CN114710355B - Login management method and system - Google Patents

Login management method and system Download PDF

Info

Publication number
CN114710355B
CN114710355B CN202210375684.8A CN202210375684A CN114710355B CN 114710355 B CN114710355 B CN 114710355B CN 202210375684 A CN202210375684 A CN 202210375684A CN 114710355 B CN114710355 B CN 114710355B
Authority
CN
China
Prior art keywords
login
information
target
password
mobile phone
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210375684.8A
Other languages
Chinese (zh)
Other versions
CN114710355A (en
Inventor
郭守朋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xian Wanxiang Electronics Technology Co Ltd
Original Assignee
Xian Wanxiang Electronics Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian Wanxiang Electronics Technology Co Ltd filed Critical Xian Wanxiang Electronics Technology Co Ltd
Priority to CN202210375684.8A priority Critical patent/CN114710355B/en
Publication of CN114710355A publication Critical patent/CN114710355A/en
Application granted granted Critical
Publication of CN114710355B publication Critical patent/CN114710355B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • Health & Medical Sciences (AREA)
  • Telephonic Communication Services (AREA)
  • Telephone Function (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The disclosure provides a login management method and system, relates to the technical field of electronic information, and can solve the problem of low efficiency when terminal equipment logs in a cloud mobile phone. The specific technical scheme is as follows: after logging in the cloud service, the terminal equipment acquires login information set by a user, and sets a password for logging in the cloud server through the login information. The present disclosure is for user login.

Description

Login management method and system
Technical Field
The disclosure relates to the technical field of electronic information, and in particular relates to a login management method and system.
Background
Along with the development of cloud computing, the development of cloud mobile phones is also improved, and the cloud mobile phones use cloud computing technology to realize remote cloud services through the cloud servers. The cloud mobile phone is generally a android virtual mobile phone system deployed on a server, mobile phone function services are provided through network management, and a user can own a cloud mobile phone by opening the cloud mobile phone services.
The cloud mobile phone is more and more convenient for users to use, and supports various customized services, and meanwhile, cloud space such as a network disk can be applied to expand functions of the mobile phone. The user can remotely log in a plurality of accounts through customizing different cloud mobile phones to perform network operation. In the prior art, a cloud server provides a login account and a login password for a user logged in by a terminal device, but the password is difficult to manage, the user forgets the password, the difficulty of logging in the server by the user is increased, and the efficiency of logging in the server by the user is also reduced.
Disclosure of Invention
The embodiment of the disclosure provides a login management method and a login management system, which can solve the problem of low efficiency when a user logs in a cloud mobile phone through terminal equipment. The technical scheme is as follows:
According to a first aspect of an embodiment of the present disclosure, there is provided a login management method, including:
After the terminal equipment successfully logs in the target cloud service end, password setting request information is generated and sent to the terminal equipment, the setting request information is used for requesting to set a login password of the target server, and the login password at least comprises one of biological characteristic information and gesture information of a user;
receiving target login information sent by terminal equipment through password setting request information;
And setting a target password for the terminal equipment to log in the target cloud server through the target login information.
In one embodiment, when the password setting request information is used to indicate setting of a login password of the target server by the fingerprint information, the method further includes:
when the terminal equipment is determined to support fingerprint information acquisition, acquiring target login information sent by the terminal equipment, wherein the target login information comprises fingerprint information of a target user;
And updating the password setting request information when the target terminal equipment is determined to be incapable of supporting fingerprint information acquisition.
In one embodiment, the target login information in the method includes:
multiple sets of gesture information, or multiple sets of fingerprint information;
or a combination of at least one set of gesture information and at least one set of facial feature information;
or a combination of at least one set of gesture information and at least one set of facial feature information and at least one set of fingerprint information.
In one embodiment, when the target login information includes the first login information and the second login information, a target password for the target user to login to the target cloud server is set, and the method further includes:
setting a target password of a first cloud mobile phone in a target cloud server by a target user according to the first login information;
and setting a target password of a second cloud mobile phone in the target cloud server by the target user through the second login information.
In one embodiment, the method further comprises:
setting a target password of a target application in a target cloud server by a target user through the first verification information;
when the target user logs in the target cloud server again, login verification is carried out through the target password;
after passing the verification, the target application is entered.
In one embodiment, the method further comprises:
Acquiring login information of a user;
According to the login information of the user, searching a target login password of the user, wherein the login password comprises a first login password for logging in a first cloud mobile phone and a second login password for logging in a second cloud mobile phone;
When the login information of the user is not matched with the first login password, the user exits from the login interface, and the login information of the user is acquired again;
and when the login information of the user is matched with the second login password, logging in the second cloud mobile phone.
In one embodiment, the method further comprises:
when detecting that the terminal equipment logs in, generating login prompt information, wherein the login prompt information is used for prompting that a login password is input through biological characteristic information or gesture information;
According to the login prompt information, login request information sent by a terminal device is obtained, the login request information is used for requesting to login a target cloud mobile phone or a target application in the target cloud mobile phone, the login request information and a login password at least comprise one of biological characteristic information and gesture information of a user;
According to the login request information, searching a preset password matched with the target cloud mobile phone or the target application;
when the login password is matched with the preset password, activating the permission of the terminal equipment to login the target cloud mobile phone or the target application in the target cloud mobile phone.
According to the login management method provided by the embodiment of the disclosure, after the terminal equipment logs in the cloud service, login information set by a user is obtained, and a password for logging in the cloud server is set through the login information, wherein the login information can be fingerprints, facial features, gesture information and the like of the user, so that the efficiency and the safety of the terminal equipment logging in the server are improved.
According to a second aspect of embodiments of the present disclosure, there is provided a user login system comprising: the cloud service end and the terminal equipment,
The cloud server is used for generating password setting request information after the terminal equipment successfully logs in the cloud server and sending the password setting request information to the terminal equipment, wherein the setting request information is used for requesting to set a login password of the target server, and the login password at least comprises one of biological characteristic information and gesture information of a user;
The terminal equipment is used for acquiring target login information according to the password setting request information and sending the target login information to the cloud server;
The cloud server is used for receiving target login information sent by the terminal equipment and setting a target password for the terminal equipment to log in a target cloud server through the target login information.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the disclosure and together with the description, serve to explain the principles of the disclosure.
FIG. 1 is a flow chart of a login management method provided by an embodiment of the present disclosure;
FIG. 1a is a schematic logic diagram of a login password setting in a login management method according to an embodiment of the present disclosure;
fig. 1b is a schematic logic diagram of fingerprint password setting in a login management method according to an embodiment of the present disclosure;
Fig. 1c is a logic schematic diagram of gesture information password setting in a login management method according to an embodiment of the present disclosure;
Fig. 1d is a logic schematic diagram of facial information password setting in a login management method according to an embodiment of the present disclosure;
FIG. 1e is a schematic diagram of password authentication in a login management method according to an embodiment of the present disclosure;
FIG. 1f is a schematic diagram of a verification interface in a login management method according to an embodiment of the present disclosure;
FIG. 1g is a schematic diagram of a password modification in a login management method according to an embodiment of the present disclosure;
fig. 2 is a block diagram of a login management system according to an embodiment of the present disclosure.
Detailed Description
Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numbers in different drawings refer to the same or similar elements, unless otherwise indicated. The implementations described in the following exemplary examples are not representative of all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with some aspects of the present disclosure as detailed in the accompanying claims.
The embodiment of the disclosure provides a login management method, as shown in fig. 1, which includes the following steps:
101. And after the target user successfully logs in the target cloud server, generating password setting request information and sending the password setting request information to the terminal equipment.
The setting request information is used for requesting to set a login password of a target server matched with a target user, and specifically logs in the target server through the biological characteristic information of the user, such as fingerprint information of the user or gesture information of the user.
The password setting request provided by the present disclosure may be a request to set a specific login password, for example, when the password setting request information is used to indicate a login password of a target server matched with a target user through fingerprint information, the method further includes:
when the target terminal equipment is determined to support fingerprint login information, acquiring target login information sent by the terminal equipment, wherein the target login information comprises fingerprint information of a target user;
and updating the password setting request information when the target terminal equipment is determined to be incapable of supporting the fingerprint login information.
In specific practice, as shown in fig. 1a, a user inputs an account number and a password to log in a cloud mobile phone service through an application client of a personal terminal device at a cloud mobile phone service end. When the terminal equipment is successfully logged in, the application client side judges whether the terminal equipment supports the fingerprint collection function or not, for example, a prompt box pops up on a display interface to prompt a user to input a fingerprint, and the fingerprint is used for the terminal equipment to subsequently log in the cloud mobile phone.
If the terminal device supports fingerprint entry, the user is required to enter a fingerprint.
If the terminal equipment does not support fingerprint input, the cloud mobile phone skips the input of fingerprint information, and sets a login password in other modes, such as gesture setting or face recognition.
Further, for the fingerprint information of the user input in the above steps, and the password for logging in the cloud mobile phone is set through the fingerprint information, in a specific implementation process, as shown in fig. 1b, when the method provided by the present disclosure sets the target password for logging in the target cloud server by the target user,
Whether the login information is independent fingerprint information can be judged first;
If the fingerprint information is single, acquiring the single fingerprint information to generate a login password, and determining a cloud mobile phone or a target application in the cloud mobile phone which the fingerprint information logs in;
If the fingerprint information is combined, sequentially acquiring the first fingerprint information to the Nth fingerprint information;
and setting the target virtual machine or target application in the target virtual machine matched with the fingerprint according to the acquired fingerprint information.
102. And obtaining target login information sent by the terminal equipment through the password setting request information.
The target login information is used for indicating to login to the target cloud server through the biometric information of the target user.
The target login information in the method provided by the disclosure comprises the following steps: multiple sets of gesture information, or multiple sets of fingerprint information;
or a combination of at least one set of gesture information and at least one set of facial feature information;
or a combination of at least one set of gesture information and at least one set of facial feature information and at least one set of fingerprint information.
In a specific implementation process, the target login information may be: the fingerprint can be a single fingerprint registered in a certain virtual machine, or can be a combination fingerprint registered in a certain virtual machine or a combination fingerprint registered in a specified application of a certain virtual machine.
Furthermore, the combined fingerprint in the login information can also set a plurality of fingerprints to operate to login the virtual machine or login a certain application, so that the login security is further improved.
Specific examples are set forth herein to illustrate how login information is set according to a gesture image, as shown in fig. 1c, the setting step comprising the following:
a determination is made as to whether to allow entry of the gesture image, such as after the fingerprint is not supported or the user completes the fingerprint or skips the fingerprint.
And when the permission of fingerprint input is determined, setting gesture graphs at an application client of the cloud mobile phone, and determining that each gesture graph is registered in a different android virtual machine.
Because the gesture graph memory may be inconvenient, the numbers in the nine-square grid can be memorized, and the prompting method can also prompt by referring to the numbers. Of course, other ways of facilitating memory and prompting methods may be used by the user.
Specific examples are set forth herein to illustrate how login information is set according to a gesture image and face information, as shown in fig. 1d, the setting step comprising the following:
and setting the virtual machines specified by face recognition login at the application client, and setting the virtual machines with different face recognition and gesture login.
The gesture graph and the face recognition are the same as the gesture and the fingerprint, and can be modified, deleted, direct application is modified and direct application is deleted.
The gesture graph is set by connecting a user equipment cloud mobile phone with a nine-square grid of a client, the gesture of face recognition is that a camera acquires face characteristics and gesture characteristics of a user, and the simple gesture can be 0-10 fingers standing up or an ok gesture and the like.
The terminal device may not record the gesture when the face is recognized for the first time, or the face is recorded again after all the face is deleted, or the face is recognized for the first time by another user, that is, when a person performs the face recognition for the first time in the application data.
When the application data has the data corresponding to the face recognition and the cloud mobile phone, the user is required to be logged in again, and when the gesture is the same as the existing gesture, the user is prompted that the gesture exists, and the user is required to log in again. If the face data is different, the gestures may be the same.
103. And setting a target password for a target user to log in a target cloud server according to the target login information.
In an optional embodiment, in the method provided by the disclosure, login information such as fingerprints, face recognition, gesture graphics and the like is set, and the login information is used for reaching a certain application in the cloud mobile phone after login.
In an optional embodiment, the setting the target password in the method provided by the present disclosure may be setting passwords of a plurality of cloud mobile phones, and specifically, when the target login information includes the first login information and the second login information, setting the target password for the target user to login to the target cloud server, further includes:
setting a target password of a first cloud mobile phone in a target cloud server by a target user according to the first login information;
and setting a target password of a second cloud mobile phone in the target cloud server by the target user through the second login information.
In a specific implementation process, as shown in fig. 1e, when target passwords of a plurality of cloud mobile phones are stored in a server, priority levels of different login information can be set, so that different cloud mobile phones can be logged in quickly and safely.
For example, when the terminal device supports fingerprint verification, according to the fingerprint priority principle, when the cloud server verifies fingerprint information sent by the terminal device, the terminal device is allowed to enter the cloud mobile phone corresponding to the fingerprint.
Further, if the application which can be directly reached by the terminal equipment is set, the terminal equipment directly enters a starting interface of the cloud mobile phone direct application after verification of the fingerprint information.
And when the fingerprint function is supported in the cloud mobile phone, the android virtual machine supports the fingerprint function of the application in the virtual machine. At this time, when an application outside the desktop runs, the second fingerprint is verified, the cloud mobile phone cannot be switched, judgment is needed when the second fingerprint is verified after the cloud mobile phone returns to the desktop, and if verification is successful, the cloud mobile phone corresponding to the second fingerprint is switched to, and even the second cloud mobile phone directly applies. When only one cloud mobile phone data exists, the fingerprint verification is successful, and the fingerprint verification directly enters the cloud mobile phone or directly reaches the application. If no fingerprint is set, entering a gesture graph or a face recognition plus gesture verification interface, and if no fingerprint is set, directly displaying an account password entering interface.
In an optional embodiment, after the login password is set, the method provided in the present disclosure further verifies the login password, and specifically includes:
Acquiring login information of a user;
According to the login information of the user, searching a target login password of the user, wherein the login password comprises a first login password for logging in a first cloud mobile phone and a second login password for logging in a second cloud mobile phone;
When the login information of the user is not matched with the first login password, the user exits from the login interface, and the login information of the user is acquired again;
and when the login information of the user is matched with the second login password, logging in the second cloud mobile phone.
In an optional embodiment, the setting of the target password in the method provided by the present disclosure may be setting a plurality of passwords for logging in the cloud mobile phone, for example, the target password may be logged in through a gesture or may be logged in through a fingerprint. When there are two or more verification methods, the corresponding verification methods may be selected for verification. The android virtual machine can be replaced in the application client through different verification modes, and verification can be performed through a method of checking prompt login.
As shown in fig. 1f, the cloud server stores multiple login modes, each group of login modes has a matched cloud mobile phone end, and a user can log in the cloud mobile phone according to different login modes. When the terminal equipment logs in the cloud mobile phone, the cloud server side can generate prompt information to prompt a user to adopt a login mode supported by the terminal equipment, the terminal equipment collects login information input by the user and sends the login information to the cloud server side, and when the login information passes verification, the user logs in the target cloud mobile phone.
In an optional embodiment, after the target password is set, the method provided by the disclosure may further modify the target password, and specifically includes:
acquiring modification request information, wherein the modification request information is used for indicating a login password of a cloud server logged in by modification terminal equipment;
according to the modification request information, searching a cloud server;
And modifying the login password of the target application according to the verification information.
Specifically, as shown in fig. 1g, the method provided by the present disclosure may modify a fingerprint password when logging in a cloud mobile phone, and delete a fingerprint when logging in the cloud mobile phone; or the fingerprint information is reserved, but the target application corresponding to the fingerprint password is modified, or the target application corresponding to the fingerprint password is modified.
According to the login management method provided by the embodiment of the disclosure, after the terminal equipment logs in the cloud service, login information set by a user is obtained, and a password for logging in the cloud server is set through the login information, wherein the login information can be fingerprints, facial features, gesture information and the like of the user, so that the efficiency and the safety of the terminal equipment logging in the server are improved.
The login management method provided by the invention is designed according to the requirement of a certain application operation scene by combining the application multi-account number with the cloud mobile phone and fingerprint verification. If a user can set a certain android virtual machine through a single finger fingerprint, log-in of the android virtual machine can be performed through two or more combined fingerprints, and a direct application program after log-in verification can be set, so that great convenience is brought to the user. Likewise, the user can log in different android virtual machines through different gesture graphs or face recognition plus gestures.
Example two
Based on the login management method described in the embodiment corresponding to fig. 1, the following is an embodiment of the apparatus of the present disclosure, which may be used to execute an embodiment of the method of the present disclosure.
The disclosed embodiment provides a user login system, as shown in fig. 2, the user login system 20 includes: a terminal device 201 and a cloud service end 202,
A terminal device 201, configured to log in to a cloud server 202;
The cloud server 202 is configured to generate password setting request information after the terminal device 201 successfully logs in the cloud server 202, and send the password setting request information to the terminal device 201, where the setting request information is used to request to set a login password of the target server, and the login password at least includes one of biometric information and gesture information of a user;
the terminal device 201 is configured to obtain target login information according to the password setting request information, and send the target login information to the cloud server;
The cloud server 202 is configured to receive target login information sent by the terminal device, and set a target password for the terminal device to login to the target cloud server according to the target login information.
In one embodiment, the terminal device 202 in the present system is further configured to:
Collecting at least one group of biological characteristic information or gesture information according to the password setting request information;
Determining the at least one group of biological characteristic information or gesture information to log in a cloud mobile phone or a target application in the cloud mobile phone;
and generating target login information according to at least one group of biological characteristic information or gesture information and at least one group of biological characteristic information or gesture information or target application in the cloud mobile phone.
In one embodiment, the terminal device 202 in the present system is further configured to:
When the password setting request information requests to set the password through the first type information, the terminal equipment judges whether the acquisition of the first type information is supported or not, wherein the first type information comprises one of fingerprint login, face login or gesture login;
and when the terminal equipment does not support the acquisition of the first type information, informing the cloud service end of switching the type of the password setting.
According to the login management system provided by the embodiment of the disclosure, after the terminal equipment logs in the cloud service, login information set by a user is obtained, and a password for logging in the cloud server is set through the login information.
According to another aspect of the embodiment of the present invention, there is also provided a computer storage medium, where the computer storage medium includes a stored program, and when the program runs, the device on which the computer storage medium is controlled to execute any one of the login management methods described above.
Alternatively, in this embodiment, the above-mentioned computer storage medium may be located in any one of the computing devices in the computing device group in the computer network, or in any one of the mobile terminals in the mobile terminal group.
Optionally, in the present embodiment, the computer readable storage medium is configured to store program code for performing the steps of: acquiring data to be transmitted; determining whether to delete data to be transmitted or not according to the buffer delay, wherein the buffer delay is the delay time of the data to be transmitted in a buffer area of a transmitting end; deleting the data to be deleted from the data to be transmitted under the condition of determining to delete the data to be transmitted, and obtaining target data, wherein the data to be deleted is determined according to a preset coding rule, and the preset coding rule is used for coding the data to be transmitted; and sending the target data into a user login channel for transmission.
According to another aspect of the embodiment of the present invention, there is further provided a processor, configured to execute a program, where the program executes the method for transmitting any one of the data.
The foregoing embodiment numbers of the present invention are merely for the purpose of description, and do not represent the advantages or disadvantages of the embodiments.
In the foregoing embodiments of the present invention, the descriptions of the embodiments are emphasized, and for a portion of this disclosure that is not described in detail in this embodiment, reference is made to the related descriptions of other embodiments.
In the several embodiments provided in the present application, it should be understood that the disclosed technology may be implemented in other manners. The above-described embodiment of the apparatus is merely exemplary, and the division of the unit may be a logic function division, and there may be another division manner when actually implemented, for example, a plurality of units or components may be combined or may be integrated into another system, or some features may be omitted or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be through some interfaces, units or modules, or may be in electrical or other forms.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed over a plurality of units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in the embodiments of the present invention may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied essentially or partly in the form of a software product or all or part of the technical solution, which is stored in a storage medium, and includes several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to perform all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a usb disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a removable hard disk, a magnetic disk, or an optical disk, or other various media capable of storing program codes.
The foregoing is merely a preferred embodiment of the invention, and it should be noted that modifications and adaptations to those skilled in the art may be made without departing from the principles of the present invention, which are intended to be comprehended within the scope of the present invention.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This application is intended to cover any adaptations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.

Claims (9)

1. A login management method, which is applied to a cloud server, the method comprising:
After the terminal equipment successfully logs in the target cloud server, password setting request information is generated and sent to the terminal equipment, wherein the setting request information is used for requesting to set a login password of the target cloud server, and the login password at least comprises one of biological characteristic information and gesture information of a user;
receiving target login information sent by terminal equipment through password setting request information;
setting a target password for the terminal equipment to log in a target cloud server through the target login information;
When detecting that the terminal equipment logs in, generating login prompt information, wherein the login prompt information is used for prompting that a login password is input through biological characteristic information or gesture information;
According to the login prompt information, login request information sent by a terminal device is obtained, the login request information is used for requesting to login a target cloud mobile phone or a target application in the target cloud mobile phone, the login request information and a login password at least comprise one of biological characteristic information and gesture information of a user;
Searching a preset password matched with the target cloud mobile phone or the target application according to the login request information;
when the login password is matched with the preset password, activating the permission of the terminal equipment to login the target cloud mobile phone or the target application in the target cloud mobile phone.
2. The method according to claim 1, wherein when the password setting request information is for indicating that a login password of a target cloud server is set by fingerprint information, the method further comprises:
when the terminal equipment is determined to support fingerprint information acquisition, acquiring target login information sent by the terminal equipment, wherein the target login information comprises fingerprint information of a target user;
And updating the password setting request information when the target terminal equipment is determined to be incapable of supporting fingerprint information acquisition.
3. The method of claim 1, wherein the target login information comprises:
multiple sets of gesture information, or multiple sets of fingerprint information;
or a combination of at least one set of gesture information and at least one set of facial feature information;
or a combination of at least one set of gesture information and at least one set of facial feature information and at least one set of fingerprint information.
4. The method of claim 1, wherein when the target login information includes first login information and second login information, the setting the target password includes:
setting a target password of a first cloud mobile phone in a target cloud server by a target user according to the first login information;
and setting a target password of a second cloud mobile phone in the target cloud server by the target user through the second login information.
5. The method according to claim 1, wherein the method further comprises:
setting a target password of a target application in a target cloud server by a target user through the first verification information;
when the target user logs in the target cloud server again, login verification is carried out through the target password;
after passing the verification, the target application is entered.
6. The method according to claim 1, wherein the method further comprises:
Acquiring login information of a user;
Searching a target login password of the user according to the login information of the user, wherein the login password comprises a first login password for logging in a first cloud mobile phone and a second login password for logging in a second cloud mobile phone;
When the login information of the user is not matched with the first login password, the user exits from the login interface, and the login information of the user is acquired again;
and when the login information of the user is matched with the second login password, logging in the second cloud mobile phone.
7. A login management system is characterized in that the system comprises a cloud service end and terminal equipment,
The cloud server is used for generating password setting request information after the terminal equipment successfully logs in the cloud server and sending the password setting request information to the terminal equipment, wherein the setting request information is used for requesting to set a login password of a target cloud server, and the login password at least comprises one of biological characteristic information and gesture information of a user;
The terminal equipment is used for acquiring target login information according to the password setting request information and sending the target login information to the cloud server;
The cloud server is used for receiving target login information sent by the terminal equipment and setting a target password for the terminal equipment to log in a target cloud server through the target login information;
The cloud service end is used for generating login prompt information when the login of the terminal equipment is detected, wherein the login prompt information is used for prompting the input of a login password through biological characteristic information or gesture information;
According to the login prompt information, login request information sent by a terminal device is obtained, the login request information is used for requesting to login a target cloud mobile phone or a target application in the target cloud mobile phone, the login request information and a login password at least comprise one of biological characteristic information and gesture information of a user;
Searching a preset password matched with the target cloud mobile phone or the target application according to the login request information;
when the login password is matched with the preset password, activating the permission of the terminal equipment to login the target cloud mobile phone or the target application in the target cloud mobile phone.
8. The system of claim 7, wherein the terminal device in the system is further configured to:
Collecting at least one group of biological characteristic information or gesture information according to the password setting request information;
Determining at least one group of biological characteristic information or gesture information to log in a cloud mobile phone or a target application in the cloud mobile phone;
and generating target login information according to at least one group of biological characteristic information or gesture information and at least one group of biological characteristic information or gesture information or target application in the cloud mobile phone.
9. The system of claim 7, wherein the terminal device in the system is further configured to:
when the password setting request information requests to set the password through the first type information, the terminal equipment judges whether the acquisition of the first type information is supported or not, wherein the first type information comprises one of fingerprint login, face login or gesture login;
and when the terminal equipment does not support the acquisition of the first type information, informing the cloud service end of switching the type of the password setting.
CN202210375684.8A 2022-04-11 2022-04-11 Login management method and system Active CN114710355B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210375684.8A CN114710355B (en) 2022-04-11 2022-04-11 Login management method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210375684.8A CN114710355B (en) 2022-04-11 2022-04-11 Login management method and system

Publications (2)

Publication Number Publication Date
CN114710355A CN114710355A (en) 2022-07-05
CN114710355B true CN114710355B (en) 2024-05-17

Family

ID=82173358

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210375684.8A Active CN114710355B (en) 2022-04-11 2022-04-11 Login management method and system

Country Status (1)

Country Link
CN (1) CN114710355B (en)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103607387A (en) * 2013-11-14 2014-02-26 中国科学技术大学 A network login authentication cloud service system based on face identification and a method
CN103975567A (en) * 2012-11-14 2014-08-06 华为技术有限公司 Dual-factor authentication method and virtual machine device
CN104717261A (en) * 2013-12-17 2015-06-17 华为技术有限公司 Login method and desktop management device
CN105187362A (en) * 2014-06-23 2015-12-23 中兴通讯股份有限公司 Method and device for connection authentication between desktop cloud client and server-side
CN105282092A (en) * 2014-06-10 2016-01-27 中兴通讯股份有限公司 Virtual desktop authentication method, terminal and server
CN106228046A (en) * 2016-07-11 2016-12-14 佛山杰致信息科技有限公司 A kind of multi-cipher system
CN111756808A (en) * 2020-05-28 2020-10-09 西安万像电子科技有限公司 Data processing method and system
CN111932246A (en) * 2020-08-06 2020-11-13 北京百度网讯科技有限公司 Method and apparatus for transmitting information
CN112835680A (en) * 2021-01-30 2021-05-25 浪潮云信息技术股份公司 Method for automatically setting password of Windows operating system virtual machine
CN113676528A (en) * 2021-08-12 2021-11-19 北京百度网讯科技有限公司 Synchronization method, device, equipment and medium for login account
CN113709151A (en) * 2021-08-26 2021-11-26 北京百度网讯科技有限公司 Method, apparatus, device, medium and product for logging in cloud application

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103975567A (en) * 2012-11-14 2014-08-06 华为技术有限公司 Dual-factor authentication method and virtual machine device
CN103607387A (en) * 2013-11-14 2014-02-26 中国科学技术大学 A network login authentication cloud service system based on face identification and a method
CN104717261A (en) * 2013-12-17 2015-06-17 华为技术有限公司 Login method and desktop management device
CN105282092A (en) * 2014-06-10 2016-01-27 中兴通讯股份有限公司 Virtual desktop authentication method, terminal and server
CN105187362A (en) * 2014-06-23 2015-12-23 中兴通讯股份有限公司 Method and device for connection authentication between desktop cloud client and server-side
CN106228046A (en) * 2016-07-11 2016-12-14 佛山杰致信息科技有限公司 A kind of multi-cipher system
CN111756808A (en) * 2020-05-28 2020-10-09 西安万像电子科技有限公司 Data processing method and system
CN111932246A (en) * 2020-08-06 2020-11-13 北京百度网讯科技有限公司 Method and apparatus for transmitting information
CN112835680A (en) * 2021-01-30 2021-05-25 浪潮云信息技术股份公司 Method for automatically setting password of Windows operating system virtual machine
CN113676528A (en) * 2021-08-12 2021-11-19 北京百度网讯科技有限公司 Synchronization method, device, equipment and medium for login account
CN113709151A (en) * 2021-08-26 2021-11-26 北京百度网讯科技有限公司 Method, apparatus, device, medium and product for logging in cloud application

Also Published As

Publication number Publication date
CN114710355A (en) 2022-07-05

Similar Documents

Publication Publication Date Title
US9762573B2 (en) Biometric framework allowing independent application control
CN105100108B (en) A kind of login authentication method based on recognition of face, apparatus and system
CN104902028B (en) A kind of a key login authentication method, apparatus and system
CN103716483B (en) Communication system, client device, trunking and method
WO2019232996A1 (en) Video-based service processing system and method, user terminal, and storage medium
US20130055362A1 (en) Authenticating via mobile device
CN110691085B (en) Login method, login device, password management system and computer readable medium
CN108877098B (en) Cardless withdrawal method, device, system, storage medium and electronic equipment
US20180262495A1 (en) Method and apparatus for data transmission between terminals
CN108280642A (en) Debit card Activiation method, equipment, system and computer readable storage medium
CN105141427A (en) Login authentication method, device and system based on voiceprint recognition
CN108337251A (en) Bank card phone number changes implementation method, equipment, system and storage medium
JP6104439B1 (en) Authentication system, method, program, and recording medium recording the program
CN108337235B (en) Method and system for executing security operation by using security device
CN106469269B (en) A kind of method, apparatus and terminal of Password Management
JP6505573B2 (en) Authentication system, authentication server, business server and user terminal
JP2007316962A (en) Worker management method, and information processor, worker terminal and program used therefor
CN108270789A (en) Internetbank activating method, equipment, system and computer readable storage medium
CN114710355B (en) Login management method and system
KR20200006991A (en) Method, system and medium for authenticating a user using biometric signatures
CN208766775U (en) Mobile power source leased machine
CN105701392B (en) Information processing method and electronic equipment
CN108682080A (en) Mobile power rent method and mobile power leased machine
JP6441544B2 (en) Information device operation system, information device operation method, and program
US11128620B2 (en) Online verification method and system for verifying the identity of a subject

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant