Disclosure of Invention
In order to solve the problems in the prior art, the invention provides a binding processing method of shared data, which comprises the following steps:
the first mobile terminal sends a second terminal number of the second mobile terminal to the server;
the server generates first authentication information corresponding to the second terminal number and sends the first authentication information to the second mobile terminal;
the first mobile terminal generates a login password corresponding to the second mobile terminal and sends the login password and second authentication information to a server;
the server verifies that the second authentication information is in consistency matching with the first authentication information, and if the second authentication information is in consistency matching with the first authentication information, the login password and the second terminal number are bound;
the first mobile terminal sends binding request information to the server, wherein the binding request information comprises a first terminal number and a second terminal number of the first mobile terminal;
the server generates a confirmed website link address according to the binding request information and sends the website link address to the second terminal;
the second mobile terminal accesses the website corresponding to the website link address to generate access information;
the server sends binding confirmation information to the second mobile terminal according to the validity identified by the access information;
the second mobile terminal sends verification code request information to the server according to the binding confirmation information;
the server generates third authentication information and sends the third authentication information to the second mobile terminal;
the second mobile terminal sends fourth authentication information to the server;
and the server verifies the consistency of the third authentication information and the fourth authentication information, and if the third authentication information and the fourth authentication information are consistent, the server performs association binding processing on the first terminal number and the second terminal number.
Further, the server receives the second terminal number, performs identification processing on the second terminal number, and generates first authentication information corresponding to the second terminal number and sends the first authentication information to the second mobile terminal if the second terminal number does not exist in the server.
Further, before the server binds the login password and the second terminal number, the server authenticates the login password, and if the login password meets the authentication rule, the login password passes the authentication.
Further, the server sends a confirmed website link address to the second mobile terminal, and sends the first terminal number, the second terminal number and the confirmed website link address to a database for storage.
Further, the server sets a first effective time threshold value for the first mobile terminal to submit the second authentication information in a database field; the second mobile terminal submits a second effective time threshold value of the website generation access information corresponding to the website link address; and the second mobile terminal submits a third effective time threshold of fourth authentication information to the server.
Further, whether the submission time of the second authentication information, the website generation access information corresponding to the website link address, and the fourth authentication information is within the corresponding valid time threshold value, and if not, the submission is successful.
Further, the binding confirmation information sent by the server to the second mobile terminal includes a first terminal number, a verification code input box, a verification code acquisition button, and a binding confirmation button.
Further, the first mobile terminal sends a request for checking the bound mobile terminal to the server, and the server returns the information of the bound mobile terminal;
further, the first mobile terminal sends a request for acquiring the data of the bound mobile terminal to the server, and if the server judges that the first terminal and the mobile terminal are bound, the data of the mobile terminal is sent to the first mobile terminal; and if the server judges that the mobile terminal is not bound with the first mobile terminal, sending user error information to the first mobile terminal.
Further, the server sends the first authentication information, the second authentication information, the third authentication information and the fourth authentication information to a database for storage.
The invention also relates to a binding processing device of the shared data, which comprises a first mobile terminal, a second mobile terminal and a server;
the first mobile terminal is used for sending a second terminal number of a second mobile terminal to the server; the second mobile terminal is also used for generating a login password corresponding to the second mobile terminal and sending the login password and second authentication information to the server; the first mobile terminal is further configured to send binding request information to the server, where the binding request information includes a first terminal number and the second terminal number of the first mobile terminal;
the second mobile terminal is used for accessing the website corresponding to the website link address to generate access information; the server is also used for sending verification code request information and fourth authentication information to the server according to the binding confirmation information;
the server is used for generating first authentication information corresponding to the second terminal number and sending the first authentication information to the second mobile terminal; the second authentication information is used for carrying out consistency matching on the second authentication information and the first authentication information, and if the matching is successful, the login password and the second terminal number are bound; the server is used for generating a confirmed website link address according to the binding request information, sending the website link address to the second terminal, identifying the validity of the access information and sending binding confirmation information to the second mobile terminal; the server is also used for generating third authentication information and sending the third authentication information to the second mobile terminal; the server is further used for verifying the consistency of the third authentication information and the fourth authentication information, and if the consistency is consistent, the first terminal number and the second terminal number are subjected to associated binding processing.
The binding processing method of the shared data provided by the embodiment of the invention can avoid the risk of the internal network caused by the account theft.
Detailed Description
The technical solution of the present invention is further described in detail by the accompanying drawings and embodiments.
Fig. 1 is a flowchart of a binding processing method for shared data according to the present invention, as shown in the figure, the method includes:
step 101: and the first mobile terminal sends the second terminal number of the second mobile terminal to the server.
When a second mobile terminal needs to join the local area intranet, the first mobile terminal which has joined the local area intranet sends the second mobile terminal number to the server, and simultaneously sends a request of the second mobile terminal joining the local area intranet.
Further, the server receives the second terminal number, performs identification processing on the second terminal number, and generates first authentication information corresponding to the second terminal number and sends the first authentication information to the second mobile terminal if the second terminal number does not exist in the server. And if the corresponding second terminal number already exists in the server, the server returns the information that the second terminal number already exists.
Step 102: and the server generates first authentication information corresponding to the second terminal number and sends the first authentication information to the second mobile terminal.
And when receiving a second mobile terminal number sent by the first mobile terminal and a request of the second mobile terminal for joining the local area intranet, the server generates first authentication information aiming at the second mobile terminal number and sends the first authentication information to the second mobile terminal, wherein the first authentication information is used for confirming whether the second mobile terminal number is real and valid. If the first authentication information is transmitted to the first mobile terminal, it may happen that the first mobile terminal performs an illegal operation to falsely register a second mobile terminal number, thereby causing a loss to other users of the local area intranet. The first authentication information is sent to the second mobile terminal, so that the situation can be effectively avoided.
Step 103: and the first mobile terminal generates a login password corresponding to the second mobile terminal and sends the login password and the second authentication information to a server.
After receiving the first authentication information sent by the server, the second mobile terminal inputs second authentication information corresponding to the first authentication information through the first mobile terminal, and the first mobile terminal simultaneously generates login authentication information corresponding to the second mobile terminal, such as an Identity (ID), a login password and the like. And the first mobile terminal sends the login authentication information and the second authentication information to a server.
Step 104: and the server verifies that the second authentication information is in consistency matching with the first authentication information.
And after receiving the second authentication information sent by the first mobile terminal, the server performs matching authentication on the second authentication information and the first authentication information. The successful matching of the second authentication information and the first authentication information means that the second authentication information corresponds to the first authentication information. There are several reasons why the second authentication information does not match the first authentication information, for example, the entry time of the second authentication information exceeds the valid time threshold due to an error entry of the second authentication information.
Further, the server sets a first effective time threshold value for the first mobile terminal to submit the second authentication information in a database field; the first validity time threshold may be a certain time, such as 15min or 30 min. And when the submission time of the second authentication information exceeds the first valid time threshold, the second authentication information is considered invalid, and the information that the second authentication information is invalid is returned.
Step 105: and if the matching is successful, the login password and the second terminal number are bound.
If the server successfully matches the second authentication information with the first authentication information, the server binds the login authentication information sent by the first mobile terminal with the second terminal numbers of a plurality of second mobile terminals, namely, registration information of the second terminal numbers in the local area intranet is generated, namely, the second mobile terminals are successfully registered in the local area intranet. And if the second authentication information is not successfully matched with the first authentication information, the server returns matching failure information, and generates the first authentication information again and sends the first authentication information to the second mobile terminal or finishes the operation.
Further, before the server binds the login password and the second terminal number, the server authenticates the login password, and if the login password meets the authentication rule, the login password passes the authentication. For example, whether the number of characters of the login password is 6-18 digits, whether special characters which are not allowed to be registered are contained, whether the account exists or not is checked, if the check is passed, the registration is successful, and the information of successful registration is returned to the first mobile terminal in real time; and if the mobile terminal fails, the mobile terminal returns to register failure information to the first mobile terminal in real time.
Step 106: the first mobile terminal sends binding request information to the server, wherein the binding request information comprises a first terminal number and a second terminal number of the first mobile terminal;
after the second mobile terminal is successfully registered in the local area intranet, the first mobile terminal may initiate a request message for binding with the second mobile terminal, where the binding request message should include a first terminal number of the first mobile terminal and a second terminal number of the second mobile terminal. The first terminal number and the second terminal number are used for the server to extract and bind the identity information and the terminal information of the two terminal numbers.
Step 107: and the server generates a confirmed website link address according to the binding request information and sends the website link address to the second mobile terminal.
The server generates corresponding confirmation information after receiving the binding request sent by the first mobile terminal, wherein the confirmation information has various expression forms, such as confirming a website link address, a network confirmation verification code, a short message confirmation verification code and the like, and sends the confirmation information to the second mobile terminal.
Further, the server sends the confirmed website link address to the second mobile terminal, and simultaneously sends the first terminal number, the second terminal number and the confirmed website link address to a database for storage.
Step 108: and the second mobile terminal accesses the website corresponding to the website link address to generate access information.
And after receiving the confirmation information sent by the server, the second mobile terminal generates corresponding authentication information. For example, if the confirmation information is the confirmation website link address, generating website access information corresponding to the website link address; if the confirmation information is the network confirmation verification code, generating a corresponding network verification code; if the confirmation information is the short message confirmation verification code, generating a corresponding short message verification code, and if the confirmation information is the confirmation information in other forms, generating the verification code in the corresponding form.
Step 109: and the server sends binding confirmation information to the second mobile terminal according to the validity identified by the access information.
And if the second mobile terminal successfully returns authentication information to the server, for example, website access information corresponding to the website link address is confirmed, the binding request is confirmed to be true and valid, that is, whether the second mobile terminal agrees to perform the binding operation is confirmed. The significance of this step is that if the first mobile terminal sends a wrong binding instruction, the second mobile terminal can reject the wrong binding instruction, or the second mobile terminal can reject the wrong binding instruction when considering that the binding instruction is an illegal instruction so as to protect the own rights and interests from being lost. The server then sends the binding acknowledgement information of the first mobile terminal to the second mobile terminal.
Further, the server presets a second effective time threshold value of the second mobile terminal submitting the website generation access information corresponding to the website link address; the second validity time threshold may be a certain time, such as 15min or 30 min. And when the submission time of the website generation access information corresponding to the website link address submitted by the second mobile terminal exceeds the second effective time threshold, the access information is considered invalid, and the information with invalid access information is returned.
Step 110: and the second mobile terminal sends verification code request information to the server according to the binding confirmation information.
Step 111: and the server generates third authentication information and sends the third authentication information to the second mobile terminal.
And the second mobile terminal receives the binding confirmation information sent by the server and agrees to the binding operation, and then sends verification code request information to the server, and the server receives the verification code request information, then generates third authentication information and sends the third authentication information to the second mobile terminal. The third authentication information is used for confirming whether the second mobile terminal agrees to bind with the first mobile terminal again, and if the second mobile terminal agrees to bind with the first mobile terminal, the binding can be refused.
Further, the binding confirmation information sent by the server to the second mobile terminal includes a first terminal number, a verification code input box, a verification code acquisition button, and a binding confirmation button. When the first terminal number is sent, in order to remind the second mobile terminal that the object to be bound is the first mobile terminal, the verification code obtaining button is used for the second mobile terminal to send verification code request information to the server, the verification code input box is used for inputting the verification code, and the binding confirming button is used for agreeing with the binding request of the first mobile terminal.
Step 112: and the second mobile terminal sends fourth authentication information to the server.
And after the second mobile terminal receives the third authentication information sent by the server and agrees to bind with the first mobile terminal, the second mobile terminal sends fourth authentication information to the server.
Step 113: the server verifies consistency of the third authentication information and the fourth authentication information.
After receiving the fourth authentication information sent by the second mobile terminal, the server judges the consistency of the fourth authentication information and the third authentication information, if the fourth authentication information is not matched with the third authentication information or the submission time of the fourth authentication information is not within the preset effective time threshold, the server considers that the matching fails, and after the matching fails, the server can regenerate the third authentication information or stop the operation.
Further, the server presets a third effective time threshold for the second mobile terminal to submit fourth authentication information to the server. The third validity time threshold may be a certain time, such as 15min or 30 min. And when the submission time of the second mobile terminal submitting the fourth authentication information exceeds the third valid time threshold, the fourth authentication information is considered invalid, and the information that the fourth authentication information is invalid is returned.
Further, the method further comprises the step that the server sends the first authentication information, the second authentication information, the third authentication information and the fourth authentication information to a database for storage.
Step 114: and the server performs association binding processing on the first terminal number and the second terminal number.
And when the server judges that the fourth authentication information and the third authentication information are successfully matched, the server considers that the second mobile terminal agrees to perform association binding with the first mobile terminal, namely, the server performs association binding processing on the first terminal number and the second terminal number.
It should be noted that, in the local area intranet, any one mobile terminal or terminal may request to establish association binding with other mobile terminals or terminals, and a process of requesting to establish association binding with the first mobile terminal by another mobile terminal, such as the second mobile terminal, is similar to a process of requesting to establish association binding with the second mobile terminal by the first mobile terminal.
Further, the first mobile terminal sends a request for checking the bound mobile terminal to the server, and the server returns the information of the bound mobile terminal.
After the first mobile terminal and the second mobile terminal are successfully bound, a request for checking the bound mobile terminal of the mobile terminal can be sent to the server, and after the server receives the checking request of the first mobile terminal, the server searches in the database according to the identity information and the terminal information of the first mobile terminal and sends the searched information of the bound mobile terminal to the first mobile terminal. Similarly, other mobile terminals in the local area network may also perform this operation.
The method comprises the steps that a first mobile terminal sends a request for acquiring bound mobile terminal data to a server, and if the server judges that the first terminal and the mobile terminal are bound, the mobile terminal data are sent to the first mobile terminal; and if the server judges that the mobile terminal is not bound with the first mobile terminal, sending user error information to the first mobile terminal.
Specifically, when a first mobile terminal needs to acquire data of a bound mobile terminal, a request for acquiring the data of the bound mobile terminal needs to be sent to a server, the server firstly confirms the binding relationship between the first mobile terminal and the mobile terminal, if the server confirms that the mobile terminal and the first mobile terminal are bound, the request for acquiring the data of the first mobile terminal is sent to the mobile terminal, and if the mobile terminal agrees with the request, the server sends the data of the mobile terminal to the first mobile terminal; if the mobile terminal refuses the request, the server sends refusing request information to the first mobile terminal. And if the off-server judges that the mobile terminal is not bound with the first mobile terminal, user error information or mobile terminal unbound information is sent to the first mobile terminal, and the first mobile terminal can initiate a binding request with the mobile terminal.
Fig. 2 is a schematic diagram of a binding processing device for shared data according to the present invention, where as shown in the figure, the binding processing device includes a first mobile terminal 2, a second mobile terminal 3, and a server 1, where the first mobile terminal 2 and the server 1 have an electrical connection relationship, and the second mobile terminal 3 and the server 1 have an electrical connection relationship.
The first mobile terminal 2 is used for sending a second terminal number of the second mobile terminal 3 to the server 1; the mobile terminal is further configured to generate a login password corresponding to the second mobile terminal 3, and send the login password and the second authentication information to the server 1; the first mobile terminal 2 is further configured to send binding request information to the server 1, where the binding request information includes the first terminal number and the second terminal number of the first mobile terminal 2.
The first mobile terminal 2 is a necessary tool for the second mobile terminal 3 to join the local area intranet, and if the first mobile terminal 2 is not matched, the second mobile terminal 3 cannot successfully join the local area intranet under the condition that the setting of the server 1 is not changed, so that the situation that the mobile terminal or the terminal joins the local area intranet through illegal operation to cause loss to other mobile terminals in the local area intranet or steal data information of the local area intranet is avoided.
The second mobile terminal 3 is configured to access a website corresponding to the website link address to generate access information; and is further configured to send verification code request information and fourth authentication information to the server 1 according to the binding acknowledgement information.
After the second mobile terminal 3 successfully joins the local area intranet, an association binding relationship may be established with other mobile terminals, and when the association binding relationship is established, a requested party, that is, the second mobile terminal 3 performs a main binding operation, such as an agreement on a relevant binding operation with the first mobile terminal 2.
The server 1 is configured to generate first authentication information corresponding to the second terminal number and send the first authentication information to the second mobile terminal 3; the second authentication information is used for carrying out consistency matching on the second authentication information and the first authentication information, and if the matching is successful, the login password and the second terminal number are bound; the server 1 is configured to generate a website link address confirmation according to the binding request information, send the website link address to the second terminal, identify validity of the access information, and send binding confirmation information to the second mobile terminal 3; the server 1 is further configured to generate third authentication information and send the third authentication information to the second mobile terminal 3; the server 1 is further configured to verify consistency of the third authentication information and the fourth authentication information, and if the third authentication information and the fourth authentication information are consistent, perform association binding processing on the first terminal number and the second terminal number.
Those of skill would further appreciate that the various illustrative components and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that the various illustrative components and steps have been described above generally in terms of their functionality in order to clearly illustrate this interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied in hardware, a software module executed by a processor, or a combination of the two. A software module may reside in Random Access Memory (RAM), memory, Read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art.
The above-mentioned embodiments are intended to illustrate the objects, technical solutions and advantages of the present invention in further detail, and it should be understood that the above-mentioned embodiments are merely exemplary embodiments of the present invention, and are not intended to limit the scope of the present invention, and any modifications, equivalent substitutions, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.