CN106650490A - Cloud account number login method and device - Google Patents
Cloud account number login method and device Download PDFInfo
- Publication number
- CN106650490A CN106650490A CN201610939570.6A CN201610939570A CN106650490A CN 106650490 A CN106650490 A CN 106650490A CN 201610939570 A CN201610939570 A CN 201610939570A CN 106650490 A CN106650490 A CN 106650490A
- Authority
- CN
- China
- Prior art keywords
- cloud account
- login
- password
- mark
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 30
- 230000004044 response Effects 0.000 claims abstract description 23
- 238000012545 processing Methods 0.000 abstract description 6
- 230000001360 synchronised effect Effects 0.000 abstract description 4
- 230000006870 function Effects 0.000 description 13
- 238000004891 communication Methods 0.000 description 8
- 230000008569 process Effects 0.000 description 7
- 238000013459 approach Methods 0.000 description 4
- 238000007726 management method Methods 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 230000009471 action Effects 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 2
- 238000013461 design Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 230000002349 favourable effect Effects 0.000 description 2
- 239000004973 liquid crystal related substance Substances 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000012905 input function Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000029058 respiratory gaseous exchange Effects 0.000 description 1
- 230000008054 signal transmission Effects 0.000 description 1
- 238000010897 surface acoustic wave method Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Biomedical Technology (AREA)
- Databases & Information Systems (AREA)
- Bioethics (AREA)
- Power Engineering (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The embodiment of the invention provides a cloud account number login method and device. The method includes the following steps that a login request sent by a terminal is received, wherein the login request carries cloud account number login information and a login mode identifier; the cloud account number login information is authenticated according to the login mode identifier; when authentication succeeds, a database at the corresponding level is selected as a synchronous database according to the login mode identifier; after selection is completed, a login success response is sent to the terminal, wherein the login success response carries information of the synchronous database. By means of the cloud account number login method and device, the security and flexibility of data processing can be improved.
Description
Technical field
The present invention relates to the communications field, the login method and device of more particularly to a kind of cloud account.
Background technology
With the development of network technology, the use of the technology such as high in the clouds big data, cloud backup and cloud are synchronous is more and more universal.
In correlation technique, user obtains the data having backed up beyond the clouds from mobile terminal side to be needed to log in cloud account, so
Download from Cloud Server afterwards.But in use, sometimes may need for cloud account to lend others uses, in this mistake
Cheng Zhong, it is possible to borrower can be caused to get the data that user is not desired to others' acquisition, or because user account and password are let out
Dew, causes the corresponding full backup leaking data of cloud account, and to user immeasurable impact is brought.
The content of the invention
The embodiment of the present invention provides a kind of login method and device of cloud account, to solve correlation technique in Backup Data
Safety problem.
The embodiment of the present invention provides a kind of login method of cloud account, comprises the following steps:
The logging request that receiving terminal sends, the logging request carries cloud account log-on message and login mode mark
Know;
The cloud account log-on message is authenticated according to login mode mark;
Upon successful authentication, corresponding level database is selected as sync database according to login mode mark;
After the completion of selection, send to terminal and login successfully response, it is described login successfully to respond carry sync database
Information.
The embodiment of the present invention also provides a kind of entering device of cloud account, including:
Receiver module, for the logging request that receiving terminal sends, the logging request carries cloud account log-on message
And login mode mark;
Authentication module, for being authenticated to the cloud account log-on message according to login mode mark;
Selecting module, for upon successful authentication, corresponding level database being selected as synchronization according to login mode mark
Database;
Sending module, for selection after the completion of, send to terminal and login successfully response, it is described to login successfully response and carry
The information of sync database.
The logging request that the embodiment of the present invention is sent by receiving terminal, the logging request carries cloud account and logs in letter
Breath and login mode mark;The cloud account log-on message is authenticated according to login mode mark;When authenticating into
During work(, corresponding level database is selected as sync database according to login mode mark;After the completion of selection, send to terminal and step on
Record success response, it is described to login successfully the information that response carries selected sync database, so as to complete stepping on for cloud account
Land, because its database that correspondence level of security is selected by the landing approach of user is used as sync database, so that
Terminal can obtain data from selected sync database, even if password is revealed will not also reveal total data, be easy to number
According to storage security and flexibility.
Description of the drawings
Fig. 1 is the scene graph of the login system of the cloud account in one embodiment of the present invention.
Fig. 2 is the flow chart of the login method of the cloud account in one embodiment of the present invention.
Fig. 3 is the detail flowchart of the login method of the cloud account in one embodiment of the present invention.
Fig. 4 is the structure chart of the entering device of the cloud account in one embodiment of the present invention.
Fig. 5 is the structure chart of the authentication module of the entering device of the cloud account in one embodiment of the present invention.
Fig. 6 is the structure chart of the selecting module of the entering device of the cloud account in one embodiment of the present invention.
Fig. 7 is the structure chart of the server in one embodiment of the present invention.
Specific embodiment
Schema is refer to, wherein identical element numbers represent identical component, and the principle of the present invention is to be implemented in one
Illustrate in appropriate computing environment.The following description is that based on the illustrated specific embodiment of the invention, it should not be by
It is considered as and limits the present invention other specific embodiments not detailed herein.
In the following description, specific embodiment of the invention will be with reference to the operation by performed by or multi-section computer
The step of and symbol illustrating, unless otherwise stating clearly.Therefore, it will appreciate that these steps and operation, wherein have carrying for several times
To be performed by computer, include by representing with the computer disposal list of the electronic signal of the data in a structuring pattern
Unit is manipulated.At this manipulation transforms data or the position that is maintained in the memory system of the computer, it can match somebody with somebody again
Put or in addition in a manner familiar to those skilled in the art changing the running of the computer.The data knot that the data are maintained
Structure is the provider location of the internal memory, and it has by particular characteristics defined in the data form.But, the principle of the invention is with above-mentioned
Illustrating, it is not represented as a kind of restriction to word, those skilled in the art will appreciate that the plurality of step of described below and
Operation also may be implemented in the middle of hardware.
Data synchronous system provided in an embodiment of the present invention, mainly includes data synchronization unit and server, wherein, should
Data synchronization unit specifically can be integrated in as in the mobile terminals such as panel computer, mobile phone, and the server can lead to mobile terminal
Cross wired or wireless network to be attached.
Such as, Fig. 1 is refer to, Fig. 1 is the schematic diagram of a scenario of the login system of cloud account provided in an embodiment of the present invention, should
The entering device of cloud account is specifically integrated in mobile phone, is mainly used in the logging request of receiving terminal transmission, the logging request
Carry cloud account log-on message and login mode mark;Identified to the cloud account log-on message according to the login mode
Authenticated;Upon successful authentication, corresponding level database is selected as sync database according to login mode mark;Select
Cheng Hou, sends to terminal and logins successfully response, described to login successfully the information that response carries sync database, so as to complete cloud
Account is logged in.
In the present embodiment, will be described from the angle of data synchronization unit, the data synchronization unit specifically can collect
In the terminals such as Cheng Ru panel computers, mobile phone.
Fig. 2 is refer to, Fig. 2 is the flow chart of the login method of the cloud account in one embodiment of the present invention, and its is main
In applying to server.The method of data synchronization is comprised the following steps:
S101, the logging request that receiving terminal sends, the logging request carries cloud account log-on message and login
Mode is identified;
S102, authenticates according to login mode mark to the cloud account log-on message;
S103, upon successful authentication, corresponding level database is selected as sync database according to login mode mark;
S104, after the completion of selection, sends to terminal and logins successfully response, described to login successfully response and carry synchrodata
The information in storehouse.
In step S101, in specific implementation process, the terminal can be the mobile terminal such as mobile phone or IPAD.The cloud account
Log-on message includes only including cloud account, or the cloud account log-on message is close including the target of cloud account and cloud account
Code, or the cloud account log-on message is including cloud account, the target password of cloud account and target signature information.Wherein, the mesh
Mark characteristic information can include the biological information and/or terminal characteristic information of user.The terminal characteristic information can include
The physical address and/or SIM card information of terminal.The user's characteristic information can include one or more in following information:Refer to
Line information, iris information, face information and acoustic information etc..Login mode identifies the cloud account for instruction user selection
Login mode.Wherein, when cloud account log-on message includes only including cloud account, corresponding login mode is designated without password
The mark of login.When the cloud account log-on message includes the target password of cloud account and cloud account, corresponding login mode
It is designated based on the mark of password login.When the cloud account log-on message includes cloud account, the target password of cloud account and mesh
During mark characteristic information, corresponding login mode is designated the mark logged in based on password and characteristic information.
In step s 102, in specific implementation process, as shown in figure 3, step S102 includes following sub-step:
S1021, judges the marking type that login mode is identified;
Wherein, the marking type can be the mark without password login, the mark based on password login and based on password
And the mark that characteristic information is logged in.
S1022, when the login mode is designated the mark without password login, judges whether cloud account is effective;
Wherein, illustrate that the cloud account belongs to the account for normally using if effectively, authentication is directly judged if invalid
Failure, illustrates that the cloud account is expired account or account input error.
S1023, if the cloud account is effectively, judgement is authenticated successfully.
Wherein, it is invalid when cloud account is stated, then directly judge failed authentication.
S1024, when the login mode is designated the mark based on password login, judges whether cloud account is effective;
S1025, if the cloud account effectively, according to the cloud account the corresponding password that prestores is obtained;
Wherein, illustrate that the cloud account belongs to the account for normally using if effectively, authentication is directly judged if invalid
Failure, illustrates that the cloud account is expired account or account input error.
S1026, the password that prestores is compared with target password;
S1027, if the password that prestores is identical with the target password, judgement is authenticated successfully;
Wherein, if the password that prestores is differed with the target password, failed authentication is judged;
S1028, when the login mode is designated based on password and the mark of characteristic information login, judges the cloud account
It is number whether effective;
Wherein, illustrate that the cloud account belongs to the account for normally using if effectively, authentication is directly judged if invalid
Failure, illustrates that the cloud account is expired account or account input error.
S1029, if the cloud account is effectively, obtains corresponding prestoring and password and prestores according to the cloud account
Characteristic information;
Wherein, if the cloud account is invalid, failed authentication is directly judged;
S1030, the password that prestores is compared with the target password, and the target signature information is pre- with described
Deposit characteristic information to be compared;
S1031, if the password that prestores is identical with the target password, and the target signature information and the spy that prestores
Reference manner of breathing is same, then judge to authenticate successfully.
Wherein, as long as target password or target signature information are not verified by one, then failed authentication is judged.
It is according to data when data are from terminal backup to server in the scheme of the present embodiment in step S103
Species carry out storage of classifying.The data storage of different level of securitys is in disparate databases.In specific implementation process, the step
Rapid S103 includes:
Upon successful authentication, if login mode is designated the mark without password login, first level database is selected to make
For sync database;
Upon successful authentication, if login mode is designated based on the mark of password login, second level database is selected
As sync database;
Upon successful authentication, if login mode is designated the mark logged in based on password and characteristic information, the 3rd is selected
Level database is used as sync database.
Wherein, the first level database purchase is some minimum information of significance level, the daily life of such as user
Photo living, phone of general contact person etc..
The second level database purchase is some of a relatively high information of significance level, and the privacy of such as user is shone
Piece, message registration and chat record etc..
The third level database purchase is significance level highest information, such as bank's card number and password, susceptibility
Some higher photos, with the communications records of VIP etc..
In step S104, in specific implementation process, the information of the selected sync database is solarization sync database
Data directory list, in order to the terminal of user enter correspondence Entered state after, show the data directory list so that just
Data name is selected to synchronize to present terminal from data directory list in user.
From the foregoing, it will be observed that the logging request that the embodiment of the present invention is sent by receiving terminal, the logging request carries cloud
Account log-on message and login mode are identified;The cloud account log-on message is reflected according to login mode mark
Power;Upon successful authentication, corresponding level database is selected as sync database according to login mode mark;After the completion of selection,
Send to terminal and login successfully response, it is described to login successfully the information that response carries selected sync database, so as to complete
Into logging in for cloud account, because its database that correspondence level of security is selected by the landing approach of user is used as synchrodata
Storehouse so that terminal can obtain data from selected sync database, be easy to the storage of data security and
Flexibility.
Fig. 4 is refer to, Fig. 4 is the structure chart of the entering device of the cloud account in one embodiment of the present invention, and its is main
In applying to server.The entering device of the cloud account includes receiver module 201, authentication module 202, selecting module 203, transmission
Module 204.
Wherein, the receiver module 201 is used for the logging request that receiving terminal sends, and the logging request carries cloud account
Log-on message and login mode are identified.
The terminal can be the mobile terminal such as mobile phone or IPAD.The cloud account log-on message include only include cloud account,
Or the cloud account log-on message includes the target password of cloud account and cloud account, or the cloud account log-on message includes cloud
Account, the target password of cloud account and target signature information.Wherein, the target signature information can include that the biology of user is special
Reference ceases and/or terminal characteristic information.The terminal characteristic information can include the physical address and/or SIM card information of terminal.Should
User's characteristic information can include one or more in following information:Finger print information, iris information, face information and sound
Information etc..Login mode identifies the login mode of the cloud account selected for instruction user.Wherein, when cloud account log-on message bag
Include only include cloud account when, corresponding login mode is designated the mark without password login.When the cloud account log-on message bag
When including the target password of cloud account and cloud account, corresponding login mode is designated based on the mark of password login.When the cloud
When account log-on message includes cloud account, the target password of cloud account and target signature information, corresponding login mode mark
It is the mark logged in based on password and characteristic information.
The authentication module 202 is used to authenticate the cloud account log-on message according to login mode mark.
As shown in figure 5, wherein, the authentication module 202 includes:
Recognition unit 2021, for recognizing the species that landing approach is identified.
First judging unit 2022, for being designated when the login mode during mark based on password login, judges cloud
Whether account is effective.
First acquisition unit 2023, if for the cloud account effectively, obtains corresponding according to the cloud account
Prestore password.
First comparing unit 2024, for the password that prestores to be compared with target password.
Second judging unit 2025, if the password that prestores is identical with the target password, judgement is authenticated successfully.
3rd judging unit 2026, for being designated the mark logged in based on password and characteristic information when the login mode
When, judge whether the cloud account is effective;
Second acquisition unit 2027, if for the cloud account effectively, obtains corresponding according to the cloud account
Prestore password and pre-stored characteristics information;
Second comparing unit 2028, for the password that prestores to be compared with the target password, by the target
Characteristic information is compared with the pre-stored characteristics information;
4th judging unit 2029, if it is identical with the target password for the password that prestores, and the target signature
Information is identical with the pre-stored characteristics information, then judge to authenticate successfully.
5th judging unit 2121, for when the login mode is designated the mark without password login, judging cloud account
It is number whether effective;
6th judging unit 2122, if for the cloud account effectively, judgement is authenticated successfully
Selecting module 203 is used for upon successful authentication, and corresponding level database is selected as same according to login mode mark
Step data storehouse.As shown in fig. 6, wherein, the selecting module 203 includes:
First choice unit 2031, for upon successful authentication, if login mode is designated without password login mark, selecting
First level database is selected as sync database;
Second select unit 2032, for upon successful authentication, if login mode is designated based on the mark of password login,
Second level database is then selected as sync database;
3rd select unit 2033, for upon successful authentication, if login mode is designated based on password and characteristic information
The mark of login, then select third level database as sync database.
After the completion of sending module 204 is used to select, sends to terminal and login successfully response, it is described to login successfully response carrying
There is the information of sync database.
From the foregoing, it will be observed that the logging request that the embodiment of the present invention is sent by receiver module receiving terminal, the logging request
Carry cloud account log-on message and login mode mark;Authentication module is identified to the cloud account according to the login mode
Log-on message is authenticated;Selecting module upon successful authentication, according to login mode mark corresponding level database conduct is selected
Sync database;After the completion of sending module is selected, send to terminal and login successfully response, it is described to have logined successfully response carrying
The information of the sync database of selection, so as to complete logging in for cloud account, because it selects right by the landing approach of user
The database of level of security is answered as sync database, so that terminal can obtain number from selected sync database
According to being easy to security and the flexibility of the storage of data.
The embodiment of the present invention also provides a kind of server, as shown in fig. 7, it illustrates the clothes involved by the embodiment of the present invention
The structural representation of business device 400.
The server 400 can include one or more than one processing core processor 401, one or more
The memory 402 of computer-readable recording medium, communication unit 403, power supply 404, input block 405 and display unit 406
Deng part.It will be understood by those skilled in the art that the server architecture illustrated in Fig. 7 does not constitute the restriction to server, can
To include part more more or less of than diagram, or some parts are combined, or different part arrangements.Wherein:
Processor 401 is the control centre of the server, using various interfaces and the whole server of connection each
Part, by operation or performs and is stored in software program and/or module in memory 402, and calls and be stored in memory
Data in 402, the various functions and processing data of execute server, so as to carry out integral monitoring to server.Optionally, locate
Reason device 401 may include one or more processing cores;Preferably, processor 401 can integrated application processor and modulatedemodulate mediate
Reason device, wherein, application processor mainly processes operating system, user interface and application program etc., and modem processor is main
Process radio communication.It is understood that above-mentioned modem processor can not also be integrated in processor 401.
Memory 402 can be used to store software program and module, and processor 401 is stored in memory 402 by operation
Software program and module, so as to perform various function application and data processing.Memory 402 can mainly include storage journey
Sequence area and storage data field, wherein, the application program (ratio that storing program area can be needed for storage program area, at least one function
Such as sound-playing function, image player function) etc.;Storage data field can be stored and use created data according to server
Deng.Additionally, memory 402 can include high-speed random access memory, nonvolatile memory can also be included, for example, at least
One disk memory, flush memory device or other volatile solid-state parts.Correspondingly, memory 402 can also include
Memory Controller, to provide access of the processor 401 to memory 402.
During communication unit 503 can be used to receive and send messages, the reception and transmission of signal.Especially, communication unit 503 connects
The signal that receiving terminal sends is received, and signal is transferred to into one or more than one processor 501 is processed.Meanwhile, communication unit
The feedback signal that processor 501 sends is sent to terminal by 503.
Server also includes the power supply 404 (such as battery) powered to all parts, it is preferred that power supply 404 can pass through
Power-supply management system is logically contiguous with processor 401, so as to realize management charging, electric discharge, Yi Jigong by power-supply management system
The functions such as consumption management.Power supply 404 can also include one or more direct current or AC power, recharging system, power supply
The random component such as failure detector circuit, power supply changeover device or inverter, power supply status indicator.
The server may also include input block 405, and the input block 405 can be used for the numeral of receives input or character letter
Cease, and generation is arranged with user and function control is relevant keyboard, mouse, action bars, optics or trace ball signal are defeated
Enter.Specifically, in a specific embodiment, input block 405 may include Touch sensitive surface and other input equipments.It is touch-sensitive
Surface, also referred to as touch display screen or Trackpad, user can be collected thereon or neighbouring touch operation (such as user uses
The operation of any suitable object such as finger, stylus or annex on Touch sensitive surface or near Touch sensitive surface), and according to advance
The formula of setting drives corresponding attachment means.Optionally, Touch sensitive surface may include touch detecting apparatus and touch controller two
Individual part.Wherein, touch detecting apparatus detect the touch orientation of user, and detect the signal that touch operation brings, and signal is passed
Give touch controller;Touch controller receives touch information from touch detecting apparatus, and is converted into contact coordinate, then
Give processor 401, and the order sent of receiving processor 401 and can be performed.Furthermore, it is possible to using resistance-type, electric capacity
The polytypes such as formula, infrared ray and surface acoustic wave realize Touch sensitive surface.Except Touch sensitive surface, input block 405 can also be wrapped
Include other input equipments.Specifically, other input equipments can include but is not limited to physical keyboard, function key (such as volume control
Button processed, switch key etc.), trace ball, mouse, one or more in action bars etc..
The server may also include display unit 406, the display unit 406 can be used for show by user input information or
Be supplied to the information of user and the various graphical user interface of server, these graphical user interface can by figure, text,
Icon, video and its any combination are constituting.Display unit 406 may include display floater, optionally, can adopt liquid crystal display
Device (LCD, Liquid Crystal Display), Organic Light Emitting Diode (OLED, Organic Light-Emitting
) etc. Diode form is configuring display floater.Further, Touch sensitive surface can cover display floater, when Touch sensitive surface is detected
After touch operation on or near it, processor 401 is sent to determine the type of touch event, with the basis of preprocessor 401
The type of touch event provides on a display panel corresponding visual output.Although in the figure 7, Touch sensitive surface is with display floater
Realize input and input function as two independent parts, but in some embodiments it is possible to by Touch sensitive surface with it is aobvious
Show panel integrated and realize input and output function.
Although not shown, server can also include camera, bluetooth module etc., will not be described here.Specifically in this reality
In applying example, the processor 401 in server can be according to following instruction, by the process pair of one or more application program
The executable file answered is loaded in memory 402, and the application journey being stored in memory 402 is run by processor 401
Sequence, so as to realize above-described embodiment in method:
The logging request sent come receiving terminal by communication unit 403, the logging request carries the login of cloud account
Information and login mode are identified;The cloud account log-on message is authenticated according to login mode mark;Work as authentication
When successful, corresponding level database is selected as sync database according to login mode mark;It is single by communicating after the completion of selection
Unit 403 sends to terminal and logins successfully response, described to login successfully the information that response carries sync database, so as to complete cloud
Account is logged in.
The server that the present invention is provided has the beneficial effect for improving Information Security and flexibility.
There is provided herein the various operations of embodiment.In one embodiment, one or more described operations can be with structure
The computer-readable instruction stored on one or more computer-readable mediums, it will make to succeed in one's scheme when being performed by electronic equipment
Calculation equipment performs the operation.Describing the order of some or all of operations, to should not be construed as to imply that these operations necessarily suitable
Sequence correlation.It will be appreciated by those skilled in the art that the alternative sequence of the benefit with this specification.Furthermore, it is to be understood that
Not all operation must exist in each embodiment provided in this article.
And, word " preferred " used herein means serving as example, example or illustration.Feng Wen is described as " preferably
" any aspect or design be not necessarily to be construed as than other aspect or design it is more favourable.Conversely, the use purport of word " preferred "
Concept is being proposed in a concrete fashion.As used in this application term "or" is intended to mean the "or" for including and non-excluded
"or".I.e., unless otherwise or clear from the context, " X uses A or B " means that nature includes any one of arrangement.
That is, if X uses A;X uses B;Or X uses A and B both, then " X uses A or B " is met in aforementioned any example.
And, although illustrating and describing the disclosure, this area skill relative to one or more implementations
Art personnel are based on the reading to the specification and drawings and understand it will be appreciated that equivalent variations and modification.The disclosure include it is all this
The modification of sample and modification, and be limited only by the scope of the following claims.Particularly with by said modules (such as element,
Resource etc.) various functions that perform, the term for describing such component is intended to corresponding to the specified work(for performing the component
The random component (unless otherwise instructed) of energy (for example it is functionally of equal value), even if illustrated herein with execution in structure
The disclosure exemplary implementations in the open structure of function be not equal to.Although additionally, the special characteristic of the disclosure is
Jing is disclosed relative to the only one in some implementations, but this feature can be to given or application-specific with such as
For be expect and other favourable implementations one or more other combinations of features.And, with regard to term " including ", " tool
Have ", " containing " or its deformation be used in specific embodiment or claim for, such term be intended to with term
The similar mode of "comprising" includes.
Each functional unit in the embodiment of the present invention can be integrated in a processing module, or unit list
Solely it is physically present, it is also possible to which two or more units are integrated in a module.Above-mentioned integrated module both can be adopted
The form of hardware is realized, it would however also be possible to employ the form of software function module is realized.If the integrated module is with software function
The form of module is realized and as independent production marketing or when using, it is also possible to is stored in an embodied on computer readable storage and is situated between
In matter.Storage medium mentioned above can be read-only storage, disk or CD etc..Above-mentioned each device or system, can be with
Perform the method in correlation method embodiment.
In sum, although the present invention it is disclosed above with preferred embodiment, but above preferred embodiment and be not used to limit
The system present invention, one of ordinary skill in the art without departing from the spirit and scope of the present invention, can make various changes and profit
Adorn, therefore protection scope of the present invention is defined by the scope that claim is defined.
Claims (10)
1. a kind of login method of cloud account, it is characterised in that comprise the following steps:
The logging request that receiving terminal sends, the logging request carries cloud account log-on message and login mode mark;
The cloud account log-on message is authenticated according to login mode mark;
Upon successful authentication, corresponding level database is selected as sync database according to login mode mark;
After the completion of selection, send to terminal and login successfully response, it is described to login successfully the information that response carries sync database.
2. the login method of cloud account according to claim 1, it is characterised in that it is described upon successful authentication, according to stepping on
The step of record mode identifies selection corresponding level database as sync database includes:
Upon successful authentication, if login mode is designated the mark without password login, first level database is selected as same
Step data storehouse;
Upon successful authentication, if login mode is designated based on the mark of password login, second level database conduct is selected
Sync database;
Upon successful authentication, if login mode is designated the mark logged in based on password and characteristic information, third level is selected
Database is used as sync database.
3. the login method of cloud account according to claim 1 and 2, it is characterised in that the cloud account log-on message bag
Include cloud account, and described include the step of authenticated to the cloud account log-on message according to login mode mark:
When the login mode is designated to be identified without password login, judge whether cloud account is effective;
If the cloud account is effectively, judgement is authenticated successfully.
4. the login method of cloud account according to claim 1 and 2, it is characterised in that the cloud account log-on message bag
Include cloud account and target password, and the cloud account log-on message the is authenticated step according to login mode mark
Suddenly include:
When the login mode is designated the mark based on password login, judge whether cloud account is effective;
If the cloud account effectively, according to the cloud account the corresponding password that prestores is obtained;
The password that prestores is compared with target password;
If the password that prestores is identical with the target password, judgement is authenticated successfully.
5. the login method of cloud account according to claim 1 and 2, it is characterised in that the cloud account log-on message bag
Cloud account, target password and target signature information are included, and described mark according to the login mode logs in the cloud account
The step of information is authenticated includes:
When the login mode is designated based on password and the mark of characteristic information login, judge whether the cloud account has
Effect;
If the cloud account effectively, according to the cloud account corresponding prestore password and pre-stored characteristics information is obtained;
The password that prestores is compared with the target password, by the target signature information and the pre-stored characteristics information
It is compared;
If the password that prestores is identical with the target password, and the target signature information and the pre-stored characteristics information phase
Together, then judge to authenticate successfully.
6. the login method of cloud account according to claim 5, it is characterised in that the target signature information includes user
Biological information and/or terminal characteristic information.
7. a kind of entering device of cloud account, it is characterised in that include:
Receiver module, for receiving terminal send logging request, the logging request carry cloud account log-on message and
Login mode is identified;
Authentication module, for being authenticated to the cloud account log-on message according to login mode mark;
Selecting module, for upon successful authentication, corresponding level database being selected as synchrodata according to login mode mark
Storehouse;
Sending module, for selection after the completion of, send to terminal and login successfully response, it is described to login successfully response and carry synchronization
The information of database.
8. the entering device of cloud account according to claim 7, it is characterised in that the selecting module includes:
First choice unit, for upon successful authentication, if login mode is designated the mark without password login, selecting first
Level database is used as sync database;
Second select unit, for upon successful authentication, if login mode is designated based on the mark of password login, selects
Two level databases are used as sync database;
3rd select unit, for upon successful authentication, if login mode is designated the mark logged in based on password and characteristic information
Know, then select third level database as sync database.
9. the entering device of the cloud account according to claim 7 or 8, it is characterised in that the authentication module includes:
Whether first judging unit, for being designated when the login mode during mark based on password login, judge cloud account
Effectively;
First acquisition unit, if for the cloud account effectively, according to the cloud account the corresponding password that prestores is obtained;
First comparing unit, for the password that prestores to be compared with target password;
Second judging unit, if the password that prestores is identical with the target password, judgement is authenticated successfully.
10. the entering device of the cloud account according to claim 7 or 8, it is characterised in that the authentication module includes:
3rd judging unit, for when the login mode is designated based on password and the mark of characteristic information login, judging
Whether the cloud account is effective;
Second acquisition unit, if for the cloud account effectively, according to the cloud account the corresponding password that prestores is obtained
And pre-stored characteristics information;
Second comparing unit, for the password that prestores to be compared with the target password, by the target signature information
It is compared with the pre-stored characteristics information;
4th judging unit, for described prestoring, password is identical with the target password, and the target signature information and institute
State pre-stored characteristics information it is identical when, then judge authenticate successfully.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610939570.6A CN106650490B (en) | 2016-10-25 | 2016-10-25 | The login method and device of cloud account |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610939570.6A CN106650490B (en) | 2016-10-25 | 2016-10-25 | The login method and device of cloud account |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106650490A true CN106650490A (en) | 2017-05-10 |
CN106650490B CN106650490B (en) | 2019-07-23 |
Family
ID=58821106
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610939570.6A Expired - Fee Related CN106650490B (en) | 2016-10-25 | 2016-10-25 | The login method and device of cloud account |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106650490B (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107465661A (en) * | 2017-07-04 | 2017-12-12 | 重庆邮电大学 | A kind of cloud Method of Database Secure Audit method based on Docker virtualizations |
CN107943614A (en) * | 2017-10-27 | 2018-04-20 | 捷开通讯(深圳)有限公司 | Intelligent terminal data backup method, intelligent terminal and the device with store function |
CN110535850A (en) * | 2019-08-26 | 2019-12-03 | 腾讯科技(武汉)有限公司 | Treating method and apparatus, storage medium and the electronic device that account number logs in |
CN110929282A (en) * | 2019-12-05 | 2020-03-27 | 武汉深佰生物科技有限公司 | Protein interaction-based biological characteristic information early warning method |
CN111885080A (en) * | 2020-07-31 | 2020-11-03 | 成都新潮传媒集团有限公司 | Login service architecture, server and client |
CN111970341A (en) * | 2020-07-31 | 2020-11-20 | 广州汽车集团股份有限公司 | Account number close exchange-free method and device based on Internet of vehicles, automobile and medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101009516A (en) * | 2006-01-26 | 2007-08-01 | 华为技术有限公司 | A method and system for data synchronization |
US20110208714A1 (en) * | 2010-02-19 | 2011-08-25 | c/o Microsoft Corporation | Large scale search bot detection |
CN102571703A (en) * | 2010-12-23 | 2012-07-11 | 鸿富锦精密工业(深圳)有限公司 | Security control system and security control method for cloud data |
CN104580237A (en) * | 2015-01-22 | 2015-04-29 | 北京联云格科技有限公司 | Method for logging into website, server used in method for logging into website, client terminal used in method for logging into website and peripheral used in method for logging into website |
CN105205370A (en) * | 2015-08-24 | 2015-12-30 | 北京恒信安科技有限公司 | Safety protection method for mobile terminal, mobile terminal, safety system and application method |
CN106027552A (en) * | 2016-06-30 | 2016-10-12 | 中经汇通电子商务有限公司 | Method and system for accessing cloud storage data by user |
-
2016
- 2016-10-25 CN CN201610939570.6A patent/CN106650490B/en not_active Expired - Fee Related
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101009516A (en) * | 2006-01-26 | 2007-08-01 | 华为技术有限公司 | A method and system for data synchronization |
US20110208714A1 (en) * | 2010-02-19 | 2011-08-25 | c/o Microsoft Corporation | Large scale search bot detection |
CN102571703A (en) * | 2010-12-23 | 2012-07-11 | 鸿富锦精密工业(深圳)有限公司 | Security control system and security control method for cloud data |
CN104580237A (en) * | 2015-01-22 | 2015-04-29 | 北京联云格科技有限公司 | Method for logging into website, server used in method for logging into website, client terminal used in method for logging into website and peripheral used in method for logging into website |
CN105205370A (en) * | 2015-08-24 | 2015-12-30 | 北京恒信安科技有限公司 | Safety protection method for mobile terminal, mobile terminal, safety system and application method |
CN106027552A (en) * | 2016-06-30 | 2016-10-12 | 中经汇通电子商务有限公司 | Method and system for accessing cloud storage data by user |
Non-Patent Citations (1)
Title |
---|
居庆玮: "物联网环境下统一认证安全机制的研究", 《中国优秀硕士学位论文全文数据库 信息科技辑》 * |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107465661A (en) * | 2017-07-04 | 2017-12-12 | 重庆邮电大学 | A kind of cloud Method of Database Secure Audit method based on Docker virtualizations |
CN107943614A (en) * | 2017-10-27 | 2018-04-20 | 捷开通讯(深圳)有限公司 | Intelligent terminal data backup method, intelligent terminal and the device with store function |
CN110535850A (en) * | 2019-08-26 | 2019-12-03 | 腾讯科技(武汉)有限公司 | Treating method and apparatus, storage medium and the electronic device that account number logs in |
CN110535850B (en) * | 2019-08-26 | 2022-07-29 | 腾讯科技(武汉)有限公司 | Processing method and device for account login, storage medium and electronic device |
CN110929282A (en) * | 2019-12-05 | 2020-03-27 | 武汉深佰生物科技有限公司 | Protein interaction-based biological characteristic information early warning method |
CN111885080A (en) * | 2020-07-31 | 2020-11-03 | 成都新潮传媒集团有限公司 | Login service architecture, server and client |
CN111970341A (en) * | 2020-07-31 | 2020-11-20 | 广州汽车集团股份有限公司 | Account number close exchange-free method and device based on Internet of vehicles, automobile and medium |
CN111885080B (en) * | 2020-07-31 | 2022-08-05 | 成都新潮传媒集团有限公司 | Login service architecture, server and client |
CN111970341B (en) * | 2020-07-31 | 2023-04-07 | 广州汽车集团股份有限公司 | Account number close exchange-free method and device based on Internet of vehicles, automobile and medium |
Also Published As
Publication number | Publication date |
---|---|
CN106650490B (en) | 2019-07-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106650490A (en) | Cloud account number login method and device | |
US9703971B2 (en) | Sensitive operation verification method, terminal device, server, and verification system | |
CN103488481B (en) | Application program control method, terminal equipment and remote control system | |
US20160241589A1 (en) | Method and apparatus for identifying malicious website | |
CN104901805B (en) | A kind of identification authentication methods, devices and systems | |
KR101556599B1 (en) | Pattern Inputting Apparatus and Method, and Recording Medium Using the Same | |
CN107862194B (en) | A kind of method, device and mobile terminal of safety verification | |
WO2014206203A1 (en) | System and method for detecting unauthorized login webpage | |
CN103634294A (en) | Information verifying method and device | |
CN112235303B (en) | Account logout method and device and computer equipment | |
CN105468952A (en) | Authentication method and apparatus | |
CN106534093B (en) | A kind of processing method of terminal data, apparatus and system | |
WO2018140172A1 (en) | Determining computer ownership | |
CN108234124A (en) | Auth method, device and system | |
CN107422860A (en) | Control method, device, storage medium and mobile terminal based on blank screen gesture | |
CN105847007A (en) | Identity verification method for terminal device and computer device | |
CN106487798A (en) | Method of data synchronization and device | |
CN106453402B (en) | A kind of data processing method and equipment | |
CN106656985B (en) | Backup account login method, device and system | |
CN106507300A (en) | A kind of method for giving loss terminal for change, device and terminal | |
CN105373715A (en) | Wearable device based data access method and apparatus | |
US11165635B2 (en) | Selecting and configuring multiple network components in enterprise hardware | |
CN108234113A (en) | Auth method, device and system | |
CN106888223B (en) | User account login method and mobile terminal | |
CN104995635B (en) | Picture sending method and device and terminal device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information | ||
CB02 | Change of applicant information |
Address after: 523860 No. 18, Wu Sha Beach Road, Changan Town, Dongguan, Guangdong Applicant after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd. Address before: 523860 No. 18, Wu Sha Beach Road, Changan Town, Dongguan, Guangdong Applicant before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd. |
|
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20190723 |