CN109361689A - A kind of user's creation method and device based on object storage - Google Patents

A kind of user's creation method and device based on object storage Download PDF

Info

Publication number
CN109361689A
CN109361689A CN201811376473.6A CN201811376473A CN109361689A CN 109361689 A CN109361689 A CN 109361689A CN 201811376473 A CN201811376473 A CN 201811376473A CN 109361689 A CN109361689 A CN 109361689A
Authority
CN
China
Prior art keywords
user
key
name
verification
letter
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811376473.6A
Other languages
Chinese (zh)
Inventor
马顺
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhengzhou Yunhai Information Technology Co Ltd
Original Assignee
Zhengzhou Yunhai Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhengzhou Yunhai Information Technology Co Ltd filed Critical Zhengzhou Yunhai Information Technology Co Ltd
Priority to CN201811376473.6A priority Critical patent/CN109361689A/en
Publication of CN109361689A publication Critical patent/CN109361689A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The embodiment of the present application discloses a kind of user's creation method and device based on object storage, when user needs to create user in object storage system, user can be inputted by client create information, server is according to the input of user, the acquired user of judgement creates whether user name and key in information meet user's creation rule, if met, new user is created in object storage system, so that the user can carry out data storage and modification in object storage system;If do not met, then return to creation error message, user is prompted to create failure, it is seen then that pass through scheme provided by the embodiments of the present application, user needs in the case where creating successful situation, the storage resource of object storage system just can be used, so that illegal user is avoided to illegally occupy storage resource, and, creating successful user can just modify to the data in object storage, ensure that Information Security.

Description

A kind of user's creation method and device based on object storage
Technical field
This application involves Internet technical fields, and in particular to a kind of user's creation method and dress based on object storage It sets.
Background technique
With the fast development of big data and cloud computing, storing data also increases with exponential form.And object storage clothes Business as it is a kind of can network-oriented storage service, support mass users concurrently to access, and externally provide high extend (Scalability), the high persistently distributed mass data of (Durability) and High Availabitity (Availability) stores clothes Business, the increasingly favor by numerous Internet users.
However, user is occupying for storage resource in object storage, some users are to occupy or intercept in storage resource Data, illegally created, be easy to cause the leakage of resource in object storage system and distribution insufficient in this way, influence Service Quality Amount.Therefore, how to improve the safety of data and the reasonability of resource allocation is a technical problem to be solved urgently.
Summary of the invention
In view of this, the embodiment of the present application provides a kind of user's creation method and device based on object storage, to improve The reasonability of the safety of data and resource allocation in object storage system.
To solve the above problems, technical solution provided by the embodiments of the present application is as follows:
A kind of user's creation method based on object storage provided by the embodiments of the present application, which comprises
In response to the input operation of user, obtains user and create information;The user creates information and includes at least user name And key;
It verifies the user name and whether the key meets user and create rule;
If met, information is created according to the user, creates user;
If do not met, creation error message is returned to, to prompt user to create failure.
In one possible implementation, the user is inputted by order line and creates information;Or
The user, which is inputted, by administration interface creates information;The administration interface includes the user name and the key Input item.
In one possible implementation, whether the verification user name and the key meet user's creation rule Then, comprising:
The user name length is verified whether in the first preset threshold range;
The key length is verified whether in the second preset threshold range;First preset threshold range is greater than described Second preset range;
Verify in the user name number and/or letter whether meet in preset rules, and the verification key number and/ Or whether letter meets preset rules.
In one possible implementation, when the user name include number and letter, and/or, the key includes When number and letter, whether number and/or letter meet preset rules, and the verification key in the verification user name Whether middle number and/or letter meet preset rules, comprising:
Number and letter in the user name are verified by regular expression and verify number and letter in the key.
In one possible implementation, whether the verification user name meets user's creation rule, further includes:
The Chinese character in the user name is verified by the ASCII character of character;
Verify whether the user name includes predetermined symbol;The predetermined symbol includes: underscore, middle scribing line, in fullstop It is one or more.
In one possible implementation, the user creates information further include: tenant's name and User ID;The method Further include:
Tenant's name length and the User ID length are verified whether within the scope of third predetermined threshold value;The third is pre- If threshold range is less than the first threshold range, and is greater than second preset threshold range;
Number and letter in tenant's name are verified by regular expression and verify number and word in the User ID It is female.
The application second aspect provides a kind of user's creating device based on object storage, which is characterized in that the dress It sets and includes:
Acquiring unit obtains user and creates information for the input operation in response to user;The user creates packet Include user name and key;
Verification unit, for verifying whether the user name and the key meet user and create rule;
Creating unit, for creating information, creation according to the user when verification unit output result is to meet User;
Return unit, for creation error message being returned to, with prompt when verification unit output result is not meet User creates failure.
In one possible implementation, the user is inputted by order line and creates information;Or
The user, which is inputted, by administration interface creates information;The administration interface includes the user name and the key Input item.
In one possible implementation, the verification unit, comprising:
First verification subelement, for verifying the user name length whether in the first preset threshold range;
Second verification subelement, for verifying the key length whether in the second preset threshold range;Described first Preset threshold range is greater than second preset range;
Third verifies subelement, for verifying whether number and/or letter in the user name meet preset rules and school Test whether number and/or letter in the key meet preset rules.
In one possible implementation, the verification unit, further includes:
4th verification subelement, for verifying Chinese character in the user name by the ASCII character of character;
5th verification subelement, for verifying whether the user name includes predetermined symbol;Under the predetermined symbol includes: Scribing line, middle scribing line, fullstop are one or more.
In one possible implementation, when the user name include number and letter, and/or, the key includes When number and letter, the verification unit, specifically for by regular expression verify in the user name number and it is alphabetical with And number and letter in the verification key.
In one possible implementation, the user creates information further include: tenant's name and User ID;The verification Unit is also used to verify tenant's name length and the User ID length whether within the scope of third predetermined threshold value;Described Three preset threshold ranges are less than the first threshold range, and are greater than second preset threshold range;
Number and letter in tenant's name are verified by regular expression and verify number and word in the User ID It is female.
It can be seen that the embodiment of the present application has the following beneficial effects:
The embodiment of the present application can be inputted by client and be used when user needs to create user in object storage system Family creates information, and server judges that acquired user creates whether user name and key in information accord with according to the input of user Family creation rule is shared, if met, new user is created in object storage system, so that the user can deposit in object Data storage and modification are carried out in storage system;If do not met, creation error message is returned, user is prompted to create failure, it can See, by scheme provided by the embodiments of the present application, user needs in the case where creating successful situation, and object storage system just can be used The storage resource of system, to avoid illegal user from illegally occupying storage resource, moreover, creating successful user just can be to right As storage in data modify, ensure that Information Security.
Detailed description of the invention
Fig. 1 is the block schematic illustration of exemplary application scene provided by the embodiments of the present application;
Fig. 2 is a kind of flow chart of user's creation method based on object storage provided by the embodiments of the present application;
Fig. 3 is provided by the embodiments of the present application by order line input user's creation Examples of information figure;
Fig. 4 is provided by the embodiments of the present application by administration interface input user's creation Examples of information figure;
Fig. 5 is creation miscue exemplary diagram provided by the embodiments of the present application;
Fig. 6 is the flow chart that a kind of verification user provided by the embodiments of the present application creates information approach;
Fig. 7 is a kind of user's creating device structure chart based on object storage provided by the embodiments of the present application.
Specific embodiment
In order to make the above objects, features, and advantages of the present application more apparent, with reference to the accompanying drawing and it is specific real Mode is applied to be described in further detail the embodiment of the present application.
Inventor has found in traditional object storage user's creation research, due to storing money when user in object storage The occupant in source verifies if not creating information to user when carrying out user's creation, user is be easy to cause illegally to create Build, so cause object storage resource illegally occupied and object storage system in data be leaked, influence user data Safety.
Based on this, the embodiment of the present application provides a kind of user's creation method and device based on object storage, works as user When needing to create new user in object storage system, information is created according to the user of input and user creates rule, judgement User creates whether information meets user's creation rule, when these segmentation symbols match, progress user's creation, so that object storage system can be The user distributes storage resource, while user being allowed to modify the data of storage;When not meeting, creation mistake letter is returned Breath prompts user to create failure, which occupies storage resource and modification storing data, and then guarantees storage resource It is not illegally occupied and the safety of data.
Referring to Fig. 1, which is the block schematic illustration of exemplary application scene provided by the embodiments of the present application.Wherein, this Shen Please embodiment provide user's creation method can be applied in server 20.
When practical application, user can input user by client 10 and create information, in response to the transmission of user's triggering Operation, server 20 receives user and creates information, and creates rule according to preconfigured user and judge that user creates information and is It is no to meet, subsequent operation is then carried out according to judging result.
It will be understood by those skilled in the art that block schematic illustration shown in FIG. 1 is only that presently filed embodiment can be An example being wherein achieved.The scope of application of the application embodiment is not limited by any aspect of the frame.
It should be noted that wherein, client 10 can be carried on terminal, terminal can be it is existing, researching and developing Or in the future research and development, can by it is any type of wiredly and/or wirelessly connection (for example, Wi-Fi, LAN, honeycomb, coaxial cable Deng) any user equipment for interacting, including but not limited to: existing, researching and developing or research and development in the future smartwatch, Smart phone, non-smart mobile phone, tablet computer, laptop PC, desktop personal computer, minicomputer, in Type computer, mainframe computer etc..It is also to be noted that server can be existing, researching and developing or research and develop in the future , an example of the equipment of application service that can provide a user information recommendation.Presently filed embodiment is in this regard It is unrestricted.
Technical solution provided by the present application for ease of understanding is illustrated the technical solution below in conjunction with attached drawing.
Referring to fig. 2, which is a kind of process of user's creation method based on object storage provided by the embodiments of the present application Figure, as shown in Fig. 2, this method may include:
S201: the input in response to user operates, and obtains user and creates information.
In the present embodiment, when user needs progress user's creation first when object storage system obtains storage resource.With Family can input user by client and create information, and by triggering corresponding operating, the user of input created information and is sent To server.
Wherein, it may include user name and key that user, which creates information,.In addition, when user wants to create by enterprise network, Also need to input tenant's name that server is distributed for the enterprise and user User ID corresponding in enterprise, therefore It can also include tenant's name and User ID that user, which creates information,.In addition, key may include public key and private key.
In practical applications, user can carry out user's creation by two ways, and input user creates information.It is a kind of It is that user can input user name and key by way of inputting order line in linux system, such as shown in Fig. 3, Yong Huke To pass through user name and key needed for creation order input user's creation.It can also be used with being inputted in user's creative management interface Name in an account book and key, such as shown in Fig. 4, user can input corresponding user information in the administration interface.In specific implementation, it manages Managing in interface may include user name input item and key input item, and user inputs relevant information in corresponding input item, lead to It crosses triggering and determines operation, send user to server and create information.
S202: whether verification user name and key meet user and create rule, if met, execute S203;Otherwise it executes S204。
In the present embodiment, after server, which receives user, creates information, verification user creates user name and close in information Whether key, which meets user, creates rule.
Wherein, it is the pre-set rule that must satisfy when creating user that user, which creates rule,.For example, user name is long It spends and whether meets preset threshold, whether user name is made of numeral and letter etc..Wherein, about verification user name and key Specific implementation will be illustrated in subsequent embodiment,
In practical application, after the completion of server is to user name and key verification, difference can be executed according to check results Operation executes S203 when passed the verification;When verification does not pass through, S204 is executed.
S203: information is created according to user, creates user.
In the present embodiment, when server verification creates information by the user that user is inputted, then new user's wound is carried out It builds, server is that the user distributes storage resource.User can use user name and key logs in, in the storage of distribution Data storage is carried out in resource, while can also be modified to data.
S204: returning to creation error message, to prompt user to create failure.
When verification does not pass through, server sends creation error message to client, to prompt user to create failure, from And it can create to avoid illegal user to the occupancy of storage resource and storing data is distorted.
In specific implementation, when user is created by way of order line, client can be directly wrong by creation False information is shown;When user is created by way of administration interface, client can not will meet user's creation The content of rule is shown by way of marking red font, such as shown in Fig. 5.
Through the foregoing embodiment it is found that when user needs to create new user in object storage system, according to input User creates information and user creates rule, judges that user creates whether information meets user's creation rule, when these segmentation symbols match, into Row user creation so that object storage system can distribute storage resource for the user, while allowing user to the data of storage It modifies;When not meeting, creation error message is returned, user is prompted to create failure, which occupies storage money Source and modification storing data, and then guarantee storage resource is not illegally occupied and the safety of data.
Whether every content in information, which meets user's creation rule, is created to server verification user below in conjunction with attached drawing It is illustrated.
Referring to Fig. 6, which is that a kind of verification user provided by the embodiments of the present application creates information approach flow chart, such as Fig. 6 It is shown, which comprises
S601: whether verification user name length is in the first preset threshold range.
S602: whether check key length is in the second preset threshold range.
In the present embodiment, when server, which gets user, creates information, whether user name length and key length are verified Meet preset threshold range, wherein the first preset threshold range is greater than the second preset range.
In practical applications, user name and the corresponding preset threshold range of key can be configured in advance.Example Such as, corresponding first preset threshold range of user name is 1-128 character, i.e. user name minimum length is 1, and maximum length is 128;The corresponding second threshold range of key is 6-40 character, i.e., key minimum length is 6, to guarantee the safety of key, Maximum length is 40.The acquired user name length of server verification whether is located at 1-128 and whether key length is located at 6- 40.If the two is respectively positioned in preset threshold range, verification passes through;If there is one in preset threshold range, then school It tests and does not pass through.
S603: in verification user name number and/or letter whether meet in preset rules and check key number and/or Whether letter meets preset rules.
In the present embodiment, server verifies the user name of acquisition and the composition of key, judges in user name Whether number and/or letter meet preset rules in number and/or letter and key.
Wherein, preset rules can be preset according to actual needs, for example, preset rules are that user name need to include English alphabet and/or 0-9 Arabic numerals then verify whether user name that user is inputted includes English alphabet and/or number, If in user name further include other symbols not in preset rules, such as?, % etc., then verify failure.
It should be noted that when in user name or key only including English alphabet or a kind of number, it can be determined that user Whether name or the English alphabet in key or number are in preset rules;If in user name or key not only include English alphabet but also Including number, then number and letter in user name or key can be verified by regular expression.
It is understood that can use different regular expressions to two since user name is different with the length of key Person verifies.For example, verifying user name using regular expression " X+X+Y ", wherein X indicates letter, and Y indicates number, also It is to say, when user name includes two letters and a number, then verification passes through, and otherwise verifies and does not pass through;Utilize regular expressions Formula " X+X+X+X+Y+Y " check key, that is to say, that when key includes four letters and two numbers, then verification passes through, no It then verifies and does not pass through.
It should be noted that the specific manifestation form about regular expression can be configured according to actual needs, this Embodiment is not defined regular expression herein.
In addition, also may include Chinese character and other conventional signs, such as " _ ", "-", " ", "@" etc. in user name.Cause This, can also in user name Chinese character and symbol verify, in specific implementation, can use character ASCII character value verifies Chinese character.When user create rule in provide user name in must include conventional sign " _ " when, into When row user name verifies, when in user name including " _ ", then verification passes through, otherwise verification failure.
In addition, when it further includes tenant's name and User ID that user, which creates in information, it is also desirable to tenant's name and user The length and composition of ID is verified, and is specifically as follows, and whether verification tenant name length and User ID length are default in third In threshold range;Third predetermined threshold value range is less than first threshold range, and is greater than the second preset threshold range;Pass through canonical table Up to number and letter in number and letter in formula verification tenant's name and verification User ID.For example, tenant's name rule: length 1-64 A character allows to input capital and small letter English alphabet, number or " _ ";User ID rule: length is 1-64 character, allows to input Capital and small letter English alphabet, number, " ", "-", " _ ".Then verified according to tenant name of tenant's name rule to user's input;Root It is verified according to the User ID that User ID rule inputs user.
As can be seen from the above description, it creates information by the user for inputting user to verify, to guarantee that user creates Information meets preset rule, has carried out certain constraint to the creation of user, avoids illegally creating to storage resource Occupancy and the leakage to data improve the safety of the reasonability and data of storage resource distribution.
Referring to Fig. 7, which is a kind of user's creating device based on object storage provided by the embodiments of the present application, the device May include:
Acquiring unit 701 obtains user and creates information for the input operation in response to user;The user creates letter Breath includes user name and key;
Verification unit 702, for verifying whether the user name and the key meet user and create rule;
Creating unit 703, for creating information according to the user when verification unit output result is to meet, Create user;
Return unit 704, for returning to creation error message when verification unit output result is not meet, with User is prompted to create failure.
In one possible implementation, the user is inputted by order line and creates information;Or
The user, which is inputted, by administration interface creates information;The administration interface includes the user name and the key Input item.
In one possible implementation, the verification unit, comprising:
First verification subelement, for verifying the user name length whether in the first preset threshold range;
Second verification subelement, for verifying the key length whether in the second preset threshold range;Described first Preset threshold range is greater than second preset range;
Third verifies subelement, for verifying whether number and/or letter in the user name meet preset rules and school Test whether number and/or letter in the key meet preset rules.
In one possible implementation, the verification unit, further includes:
4th verification subelement, for verifying Chinese character in the user name by the ASCII character of character;
5th verification subelement, for verifying whether the user name includes predetermined symbol;Under the predetermined symbol includes: Scribing line, middle scribing line, fullstop are one or more.
In one possible implementation, when the user name include number and letter, and/or, the key includes When number and letter, the verification unit, specifically for by regular expression verify in the user name number and it is alphabetical with And number and letter in the verification key.
In one possible implementation, the user creates information further include: tenant's name and User ID;The verification Unit is also used to verify tenant's name length and the User ID length whether within the scope of third predetermined threshold value;Described Three preset threshold ranges are less than the first threshold range, and are greater than second preset threshold range;
Number and letter in tenant's name are verified by regular expression and verify number and word in the User ID It is female.
It should be noted that the specific implementation of each unit may refer to above method embodiment, this implementation in the present embodiment Details are not described herein for example.
As can be seen from the above description, the embodiment of the present application, can when user needs to create user in object storage system Information is created to input user by client, server judges that acquired user creates in information according to the input of user Whether user name and key, which meet user, creates rule, if met, new user is created in object storage system, so that The user can carry out data storage and modification in object storage system;If do not met, creation error message is returned, is mentioned Show that user creates failure, it is seen then that by scheme provided by the embodiments of the present application, user needs in the case where creating successful situation, The storage resource of object storage system can be used, so that illegal user be avoided to illegally occupy storage resource, moreover, creation at The user of function can just modify to the data in object storage, ensure that Information Security.
It should be noted that each embodiment in this specification is described in a progressive manner, each embodiment emphasis is said Bright is the difference from other embodiments, and the same or similar parts in each embodiment may refer to each other.For reality For applying system or device disclosed in example, since it is corresponded to the methods disclosed in the examples, so being described relatively simple, phase Place is closed referring to method part illustration.
It should be appreciated that in this application, " at least one (item) " refers to one or more, and " multiple " refer to two or two More than a."and/or" indicates may exist three kinds of relationships, for example, " A and/or B " for describing the incidence relation of affiliated partner It can indicate: only exist A, only exist B and exist simultaneously tri- kinds of situations of A and B, wherein A, B can be odd number or plural number.Word Symbol "/" typicallys represent the relationship that forward-backward correlation object is a kind of "or"." at least one of following (a) " or its similar expression, refers to Any combination in these, any combination including individual event (a) or complex item (a).At least one of for example, in a, b or c (a) can indicate: a, b, c, " a and b ", " a and c ", " b and c ", or " a and b and c ", and wherein a, b, c can be individually, can also To be multiple.
It should also be noted that, herein, relational terms such as first and second and the like are used merely to one Entity or operation are distinguished with another entity or operation, without necessarily requiring or implying between these entities or operation There are any actual relationship or orders.Moreover, the terms "include", "comprise" or its any other variant are intended to contain Lid non-exclusive inclusion, so that the process, method, article or equipment including a series of elements is not only wanted including those Element, but also including other elements that are not explicitly listed, or further include for this process, method, article or equipment Intrinsic element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that There is also other identical elements in process, method, article or equipment including the element.
The step of method described in conjunction with the examples disclosed in this document or algorithm, can directly be held with hardware, processor The combination of capable software module or the two is implemented.Software module can be placed in random access memory (RAM), memory, read-only deposit Reservoir (ROM), electrically programmable ROM, electrically erasable ROM, register, hard disk, moveable magnetic disc, CD-ROM or technology In any other form of storage medium well known in field.
The foregoing description of the disclosed embodiments makes professional and technical personnel in the field can be realized or use the application. Various modifications to these embodiments will be readily apparent to those skilled in the art, as defined herein General Principle can be realized in other embodiments without departing from the spirit or scope of the application.Therefore, the application It is not intended to be limited to the embodiments shown herein, and is to fit to and the principles and novel features disclosed herein phase one The widest scope of cause.

Claims (10)

1. a kind of user's creation method based on object storage, which is characterized in that the described method includes:
In response to the input operation of user, obtains user and create information;The user creates information and includes at least user name and close Key;
It verifies the user name and whether the key meets user and create rule;
If met, information is created according to the user, creates user;
If do not met, creation error message is returned to, to prompt user to create failure.
2. the method according to claim 1, wherein inputting the user by order line creates information;Or
The user, which is inputted, by administration interface creates information;The administration interface includes the user name and key input ?.
3. the method according to claim 1, wherein whether the verification user name and the key meet User creates rule, comprising:
The user name length is verified whether in the first preset threshold range;
The key length is verified whether in the second preset threshold range;First preset threshold range is greater than described second Preset range;
Verify whether number and/or letter in the user name meet number and/or word in preset rules, and the verification key Whether mother meets preset rules.
4. according to the method described in claim 3, it is characterized in that, when the user name include number and letter, and/or, institute When to state key include number and letter, whether number and/or letter meet preset rules and school in the verification user name Test whether number and/or letter in the key meet preset rules, comprising:
Number and letter in the user name are verified by regular expression and verify number and letter in the key.
5. according to the method described in claim 3, it is characterized in that, whether the verification user name meets user and creates rule Then, further includes:
The Chinese character in the user name is verified by the ASCII character of character;
Verify whether the user name includes predetermined symbol;The predetermined symbol includes: underscore, middle scribing line, one in fullstop Kind is a variety of.
6. method described in -5 any one according to claim 1, which is characterized in that the user creates information further include: rent Name in an account book and User ID;The method also includes:
Tenant's name length and the User ID length are verified whether within the scope of third predetermined threshold value;The third presets threshold It is worth range and is less than the first threshold range, and is greater than second preset threshold range;
Number and letter in tenant's name are verified by regular expression and verify number and letter in the User ID.
7. a kind of user's creating device based on object storage, which is characterized in that described device includes:
Acquiring unit obtains user and creates information for the input operation in response to user;It includes using that the user, which creates information, Name in an account book and key;
Verification unit, for verifying whether the user name and the key meet user and create rule;
Creating unit, for creating information according to the user, creation is used when verification unit output result is to meet Family;
Return unit, for creation error message being returned to, to prompt user when verification unit output result is not meet Creation failure.
8. device according to claim 7, which is characterized in that input the user by order line and create information;Or
The user, which is inputted, by administration interface creates information;The administration interface includes the user name and key input ?.
9. device according to claim 7, which is characterized in that the verification unit, comprising:
First verification subelement, for verifying the user name length whether in the first preset threshold range;
Second verification subelement, for verifying the key length whether in the second preset threshold range;Described first is default Threshold range is greater than second preset range;
Third verifies subelement, for verifying whether number and/or letter in the user name meet preset rules, and verification institute State whether number and/or letter in key meet preset rules.
10. device according to claim 9, which is characterized in that the verification unit, further includes:
4th verification subelement, for verifying Chinese character in the user name by the ASCII character of character;
5th verification subelement, for verifying whether the user name includes predetermined symbol;The predetermined symbol includes: lower stroke Line, middle scribing line, fullstop are one or more.
CN201811376473.6A 2018-11-19 2018-11-19 A kind of user's creation method and device based on object storage Pending CN109361689A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811376473.6A CN109361689A (en) 2018-11-19 2018-11-19 A kind of user's creation method and device based on object storage

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811376473.6A CN109361689A (en) 2018-11-19 2018-11-19 A kind of user's creation method and device based on object storage

Publications (1)

Publication Number Publication Date
CN109361689A true CN109361689A (en) 2019-02-19

Family

ID=65332269

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811376473.6A Pending CN109361689A (en) 2018-11-19 2018-11-19 A kind of user's creation method and device based on object storage

Country Status (1)

Country Link
CN (1) CN109361689A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101594240A (en) * 2009-07-10 2009-12-02 无锡维谷软件有限公司 A kind of based on network software login method and system thereof
CN102324004A (en) * 2011-05-26 2012-01-18 重庆猪八戒网络有限公司 Verification method for webpage form input information and device
CN102377691A (en) * 2011-11-16 2012-03-14 毛诗超 New user registration method and system for Internet instant messaging service/SNS (Social Network Service)
CN102647638A (en) * 2012-03-29 2012-08-22 青岛海信传媒网络技术有限公司 Intelligent television function interface management method and management system
CN105897730A (en) * 2016-05-12 2016-08-24 广西尊达电子商务有限公司 User name and password information encryption and verification method
CN106027615A (en) * 2016-05-10 2016-10-12 乐视控股(北京)有限公司 Object storage method and system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101594240A (en) * 2009-07-10 2009-12-02 无锡维谷软件有限公司 A kind of based on network software login method and system thereof
CN102324004A (en) * 2011-05-26 2012-01-18 重庆猪八戒网络有限公司 Verification method for webpage form input information and device
CN102377691A (en) * 2011-11-16 2012-03-14 毛诗超 New user registration method and system for Internet instant messaging service/SNS (Social Network Service)
CN102647638A (en) * 2012-03-29 2012-08-22 青岛海信传媒网络技术有限公司 Intelligent television function interface management method and management system
CN106027615A (en) * 2016-05-10 2016-10-12 乐视控股(北京)有限公司 Object storage method and system
CN105897730A (en) * 2016-05-12 2016-08-24 广西尊达电子商务有限公司 User name and password information encryption and verification method

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
佚名: "一个匹配8-16位数字和字母的正则表达式", 《HTTPS://BLOG.CSDN.NET/YULESLIE/ARTICLE/DETAILS/38357765》 *
佚名: "华为云对象存储服务从入门到进阶(一)", 《HTTPS://BBS.HUAWEICLOUD.COM/BLOGS/103105》 *
佚名: "阿里云对象存储 OSS,不使用主账号,使用子账号来访问存储内容", 《HTTPS://WWW.CNBLOGS.COM/KENSHINOBIY/P/7743386.HTML》 *

Similar Documents

Publication Publication Date Title
CN110088749B (en) Method, system and medium for automatic ontology generation
US10615966B2 (en) Selective content security using visual hashing
CN104618488B (en) A kind of information processing method, client and server
US20140351955A1 (en) Generation of a visually obfuscated representation of an alphanumeric message that indicates availability of a proposed identifier
US20200175141A1 (en) Authentication using cognitive analysis
US10169570B2 (en) Cognitive password pattern checker to enforce stronger, unrepeatable passwords
US10878514B2 (en) Expense validator
CN104283682A (en) Method, device and system conducting verification through verification codes
US20160006562A1 (en) Secure password generation
US20200034568A1 (en) Securely transferring data over a computer network
CN110519155B (en) Information processing method and system
US20170357906A1 (en) Processing un-typed triple store data
CN109361689A (en) A kind of user's creation method and device based on object storage
US20200311192A1 (en) Automated electronic form generation with context cues
US11550896B2 (en) Password strength
Damkjær et al. “I Didn’t Know, You Could Do That”-Affordance Signifiers for Touch Gestures on Mobile Devices
CN106575341A (en) Composite document access
US11664998B2 (en) Intelligent hashing of sensitive information
US10885163B2 (en) Authentication without inputting passwords
US20170331776A1 (en) Decomposed layouts for attention management
US20170357690A1 (en) Processing un-typed triple store data
US20160292685A1 (en) Authenticating a user with a passcode using a passcode entry table
CN113327002A (en) Method and device for constructing data asset management model
US10540379B2 (en) Searching base encoded text
US20200034441A1 (en) Cognitive experience assessment with visual indicator

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190219