned Cloud Server, and second server is user select access server.Publicly-owned cloud is mainly used in the entry maps relation etc. of managing user information, privately owned cloud facility information and the privately owned cloud of respective user, and privately owned cloud is mainly used for preserving the private information of user and privately owned file etc.The present embodiment can be combined with the embodiment of any one server above.
In an embodiment of long-range control method of the present invention, first server is publicly-owned Cloud Server, and the 3rd server is privately owned Cloud Server, and the 3rd server and second server can be the same or different.Publicly-owned cloud is mainly used in the entry maps relation etc. of managing user information, privately owned cloud facility information and the privately owned cloud of respective user, and privately owned cloud is mainly used for preserving the private information of user and privately owned file etc.The present embodiment can be combined with above-described embodiment four or embodiment five.
As shown in Figure 7, the 7th embodiment of long-range control method of the present invention comprises:
S310: first server receives also customer in response end and uses the logging request of the first account and first password;
User inputs the first account on the client and first password logs in first server, first server is run the database of the information for recording account and this account of use another server addressable, search the first account in a database, and obtain address and the port of corresponding second server, namely obtain the access mode of corresponding second server.
S320: the access mode of the second server of correspondence is sent to client by first server;
The access mode of second server that first server will obtain, namely the address of second server and port send to client, use access mode to set up P2P with second server be connected and log in second server to make client.
S330: first server help client use access mode is set up P2P with second server and is connected, transmitted control signal to terminal by second server after using the second account and the second code entry second server to make client, terminal reception control signal according to control signal executable operations;
First server help client and second server to set up process that P2P is connected can with reference to the description of S120 step in long-range control method first embodiment of the present invention, the effect that wherein first server is main second server is issued in the address of client and port and notifies second server initiation connection request.Client and second server are set up after P2P is connected, and client can use the second account and the second code entry second server, then is transmitted control signal to terminal by second server, terminal reception control signal according to control signal executable operations.
From above embodiment, first server receives also customer in response end and uses the logging request of the first account and first password, first server runtime database obtains the access mode of corresponding second server and access mode is sent to client, first server also helps client and second server to set up P2P to be connected, client directly can be communicated with second server, realize the Long-distance Control to terminal and operation.
As shown in Figure 8, the 8th embodiment of long-range control method of the present invention is on the 7th embodiment basis, and the password limited further needed for client logs first server is the 3rd password with the password logged in needed for the 3rd server;
First server receives and the step of the logging request of customer in response end comprises:
S311: first server receives the logging request that client uses the first account and first password;
User on the client (as browser or application program) inputs the first account and first password and attempts to log in first server, first server operation service program, further can also runtime database.
S312: first server obtains the access mode of the 3rd server and the 3rd corresponding account according to the first account;
Client logs first server and the 3rd server use same password.Have recorded the first account, another server of the use same password corresponding to the first account and the information of another corresponding account in the database of first server, verify for acquisition password.First server searches the first account in a database, and obtains the 3rd account of the address of the 3rd server corresponding to this account, port information and correspondence.
S313: first server is according to access mode and the 3rd corresponding account request the 3rd server, and to obtain the 4th password, the 4th password uses the first non-reversible algorithm to obtain to the 3rd password;
First server connects according to the address port information of the 3rd server of correspondence and the 3rd server, and send the request of acquisition the 4th password to the 3rd server, the 4th password is the password using the first non-reversible algorithm to obtain to the 3rd password.Generally speaking, the first non-reversible algorithm refers to Hash (Hash) algorithm or salt adding hash algorithm, can use MD5, SHA1, SHA2, SHA256, SHA512, PBKDF2 wherein any one as hash algorithm.The user cipher that user confirms when completing the arranging of the first account is the 3rd password, logs in the password that first server and the 3rd server use and is the 3rd password.
S314: coupling the 4th password and the 5th password, wherein the 5th password is that first server uses the first non-reversible algorithm to obtain to first password;
First server uses the first non-reversible algorithm to obtain the 5th password to the first password that user inputs, and mates the 4th password and the 5th password, judges that the 4th password or both sides relation whether identical with the 5th password meets predetermined condition.
S315: according to matching result response logging request, if the 4th password and the 5th password coupling, then client logs first server success, otherwise login failure;
If the match is successful for the 4th password and the 5th password, judge that first password or both sides relation identical with the 3rd password meets predetermined condition, namely password or the both sides relation identical with user cipher of user's input meets predetermined condition, first server is by the logging request of client, otherwise the logging request of first server refusal client, and return miscue.
Client logs the 3rd server and first server use same password, the 3rd server preserves complete password, first server does not preserve password.When user logs in first server, first server obtains complete password to the 3rd server request, and verifies the password of user's input accordingly.Even if first server is broken like this, also cannot obtains user cipher with visiting the 3rd server, ensure that the fail safe of the 3rd server data.
As shown in Figure 9, in the 9th embodiment of long-range control method of the present invention, the password needed for client logs first server and the password logged in needed for the 3rd server are the 3rd password;
First server receives and the step of the logging request of customer in response end comprises:
S321: first server receives the logging request that client uses the first account and first password;
User on the client (as browser or application program) inputs the first account and first password and attempts to log in first server, first server operation service program, further can also runtime database.
S322: first server obtains the access mode of the 3rd server and the 3rd corresponding account according to the first account;
Client logs first server and the 3rd server use same password.Have recorded the first account, another server of the use same password corresponding to the first account and the information of another corresponding account in the database of first server, verify for acquisition password.First server searches the first account in a database, and obtains the 3rd account of the address of the 3rd server corresponding to this account, port information and correspondence.
S323: first server is according to access mode and the 3rd corresponding account request the 3rd server, and to obtain the 4th password, the 4th password uses the first non-reversible algorithm to obtain to the 3rd password;
First server connects according to the address port information of the 3rd server of correspondence and the 3rd server, and send the request of acquisition the 4th password to the 3rd server, the 4th password is the password using the first non-reversible algorithm to obtain to the 3rd password.Generally speaking, the first non-reversible algorithm refers to Hash (Hash) algorithm or salt adding hash algorithm, can use MD5, SHA1, SHA2, SHA256, SHA512, PBKDF2 wherein any one as hash algorithm.The user cipher that user confirms when completing the arranging of the first account is the 3rd password, logs in the password that first server and the 3rd server use and is the 3rd password.3rd server can preserve the 3rd password, sends to first server after using the first non-reversible algorithm to obtain the 4th password after receiving the request of first server to the 3rd password; Also can the first non-reversible algorithm be used to obtain the 4th password to the 3rd password and preserve the 4th password, the request receiving first server directly sends the 4th password afterwards.Oppositely can not calculating according to the 4th password and draw the 3rd password, preventing the leakage being caused user cipher in data transmission procedure by intercepting and capturing.
S324: coupling the 6th password and the 7th password, wherein the 6th password is that first server obtains the 4th password and the 8th password combination, 8th password is the password using the second non-reversible algorithm to obtain to the 3rd password that first server is preserved in advance, 7th password obtains the 5th password and the 9th password combination, wherein the 5th password is that first server uses the first non-reversible algorithm to obtain to first password, and the 9th password is that first server uses the second non-reversible algorithm to obtain to first password;
First server is preserved in advance the 8th password, each user confirms to revise first server after user cipher and just uses the second non-reversible algorithm obtain the 8th password and preserve to the 3rd password after revising; First server obtains the 6th password to the 4th password and the 8th password combination.Use the second non-reversible algorithm refer to extracting part quantile after re-use hash algorithm or salt adding hash algorithm processes.Combination can be the 4th password and the 8th password are stitched together, and also can refer to and use hash algorithm or salt adding hash algorithm to process by after the 4th password and the splicing of the 8th password.First server also uses the first non-reversible algorithm to obtain the 5th password to the first password of user's input, uses the second non-reversible algorithm to obtain the 9th password, then obtain the 7th password to the 5th password and the 9th password combination to first password; Then first server is mated the 6th password and the 7th password, judges that the 6th password or both sides relation whether identical with the 7th password meets predetermined condition.
S325: according to matching result response logging request, if the 6th password and the 7th password coupling, then client logs first server success, otherwise login failure;
If the match is successful for the 6th password and the 7th password, judge that first password or both sides relation identical with the 3rd password meets predetermined condition, namely the password inputted or both sides relation identical with user cipher meets predetermined condition, first server is by the logging request of client, otherwise return the logging request of first server refusal client, and return miscue.Such as an account is provided with a main password and at least one subcipher, corresponding relation is there is between subcipher and main password, such as subcipher is a part for main password, the first password of user's input also can Successful login when being any one subcipher, and now the relation of the relation of the 6th password and the 7th password, first password and the 3rd password meets predetermined condition.
From above embodiment, password needed for client logs first server and the password logged in needed for the 3rd server are the 3rd password, 3rd server preserves complete password, first server is only preserved the password through non-reversible algorithm process, and complete password can not be obtained according to the password that first server is preserved.When user logs in first server, first server obtains complete password to the 3rd server request, and verifies the password of user's input accordingly.Even if first server is broken like this, also cannot obtains user cipher with visiting the 3rd server, ensure that the fail safe of the 3rd server data.
As shown in Figure 10, the first embodiment of server of the present invention comprises:
Login response module 11, uses the logging request of the first account and first password for receiving also customer in response end;
Sending module 12, the access mode for the second server by correspondence sends to client;
Connect module 13, use access mode to set up P2P with second server for helping client to be connected, transmitted control signal to terminal by second server after using the second account and the second code entry second server to make client, terminal reception control signal according to control signal executable operations.
From above embodiment, first server receives also customer in response end and uses the logging request of the first account and first password, first server runtime database obtains the access mode of corresponding second server and access mode is sent to client, first server also helps client and second server to set up P2P to be connected, client directly can be communicated with second server, realize the Long-distance Control to terminal and operation.
As shown in figure 11, the second embodiment of server of the present invention is the improvement on the first embodiment basis of server of the present invention, and the password wherein needed for client logs first server and the password logged in needed for the 3rd server are the 3rd password; Login response module 11 comprises:
Receiving element 111, uses the logging request of the first account and first password for receiving client; On server, operation service program receives the logging request of user.
Selected cell 112, for obtaining the access mode of the 3rd server and the 3rd corresponding account according to the first account; Further runtime database on server, for recording another server of use same password corresponding to the first account, the first account and the information of the 3rd account, verifies for acquisition password.Search the first account in a database, and obtain the address of the 3rd corresponding server and port and the 3rd account, if can not find corresponding account information, refuse logging request and return miscue.
Acquiring unit 113, for the 3rd account request the 3rd server according to access mode and correspondence, to obtain the 4th password, the 4th password uses the first non-reversible algorithm to obtain to the 3rd password.Generally speaking, the first non-reversible algorithm refers to Hash (Hash) algorithm or salt adding hash algorithm, can use MD5, SHA1, SHA2, SHA256, SHA512, PBKDF2 wherein any one as hash algorithm.The user cipher that user confirms when completing the arranging of the first account is the 3rd password, logs in password needed for first server and the password logged in needed for the 3rd server is the 3rd password.Oppositely can not calculating according to the 4th password and draw the 3rd password, preventing the leakage being caused user cipher in data transmission procedure by intercepting and capturing.
Matching unit 114, for mating the 4th password and the 5th password, wherein the 5th password uses the first non-reversible algorithm to obtain to first password; Obtain first password from receiving element 111 and use the first non-reversible algorithm to calculate the 5th password, obtaining the 4th password from acquiring unit 113, and both are compared.
Response unit 115, for according to matching result response logging request, if the 4th password and the 5th password coupling, then client logs success, otherwise login failure; If the 4th password is identical with the 5th password or both sides relation meets predetermined condition, judge that first password or both sides relation identical with the 3rd password meets predetermined condition, server is by the logging request of client, otherwise the logging request of refusal client, and return miscue.Such as an account is provided with a main password and at least one subcipher, corresponding relation is there is between subcipher and main password, such as subcipher is a part for main password, the first password of user's input also can Successful login when being any one subcipher, and now the relation of the relation of the 4th password and the 5th password, first password and the 3rd password meets predetermined condition.
As shown in figure 12, in the 3rd embodiment of server of the present invention, the password wherein needed for client logs first server and the password logged in needed for the 3rd server are the 3rd password; Login response module 11 comprises:
Receiving element 211, uses the logging request of the first account and first password for receiving client; On server, operation service program accepts the logging request of user, storing subscriber information in database.
Selected cell 212, for obtaining the access mode of the 3rd server and the 3rd corresponding account according to the first account; Further runtime database on server, for recording the information of another server corresponding to the first account, the first account and the 3rd account, verifies for acquisition password.Search the first account in a database, and obtain the address of the 3rd corresponding server and port and the 3rd account, if can not find corresponding account information, refuse logging request and return miscue.
Acquiring unit 213, for the 3rd account request the 3rd server according to access mode and correspondence, to obtain the 4th password, the 4th password uses the first non-reversible algorithm to obtain to the 3rd password; The user cipher that user confirms when completing the arranging of the first account is the 3rd password, logs in password needed for first server and the password logged in needed for the 3rd server is the 3rd password.Oppositely can not calculating according to the 4th password and draw the 3rd password, preventing the leakage being caused user cipher in data transmission procedure by intercepting and capturing.
Matching unit 214, for mating the 6th password and the 7th password, wherein the 6th password obtains the 4th password obtained from acquiring unit 213 and the 8th password combination, and the 8th password is the password using the second non-reversible algorithm to obtain to pre-the 3rd password preserved; 7th password obtains the 5th password and the 9th password combination, wherein the 5th password uses the first non-reversible algorithm to obtain to the first password obtained from receiving element 211, and the 9th password uses the second non-reversible algorithm to obtain to the first password obtained from receiving element 211; Second non-reversible algorithm is different from the first non-reversible algorithm, even if the second non-reversible algorithm is cracked, the result obtained is also different from the 3rd password, and can not extrapolate the 3rd complete password according to cracking result.
Response unit 215, for according to matching result response logging request, if the 6th password and the 7th password coupling, then client logs success, otherwise login failure; If the 6th password is identical with the 7th password or both sides relation meets predetermined condition, judge that first password or both sides relation identical with the 3rd password meets predetermined condition, server is by the logging request of client, otherwise the logging request of refusal client, and return miscue.Such as an account is provided with a main password and at least one subcipher, corresponding relation is there is between subcipher and main password, such as subcipher is a part for main password, the first password of user's input also can Successful login when being any one subcipher, and now the relation of the relation of the 6th password and the 7th password, first password and the 3rd password meets predetermined condition.
From above embodiment, password needed for client logs first server and the password logged in needed for the 3rd server are the 3rd password, client uses the login first server of the first account and first password, first server obtains the access mode of the 3rd server and the 3rd corresponding account according to the first account, and then carry out password authentification according to access mode and the 3rd corresponding account request the 3rd server to obtain the 4th password, the correct client logs success of authentication password, otherwise client logs failure.
As shown in figure 13, the 4th embodiment of server of the present invention comprises:
Processor, memory and network communications circuits, memory and network communications circuits connection handling device respectively;
Processor is for running first service program, the logging request of the first account and first password is used to be received also customer in response end by network communications circuits, run and Query Database, search the first account in a database, and obtain address and the port of corresponding second server, the access mode (i.e. address and port) of the second server of correspondence is sent to client by network communications circuits, help client to use access mode to set up P2P with second server by network communications circuits to be connected, transmitted control signal to terminal by second server after using the second account and the second code entry second server to make client, and then terminal reception control signal according to control signal executable operations.
5th embodiment of server of the present invention is on the basis of the 4th embodiment, processor is further used for running second service program, to issue with maintain customer end application program, to check and manage the terminal interaction program that second server and second server are installed.Second service program is responsible for issuing new client application and carrying out regular maintenance and management to it.Second service program is also responsible for checking the terminal interaction program that second server and second server are installed and managing, when comprising terminal manufacturer renewal terminal interaction program, push to second server and upgrade, provide the new terminal interaction program issued to download for second server.
The server that any embodiment of server of the present invention provides is generally publicly-owned Cloud Server, and second server is privately owned Cloud Server.Publicly-owned Cloud Server is for checking and the terminal interaction program of installing on administrative client application program, privately owned Cloud Server and privately owned Cloud Server, and help privately owned Cloud Server and client to set up P2P to be connected, thus the privately owned Cloud Server of client logs by privately owned Cloud Server realization to the Long-distance Control of terminal and management.
As shown in figure 14, the first embodiment of network attached storage equipment of the present invention comprises:
Processor, hard disk and routing circuit, hard disk and routing circuit connection handling device respectively; The wan interface of routing circuit is connected through the internet to server, and LAN interface connects Intranet equipment respectively, and routing circuit is for completing the transmission of packet between processor and corresponding interface.Processor is used for exchanging routing information, searches routing table and forwarding data bag, coordinates routing circuit to realize the interconnection of local area network (LAN) and wide area network, the process of data and the routing function such as distribution, flow control.
Processor is also for running first service program, be connected to set up P2P by routing circuit and client under the help of first server, receive and the logging request of use second account sent by routing circuit of customer in response end and the second password, processor is also for running second service program, to be received the control signal that client sends by routing circuit, then by routing circuit, control signal is sent to terminal.
Second embodiment of network attached storage equipment of the present invention is on the basis of network attached storage equipment first embodiment of the present invention, processor also for running several terminal interaction programs, the corresponding terminal of each terminal interaction program; Control signal, also for running second service program, to receive the control signal of the terminal interaction program that client is chosen by the manipulation that routing circuit sends, is sent to selected terminal interaction program by processor; Processor is for running terminal interaction program, corresponding terminal is sent to by routing circuit with reception control signal, receive the feedback signal that corresponding terminal is sent by routing circuit, and according to feedback signal more new state, check for client and manipulate, wherein feedback signal is that terminal generates according to the operating state of self.
The corresponding terminal of each terminal interaction program, the operation and controlling that user is realized corresponding terminal by client logs second server operation control terminal interactive program.Control signal is first sent to the terminal interaction program chosen by client, and control signal is sent to corresponding terminal by the terminal interaction program then chosen, and corresponding terminal makes corresponding operating according to control signal.
Client and second server are set up the object that P2P is connected and are, realize the direct control to terminal, therefore terminal interaction program needs the current operating state representing counterpart terminal.Terminal by showing that the feedback signal of self operating state issues terminal interaction program corresponding on second server, being checked for client and manipulating after self operating state changes.This operation can be the control signal sent at terminal receiving terminal interactive program and carry out after carrying out corresponding operating, carry out after the operation (such as preengaging switch, the in-plant manipulation of other users etc.) that also can change terminal operating status at other occurs.
Network attached storage equipment is generally as privately owned Cloud Server, privately owned Cloud Server is set up P2P with client and is connected under the help of publicly-owned Cloud Server, makes client can log in privately owned Cloud Server and realizes Long-distance Control to terminal and management by privately owned Cloud Server.
The foregoing is only embodiments of the present invention; not thereby the scope of the claims of the present invention is limited; every utilize specification of the present invention and accompanying drawing content to do equivalent structure or equivalent flow process conversion; or be directly or indirectly used in other relevant technical fields, be all in like manner included in scope of patent protection of the present invention.

Claims (21)

1. a long-range control method, is characterized in that, comprising:
Client uses the first account and first password to log in first server to obtain the access mode of second server;
Described client uses described access mode to set up P2P with described second server under the help of described first server to be connected;
Described client uses second server described in the second account and the second password login;
Described client is transmitted control signal to terminal by described second server;
Described terminal receives described control signal and according to described control signal executable operations.
2. method according to claim 1, is characterized in that,
Described in described client logs, first server comprises with the access mode obtaining second server:
Described client uses the first account and first password to log in first server;
Described client is checked and is used the addressable server list of described first account and select the second server of wish access to obtain the access mode of described second server, or described first account only may have access to described second server time, described client directly obtains the access mode of described second server from described first server.
3. method according to claim 2, is characterized in that,
Each described addressable server runs several terminal interaction programs, and the mount message of described terminal interaction program is regularly reported to described first server, the addressable server list of described first account of described use is further listed in the terminal interaction program listing that described addressable server is installed, so that described client is checked and managed.
4. method according to claim 1, is characterized in that,
Described client uses different accounts to log in, and authority that described second server has is identical or different.
5. method according to claim 1, is characterized in that,
Password described in described client logs needed for first server and the password logged in needed for the 3rd server are the 3rd password;
Described in described client logs, the step of first server comprises:
Described first server receives the logging request that described client uses described first account and described first password;
Described first server obtains the access mode of described 3rd server and the 3rd corresponding account according to described first account;
Described first server is the 3rd server according to described access mode and the 3rd corresponding account request, and to obtain the 4th password, described 4th password uses the first non-reversible algorithm to obtain to described 3rd password;
Mate described 4th password and the 5th password, wherein said 5th password is that described first server uses described first non-reversible algorithm to obtain to described first password;
Described logging request is responded according to matching result, if described 4th password and described 5th password coupling, then first server success described in described client logs, otherwise login failure.
6. method according to claim 1, is characterized in that,
Password described in described client logs needed for first server and the password logged in needed for the 3rd server are the 3rd password;
Described in described client logs, the step of first server comprises:
Described first server receives the logging request that described client uses described first account and described first password;
Described first server obtains the access mode of the 3rd server and the 3rd corresponding account according to described first account;
Described first server is the 3rd server according to described access mode and the 3rd corresponding account request, and to obtain the 4th password, described 4th password uses the first non-reversible algorithm to obtain to described 3rd password;
Mate the 6th password and the 7th password, wherein said 6th password is that described first server obtains described 4th password and the 8th password combination, described 8th password is the password using the second non-reversible algorithm to obtain to described 3rd password that described first server is preserved in advance, described 7th password obtains the 5th password and the 9th password combination, wherein said 5th password is that described first server uses described first non-reversible algorithm to obtain to described first password, described 9th password is that described first server uses described second non-reversible algorithm to obtain to described first password,
Described logging request is responded according to matching result, if described 6th password and described 7th password coupling, then first server success described in described client logs, otherwise login failure.
7. method according to claim 1, is characterized in that,
Described second server runs several terminal interaction programs, the corresponding terminal of each described terminal interaction program;
Described client to be transmitted control signal to described terminal by described second server and comprises:
Second server described in described client-access, to send control signal to selected terminal interaction program;
Described second server receives described control signal, described control signal is sent to selected described terminal interaction program;
Control signal described in described terminal interaction process accepts also sends to corresponding terminal.
8. method according to claim 7, is characterized in that,
Described terminal also generates feedback signal according to the operating state of self and sends to corresponding described terminal interaction program;
Feedback signal described in described terminal interaction process accepts more new state accordingly, check for described client and manipulate.
9. the method according to any one of claim 1 to 8, is characterized in that,
Described first server is publicly-owned Cloud Server, and described second server is privately owned Cloud Server.
10. the method according to claim 5 or 6, is characterized in that,
Described first server is publicly-owned Cloud Server, and described 3rd server is privately owned Cloud Server.
11. 1 kinds of long-range control methods, is characterized in that, comprising:
First server receives also customer in response end and uses the logging request of the first account and first password;
The access mode of second server is sent to described client by described first server;
Described first server helps described client to use described access mode to set up P2P with described second server to be connected, transmitted control signal to terminal by described second server after using second server described in the second account and the second password login to make described client, described terminal receives described control signal and according to described control signal executable operations.
12. methods according to claim 11, is characterized in that,
Password described in described client logs needed for first server and the password logged in needed for the 3rd server are the 3rd password;
Described first server receives and the step of the logging request of customer in response end comprises:
Described first server receives the logging request that described client uses described first account and described first password;
Described first server obtains the access mode of described 3rd server and the 3rd corresponding account according to described first account;
Described first server is the 3rd server according to described access mode and the 3rd corresponding account request, and to obtain the 4th password, described 4th password uses the first non-reversible algorithm to obtain to described 3rd password;
Mate described 4th password and the 5th password, wherein said 5th password is that described first server uses described first non-reversible algorithm to obtain to described first password;
Described logging request is responded according to matching result, if described 4th password and described 5th password coupling, then first server success described in described client logs, otherwise login failure.
13. methods according to claim 11, is characterized in that,
Password described in described client logs needed for first server and the password logged in needed for the 3rd server are the 3rd password;
Described first server receives and the step of the logging request of customer in response end comprises:
Described first server receives the logging request that described client uses described first account and described first password;
Described first server obtains the access mode of the 3rd server and the 3rd corresponding account according to described first account;
Described first server is the 3rd server according to described access mode and the 3rd corresponding account request, and to obtain the 4th password, described 4th password uses the first non-reversible algorithm to obtain to described 3rd password;
Mate the 6th password and the 7th password, wherein said 6th password is that described first server obtains described 4th password and the 8th password combination, described 8th password is the password using the second non-reversible algorithm to obtain to described 3rd password that described first server is preserved in advance, described 7th password obtains the 5th password and the 9th password combination, wherein said 5th password is that described first server uses described first non-reversible algorithm to obtain to described first password, described 9th password is that described first server uses described second non-reversible algorithm to obtain to described first password,
Described logging request is responded according to matching result, if described 6th password and described 7th password coupling, then first server success described in described client logs, otherwise login failure.
14. 1 kinds of servers, is characterized in that, comprising:
Login response module, uses the logging request of the first account and first password for receiving also customer in response end;
Sending module, the access mode for the second server by correspondence sends to described client;
Connect module, use described access mode to set up P2P with described second server for helping described client to be connected, transmitted control signal to terminal by described second server after using second server described in described second account and the second code entry to make described client, described terminal receives described control signal and according to described control signal executable operations.
15. servers according to claim 14, is characterized in that,
Password described in described client logs needed for first server and the password logged in needed for the 3rd server are the 3rd password;
Described login response module comprises:
Receiving element, uses the logging request of described first account and described first password for receiving described client;
Selected cell, for obtaining access mode and the 3rd account of the 3rd server according to described first account;
Acquiring unit, for the 3rd server according to described access mode and the 3rd corresponding account request, to obtain the 4th password, described 4th password uses the first non-reversible algorithm to obtain to described 3rd password;
Matching unit, for mating described 4th password and the 5th password, wherein said 5th password uses described first non-reversible algorithm to obtain to described first password;
Response unit, for responding described logging request according to matching result, if described 4th password and the 5th password coupling, then described first account logins successfully, otherwise login failure.
16. servers according to claim 14, is characterized in that,
Password described in described client logs needed for first server and the password logged in needed for the 3rd server are the 3rd password;
Described login response module comprises:
Receiving element, uses the logging request of described first account and described first password for receiving described client;
Selected cell, for obtaining the access mode of the 3rd server and the 3rd corresponding account according to described first account;
Acquiring unit, for the 3rd server according to described access mode and the 3rd corresponding account request, to obtain the 4th password, described 4th password uses the first non-reversible algorithm to obtain to described 3rd password;
Matching unit, for mating the 6th password and the 7th password, wherein said 6th password obtains described 4th password and the 8th password combination, described 8th password is the pre-password using the second non-reversible algorithm to obtain to described 3rd password preserved, described 7th password obtains the 5th password and the 9th password combination, wherein said 5th password uses described first non-reversible algorithm to obtain to described first password, and described 9th password uses described second non-reversible algorithm to obtain to described first password;
Response unit, for responding described logging request according to matching result, if described 6th password and described 7th password coupling, then described first account logins successfully, otherwise login failure.
17. 1 kinds of servers, is characterized in that, comprising:
Processor, memory and network communications circuits, described memory and network communications circuits are connected described processor respectively;
Described processor is for running first service program, the logging request of the first account and first password is used to be received also customer in response end by described network communications circuits, the access mode of the second server of correspondence is sent to described client by described network communications circuits, help described client to use described access mode to set up P2P with described second server by described network communications circuits to be connected, transmitted control signal to terminal by described second server after using second server described in the second account and the second password login to make described client, described terminal receives described control signal and according to described control signal executable operations.
18. servers according to claim 17, is characterized in that,
Described processor is further used for running second service program, to issue and maintain customer end application program, checks and manage the terminal interaction program that described second server and described second server are installed.
19. 1 kinds of network attached storage equipment, is characterized in that, comprising:
Processor, hard disk and routing circuit, described hard disk and routing circuit are connected described processor respectively;
Described processor is for running first service program, be connected to set up P2P by described routing circuit with described client under the help of first server, receive and respond the logging request of use second account that described client sent by described routing circuit and the second password, described processor is also for running second service program, to be received the control signal that described client sends by described routing circuit, then by described routing circuit, described control signal is sent to terminal.
20. network attached storage equipment according to claim 19, is characterized in that,
Described processor for running several terminal interaction programs, the corresponding terminal of each described terminal interaction program;
Described control signal, also for running second service program, to receive the control signal of the terminal interaction program that described client is selected by the manipulation that described routing circuit sends, is sent to selected described terminal interaction program by described processor;
Described processor for running described terminal interaction program, to receive described control signal and to send to corresponding terminal by described routing circuit.
21. network attached storage equipment according to claim 19, is characterized in that,
Described processor, also for running terminal interaction program, to receive the feedback signal that corresponding described terminal is sent by described routing circuit, and according to described feedback signal more new state, being checked for described client and being manipulated;
Wherein said feedback signal is that described terminal generates according to the operating state of self.
CN201510642615.9A 2015-09-30 2015-09-30 A kind of long-range control method and server Active CN105245596B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201510642615.9A CN105245596B (en) 2015-09-30 2015-09-30 A kind of long-range control method and server
PCT/CN2016/080664 WO2017054443A1 (en) 2015-09-30 2016-04-29 Remote control method, server and network attached storage

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510642615.9A CN105245596B (en) 2015-09-30 2015-09-30 A kind of long-range control method and server

Publications (2)

Publication Number Publication Date
CN105245596A true CN105245596A (en) 2016-01-13
CN105245596B CN105245596B (en) 2019-02-05

Family

ID=55043094

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510642615.9A Active CN105245596B (en) 2015-09-30 2015-09-30 A kind of long-range control method and server

Country Status (2)

Country Link
CN (1) CN105245596B (en)
WO (1) WO2017054443A1 (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106331118A (en) * 2016-08-26 2017-01-11 深圳市智物联网络有限公司 A data processing system, a public cloud server and private cloud servers in an internet of things
CN106453238A (en) * 2016-08-22 2017-02-22 深圳市先河系统技术有限公司 Login method and system, electronic terminal, public network server and private cloud device
WO2017054443A1 (en) * 2015-09-30 2017-04-06 深圳市先河系统技术有限公司 Remote control method, server and network attached storage
CN106850384A (en) * 2017-01-12 2017-06-13 深圳市先河系统技术有限公司 A kind of method and mobile terminal for realizing accessing equipment in LAN
CN107104958A (en) * 2017-04-14 2017-08-29 深圳市先河系统技术有限公司 Manage the method, private clound and public cloud equipment and storage device of private clound equipment
WO2017156960A1 (en) * 2016-03-18 2017-09-21 北京小米移动软件有限公司 Method and device for accessing smart camera
CN107203157A (en) * 2016-03-18 2017-09-26 上海科斗电子科技有限公司 Intelligent hardware network interaction system
CN108476225A (en) * 2016-11-30 2018-08-31 华为技术有限公司 password detection method, device and terminal
CN109413120A (en) * 2017-08-16 2019-03-01 北京小鸟听听科技有限公司 A kind of communication means and device, electronic equipment and server
CN110488617A (en) * 2019-07-08 2019-11-22 湖南优创智能科技有限公司 Intelligent home control system, method and terminal device
CN112702391A (en) * 2020-12-09 2021-04-23 湖南新九方科技有限公司 Remote networking method and networking system for industrial control equipment
CN116868740A (en) * 2023-06-30 2023-10-13 广东环境保护工程职业学院 Plant maintenance method, device, system and medium

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110298162A (en) * 2019-05-22 2019-10-01 深圳壹账通智能科技有限公司 Application client login method, device, computer equipment and storage medium
CN112347439B (en) * 2020-11-11 2023-04-11 西安万像电子科技有限公司 Method and system for visitor login access

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102413182A (en) * 2011-11-17 2012-04-11 南京天溯自动化控制系统有限公司 Intelligent home device remote monitoring device and method
CN102594823A (en) * 2012-02-20 2012-07-18 南京邮电大学 Trusted system for remote secure access of intelligent home
CN104394051A (en) * 2014-11-28 2015-03-04 杨光源 Intelligent home control system and intelligent home router
US20150198938A1 (en) * 2014-01-15 2015-07-16 Green Edge Technologies, Inc. Systems, devices, methods and graphical user interface for configuring a building automation system
CN104917748A (en) * 2015-04-14 2015-09-16 百度在线网络技术(北京)有限公司 Method and device for performing conversion and processing on password information

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN202424779U (en) * 2011-11-17 2012-09-05 南京天溯自动化控制系统有限公司 Remote monitoring device for intelligent home furnishing equipment
CN102938729B (en) * 2012-10-30 2016-12-21 山东智慧生活数据系统有限公司 The long-range control method of intelligent gateway, intelligent domestic system and home appliance
US20140244001A1 (en) * 2013-02-25 2014-08-28 Qualcomm Incorporated Controlling many different devices from a smart controller
CN104320494A (en) * 2014-11-15 2015-01-28 周成亮 Intelligent home doorbell system based on cloud technology and Internet of Things technology
CN204650255U (en) * 2015-05-20 2015-09-16 宁夏中远智信科技有限公司 A kind of intelligent home control system based on P2P interconnection technique
CN104917840A (en) * 2015-06-15 2015-09-16 深圳市太太爱物联智能家居有限公司 Equipment and method for implementing remote intelligent control of cooking
CN105245596B (en) * 2015-09-30 2019-02-05 深圳市先河系统技术有限公司 A kind of long-range control method and server

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102413182A (en) * 2011-11-17 2012-04-11 南京天溯自动化控制系统有限公司 Intelligent home device remote monitoring device and method
CN102594823A (en) * 2012-02-20 2012-07-18 南京邮电大学 Trusted system for remote secure access of intelligent home
US20150198938A1 (en) * 2014-01-15 2015-07-16 Green Edge Technologies, Inc. Systems, devices, methods and graphical user interface for configuring a building automation system
CN104394051A (en) * 2014-11-28 2015-03-04 杨光源 Intelligent home control system and intelligent home router
CN104917748A (en) * 2015-04-14 2015-09-16 百度在线网络技术(北京)有限公司 Method and device for performing conversion and processing on password information

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017054443A1 (en) * 2015-09-30 2017-04-06 深圳市先河系统技术有限公司 Remote control method, server and network attached storage
WO2017156960A1 (en) * 2016-03-18 2017-09-21 北京小米移动软件有限公司 Method and device for accessing smart camera
CN107203157A (en) * 2016-03-18 2017-09-26 上海科斗电子科技有限公司 Intelligent hardware network interaction system
US10425403B2 (en) 2016-03-18 2019-09-24 Beijing Xiaomi Mobile Software Co., Ltd. Method and device for accessing smart camera
CN106453238B (en) * 2016-08-22 2020-02-21 深圳市先河系统技术有限公司 Login method and system, electronic terminal, public network server and private cloud equipment
CN106453238A (en) * 2016-08-22 2017-02-22 深圳市先河系统技术有限公司 Login method and system, electronic terminal, public network server and private cloud device
CN106331118A (en) * 2016-08-26 2017-01-11 深圳市智物联网络有限公司 A data processing system, a public cloud server and private cloud servers in an internet of things
CN108476225A (en) * 2016-11-30 2018-08-31 华为技术有限公司 password detection method, device and terminal
CN108476225B (en) * 2016-11-30 2020-03-20 华为技术有限公司 Password detection method and device and terminal
CN106850384A (en) * 2017-01-12 2017-06-13 深圳市先河系统技术有限公司 A kind of method and mobile terminal for realizing accessing equipment in LAN
CN107104958A (en) * 2017-04-14 2017-08-29 深圳市先河系统技术有限公司 Manage the method, private clound and public cloud equipment and storage device of private clound equipment
CN107104958B (en) * 2017-04-14 2020-06-19 深圳市先河系统技术有限公司 Method for managing private cloud equipment, private cloud, public cloud equipment and storage device
CN109413120A (en) * 2017-08-16 2019-03-01 北京小鸟听听科技有限公司 A kind of communication means and device, electronic equipment and server
CN110488617A (en) * 2019-07-08 2019-11-22 湖南优创智能科技有限公司 Intelligent home control system, method and terminal device
CN112702391A (en) * 2020-12-09 2021-04-23 湖南新九方科技有限公司 Remote networking method and networking system for industrial control equipment
CN116868740A (en) * 2023-06-30 2023-10-13 广东环境保护工程职业学院 Plant maintenance method, device, system and medium

Also Published As

Publication number Publication date
WO2017054443A1 (en) 2017-04-06
CN105245596B (en) 2019-02-05

Similar Documents

Publication Publication Date Title
CN105245596A (en) Remote control method, server and network attached storage device
EP3073699B1 (en) System and method for controlling mutual access of smart devices
US9596501B2 (en) Remote control processing method, device and system
US9973567B2 (en) System and method for terminal management in a home network using a virtual client
CN105471686B (en) Terminal control method, device and system
CN104348903B (en) It is a kind of to establish point-to-point online communication system and its device
CN105306264A (en) Network configuration and remote registration binding method and system for intelligent household appliance
CN101360010A (en) Set-top box remote monitoring method based on internet service station
US20140379860A1 (en) Method for communicating data between a domestic appliance and a user terminal, a domestic appliance, and a system comprising a domestic appliance and a user terminal
CN105704166A (en) Robot system and realization method, client sides and servers thereof and game system
CN108259467A (en) A kind of encryption and authentication method of block chain communication system
EP3331247A1 (en) Multi-screen control method and device
US11146643B2 (en) Message bus agent apparatus, signaling server, message bus management server, connection establishment method, and program
CN104349208A (en) Message processing method, message processing device, gateway, set-top box and network television system
CN112035822A (en) Multi-application single sign-on method, device, equipment and storage medium
CN101808112A (en) Remote device maintenance method based on TELNET and proxy
CN103973785A (en) Log reading system based on P2P and method thereof
CN110557318A (en) Method for realizing safe remote operation of IOT equipment
CN103439934A (en) Intelligent electrical appliance control method, server and system
CN112260852A (en) Method for realizing automatic service opening by inserting EPON ONU fiber
CN113985743A (en) Equipment control method, device and system, storage medium and electronic device
CN111147285B (en) Cloud security product unified management method
US20140373107A1 (en) System and method for controlling a dns request
KR101058275B1 (en) Communication terminal and its control method, P2P server system and its control method
CN106154852A (en) Intelligent appliance equipment and control method thereof and intelligent appliance control system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant