CN109361689A - A kind of user's creation method and device based on object storage - Google Patents
A kind of user's creation method and device based on object storage Download PDFInfo
- Publication number
- CN109361689A CN109361689A CN201811376473.6A CN201811376473A CN109361689A CN 109361689 A CN109361689 A CN 109361689A CN 201811376473 A CN201811376473 A CN 201811376473A CN 109361689 A CN109361689 A CN 109361689A
- Authority
- CN
- China
- Prior art keywords
- user
- key
- name
- verification
- letter
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The embodiment of the present application discloses a kind of user's creation method and device based on object storage, when user needs to create user in object storage system, user can be inputted by client create information, server is according to the input of user, the acquired user of judgement creates whether user name and key in information meet user's creation rule, if met, new user is created in object storage system, so that the user can carry out data storage and modification in object storage system;If do not met, then return to creation error message, user is prompted to create failure, it is seen then that pass through scheme provided by the embodiments of the present application, user needs in the case where creating successful situation, the storage resource of object storage system just can be used, so that illegal user is avoided to illegally occupy storage resource, and, creating successful user can just modify to the data in object storage, ensure that Information Security.
Description
Technical field
This application involves Internet technical fields, and in particular to a kind of user's creation method and dress based on object storage
It sets.
Background technique
With the fast development of big data and cloud computing, storing data also increases with exponential form.And object storage clothes
Business as it is a kind of can network-oriented storage service, support mass users concurrently to access, and externally provide high extend
(Scalability), the high persistently distributed mass data of (Durability) and High Availabitity (Availability) stores clothes
Business, the increasingly favor by numerous Internet users.
However, user is occupying for storage resource in object storage, some users are to occupy or intercept in storage resource
Data, illegally created, be easy to cause the leakage of resource in object storage system and distribution insufficient in this way, influence Service Quality
Amount.Therefore, how to improve the safety of data and the reasonability of resource allocation is a technical problem to be solved urgently.
Summary of the invention
In view of this, the embodiment of the present application provides a kind of user's creation method and device based on object storage, to improve
The reasonability of the safety of data and resource allocation in object storage system.
To solve the above problems, technical solution provided by the embodiments of the present application is as follows:
A kind of user's creation method based on object storage provided by the embodiments of the present application, which comprises
In response to the input operation of user, obtains user and create information;The user creates information and includes at least user name
And key;
It verifies the user name and whether the key meets user and create rule;
If met, information is created according to the user, creates user;
If do not met, creation error message is returned to, to prompt user to create failure.
In one possible implementation, the user is inputted by order line and creates information;Or
The user, which is inputted, by administration interface creates information;The administration interface includes the user name and the key
Input item.
In one possible implementation, whether the verification user name and the key meet user's creation rule
Then, comprising:
The user name length is verified whether in the first preset threshold range;
The key length is verified whether in the second preset threshold range;First preset threshold range is greater than described
Second preset range;
Verify in the user name number and/or letter whether meet in preset rules, and the verification key number and/
Or whether letter meets preset rules.
In one possible implementation, when the user name include number and letter, and/or, the key includes
When number and letter, whether number and/or letter meet preset rules, and the verification key in the verification user name
Whether middle number and/or letter meet preset rules, comprising:
Number and letter in the user name are verified by regular expression and verify number and letter in the key.
In one possible implementation, whether the verification user name meets user's creation rule, further includes:
The Chinese character in the user name is verified by the ASCII character of character;
Verify whether the user name includes predetermined symbol;The predetermined symbol includes: underscore, middle scribing line, in fullstop
It is one or more.
In one possible implementation, the user creates information further include: tenant's name and User ID;The method
Further include:
Tenant's name length and the User ID length are verified whether within the scope of third predetermined threshold value;The third is pre-
If threshold range is less than the first threshold range, and is greater than second preset threshold range;
Number and letter in tenant's name are verified by regular expression and verify number and word in the User ID
It is female.
The application second aspect provides a kind of user's creating device based on object storage, which is characterized in that the dress
It sets and includes:
Acquiring unit obtains user and creates information for the input operation in response to user;The user creates packet
Include user name and key;
Verification unit, for verifying whether the user name and the key meet user and create rule;
Creating unit, for creating information, creation according to the user when verification unit output result is to meet
User;
Return unit, for creation error message being returned to, with prompt when verification unit output result is not meet
User creates failure.
In one possible implementation, the user is inputted by order line and creates information;Or
The user, which is inputted, by administration interface creates information;The administration interface includes the user name and the key
Input item.
In one possible implementation, the verification unit, comprising:
First verification subelement, for verifying the user name length whether in the first preset threshold range;
Second verification subelement, for verifying the key length whether in the second preset threshold range;Described first
Preset threshold range is greater than second preset range;
Third verifies subelement, for verifying whether number and/or letter in the user name meet preset rules and school
Test whether number and/or letter in the key meet preset rules.
In one possible implementation, the verification unit, further includes:
4th verification subelement, for verifying Chinese character in the user name by the ASCII character of character;
5th verification subelement, for verifying whether the user name includes predetermined symbol;Under the predetermined symbol includes:
Scribing line, middle scribing line, fullstop are one or more.
In one possible implementation, when the user name include number and letter, and/or, the key includes
When number and letter, the verification unit, specifically for by regular expression verify in the user name number and it is alphabetical with
And number and letter in the verification key.
In one possible implementation, the user creates information further include: tenant's name and User ID;The verification
Unit is also used to verify tenant's name length and the User ID length whether within the scope of third predetermined threshold value;Described
Three preset threshold ranges are less than the first threshold range, and are greater than second preset threshold range;
Number and letter in tenant's name are verified by regular expression and verify number and word in the User ID
It is female.
It can be seen that the embodiment of the present application has the following beneficial effects:
The embodiment of the present application can be inputted by client and be used when user needs to create user in object storage system
Family creates information, and server judges that acquired user creates whether user name and key in information accord with according to the input of user
Family creation rule is shared, if met, new user is created in object storage system, so that the user can deposit in object
Data storage and modification are carried out in storage system;If do not met, creation error message is returned, user is prompted to create failure, it can
See, by scheme provided by the embodiments of the present application, user needs in the case where creating successful situation, and object storage system just can be used
The storage resource of system, to avoid illegal user from illegally occupying storage resource, moreover, creating successful user just can be to right
As storage in data modify, ensure that Information Security.
Detailed description of the invention
Fig. 1 is the block schematic illustration of exemplary application scene provided by the embodiments of the present application;
Fig. 2 is a kind of flow chart of user's creation method based on object storage provided by the embodiments of the present application;
Fig. 3 is provided by the embodiments of the present application by order line input user's creation Examples of information figure;
Fig. 4 is provided by the embodiments of the present application by administration interface input user's creation Examples of information figure;
Fig. 5 is creation miscue exemplary diagram provided by the embodiments of the present application;
Fig. 6 is the flow chart that a kind of verification user provided by the embodiments of the present application creates information approach;
Fig. 7 is a kind of user's creating device structure chart based on object storage provided by the embodiments of the present application.
Specific embodiment
In order to make the above objects, features, and advantages of the present application more apparent, with reference to the accompanying drawing and it is specific real
Mode is applied to be described in further detail the embodiment of the present application.
Inventor has found in traditional object storage user's creation research, due to storing money when user in object storage
The occupant in source verifies if not creating information to user when carrying out user's creation, user is be easy to cause illegally to create
Build, so cause object storage resource illegally occupied and object storage system in data be leaked, influence user data
Safety.
Based on this, the embodiment of the present application provides a kind of user's creation method and device based on object storage, works as user
When needing to create new user in object storage system, information is created according to the user of input and user creates rule, judgement
User creates whether information meets user's creation rule, when these segmentation symbols match, progress user's creation, so that object storage system can be
The user distributes storage resource, while user being allowed to modify the data of storage;When not meeting, creation mistake letter is returned
Breath prompts user to create failure, which occupies storage resource and modification storing data, and then guarantees storage resource
It is not illegally occupied and the safety of data.
Referring to Fig. 1, which is the block schematic illustration of exemplary application scene provided by the embodiments of the present application.Wherein, this Shen
Please embodiment provide user's creation method can be applied in server 20.
When practical application, user can input user by client 10 and create information, in response to the transmission of user's triggering
Operation, server 20 receives user and creates information, and creates rule according to preconfigured user and judge that user creates information and is
It is no to meet, subsequent operation is then carried out according to judging result.
It will be understood by those skilled in the art that block schematic illustration shown in FIG. 1 is only that presently filed embodiment can be
An example being wherein achieved.The scope of application of the application embodiment is not limited by any aspect of the frame.
It should be noted that wherein, client 10 can be carried on terminal, terminal can be it is existing, researching and developing
Or in the future research and development, can by it is any type of wiredly and/or wirelessly connection (for example, Wi-Fi, LAN, honeycomb, coaxial cable
Deng) any user equipment for interacting, including but not limited to: existing, researching and developing or research and development in the future smartwatch,
Smart phone, non-smart mobile phone, tablet computer, laptop PC, desktop personal computer, minicomputer, in
Type computer, mainframe computer etc..It is also to be noted that server can be existing, researching and developing or research and develop in the future
, an example of the equipment of application service that can provide a user information recommendation.Presently filed embodiment is in this regard
It is unrestricted.
Technical solution provided by the present application for ease of understanding is illustrated the technical solution below in conjunction with attached drawing.
Referring to fig. 2, which is a kind of process of user's creation method based on object storage provided by the embodiments of the present application
Figure, as shown in Fig. 2, this method may include:
S201: the input in response to user operates, and obtains user and creates information.
In the present embodiment, when user needs progress user's creation first when object storage system obtains storage resource.With
Family can input user by client and create information, and by triggering corresponding operating, the user of input created information and is sent
To server.
Wherein, it may include user name and key that user, which creates information,.In addition, when user wants to create by enterprise network,
Also need to input tenant's name that server is distributed for the enterprise and user User ID corresponding in enterprise, therefore
It can also include tenant's name and User ID that user, which creates information,.In addition, key may include public key and private key.
In practical applications, user can carry out user's creation by two ways, and input user creates information.It is a kind of
It is that user can input user name and key by way of inputting order line in linux system, such as shown in Fig. 3, Yong Huke
To pass through user name and key needed for creation order input user's creation.It can also be used with being inputted in user's creative management interface
Name in an account book and key, such as shown in Fig. 4, user can input corresponding user information in the administration interface.In specific implementation, it manages
Managing in interface may include user name input item and key input item, and user inputs relevant information in corresponding input item, lead to
It crosses triggering and determines operation, send user to server and create information.
S202: whether verification user name and key meet user and create rule, if met, execute S203;Otherwise it executes
S204。
In the present embodiment, after server, which receives user, creates information, verification user creates user name and close in information
Whether key, which meets user, creates rule.
Wherein, it is the pre-set rule that must satisfy when creating user that user, which creates rule,.For example, user name is long
It spends and whether meets preset threshold, whether user name is made of numeral and letter etc..Wherein, about verification user name and key
Specific implementation will be illustrated in subsequent embodiment,
In practical application, after the completion of server is to user name and key verification, difference can be executed according to check results
Operation executes S203 when passed the verification;When verification does not pass through, S204 is executed.
S203: information is created according to user, creates user.
In the present embodiment, when server verification creates information by the user that user is inputted, then new user's wound is carried out
It builds, server is that the user distributes storage resource.User can use user name and key logs in, in the storage of distribution
Data storage is carried out in resource, while can also be modified to data.
S204: returning to creation error message, to prompt user to create failure.
When verification does not pass through, server sends creation error message to client, to prompt user to create failure, from
And it can create to avoid illegal user to the occupancy of storage resource and storing data is distorted.
In specific implementation, when user is created by way of order line, client can be directly wrong by creation
False information is shown;When user is created by way of administration interface, client can not will meet user's creation
The content of rule is shown by way of marking red font, such as shown in Fig. 5.
Through the foregoing embodiment it is found that when user needs to create new user in object storage system, according to input
User creates information and user creates rule, judges that user creates whether information meets user's creation rule, when these segmentation symbols match, into
Row user creation so that object storage system can distribute storage resource for the user, while allowing user to the data of storage
It modifies;When not meeting, creation error message is returned, user is prompted to create failure, which occupies storage money
Source and modification storing data, and then guarantee storage resource is not illegally occupied and the safety of data.
Whether every content in information, which meets user's creation rule, is created to server verification user below in conjunction with attached drawing
It is illustrated.
Referring to Fig. 6, which is that a kind of verification user provided by the embodiments of the present application creates information approach flow chart, such as Fig. 6
It is shown, which comprises
S601: whether verification user name length is in the first preset threshold range.
S602: whether check key length is in the second preset threshold range.
In the present embodiment, when server, which gets user, creates information, whether user name length and key length are verified
Meet preset threshold range, wherein the first preset threshold range is greater than the second preset range.
In practical applications, user name and the corresponding preset threshold range of key can be configured in advance.Example
Such as, corresponding first preset threshold range of user name is 1-128 character, i.e. user name minimum length is 1, and maximum length is
128;The corresponding second threshold range of key is 6-40 character, i.e., key minimum length is 6, to guarantee the safety of key,
Maximum length is 40.The acquired user name length of server verification whether is located at 1-128 and whether key length is located at 6-
40.If the two is respectively positioned in preset threshold range, verification passes through;If there is one in preset threshold range, then school
It tests and does not pass through.
S603: in verification user name number and/or letter whether meet in preset rules and check key number and/or
Whether letter meets preset rules.
In the present embodiment, server verifies the user name of acquisition and the composition of key, judges in user name
Whether number and/or letter meet preset rules in number and/or letter and key.
Wherein, preset rules can be preset according to actual needs, for example, preset rules are that user name need to include
English alphabet and/or 0-9 Arabic numerals then verify whether user name that user is inputted includes English alphabet and/or number,
If in user name further include other symbols not in preset rules, such as?, % etc., then verify failure.
It should be noted that when in user name or key only including English alphabet or a kind of number, it can be determined that user
Whether name or the English alphabet in key or number are in preset rules;If in user name or key not only include English alphabet but also
Including number, then number and letter in user name or key can be verified by regular expression.
It is understood that can use different regular expressions to two since user name is different with the length of key
Person verifies.For example, verifying user name using regular expression " X+X+Y ", wherein X indicates letter, and Y indicates number, also
It is to say, when user name includes two letters and a number, then verification passes through, and otherwise verifies and does not pass through;Utilize regular expressions
Formula " X+X+X+X+Y+Y " check key, that is to say, that when key includes four letters and two numbers, then verification passes through, no
It then verifies and does not pass through.
It should be noted that the specific manifestation form about regular expression can be configured according to actual needs, this
Embodiment is not defined regular expression herein.
In addition, also may include Chinese character and other conventional signs, such as " _ ", "-", " ", "@" etc. in user name.Cause
This, can also in user name Chinese character and symbol verify, in specific implementation, can use character
ASCII character value verifies Chinese character.When user create rule in provide user name in must include conventional sign " _ " when, into
When row user name verifies, when in user name including " _ ", then verification passes through, otherwise verification failure.
In addition, when it further includes tenant's name and User ID that user, which creates in information, it is also desirable to tenant's name and user
The length and composition of ID is verified, and is specifically as follows, and whether verification tenant name length and User ID length are default in third
In threshold range;Third predetermined threshold value range is less than first threshold range, and is greater than the second preset threshold range;Pass through canonical table
Up to number and letter in number and letter in formula verification tenant's name and verification User ID.For example, tenant's name rule: length 1-64
A character allows to input capital and small letter English alphabet, number or " _ ";User ID rule: length is 1-64 character, allows to input
Capital and small letter English alphabet, number, " ", "-", " _ ".Then verified according to tenant name of tenant's name rule to user's input;Root
It is verified according to the User ID that User ID rule inputs user.
As can be seen from the above description, it creates information by the user for inputting user to verify, to guarantee that user creates
Information meets preset rule, has carried out certain constraint to the creation of user, avoids illegally creating to storage resource
Occupancy and the leakage to data improve the safety of the reasonability and data of storage resource distribution.
Referring to Fig. 7, which is a kind of user's creating device based on object storage provided by the embodiments of the present application, the device
May include:
Acquiring unit 701 obtains user and creates information for the input operation in response to user;The user creates letter
Breath includes user name and key;
Verification unit 702, for verifying whether the user name and the key meet user and create rule;
Creating unit 703, for creating information according to the user when verification unit output result is to meet,
Create user;
Return unit 704, for returning to creation error message when verification unit output result is not meet, with
User is prompted to create failure.
In one possible implementation, the user is inputted by order line and creates information;Or
The user, which is inputted, by administration interface creates information;The administration interface includes the user name and the key
Input item.
In one possible implementation, the verification unit, comprising:
First verification subelement, for verifying the user name length whether in the first preset threshold range;
Second verification subelement, for verifying the key length whether in the second preset threshold range;Described first
Preset threshold range is greater than second preset range;
Third verifies subelement, for verifying whether number and/or letter in the user name meet preset rules and school
Test whether number and/or letter in the key meet preset rules.
In one possible implementation, the verification unit, further includes:
4th verification subelement, for verifying Chinese character in the user name by the ASCII character of character;
5th verification subelement, for verifying whether the user name includes predetermined symbol;Under the predetermined symbol includes:
Scribing line, middle scribing line, fullstop are one or more.
In one possible implementation, when the user name include number and letter, and/or, the key includes
When number and letter, the verification unit, specifically for by regular expression verify in the user name number and it is alphabetical with
And number and letter in the verification key.
In one possible implementation, the user creates information further include: tenant's name and User ID;The verification
Unit is also used to verify tenant's name length and the User ID length whether within the scope of third predetermined threshold value;Described
Three preset threshold ranges are less than the first threshold range, and are greater than second preset threshold range;
Number and letter in tenant's name are verified by regular expression and verify number and word in the User ID
It is female.
It should be noted that the specific implementation of each unit may refer to above method embodiment, this implementation in the present embodiment
Details are not described herein for example.
As can be seen from the above description, the embodiment of the present application, can when user needs to create user in object storage system
Information is created to input user by client, server judges that acquired user creates in information according to the input of user
Whether user name and key, which meet user, creates rule, if met, new user is created in object storage system, so that
The user can carry out data storage and modification in object storage system;If do not met, creation error message is returned, is mentioned
Show that user creates failure, it is seen then that by scheme provided by the embodiments of the present application, user needs in the case where creating successful situation,
The storage resource of object storage system can be used, so that illegal user be avoided to illegally occupy storage resource, moreover, creation at
The user of function can just modify to the data in object storage, ensure that Information Security.
It should be noted that each embodiment in this specification is described in a progressive manner, each embodiment emphasis is said
Bright is the difference from other embodiments, and the same or similar parts in each embodiment may refer to each other.For reality
For applying system or device disclosed in example, since it is corresponded to the methods disclosed in the examples, so being described relatively simple, phase
Place is closed referring to method part illustration.
It should be appreciated that in this application, " at least one (item) " refers to one or more, and " multiple " refer to two or two
More than a."and/or" indicates may exist three kinds of relationships, for example, " A and/or B " for describing the incidence relation of affiliated partner
It can indicate: only exist A, only exist B and exist simultaneously tri- kinds of situations of A and B, wherein A, B can be odd number or plural number.Word
Symbol "/" typicallys represent the relationship that forward-backward correlation object is a kind of "or"." at least one of following (a) " or its similar expression, refers to
Any combination in these, any combination including individual event (a) or complex item (a).At least one of for example, in a, b or c
(a) can indicate: a, b, c, " a and b ", " a and c ", " b and c ", or " a and b and c ", and wherein a, b, c can be individually, can also
To be multiple.
It should also be noted that, herein, relational terms such as first and second and the like are used merely to one
Entity or operation are distinguished with another entity or operation, without necessarily requiring or implying between these entities or operation
There are any actual relationship or orders.Moreover, the terms "include", "comprise" or its any other variant are intended to contain
Lid non-exclusive inclusion, so that the process, method, article or equipment including a series of elements is not only wanted including those
Element, but also including other elements that are not explicitly listed, or further include for this process, method, article or equipment
Intrinsic element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that
There is also other identical elements in process, method, article or equipment including the element.
The step of method described in conjunction with the examples disclosed in this document or algorithm, can directly be held with hardware, processor
The combination of capable software module or the two is implemented.Software module can be placed in random access memory (RAM), memory, read-only deposit
Reservoir (ROM), electrically programmable ROM, electrically erasable ROM, register, hard disk, moveable magnetic disc, CD-ROM or technology
In any other form of storage medium well known in field.
The foregoing description of the disclosed embodiments makes professional and technical personnel in the field can be realized or use the application.
Various modifications to these embodiments will be readily apparent to those skilled in the art, as defined herein
General Principle can be realized in other embodiments without departing from the spirit or scope of the application.Therefore, the application
It is not intended to be limited to the embodiments shown herein, and is to fit to and the principles and novel features disclosed herein phase one
The widest scope of cause.
Claims (10)
1. a kind of user's creation method based on object storage, which is characterized in that the described method includes:
In response to the input operation of user, obtains user and create information;The user creates information and includes at least user name and close
Key;
It verifies the user name and whether the key meets user and create rule;
If met, information is created according to the user, creates user;
If do not met, creation error message is returned to, to prompt user to create failure.
2. the method according to claim 1, wherein inputting the user by order line creates information;Or
The user, which is inputted, by administration interface creates information;The administration interface includes the user name and key input
?.
3. the method according to claim 1, wherein whether the verification user name and the key meet
User creates rule, comprising:
The user name length is verified whether in the first preset threshold range;
The key length is verified whether in the second preset threshold range;First preset threshold range is greater than described second
Preset range;
Verify whether number and/or letter in the user name meet number and/or word in preset rules, and the verification key
Whether mother meets preset rules.
4. according to the method described in claim 3, it is characterized in that, when the user name include number and letter, and/or, institute
When to state key include number and letter, whether number and/or letter meet preset rules and school in the verification user name
Test whether number and/or letter in the key meet preset rules, comprising:
Number and letter in the user name are verified by regular expression and verify number and letter in the key.
5. according to the method described in claim 3, it is characterized in that, whether the verification user name meets user and creates rule
Then, further includes:
The Chinese character in the user name is verified by the ASCII character of character;
Verify whether the user name includes predetermined symbol;The predetermined symbol includes: underscore, middle scribing line, one in fullstop
Kind is a variety of.
6. method described in -5 any one according to claim 1, which is characterized in that the user creates information further include: rent
Name in an account book and User ID;The method also includes:
Tenant's name length and the User ID length are verified whether within the scope of third predetermined threshold value;The third presets threshold
It is worth range and is less than the first threshold range, and is greater than second preset threshold range;
Number and letter in tenant's name are verified by regular expression and verify number and letter in the User ID.
7. a kind of user's creating device based on object storage, which is characterized in that described device includes:
Acquiring unit obtains user and creates information for the input operation in response to user;It includes using that the user, which creates information,
Name in an account book and key;
Verification unit, for verifying whether the user name and the key meet user and create rule;
Creating unit, for creating information according to the user, creation is used when verification unit output result is to meet
Family;
Return unit, for creation error message being returned to, to prompt user when verification unit output result is not meet
Creation failure.
8. device according to claim 7, which is characterized in that input the user by order line and create information;Or
The user, which is inputted, by administration interface creates information;The administration interface includes the user name and key input
?.
9. device according to claim 7, which is characterized in that the verification unit, comprising:
First verification subelement, for verifying the user name length whether in the first preset threshold range;
Second verification subelement, for verifying the key length whether in the second preset threshold range;Described first is default
Threshold range is greater than second preset range;
Third verifies subelement, for verifying whether number and/or letter in the user name meet preset rules, and verification institute
State whether number and/or letter in key meet preset rules.
10. device according to claim 9, which is characterized in that the verification unit, further includes:
4th verification subelement, for verifying Chinese character in the user name by the ASCII character of character;
5th verification subelement, for verifying whether the user name includes predetermined symbol;The predetermined symbol includes: lower stroke
Line, middle scribing line, fullstop are one or more.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811376473.6A CN109361689A (en) | 2018-11-19 | 2018-11-19 | A kind of user's creation method and device based on object storage |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811376473.6A CN109361689A (en) | 2018-11-19 | 2018-11-19 | A kind of user's creation method and device based on object storage |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109361689A true CN109361689A (en) | 2019-02-19 |
Family
ID=65332269
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811376473.6A Pending CN109361689A (en) | 2018-11-19 | 2018-11-19 | A kind of user's creation method and device based on object storage |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109361689A (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101594240A (en) * | 2009-07-10 | 2009-12-02 | 无锡维谷软件有限公司 | A kind of based on network software login method and system thereof |
CN102324004A (en) * | 2011-05-26 | 2012-01-18 | 重庆猪八戒网络有限公司 | Verification method for webpage form input information and device |
CN102377691A (en) * | 2011-11-16 | 2012-03-14 | 毛诗超 | New user registration method and system for Internet instant messaging service/SNS (Social Network Service) |
CN102647638A (en) * | 2012-03-29 | 2012-08-22 | 青岛海信传媒网络技术有限公司 | Intelligent television function interface management method and management system |
CN105897730A (en) * | 2016-05-12 | 2016-08-24 | 广西尊达电子商务有限公司 | User name and password information encryption and verification method |
CN106027615A (en) * | 2016-05-10 | 2016-10-12 | 乐视控股(北京)有限公司 | Object storage method and system |
-
2018
- 2018-11-19 CN CN201811376473.6A patent/CN109361689A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101594240A (en) * | 2009-07-10 | 2009-12-02 | 无锡维谷软件有限公司 | A kind of based on network software login method and system thereof |
CN102324004A (en) * | 2011-05-26 | 2012-01-18 | 重庆猪八戒网络有限公司 | Verification method for webpage form input information and device |
CN102377691A (en) * | 2011-11-16 | 2012-03-14 | 毛诗超 | New user registration method and system for Internet instant messaging service/SNS (Social Network Service) |
CN102647638A (en) * | 2012-03-29 | 2012-08-22 | 青岛海信传媒网络技术有限公司 | Intelligent television function interface management method and management system |
CN106027615A (en) * | 2016-05-10 | 2016-10-12 | 乐视控股(北京)有限公司 | Object storage method and system |
CN105897730A (en) * | 2016-05-12 | 2016-08-24 | 广西尊达电子商务有限公司 | User name and password information encryption and verification method |
Non-Patent Citations (3)
Title |
---|
佚名: "一个匹配8-16位数字和字母的正则表达式", 《HTTPS://BLOG.CSDN.NET/YULESLIE/ARTICLE/DETAILS/38357765》 * |
佚名: "华为云对象存储服务从入门到进阶(一)", 《HTTPS://BBS.HUAWEICLOUD.COM/BLOGS/103105》 * |
佚名: "阿里云对象存储 OSS,不使用主账号,使用子账号来访问存储内容", 《HTTPS://WWW.CNBLOGS.COM/KENSHINOBIY/P/7743386.HTML》 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110088749B (en) | Method, system and medium for automatic ontology generation | |
US10615966B2 (en) | Selective content security using visual hashing | |
CN104618488B (en) | A kind of information processing method, client and server | |
US20140351955A1 (en) | Generation of a visually obfuscated representation of an alphanumeric message that indicates availability of a proposed identifier | |
US20200175141A1 (en) | Authentication using cognitive analysis | |
US10169570B2 (en) | Cognitive password pattern checker to enforce stronger, unrepeatable passwords | |
US10878514B2 (en) | Expense validator | |
CN104283682A (en) | Method, device and system conducting verification through verification codes | |
US20160006562A1 (en) | Secure password generation | |
US20200034568A1 (en) | Securely transferring data over a computer network | |
CN110519155B (en) | Information processing method and system | |
US20170357906A1 (en) | Processing un-typed triple store data | |
CN109361689A (en) | A kind of user's creation method and device based on object storage | |
US20200311192A1 (en) | Automated electronic form generation with context cues | |
US11550896B2 (en) | Password strength | |
Damkjær et al. | “I Didn’t Know, You Could Do That”-Affordance Signifiers for Touch Gestures on Mobile Devices | |
CN106575341A (en) | Composite document access | |
US11664998B2 (en) | Intelligent hashing of sensitive information | |
US10885163B2 (en) | Authentication without inputting passwords | |
US20170331776A1 (en) | Decomposed layouts for attention management | |
US20170357690A1 (en) | Processing un-typed triple store data | |
US20160292685A1 (en) | Authenticating a user with a passcode using a passcode entry table | |
CN113327002A (en) | Method and device for constructing data asset management model | |
US10540379B2 (en) | Searching base encoded text | |
US20200034441A1 (en) | Cognitive experience assessment with visual indicator |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190219 |