CN113987434B - User management method, system and medium of operating system based on cloud edge cooperation - Google Patents

User management method, system and medium of operating system based on cloud edge cooperation Download PDF

Info

Publication number
CN113987434B
CN113987434B CN202111637272.9A CN202111637272A CN113987434B CN 113987434 B CN113987434 B CN 113987434B CN 202111637272 A CN202111637272 A CN 202111637272A CN 113987434 B CN113987434 B CN 113987434B
Authority
CN
China
Prior art keywords
user
invitation
operating system
target user
random
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111637272.9A
Other languages
Chinese (zh)
Other versions
CN113987434A (en
Inventor
弓羽箭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Acoinfo Technology Co ltd
Original Assignee
Beijing Acoinfo Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Acoinfo Technology Co ltd filed Critical Beijing Acoinfo Technology Co ltd
Priority to CN202111637272.9A priority Critical patent/CN113987434B/en
Publication of CN113987434A publication Critical patent/CN113987434A/en
Application granted granted Critical
Publication of CN113987434B publication Critical patent/CN113987434B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates

Abstract

The invention provides a user management method, a system and a medium of an operating system based on cloud-edge cooperation, which enable a target user to obtain the authority of the operating system of an electronic device through an invitation mechanism and improve the accuracy and efficiency of user invitation. The method comprises the following steps: acquiring a user unique information identifier of a target user; configuring expected role authority for a target user by a system administrator, and generating a globally unique random invitation code through the operating system; sending invitation information containing a random invitation code to a target user through a preset communication channel; receiving a random invitation code submitted by a user; the operating system verifies the random invitation code submitted by the user and simultaneously verifies whether the user is matched with the random invitation code; if the user matches the random invitation code, the user becomes an authorized user of the operating system of the electronic device and obtains role rights configured by a system administrator for the target user.

Description

User management method, system and medium of operating system based on cloud edge cooperation
Technical Field
The invention belongs to the technical field of edge computing, and particularly relates to a user management method, a user management system and a user management medium for an operating system based on cloud edge cooperation.
Background
At present, with the rapid popularization of the internet of things and related communication technologies, more computing power is generated in the internet of things in the future, and in the era of comprehensive computing, edge computing is to be used as connecting end equipment and cloud to enable the end equipment, save equipment cost and bandwidth, and drive important power of new industry and economic growth. The operating system based on cloud edge cooperation is an intelligent edge computing operating system developed in the era of 'comprehensive computing'. At present, an operating system based on cloud edge cooperation lacks a user management mechanism suitable for an application scenario.
In a traditional computer operating system such as a windows system, an administrator creates a user name through a management interface, sets a password, gives authority to the user name and the password to become a system user, and informs corresponding personnel of the user name and the password through an e-mail, a short message and the like, so that the corresponding personnel can log in the system by means of the user name and the password. Because the current method can only be used as the user of the operating system by creating the user and adding the user, the risk of information transmission is increased, the efficiency is low, and the method is not suitable for the application scene of cloud-edge cooperation.
Disclosure of Invention
In order to solve the technical problems, the invention provides a user management method, a system and a medium for an operating system based on cloud-edge cooperation, which can solve the technical problems.
The invention discloses a user management method of an operating system based on cloud edge cooperation, which comprises the following steps:
step S1, acquiring a user unique information identifier of a target user;
step S2, configuring the expected role authority for the target user by the system administrator, and generating a globally unique random invitation code through the operating system;
step S3, sending invitation information containing the random invitation code to the target user according to the unique user information identifier;
step S4, receiving a random invitation code submitted by a user, wherein if the scene is an internet scene, after the target user receives and confirms the invitation information through the internet, the target user remotely accesses the operating system through a URL in the invitation information and submits the random invitation code; if the scene is off-line, the electronic equipment operating system disconnects the internet connection, and the target user submits the random invitation code when directly accessing the target electronic equipment through a local area network according to the URL in the invitation information;
step S5, the operating system verifies the random invitation code submitted by the user and simultaneously verifies whether the user is matched with the random invitation code;
and step S6, if the user is matched with the random invitation code, the user becomes an authorized user of the electronic equipment operating system, and the role authority configured by the system administrator for the target user is obtained.
According to the method of the first aspect of the present invention, in step S3, the invitation information includes the random invitation code, the user unique information identification, and an inviter.
The method according to the first aspect of the present invention, after the step S1 and before the step S3, further comprises:
acquiring first information of the target user corresponding to an invitation condition according to the unique user information identifier, and judging whether the target user meets the invitation condition or not according to the first information of the target user;
in step S3, if the target user satisfies the invitation condition, invitation information is sent to the target user.
According to the method of the first aspect of the present invention, in step S1, the user unique information identifier includes a mobile phone number.
According to the method of the first aspect of the present invention, the operating system is an operating system based on cloud-edge collaboration and installed on an edge computer, the edge computer is further installed with an authority management application, and a user terminal is installed with a client application corresponding to the authority management application;
in step S1, the edge computer receives the user unique information identifier of the target user, which is input by a system administrator through the client application;
in step S2, when determining that the target user meets the invitation condition according to the unique user information identifier, the rights management application configures an expected role right for the target user, and generates a rights management request including the unique user information identifier and the expected role right; the operating system receives the authority management request, distributes operating system authority consistent with the expected role authority for the target user after verification is passed, and generates a globally unique random invitation code;
in step S3, the edge computer generates the invitation information through the operating system and sends the invitation information;
in step S4, the target user receives the invitation information through the client application of the user terminal, and submits the random invitation code;
in step S5, the edge computer receives the random invitation code submitted by the target user through the operating system, and verifies whether the user unique information identifier of the user matches the random invitation code;
in step S6, if the matching result is obtained, the corresponding user identified by the user unique information becomes an authorized user of the operating system based on cloud-edge coordination, and obtains a role right configured by a system administrator for the target user.
According to the method of the first aspect of the present invention, in step S2, the operating system pre-allocates the target user to at least one of a plurality of user groups, the plurality of user groups having different permissions;
in step S6, if the user matches the random invitation code, the user is an authorized target user, and the user is formally assigned to a pre-assigned user group, so that the user has a system right corresponding to the user group to which the user belongs; and if the random invitation code or the information for rejecting the invitation information is not received within the preset time, deleting the target user from the pre-allocated affiliated user group.
The second aspect of the present invention discloses a user management system, which is used for user management of an operating system based on cloud-edge collaboration, and comprises:
the first processing module is configured to acquire a user unique information identifier of a target user;
the second processing module is configured to configure expected role authority for the target user by an operating system administrator, and generate a globally unique random invitation code through the operating system;
the third processing module is configured to send invitation information containing the random invitation code to a target user according to the unique user information identifier;
a fourth processing module configured to receive the random invitation code submitted by the user; if the target user is in a scene of connecting the Internet, after receiving and confirming the invitation information through the Internet, the target user remotely accesses the operating system through a URL (uniform resource locator) in the invitation information and submits the random invitation code; if the scene is off-line, the electronic equipment operating system disconnects the internet connection, and the target user submits the random invitation code when directly accessing the target electronic equipment through a local area network according to the URL in the invitation information;
the fifth processing module is configured to verify the random invitation code submitted by the user through the operating system and simultaneously verify whether the user is matched with the random invitation code;
and the sixth processing module is configured to enable the user to become an authorized user of the operating system of the electronic equipment and obtain the role authority configured for the target user by the system administrator if the user is matched with the random invitation code.
A third aspect of the invention discloses a computer-readable storage medium having a computer program stored thereon, which, when executed by a processor, performs the steps of any of the methods described above.
Therefore, the scheme provided by the invention is based on an invitation mechanism, the edge computer sends the invitation information to the target user capable of inviting, and the user can become the user of the operating system of the electronic equipment by confirming the invitation information. According to the method and the device, the invitation information is automatically and directionally sent to the target user through the equipment, and the precision and the efficiency of user invitation are improved. In addition, the method and the device directionally send the invitation information to the target user through the communication channel automatically established by the equipment instead of the traditional approaches of e-mails, short messages and the like, so that the risk of information transmission is reduced.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and other drawings can be obtained by those skilled in the art without creative efforts.
Fig. 1 is a flowchart of a user management method of an operating system based on cloud-edge collaboration according to an embodiment of the present invention;
FIG. 2 is a schematic diagram illustrating a user management method based on a cloud-edge collaborative application scenario;
FIG. 3 is a flowchart of a method for acquiring operating system permissions of an electronic device according to an embodiment of the present invention;
FIG. 4 is a block diagram of a user management system according to an embodiment of the present invention;
fig. 5 is a block diagram of an electronic device according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The application provides a user invitation scheme aiming at the authority management of an operating system, and the key point of the application is to use the user invitation scheme on the operating system.
The invention discloses a user management method of an operating system based on cloud edge cooperation. Fig. 1 is a flowchart of a system rights management method according to an embodiment of the present invention, as shown in fig. 1, the method includes:
step S1, acquiring a user unique information identifier of a target user;
step S2, configuring the expected role authority for the target user by the system administrator, and generating a globally unique random invitation code through the operating system;
step S3, sending invitation information containing random invitation codes to the target user according to the unique information identifier of the user;
step S4, receiving a random invitation code submitted by a user online or offline, wherein if the scene is a scene of connecting the Internet, a target user remotely accesses an operating system through a URL (uniform resource locator) in the invitation information and submits the random invitation code after receiving and confirming the invitation information through the Internet; if the scene is off-line, the electronic equipment operating system disconnects the internet connection, and a target user submits a random invitation code when directly accessing the target electronic equipment through a local area network according to the URL in the invitation information;
step S5, the operating system verifies the random invitation code submitted by the user and simultaneously verifies whether the user is matched with the random invitation code;
if the user matches the random invitation code, the user becomes an authorized user of the operating system of the electronic device and obtains role rights configured by the system administrator for the target user, step S6. If not, the user will not be able to obtain the corresponding rights.
In this embodiment, the target user obtains the operating system permission of the electronic device through the invitation mechanism, and specifically, in step S1, the user unique information identifier of the target user to be invited is obtained; step S2 configures the expected role authority for the target user, and step S3 sends invitation information to the user based on the obtained unique information identifier of the user, where the information specifically included in the invitation information is not limited as long as the user can know what system makes an invitation and how to respond subsequently in a specific application environment. And the user gives corresponding feedback according to the invitation information, or accepts the invitation or refuses the invitation or ignores the invitation, and the like. When accepting the invitation, the user equipment at least sends confirmation information of the invitation, and the confirmation information at least comprises a random invitation code. In step S4, the target user is made an authorized user of the operating system of the electronic device according to the confirmation information of the user' S invitation reception. If the user refuses the invitation or does not receive the user reply within the preset time, the target user cannot become the authorized user of the operating system of the electronic equipment. In this embodiment, the electronic device, whether online or offline, may receive the random invitation code submitted by the user.
In some embodiments, in the step S2, the invitation information includes an invitation code and the user unique information identification and inviter.
In some embodiments, after step S1 and before step S3, the method further comprises: acquiring first information of the target user corresponding to an invitation condition according to the unique user information identifier, and judging whether the target user meets the invitation condition or not according to the first information of the target user; and if the target user meets the invitation condition, sending invitation information to the target user.
The invitation condition may be preset. For example, when the invitation information is sent through a certain APP, the invitation condition may include at least: the target user is a registered user of the APP. In addition, the method can also comprise the following steps: the target user is not an authorized user of the electronic device operating system, or at least the right corresponding to the invitation information is not authorized to the target user before, that is, the target user has a need to be invited.
In some embodiments, in step S1, the user unique information identification includes a cell phone number.
In some embodiments, as shown in fig. 2, the operating system is an operating system based on cloud-edge collaboration installed on an edge computer, the edge computer further has a rights management application installed thereon, and the user terminal has a client application corresponding to the rights management application installed thereon. For example, a system administrator manages the operating system on the edge computer or other device using its own user terminal, such as its own mobile phone, illustratively, setting the rights of the operating system of the edge computer for user a, for example. The user A uses a user terminal of the user A, such as a mobile phone of the user A, to complete permission setting in a matching mode.
In some embodiments, the portion of the client application, i.e., the rights management application, that interacts with the user is projected to the user terminal.
In step S1, the edge computer receives the user unique information identifier of the target user, which is input by the system administrator through the client application;
in step S2, when determining that the target user satisfies the invitation condition according to the unique user information identifier, the rights management application configures an expected role right for the target user, and generates a rights management request including the unique user information identifier and the expected role right; the operating system receives the authority management request, distributes operating system authority consistent with the expected role authority for the target user after verification is passed, and generates a globally unique random invitation code;
in step S3, the edge computer generates and sends invitation information including a random invitation code, an inviter, and a unique information identifier of the target user through the operating system;
in step S4, the target user receives the invitation information through the client application of the user terminal, and submits a random invitation code;
in step S5, the edge computer receives the random invitation code submitted by the user through the operating system, and verifies whether the user unique information identifier of the user matches the random invitation code;
in step S6, if the matching result is obtained, the corresponding user identified by the unique user information becomes an authorized user of the operating system based on cloud-edge coordination, and obtains the role right configured by the system administrator for the target user.
In some embodiments, in step S2, the operating system pre-assigns the target user to at least one of a plurality of user groups, the plurality of user groups having different permissions;
in step S6, if the user matches the random invitation code, the user is an authorized target user, and the user is formally assigned to a pre-assigned user group, so that the user has a system right corresponding to the user group to which the user belongs. If not, the corresponding rights will not be obtained.
The device users (or users of the computer system) are divided into a plurality of user groups in the application program, and each user group respectively has different rights. Before sending the invitation information, the operating system pre-allocates the target user to at least one of a plurality of user groups, and the user receives the invitation, wherein the target user has the system authority corresponding to the user group to which the target user belongs. Pre-allocation is a temporary allocation with a time limit. And if the random invitation code or the information rejecting the invitation information is not received within the preset time, the operating system deletes the target user from the pre-allocated affiliated user group. Such time restrictions may be communicated to the target user in the invitation message.
As described above, the scheme provided by the invention sends the invitation information to the target user capable of inviting based on the invitation mechanism, and the user can become the user of the electronic equipment operating system by confirming the invitation information, thereby being convenient and fast. According to the method and the device, the invitation information is sent to the target user in a directional mode, so that the accuracy and the efficiency of user invitation are improved. Moreover, the invitation information is invalid after the preset time, and the safety of the operating system is ensured.
The scheme provided by the invention can provide invitation through two-dimensional codes, telephone numbers, URLs and the like, and the invitation is only required to be a unique identifier of a user, so that the application range is wide; on the other hand, the user management mechanism is suitable for an offline scene, and can be operated even if no network exists, and user management and user invitation can be carried out.
The following describes in detail a method for making a user become an operating system user of an electronic device through an invitation mechanism according to an embodiment.
As shown in fig. 3, the details are as follows:
1. the system administrator inputs the user unique information identification (such as a mobile phone number) of the target user in the application program.
The system administrator may be the user at the time of activating the device or may be a user invited by another administrator. The initial administrator is the first user to activate the device. According to the scheme, the target client can be invited to serve as an administrator, a user, a visitor and the like to give corresponding system permission.
2. The application program judges whether the target user is an inviteable user;
for example, the application determines whether the target user is an inviteable user: firstly, judging whether a user is a registered user; judging whether the target user is the user of the electronic equipment again, if the target user is a registered user but not the user of the electronic equipment, the target user can be invited; the application may then issue invitation information and invitation credentials to the user.
3. The administrator uses the application to send invitation information to the target user.
4. The target user logs in the application program through the unique information identifier (such as a mobile phone number) of the user and receives invitation information sent by a system administrator. The target user can become the user of the electronic equipment, namely the user of the computer operating system carried by the electronic equipment by confirming the invitation information.
The device user (or the user of the computer operating system) is divided into a plurality of user groups in the application program, and each user group has different authorities; the device user (or user of the computer system) may be invited, deleted and moved to other user groups.
Before sending the invitation information, the device allocates a user group with a certain right in advance to the target user to be invited. Each user group has different permissions, and correspondingly, for example, the user group is: administrator, user, visitor, public, blacklist, etc. And if the random invitation code or the information of refusing the invitation information is not received within the preset time, deleting the target user from the pre-allocated affiliated user group.
The method and the device judge whether the user can be invited or not through the screening condition, send the invitation information to the target user which can be invited, and the user can become the user of the computer operating system by confirming the invitation information. According to the method and the device, the invitation information is sent to the target user in a directional mode through the specific channel, and the accuracy and the efficiency of user invitation are improved.
As shown in fig. 4, a third aspect of the present invention discloses an operating system user management system based on cloud edge coordination, where the system 400 includes:
a first processing module 401 configured to obtain a user unique information identifier of a target user;
a second processing module 402, configured to configure, by an operating system administrator, a desired role right for a target user, and generate a globally unique random invitation code through the operating system;
a third processing module 403, configured to send invitation information including the random invitation code to a target user according to the user unique information identifier;
a fourth processing module 404 configured to receive the random invitation code submitted by the user; if the target user is in a scene of connecting the Internet, after receiving and confirming the invitation information through the Internet, the target user remotely accesses the operating system through a URL (uniform resource locator) in the invitation information and submits the random invitation code; if the scene is off-line, the electronic equipment operating system disconnects the internet connection, and the target user submits the random invitation code when directly accessing the target electronic equipment through a local area network according to the URL in the invitation information;
a fifth processing module 405 configured to verify, by the operating system, the random invitation code submitted by the user, and at the same time verify whether the user matches the random invitation code;
a sixth processing module 406 configured to become an authorized user of the operating system of the electronic device if the user matches the random invitation code, and obtain role rights configured by the system administrator for the target user.
A fourth aspect of the present invention discloses an electronic device, which includes a memory and a processor, where the memory stores a computer program, and the processor implements the steps in any of the user management methods when executing the computer program.
Fig. 5 is a block diagram of an electronic device according to an embodiment of the present invention, and as shown in fig. 5, the electronic device includes a processor, a memory, a communication interface, a display screen, and an input device, which are connected by a system bus. Wherein the processor of the electronic device is configured to provide computing and control capabilities. The memory of the electronic equipment comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The communication interface of the electronic device is used for carrying out wired or wireless communication with an external terminal, and the wireless communication can be realized through WIFI, an operator network, Near Field Communication (NFC) or other technologies. The display screen of the electronic equipment can be a liquid crystal display screen or an electronic ink display screen, and the input device of the electronic equipment can be a touch layer covered on the display screen, a key, a track ball or a touch pad arranged on the shell of the electronic equipment, an external keyboard, a touch pad or a mouse and the like.
It will be understood by those skilled in the art that the structure shown in fig. 5 is only a partial block diagram related to the technical solution of the present disclosure, and does not constitute a limitation to the electronic device to which the solution of the present disclosure is applied, and a specific electronic device may include more or less components than those shown in the drawings, or combine some components, or have different arrangements of components.
A fifth aspect of the present invention discloses a computer-readable storage medium, on which a computer program is stored, which, when executed by a processor, implements the steps in the user management method of any one of the above.
In summary, the present invention provides a user invitation scheme for an operating system, which determines whether a user can be invited by screening conditions, and sends invitation information to an inviteable target user, so that the user can become a user of the computer system by confirming the invitation information. According to the method and the device, the invitation information is sent to the target user in a directional mode through the specific channel, and the accuracy and the efficiency of user invitation are improved.
It should be noted that the technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, however, as long as there is no contradiction between the combinations of the technical features, the scope of the present description should be considered. The above examples only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (8)

1. A user management method of an operating system based on cloud edge cooperation is characterized by comprising the following steps:
step S1, acquiring a user unique information identifier of a target user;
step S2, configuring the expected role authority for the target user by the system administrator, and generating a globally unique random invitation code through the operating system;
step S3, sending invitation information containing the random invitation code to the target user according to the unique user information identifier;
step S4, receiving a random invitation code submitted by a user, wherein if the scene is an internet scene, after the target user receives and confirms the invitation information through the internet, the target user remotely accesses the operating system through a URL in the invitation information and submits the random invitation code; if the scene is off-line, the electronic equipment operating system disconnects the internet connection, and the target user submits the random invitation code when directly accessing the target electronic equipment through a local area network according to the URL in the invitation information;
step S5, the operating system verifies the random invitation code submitted by the user and simultaneously verifies whether the user is matched with the random invitation code;
step S6, if the user matches the random invitation code, the user becomes the authorized user of the electronic device operating system, and obtains the role authority configured by the system administrator for the target user;
the operating system is an operating system based on cloud edge cooperation and installed on an edge computer, the edge computer is also provided with an authority management application, and a user terminal is provided with a client application corresponding to the authority management application;
in step S1, the edge computer receives the user unique information identifier of the target user, which is input by a system administrator through the client application;
in step S2, when determining that the target user meets the invitation condition according to the unique user information identifier, the rights management application configures an expected role right for the target user, and generates a rights management request including the unique user information identifier and the expected role right; the operating system receives the authority management request, distributes operating system authority consistent with the expected role authority for the target user after verification is passed, and generates a globally unique random invitation code;
in step S3, the edge computer generates the invitation message through the operating system and sends the invitation message.
2. The user management method according to claim 1, wherein in step S3, the invitation information includes the random invitation code, the user unique information identification, and an inviter.
3. The user management method according to claim 1, wherein after step S1 and before step S3, the method further comprises:
acquiring first information of the target user corresponding to an invitation condition according to the unique user information identifier, and judging whether the target user meets the invitation condition or not according to the first information of the target user;
and if the target user meets the invitation condition, sending invitation information to the target user.
4. The user management method according to claim 1, wherein in step S1, the user unique information identifier includes a mobile phone number.
5. The user management method according to claim 1,
in step S4, the target user receives the invitation information through the client application of the user terminal, and submits the random invitation code;
in step S5, the edge computer receives the random invitation code submitted by the user through the operating system, and verifies whether the user unique information identifier of the user matches the random invitation code;
in step S6, if the matching result is obtained, the corresponding user identified by the user unique information becomes an authorized user of the operating system based on cloud-edge coordination, and obtains a role right configured by a system administrator for the target user.
6. The user management method according to any one of claims 1 to 5,
in step S2, the operating system pre-allocates the target user to at least one of a plurality of user groups, the user groups having different permissions;
in step S6, if the user matches the random invitation code, the user is an authorized target user, and the user is formally assigned to a pre-assigned user group, so that the user has a system right corresponding to the user group to which the user belongs; and if the random invitation code or the information for rejecting the invitation information is not received within the preset time, deleting the target user from the pre-allocated affiliated user group.
7. A user management system for user management of an operating system based on cloud-edge collaboration, comprising:
the first processing module is configured to acquire a user unique information identifier of a target user;
the second processing module is configured to configure expected role authority for the target user by an operating system administrator, and generate a globally unique random invitation code through the operating system;
the third processing module is configured to send invitation information containing the random invitation code to a target user according to the unique user information identifier;
a fourth processing module configured to receive the random invitation code submitted by the user; if the target user is in a scene of connecting the Internet, after receiving and confirming the invitation information through the Internet, the target user remotely accesses the operating system through a URL (uniform resource locator) in the invitation information and submits the random invitation code; if the scene is off-line, the electronic equipment operating system disconnects the internet connection, and the target user submits the random invitation code when directly accessing the target electronic equipment through a local area network according to the URL in the invitation information;
a fifth processing module, configured to verify, by the operating system, the random invitation code submitted by the user, and simultaneously verify whether the user matches the random invitation code;
a sixth processing module configured to, if the user matches the random invitation code, become an authorized user of the operating system of the electronic device, and obtain role rights configured by a system administrator for the target user;
the operating system is an operating system based on cloud edge cooperation and installed on an edge computer, the edge computer is also provided with an authority management application, and a user terminal is provided with a client application corresponding to the authority management application;
in the first module, the edge computer receives the user unique information identification of the target user, which is input by a system administrator through the client application;
in the second module, when the authority management application judges that the target user meets an invitation condition according to the user unique information identifier, configuring an expected role authority for the target user, and generating an authority management request containing the user unique information identifier and the expected role authority; the operating system receives the authority management request, distributes operating system authority consistent with the expected role authority for the target user after verification is passed, and generates a globally unique random invitation code;
in the third module, the edge computer generates the invitation information through the operating system and sends the invitation information.
8. A computer-readable storage medium, having stored thereon a computer program which, when executed by a processor, carries out the steps of the user management method of any one of claims 1 to 6.
CN202111637272.9A 2021-12-30 2021-12-30 User management method, system and medium of operating system based on cloud edge cooperation Active CN113987434B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111637272.9A CN113987434B (en) 2021-12-30 2021-12-30 User management method, system and medium of operating system based on cloud edge cooperation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111637272.9A CN113987434B (en) 2021-12-30 2021-12-30 User management method, system and medium of operating system based on cloud edge cooperation

Publications (2)

Publication Number Publication Date
CN113987434A CN113987434A (en) 2022-01-28
CN113987434B true CN113987434B (en) 2022-05-20

Family

ID=79734932

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111637272.9A Active CN113987434B (en) 2021-12-30 2021-12-30 User management method, system and medium of operating system based on cloud edge cooperation

Country Status (1)

Country Link
CN (1) CN113987434B (en)

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103812660B (en) * 2014-02-13 2018-09-14 陈炳福 A kind of invitation code for certification generates and methods for using them and system
US11122047B2 (en) * 2014-04-02 2021-09-14 Ctera Networks, Ltd. Invitation links with enhanced protection
CN109446084A (en) * 2018-10-26 2019-03-08 广州华多网络科技有限公司 User method and device are invited in TESTFLIGHT test outside a kind of end IOS
CN112231660A (en) * 2020-10-15 2021-01-15 浪潮云信息技术股份公司 Invitation code registration authorization implementation method and system based on permission distribution
CN112487253B (en) * 2020-11-03 2024-04-05 光蕊科技(深圳)有限公司 User invitation code generation method, verification method, device, equipment and storage medium

Also Published As

Publication number Publication date
CN113987434A (en) 2022-01-28

Similar Documents

Publication Publication Date Title
CN101753475B (en) Method and device for realizing real-time communication among a plurality of members in real-time communication group
US9531835B2 (en) System and method for enabling wireless social networking
WO2016165523A1 (en) Method for sharing cloud printer in cloud printing system, cloud server and cloud printing system
CN110602216B (en) Method and device for using single account by multiple terminals, cloud server and storage medium
CN101170732B (en) System and method of sharing contents using messenger
CN104767715A (en) Network access control method and equipment
US20070066280A1 (en) Connection management system, method and program
CN103327100A (en) Resource processing method and site server
CN103036902A (en) Login control method and login control system based on two-dimension code
CN110311880B (en) File uploading method, device and system
CN105519028A (en) Wireless system access control method and apparatus
CN105407041A (en) Method for adding group or friend, server, client and system
EP3599201A1 (en) Authorization management and authorization request of elevator service request
US10951616B2 (en) Proximity-based device authentication
CN111177690A (en) Two-dimensional code scanning login method and device
CN102130853A (en) Group message interaction realization method and system
CN104660405A (en) Business equipment authentication method and equipment
CN110691397B (en) WIFI sharing method, WIFI connection device and computer-readable storage medium
CN102971739B (en) Strength evidence protection account security is utilized to set
CN108711205B (en) Visitor authentication system of conference system
CN113987434B (en) User management method, system and medium of operating system based on cloud edge cooperation
CN105141624A (en) Login method, account management server and client system
CN111356090B (en) Networking method of network, device thereof, terminal and computer readable storage medium
CN102137045A (en) Method and system for implementing group information interaction on community platform
US9742776B2 (en) Contact identification validation via social invitation

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant