CN115242476B - Login verification method, login verification device, login verification medium and electronic equipment - Google Patents

Login verification method, login verification device, login verification medium and electronic equipment Download PDF

Info

Publication number
CN115242476B
CN115242476B CN202210832350.9A CN202210832350A CN115242476B CN 115242476 B CN115242476 B CN 115242476B CN 202210832350 A CN202210832350 A CN 202210832350A CN 115242476 B CN115242476 B CN 115242476B
Authority
CN
China
Prior art keywords
user
login
parameter
robot
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210832350.9A
Other languages
Chinese (zh)
Other versions
CN115242476A (en
Inventor
吴燕芸
凌圆梦
万永辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Keenlon Intelligent Technology Co Ltd
Original Assignee
Shanghai Keenlon Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Keenlon Intelligent Technology Co Ltd filed Critical Shanghai Keenlon Intelligent Technology Co Ltd
Priority to CN202210832350.9A priority Critical patent/CN115242476B/en
Publication of CN115242476A publication Critical patent/CN115242476A/en
Application granted granted Critical
Publication of CN115242476B publication Critical patent/CN115242476B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/02Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Environmental & Geological Engineering (AREA)
  • Manipulator (AREA)

Abstract

The embodiment of the application discloses a login verification method, a login verification device, a login verification medium and electronic equipment. The method comprises the following steps: in response to detecting that the vendor information control is clicked, determining the number of times that the vendor information control is continuously clicked; if the vendor information control is continuously clicked for a set number of times, checking the current network state; if the current network state is a networking state, displaying a user login page, and acquiring user account information through the user login page; and verifying the user operation authority based on the user account information, and determining a user login result according to the authority verification result. According to the technical scheme, the validity of login verification can be improved, and the safety of data is further improved.

Description

Login verification method, login verification device, login verification medium and electronic equipment
Technical Field
The present disclosure relates to the field of computer applications, and in particular, to a login verification method, device, medium, and electronic apparatus.
Background
With the continuous development of robot technology, robots are gradually involved in the work and life of people. In order to better provide services for the robot, an equipment maintenance inlet is generally arranged at the robot end, and the setting data of the robot can be changed through the equipment maintenance inlet to cope with the conditions of service scene change, service demand upgrading or machine operation faults and the like.
The setting data of the robot not only comprises basic settings, but also super settings. Wherein the basic setting relates to an application layer and can be opened to a common user. Super settings involve the system floor, typically only open to the operation and maintenance personnel. In order to avoid the machine operation fault caused by the common user changing the super setting of the robot through the equipment maintenance entrance, the login equipment maintenance entrance needs to carry out login verification.
In the related art, aiming at a device maintenance inlet in a robot, the device maintenance inlet can be often accessed through obvious buttons such as 'system setting', and the like, and login verification is mostly performed through a preset digital password, and under the condition that a user input password is successfully matched with the preset digital password, the login verification is successful. The login verification method for the preset password login provided by the related technology has the problem of low security.
Disclosure of Invention
The application provides a login verification method, a login verification device, a login verification medium and electronic equipment, which can achieve the purpose of improving the effectiveness of login verification and further improving the safety of data.
According to a first aspect of the present application, there is provided a login verification method applied to a robot, the method comprising:
In response to detecting that the vendor information control is clicked, determining the number of times that the vendor information control is continuously clicked;
if the vendor information control is continuously clicked for a set number of times, checking the current network state;
if the current network state is a networking state, displaying a user login page, and acquiring user account information through the user login page;
and verifying the user operation authority based on the user account information, and determining a user login result according to the authority verification result.
According to a second aspect of the present application, there is provided a login authentication device configured in a robot, the device comprising:
the clicking times determining module is used for determining the continuous clicking times of the vendor information control in response to the fact that the vendor information control is detected to be clicked;
the network state checking module is used for checking the current network state if the vendor information control is continuously clicked for a set number of times;
the user account information acquisition module is used for displaying a user login page if the current network state is a networking state, and acquiring user account information through the user login page;
and the user login result determining module is used for verifying the user operation permission based on the user account information and determining a user login result according to the permission verification result.
According to a third aspect of the present invention, embodiments of the present application provide a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements a login authentication method as described in embodiments of the present application.
According to a fourth aspect of the present invention, an embodiment of the present application provides an electronic device, including a memory, a processor, and a computer program stored on the memory and executable by the processor, where the processor executes the computer program to implement a login verification method according to an embodiment of the present application.
According to the technical scheme, the manufacturer information control is set as the user login inlet, so that the concealment of the user login inlet is improved, when the fact that the manufacturer information control is continuously clicked for a set number of times is detected, the robot is triggered to check the current network state, the user login intention can be determined, and the situation that the user touches the manufacturer information control by mistake is eliminated. According to the embodiment of the application, the user login page is displayed under the condition that the current network state is the networking state, so that the robot and the robot management server can conduct data communication conveniently, the robot management server can assist the robot in verifying the user operation authority of user account information, networking is convenient to record login information, and follow-up tracing is convenient. Furthermore, the user account information is acquired through the user login page, the user operation permission is verified based on the user account information, the user login result is determined according to the permission verification result, the login verification effectiveness is improved, and the data security is improved.
It should be understood that the description of this section is not intended to identify key or critical features of the embodiments of the application or to delineate the scope of the application. Other features of the present application will become apparent from the description that follows.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are needed in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1A is a flow chart of a login verification method provided according to a first embodiment;
FIG. 1B is a schematic diagram of a user login entry provided according to one embodiment;
FIG. 2 is a flow chart of a login verification method provided according to a second embodiment;
FIG. 3 is a flow chart of a login verification method provided according to a third embodiment;
fig. 4 is a schematic structural diagram of a login verification device according to a fourth embodiment of the present application;
fig. 5 is a schematic structural diagram of an electronic device according to a fifth embodiment of the present application.
Detailed Description
In order to make the present application solution better understood by those skilled in the art, the following description will be made in detail and with reference to the accompanying drawings in the embodiments of the present application, it is apparent that the described embodiments are only some embodiments of the present application, not all embodiments. All other embodiments, which can be made by one of ordinary skill in the art based on the embodiments herein without making any inventive effort, shall fall within the scope of the present application.
It should be noted that the terms "first," "second," "target," and "candidate" in the description and claims of the present application and the above figures are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that embodiments of the present application described herein may be implemented in sequences other than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
Example 1
Fig. 1A is a flowchart of a login verification method according to an embodiment, which is applicable to a case of changing setting data of a robot through a device maintenance portal, and the method may be performed by a login verification device, which may be implemented in the form of hardware and/or software and may be integrated into an electronic device, such as a robot, running the system.
As shown in fig. 1A, the method includes:
and S110, in response to detecting that the vendor information control is clicked, determining the continuous times of clicking the vendor information control.
The vendor information control is generally used for displaying manufacturer information of the robot. Optionally, the vendor information control is a text box provided with manufacturer information. In order to improve the concealment of the user login entry, the embodiment of the application takes the vendor information control as the user login entry. The user login page may be entered through a vendor information control. The vendor information control can be displayed through a man-machine interaction interface configured on the robot.
The robot determines a number of consecutive clicks of the vendor information control in response to detecting that the vendor information control is clicked. The continuous clicking times can be determined according to the total clicking times in a preset time interval after the first clicking operation. I.e. a click operation having a time interval from the first click operation that is less than a preset time interval, may be determined to belong to a continuous click.
And S120, if the manufacturer information control is continuously clicked for a set number of times, checking the current network state.
And triggering the robot to check the current network state under the condition that the vendor information control is continuously clicked for a set number of times. The number of times of setting is determined according to the actual service requirement, which is not limited herein. For example, the setting times can be 3 times or more, and the preset time interval is 1s, and when the user clicks three times or more within 1s, the user can determine that the vendor information control is continuously clicked for the setting times. The robot checks the current network state, specifically, whether itself is in a networking state.
The trigger condition of the robot for checking the current network state is determined as the set times of continuous clicking of the vendor information control, so that the login intention of the user can be determined, and the situation that the user touches the vendor information control by mistake is eliminated.
If the vendor information control is not continuously clicked for a set number of times, the robot does not check the current network state.
And S130, if the current network state is a networking state, displaying a user login page, and acquiring user account information through the user login page.
And if the current network state is the networking state, the robot displays the user login page. The user login page is used for acquiring user account information. Optionally, the user account information includes: user identity information and login authorization information. Optionally, the robot displays the user login page through a man-machine interaction interface, and the man-machine interaction interface can be arranged on the robot, for example, can be a display screen of the robot.
The current network state is a networking state, so that the robot and the robot management server can perform data communication conveniently, the robot management server can assist the robot in verifying the user operation authority of user account information, namely, the operation authority information can be stored in a cloud end, and local storage resources are saved. And the network is convenient for recording login information, and the follow-up tracing is convenient.
And when the robot detects that the vendor information control is continuously clicked for a set number of times and the current network state is a networking state, the robot displays a user login page.
If the current network state is a broken network state, the robot can generate networking prompt information and display the networking prompt information through a man-machine interaction interface so as to prompt a user to execute networking operation.
Fig. 1B is a schematic diagram of a user login entry provided according to an embodiment, and referring to fig. 1B, a text box labeled with the word "manufacturer AAA robot manufacturing company" is shown as a vendor information control in a black rectangle. And under the condition that the vendor information control is continuously set for times and the current network state is the networking state, verifying the user operation authority of the user account information, and determining a user login result according to the authority verification result. Optionally, under the condition that the user logs in successfully, the setting change page is displayed.
In an alternative embodiment, the user login page includes at least two user login modes; the user login mode is used for acquiring user identity information; the user login mode comprises at least two of the following modes: account password login, account verification code login or application code scanning login.
The user login mode is used for acquiring user identity information and login authorization information. The user login page at least comprises two kinds of account password login, account verification code login or application code scanning login. The account password login is performed through an account and a preset password; the account verification code login is to log in through an account and an instant verification code; application code scanning login refers to graphic code login by application program scanning. The graphic code comprises account information and is used for acquiring login authorization information. Optionally, the graphic code is a two-dimensional code. According to the technical scheme, at least two login modes of account password login, account verification code login or application code scanning login are provided on the user login page, so that common login requirements are basically met, and the scene applicability of the login verification method is improved. According to the technical scheme, the user login mode capable of acquiring the user identity information is set, so that the user identity information can be conveniently determined, technical support is provided for ensuring traceability of the set parameters, and the data security is improved.
It should be noted that, in the embodiment of the present application, the user login mode does not include the preset password login, because when the user login mode is the login mode of the preset password login, the identity information of the login user cannot be obtained, the login person cannot be distinguished, and the tracing of the operator after the setting parameter is changed cannot be ensured.
And S140, verifying the user operation authority based on the user account information, and determining a user login result according to the authority verification result.
Based on the user account information, the user operation authority is verified, and the resource use right corresponding to the user account information is actually determined. The user operation rights of different user account information may be different, i.e. the general user cannot enter the super setting page, and the operation and maintenance personnel can. Even for operation and maintenance personnel, different authorities may exist, and the robot determines a user login result according to the authority verification result, and in fact determines whether to open to the user account information and which resources are opened.
And verifying the user operation authority based on the user account information, and optionally, when the current network state is a networking state, the robot generates an authority verification request aiming at the user account information, sends the authority verification request to the robot management server, requests the robot management server to verify the user operation authority of the user account information according to the authority verification request, and feeds back an authority verification result. And the robot determines a user login result according to the authority verification result.
Of course, it is understood that in the case where the robot locally stores user authority information, the user operation authority of the user account information may be locally verified at the robot.
According to the technical scheme, the manufacturer information control is set as the user login inlet, so that the concealment of the user login inlet is improved, when the fact that the manufacturer information control is continuously clicked for a set number of times is detected, the robot is triggered to check the current network state, the user login intention can be determined, and the situation that the user touches the manufacturer information control by mistake is eliminated. According to the embodiment of the application, the user login page is displayed under the condition that the current network state is the networking state, so that the robot and the robot management server can conduct data communication conveniently, the robot management server can assist the robot in verifying the user operation authority of user account information, networking is convenient to record login information, and follow-up tracing is convenient. Furthermore, the user account information is acquired through the user login page, the user operation permission is verified based on the user account information, the user login result is determined according to the permission verification result, the login verification effectiveness is improved, and the data security is improved.
In an alternative embodiment, the method further comprises: responding to the detection that the vendor information control is continuously clicked for a set number of times, and inquiring the latest user login result; if the user login result is that the user login is successful, determining successful login time; determining a relative time interval between a current login time and the successful login time; and if the relative time interval is smaller than the preset time interval, displaying a setting change page.
The user login result comprises login success and login failure. And under the condition that the login result of the user is successful, the robot displays a setting change page according to the user operation authority of the user account information, and opens corresponding resources to the user.
The robot detects that the vendor information control is continuously clicked for a set number of times, and the login intention of the user can be clarified. Under the condition that the user login intention is clear, the robot inquires the latest user login result, and if the latest user login result is that the user login is successful, the successful login time is determined. Generally, the successful login time is earlier than the current login time. The current login time is determined according to the time when the vendor information control is detected to be continuously clicked for a set number of times. A relative time interval between the current login time and the successful login time is determined. If the relative time interval is smaller than the preset time interval, login verification is not needed again, and the setting change page is directly displayed. The preset time interval is determined according to the actual service requirement, and is not limited herein. The preset time interval may be, for example, 10 minutes.
According to the technical scheme, the user account information passes login verification at the successful login time. The user logs in again within the preset time interval and does not carry out login verification, so that the login verification flow can be simplified, the login verification time is saved, and the setting change efficiency is improved.
Example two
Fig. 2 is a flowchart of a login verification method according to a second embodiment. The embodiment further optimizes the operation based on the embodiment, specifically refines the operation of verifying the user operation authority based on the user account information and determining the user login result according to the authority verification result.
As shown in fig. 2, the method includes:
and S210, in response to detecting that the vendor information control is clicked, determining the continuous times of clicking the vendor information control.
S220, if the vendor information control is continuously clicked for a set number of times, checking the current network state.
And S230, if the current network state is a networking state, displaying a user login page, and acquiring user account information through the user login page.
S240, based on the user identity information and the login authorization information in the user account information, whether the user account information is legal or not is checked.
The user identity information corresponds to login authorization information, the user identity information is used for defining the user identity, and the login authorization information is used for further determining whether the current login user is the user represented by the user identity information. The user identity information and the login authorization information are related to the user login mode, the user login modes are different, and the user identity information and the login authorization information may be different. The user identity information may be a user name or a cell phone number, for example. The login authorization information can be an account password, a mobile phone verification code or an authorized device identifier.
The user login modes are different, and the validity verification flow of the user account information is different. When the user login mode is account password login, the user identity information is an account, and the login authorization information is a password, the legality verification process of the user account information is as follows: and checking whether the formats of the account number and the password are correct, and under the condition that the formats of the account number or the password are incorrect, controlling the login control by the robot to be invalid, for example, the robot can gray the login button. And under the condition that the account number and the password are in the correct format, checking whether the account number exists, and under the condition that the account number exists, further determining whether the account number and the password are corresponding. If the account number corresponds to the password, determining that the user account number information is legal; otherwise, determining that the user account information is illegal.
When the user login mode is account verification code login, the user identity information is account, and the login authorization information is verification code, the legality verification flow of the user account information is as follows: and checking whether the format of the account is correct, and under the condition that the format of the account is incorrect, controlling the login control by the robot to be invalid, for example, the robot can gray the login button. And under the condition that the format of the account is correct, acquiring the verification code and verifying the format of the verification code, and under the condition that the format of the verification code is correct, further determining whether the content of the verification code is correct. If the content of the verification code is correct, determining that the user account information is legal; otherwise, determining that the user account information is illegal.
When the user login mode is application code scanning login, the user logs in by setting application software, the user identity information is an account number which is logged in the setting application software, and the login authorization information is an authorized equipment identifier, the validity checking flow of the user account number information is as follows: verifying whether the graphic code scanned by the authorization device is valid, and updating the graphic code for rescanning by the authorization device if the graphic code scanned by the authorization device is invalid. Verifying whether the account corresponding to the authorized equipment identifier is consistent with the registered account in the application software or not under the condition that the graphic code is effective, and determining that the user account information is legal under the condition that the two accounts are consistent; otherwise, determining that the user account information is illegal.
S250, if the user account information is legal, verifying whether a target user account to which the user account information belongs has a set change authority or not based on the user identity information.
The user account corresponding to the user account information is a target user account. The target user account is a legal account.
If the user account information is legal, the user account information has the resource use right, and whether the target user account to which the user account information belongs has the setting right is further verified based on the user identity information. Wherein, change the setting authority and be used for confirming the setting and changing the scope.
If the user account information is illegal, the user account information does not have the resource use right, and login failure information is generated to prompt the user to check the user identity information and the login authorization information.
And S260, if the target user account has the setting change permission, determining that the user login result is that the user login is successful, and displaying a setting change page.
Optionally, the modification setting authority includes a base modification authority and an advanced modification authority. If the target user account to which the user account information belongs has the setting change permission, further determining whether the setting change permission of the target user account is based on the change permission or the advanced change permission. Optionally, under the condition that the target user account has advanced modification authority, determining that the user login result is that the user login succeeds in displaying the setting modification page.
Optionally, the setting change page corresponding to the advanced change authority is a super setting page. The super setting relates to the bottom layer of the system, and the functions of automatic charging, software upgrading or log uploading and the like of the robot can be changed by changing the super setting.
The basic setting authority relates to an application layer, the working mode, the network state or the tone broadcasting function of the robot can be changed by changing the basic setting authority, the basic setting authority can be opened to a common user, and the basic setting authority corresponds to a basic setting page. Optionally, the basic setting page may be presented to the ordinary user without login verification.
Optionally, in this embodiment, the display screen of the robot may display a setting page to the user through the man-machine interaction page. The setting page comprises a basic setting page and a super setting page. The entry of the basic setting page is displayed on the man-machine interaction page in an obvious mode such as a conventional setting button, so that the user can conveniently use the basic setting page. And for the display of the super setting page, the schemes of hidden entry, continuous click triggering, networking verification and user permission verification in the embodiment are adopted, so that the two setting pages are distinguished, and the convenience of common setting and the security of super setting are considered. If the target user account has the setting modification permission, determining that the user login result is that the user login is successful, and displaying a setting modification page, specifically including: and if the target user account has the super setting change permission, determining that the user login result is that the user login is successful, and displaying a super setting change page.
According to the technical scheme, firstly, whether the user identity information is legal or not is verified, whether the target user account to which the user account information belongs has the setting change authority is verified under the condition that the user identity information is legal, and the robot only displays the setting change page under the condition that the user account information is legal and the target user account has the setting change authority.
In an alternative embodiment, after presenting the setting change page, the method further comprises: setting parameters corresponding to the parameter setting controls in the setting change page are determined to be candidate setting parameters; determining the parameter modification frequency of the candidate setting parameters; determining a target setting parameter from the candidate setting parameters based on the parameter modification frequency; reporting the parameter modification record of the target setting parameter and the robot model of the robot to which the target setting parameter belongs to a robot management server, so that the robot management server performs the following operations: acquiring service location information of a target robot to which the robot model belongs based on the robot model; and determining a frequent modification reason based on the service location information and the parameter modification record.
The setting change page is determined according to the setting change permission, the setting change permission is different, and specifically, parameter setting controls in the setting change page are different.
And determining the setting parameters corresponding to the parameter setting controls in the setting change page as candidate setting parameters, wherein the candidate setting parameters are related to the setting change page. For example, in the case of setting the page based on the setting modification page, the candidate setting parameters may include a working mode parameter, a network state parameter, a broadcast tone parameter, or a scene setting parameter, and in the case of the robot being a meal delivery robot, the working mode parameter may include a snack delivery mode, a dish delivery mode, and the like. In the case where the setting change page is a super setting page, the candidate setting parameters may include a power management parameter, a system setting parameter, a resource management parameter, and the like. Wherein the system setting comprises: software upgrade parameters, log upload parameters, and stereoscopic parameters.
The robot counts the parameter modification frequency of the candidate setting parameters in the setting modification page, and determines the target setting parameters in the candidate setting parameters based on the parameter modification frequency. The target setting parameters refer to candidate setting parameters with higher parameter modification frequency. Optionally, the robot ranks the candidate setting parameters according to the parameter modification frequency, for example, the robot may rank the candidate setting parameters with the parameter modification frequency ranked within the set range according to the order of the parameter modification frequency from large to small, and determine the candidate setting parameters as the target setting parameters.
And the robot reports the parameter modification record of the target setting parameter and the robot model of the robot to which the target setting parameter belongs to a robot management server. Wherein the parameter modification record is generated by the robot. The parameter modification record comprises the parameter change content before and after the target setting parameter is changed.
The robot management server is in communication connection with the robot, and is used for managing the robot. And the robot management server responds to the received parameter modification record of the robot model and the target setting parameter reported by the robot, and obtains the service place information of the target robot to which the robot model belongs based on the robot model. Wherein the service location information is used to analyze service location reasons for frequent parameter modifications. Optionally, the service location information includes a service location type, a service location environment, and the like. By way of example, service venue types may be hotels, restaurants, and hospitals. The service location environment may include aisle width, table layout, etc.
And the robot management server determines the frequent modification reason of the target setting parameters according to the service location information and the parameter modification record. For example, in the case where the target setting parameter is a stereoscopic parameter, the robot server analyzes a cause of frequent modification of the stereoscopic parameter according to the parameter modification record, the model of the robot, a default departure parameter of the stereoscopic parameter, and the like, and specifically, may analyze whether the stereoscopic parameter is frequently modified, is caused by a hardware problem, or is caused by an improper adaptation of the robot and the service location. The robot management server may further determine whether problems with frequent stereoscopic parameter modifications are prevalent in a particular robot model.
According to the technical scheme, the candidate setting parameters with higher modification frequency are used as the target setting parameters, the parameter modification records of the target setting parameters and the model of the robot to which the candidate setting parameters belong are sent to the robot management server, so that the robot management server analyzes frequent modification reasons based on the parameter modification records and the model of the robot, and the follow-up fault investigation reasons are facilitated.
Example III
Fig. 3 is a flowchart of a login authentication method provided according to a third embodiment. The embodiment further optimizes on the basis of the embodiment, specifically, after the setting change page is displayed, the additional operation determines parameters to be changed according to the control selection operation of the target user account acting on the parameter setting control in the setting change page; acquiring parameter changing contents aiming at the parameter to be changed, and changing the parameter to be changed according to the parameter changing contents to obtain a parameter changing result; and sending the parameter changing result to a robot management server. "
As shown in fig. 3, the method includes:
and S310, in response to detecting that the vendor information control is clicked, determining the continuous times of clicking the vendor information control.
S320, if the vendor information control is continuously clicked for a set number of times, checking the current network state.
And S330, if the current network state is a networking state, displaying a user login page, and acquiring user account information through the user login page.
S340, based on the user identity information and the login authorization information in the user account information, whether the user account information is legal or not is checked.
And S350, if the user account information is legal, verifying whether a target user account to which the user account information belongs has a setting change authority or not based on the user identity information.
And S360, if the target user account has the setting change permission, determining that the user login result is that the user login is successful, and displaying a setting change page.
And S370, determining parameters to be changed according to control selection operation of the target user account acting on the parameter setting control in the setting change page.
And the control selection operation is initiated through the target user account under the condition that the setting change requirement exists. The control selection operation has an effect object of setting parameter setting controls in a setting change page. Alternatively, the control selection operation may be a click operation for a parameter setting control. The setting parameters of the robot can be modified through the parameter setting control. Each parameter setting control is associated with a setting parameter. The parameter to be changed refers to the setting parameter associated with the parameter setting control selected by the control selection operation.
S380, acquiring parameter changing contents aiming at the parameter to be changed, and changing the parameter to be changed according to the parameter changing contents to obtain a parameter changing result.
The robot acquires parameter changing contents aiming at the parameters to be changed, and changes the parameters to be changed according to the parameter changing contents to obtain parameter changing results. Optionally, the parameter modification result includes: the parameter changing body and the parameter changing content. Optionally, the robot records the parameter change result. The parameter changing body refers to a target user account number for changing parameters to be changed.
S390, sending the parameter change result to a robot management server.
And the robot sends the parameter change result to the robot management server. And recording the parameter change result by the robot management server so as to ensure the traceability of the set parameters.
According to the technical scheme, parameters to be changed are determined according to control selection operation of a target user account acting on a parameter setting control in a setting change page; acquiring parameter changing contents aiming at parameters to be changed, and changing the parameters to be changed according to the parameter changing contents to obtain parameter changing results; and sending the parameter change result to the robot management server. The robot or the robot management server records the parameter change result, so that the traceability of the parameter change result is ensured.
In an optional embodiment, after the parameter to be changed is changed according to the parameter changing content, the method further includes: determining the parameter change content before and after the parameter to be changed is changed based on the parameter change result; establishing an association relationship between the parameter change content and the target user account; and generating a parameter modification record according to the association relation and the parameter change content.
The parameter change result comprises parameter change content and a parameter change main body. The parameter change content comprises original content before parameter change to be changed and changed content after parameter change to be changed.
The robot establishes an association relationship between the parameter change content and the target user account, and specifically, the robot associates the parameter change content of the parameter to be changed to a parameter changing main body of the parameter to be changed, namely, the parameter changing main body of the parameter to be changed to the target user account. In the case where any one of the parameter change content or the parameter modification record is known, another item can be determined based on the association relationship.
And the robot generates a parameter modification record according to the association relation and the parameter change content. The parameter modification record may be used to trace back the setting parameters, and may also be used to analyze the frequent modification reasons of the setting parameters. Optionally, the robot sends the parameter modification record to a robot management server.
According to the technical scheme, the robot records the parameter change content before and after the parameter to be changed is changed, and the parameter change content of the parameter to be changed is related to the target user account of the parameter to be changed, so that the traceability of the parameter to be changed is ensured to a specific user account, the traceability of the setting parameter is ensured, the running problem of the robot is conveniently examined, and the data security is improved.
Example IV
Fig. 4 is a schematic structural diagram of a login verification device according to a fourth embodiment of the present application, where the present embodiment is applicable to a case where setting data of a robot is changed through an equipment maintenance portal. The apparatus may be implemented in software and/or hardware and may be integrated in an electronic device such as a smart terminal.
As shown in fig. 4, the apparatus may include: the number of clicks determination module 410, the network status check module 420, the user account information acquisition module 430, and the user login result determination module 440.
A click number determining module 410, configured to determine, in response to detecting that the vendor information control is clicked, the number of continuous clicks of the vendor information control;
the network state checking module 420 is configured to check a current network state if the vendor information control is continuously clicked for a set number of times;
The user account information obtaining module 430 is configured to display a user login page if the current network state is a networking state, and obtain user account information through the user login page;
the user login result determining module 440 is configured to verify the user operation authority based on the user account information, and determine the user login result according to the authority verification result.
According to the technical scheme, the manufacturer information control is set as the user login inlet, so that the concealment of the user login inlet is improved, when the fact that the manufacturer information control is continuously clicked for a set number of times is detected, the robot is triggered to check the current network state, the user login intention can be determined, and the situation that the user touches the manufacturer information control by mistake is eliminated. According to the embodiment of the application, the user login page is displayed under the condition that the current network state is the networking state, so that the robot and the robot management server can conduct data communication conveniently, the robot management server can assist the robot in verifying the user operation authority of user account information, networking is convenient to record login information, and follow-up tracing is convenient. Furthermore, the user account information is acquired through the user login page, the user operation permission is verified based on the user account information, the user login result is determined according to the permission verification result, the login verification effectiveness is improved, and the data security is improved.
Optionally, the user login result determining module 440 includes: the user account information validity checking sub-module is used for checking whether the user account information is legal or not based on the user identity information and login authorization information in the user account information; the setting change permission verification sub-module is used for verifying whether a target user account to which the user account information belongs has setting change permission or not based on the user identity information if the user account information is legal; and the setting change page display sub-module is used for determining that the user login result is successful in user login if the target user account has the setting change authority and displaying the setting change page.
Optionally, the device further includes a parameter to be changed determining module, configured to determine a parameter to be changed according to a control selection operation of the target user account acting on a parameter setting control in the setting change page after the setting change page is displayed; the parameter to be changed changing module is used for obtaining parameter changing contents aiming at the parameter to be changed and changing the parameter to be changed according to the parameter changing contents to obtain a parameter changing result; and the parameter change result sending module is used for sending the parameter change result to the robot management server.
Optionally, the apparatus further includes: the parameter change content determining module is used for determining the parameter change content before and after the parameter to be changed is changed based on the parameter change result after the parameter to be changed is changed according to the parameter change content to obtain the parameter change result; the association relation establishing module is used for establishing an association relation between the parameter change content and the target user account; and the parameter modification record generation module is used for generating a parameter modification record according to the association relation and the parameter change content.
Optionally, the apparatus further includes: the candidate setting parameter determining module is used for determining setting parameters corresponding to parameter setting controls in the setting change page as candidate setting parameters after the setting change page is displayed; the parameter modification frequency determining module is used for determining the parameter modification frequency of the candidate setting parameters; a target setting parameter determining module, configured to determine a target setting parameter from the candidate setting parameters based on the parameter modification frequency; the related data reporting module is used for reporting the parameter modification record of the target setting parameter and the robot model of the robot to which the target setting parameter belongs to a robot management server, so that the robot management server executes the following operations: acquiring service location information of a target robot to which the robot model belongs based on the robot model; and determining a frequent modification reason based on the service location information and the parameter modification record.
Optionally, the apparatus further includes: the user login result query module is used for responding to the fact that the vendor information control is continuously clicked for a set number of times, and querying the latest user login result; the successful login time determining module is used for determining the successful login time if the user login result is that the user login is successful; a relative time interval determining module, configured to determine a relative time interval between a current login time and the successful login time; and the setting change page display module is used for displaying the setting change page if the relative time interval is smaller than the preset time interval.
Optionally, the user login page includes at least two user login modes; the user login mode is used for acquiring user identity information; the user login mode comprises at least two of the following modes: account password login, account verification code login or application code scanning login.
The login verification device provided by the embodiment of the invention can execute the login verification method provided by any embodiment of the application, and has the corresponding performance module and beneficial effects of executing the login verification method.
In the technical scheme of the disclosure, the acquisition, storage, application and the like of the related user personal information all conform to the regulations of related laws and regulations, and the public sequence is not violated.
Example five
Fig. 5 illustrates a schematic diagram of an electronic device 510 that can be used to implement an embodiment. The electronic device 510 includes at least one processor 511, and a memory, such as a Read Only Memory (ROM) 512, a Random Access Memory (RAM) 513, etc., communicatively coupled to the at least one processor 511, wherein the memory stores computer programs executable by the at least one processor, and the processor 511 may perform various suitable actions and processes in accordance with the computer programs stored in the Read Only Memory (ROM) 512 or the computer programs loaded from the storage unit 518 into the Random Access Memory (RAM) 513. In the RAM 513, various programs and data required for the operation of the electronic device 510 can also be stored. The processor 511, the ROM 512, and the RAM 513 are connected to each other by a bus 514. An input/output (I/O) interface 515 is also connected to bus 514.
Various components in the electronic device 510 are connected to the I/O interface 515, including: an input unit 516 such as a keyboard, a mouse, etc.; an output unit 517 such as various types of displays, speakers, and the like; a storage unit 518 such as a magnetic disk, optical disk, etc.; and a communication unit 519 such as a network card, modem, wireless communication transceiver, or the like. The communication unit 519 allows the electronic device 510 to exchange information/data with other devices via a computer network, such as the internet, and/or various telecommunications networks.
The processor 511 may be a variety of general and/or special purpose processing components with processing and computing capabilities. Some examples of processor 511 include, but are not limited to, a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), various specialized Artificial Intelligence (AI) computing chips, various processors running machine learning model algorithms, digital Signal Processors (DSPs), and any suitable processor, controller, microcontroller, etc. The processor 511 performs the respective methods and processes described above, such as a login authentication method.
In some embodiments, the login verification method may be implemented as a computer program tangibly embodied on a computer-readable storage medium, such as storage unit 518. In some embodiments, some or all of the computer program may be loaded and/or installed onto the electronic device 510 via the ROM 512 and/or the communication unit 519. When the computer program is loaded into RAM 513 and executed by processor 511, one or more steps of the login authentication method described above may be performed. Alternatively, in other embodiments, the processor 511 may be configured to perform the login verification method in any other suitable manner (e.g., by means of firmware).
Various implementations of the systems and techniques described here above can be implemented in digital electronic circuitry, integrated circuit systems, field Programmable Gate Arrays (FPGAs), application Specific Integrated Circuits (ASICs), application Specific Standard Products (ASSPs), systems On Chip (SOCs), complex Programmable Logic Devices (CPLDs), computer hardware, firmware, software, and/or combinations thereof. These various embodiments may include: implemented in one or more computer programs, the one or more computer programs may be executed and/or interpreted on a programmable system including at least one programmable processor, which may be a special purpose or general-purpose programmable processor, that may receive data and instructions from, and transmit data and instructions to, a storage system, at least one input device, and at least one output device.
A computer program for carrying out the methods of the present application may be written in any combination of one or more programming languages. These computer programs may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus, such that the computer programs, when executed by the processor, cause the functions/acts specified in the flowchart and/or block diagram block or blocks to be implemented. The computer program may execute entirely on the machine, partly on the machine, as a stand-alone software package, partly on the machine and partly on a remote machine or entirely on the remote machine or server.
In the context of this application, a computer-readable storage medium may be a tangible medium that can contain, or store a computer program for use by or in connection with an instruction execution system, apparatus, or device. The computer readable storage medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. Alternatively, the computer readable storage medium may be a machine readable signal medium. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
To provide for interaction with a user, the systems and techniques described here can be implemented on an electronic device having: a display device (e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor) for displaying information to a user; and a keyboard and a pointing device (e.g., a mouse or a trackball) through which a user can provide input to the electronic device. Other kinds of devices may also be used to provide for interaction with a user; for example, feedback provided to the user may be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and input from the user may be received in any form, including acoustic input, speech input, or tactile input.
The systems and techniques described here can be implemented in a computing system that includes a background component (e.g., as a data processing server), or that includes a middleware component (e.g., an application server), or that includes a front-end component (e.g., a user computer having a graphical user interface or a web browser through which a user can interact with an implementation of the systems and techniques described here), or any combination of such background, middleware, or front-end components. The components of the system can be interconnected by any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include: local Area Networks (LANs), wide Area Networks (WANs), blockchain networks, and the internet.
The computing system may include clients and servers. The client and server are typically remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other. The server can be a cloud server, also called a cloud computing server or a cloud host, and is a host product in a cloud computing service system, so that the defects of high management difficulty and weak service expansibility in the traditional physical hosts and VPS service are overcome.
It should be appreciated that various forms of the flows shown above may be used to reorder, add, or delete steps. For example, the steps described in the present application may be performed in parallel, sequentially, or in a different order, so long as the desired results of the technical solutions of the present application are achieved, and the present application is not limited herein.
The above embodiments do not limit the scope of the application. It will be apparent to those skilled in the art that various modifications, combinations, sub-combinations and alternatives are possible, depending on design requirements and other factors. Any modifications, equivalent substitutions and improvements made within the spirit and principles of the present application are intended to be included within the scope of the present application.

Claims (10)

1. A login verification method applied to a robot, the method comprising:
in response to detecting that the vendor information control is clicked, determining the number of times that the vendor information control is continuously clicked; the manufacturer information control is a text box configured on a man-machine interaction interface of the robot and provided with manufacturer information;
if the vendor information control is continuously clicked for a set number of times, checking the current network state;
If the current network state is a networking state, displaying a super-set user login page through the man-machine interaction interface, and acquiring user account information through the user login page;
verifying user operation authority based on the user account information, and determining a user login result according to the authority verification result, wherein the method comprises the following steps: generating a right verification request based on the user account information, and sending the right verification request to a robot management server so that the robot management server verifies the user operation right according to the right verification request; receiving the authority verification result fed back by the robot management server, and further determining the user login result according to the authority verification result;
if the current network state is a broken network state, networking prompt information is generated and displayed through the man-machine interaction interface so as to prompt a user to execute networking operation.
2. The method of claim 1, wherein verifying user operation rights based on the user account information and determining a user login result from the rights verification result, further comprises:
verifying whether the user account information is legal or not based on the user identity information and login authorization information in the user account information;
If the user account information is legal, verifying whether a target user account to which the user account information belongs has a set change authority or not based on the user identity information;
and if the target user account has the setting change permission, determining that the user login result is that the user login is successful, and displaying a setting change page.
3. The method of claim 2, wherein after presenting the settings change page, the method further comprises:
determining parameters to be changed according to control selection operation of the target user account acting on the parameter setting control in the setting change page;
acquiring parameter changing contents aiming at the parameter to be changed, and changing the parameter to be changed according to the parameter changing contents to obtain a parameter changing result;
and sending the parameter changing result to a robot management server.
4. A method according to claim 3, wherein after modifying the parameter to be modified according to the parameter modification content to obtain a parameter modification result, the method further comprises:
determining the parameter change content before and after the parameter to be changed is changed based on the parameter change result;
Establishing an association relationship between the parameter change content and the target user account;
and generating a parameter modification record according to the association relation and the parameter change content.
5. The method of claim 2, wherein after presenting the settings change page, the method further comprises:
setting parameters corresponding to the parameter setting controls in the setting change page are determined to be candidate setting parameters;
determining the parameter modification frequency of the candidate setting parameters;
determining a target setting parameter from the candidate setting parameters based on the parameter modification frequency;
reporting the parameter modification record of the target setting parameter and the robot model of the robot to which the target setting parameter belongs to the robot management server, so that the robot management server performs the following operations: acquiring service location information of a target robot to which the robot model belongs based on the robot model; and determining a frequent modification reason based on the service location information and the parameter modification record.
6. The method according to claim 1, wherein the method further comprises:
responding to the detection that the vendor information control is continuously clicked for a set number of times, and inquiring the latest user login result;
If the user login result is that the user login is successful, determining successful login time;
determining a relative time interval between a current login time and the successful login time;
and if the relative time interval is smaller than the preset time interval, displaying a setting change page.
7. The method of any of claims 1-6, wherein the user login page comprises at least two user login modes; the user login mode is used for acquiring user identity information; the user login mode comprises at least two of the following modes: account password login, account verification code login or application code scanning login.
8. A login authentication device configured in a robot, the device comprising:
the clicking times determining module is used for determining the continuous clicking times of the vendor information control in response to the fact that the vendor information control is detected to be clicked; the manufacturer information control is a text box configured on a man-machine interaction interface of the robot and provided with manufacturer information;
the network state checking module is used for checking the current network state if the vendor information control is continuously clicked for a set number of times;
The user account information acquisition module is used for displaying a super-set user login page through the man-machine interaction interface if the current network state is a networking state, and acquiring user account information through the user login page;
the user login result determining module is used for verifying the user operation permission based on the user account information and determining a user login result according to the permission verification result;
the user login result determining module is specifically configured to generate a permission verification request based on the user account information, and send the permission verification request to a robot management server, so that the robot management server verifies the user operation permission according to the permission verification request; receiving the authority verification result fed back by the robot management server, and further determining the user login result according to the authority verification result;
the network state checking module is specifically configured to generate networking prompt information if the current network state is a broken network state, and display the networking prompt information through the man-machine interaction interface to prompt a user to execute networking operation.
9. A computer-readable storage medium, on which a computer program is stored, characterized in that the program, when being executed by a processor, implements a login authentication method according to any one of claims 1-7.
10. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the login authentication method according to any one of claims 1-7 when executing the computer program.
CN202210832350.9A 2022-07-14 2022-07-14 Login verification method, login verification device, login verification medium and electronic equipment Active CN115242476B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210832350.9A CN115242476B (en) 2022-07-14 2022-07-14 Login verification method, login verification device, login verification medium and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210832350.9A CN115242476B (en) 2022-07-14 2022-07-14 Login verification method, login verification device, login verification medium and electronic equipment

Publications (2)

Publication Number Publication Date
CN115242476A CN115242476A (en) 2022-10-25
CN115242476B true CN115242476B (en) 2024-02-06

Family

ID=83672644

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210832350.9A Active CN115242476B (en) 2022-07-14 2022-07-14 Login verification method, login verification device, login verification medium and electronic equipment

Country Status (1)

Country Link
CN (1) CN115242476B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2009032166A (en) * 2007-07-30 2009-02-12 Nec Corp Communication method, communication system, and communication program
CN104601616A (en) * 2013-10-31 2015-05-06 腾讯科技(深圳)有限公司 Method, device and system for logging into wireless application protocol website
CN110719257A (en) * 2019-09-06 2020-01-21 平安国际智慧城市科技股份有限公司 Method, device and equipment for managing authority of single-page application and storage medium
CN110928791A (en) * 2019-11-27 2020-03-27 腾讯科技(深圳)有限公司 Program testing method, apparatus, computer equipment and storage medium
CN111596843A (en) * 2020-04-29 2020-08-28 维沃移动通信有限公司 Application login method, first electronic device and second electronic device
CN112651011A (en) * 2020-12-24 2021-04-13 深圳竹云科技有限公司 Login verification method, device and equipment for operation and maintenance system and computer storage medium
CN113806700A (en) * 2021-10-09 2021-12-17 深圳市潮流网络技术有限公司 Information display method and device
CN114647645A (en) * 2022-03-31 2022-06-21 上海甲佳智能科技有限公司 Operation and maintenance system of industrial mobile robot

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI580218B (en) * 2015-11-05 2017-04-21 Accelstor Inc A network device for temporary accessing a network setting and a method thereof

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2009032166A (en) * 2007-07-30 2009-02-12 Nec Corp Communication method, communication system, and communication program
CN104601616A (en) * 2013-10-31 2015-05-06 腾讯科技(深圳)有限公司 Method, device and system for logging into wireless application protocol website
CN110719257A (en) * 2019-09-06 2020-01-21 平安国际智慧城市科技股份有限公司 Method, device and equipment for managing authority of single-page application and storage medium
CN110928791A (en) * 2019-11-27 2020-03-27 腾讯科技(深圳)有限公司 Program testing method, apparatus, computer equipment and storage medium
CN111596843A (en) * 2020-04-29 2020-08-28 维沃移动通信有限公司 Application login method, first electronic device and second electronic device
CN112651011A (en) * 2020-12-24 2021-04-13 深圳竹云科技有限公司 Login verification method, device and equipment for operation and maintenance system and computer storage medium
CN113806700A (en) * 2021-10-09 2021-12-17 深圳市潮流网络技术有限公司 Information display method and device
CN114647645A (en) * 2022-03-31 2022-06-21 上海甲佳智能科技有限公司 Operation and maintenance system of industrial mobile robot

Also Published As

Publication number Publication date
CN115242476A (en) 2022-10-25

Similar Documents

Publication Publication Date Title
CN111695156A (en) Service platform access method, device, equipment and storage medium
US10999721B2 (en) Communication identifier binding processing method and terminal
CN111555920B (en) Intelligent operation and maintenance method, system, equipment and user side
CN111241523B (en) Authentication processing method, device, equipment and storage medium
CN109491733B (en) Interface display method based on visualization and related equipment
CN103546470A (en) Safe access method, system and device
KR20170095292A (en) Method and apparatus for providing authentication information on a web page
CN107231389B (en) Code scanning operation method and equipment
CN111078424A (en) Information interaction method and device, computer equipment and storage medium
CN115242476B (en) Login verification method, login verification device, login verification medium and electronic equipment
CN114238036A (en) Method and device for monitoring abnormity of SAAS (software as a service) platform in real time
CN113949578A (en) Traffic-based automatic detection method, device and computer equipment for unauthorized vulnerability
CN105373715A (en) Wearable device based data access method and apparatus
CN117938515A (en) Access request processing method and device, electronic equipment and storage medium
CN117527400A (en) Login authentication method and device, electronic equipment and storage medium
CN115065510A (en) Login method, device, system, electronic equipment and readable storage medium
CN114257451A (en) Verification interface replacing method and device, storage medium and computer equipment
CN112995143A (en) Safety reporting method, device, equipment and medium based on mail system
CN113765908B (en) Data acquisition method, device, equipment and storage medium
CN114884718B (en) Data processing method, device, equipment and storage medium
CN115297019B (en) Management method of Internet of things application platform, internet of things system, equipment and medium
CN112966244B (en) Multi-dimensional power grid information system access control method, system and storage medium
WO2022057595A1 (en) Marking information processing method and device, and storage medium
CN110674380B (en) Data query method, system, readable storage medium and intelligent device
CN117494200A (en) System access method and device, storage medium and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant