CN106357631A - Key information management method and cloud server - Google Patents
Key information management method and cloud server Download PDFInfo
- Publication number
- CN106357631A CN106357631A CN201610787318.8A CN201610787318A CN106357631A CN 106357631 A CN106357631 A CN 106357631A CN 201610787318 A CN201610787318 A CN 201610787318A CN 106357631 A CN106357631 A CN 106357631A
- Authority
- CN
- China
- Prior art keywords
- key
- key information
- terminal
- setting
- remote control
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Information Transfer Between Computers (AREA)
- Storage Device Security (AREA)
Abstract
The invention provides a key information management method and a cloud server. The management method is applied to the cloud server and comprises steps as follows: key information and a set key obtaining address unloaded by a first terminal are received and stored, wherein the key information comprises an account name and a password; when a remote control obtaining instruction sent by a second terminal is received, the key information is sent to the set key obtaining address. The cloud server is used for executing the management method and realizing backup of the user key information; when the first terminal is lost or stolen and a user forgets some key information, a key obtaining instruction can be sent to the cloud server through the second terminal; the cloud server receives the remote control obtaining instruction sent by the second terminal and sends the key information to the set key obtaining address. Backup key information can be provided for the user as required, and inconvenience and loss caused by forgetting of the password can be reduced.
Description
Technical field
The present invention relates to high in the clouds technical field of memory, more particularly, to a kind of management method of key information and cloud service
Device.
Background technology
Existing intelligent terminal is respectively provided with the function of preserving key, for example, preserve wechat user name and key, Alipay are used
Name in an account book and key, microblog users name and key etc., user can for a long time not need to input key.As time goes on, use
Family can be more and more fuzzyyer to the memory of key and user name, once hand-set from stolen or loss, a lot of accounts are just looked for and not returned, to use
The use at family brings many inconvenience.Bind the account of bank card information particularly with some, or save privacy information
Account, if can not give for change in time, bring great threat can to the personal safety and safety of property of user.
Content of the invention
It is an object of the invention to proposing a kind of management method of key information and cloud server, can back up user's
Key information, is supplied to user when user needs.
For reaching this purpose, the present invention employs the following technical solutions:
On the one hand, the present invention provides a kind of management method of key information, is applied to cloud server, comprising:
Receive key information and the setting key requestor address that first terminal uploads, stored;Wherein, described key letter
Breath includes account name and password;
Receive when asking for remote control commands of second terminal transmission, described key information is sent to setting key rope
Take address.
Further, the described key information receiving first terminal upload and setting key requestor address, carry out storing it
Afterwards, also include:
When receiving the deletion remote control commands that second terminal sends, described key information is deleted.
Further, described by described key information send to set key requestor address after, also include:
Send temporary key to described second terminal;
Correctly whether the described temporary key setting user input in key requestor address of checking, if so, then allow described
Set key requestor address and described key information is supplied to user.
Further, described key information also includes the account platform belonging to account name and password;
Accordingly, receive when asking for remote control commands of second terminal transmission,
If described remote control commands of asking for include described account platform, inquired about corresponding according to described account platform
Account name and password, and send to setting key requestor address.
On the other hand, the present invention provides a kind of cloud server of management key information, comprising:
Memory module, for receiving the key information of first terminal upload and setting key requestor address, is stored;Its
In, described key information includes account name and password;
Instruction respond module, for receiving when asking for remote control commands of second terminal transmission, described key is believed
Breath sends to setting key requestor address.
Further, described instruction respond module is additionally operable to:
Receive the key information that first terminal uploads and setting key requestor address, after being stored, receive the
During the deletion remote control commands that two terminals send, described key information is deleted.
Further, the cloud server of described management key information also includes: temporary key module, is used for
Described key information is sent to after set key requestor address described, send to described second terminal interim
Key;
Correctly whether the described temporary key setting user input in key requestor address of checking, if so, then allow described
Set key requestor address and described key information is supplied to user.
Further, described key information also includes the account platform belonging to account name and password;
Accordingly, described instruction respond module is additionally operable to:
Receive when asking for remote control commands of second terminal transmission, if described remote control commands of asking for include institute
State account platform, then corresponding account name and password are inquired about according to described account platform, and send to setting key requestor address.
The invention has the benefit that
Cloud server passes through to receive key information and the setting key requestor address that first terminal uploads, backup user's
Key information;When first terminal is lost or stolen, and when user have forgotten some key informations, can be by second terminal to high in the clouds
Server sends the instruction asking for key;Cloud server receives when asking for remote control commands of second terminal transmission, will
Described key information sends to setting key requestor address, when user needs, the key information of backup can be supplied to use
Family, reduces and forgets inconvenience and the loss that password brings.
Brief description
Fig. 1 is the flow chart of the management method of key information that the embodiment of the present invention one provides.
Fig. 2 is the flow chart of the management method of key information that the embodiment of the present invention two provides.
Fig. 3 is the structural representation of the cloud server of management key information that the embodiment of the present invention three provides.
Specific embodiment
For make present invention solves the technical problem that, the technical scheme that adopts and the technique effect that reaches clearer, below
By combine accompanying drawing the technical scheme of the embodiment of the present invention is described in further detail it is clear that described embodiment only
It is a part of embodiment of the present invention, rather than whole embodiments.
Embodiment one
Fig. 1 is the flow chart of the management method of key information that the embodiment of the present invention one provides.The present embodiment provides a kind of
The management method of key information, is applied to cloud server, realizes the backup of key information, is supplied to use when user needs
Family.Described management method to be executed by a kind of cloud server of management key information, comprises the steps:
S11, receives key information and the setting key requestor address that first terminal uploads, is stored.
Wherein, described key information includes account name and password.
When first terminal first logs into each account platform, record key information, and be sent to cloud server.High in the clouds
Server receives the key information that first terminal uploads.Meanwhile, first terminal pre-sets a setting key requestor address and deposits
Storage server beyond the clouds, for, when future, user asked for key information, receiving the key information that cloud server sends.
S12, receives when asking for remote control commands of second terminal transmission, described key information is sent close to setting
Key requestor address.
Second terminal is the terminal that arbitrarily can send instruction.Set key requestor address and include but is not limited to mailbox, immediately
Communication tool and personal Dropbox.
In addition, when receiving the deletion remote control commands of second terminal transmission, described key information is deleted.
Ask for remote control commands and delete remote control commands and be set in advance, have the character string of set form.From
From the point of view of safety, user is according to the complexity needing setting instruction of oneself.
In the present embodiment, cloud server, when user first logs into each account platform, stores key information, in user
When needing, according to asking for remote control commands, key information is sent to setting key requestor address.Achieve key information
Backup and memorandum.Meanwhile, delete the key information of preservation according to deletion remote control commands, ensure the peace of key information
Entirely.
Embodiment two
Fig. 2 is the flow chart of the management method of key information that the embodiment of the present invention two provides.The present embodiment is in embodiment
Improve on the basis of one, increased safety verification, and achieve asking for of single key information.Key described in the present embodiment
The management method of information comprises the steps:
S21, receives key information and the setting key requestor address that first terminal uploads, is stored.
Wherein, described key information includes account name, password, also includes the account platform belonging to account name and password.Account
Family platform is businessman belonging to account name and password, website, application software or system etc..
Most users, for convenience of remembering, use same account name, such as cell-phone number, microblogging account in different account platform
Deng;Or same user has multiple account names in same account platform, during cloud server storage key information, includes
Account platform, account name and password, data is apparent, facilitates user to consult.
S22, receives when asking for remote control commands of second terminal transmission, described key information is sent close to setting
Key requestor address.
Described remote control commands of asking for are divided into the instruction asking for all key informations and ask for the finger that single rice AsiaINFO ceases
Make two kinds.If described remote control commands of asking for include described account platform, inquired about corresponding according to described account platform
Account name and password, and send to setting key requestor address.If described remote control commands of asking for do not include described account
Platform, then be sent to setting key requestor address by all of key information.
S23, sends temporary key to described second terminal.
While cloud server sends described key information to setting key requestor address, send out to described second terminal
Send temporary key.Temporary key can be sent in second terminal, or other setting key requestor addresses set in advance, non-
Third party.
Temporary key can be the forms such as identifying code, random account name+password it is therefore an objective to carry out secondary safety verification,
When preventing the described safety setting key requestor address from being threatened, the key information of user is revealed.
S24, correctly whether the described temporary key setting user input in key requestor address of checking, if so, then allow
Described key information is supplied to user by described setting key requestor address;User is otherwise required again to verify.
User, before described setting key requestor address checks key information, needs input temporary key to be verified,
After cloud server is verified, just allow described setting key requestor address that described key information is supplied to user;Otherwise,
User is required again to verify.
S25 is it is allowed to described key information is supplied to user by described setting key requestor address.
S26 is it is desirable to user verifies again.
S27, when receiving the deletion remote control commands that second terminal sends, described key information is deleted.
After step s21, if cloud server receives the deletion remote control commands of second terminal transmission, if likewise,
Described deletion remote control commands include described account platform, then inquire about corresponding account name and close according to described account platform
Code, is deleted.If described deletion remote control commands do not include described account platform, all of key information is deleted
Remove.
In addition, for avoiding deleting by mistake, temporary key can be sent to using the method for temporary key checking, cloud server
Set key requestor address, temporary key is sent to cloud server by second terminal by user, cloud server checking is logical
Later, delete key information.
Embodiment adds safety verification, make key information to ask for process safer;Meanwhile, support single key letter
The asking for, just in case information leakage of breath, it is to avoid the situation that multiple accounts is on the hazard.
Embodiment three
Fig. 3 is the structural representation of the cloud server of management key information that the embodiment of the present invention three provides.This enforcement
Example provides a kind of cloud server of management key information, for executing the manager of the key information described in above-described embodiment
Method, solves same technical problem, reaches identical technique effect.
The cloud server of described management key information includes: memory module 100 and instruction respond module 200.
Memory module 100 is used for receiving the key information of first terminal upload and sets key requestor address, is stored.
Wherein, described key information includes account name and password.
Instruction respond module 200 is used for receiving when asking for remote control commands of second terminal transmission, by described key
Information sends to setting key requestor address.
Further, described instruction respond module 200 is additionally operable to: is receiving key information and the setting that first terminal uploads
Key requestor address, after being stored, when receiving the deletion remote control commands that second terminal sends, described key is believed
Breath is deleted.
As the improvement of the present embodiment, described key information also includes the account platform belonging to account name and password;Accordingly
, described instruction respond module 200 is additionally operable to: receives when asking for remote control commands of second terminal transmission, if described rope
Take remote control commands to include described account platform, then corresponding account name and password are inquired about according to described account platform, and
Send to setting key requestor address.
As the improvement of the present embodiment, the cloud server of described management key information also includes: temporary key module
300.
Temporary key module 300 is used for sending described key information to after set key requestor address described, to
Described second terminal sends temporary key;Just whether the described temporary key setting user input in key requestor address of checking
Really, if so, then allow described setting key requestor address that described key information is supplied to user.
Cloud server described in the present embodiment, can back up the key information of user, be supplied to use when user needs
Family, and carry out safety verification it is ensured that information security.
Describe the know-why of the present invention above in association with specific embodiment.These descriptions are intended merely to explain the present invention's
Principle, and limiting the scope of the invention can not be construed to by any way.Based on explanation herein, the technology of this area
Personnel do not need to pay other specific embodiments that performing creative labour can associate the present invention, and these modes fall within
Within protection scope of the present invention.
Claims (8)
1. a kind of management method of key information, is applied to cloud server it is characterised in that including:
Receive key information and the setting key requestor address that first terminal uploads, stored;Wherein, described key information bag
Include account name and password;
Receive when asking for remote control commands of second terminal transmission, described key information is sent and asks for ground to setting key
Location.
2. key information according to claim 1 management method it is characterised in that described reception first terminal upload
Key information and setting key requestor address, after being stored, also include:
When receiving the deletion remote control commands that second terminal sends, described key information is deleted.
3. the management method of key information according to claim 1 is it is characterised in that described send described key information
To after set key requestor address, also include:
Send temporary key to described second terminal;
Whether correctly the described temporary key setting user input in key requestor address of checking, if so, then allows described setting
Described key information is supplied to user by key requestor address.
4. key information according to claim 1 management method it is characterised in that:
Described key information also includes the account platform belonging to account name and password;
Accordingly, receive when asking for remote control commands of second terminal transmission,
If described remote control commands of asking for include described account platform, corresponding account is inquired about according to described account platform
Name and password, and send to setting key requestor address.
5. a kind of cloud server of management key information is it is characterised in that include:
Memory module, for receiving the key information of first terminal upload and setting key requestor address, is stored;Wherein,
Described key information includes account name and password;
Instruction respond module, for receiving when asking for remote control commands of second terminal transmission, described key information is sent out
Deliver to setting key requestor address.
6. the cloud server of management key information according to claim 5 is it is characterised in that described instruction respond module
It is additionally operable to:
Receive key information and the setting key requestor address that first terminal uploads, after being stored, receive second eventually
During the deletion remote control commands that end sends, described key information is deleted.
7. the cloud server of management key information according to claim 5 is it is characterised in that also include: temporary key
Module, is used for
Described key information is sent to after set key requestor address described, send to described second terminal temporarily close
Key;
Whether correctly the described temporary key setting user input in key requestor address of checking, if so, then allows described setting
Described key information is supplied to user by key requestor address.
8. according to claim 5 management key information cloud server it is characterised in that:
Described key information also includes the account platform belonging to account name and password;
Accordingly, described instruction respond module is additionally operable to:
Receive when asking for remote control commands of second terminal transmission, if described remote control commands of asking for include described account
Family platform, then inquire about corresponding account name and password according to described account platform, and sends to setting key requestor address.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610787318.8A CN106357631A (en) | 2016-08-31 | 2016-08-31 | Key information management method and cloud server |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610787318.8A CN106357631A (en) | 2016-08-31 | 2016-08-31 | Key information management method and cloud server |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106357631A true CN106357631A (en) | 2017-01-25 |
Family
ID=57856883
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610787318.8A Pending CN106357631A (en) | 2016-08-31 | 2016-08-31 | Key information management method and cloud server |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106357631A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108282331A (en) * | 2018-01-02 | 2018-07-13 | 金邦达有限公司 | Cipher processing method, apparatus and system |
CN111695165A (en) * | 2020-04-20 | 2020-09-22 | 宜鼎国际股份有限公司 | Data protection system and method |
US11768969B2 (en) | 2020-04-20 | 2023-09-26 | Innodisk Corporation | Data protection system and method |
-
2016
- 2016-08-31 CN CN201610787318.8A patent/CN106357631A/en active Pending
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108282331A (en) * | 2018-01-02 | 2018-07-13 | 金邦达有限公司 | Cipher processing method, apparatus and system |
CN111695165A (en) * | 2020-04-20 | 2020-09-22 | 宜鼎国际股份有限公司 | Data protection system and method |
US11768969B2 (en) | 2020-04-20 | 2023-09-26 | Innodisk Corporation | Data protection system and method |
CN111695165B (en) * | 2020-04-20 | 2024-01-09 | 宜鼎国际股份有限公司 | Data protection system and method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103944737B (en) | Method for authenticating user identity, Third Party Authentication platform, carrier authorization platform | |
CN102222200B (en) | Application program logging method and logging management system | |
CN104335523B (en) | A kind of authority control method, client and server | |
CN104346559B (en) | Authority request response method and corresponding device | |
CN103620606B (en) | Store detection means, system and storage detection method | |
CN104660562A (en) | Method, related device and system for information viewing | |
US11729118B2 (en) | Systems and methods for locating application-specific data on a remote endpoint computer | |
CN108173938A (en) | Server load shunt method and device | |
CN104615924A (en) | System and method for storing account numbers and passwords for account numbers | |
CN104348786B (en) | Password method for retrieving, device and system | |
CN103873307B (en) | For the method for PPPOE username and password backup-and-restores | |
CN110546935B (en) | Personal identifier login for organizational users | |
CN106357631A (en) | Key information management method and cloud server | |
CN103825863B (en) | A kind of accounts management method and device | |
CN104092839A (en) | Communication method, system, IM server and operator service platform and terminal | |
CN106874342A (en) | A kind of page display method and device | |
CN105323277A (en) | Application account management method, device and system | |
CN107147748A (en) | File uploading method and device | |
CN104391687A (en) | Method and system for realizing internet APP (application) public platform of enterprise and association | |
CN110175439A (en) | User management method, device, equipment and computer readable storage medium | |
CN107659573A (en) | Control method and device of vehicle-mounted system | |
CN105893580A (en) | Method for establishing and managing electronic diary by using WeChat platform | |
CN108306882A (en) | A kind of method and the network equipment of terminal access business | |
WO2012037675A4 (en) | Storage of applications and associated digital goods for use in wireless communication devices and systems | |
CN106209569A (en) | The method for authenticating of a kind of enterprise instant communication and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20170125 |
|
WD01 | Invention patent application deemed withdrawn after publication |