CN105656899B - A kind of decentralization login method, client and system - Google Patents

A kind of decentralization login method, client and system Download PDF

Info

Publication number
CN105656899B
CN105656899B CN201610009359.4A CN201610009359A CN105656899B CN 105656899 B CN105656899 B CN 105656899B CN 201610009359 A CN201610009359 A CN 201610009359A CN 105656899 B CN105656899 B CN 105656899B
Authority
CN
China
Prior art keywords
client
decentralization
logs
login
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610009359.4A
Other languages
Chinese (zh)
Other versions
CN105656899A (en
Inventor
黄松发
陈姝
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING ZHONGXIANG BIT TECHNOLOGY Co Ltd
Original Assignee
BEIJING ZHONGXIANG BIT TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING ZHONGXIANG BIT TECHNOLOGY Co Ltd filed Critical BEIJING ZHONGXIANG BIT TECHNOLOGY Co Ltd
Priority to CN201610009359.4A priority Critical patent/CN105656899B/en
Publication of CN105656899A publication Critical patent/CN105656899A/en
Application granted granted Critical
Publication of CN105656899B publication Critical patent/CN105656899B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint

Landscapes

  • Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

This application discloses a kind of decentralization login methods, including:After first decentralization logs in the first identity number (ID) that client receives the first decentralization login client, the 2nd ID that the second decentralization logs in client is received, the 2nd ID that the first decentralization logs in the first ID of client and the second decentralization logs in client is sent by network-node server respectively;First decentralization logs in client and logs in client according to the first ID of the first decentralization login client and the 2nd ID of the second decentralization login client and the second decentralization and establish direct channel;After first decentralization logs in client login, passes through direct channel and receive basic data information.Disclosed herein as well is another decentralization login method, a kind of decentralizations to log in client, another decentralization logs in client and a kind of decentralization login system.

Description

A kind of decentralization login method, client and system
Technical field
The present disclosure relates generally to a kind of decentralization field more particularly to decentralization login method, client and systems.
Background technology
The social software of client mainly uses the centralization login method based on centralized server at present, here, visitor Family end includes PC (Personal Computer, PC) client and cell-phone customer terminal.
Centralized server uniformly preserves account number cipher information required when client logs in.Specifically, centralization service Device generally use file based database application preserve user client registers account number cipher information data and good friend's table data, because This makes the account number cipher information of user's registration and buddy list be solidificated in centralized server.Here, file based database application packet Include the relationship types numbers such as two dimensionization database, such as the inscriptions on bones or tortoise shells (Oracle) database, MySQL, Microsoft (Microsoft, MS) SQL According to library;File based database application further includes the non-relational database (NoSQL) of text-type.
In addition, client is communicated using fixed port and fixed centralized server.Centralized server is adopted With fixed port to client transmission data.Client preserves data in client local after receiving data.
Specifically, the centralization login method based on centralized server includes:Step S1, society is installed on pc client Software is handed over, social software is started;Step S2, register account number, go to step S3 if having registered;Step S3, it prompts defeated Enter account and password;Step S4, account and the password centralized server known to public network log in after being verified;Step S5, After login, centralized server returns buddy list info basic data, and so far login action is completed.
To sum up, the technical characteristic of the centralization login method based on centralized server includes:
(1) client needs to log in single centralized server, and the data type that centralized server preserves is fixed;
(2) client registers are to during the entire process of logging in, from remotely to local with data trace;
(3) communication port unification, i.e. client and centralized server are communicated by single channel.
It can be seen that including using the technical issues of centralization login method:
(1) there are security risks for centralization login method so that data are stolen leakage, monitored and by Brute Force.
(2) centralized server is supervised due to being exposed on public network or is monitored by hacker.So that data do not have There is safety.Centralized server requires high client can be to centralization similar to a kind of data backup device, therefore to privacy Server generates sense of insecurity.
Invention content
In view of drawbacks described above in the prior art or deficiency, be intended to provide a kind of decentralization login method, client and System can ensure the safety of data and privacy during logging on communication.
In a first aspect, the embodiment of the present disclosure provides a kind of decentralization login method, including:
First decentralization logs in client and receives identity No. the first of reception that the first decentralization logs in client After code (Identification, ID), the 2nd ID that the second decentralization logs in client is received, first decentralization is stepped on The 2nd ID of the first ID and second decentralization login client that record client are sent by network-node server respectively;
First decentralization logs in the first ID and the institute that client logs in client according to first decentralization It states the 2nd ID of the second decentralization login client and the second decentralization logs in client and establishes direct channel;
After first decentralization logs in client login, passes through the direct channel and receive basic data information.
In said program, after the 2nd ID for receiving the second decentralization login client and described first goes to center Change and logs in the first ID and second decentralization login client that client logs in client according to first decentralization 2nd ID at end and the second decentralization log in client and establish before direct channel, and the method further includes:
First decentralization log in client second decentralization is logged in client the 2nd ID preserve to First local buddy list;
First decentralization logs in client and receives the second network association that second decentralization logs in client The information of the second port of the address (Internet Protocol, IP) and second decentralization login client is discussed, it is described Second decentralization logs in the letter of the second IP address of client and the second port of second decentralization login client Breath is sent by the network-node server.
In said program, the basic data information includes encrypted extensible markup language (Extensible Markup Language, XML) file, the encrypted XML file includes basic data.
In said program, first decentralization logs in client and receives the first decentralization login client After first ID and before the 2nd ID of the reception the second decentralization login client, the method further includes:
First decentralization logs in client and adds two characters to first decentralization login client In first ID, the first ID Quick Response Codes that first decentralization logs in client are generated;Wherein, after two characters of the addition First decentralization to log in the first ID of client be 130 character strings, first decentralization logs in client The first ID Quick Response Codes include information that first decentralization logs in the first ID of client, second decentralization is stepped on The 2nd ID for recording client is 128 character strings.
Second aspect, the embodiment of the present disclosure provide another decentralization login method, including:
After second decentralization logs in the 2nd ID that client receives the second decentralization login client, identification first is gone Centralization logs in the first ID of client, and first decentralization logs in the first ID of client and second decentralization The 2nd ID for logging in client is sent by network-node server respectively;
Second decentralization logs in the first ID and the institute that client logs in client according to first decentralization It states the 2nd ID of the second decentralization login client and the first decentralization logs in client and establishes direct channel;
Second decentralization logs in client and sends basic data information by the direct channel.
In said program, the first decentralization of the identification logs in the first ID of client later and described second goes to center Change and logs in the first ID and second decentralization login client that client logs in client according to first decentralization 2nd ID at end and the first decentralization log in client and establish before direct channel, and the method further includes:
Second decentralization log in client first decentralization is logged in client the first ID preserve to After second local buddy list, the network-node server is notified to send second decentralization logs in client second ID;
Second decentralization logs in client and receives the first IP address and that the first decentralization logs in client One decentralization logs in the information of the first port of client, first decentralization log in client the first IP address and The information that first decentralization logs in the first port of client is sent by the network-node server.
In said program, the first ID that the first decentralization of the identification logs in client includes:
The first ID Quick Response Codes that the first decentralization logs in client are scanned, first decentralization is obtained and logs in client First ID at end, the first ID Quick Response Codes that first decentralization logs in client include that first decentralization logs in visitor The information of first ID at family end.
The third aspect, the embodiment of the present disclosure provide a kind of decentralization login client, including:
Receiving module after being used to receive the first ID that the first decentralization logs in client, receives the second decentralization and steps on The 2nd ID of client is recorded, first decentralization logs in the first ID of client and second decentralization logs in client 2nd ID at end is sent by network-node server respectively;
Direct channel establishes module, the first ID and described second for logging in client according to first decentralization Decentralization logs in the 2nd ID of client and the second decentralization logs in client and establishes direct channel;
Login module receives basic data information after logging in by the direct channel.
In said program, the client further includes preserving receiving module, wherein
The 2nd ID that the receiving module receives the second decentralization login client is established with the direct channel later Module logs in the first ID of client according to first decentralization and second decentralization logs in the second of client ID is established before direct channel, the 2nd ID guarantors for preserving receiving module and being used to log in second decentralization client It deposits to the first local buddy list;It receives second decentralization and logs in the second IP address of client and described second and go The heartization logs in the information of the second port of client, and second decentralization logs in the second IP address and described the of client The information that two decentralizations log in the second port of client is sent by the network-node server.
In said program, the basic data information includes encrypted XML file, and the encrypted XML file includes base Plinth data.
In said program, the receiving module receives the first decentralization and logs in after the first ID of client and receive the Before two decentralizations log in the 2nd ID of client, the receiving module is additionally operable to two characters of addition and goes to described first The heartization logs in the first ID of client, generates the first ID Quick Response Codes that first decentralization logs in client;Wherein, institute It is 130 character strings to state first decentralization after two characters of addition and log in the first ID of client, and described first goes The first ID Quick Response Codes that centralization logs in client include the information that first decentralization logs in the first ID of client, institute It is 128 character strings to state the second decentralization and log in the 2nd ID of client.
Fourth aspect, the embodiment of the present disclosure provide another decentralization and log in client, including:
Identification module is received, after the 2nd ID that client is logged in for receiving the second decentralization, center is gone in identification first Change the first ID for logging in client, first decentralization logs in the first ID of client and second decentralization logs in 2nd ID of client is sent by network-node server respectively;
Direct channel establishes module, the first ID and described second for logging in client according to first decentralization Decentralization logs in the 2nd ID of client and the first decentralization logs in client and establishes direct channel;
Sending module, for sending basic data information by the direct channel.
In said program, the client further includes preserving receiving module, wherein
It is described receive identification module identify the first decentralization log in client the first ID after and the direct channel It establishes module and client is logged according to the first ID and second decentralization of first decentralization login client 2nd ID and the first decentralization log in client and establish before direct channel, and the preservation receiving module is used for described first The first ID that decentralization logs in client is preserved to the second local buddy list, and the network-node server is notified to send Second decentralization logs in the 2nd ID of client;Receive the first IP address and that the first decentralization logs in client One decentralization logs in the information of the first port of client, first decentralization log in client the first IP address and The information that first decentralization logs in the first port of client is sent by the network-node server.
In said program, the reception identification module includes recognition unit, and first decentralization for identification logs in First ID of client;Wherein,
The recognition unit the first ID that first decentralization logs in client for identification includes:
The first ID Quick Response Codes that the first decentralization logs in client are scanned, first decentralization is obtained and logs in client First ID at end, the first ID Quick Response Codes that first decentralization logs in client include that first decentralization logs in visitor The information of first ID at family end.
5th aspect, the embodiment of the present disclosure provide a kind of decentralization login system, including:
Second described in client and fourth aspect is logged in the system comprises the first decentralization described in the third aspect Decentralization logs in client, further includes network-node server, wherein
First decentralization logs in client, and center is gone to for receiving the network-node server is sent first After changing the first ID for logging in client, the second decentralization that the network-node server is sent logs in client the is received Two ID;The first ID of client is logged according to first decentralization and second decentralization logs in the second of client ID logs in client with second decentralization and establishes direct channel;After login, described the is received by the direct channel Two decentralizations log in the basic data information that client is sent;
Second decentralization logs in client, is gone for receiving the network-node server is sent described second After centralization logs in the 2nd ID of client, identify that first decentralization logs in the first ID of client;According to described The 2nd ID that one decentralization logs in the first ID of client and second decentralization logs in client is gone with described first Centralization logs in client and establishes the direct channel;The basic data information is sent to described the by the direct channel One decentralization logs in client;
The network-node server logs in the first ID of client to described for sending first decentralization After one decentralization logs in client, the 2nd ID to described second for sending the second decentralization login client goes to center Change and logs in client.
Decentralization login method, client and the system that the embodiment of the present disclosure is provided, by decentralization login system In the first decentralization log in after client receives the first ID that the first decentralization logs in client, receive and second go to center Change the 2nd ID for logging in client, first decentralization logs in the first ID of client and second decentralization logs in 2nd ID of client is sent by network-node server respectively;The first ID of client is logged according to first decentralization The 2nd ID of client is logged in second decentralization and the second decentralization in decentralization login system logs in visitor Direct channel is established at family end;After login, the first decentralization logs in client by the direct channel from the second decentralization It logs in client and receives basic data information.Since the embodiment of the present disclosure uses network-node server rather than centralization service Device is logged in without centralization, therefore ensures the safety of data in login process;Meanwhile the embodiment of the present disclosure is provided Decentralization login method can log in without register account number, and then solve the skill that code data is revealed in centralization login Art problem;In addition, the decentralization login method that the embodiment of the present disclosure is provided is not necessarily to log in client in the first decentralization Preserve data information, it is possible to maximize and ensure login security.
Description of the drawings
By reading a detailed description of non-restrictive embodiments in the light of the attached drawings below, the application's is other Feature, objects and advantages will become more apparent upon:
Fig. 1 is the implementation process schematic diagram for the decentralization login method that the embodiment of the present disclosure 1 provides;
Fig. 2 is the implementation process schematic diagram for the decentralization login method that the embodiment of the present disclosure 2 provides;
Fig. 3 is the implementation process schematic diagram for the decentralization login method that the embodiment of the present disclosure 3 provides;
Fig. 4 is the composed structure schematic diagram that the decentralization that the embodiment of the present disclosure 4 provides logs in client;
Fig. 5 is the composed structure schematic diagram that the decentralization that the embodiment of the present disclosure 5 provides logs in client.
Specific implementation mode
The application is described in further detail with reference to the accompanying drawings and examples.It is understood that this place is retouched The specific embodiment stated is used only for explaining related invention, rather than the restriction to the invention.It also should be noted that in order to Convenient for description, is illustrated only in attached drawing and invent relevant part.
It should be noted that in the absence of conflict, the features in the embodiments and the embodiments of the present application can phase Mutually combination.The application is described in detail below with reference to the accompanying drawings and in conjunction with the embodiments.
Embodiment 1
Fig. 1 is the decentralization login method that the embodiment of the present disclosure 1 provides.As shown in Figure 1, the decentralization login side Method is the decentralization login method of the first decentralization login client in decentralization login system, including:
Step 110:After first decentralization logs in the first ID that client receives the first decentralization login client, connect The 2nd ID that the second decentralization logs in client is received, first decentralization logs in the first ID and described second of client The 2nd ID that decentralization logs in client is sent by network-node server respectively.
Before step 110, the first decentralization logs in client terminal start-up, accesses network-node server (Network Node Server, NNS) direct channel is established between network-node server.Wherein, network-node server is network body Network node (Network Node) server in architecture (Systems Network Architecture, SNA).Network Node server belongs to server cluster.It should be noted that the first decentralization logs in the network section that client terminal start-up accesses Point server distributes for dynamic random, that is, the first decentralization logs in the network-node server that client terminal start-up accesses every time It is different from, therefore the first decentralization login client user can not know this network-node server accessed.
Here, it includes pc client and cell-phone customer terminal that the first decentralization, which logs in client, for social software and can be chatted Its software.
Then, network-node server is that the first decentralization login client the first decentralization of generation is stepped on according to algorithm The first ID of client is recorded, the first ID that the first decentralization logs in client is 128, at random without the character string repeated, and Send the first ID to the first decentralization login clients that the first decentralization logs in client.
In step 110, the first decentralization logs in client and receives the first ID that the first decentralization logs in client Afterwards, the 2nd ID that the second decentralization logs in client is received, first decentralization logs in the first ID and the institute of client The 2nd ID for stating the second decentralization login client is sent by network-node server respectively.
In step 110, first decentralization logs in client and receives the first decentralization login client After first ID and before the 2nd ID of the reception the second decentralization login client, the method further includes:
First decentralization logs in client and adds two characters to first decentralization login client In first ID, the first ID Quick Response Codes that first decentralization logs in client are generated;Wherein, after two characters of the addition First decentralization to log in the first ID of client be 130 character strings, first decentralization logs in client The first ID Quick Response Codes include information that first decentralization logs in the first ID of client, second decentralization is stepped on The 2nd ID for recording client is 128 character strings.
Here, the first decentralization logs in after client receives the first ID that the first decentralization logs in client, the One decentralization, which logs in, adds two character " C before the first ID of client:", to be combined into 130 character strings.130 The first decentralization log in client the first ID character strings it is as follows:C: 29fa5b3c33c7b3065996be3e7f8aaa897392cd11885df32eec8b6ae485f.......First goes to center Change and logs in the first ID generation the first decentralization login clients that client logs in 130 the first decentralizations client The first ID Quick Response Codes, here, the first decentralization log in client the first ID Quick Response Codes be a two-dimension code image.It Afterwards, the first decentralization logs in client and shows that the first decentralization logs in the first ID Quick Response Codes of client and stops at display First decentralization logs in the interface of the first ID Quick Response Codes of client.At this point, the first decentralization login client is not true It is positive to log in, it only waits for the second decentralization to log in client and identifies that the first decentralization logs in the first ID Quick Response Codes of client And it could really be logged in after establishing direct channel.
In addition, it is second to go that the 2nd ID that the second decentralization logs in client, which is network-node server according to algorithm, The heartization logs in client and 128 character strings generating.
After step 110, the method further includes:
After the 2nd ID for receiving the second decentralization login client and first decentralization logs in client End logs in the 2nd ID of the first ID and second decentralization login client of client according to first decentralization Before establishing direct channel with the second decentralization login client, the method further includes:
First decentralization log in client second decentralization is logged in client the 2nd ID preserve to First local buddy list;
First decentralization logs in client and receives the second network association that second decentralization logs in client The information of the second port of IP address and second decentralization login client is discussed, second decentralization logs in client Second IP address at end and second decentralization log in the information of the second port of client by the network node service Device is sent.
Specifically, the first decentralization logs in the 2nd ID preservations that second decentralization is logged in client by client To the first local buddy list;Receive the second IP address and the second decentralization login visitor that the second decentralization logs in client The information of the second port at family end, second decentralization log in the second IP address of client and second decentralization The information for logging in the second port of client is sent by the network-node server.
Here, the second decentralization logs in the second IP address of client and the second decentralization logs in the second of client The information of port is the IP address of host and the information of port where the second decentralization logs in client.
In addition, the first decentralization, which logs in client, sends the first IP address and that the first decentralization logs in client One decentralization logs in the information of the first port of client to network-node server, and the first decentralization logs in client The information that first IP address and the first decentralization log in the first port of client logs in client institute for the first decentralization In the IP address of host and the information of port.
Step 120:First decentralization logs in that client logs in client according to first decentralization One ID and second decentralization log in the 2nd ID of client and the second decentralization logs in client and establishes direct channel.
In the step 120, the first decentralization log in that client logs in client according to first decentralization the One ID and second decentralization log in the 2nd ID of client and the second decentralization logs in client and establishes direct channel. Then, network-node server disconnects.Network-node server can destroy that the first decentralization logs in client at any time One ID and the second decentralization log in the information of the 2nd ID of client.
Step 130:After first decentralization logs in client login, passes through the direct channel and receive basic data Information.
In step 130, the first decentralization logs in client and is directly logged in after direct channel is successfully established, and waits for the Two decentralizations log in client and send basic data information.Here, the first decentralization logs in client not using existing The method that user in technology logs in.
Here, the basic data information includes encrypted XML file, and the encrypted XML file includes basic data.
After step 130, after the first decentralization logs in client reception basic data information, caching is created for protecting Deposit basic data information.First decentralization logs in automatic removing basic data information after client exits so that the first client Without any basic data information.
Specifically, the first decentralization logs in client and receives the basic number that the second decentralization logs in client transmission After packet, start-up loading basic data packet stream journey.First, the first decentralization logs in client and creates cache list, decrypts base Plinth data packet so that basic data coating is reduced into XML file.Then, the first decentralization logs in client parsing XML texts Part, the basic data classification after parsing are saved in specified cache list.First decentralization logs in client process and shows Show the basic data after parsing.
First decentralization logs in all data of client and all operates in the buffer, and middle client is different from the prior art Social software relevant database, it is data cached all preserve in memory, the first decentralization log in client exit Data can be removed automatically afterwards, not retain backup on the host that the first decentralization logs in client, when logging in next time It can be initialized again.
The decentralization login method that client is logged in the first decentralization at this time is completed.
Here, decentralization refers to the network without fixed server and data center.Decentralization is different from centralization The fixed server of reference and data center.Decentralization logs in client using the first decentralization and the second decentralization is stepped on The record direct-connected mode of client is communicated.After direct channel is established, communication and network-node server break off relations, not by network section The influence and monitoring of point server.
Embodiment 2
Fig. 2 is the implementation process schematic diagram for another decentralization login method that the embodiment of the present disclosure 2 provides.Such as Fig. 2 institutes Show, the decentralization login method is the decentralization of the second decentralization login client in decentralization login system Login method, including:
Step 210:After second decentralization logs in the 2nd ID that client receives the second decentralization login client, know Other first decentralization logs in the first ID of client, and first decentralization logs in the first ID and described second of client The 2nd ID that decentralization logs in client is sent by network-node server respectively.
Before step 210, the second decentralization logs in client terminal start-up, accesses network-node server and and network section Direct channel is established between point server.It is dynamic that second decentralization, which logs in the network-node server that client terminal start-up accesses, It being randomly assigned, that is, the second decentralization logs in the network-node server that client terminal start-up accesses and is different from every time, therefore the Two decentralizations, which log in client user, can not know this network-node server accessed.
Here, it includes the cell-phone customer terminal and pc client for having camera function that the second decentralization, which logs in client, can For social software and chat software.
Then, network-node server is that the second decentralization login client the second decentralization of generation is stepped on according to algorithm The 2nd ID of client is recorded, the 2nd ID that the second decentralization logs in client is 128, at random without the character string repeated, and Send the 2nd ID to the second decentralization login clients that the second decentralization logs in client.Meanwhile network node service Device records the location information that the second decentralization logs in client, that is, the second decentralization logs in the second IP address of client The information of the second port of client is logged in the second decentralization.
In step 210, the second decentralization logs in client and receives the 2nd ID that the second decentralization logs in client Afterwards, the first decentralization of identification logs in the first ID of client.
Specifically, the first ID of the first decentralization of identification login client includes:
The first ID Quick Response Codes that the first decentralization logs in client are scanned, first decentralization is obtained and logs in client First ID at end, the first ID Quick Response Codes that first decentralization logs in client include that first decentralization logs in visitor The information of first ID at family end.
Here, the second decentralization logs in the first ID Quick Response Codes that the first decentralization of client scan logs in client, The first ID that first decentralization logs in client is obtained, first decentralization logs in the first ID two dimensions of client Code includes the information that the first decentralization logs in the first ID of client.
After step 210, the method further includes:
Second decentralization log in client first decentralization is logged in client the first ID preserve to After second local buddy list, the network-node server is notified to send second decentralization logs in client second ID;
Second decentralization logs in client and receives the first IP address and that the first decentralization logs in client One decentralization logs in the information of the first port of client, first decentralization log in client the first IP address and The information that first decentralization logs in the first port of client is sent by the network-node server.
Here, the second decentralization log in client by first decentralization log in client the first ID preserve to After second local buddy list, the network-node server is notified to send second decentralization logs in client second The first decentralization login client that ID is provided to embodiment 1;It receives the first decentralization and logs in the first of client and go The heartization logs in the information of the first IP address of client and the first port of the first decentralization login client, and described first goes Centralization logs in the information of the first IP address of client and the first port of first decentralization login client by institute State network-node server transmission.
Step 220:Second decentralization logs in that client logs in client according to first decentralization One ID and second decentralization log in the 2nd ID of client and the first decentralization logs in client and establishes direct channel.
In a step 220, the second decentralization log in that client logs in client according to first decentralization the One ID and second decentralization log in the 2nd ID of client and the first decentralization logs in client and establishes direct channel.
Step 230:Second decentralization logs in client and sends basic data information by the direct channel.
In step 230, the second decentralization logs in client and sends basic data information extremely by the direct channel First decentralization logs in client.
Specifically, after the second decentralization login client and the first decentralization login client establish direct channel, Into the flow for being packaged basic data.First, the second decentralization logs in client and exports basic data, generates XML file, adds Close XML file generates basic data packet.Then, the second decentralization logs in client and sends basic data by direct channel Packet to the first decentralization logs in client.
Embodiment 3
Fig. 3 is the implementation process schematic diagram for the decentralization login method that the embodiment of the present disclosure 3 provides.As shown in figure 3, going Centralization login method includes:
Step 301:First decentralization logs in client and accesses network-node server;
Step 302:Network-node server randomly generates the first ID that the first decentralization logs in client, during first goes The first ID that the heartization logs in client is 128 character strings;
Step 303:The first ID to first that network-node server sends the first decentralization login client goes to center Change and logs in client;
Step 304:First decentralization logs in client and receives the first ID that the first decentralization logs in client;
Step 305:First decentralization logs in client and adds two characters to the first decentralization login client In first ID, the first ID Quick Response Codes that the first decentralization logs in client are generated;
Step 306:Second decentralization logs in client and accesses network-node server;
Step 307:Network-node server randomly generates the 2nd ID that the second decentralization logs in client, during second goes The 2nd ID that the heartization logs in client is 128 character strings;
Step 308:The 2nd ID to second that network-node server sends the second decentralization login client goes to center Change and logs in client;
Step 309:Second decentralization logs in client and receives the 2nd ID that the second decentralization logs in client;
Step 310:Second decentralization logs in the first ID two dimensions that the first decentralization of client scan logs in client Code logs in client from the first decentralization and obtains the first ID that the first decentralization logs in client;
Step 311:Second decentralization log in client by the first decentralization log in client the first ID preserve to After second local buddy list, notice network-node server sends the 2nd ID that the second decentralization logs in client;
Step 312:The 2nd ID to first that network-node server sends the second decentralization login client goes to center Change and logs in client;
Step 313:First decentralization logs in client and receives the 2nd ID that the second decentralization logs in client;
Step 314:First decentralization log in client by the second decentralization log in client the 2nd ID preserve to First local buddy list;
Step 315:The first IP address and first that network-node server sends the first decentralization login client is gone Information to the second decentralization that centralization logs in the first port of client logs in client;
Step 316:Second decentralization logs in client and receives the first IP address that the first decentralization logs in client The information of the first port of client is logged in the first decentralization;
Step 317:The second IP address and second that network-node server sends the second decentralization login client is gone Information to the first decentralization that centralization logs in the second port of client logs in client;
Step 318:First decentralization logs in client and receives the second IP address that the second decentralization logs in client The information of the second port of client is logged in the second decentralization;
Step 319:First decentralization logs in client and the second decentralization logs in client and goes to center according to first The 2nd ID for changing the first ID for logging in client and the second decentralization login client establishes direct channel;
Step 320:First decentralization logs in client and logs in;
Step 321:During second decentralization login client is gone by direct channel transmission basic data information to first The heartization logs in client;
Step 322:First decentralization logs in client and receives basic data information by direct channel.
Here, it is pc client that the first decentralization, which logs in client, and it is mobile phone visitor that the second decentralization, which logs in client, Family end.
Embodiment 4
Fig. 4 is that the decentralization that the embodiment of the present disclosure 4 provides logs in client.As shown in figure 4, the decentralization logs in Client includes:
Receiving module 410 receives the second decentralization after being used to receive the first ID that the first decentralization logs in client The 2nd ID of client is logged in, first decentralization logs in the first ID of client and second decentralization logs in visitor 2nd ID at family end is sent by network-node server respectively.
Specifically, the receiving module 410 receives the first decentralization and logs in after the first ID of client and receive the Before two decentralizations log in the 2nd ID of client, the receiving module 410 is additionally operable to two characters of addition to described first Decentralization logs in the first ID of client, generates the first ID Quick Response Codes that first decentralization logs in client;Its In, the first ID that first decentralization after two characters of the addition logs in client is 130 character strings, described the The first ID Quick Response Codes that one decentralization logs in client include the letter that first decentralization logs in the first ID of client Breath, the 2nd ID that second decentralization logs in client are 128 character strings.
Direct channel establishes module 430, for logging in the first ID of client and described according to first decentralization Second decentralization logs in the 2nd ID of client and the second decentralization logs in client and establishes direct channel.
Login module 440 receives basic data information after logging in by the direct channel.
In addition, the client further includes preserving receiving module 420, wherein
The 2nd ID that the receiving module 410 receives the second decentralization login client is built with the direct channel later Formwork erection block 430 logs in the first ID of client according to first decentralization and second decentralization logs in client 2nd ID is established before direct channel, and the receiving module 420 that preserves is used to second decentralization logging in client 2nd ID is preserved to the first local buddy list;It receives second decentralization and logs in the second IP address of client and described Second decentralization logs in the information of the second port of client, and second decentralization logs in the second IP address of client The information that the second port of client is logged in second decentralization is sent by the network-node server.
Specifically, the basic data information includes encrypted XML file, and the encrypted XML file includes basic number According to.
Embodiment 5
Fig. 5 is that the decentralization that the embodiment of the present disclosure 5 provides logs in client.As shown in figure 5, the decentralization logs in Client includes:
Identification module 510 is received, after the 2nd ID that client is logged in for receiving the second decentralization, during identification first is gone The heartization logs in the first ID of client, and first decentralization logs in the first ID of client and second decentralization is stepped on 2nd ID of record client is sent by network-node server respectively.
Specifically, the reception identification module 510 includes recognition unit 511, and first decentralization for identification is stepped on Record the first ID of client;Wherein,
The first ID that first decentralization logs in client for identification of the recognition unit 511 includes:
The first ID Quick Response Codes that the first decentralization logs in client are scanned, first decentralization is obtained and logs in client First ID at end, the first ID Quick Response Codes that first decentralization logs in client include that first decentralization logs in visitor The information of first ID at family end.
Direct channel establishes module 530, for logging in the first ID of client and described according to first decentralization Second decentralization logs in the 2nd ID of client and the first decentralization logs in client and establishes direct channel.
Sending module 540, for sending basic data information by the direct channel.
In addition, the client further includes preserving receiving module 520, wherein
The identification module 510 that receives identifies that the first ID of the first decentralization login client is later and described direct-connected logical The first ID and second decentralization login client that module 530 logs in client according to first decentralization are established in road 2nd ID at end and the first decentralization log in client and establish before direct channel, and the preservation receiving module 520 is used for will The first ID that first decentralization logs in client is preserved to the second local buddy list, and the network node is notified to take Business device sends the 2nd ID that second decentralization logs in client;Receive the first IP that the first decentralization logs in client Address and the first decentralization log in the information of the first port of client, and first decentralization logs in the first of client The information for the first port that IP address and first decentralization log in client is sent by the network-node server.
Embodiment 6
The embodiment of the present disclosure 6 provides a kind of decentralization login system.The decentralization login system includes implementing The second decentralization that the first decentralization described in example 4 logs in described in client and embodiment 5 logs in client, further includes net Network node server, wherein
First decentralization logs in client, and center is gone to for receiving the network-node server is sent first After changing the first ID for logging in client, the second decentralization that the network-node server is sent logs in client the is received Two ID;The first ID of client is logged according to first decentralization and second decentralization logs in the second of client ID logs in client with second decentralization and establishes direct channel;After login, described the is received by the direct channel Two decentralizations log in the basic data information that client is sent;
Second decentralization logs in client, is gone for receiving the network-node server is sent described second After centralization logs in the 2nd ID of client, identify that first decentralization logs in the first ID of client;According to described The 2nd ID that one decentralization logs in the first ID of client and second decentralization logs in client is gone with described first Centralization logs in client and establishes the direct channel;The basic data information is sent to described the by the direct channel One decentralization logs in client;
The network-node server logs in the first ID of client to described for sending first decentralization After one decentralization logs in client, the 2nd ID to described second for sending the second decentralization login client goes to center Change and logs in client.
In practical applications, receiving module 410, preservation receiving module 420, direct channel establish module 430, login module 440, identification module 510, recognition unit 511, preservation receiving module 520, direct channel are received and establishes module 530 and sending module 540 can be believed by the central processing unit (CPU, Central Processing Unit) in arbitrary computer equipment, number Number processor (DSP, Digital Signal Processor), microprocessor (MPU, Microprocessor Unit) or can Programmed logic array (PLA) (FPGA, Field Programmable Gate Array) is realized.
Above description is only the preferred embodiment of the application and the explanation to institute's application technology principle.People in the art Member should be appreciated that invention scope involved in the application, however it is not limited to technology made of the specific combination of above-mentioned technical characteristic Scheme, while should also cover in the case where not departing from the inventive concept, it is carried out by above-mentioned technical characteristic or its equivalent feature Other technical solutions of arbitrary combination and formation.Such as features described above has similar work(with (but not limited to) disclosed herein Can technical characteristic replaced mutually and the technical solution that is formed.

Claims (15)

1. a kind of decentralization login method, which is characterized in that the method includes:
After first decentralization logs in the first identity number ID that client receives the first decentralization login client, connect The 2nd ID that the second decentralization logs in client is received, first decentralization logs in the first ID and described second of client The 2nd ID that decentralization logs in client is sent by the network-node server of dynamic random distribution respectively;
First decentralization logs in the first ID and described that client logs in client according to first decentralization Two decentralizations log in the 2nd ID of client and the second decentralization logs in client and establishes direct channel;
After first decentralization logs in client login, passes through the direct channel and receive basic data information.
2. according to the method described in claim 1, it is characterized in that, second for receiving the second decentralization and logging in client After ID and first decentralization logs in the first ID and institute that client logs in client according to first decentralization It states the 2nd ID of the second decentralization login client and the second decentralization logs in client and establishes before direct channel, it is described Method further includes:
First decentralization logs in client and preserves the 2nd ID of second decentralization login client to first Local buddy list;
First decentralization logs in client and receives the second procotol IP that second decentralization logs in client Address and second decentralization log in the information of the second port of client, and second decentralization logs in client The information for the second port that second IP address and second decentralization log in client is sent out by the network-node server It send.
3. according to the method described in claim 1, it is characterized in that, the basic data information includes encrypted extensible markup Language XML document, the encrypted XML file includes basic data.
4. method according to claim 1,2 or 3, which is characterized in that first decentralization logs in client and receives First decentralization logs in the first ID of client later and the second decentralization of the reception logs in the second of client Before ID, the method further includes:
First decentralization logs in client and adds two characters to the first of first decentralization login client In ID, the first ID Quick Response Codes that first decentralization logs in client are generated;Wherein, the institute after two characters of the addition It is 130 character strings to state the first decentralization and log in the first ID of client, and first decentralization logs in the of client One ID Quick Response Codes include the information that first decentralization logs in the first ID of client, and second decentralization logs in visitor 2nd ID at family end is 128 character strings.
5. a kind of decentralization login method, which is characterized in that the method includes:
After second decentralization logs in the 2nd ID that client receives the second decentralization login client, center is gone in identification first Change the first ID for logging in client, first decentralization logs in the first ID of client and second decentralization logs in 2nd ID of client is sent by the network-node server of dynamic random distribution respectively;
Second decentralization logs in the first ID and described that client logs in client according to first decentralization Two decentralizations log in the 2nd ID of client and the first decentralization logs in client and establishes direct channel;
Second decentralization logs in client and sends basic data information by the direct channel.
6. according to the method described in claim 5, it is characterized in that, the first decentralization of the identification logs in the first of client After ID and second decentralization logs in the first ID and institute that client logs in client according to first decentralization It states the 2nd ID of the second decentralization login client and the first decentralization logs in client and establishes before direct channel, it is described Method further includes:
Second decentralization logs in client and preserves the first ID of first decentralization login client to second After local buddy list, the network-node server is notified to send the 2nd ID that second decentralization logs in client;
The first IP address and first that second decentralization logs in client reception the first decentralization login client is gone Centralization logs in the information of the first port of client, and first decentralization logs in the first IP address of client and described The information that first decentralization logs in the first port of client is sent by the network-node server.
7. method according to claim 5 or 6, which is characterized in that the first decentralization of the identification logs in client First ID includes:
The first ID Quick Response Codes that the first decentralization logs in client are scanned, first decentralization is obtained and logs in client First ID, the first ID Quick Response Codes that first decentralization logs in client include that first decentralization logs in client The first ID information.
8. a kind of decentralization logs in client, which is characterized in that the client includes:
Receiving module after being used to receive the first ID that the first decentralization logs in client, receives the second decentralization and logs in visitor 2nd ID at family end, first decentralization logs in the first ID of client and second decentralization logs in client 2nd ID is sent by the network-node server of dynamic random distribution respectively;
Direct channel establishes module, during the first ID and described second for logging in client according to first decentralization is gone The heartization logs in the 2nd ID of client and the second decentralization logs in client and establishes direct channel;
Login module receives basic data information after logging in by the direct channel.
9. client according to claim 8, which is characterized in that the client further includes preserving receiving module, wherein
The receiving module receives the 2nd ID of the second decentralization login client later and the direct channel establishes module The first ID of client is logged according to first decentralization and the 2nd ID of second decentralization login client is built Before vertical direct channel, it is described preserve receiving module be used to log in second decentralization client the 2nd ID preserve to First local buddy list;It receives second decentralization and logs in the second IP address of client and second decentralization The information of the second port of client is logged in, the second IP address and described second that second decentralization logs in client is gone The information that centralization logs in the second port of client is sent by the network-node server.
10. client according to claim 8, which is characterized in that the basic data information includes encrypted XML texts Part, the encrypted XML file includes basic data.
11. according to the client described in claim 8,9 or 10, which is characterized in that the receiving module receives first and goes to center Change logs in the first ID of client later and before the 2nd ID of reception the second decentralization login client, the receiving module It is additionally operable in the first ID that two characters of addition log in client to first decentralization, generates first decentralization Log in the first ID Quick Response Codes of client;Wherein, first decentralization after two characters of the addition logs in client The first ID be 130 character strings, the first ID Quick Response Codes that first decentralization logs in client include described first going Centralization logs in the information of the first ID of client, and the 2nd ID that second decentralization logs in client is 128 characters String.
12. a kind of decentralization logs in client, which is characterized in that the client includes:
Identification module is received, after the 2nd ID that client is logged in for receiving the second decentralization, the first decentralization of identification is stepped on The first ID of client is recorded, first decentralization logs in the first ID of client and second decentralization logs in client 2nd ID at end is sent by the network-node server of dynamic random distribution respectively;
Direct channel establishes module, during the first ID and described second for logging in client according to first decentralization is gone The heartization logs in the 2nd ID of client and the first decentralization logs in client and establishes direct channel;
Sending module, for sending basic data information by the direct channel.
13. client according to claim 12, which is characterized in that the client further includes preserving receiving module, In,
The identification module that receives identifies that the first decentralization logs in the first ID of client and established later with the direct channel Module logs in the first ID of client according to first decentralization and second decentralization logs in the second of client ID and the first decentralization log in client and establish before direct channel, and the preservation receiving module by described first in going The first ID that the heartization logs in client is preserved to the second local buddy list, is notified described in the network-node server transmission Second decentralization logs in the 2nd ID of client;The first IP address and first for receiving the first decentralization login client is gone Centralization logs in the information of the first port of client, and first decentralization logs in the first IP address of client and described The information that first decentralization logs in the first port of client is sent by the network-node server.
14. client according to claim 12 or 13, which is characterized in that the reception identification module includes that identification is single Member, for identification first decentralization log in the first ID of client;Wherein,
The recognition unit the first ID that first decentralization logs in client for identification includes:
The first ID Quick Response Codes that the first decentralization logs in client are scanned, first decentralization is obtained and logs in client First ID, the first ID Quick Response Codes that first decentralization logs in client include that first decentralization logs in client The first ID information.
15. a kind of decentralization login system, which is characterized in that the system comprises described in claim 8,9,10 or 11 The second decentralization that one decentralization logs in described in client and claim 12,13 or 14 logs in client, further includes moving The network-node server that state is randomly assigned, wherein
First decentralization logs in client, is stepped on for receiving the first decentralization that the network-node server is sent After the first ID for recording client, receives the second decentralization that the network-node server is sent and log in the second of client ID;The 2nd ID of the first ID and second decentralization login client of client are logged according to first decentralization Client, which is logged in, with second decentralization establishes direct channel;After login, described second is received by the direct channel Decentralization logs in the basic data information that client is sent;
Second decentralization logs in client, and center is gone to for receiving the network-node server is sent described second After changing the 2nd ID for logging in client, identify that first decentralization logs in the first ID of client;It is gone according to described first The 2nd ID and described first that centralization logs in the first ID of client and second decentralization logs in client goes to center Change login client and establishes the direct channel;It is gone by the direct channel transmission basic data information to described first Centralization logs in client;
The network-node server, the first ID to described first that client is logged in for sending first decentralization are gone After centralization logs in client, sends second decentralization and log in the 2nd ID of client and step on to second decentralization Record client.
CN201610009359.4A 2016-01-07 2016-01-07 A kind of decentralization login method, client and system Active CN105656899B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610009359.4A CN105656899B (en) 2016-01-07 2016-01-07 A kind of decentralization login method, client and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610009359.4A CN105656899B (en) 2016-01-07 2016-01-07 A kind of decentralization login method, client and system

Publications (2)

Publication Number Publication Date
CN105656899A CN105656899A (en) 2016-06-08
CN105656899B true CN105656899B (en) 2018-10-19

Family

ID=56491758

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610009359.4A Active CN105656899B (en) 2016-01-07 2016-01-07 A kind of decentralization login method, client and system

Country Status (1)

Country Link
CN (1) CN105656899B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107086950A (en) * 2017-03-08 2017-08-22 徐州医科大学 A kind of implementation method of the large-scale instant message system based on dijkstra's algorithm

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101094060A (en) * 2006-06-19 2007-12-26 上海新纳广告传媒有限公司 Authorization method for point-to-point network
US7353252B1 (en) * 2001-05-16 2008-04-01 Sigma Design System for electronic file collaboration among multiple users using peer-to-peer network topology
CN101977178A (en) * 2010-08-09 2011-02-16 中兴通讯股份有限公司 Relay-based media channel establishing method and system
CN102571853A (en) * 2010-12-16 2012-07-11 中国移动通信集团四川有限公司 Method, system and device for remote point-to-point communication of mobile terminals
CN103166990A (en) * 2011-12-13 2013-06-19 中国电信股份有限公司 Peer-to-peer (P2P) establishment method and system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2006091178A1 (en) * 2005-02-22 2006-08-31 National University Of Singapore A method of obtaining presence information and a method of maintaining an updated membership list of communication devices in a decentralised network

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7353252B1 (en) * 2001-05-16 2008-04-01 Sigma Design System for electronic file collaboration among multiple users using peer-to-peer network topology
CN101094060A (en) * 2006-06-19 2007-12-26 上海新纳广告传媒有限公司 Authorization method for point-to-point network
CN101977178A (en) * 2010-08-09 2011-02-16 中兴通讯股份有限公司 Relay-based media channel establishing method and system
CN102571853A (en) * 2010-12-16 2012-07-11 中国移动通信集团四川有限公司 Method, system and device for remote point-to-point communication of mobile terminals
CN103166990A (en) * 2011-12-13 2013-06-19 中国电信股份有限公司 Peer-to-peer (P2P) establishment method and system

Also Published As

Publication number Publication date
CN105656899A (en) 2016-06-08

Similar Documents

Publication Publication Date Title
Kagan et al. Zooming into video conferencing privacy
EP3598312B1 (en) Data transfer method and computer program
US7222363B2 (en) Device independent authentication system and method
CN109474568B (en) Detection method and system for realizing malicious attack by using domain pre-positioning technology
US20210099431A1 (en) Synthetic identity and network egress for user privacy
FR3041493A1 (en) EQUIPMENT FOR OFFERING DOMAIN NAME RESOLUTION SERVICES
CN105939326A (en) Message processing method and device
WO2018018697A1 (en) Method and system for identifying spam message from false base station
CN106060097B (en) A kind of management system and management method of information security contest
CN104184709A (en) Verification method, device, server, service data center and system
Vidalis et al. Assessing identity theft in the Internet of Things
CN105939327A (en) Auditing log generation method and device
CN105681257B (en) Information reporting method, device, equipment and system based on instant messaging interaction platform and computer storage medium
CN104618356B (en) Auth method and device
CN116324766A (en) Optimizing crawling requests by browsing profiles
CN107707686A (en) Equipment identification method and device
CN114978637A (en) Message processing method and device
CN111698196A (en) Authentication method and micro-service system
CN108737328A (en) A kind of browser client acts on behalf of recognition methods, system and device
CN105656899B (en) A kind of decentralization login method, client and system
CN106295366B (en) Sensitive data identification method and device
CN110968881A (en) System authentication and data encryption method based on artificial intelligence
CN116232880A (en) Virtual private network establishment method and system based on security isolation
CN115243256A (en) Gateway dynamic login method and device
CN107508838A (en) A kind of access control method, device and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CB03 Change of inventor or designer information

Inventor after: Chen Shu

Inventor before: Huang Songfa

Inventor before: Chen Shu

CB03 Change of inventor or designer information