CN110691068A - Cloud server login system, method and device - Google Patents
Cloud server login system, method and device Download PDFInfo
- Publication number
- CN110691068A CN110691068A CN201910781682.7A CN201910781682A CN110691068A CN 110691068 A CN110691068 A CN 110691068A CN 201910781682 A CN201910781682 A CN 201910781682A CN 110691068 A CN110691068 A CN 110691068A
- Authority
- CN
- China
- Prior art keywords
- terminal
- image
- login request
- identifier
- account
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The invention belongs to the technical field of cloud, and particularly relates to a cloud server login system, method and device. The system comprises: the system comprises a sending module, a receiving module and a sending module, wherein the sending module is used for sending a login request of a terminal, and the login request comprises an account identifier, an account password and a terminal identifier of the terminal; the system comprises a receiving module, a sending module and a processing module, wherein the receiving module is used for receiving a login request sent by a terminal, and the login request comprises an account identifier, an account password and a terminal identifier of the terminal; the determining module is used for determining whether the terminal is a preset terminal or not according to the terminal identification when the account password of the account identification is verified to pass; and the service module is used for providing the uploading service and the downloading service for the terminal when the terminal is a preset terminal. Has the advantages of high safety, resource saving and high efficiency.
Description
Technical Field
The invention belongs to the technical field of cloud, and particularly relates to a cloud server login system, method and device.
Background
In the related art, because the storage resources of the terminal are limited, many users select to upload data on the terminal to the cloud server for storage, and download the data from the cloud server when the data needs to be used. In the related art, most cloud servers support multi-device login, that is, a user can log in a cloud server by inputting an account ID and a password by using any terminal, so that data uploading service and downloading service are realized.
An encryption algorithm using the same key for encryption and decryption is required. Due to its fast speed, symmetric encryption is often used when the sender of a message needs to encrypt a large amount of data. Symmetric encryption is also referred to as key encryption.
Symmetry means that both parties using this encryption method use the same key for encryption and decryption. A key is an instruction that controls the encryption and decryption process. An algorithm is a set of rules that specify how encryption and decryption are to be performed.
Therefore, the security of encryption depends not only on the encryption algorithm itself, but also the security of key management is more important. Since both encryption and decryption use the same key, how to securely deliver the key to the decryptor becomes a problem that must be solved.
Disclosure of Invention
In view of this, the main objective of the present invention is to provide a cloud server login system, method and device, which have the advantages of high security, resource saving and high efficiency.
In order to achieve the purpose, the technical scheme of the invention is realized as follows:
a cloud server login system, the system comprising:
the system comprises a sending module, a receiving module and a sending module, wherein the sending module is used for sending a login request of a terminal, and the login request comprises an account identifier, an account password and a terminal identifier of the terminal;
the system comprises a receiving module, a sending module and a processing module, wherein the receiving module is used for receiving a login request sent by a terminal, and the login request comprises an account identifier, an account password and a terminal identifier of the terminal;
the determining module is used for determining whether the terminal is a preset terminal or not according to the terminal identification when the account password of the account identification is verified to pass;
and the service module is used for providing the uploading service and the downloading service for the terminal when the terminal is a preset terminal.
Further, the sending module is disposed at the terminal, and includes: the image processing device comprises an image input unit, a first image processing unit, a mixed encryption unit and a data transmission unit; the image input unit is used for inputting original picture resources; the image processing unit is used for digitizing the original picture resource to generate digitized data, and taking the digitized data as an encrypted key; the mixed encryption unit is used for carrying out mixed encryption on the key and the login request; and the data transmission unit is used for simultaneously transmitting the mixed and encrypted data and the original picture resource.
Further, the receiving module is disposed in the cloud, and includes: a data receiving unit, a second image processing unit and a decryption unit; the data receiving unit is used for receiving the encrypted data and the original picture resource; the second image processing unit is used for digitizing the original image resource to generate digitized data, and using the digitized data as a decryption key; and the decryption unit is used for decrypting the encrypted data according to the decrypted key.
Further, the method for digitizing the original picture resource by the first image processing unit and the second image processing unit includes:
step 1: carrying out gray level preprocessing on the color document image to obtain a gray level image;
step 2: carrying out image enhancement processing on the gray level image to obtain an image;
and step 3: performing stroke width transformation on the image;
and 4, step 4: performing morphological closing operation on the image after stroke width transformation to estimate the background of the document image and obtain a background estimation image;
and 5: calculating the absolute difference between the image and the background estimation image, and obtaining a background subtraction image by inverting all the absolute difference images;
step 6: carrying out segmentation processing on the background subtraction image;
and 7: carrying out binarization processing on the output result of the step 6 to realize image binarization
And 8: after each line number of the binary image is divided according to lines, the line values are connected into a whole according to the line sequence to form whole data, and the whole data is taken as digitalized data.
Further, the method for performing hybrid encryption by the hybrid encryption unit by using the digitized data as the key and the login request comprises the following steps: replacing the key M into M0 through an initial replacement IP, and dividing M0 plaintext into a left half part and a right half part, wherein M0 is (L0, R0), and each half part is 32 bits long; then 16 rounds of completely same function f operation are carried out, and in the operation process, data and keys are combined; after 16 rounds of operation, taking the result (R15) of the 15 th round of operation on the right side as the final result (L16) of the operation on the left side, and taking the final result (R16) on the right side as the exclusive OR operation of the result (L15) of the 15 th round of operation on the left side and the result of the operation on the function f; then, combining the left part and the right part together and outputting a ciphertext through an inverse permutation; the decryption unit performs an inverse operation of the encryption.
A cloud server login method, the method performing the steps of:
step 1: sending a login request of a terminal, wherein the login request comprises an account identifier, an account password and a terminal identifier of the terminal;
step 2: receiving a login request sent by a terminal, wherein the login request comprises an account identifier, an account password and a terminal identifier of the terminal;
and step 3: when the account password of the account identifier is verified, determining whether the terminal is a preset terminal according to the terminal identifier;
and 4, step 4: and when the terminal is a preset terminal, providing uploading service and downloading service for the terminal.
Further, the method further comprises: if the terminal is not a preset terminal, verifying the terminal; and if the terminal passes the verification, providing uploading service and downloading service for the terminal.
Further, if the terminal is not a preset terminal, verifying the terminal includes: if the terminal is not a preset terminal, acquiring the mobile phone number bound by the account identifier; sending a standard verification code to the mobile phone number, and simultaneously sending second verification information to the terminal, wherein the second verification information is used for indicating a user to fill in the verification code; receiving second confirmation information sent by the terminal, wherein the second confirmation information comprises a verification code to be confirmed, which is input on the terminal by the user; if the terminal passes the verification, the step of providing the uploading service and the downloading service for the terminal comprises the following steps: and if the verification code to be confirmed included in the second confirmation information is the same as the standard verification code, providing an uploading service and a downloading service for the terminal.
A cloud server login apparatus, the apparatus being a non-transitory computer-readable storage medium storing computing instructions comprising: sending a login request of a terminal, wherein the login request comprises an account identifier, an account password and a code segment of the terminal identifier of the terminal; receiving a login request sent by a terminal, wherein the login request comprises an account identifier, an account password and a code segment of a terminal identifier of the terminal; when the account password of the account identifier is verified, determining whether the terminal is a code segment of a preset terminal according to the terminal identifier; and when the terminal is a preset terminal, providing code segments of uploading service and downloading service for the terminal.
The cloud server login system, the cloud server login method and the cloud server login device have the following beneficial effects: the digitalized picture is used as the key, a brand new encryption mode is adopted, and the cracking difficulty is higher under the condition of the same data volume. Meanwhile, the cloud server can verify the terminal firstly, and provides uploading service and downloading service for the terminal when the terminal is determined to be the preset terminal, so that the condition that a lawbreaker logs in the cloud server by using an illegal terminal to steal user information is avoided, the safety of data storage of the cloud server is improved, and further the user experience is improved.
Drawings
Fig. 1 is a schematic system structure diagram of a cloud server login system according to an embodiment of the present invention;
fig. 2 is a schematic flowchart of a method of a cloud server login method according to an embodiment of the present invention;
fig. 3 is a schematic diagram of an experimental effect of a cloud server login system, a cloud server login method, and a cloud server login device according to embodiments of the present invention.
The cloud server login system, the cloud server login method and the cloud server login device can be used for cracking the data duration under the condition of data volume change; 2-in the prior art, the cloud server system, the method and the device have the advantage that the data cracking duration is long under the condition of data volume change.
Detailed Description
The method of the present invention will be described in further detail below with reference to the accompanying drawings and embodiments of the invention.
Example 1
A cloud server login system, the system comprising:
the system comprises a sending module, a receiving module and a sending module, wherein the sending module is used for sending a login request of a terminal, and the login request comprises an account identifier, an account password and a terminal identifier of the terminal;
the system comprises a receiving module, a sending module and a processing module, wherein the receiving module is used for receiving a login request sent by a terminal, and the login request comprises an account identifier, an account password and a terminal identifier of the terminal;
the determining module is used for determining whether the terminal is a preset terminal or not according to the terminal identification when the account password of the account identification is verified to pass;
and the service module is used for providing the uploading service and the downloading service for the terminal when the terminal is a preset terminal.
Example 2
On the basis of the above embodiment, the sending module is disposed in the terminal, and includes: the image processing device comprises an image input unit, a first image processing unit, a mixed encryption unit and a data transmission unit; the image input unit is used for inputting original picture resources; the image processing unit is used for digitizing the original picture resource to generate digitized data, and taking the digitized data as an encrypted key; the mixed encryption unit is used for carrying out mixed encryption on the key and the login request; and the data transmission unit is used for simultaneously transmitting the mixed and encrypted data and the original picture resource.
Specifically, the encryption method using the single-key cipher is that the same key can be used for encryption and decryption at the same time, and this encryption method is called symmetric encryption, also called single-key encryption. The commonly used one-way encryption algorithm:
1. des (dataencryption standard): the data encryption is standard, the speed is high, and the method is suitable for occasions where a large amount of data is encrypted;
2. 3DES (tripledes): based on DES, three different keys are used for encrypting one block of data for three times, so that the intensity is higher;
3. aes (advanced encryption standard): the advanced encryption standard is the next generation encryption algorithm standard, has high speed and high security level, and supports encryption of 128, 192, 256 and 512 bit keys.
Example 3
On the basis of the above embodiment, the receiving module is disposed in the cloud, and includes: a data receiving unit, a second image processing unit and a decryption unit; the data receiving unit is used for receiving the encrypted data and the original picture resource; the second image processing unit is used for digitizing the original image resource to generate digitized data, and using the digitized data as a decryption key; and the decryption unit is used for decrypting the encrypted data according to the decrypted key.
In particular, symmetric encryption (also called private key encryption) refers to an encryption algorithm that uses the same key for encryption and decryption. Sometimes called traditional cryptographic algorithm, the encryption key can be deduced from the decryption key, and the decryption key can also be deduced from the encryption key. In most symmetric algorithms, the encryption key and the decryption key are the same, so the encryption algorithm is also called a secret key algorithm or a single key algorithm. It requires the sender and receiver to agree on a key before communicating securely. The security of symmetric algorithms relies on keys, and revealing keys means that anyone can decrypt messages they send or receive, so the confidentiality of keys is critical to the security of communications.
The disadvantage is that both parties of the transaction use the same key, and the security cannot be guaranteed. In addition, each pair of users needs to use a unique key which is unknown to others every time the symmetric encryption algorithm is used, so that the number of keys owned by both the sender and the receiver increases geometrically, and key management becomes a burden for the users. The symmetric encryption algorithm is difficult to use in a distributed network system, mainly because of the difficulty in key management and the high use cost. Compared with the public key encryption algorithm, the symmetric encryption algorithm can provide encryption and authentication but lacks a signature function, so that the application range is reduced. Symmetric encryption algorithms widely used in computer private network systems include DES and IDEA. AES advocated by the national institute of standards is about to replace DES as a new standard.
Example 4
On the basis of the above embodiment, the method for digitizing the original picture resource by the first image processing unit and the second image processing unit includes:
step 1: carrying out gray level preprocessing on the color document image to obtain a gray level image;
step 2: carrying out image enhancement processing on the gray level image to obtain an image;
and step 3: performing stroke width transformation on the image;
and 4, step 4: performing morphological closing operation on the image after stroke width transformation to estimate the background of the document image and obtain a background estimation image;
and 5: calculating the absolute difference between the image and the background estimation image, and obtaining a background subtraction image by inverting all the absolute difference images;
step 6: carrying out segmentation processing on the background subtraction image;
and 7: carrying out binarization processing on the output result of the step 6 to realize image binarization
And 8: after each line number of the binary image is divided according to lines, the line values are connected into a whole according to the line sequence to form whole data, and the whole data is taken as digitalized data.
Example 5
On the basis of the above embodiment, the method for hybrid encryption by the hybrid encryption unit to perform hybrid encryption by using the digitized data as the key and the login request includes: replacing the key M into M0 through an initial replacement IP, and dividing M0 plaintext into a left half part and a right half part, wherein M0 is (L0, R0), and each half part is 32 bits long; then 16 rounds of completely same function f operation are carried out, and in the operation process, data and keys are combined; after 16 rounds of operation, taking the result (R15) of the 15 th round of operation on the right side as the final result (L16) of the operation on the left side, and taking the final result (R16) on the right side as the exclusive OR operation of the result (L15) of the 15 th round of operation on the left side and the result of the operation on the function f; then, combining the left part and the right part together and outputting a ciphertext through an inverse permutation; the decryption unit performs an inverse operation of the encryption.
Example 6
A cloud server login method, the method performing the steps of:
step 1: sending a login request of a terminal, wherein the login request comprises an account identifier, an account password and a terminal identifier of the terminal;
step 2: receiving a login request sent by a terminal, wherein the login request comprises an account identifier, an account password and a terminal identifier of the terminal;
and step 3: when the account password of the account identifier is verified, determining whether the terminal is a preset terminal according to the terminal identifier;
and 4, step 4: and when the terminal is a preset terminal, providing uploading service and downloading service for the terminal.
Example 7
On the basis of the above embodiment, the method further includes: if the terminal is not a preset terminal, verifying the terminal; and if the terminal passes the verification, providing uploading service and downloading service for the terminal.
Specifically, the cloud server (ECS) is a computing service that is simple, efficient, safe, reliable, and flexible in processing capability. The management mode is simpler and more efficient than that of a physical server. A user can rapidly create or release any plurality of cloud servers without purchasing hardware in advance.
The cloud server helps people to quickly build more stable and safe applications, reduces the difficulty of developing operation and maintenance and the overall IT cost, and enables people to concentrate on innovation of core services.
The industry name of cloud servers is actually computing units. The computing unit means that the server can only count the brains of one person, and is equivalent to the CPU of a common computer, and the resources in the server are limited. And if you need to obtain better performance, the solution is to upgrade the cloud server and to deploy other software which consumes the resources of the computing unit on the corresponding cloud service. For example, databases have special cloud database services, static web pages and pictures have special file storage services.
Moreover, cloud servers are not so cheap, but rather are more expensive than a typical VPS. Why? Because it is relatively easy to expand. The cloud server is a good choice when the website is large and has high income.
The cloud server is an important component of cloud computing service and is a service platform for providing comprehensive business capability for various internet users. The platform integrates three core elements of internet application in the traditional sense: computing, storage, network, and providing a user with a public internet infrastructure service.
Example 8
On the basis of the previous embodiment, if the terminal is not a preset terminal, the verifying the terminal includes: if the terminal is not a preset terminal, acquiring the mobile phone number bound by the account identifier; sending a standard verification code to the mobile phone number, and simultaneously sending second verification information to the terminal, wherein the second verification information is used for indicating a user to fill in the verification code; receiving second confirmation information sent by the terminal, wherein the second confirmation information comprises a verification code to be confirmed, which is input on the terminal by the user; if the terminal passes the verification, the step of providing the uploading service and the downloading service for the terminal comprises the following steps: and if the verification code to be confirmed included in the second confirmation information is the same as the standard verification code, providing an uploading service and a downloading service for the terminal.
Example 9
A cloud server login apparatus, the apparatus being a non-transitory computer-readable storage medium storing computing instructions comprising: sending a login request of a terminal, wherein the login request comprises an account identifier, an account password and a code segment of the terminal identifier of the terminal; receiving a login request sent by a terminal, wherein the login request comprises an account identifier, an account password and a code segment of a terminal identifier of the terminal; when the account password of the account identifier is verified, determining whether the terminal is a code segment of a preset terminal according to the terminal identifier; and when the terminal is a preset terminal, providing code segments of uploading service and downloading service for the terminal.
The above description is only an embodiment of the present invention, but not intended to limit the scope of the present invention, and any structural changes made according to the present invention should be considered as being limited within the scope of the present invention without departing from the spirit of the present invention.
It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working process and related description of the system described above may refer to the corresponding process in the foregoing method embodiments, and will not be described herein again.
It should be noted that, the system provided in the foregoing embodiment is only illustrated by dividing the functional modules, and in practical applications, the functions may be distributed by different functional modules according to needs, that is, the modules or steps in the embodiment of the present invention are further decomposed or combined, for example, the modules in the foregoing embodiment may be combined into one module, or may be further split into multiple sub-modules, so as to complete all or part of the functions described above. The names of the modules and steps involved in the embodiments of the present invention are only for distinguishing the modules or steps, and are not to be construed as unduly limiting the present invention.
It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes and related descriptions of the storage device and the processing device described above may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
Those of skill in the art would appreciate that the various illustrative modules, method steps, and modules described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that programs corresponding to the software modules, method steps may be located in Random Access Memory (RAM), memory, Read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art. To clearly illustrate this interchangeability of electronic hardware and software, various illustrative components and steps have been described above generally in terms of their functionality. Whether such functionality is implemented as electronic hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
The terms "first," "second," and the like are used for distinguishing between similar elements and not necessarily for describing or implying a particular order or sequence.
The terms "comprises," "comprising," or any other similar term are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
So far, the technical solutions of the present invention have been described in connection with the preferred embodiments shown in the drawings, but it is easily understood by those skilled in the art that the scope of the present invention is obviously not limited to these specific embodiments. Equivalent changes or substitutions of related technical features can be made by those skilled in the art without departing from the principle of the invention, and the technical scheme after the changes or substitutions can fall into the protection scope of the invention.
The above description is only a preferred embodiment of the present invention, and is not intended to limit the scope of the present invention.
Claims (9)
1. A cloud server login system, the system comprising:
the system comprises a sending module, a receiving module and a sending module, wherein the sending module is used for sending a login request of a terminal, and the login request comprises an account identifier, an account password and a terminal identifier of the terminal;
the system comprises a receiving module, a sending module and a processing module, wherein the receiving module is used for receiving a login request sent by a terminal, and the login request comprises an account identifier, an account password and a terminal identifier of the terminal;
the determining module is used for determining whether the terminal is a preset terminal or not according to the terminal identification when the account password of the account identification is verified to pass;
and the service module is used for providing the uploading service and the downloading service for the terminal when the terminal is a preset terminal.
2. The system of claim 1, wherein the sending module is disposed at a terminal and comprises: the image processing device comprises an image input unit, a first image processing unit, a mixed encryption unit and a data transmission unit; the image input unit is used for inputting original picture resources; the image processing unit is used for digitizing the original picture resource to generate digitized data, and taking the digitized data as an encrypted key; the mixed encryption unit is used for carrying out mixed encryption on the key and the login request; and the data transmission unit is used for simultaneously transmitting the mixed and encrypted data and the original picture resource.
3. The system of claim 2, wherein the receiving module is disposed in a cloud comprising: a data receiving unit, a second image processing unit and a decryption unit; the data receiving unit is used for receiving the encrypted data and the original picture resource; the second image processing unit is used for digitizing the original image resource to generate digitized data, and using the digitized data as a decryption key; and the decryption unit is used for decrypting the encrypted data according to the decrypted key.
4. The system of claim 3, wherein the first image processing unit and the second image processing unit each digitize the raw picture resource by a method comprising:
step 1: carrying out gray level preprocessing on the color document image to obtain a gray level image;
step 2: carrying out image enhancement processing on the gray level image to obtain an image;
and step 3: performing stroke width transformation on the image;
and 4, step 4: performing morphological closing operation on the image after stroke width transformation to estimate the background of the document image and obtain a background estimation image;
and 5: calculating the absolute difference between the image and the background estimation image, and obtaining a background subtraction image by inverting all the absolute difference images;
step 6: carrying out segmentation processing on the background subtraction image;
and 7: carrying out binarization processing on the output result of the step 6 to realize image binarization
And 8: after each line number of the binary image is divided according to lines, the line values are connected into a whole according to the line sequence to form whole data, and the whole data is taken as digitalized data.
5. The system of claim 4, wherein the method for hybrid encryption by the hybrid encryption unit of hybrid encryption of digitized data as a key and a login request comprises: replacing the key M into M0 through an initial replacement IP, and dividing M0 plaintext into a left half part and a right half part, wherein M0 is (L0, R0), and each half part is 32 bits long; then 16 rounds of completely same function f operation are carried out, and in the operation process, data and keys are combined; after 16 rounds of operation, taking the result (R15) of the 15 th round of operation on the right side as the final result (L16) of the operation on the left side, and taking the final result (R16) on the right side as the exclusive OR operation of the result (L15) of the 15 th round of operation on the left side and the result of the operation on the function f; then, combining the left part and the right part together and outputting a ciphertext through an inverse permutation; the decryption unit performs an inverse operation of the encryption.
6. Cloud server login method based on the system according to one of claims 1 to 5, characterized in that the method performs the following steps:
step 1: sending a login request of a terminal, wherein the login request comprises an account identifier, an account password and a terminal identifier of the terminal;
step 2: receiving a login request sent by a terminal, wherein the login request comprises an account identifier, an account password and a terminal identifier of the terminal;
and step 3: when the account password of the account identifier is verified, determining whether the terminal is a preset terminal according to the terminal identifier;
and 4, step 4: and when the terminal is a preset terminal, providing uploading service and downloading service for the terminal.
7. The method of claim 6, wherein the method further comprises: if the terminal is not a preset terminal, verifying the terminal; and if the terminal passes the verification, providing uploading service and downloading service for the terminal.
8. The method of claim 6, wherein the verifying the terminal if the terminal is not a predetermined terminal comprises: if the terminal is not a preset terminal, acquiring the mobile phone number bound by the account identifier; sending a standard verification code to the mobile phone number, and simultaneously sending second verification information to the terminal, wherein the second verification information is used for indicating a user to fill in the verification code; receiving second confirmation information sent by the terminal, wherein the second confirmation information comprises a verification code to be confirmed, which is input on the terminal by the user; if the terminal passes the verification, the step of providing the uploading service and the downloading service for the terminal comprises the following steps: and if the verification code to be confirmed included in the second confirmation information is the same as the standard verification code, providing an uploading service and a downloading service for the terminal.
9. The cloud server login apparatus according to any one of claims 6 to 9, wherein the apparatus is a non-transitory computer-readable storage medium storing computing instructions, and the computing instructions comprise: sending a login request of a terminal, wherein the login request comprises an account identifier, an account password and a code segment of the terminal identifier of the terminal; receiving a login request sent by a terminal, wherein the login request comprises an account identifier, an account password and a code segment of a terminal identifier of the terminal; when the account password of the account identifier is verified, determining whether the terminal is a code segment of a preset terminal according to the terminal identifier; and when the terminal is a preset terminal, providing code segments of uploading service and downloading service for the terminal.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910781682.7A CN110691068A (en) | 2019-08-23 | 2019-08-23 | Cloud server login system, method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910781682.7A CN110691068A (en) | 2019-08-23 | 2019-08-23 | Cloud server login system, method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110691068A true CN110691068A (en) | 2020-01-14 |
Family
ID=69108384
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910781682.7A Pending CN110691068A (en) | 2019-08-23 | 2019-08-23 | Cloud server login system, method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110691068A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113645203A (en) * | 2021-07-27 | 2021-11-12 | 重庆市规划和自然资源信息中心 | Real estate registration and bank deep fusion method |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105871798A (en) * | 2015-11-23 | 2016-08-17 | 乐视致新电子科技(天津)有限公司 | Network access method and device, and terminal |
US20170163628A1 (en) * | 2013-07-02 | 2017-06-08 | Tencent Technology (Shenzhen) Company Limited | User login methods, devices, and systems |
CN108076056A (en) * | 2017-12-12 | 2018-05-25 | 北京小米移动软件有限公司 | Cloud server login method and device |
JP2018092564A (en) * | 2016-11-29 | 2018-06-14 | 株式会社リコー | Information processing system, information processing terminal, information processing method, and program |
CN109035274A (en) * | 2018-08-23 | 2018-12-18 | 湖北工业大学 | File and picture binary coding method based on background estimating Yu U-shaped convolutional neural networks |
CN110266729A (en) * | 2019-07-18 | 2019-09-20 | 倪玉根 | Cloud Server login method and device based on image encryption |
CN110336839A (en) * | 2019-08-08 | 2019-10-15 | 李惠成 | Cloud Server login method and device based on image encryption |
-
2019
- 2019-08-23 CN CN201910781682.7A patent/CN110691068A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170163628A1 (en) * | 2013-07-02 | 2017-06-08 | Tencent Technology (Shenzhen) Company Limited | User login methods, devices, and systems |
CN105871798A (en) * | 2015-11-23 | 2016-08-17 | 乐视致新电子科技(天津)有限公司 | Network access method and device, and terminal |
JP2018092564A (en) * | 2016-11-29 | 2018-06-14 | 株式会社リコー | Information processing system, information processing terminal, information processing method, and program |
CN108076056A (en) * | 2017-12-12 | 2018-05-25 | 北京小米移动软件有限公司 | Cloud server login method and device |
CN109035274A (en) * | 2018-08-23 | 2018-12-18 | 湖北工业大学 | File and picture binary coding method based on background estimating Yu U-shaped convolutional neural networks |
CN110266729A (en) * | 2019-07-18 | 2019-09-20 | 倪玉根 | Cloud Server login method and device based on image encryption |
CN110336839A (en) * | 2019-08-08 | 2019-10-15 | 李惠成 | Cloud Server login method and device based on image encryption |
Non-Patent Citations (1)
Title |
---|
阴国富: "浅析网络通讯中的DES加密算法", 《渭南师范学院学报》 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113645203A (en) * | 2021-07-27 | 2021-11-12 | 重庆市规划和自然资源信息中心 | Real estate registration and bank deep fusion method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10880732B2 (en) | Authentication of phone caller identity | |
US9432346B2 (en) | Protocol for controlling access to encryption keys | |
CN100536393C (en) | Secret shared key mechanism based user management method | |
CN112202754B (en) | Data encryption method and device, electronic equipment and storage medium | |
CN109951513B (en) | Quantum-resistant computing smart home quantum cloud storage method and system based on quantum key card | |
CN107294964B (en) | Information transmission method | |
CN113489710B (en) | File sharing method, device, equipment and storage medium | |
CN102404337A (en) | Data encryption method and device | |
CN117240625B (en) | Tamper-resistant data processing method and device and electronic equipment | |
CN113239403A (en) | Data sharing method and device | |
CN113411187A (en) | Identity authentication method and system, storage medium and processor | |
CN106506479A (en) | The method of cipher authentication, system and client, server and smart machine | |
Fahl et al. | Trustsplit: usable confidentiality for social network messaging | |
CN116866029B (en) | Random number encryption data transmission method, device, computer equipment and storage medium | |
CN110691068A (en) | Cloud server login system, method and device | |
CN113722749A (en) | Data processing method and device for block chain BAAS service based on encryption algorithm | |
CN116132037A (en) | Safety hidden communication method | |
CN102387162A (en) | Mail server access method and system based on digital certificate | |
CN106972928B (en) | Bastion machine private key management method, device and system | |
CN112769759B (en) | Information processing method, information gateway, server and medium | |
CN110912683A (en) | Password storage method and device and password verification method and device | |
CN112637442B (en) | Method and device for encrypting circulating images by cloud server and local end | |
Mata et al. | Enhanced secure data storage in cloud computing using hybrid cryptographic techniques (AES and Blowfish) | |
Al-Attab et al. | Hybrid data encryption technique for data security in cloud computing | |
Vinh et al. | Constructing a Model Combining Zalo and End-to-End Encryption for Application in Digital Transformation |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200114 |
|
RJ01 | Rejection of invention patent application after publication |