CN110717173A - Account activation method, account activation device, network terminal and computer readable storage medium - Google Patents

Account activation method, account activation device, network terminal and computer readable storage medium Download PDF

Info

Publication number
CN110717173A
CN110717173A CN201911021784.5A CN201911021784A CN110717173A CN 110717173 A CN110717173 A CN 110717173A CN 201911021784 A CN201911021784 A CN 201911021784A CN 110717173 A CN110717173 A CN 110717173A
Authority
CN
China
Prior art keywords
account
activation
user terminal
information
identification information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201911021784.5A
Other languages
Chinese (zh)
Other versions
CN110717173B (en
Inventor
沈逸斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Aux Air Conditioning Co Ltd
Ningbo Aux Electric Co Ltd
Original Assignee
Aux Air Conditioning Co Ltd
Ningbo Aux Electric Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Aux Air Conditioning Co Ltd, Ningbo Aux Electric Co Ltd filed Critical Aux Air Conditioning Co Ltd
Priority to CN201911021784.5A priority Critical patent/CN110717173B/en
Publication of CN110717173A publication Critical patent/CN110717173A/en
Application granted granted Critical
Publication of CN110717173B publication Critical patent/CN110717173B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/42User authentication using separate channels for security data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/42User authentication using separate channels for security data
    • G06F21/43User authentication using separate channels for security data wireless channels
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2117User registration

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention provides an account activation method, an account activation device, a network terminal and a computer readable storage medium, and relates to the technical field of communication. The method and the device receive a new account request sent by a first user terminal, wherein the new account request comprises user identification information, create an account according to the user identification information and generate activation information, then send the activation information to a second user terminal determined according to the user identification information, then verify account data fed back by the second user terminal after receiving the activation information, and if the verification is successful, activate the account. Because the account is automatically generated through the user identification information and the activation information is sent to the second user side, the activation operation is realized after the user completes the setting of passwords and the like for the account, and the safety of the account and the system is ensured.

Description

Account activation method, account activation device, network terminal and computer readable storage medium
Technical Field
The invention relates to the technical field of communication, in particular to an account activation method, an account activation device, a network terminal and a computer-readable storage medium.
Background
The B-end product is a system, tool or platform used by an enterprise in work or for business needs, such as: enterprise Resource Planning (ERP) systems, OFFICE AUTOMATION (OA) systems, monitoring platforms, and Enterprise management Solutions (SAP) systems within an Enterprise.
However, in the prior art, the registration method of the B-end product mainly includes: a system administrator creates an account number in the system, sets an initial password, assigns authority to the account number, and then ensures the security of the account number by modifying the password by staff. However, many users can directly use the password without modifying the password, which easily causes account leakage and cannot ensure system security.
Disclosure of Invention
In view of the above, the present invention provides an account activation method, apparatus, network terminal and computer-readable storage medium to solve the above problems.
In a first aspect, the present invention provides an account activation method, applied to a network terminal, where the network terminal is in communication connection with a first user terminal and a second user terminal, and the method includes:
receiving a new account request sent by the first user terminal, wherein the new account request contains user identification information;
creating an account according to the user identification information and generating activation information;
sending the activation information to the second user terminal determined according to the user identification information;
verifying the account data fed back after the second user terminal receives the activation information;
and if the verification is successful, activating the account.
The account is automatically generated through the user identification information, and the activation information is sent to the second user side, so that the user can automatically complete the setting of passwords and the like for the account and then realize the activation operation, and the safety of the account and the system is ensured.
Further, the account data comprises account parameters and a first check code;
the step of verifying the account data fed back after the second user terminal (130) receives the activation information comprises:
generating a second check code according to the account parameters;
and verifying whether the first check code and the second check code are consistent.
Further, the account parameters comprise the user identification information, password information, application reason and a first verification code;
the step of verifying the account data fed back after the second user terminal (130) receives the activation information further includes:
and verifying whether the first verification code is consistent with a second verification code, wherein the second verification code is fed back by the network terminal (120) in response to a verification request initiated by the second user terminal (130) after receiving the activation information.
Further, when the first verification code is consistent with the second verification code and the first check code is consistent with the second check code, it is determined that the account data verification is successful.
Further, the first check code is a check code generated by the second user terminal (130) encoding the user identification information, the password information, the application reason and the first verification code, sequencing the encoded user identification information, the password information, the application reason and the first verification code according to a preset sequence to generate a character string, and encrypting the character string by using a preset encryption algorithm.
Further, the user identification information is a mobile phone number, and the step of sending the activation information to the second user terminal determined according to the user identification information includes:
and sending the activation information to the second user terminal corresponding to the mobile phone number in a short message mode.
Further, the method further comprises:
receiving an authority setting request sent by the first user terminal, wherein the authority setting request comprises department information and an authority level;
and dividing the account into clusters matched with the department information, and configuring the authority of the account according to the authority level.
In a second aspect, the present invention further provides an account activation apparatus, applied to a network terminal, where the network terminal is in communication connection with a first user terminal and a second user terminal, and the apparatus includes:
the receiving module is used for receiving a new account request sent by the first user terminal, wherein the new account request comprises user identification information;
the new establishing module is used for establishing an account according to the user identification information and generating activation information;
a sending module, configured to send the activation information to the second user terminal determined according to the user identification information;
the verification module is used for verifying the account data fed back after the second user terminal receives the activation information;
and the activation module is used for activating the account if the verification is successful.
In a third aspect, the present invention provides a network terminal, including a processor and a memory, where the memory stores machine executable instructions capable of being executed by the processor, and the processor can execute the machine executable instructions to implement the account activation method in any one of the above embodiments.
In a fourth aspect, the present invention also provides a computer-readable storage medium, on which a computer program is stored, the computer program, when executed by a controller, implementing the account activation method in any of the above embodiments.
Drawings
Fig. 1 is an interaction diagram of a network terminal, a first user terminal and a second user terminal.
Fig. 2 is a block diagram of a network terminal.
Fig. 3 is a flowchart of an account activation method provided by the present invention.
FIG. 4 is a schematic diagram of activating a web page.
FIG. 5 is a further flowchart of the account activation method provided by the present invention.
Fig. 6 is a flowchart of a process of assigning permissions in the account activation method provided in the present invention.
FIG. 7 is a functional block diagram of an account activation device according to the present invention.
Icon: 110-a first user terminal; 120-a network terminal; 122-a memory; 124-a processor; 126-a communication unit; 130-a second user terminal; 200-account activation means; 210-a receiving module; 220-building a module; 230-a sending module; 240-a verification module; 250-an activation module; 260-configuration module.
Detailed Description
In order to make the aforementioned objects, features and advantages of the present invention comprehensible, embodiments accompanied with figures are described in detail below.
In the prior art, a system administrator is usually required to create an account and set an initial password, and then, after a department, a right and a resource are allocated to the account, the account and the initial password are given to an employee together. But in order to ensure the security of the account, the initial password needs to be modified. In fact, many users cannot modify the password, so that account leakage is easily caused, and system security cannot be guaranteed. In addition, in general, the account and the initial password are directly sent to the staff in a short message manner, and once the mobile phone number is mistakenly input, the account and the password are leaked.
Therefore, the invention provides an account activation method, an account activation device, a network terminal 120 and a computer-readable storage medium, which can ensure the security of an account and a system.
Please refer to fig. 1, which is a schematic diagram illustrating interaction between the network terminal 120 and the first user terminal 110 and the second user terminal 130. The network terminal 120 is communicatively coupled to both the first user terminal 110 and the second user terminal 130.
The first user terminal 110 is a terminal where a system administrator is located, and application software of a management system such as ERP, OA or SAP is pre-installed on the first user terminal 110. The system administrator may send a new account request, an authority setting request, and the like to the network terminal 120 through the first user terminal 110. The first user terminal 110 may be, but is not limited to, a personal computer, a tablet computer, a mobile phone, and the like.
The network terminal 120 has stored thereon user data of the management system, which can be used to respond to requests sent by the first user terminal 110. Fig. 2 is a block diagram of the network terminal 120. The network terminal 120 includes a memory 122, a processor 124, and a communication unit 126. The memory 122, processor 124 and communication unit 126 are electrically connected to each other directly or indirectly to enable data transmission or interaction. For example, the components may be electrically connected to each other via one or more communication buses or signal lines.
The memory 122 is used for storing programs or data. The memory 122 may be, but is not limited to, a Random Access Memory (RAM), a Read Only Memory (ROM), a Programmable Read Only Memory (PROM), an erasable read only memory (EPROM), an electrically erasable read only memory (EEPROM), and the like.
The processor 124 is used to read/write data or programs stored in the memory 122 and perform corresponding functions.
The communication unit 126 is used for establishing a communication connection between the network terminal 120 and other communication terminals (such as the first user terminal 110 and the second user terminal 130) through the network, and for transceiving data through the network.
It should be understood that the structure shown in fig. 2 is only a schematic structural diagram of the network terminal 120, and the network terminal 120 may include more or less components than those shown in fig. 2, or have a different configuration than that shown in fig. 2. The components shown in fig. 2 may be implemented in hardware, software, or a combination thereof. It should be noted that the network terminal 120 may be a server, a mobile phone, a computer, or other devices.
The second user terminal 130 is a terminal where the employee is located, and is mainly used to receive the activation information sent by the network terminal 120, and complete activation of the account number under the operation of the employee. The second user terminal 130 may be a mobile phone.
In an alternative embodiment, the first user terminal 110 and the second user terminal 130 may be integrated into a single communication terminal.
The invention provides an account activation method, which is applied to the network terminal 120. Please refer to fig. 3, which is a flowchart illustrating an account activation method according to the present invention. The account activation method comprises the following steps:
s301, receiving a new account request sent by the first user terminal 110.
And the new account request comprises user identification information. The user identification information is the mobile phone number of the second user terminal 130. That is, the system administrator can create a new account for the employee through their mobile phone numbers.
S302, an account is created according to the user identification information and activation information is generated.
An account is established by the mobile phone number of the user, and the unique identifier of the account can be generated to be used as the work number of the user while the account is established.
In addition, the activation information contains a link that facilitates the user's click to complete the activation.
S303, sending activation information to the second user terminal 130 determined according to the user identification information.
In an optional implementation manner, the activation information is sent to the second user terminal 130 corresponding to the mobile phone number in a short message manner. For example, the content of the activation information may be: "do you well, a certain system administrator invite you to join a certain system, please click on the address http:// domain? mobile & sign addition ".
S304, verifying the account data fed back after the second user terminal 130 receives the activation information, and if the verification is successful, executing S305; if the verification fails, S306 is executed.
The account data comprises account parameters and a first check code. Specifically, the account parameters include user identification information, password information, and a first verification code. It should be noted that the account parameter may also include other parameters, such as application reason, remark information, verification question, and answer to the verification question.
After the second user terminal 130 receives the activation information, a link contained within the activation information may be clicked to enter the activation webpage. Please refer to fig. 4, which is a diagram illustrating activating a web page. The employee may click the "send verification code" icon to send a verification request to the network terminal 120, and the network terminal 120 feeds back the second verification code to the second user terminal 130 upon receiving the verification request. Therefore, the employee can input the first verification code at the position of 'please input the verification code' according to the second verification code.
Meanwhile, the employee may also input information such as a password and an application reason on the activation webpage, and after clicking the "invite confirmation" icon, the second user terminal 130 may generate a first check code according to the user identification information, the password information, and the application reason, and uniformly feed back information such as the user identification information, the password information, the application reason, the first verification code, and the first check code to the network terminal 120.
Specifically, the first check code is a check code generated by the second user terminal encoding the user identification information, the password information, the application reason and the first verification code, sequencing the encoded user identification information, the password information, the application reason and the first verification code according to a preset sequence to generate a character string, and encrypting the character string by using a preset encryption algorithm. For example, the following may be used: the mobile phone number is characterized by mobile, the password is characterized by password, the verification code is characterized by smscode, and the application reason is characterized by reason. The reason for the application is then coded to generate a code reasoncode that characterizes the reason for the application so that chinese can be received by the network terminal 120. Then, the parameters are arranged according to a preset sequence to generate a character string. In an alternative embodiment, the arrangement may be: the mobile & password & smiscode & reason.
And finally, generating a first check code according to the character string. In an alternative embodiment, the string is encrypted using the MD5 algorithm to generate a 32-bit string as the first check code.
Referring to FIG. 5, a further flow chart of the account activation method is shown. The S304 includes:
s3041, generating a second check code according to the account parameter.
In order to avoid the account number leakage caused by the change of the user identification information, the password information, the application reason, the first verification code and other information during the transmission process, the network terminal 120 needs to generate the second verification code again in the same manner after receiving the account parameters such as the user identification information, the password information, the application reason, the first verification code and the like. It should be noted that the manner of generating the second check code is the same as the manner of generating the first check code, and is not described herein again.
S3042, verifying whether the first check code is consistent with the second check code, if yes, performing S3043, and if no, performing S307.
By verifying whether the first check code is consistent with the second check code, it can be determined relatively quickly whether the account parameters sent by the second user terminal 130 are consistent with the account parameters received by the network terminal 120, so as to determine whether the account parameters are modified during transmission. Specifically, if the first check code is inconsistent with the second check code, the account parameter sent by the second user terminal 130 is inconsistent with the account parameter received by the network terminal 120; otherwise, it is consistent.
Meanwhile, whether the first check code is consistent with the second check code is verified, so that the situation that each kind of information is compared and verified independently is avoided, and verification time is saved.
S3043, verifying whether the first verification code is consistent with the second verification code, if yes, executing S305, and if no, executing S307.
Whether the user identification information belongs to the user initiates the activation request or not can be determined by verifying whether the first verification code is consistent with the second verification code, and if so, the user identification information belongs to the user initiates the activation request. Wherein, the second verification code is fed back by the network terminal 120 in response to the verification request initiated by the second user terminal 130 after receiving the activation information.
It should be noted that, there is no strict sequence between the two steps S3042 and S3043, and in other embodiments, S3043 may be executed first, and then S3042 may be executed. The account data verification is determined to be successful only when the first verification code is consistent with the second verification code and the first verification code is consistent with the second verification code.
The activation mode provided by the invention enables the staff to set the password by himself, prevents other people except the staff from knowing the password, and ensures the safety of the account and the password.
S305, activating the account.
If the verification is successful, the fact that the employee to which the user identification information belongs is activated is indicated, and the account data is not abnormal, so that the account is activated. After activating the account, the employee can log in the system according to the own mobile phone number and the own set password.
S306, the download link is sent to the second user terminal 130.
In other embodiments, the application software of the management system may be directly pushed to the second user terminal 130, or the web address of the management system may be pushed to the second user terminal 130, or the like
S307, sending the prompt information to the second user terminal 130.
That is, as long as any one of the verification code or the check code fails to be verified, a prompt message is sent to the second user terminal 130 to remind the user of the failure of verification.
In order to facilitate management by a system administrator, the account activation method provided by the invention can also realize operations such as authority distribution and the like by the system administrator. Therefore, referring to fig. 6, the account activation method provided by the present invention further includes:
s308, receiving the permission setting request sent by the first user terminal 110.
The permission setting request comprises department information and permission level.
S309, dividing the account into clusters matched with department information, and configuring the authority of the account according to the authority level.
Because the system administrator creates the account, and the employee activates the account and sets the password, the communication cost between the system administrator and the employee is saved in the whole process, so that the system administrator can directly allocate departments and authorities to the account.
In order to execute the corresponding steps in the above embodiments and various possible manners, an implementation manner of the account activating apparatus 200 is given below, and optionally, the account activating apparatus 200 may adopt the device structure of the network terminal 120 shown in fig. 2. Referring to fig. 7, fig. 7 is a functional block diagram of an account activation device 200 according to an embodiment of the present invention. It should be noted that the basic principle and the generated technical effect of the account activating device 200 provided in the present embodiment are the same as those of the above embodiments, and for the sake of brief description, no part of the present embodiment is mentioned, and reference may be made to the corresponding contents in the above embodiments. The account activation device 200 includes: a receiving module 210, a new building module 220, a sending module 230, a verification module 240, an activation module 250, and a configuration module 260.
The receiving module 210 is configured to receive a new account request sent by the first user terminal 110.
It is to be appreciated that in an alternative embodiment, the receiving module 210 may be configured to perform S301.
The creating module 220 is configured to create an account according to the user identification information and generate activation information.
It is to be appreciated that in an alternative embodiment, the newly created module 220 can be utilized to perform S302.
The sending module 230 is configured to send the activation information to the second user terminal 130 determined according to the user identification information.
It is understood that in an alternative embodiment, the sending module 230 may be configured to execute S303.
The verification module 240 is used for verifying the account data fed back after the second user terminal 130 receives the activation information.
Specifically, the verification module 240 is configured to generate a second check code according to the account parameter, and verify whether the first check code and the second check code are consistent and whether the first check code and the second check code are consistent.
It is understood that in an alternative embodiment, the verification module 240 may be used to perform S304, S3041, S3042 and S3043.
The activation module 250 is configured to activate the account if the verification is successful.
It is to be appreciated that in an alternative embodiment, the activation module 250 may be configured to perform S305.
The sending module 230 is further configured to send the download link to the second user terminal 130.
It is understood that in an alternative embodiment, the sending module 230 may be configured to execute S306.
The sending module 230 is further configured to send a prompt message to the second user terminal 130 if the verification fails.
It is understood that in an alternative embodiment, the sending module 230 may be configured to execute S307.
The receiving module 210 is further configured to receive a permission setting request sent by the first user terminal 110.
It is to be appreciated that in an alternative embodiment, the receiving module 210 can be configured to perform S308.
And the configuration module 260 is used for dividing the account into clusters matched with the department information and configuring the authority of the account according to the authority level.
It is to be appreciated that in an alternative embodiment, the configuration module 260 can be configured to perform S309.
Alternatively, the modules may be stored in the memory 122 shown in fig. 2 in the form of software or Firmware (Firmware) or be fixed in an Operating System (OS) of the network terminal 120, and may be executed by the processor 124 in fig. 2. Meanwhile, data, codes of programs, and the like required to execute the above modules may be stored in the memory 122.
The present invention also provides a computer-readable storage medium on which a computer program is stored, the computer program, when executed by a controller, implementing the account activation method in any of the above embodiments.
In summary, according to the account activation method, the account activation device, the network terminal, and the computer-readable storage medium provided by the present invention, by receiving a new account request sent by a first user terminal, where the new account request includes user identification information, creating an account according to the user identification information and generating activation information, then sending the activation information to a second user terminal determined according to the user identification information, then verifying account data fed back by the second user terminal after receiving the activation information, and if the verification is successful, activating the account. Because the account is automatically generated through the user identification information and the activation information is sent to the second user side, the activation operation is realized after the user completes the setting of passwords and the like for the account, and the safety of the account and the system is ensured.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus and method can be implemented in other ways. The apparatus embodiments described above are merely illustrative, and for example, the flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of apparatus, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
In addition, the functional modules in the embodiments of the present invention may be integrated together to form an independent part, or each module may exist separately, or two or more modules may be integrated to form an independent part.
The functions, if implemented in the form of software functional modules and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
Although the present invention is disclosed above, the present invention is not limited thereto. Various changes and modifications may be effected therein by one skilled in the art without departing from the spirit and scope of the invention as defined in the appended claims.

Claims (10)

1. An account activation method applied to a network terminal (120), wherein the network terminal (120) is in communication connection with a first user terminal (110) and a second user terminal (130), the method comprising:
receiving a new account request sent by the first user terminal (110), wherein the new account request contains user identification information;
creating an account according to the user identification information and generating activation information;
-sending said activation information to said second user terminal (130) determined from said user identification information;
verifying the account data fed back after the second user terminal (130) receives the activation information;
and if the verification is successful, activating the account.
2. The account activation method of claim 1, wherein the account data comprises account parameters and a first check code;
the step of verifying the account data fed back after the second user terminal (130) receives the activation information comprises:
generating a second check code according to the account parameters;
and verifying whether the first check code and the second check code are consistent.
3. The account activation method according to claim 2, wherein the account parameters include the user identification information, password information, application reason, and first verification code;
the step of verifying the account data fed back after the second user terminal (130) receives the activation information further includes:
and verifying whether the first verification code is consistent with a second verification code, wherein the second verification code is fed back by the network terminal (120) in response to a verification request initiated by the second user terminal (130) after receiving the activation information.
4. The account activation method of claim 3, wherein the account data verification is determined to be successful when the first verification code is consistent with the second verification code and the first verification code is consistent with the second verification code.
5. The account activation method according to claim 3 or 4, wherein the first check code is a check code generated by encoding the user identification information, the password information, the application reason and the first verification code by the second user terminal (130), sorting the encoded user identification information, the password information, the application reason and the first verification code according to a preset sequence to generate a character string, and encrypting the character string by using a preset encryption algorithm.
6. An account activation method according to any one of claims 1 to 4, wherein the user identification information is a mobile phone number, and the step of sending the activation information to the second user terminal (130) determined from the user identification information comprises:
and sending the activation information to the second user terminal (130) corresponding to the mobile phone number in a short message mode.
7. An account activation method according to any one of claims 1 to 4, wherein the method further comprises:
receiving an authority setting request sent by the first user terminal (110), wherein the authority setting request comprises department information and an authority level;
and dividing the account into clusters matched with the department information, and configuring the authority of the account according to the authority level.
8. An account activation apparatus (200) applied to a network terminal (120), wherein the network terminal (120) is in communication connection with a first user terminal (110) and a second user terminal (130), the apparatus comprising:
a receiving module (210) configured to receive a new account request sent by the first user terminal (110), where the new account request includes user identification information;
a new establishing module (220) for establishing an account according to the user identification information and generating activation information;
a sending module (230) for sending the activation information to the second user terminal (130) determined according to the user identification information;
a verification module (240) for verifying the account data fed back by the second user terminal (130) after receiving the activation information;
an activation module (250) for activating the account if the verification is successful.
9. A network terminal (120) comprising a processor (124) and a memory (122), the memory (122) storing machine executable instructions executable by the processor (124), the processor (124) being executable to implement the account activation method of any one of claims 1 to 6.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a controller, carries out the account activation method according to any one of claims 1 to 6.
CN201911021784.5A 2019-10-25 2019-10-25 Account activation method, account activation device, network terminal and computer readable storage medium Active CN110717173B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911021784.5A CN110717173B (en) 2019-10-25 2019-10-25 Account activation method, account activation device, network terminal and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911021784.5A CN110717173B (en) 2019-10-25 2019-10-25 Account activation method, account activation device, network terminal and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN110717173A true CN110717173A (en) 2020-01-21
CN110717173B CN110717173B (en) 2021-07-16

Family

ID=69214254

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911021784.5A Active CN110717173B (en) 2019-10-25 2019-10-25 Account activation method, account activation device, network terminal and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN110717173B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114531613A (en) * 2022-02-17 2022-05-24 北京麦多贝科技有限公司 Video encryption processing method and device, electronic equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102231766A (en) * 2011-07-28 2011-11-02 北京蓝汛通信技术有限责任公司 Method and system for analyzing and verifying domain name
CN105915343A (en) * 2016-04-08 2016-08-31 金蝶软件(中国)有限公司 Registered user off line activation method and system
CN107733776A (en) * 2016-08-12 2018-02-23 阿里巴巴集团控股有限公司 The template configuration method and device of account number activation message
CN107800693A (en) * 2017-10-12 2018-03-13 深圳盈诺德信息技术有限公司 User activating method, device and storage medium based on Enterprise Resources Plan

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102231766A (en) * 2011-07-28 2011-11-02 北京蓝汛通信技术有限责任公司 Method and system for analyzing and verifying domain name
CN105915343A (en) * 2016-04-08 2016-08-31 金蝶软件(中国)有限公司 Registered user off line activation method and system
CN107733776A (en) * 2016-08-12 2018-02-23 阿里巴巴集团控股有限公司 The template configuration method and device of account number activation message
CN107800693A (en) * 2017-10-12 2018-03-13 深圳盈诺德信息技术有限公司 User activating method, device and storage medium based on Enterprise Resources Plan

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114531613A (en) * 2022-02-17 2022-05-24 北京麦多贝科技有限公司 Video encryption processing method and device, electronic equipment and storage medium
CN114531613B (en) * 2022-02-17 2023-12-19 北京麦多贝科技有限公司 Video encryption processing method and device, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN110717173B (en) 2021-07-16

Similar Documents

Publication Publication Date Title
US10536470B2 (en) Securing services in a networked computing environment
US8590025B2 (en) Techniques for accessing a backup system
CN105530246A (en) Method, device and system for managing virtual machine
CN103139182B (en) A kind of method that user of permission accesses, client, server and system
CN107820702B (en) Management and control method, device and electronic equipment
CN106549976B (en) A kind of method for authenticating user identity and ' In System Reconfiguration Method suitable for transparent computing system
CN111817999A (en) User login method and device
CN106209569B (en) Authentication method and device for enterprise instant messaging
CN111414612A (en) Security protection method and device for operating system mirror image and electronic equipment
CN107483477B (en) Account management method and account management system
CN110717173B (en) Account activation method, account activation device, network terminal and computer readable storage medium
CN107508810B (en) Authentication management method, device and system based on mobile office application
CN110611650B (en) Smooth upgrading method for operation state PKI/CA authentication system
CN103559430A (en) Application account management method and device based on android system
US11874916B2 (en) User device authentication gateway module
CN110445791A (en) Plug-in authentication method and device, the storage method of plug-in authentication information and device
CN115941217B (en) Method for secure communication and related products
CN112367339B (en) System security login management method and device
CN108200013B (en) Cloud-based remote security access method, device and system
CN115086090A (en) Network login authentication method and device based on UKey
CN113852621A (en) License information determination method and device based on Jenkins server and storage medium
CN112269637A (en) Virtual machine data migration method and device
CN112966276A (en) Method, device and medium for safely starting computer
CN110808943A (en) Client connection emergency management method, client and computer readable storage medium
CN114124500B (en) Account management method, device and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant