WO2017012212A1 - 一种信息处理方法、装置、系统及计算机存储介质 - Google Patents

一种信息处理方法、装置、系统及计算机存储介质 Download PDF

Info

Publication number
WO2017012212A1
WO2017012212A1 PCT/CN2015/091732 CN2015091732W WO2017012212A1 WO 2017012212 A1 WO2017012212 A1 WO 2017012212A1 CN 2015091732 W CN2015091732 W CN 2015091732W WO 2017012212 A1 WO2017012212 A1 WO 2017012212A1
Authority
WO
WIPO (PCT)
Prior art keywords
authentication information
login authentication
login
client
information
Prior art date
Application number
PCT/CN2015/091732
Other languages
English (en)
French (fr)
Inventor
郝志坚
朱钰
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Priority to US15/745,491 priority Critical patent/US20180212948A1/en
Priority to EP15898768.5A priority patent/EP3328013B1/en
Publication of WO2017012212A1 publication Critical patent/WO2017012212A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/629Protecting access to data via a platform, e.g. using keys or access control rules to features or functions of an application
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2131Lost password, e.g. recovery of lost or forgotten passwords

Definitions

  • the present invention relates to information processing technologies, and in particular, to an information processing method, apparatus, system, and computer storage medium.
  • terminals such as mobile phones, tablet computers, etc.
  • the information stored by users on the terminal is also increasing. Therefore, the security of the terminal is increasingly affected by the user. attention.
  • the user will set a password.
  • the password terminal is required to unlock.
  • different applications such as QQ, WeChat, etc.
  • the terminal is lost, the information stored on the terminal may be leaked.
  • a user name has only one password, and one-to-one correspondence is used. If the user forgets the password of an application, an application cannot be opened, although the password can be retrieved in some way. It will also cost a lot of time and effort.
  • embodiments of the present invention are directed to providing an information processing method, apparatus, system, and computer storage medium, which can easily invalidate a leaked password, prevent leakage of important data in the first time, and improve the security level of the terminal. .
  • An embodiment of the present invention provides an information processing method, where the method includes:
  • controlling the startup of the first object according to the determination result returned by the cloud server includes:
  • the client is controlled not to start the first object
  • the client is controlled to start the first object.
  • the method further includes:
  • the login registration information includes login authentication information for starting the first object, the login authentication information includes a user name and a password, and one user name corresponds to N different
  • the password of the level, N is a positive integer greater than or equal to 2;
  • An embodiment of the present invention further provides an information processing method, where the method includes:
  • the determining whether the login authentication information is correct and valid includes:
  • the login authentication information When it is determined that the login authentication information is correct and valid, determining whether the level is lower than the The login authentication information of the login authentication information, if present, sets the login authentication information whose level is lower than the login authentication information to an invalid state.
  • the method further includes:
  • the login registration information includes login authentication information for starting the first object
  • the login authentication information includes a username and a password
  • one username corresponds to N different levels of passwords, N a positive integer greater than or equal to 2;
  • the login registration information is stored, and the login registration information is managed and controlled.
  • the method further includes:
  • the login authentication information update request sent by the client is received, determining whether the first login authentication information is the highest level login authentication information;
  • the login authentication information includes a user name and a password, and one user name corresponds to M different levels of passwords, and M is a positive integer greater than or equal to 2.
  • An embodiment of the present invention further provides an information processing apparatus, where the apparatus includes:
  • the obtaining unit is configured to obtain login authentication information that is input by the user on the login interface of the client, where the login authentication information is used to start the first object;
  • the first sending unit is configured to send the login authentication information to the cloud server, to determine, by the cloud server, whether the login authentication information is correct and valid;
  • control unit configured to control the first object according to the judgment result returned by the cloud server Startup.
  • control unit is further configured to:
  • the client is controlled not to start the first object
  • the client is controlled to start the first object.
  • the acquiring unit is further configured to acquire login registration information input by the user on the registration interface of the client, where the login registration information includes login authentication information for starting the first object, and the login authentication information.
  • the login registration information includes login authentication information for starting the first object, and the login authentication information.
  • the first sending unit is further configured to send the login registration information to the cloud cloud server, to perform management control on the login registration information by the cloud cloud server.
  • An embodiment of the present invention further provides an information processing apparatus, where the apparatus includes:
  • a receiving unit configured to receive login authentication information sent by the client, where the login authentication information is used to start the first object
  • a determining unit configured to determine whether the login authentication information is correct and valid, and generate a determination result
  • the second sending unit is configured to return the determination result to the client, so that the client controls the startup of the first object according to the determination result.
  • the determining unit is further configured to:
  • the login authentication information is correct and valid, it is determined whether there is login authentication information whose level is lower than the login authentication information, and if yes, the login authentication information whose level is lower than the login authentication information is set to an invalid state.
  • the receiving unit is further configured to receive login registration information sent by the client, where the login registration information includes login authentication information used to start the first object, where The login authentication information includes a username and a password, and one username corresponds to N different levels of passwords, and N is a positive integer greater than or equal to 2;
  • the device also includes:
  • a management unit configured to store the login registration information and perform management control on the login registration information.
  • the determining unit is further configured to: when the receiving unit receives the correct and valid first login authentication information sent by the client, where the first login authentication information is used to start the first object If the receiving unit further receives the login authentication information update request sent by the client, determining whether the first login authentication information is the highest level login authentication information;
  • the management unit is further configured to:
  • the second sending unit is configured to send the prompt information to the client, so that the client prompts the user to input the login authentication information that meets the preset condition;
  • the previously stored login authentication information related to the first object is set to an invalid state, and the permission update indication is sent to the client by the second sending unit. Updating the stored login authentication information related to the first object according to the login authentication update information sent by the client received by the receiving unit; wherein the login authentication update information includes a user name and a password, and one user name corresponds to M different levels. Password, M is a positive integer greater than or equal to 2.
  • An embodiment of the present invention further provides an information processing system, where the system includes:
  • the client is configured to obtain login authentication information input by the user, where the login authentication information is used to start the first object, and the login authentication information is sent to the cloud server, to determine, by the cloud server, the login authentication information. Whether it is correct and effective; controlling the startup of the first object according to the judgment result returned by the cloud server;
  • the cloud server is configured to receive login authentication information sent by the client, where the The authentication information is used to start the first object; determine whether the login authentication information is correct and valid, and generate a determination result; and return the determination result to the client.
  • the client includes the information processing apparatus described above;
  • the cloud server includes the information processing apparatus described above.
  • An embodiment of the present invention provides a computer storage medium, where the computer storage medium stores a computer program, and the computer program is used to execute the information processing method described above.
  • the information processing method, the device, the system, and the computer storage medium provided by the embodiment of the present invention acquire the login authentication information input on the login interface of the client, where the login authentication information is used to start the first object;
  • the information is sent to the cloud server, so that the cloud server determines whether the login authentication information is correct and valid; and controls the startup of the first object according to the determination result returned by the cloud server.
  • the leaked password can be easily invalidated, the leakage of important data can be prevented in the first time, the security level of the mobile terminal is improved, and the user experience is improved.
  • FIG. 1 is a schematic flowchart 1 of an information processing method according to an embodiment of the present invention.
  • FIG. 2 is a second schematic flowchart of an information processing method according to an embodiment of the present invention.
  • FIG. 3 is a schematic flowchart 3 of an information processing method according to an embodiment of the present invention.
  • FIG. 4 is a schematic flowchart 4 of an information processing method according to an embodiment of the present invention.
  • FIG. 5 is a schematic flowchart 5 of an information processing method according to an embodiment of the present disclosure.
  • FIG. 6 is a first schematic structural diagram of an information processing apparatus according to an embodiment of the present disclosure.
  • FIG. 7 is a second schematic structural diagram of an information processing apparatus according to an embodiment of the present disclosure.
  • FIG. 8 is a schematic structural diagram of a structure of an information processing system according to an embodiment of the present invention.
  • FIG. 1 is a schematic flowchart 1 of an information processing method according to an embodiment of the present invention, which is applied to a terminal side. As shown in FIG. 1 , the information processing method mainly includes the following steps:
  • Step 101 Acquire login authentication information input by the user on the login interface of the client, where the login authentication information is used to start the first object.
  • the first object may be a terminal, or may be an application installed on the terminal.
  • the application includes an application that is included in the terminal, for example, an address book application, and the like; and also includes a third-party application installed by the user, for example, a game application, a live chat application, a mail application, and the like.
  • the login authentication information when the user inputs the login authentication information on the login interface of the client, the login authentication information may be input through handwriting input, or the login authentication information may be input through an input device (such as a keyboard, a mouse, etc.).
  • an input device such as a keyboard, a mouse, etc.
  • the login authentication information when the first object is an application, may include a username and a password; when the first object is a terminal (such as a mobile phone), if the terminal is input on the terminal The login authentication information may include only one password. If the login authentication information related to the terminal is input on another terminal, the login authentication information includes both the username of the terminal and a password.
  • the user name may be first information stored on a user identity card installed on the terminal, and the user identity card may be a SIM card or a UIM card. And the first information may be a SIM card number and a UIM card number.
  • Step 102 Send the login authentication information to the cloud server, so that the cloud server determines whether the login authentication information is correct and valid.
  • the cloud server stores login authentication information related to the first object.
  • Step 103 Control start of the first object according to the judgment result returned by the cloud server.
  • the controlling according to the judgment result returned by the cloud server may include:
  • the client is controlled not to start the first object
  • the client is controlled to start the first object.
  • the first object is an application
  • the application if the login authentication information is incorrect or correct but invalid, the application is not opened; if the login authentication information is correct and valid, the application is opened.
  • the terminal when the first object is a terminal, if the login authentication information is incorrect or correct but invalid, the terminal is unsuccessful; if the login authentication information is correct and valid, the terminal is successfully unlocked, thereby enabling the user to use
  • the terminal for example, browses content stored in the terminal.
  • the method may further include:
  • the login registration information includes login authentication information for starting the first object, the login authentication information includes a user name and a password, and one user name corresponds to N different
  • the password of the level, N is a positive integer greater than or equal to 2;
  • one of the N different levels of passwords belongs to the highest level, and the highest level password has the right to reset the login authentication information (which may include a username, and/or a password).
  • the first object can be started by inputting any one of the N different levels of passwords if the username is entered correctly. However, when you enter a password with a high level, the password with a low level is invalid.
  • the form of the password is not limited, and the password may be a number or a number. It is other forms such as graphics.
  • the terminal may be, for example, a mobile phone, a tablet computer, a notebook computer, or the like.
  • the user when the user uses the mobile phone, after the mobile phone wakes up, the user needs to input a password to unlock. At this time, the user can unlock the mobile phone by inputting any one of the N passwords; that is, as long as the user can remember the N One of the passwords can unlock the mobile phone, thus avoiding the cumbersome problem of recovering the password caused by the user's forgotten unique password.
  • the password since the password is stored in the cloud server, the security level of the mobile phone is improved. Even if the user inadvertently reveals a password, the person stealing the mobile phone opens the mobile phone with the leaked password, but the person stealing the mobile phone does not have the right to change the password; the user can input the user of the stolen mobile phone on other mobile phones.
  • the login authentication information input by the user on the login interface of the client is obtained by using the technical solution in the embodiment, where the login authentication information is used to start the first object, and the login authentication information is sent to the cloud server.
  • the cloud server determines whether the login authentication information is correct and valid; and controls the startup of the first object according to the judgment result returned by the cloud server; thus, the leaked password can be effectively invalidated, and the important time can be prevented in the first time.
  • the leakage of data improves the security level of the mobile terminal and improves the user experience.
  • FIG. 2 is a schematic flowchart 2 of an information processing method according to an embodiment of the present invention, and is applied to a terminal side. As shown in FIG. 2, the information processing method mainly includes the following steps:
  • Step 201 Acquire login registration information input by the user on the registration interface of the client.
  • the login registration information includes login authentication information for starting the first object, the login authentication information includes a username and a password, and one username corresponds to N different levels of passwords. N is a positive integer greater than or equal to 2.
  • the first object may be a terminal, or may be an application installed on the terminal.
  • the application includes an application that is included in the terminal, for example, an address book application, and the like; and also includes a third-party application installed by the user, for example, a game application, a live chat application, a mail application, and the like.
  • the first object can be started by inputting any one of the N different levels of passwords if the username is entered correctly. However, when you enter a password with a high level, the password with a low level is invalid.
  • one of the N different levels of passwords belongs to the highest level, and the highest level password has the right to reset the login authentication information (which may include a username, and/or a password).
  • the form of the password is not limited, and the password may be a number or other form such as a graphic.
  • Step 202 Send the login registration information to the cloud cloud server, to perform management control on the login registration information by the cloud cloud server.
  • Step 203 Acquire login authentication information input by the user on the login interface of the client, where the login authentication information is used to start the first object.
  • the login authentication information when the first object is an application, may include a username and a password; when the first object is a terminal (such as a mobile phone), if the terminal is input on the terminal The login authentication information may include only one password. If the login authentication information related to the terminal is input on another terminal, the login authentication information includes both the username of the terminal and a password.
  • the user name may be first information stored on a user identity card installed on the terminal, and the user identity card may be a SIM card or a UIM card. And the first information may be a SIM card number and a UIM card number.
  • Step 204 Send the login authentication information to the cloud server, so that the cloud server determines whether the login authentication information is correct and valid.
  • Step 205 Control start of the first object according to the determination result returned by the cloud server.
  • controlling the startup of the first object according to the determination result returned by the cloud server may include:
  • the client is controlled not to start the first object
  • the client is controlled to start the first object.
  • the first object is an application
  • the application if the login authentication information is incorrect or correct but invalid, the application is not opened; if the login authentication information is correct and valid, the application is opened.
  • the terminal when the first object is a terminal, if the login authentication information is incorrect or correct but invalid, the terminal is unsuccessful; if the login authentication information is correct and valid, the terminal is successfully unlocked, thereby enabling the user to use
  • the terminal for example, browses content stored in the terminal.
  • the terminal may be, for example, a mobile phone, a tablet computer, a notebook computer, or the like.
  • the login registration information input by the user on the registration interface of the client is obtained by using the technical solution in the embodiment; the login registration information is sent to the cloud cloud server, and the login registration information is managed by the cloud cloud server. Controlling; obtaining login authentication information input by the user on the login interface of the client, wherein the login authentication information is used to start the first object; and the login authentication information is sent to the cloud server, to be determined by the cloud server Whether the login authentication information is correct and valid; controlling the startup of the first object according to the judgment result returned by the cloud server; thus, the leaked password can be easily invalidated, and the leakage of important data can be prevented at the first time, and the mobile terminal is improved.
  • the security level has improved the user experience.
  • FIG. 3 is a schematic flowchart 3 of an information processing method according to an embodiment of the present disclosure, which is applied to a server side. As shown in FIG. 3, the information processing method mainly includes the following steps:
  • Step 301 The cloud server receives the login authentication information sent by the client, where the login authentication information is used to start the first object.
  • the first object may be a terminal, or may be an application installed on the terminal.
  • the application includes an application that is included in the terminal, for example, an address book application, and the like; and also includes a third-party application installed by the user, for example, a game application, a live chat application, a mail application, and the like.
  • Step 302 The cloud server determines whether the login authentication information is correct and valid, and generates a determination result.
  • the cloud server stores the login authentication information for starting the first object, where the login authentication information includes a user name and a password, and one user name corresponds to N different levels of passwords, and N is a positive integer greater than or equal to 2.
  • the login authentication information sent by the client includes the username and password.
  • the cloud server determines whether the password is one of the N passwords when the username is correct, and if yes, determines that the login authentication information is correct; if not, the determination The login authentication information is incorrect.
  • the user name B corresponds to five different levels of passwords, which are respectively recorded as password 1, password 2, password 3, password 4, and password 5; wherein the level of the password 1 ⁇ the level of the password 2 ⁇ the password 3 Level ⁇ level of password 4 ⁇ level of password 5; the user can start the first object using any one of the five passwords; when the user starts the first object with password 1, the five passwords are valid Password; when the user starts the first object with password 2, password 1 will be invalidated. Similarly, when the user starts the first object using the password 3, both the password 1 and the password 2 are invalidated. At this time, if the user still inputs the password 1 or the password 2, the password 1 or the password 2 is determined to be invalid. password.
  • the determining whether the login authentication information is correct and valid may include:
  • the login authentication information is correct and valid, it is determined whether there is login authentication information whose level is lower than the login authentication information, and if yes, the login authentication information whose level is lower than the login authentication information is set to an invalid state.
  • Step 303 The cloud server returns the determination result to the client, so that the client controls the startup of the first object according to the determination result.
  • the client when the result of the determination is that the login authentication information is incorrect or correct but invalid, the client does not start the first object; when the determination result is that the login authentication information is correct and When valid, the client starts the first object.
  • the cloud server receives the login authentication information sent by the client, where the login authentication information is used to start the first object, and the login authentication signal is determined by the technical solution in this embodiment. Whether the information is correct and valid, and generating a judgment result; returning the judgment result to the client, so that the client controls the startup of the first object according to the judgment result.
  • the cloud server can manage and control the login authentication information of the first object, which can easily invalidate the leaked password, prevent the leakage of important data in the first time, improve the security level of the mobile terminal, and improve the user's Use experience.
  • FIG. 4 is a schematic flowchart 4 of an information processing method according to an embodiment of the present disclosure, which is applied to a server side. As shown in FIG. 4, the information processing method mainly includes the following steps:
  • Step 401 The cloud server receives the login registration information sent by the client.
  • the login registration information includes login authentication information for starting the first object, the login authentication information includes a username and a password, and one username corresponds to N different levels of passwords, and N is a positive integer greater than or equal to 2.
  • Step 402 The cloud server stores the login registration information, and performs management control on the login registration information.
  • Step 403 The cloud server receives the login authentication information sent by the client, where the login authentication information is used to start the first object.
  • the first object may be a terminal, or may be an application installed on the terminal.
  • the application includes an application that is included in the terminal, for example, an address book application, and the like; and also includes a third-party application installed by the user, for example, a game application, a live chat application, a mail application, and the like.
  • Step 404 The cloud server determines whether the login authentication information is correct and valid, and generates a determination result.
  • the determining whether the login authentication information is correct and valid may include:
  • the login authentication information When it is determined that the login authentication information is correct and valid, determining whether the level is lower than the The login authentication information of the login authentication information, if present, sets the login authentication information whose level is lower than the login authentication information to an invalid state.
  • Step 405 The cloud server returns the determination result to the client, so that the client controls the startup of the first object according to the determination result.
  • the leaked password can be easily invalidated, and the leakage of important data can be prevented in the first time, and the security level of the terminal is improved.
  • FIG. 5 is a schematic flowchart of the information processing method according to an embodiment of the present disclosure.
  • the fifth embodiment is applied to the server side.
  • the information processing method mainly includes the following steps:
  • Step 501 The cloud server receives the correct and valid first login authentication information sent by the client.
  • the first login authentication information is used to start the first object.
  • Step 502 The cloud server receives the login authentication information update request sent by the client, and then performs step 503.
  • Step 503 Determine whether the first login authentication information is the highest level login authentication information. If yes, go to step 505; if no, go to step 504.
  • the cloud server stores login authentication information for starting the first object, where the login authentication information includes a user name and a password, and one user name corresponds to N different levels of passwords, and N is a positive integer greater than or equal to 2.
  • Step 504 Return a prompt message to the client to remind the user to input the board that meets the preset condition. Record the certification information.
  • the client may output prompt information in a first manner.
  • the first mode includes but is not limited to mail, short message, and voice.
  • Step 505 Set the previously saved login authentication information related to the first object to an invalid state, and send an allow update indication to the client, and then perform step 506.
  • Step 506 Update the stored login authentication information related to the first object according to the login authentication update information sent by the client, where the login authentication update information includes a user name and a password, and one user name corresponds to M different levels of passwords.
  • M is a positive integer greater than or equal to 2.
  • the M may be the same as or different from N.
  • the cloud server may allow the user to reset the login authentication information for starting the first object, thereby improving the security level of the terminal.
  • the login authentication information can be changed at the first time to prevent leakage of important data and improve the security level of the terminal.
  • FIG. 6 is a first schematic structural diagram of an information processing apparatus according to an embodiment of the present invention. As shown in FIG. 6, the apparatus includes an obtaining unit 61, a first sending unit 62, and a control unit 63.
  • the obtaining unit 61 is configured to acquire login authentication information input by the user on the login interface of the client, where the login authentication information is used to start the first object;
  • the first sending unit 62 is configured to send the login authentication information to the cloud server, to determine, by the cloud server, whether the login authentication information is correct and valid;
  • the control unit 63 is configured to control startup of the first object according to the determination result returned by the cloud server.
  • control unit 63 is further configured to:
  • the client is controlled not to start the first object
  • the client is controlled to start the first object.
  • the obtaining unit 61 is further configured to acquire login registration information input by the user on the registration interface of the client, where the login registration information includes login authentication information for starting the first object,
  • the login authentication information includes a user name and a password, and one user name corresponds to N different levels of passwords, and N is a positive integer greater than or equal to 2;
  • the first sending unit 62 is further configured to send the login registration information to the cloud cloud server, to perform management control on the login registration information by the cloud cloud server.
  • the information processing device may be disposed in the client or disposed in the terminal.
  • the information processing device in the embodiment can easily invalidate the leaked password, prevent the leakage of important data in the first time, improve the security level of the terminal, and improve the user experience.
  • control unit 63 may be a central processing unit (CPU), a microprocessor (MPU, a Micro Processor Unit), a digital signal processor (DSP) in the terminal to which the information processing device or the information processing device belongs. (Digital Signal Processor) or Field Programmable Gate Array (FPGA), etc.; the obtaining unit 61 can be implemented by a receiver; the first transmitting unit 62 can be implemented by a transmitter.
  • CPU central processing unit
  • MPU Microprocessor
  • DSP digital signal processor
  • FIG. 7 is a second schematic structural diagram of an information processing apparatus according to an embodiment of the present invention. As shown in FIG. 7, the apparatus includes a receiving unit 71, a determining unit 72, and a second sending unit 73.
  • the receiving unit 71 is configured to receive login authentication information sent by the client, where the login authentication information is used to start the first object;
  • the determining unit 72 is configured to determine whether the login authentication information is correct and valid, and Generate a judgment result
  • the second sending unit 73 is configured to return the determination result to the client, so that the client controls the startup of the first object according to the determination result.
  • the determining unit 72 is further configured to:
  • the login authentication information is correct and valid, it is determined whether there is login authentication information whose level is lower than the login authentication information, and if yes, the login authentication information whose level is lower than the login authentication information is set to an invalid state.
  • the receiving unit 71 is further configured to receive login registration information sent by the client, where the login registration information includes login authentication information for starting the first object, and the login authentication information Including the user name and password, one user name corresponds to N different levels of passwords, and N is a positive integer greater than or equal to 2;
  • the device further includes:
  • the management unit 74 is configured to store the login registration information and perform management control on the login registration information.
  • the determining unit 72 is further configured to: when the receiving unit 71 receives the correct and valid first login authentication information sent by the client, where the first login authentication information is And the receiving unit 71 is configured to receive the login authentication information update request sent by the client, and determine whether the first login authentication information is the highest level login authentication information;
  • the management unit 74 is further configured to:
  • the second sending unit 73 is configured to send the prompt information to the client, so that the client prompts the user to input the login authentication information that meets the preset condition;
  • the element 73 sends an allow update indication to the client, and updates the stored login authentication information related to the first object according to the login authentication update information sent by the client received by the receiving unit 71; wherein the login authentication update information includes the user Name and password, one user name corresponds to M different levels of password, and M is a positive integer greater than or equal to 2.
  • the above information processing apparatus can be installed in a cloud server.
  • the information processing device of the embodiment manages and controls the login authentication information of the first object by using the cloud server, and can effectively invalidate the leaked password, thereby preventing leakage of important data and improving the security of the terminal. grade.
  • the determining unit 72 and the management unit 74 may be implemented by a CPU, an MPU, a DSP, or an FPGA in the server to which the information processing device or the information processing device belongs; the receiving unit 71 may be implemented by a receiver; The second transmitting unit 73 can be implemented by a transmitter.
  • FIG. 8 is a schematic structural diagram of an information processing system according to an embodiment of the present invention. As shown in FIG. 8, the system includes a client 81 and a cloud server 82.
  • the client 81 is configured to acquire login authentication information input by the user, where the login authentication information is used to start the first object, and the login authentication information is sent to the cloud server 82 to be determined by the cloud server 82. Whether the login authentication information is correct and valid; controlling the startup of the first object according to the determination result returned by the cloud server 82;
  • the cloud server 82 is configured to receive login authentication information sent by the client 81, where the login authentication information is used to start the first object, determine whether the login authentication information is correct and valid, and generate a determination result; The terminal 81 returns the result of the judgment.
  • the client may include information processing as shown in FIG. 6.
  • the information processing device shown in FIG. 7 may be included in the cloud server, and details are not described herein again.
  • the embodiment of the invention further provides a computer storage medium, wherein the computer storage medium stores computer executable instructions, and the computer executable instructions are used to execute the foregoing information processing method.
  • the disclosed apparatus and method may be implemented in other manners.
  • the device embodiments described above are merely illustrative.
  • the division of the unit is only a logical function division.
  • there may be another division manner such as: multiple units or components may be combined, or Can be integrated into another system, or some features can be ignored or not executed.
  • the coupling, or direct coupling, or communication connection of the components shown or discussed may be indirect coupling or communication connection through some interfaces, devices or units, and may be electrical, mechanical or other forms. of.
  • the units described above as separate components may or may not be physically separated, and the components displayed as the unit may or may not be physical units, that is, may be located in one place or distributed to multiple network units; Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
  • each functional unit in each embodiment of the present invention may be integrated into one processing unit, or each unit may be separately used as one unit, or two or more units may be integrated into one unit;
  • the unit can be implemented in the form of hardware or in the form of hardware plus software functional units.
  • the foregoing program may be stored in a computer readable storage medium, and the program is executed when executed.
  • the foregoing storage device includes the following steps:
  • the foregoing storage medium includes: a removable storage device, a read-only memory (ROM), a magnetic disk, or an optical disk, and the like, which can store program codes.
  • the above-described integrated unit of the present invention may be stored in a computer readable storage medium if it is implemented in the form of a software function module and sold or used as a standalone product.
  • the technical solution of the embodiments of the present invention may be embodied in the form of a software product in essence or in the form of a software product stored in a storage medium, including a plurality of instructions.
  • a computer device (which may be a personal computer, server, or network device, etc.) is caused to perform all or part of the methods described in various embodiments of the present invention.
  • the foregoing storage medium includes various media that can store program codes, such as a mobile storage device, a ROM, a magnetic disk, or an optical disk.
  • the login authentication information input on the login interface of the client is obtained, where the login authentication information is used to start the first object, and the login authentication information is sent to the cloud server to be used by the cloud server. Determining whether the login authentication information is correct and valid; controlling the startup of the first object according to the judgment result returned by the cloud server; thus, the leaked password can be easily invalidated, and the leakage of important data can be prevented in the first time. Improve the security level of mobile terminals and improve the user experience.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Information Transfer Between Computers (AREA)
  • Telephonic Communication Services (AREA)

Abstract

提供一种信息处理方法。所述方法包括:获取在客户端的登录界面上输入的登录认证信息,其中,所述登录认证信息用于启动第一对象(101);将所述登录认证信息发送至云端服务器,以由所述云端服务器判断所述登录认证信息是否正确且有效(102);根据所述云端服务器返回的判断结果控制第一对象的启动(103)。同时还提供一种信息处理装置、系统及计算机存储介质。

Description

一种信息处理方法、装置、系统及计算机存储介质 技术领域
本发明涉及信息处理技术,具体涉及一种信息处理方法、装置、系统及计算机存储介质。
背景技术
目前,终端(如手机、平板电脑等)已广泛应用于人们的日常生活和工作中,用户在终端上所存储的信息也越来越多,因此,终端的安全性也越来越受到用户的关注。
通常情况下,为了确保终端的安全,用户会设置密码,每次打开终端时,需要输入密码终端才能解锁。相应的,不同应用(如QQ、微信等)都有相应的用户名和密码。一旦终端丢失,终端上所存储的信息都有可能被泄露。
另外,一般来说,一个用户名只有一个密码,采用一一对应的方式,如果用户忘记了某个应用的密码,就打不开某个应用了,虽然可以通过某种方式将密码找回,也会费一番周折,耗时耗力。
发明内容
有鉴于此,本发明实施例期望提供一种信息处理方法、装置、系统及计算机存储介质,能很便捷地无效掉已泄漏的密码,可以第一时间防止重要数据的泄漏,提高终端的安全等级。
为达到上述目的,本发明实施例的技术方案是这样实现的:
本发明实施例提供了一种信息处理方法,所述方法包括:
获取用户在客户端的登录界面上输入的登录认证信息,其中,所述登 录认证信息用于启动第一对象;
将所述登录认证信息发送至云端服务器,以由所述云端服务器判断所述登录认证信息是否正确且有效;
根据所述云端服务器返回的判断结果控制第一对象的启动。
上述方案中,所述根据所述云端服务器返回的判断结果控制第一对象的启动,包括:
当所述判断结果为所述登录认证信息不正确或者正确但无效时,控制所述客户端不启动所述第一对象;
当所述判断结果为所述登录认证信息正确且有效时,控制所述客户端启动所述第一对象。
上述方案中,所述方法还包括:
获取用户在客户端的注册界面上输入的登录注册信息,其中,所述登录注册信息包括用于启动第一对象的登录认证信息,所述登录认证信息包括用户名和密码,一个用户名对应N个不同级别的密码,N为大于等于2的正整数;
将所述登录注册信息发送至云端云服务器,以由所述云端云服务器对所述登录注册信息进行管理控制。
本发明实施例还提供了一种信息处理方法,所述方法包括:
接收客户端发送的登录认证信息,其中,所述登录认证信息用于启动第一对象;
判断所述登录认证信息是否正确且有效,并生成判断结果;
向客户端返回所述判断结果,以使客户端根据所述判断结果控制第一对象的启动。
上述方案中,所述判断所述登录认证信息是否正确且有效,包括:
当判断所述登录认证信息正确且有效时,判断是否存在级别低于所述 登录认证信息的登录认证信息,如果存在,将级别低于所述登录认证信息的登录认证信息设置为无效状态。
上述方案中,所述方法还包括:
接收客户端发送的登录注册信息,其中,所述登录注册信息包括用于启动第一对象的登录认证信息,所述登录认证信息包括用户名和密码,一个用户名对应N个不同级别的密码,N为大于等于2的正整数;
存储所述登录注册信息,并对所述登录注册信息进行管理控制。
上述方案中,所述方法还包括:
当接收到客户端发送的正确且有效的第一登录认证信息时,其中,所述第一登录认证信息用于启动第一对象;
若接收到客户端发送的登录认证信息更新请求,判断所述第一登录认证信息是否为级别最高的登录认证信息;
如果否,向客户端发送提示信息,以提醒用户输入符合预设条件的登录认证信息;
如果是,将之前所保存的与第一对象相关的登录认证信息设置为无效状态,并向客户端发送允许更新指示,根据客户端发送的登录认证更新信息更新所存储的与第一对象相关的登录认证信息;其中,所述登录认证更新信息包括用户名和密码,一个用户名对应M个不同级别的密码,M为大于等于2的正整数。
本发明实施例还提供了一种信息处理装置,所述装置包括:
获取单元,配置为获取用户在客户端的登录界面上输入的登录认证信息,其中,所述登录认证信息用于启动第一对象;
第一发送单元,配置为将所述登录认证信息发送至云端服务器,以由所述云端服务器判断所述登录认证信息是否正确且有效;
控制单元,配置为根据所述云端服务器返回的判断结果控制第一对象 的启动。
上述方案中,所述控制单元,还配置为:
当所述判断结果为所述登录认证信息不正确或者正确但无效时,控制所述客户端不启动所述第一对象;
当所述判断结果为所述登录认证信息正确且有效时,控制所述客户端启动所述第一对象。
上述方案中,所述获取单元,还配置为获取用户在客户端的注册界面上输入的登录注册信息,其中,所述登录注册信息包括用于启动第一对象的登录认证信息,所述登录认证信息包括用户名和密码,一个用户名对应N个不同级别的密码,N为大于等于2的正整数;
所述第一发送单元,还配置为将所述登录注册信息发送至云端云服务器,以由所述云端云服务器对所述登录注册信息进行管理控制。
本发明实施例还提供了一种信息处理装置,所述装置包括:
接收单元,配置为接收客户端发送的登录认证信息,其中,所述登录认证信息用于启动第一对象;
判断单元,配置为判断所述登录认证信息是否正确且有效,并生成判断结果;
第二发送单元,配置为向客户端返回所述判断结果,以使客户端根据所述判断结果控制第一对象的启动。
上述方案中,所述判断单元,还配置为:
当判断所述登录认证信息正确且有效时,判断是否存在级别低于所述登录认证信息的登录认证信息,如果存在,将级别低于所述登录认证信息的登录认证信息设置为无效状态。
上述方案中,所述接收单元,还配置为接收客户端发送的登录注册信息,其中,所述登录注册信息包括用于启动第一对象的登录认证信息,所 述登录认证信息包括用户名和密码,一个用户名对应N个不同级别的密码,N为大于等于2的正整数;
所述装置还包括:
管理单元,配置为存储所述登录注册信息,并对所述登录注册信息进行管理控制。
上述方案中,所述判断单元,还配置为:当所述接收单元接收到客户端发送的正确且有效的第一登录认证信息时,其中,所述第一登录认证信息用于启动第一对象;若所述接收单元还接收到客户端发送的登录认证信息更新请求,判断所述第一登录认证信息是否为级别最高的登录认证信息;
相应地,所述管理单元,还配置为:
当所述第一登录认证信息不是级别最高的登录认证信息时,控制所述第二发送单元向客户端发送提示信息,以使客户端提醒用户输入符合预设条件的登录认证信息;
当所述第一登录认证信息是级别最高的登录认证信息时,将之前所保存的与第一对象相关的登录认证信息设置为无效状态,并通过第二发送单元向客户端发送允许更新指示,根据接收单元所接收到的客户端发送的登录认证更新信息更新所存储的与第一对象相关的登录认证信息;其中,所述登录认证更新信息包括用户名和密码,一个用户名对应M个不同级别的密码,M为大于等于2的正整数。
本发明实施例还提供了一种信息处理系统,所述系统包括:
客户端,配置为获取用户输入的登录认证信息,其中,所述登录认证信息用于启动第一对象;将所述登录认证信息发送至云端服务器,以由所述云端服务器判断所述登录认证信息是否正确且有效;根据所述云端服务器返回的判断结果控制第一对象的启动;
云端服务器,配置为接收客户端发送的登录认证信息,其中,所述登 录认证信息用于启动第一对象;判断所述登录认证信息是否正确且有效,并生成判断结果;向客户端返回所述判断结果。
上述方案中,所述客户端包括上文所述的信息处理装置;所述云端服务器包括上文所述的信息处理装置。
本发明实施例提供了一种计算机存储介质,所述计算机存储介质中存储有计算机程序,所述计算机程序用于执行以上所述的信息处理方法。
本发明实施例提供的信息处理方法、装置、系统及计算机存储介质,获取在客户端的登录界面上输入的登录认证信息,其中,所述登录认证信息用于启动第一对象;将所述登录认证信息发送至云端服务器,以由所述云端服务器判断所述登录认证信息是否正确且有效;根据所述云端服务器返回的判断结果控制第一对象的启动。如此,能很便捷地无效掉已泄漏的密码,可以第一时间防止重要数据的泄漏,提高移动终端的安全等级,提高了用户的使用体验。
附图说明
图1为本发明实施例提供的信息处理方法的流程示意图一;
图2为本发明实施例提供的信息处理方法的流程示意图二;
图3为本发明实施例提供的信息处理方法的流程示意图三;
图4为本发明实施例提供的信息处理方法的流程示意图四;
图5为本发明实施例提供的信息处理方法的流程示意图五;
图6为本发明实施例提供的信息处理装置的组成结构示意图一;
图7为本发明实施例提供的信息处理装置的组成结构示意图二;
图8为本发明实施例提供的信息处理系统的组成结构示意图。
具体实施方式
下面结合附图和具体实施例对本发明的技术方案进一步详细阐述。
图1为本发明实施例提供的信息处理方法的流程示意图一,应用于终端侧,如图1所示,所述信息处理方法主要包括以下步骤:
步骤101:获取用户在客户端的登录界面上输入的登录认证信息,其中,所述登录认证信息用于启动第一对象。
这里,所述第一对象可以是终端,也可以是安装于终端上的应用。
这里,所述应用包括终端中自带的应用,例如,通讯录应用等;也包括由用户安装的第三方应用,例如,游戏应用、即时聊天应用、邮件应用等。
在一具体子实施例中,用户在客户端的登录界面上输入登录认证信息时,可以通过手写输入来输入登录认证信息,也可以通过输入设备(如键盘、鼠标等)来输入登录认证信息。
在一具体子实施例中,当所述第一对象为应用时,所述登录认证信息可以包括用户名和一个密码;当所述第一对象为终端(如手机)时,若在该终端上输入登录认证信息,所述登录认证信息可以只包括一个密码,若在其他终端上输入与该终端相关的登录认证信息,所述登录认证信息既包括该终端的用户名,也包括一个密码。
这里,当所述第一对象为终端时,所述用户名可以是安装于所述终端上的用户身份识别卡上所存储的第一信息,所述用户身份识别卡可以是SIM卡、UIM卡等,所述第一信息可以是SIM卡号码、UIM卡号码。
步骤102:将所述登录认证信息发送至云端服务器,以由所述云端服务器判断所述登录认证信息是否正确且有效。
在一具体子实施例中,所述云端服务器存储有与第一对象相关的登录认证信息。
步骤103:根据所述云端服务器返回的判断结果控制第一对象的启动。
在一具体子实施例中,所述根据所述云端服务器返回的判断结果控制 第一对象的启动,可以包括:
当所述判断结果为所述登录认证信息不正确或者正确但无效时,控制所述客户端不启动所述第一对象;
当所述判断结果为所述登录认证信息正确且有效时,控制所述客户端启动所述第一对象。
例如,当所述第一对象为应用时,若所述登录认证信息不正确或者正确但无效时,不打开所述应用;若所述登录认证信息正确且有效时,打开所述应用。
例如,当所述第一对象为终端时,若所述登录认证信息不正确或者正确但无效时,解锁终端失败;若所述登录认证信息正确且有效时,解锁终端成功,进而使用户能够使用所述终端,如浏览所述终端中所存储的内容。
上述方案中,所述方法还可以包括:
获取用户在客户端的注册界面上输入的登录注册信息,其中,所述登录注册信息包括用于启动第一对象的登录认证信息,所述登录认证信息包括用户名和密码,一个用户名对应N个不同级别的密码,N为大于等于2的正整数;
将所述登录注册信息发送至云端云服务器,以由所述云端云服务器对所述登录注册信息进行管理控制。
需要说明的是,所述N个不同级别的密码中,有一个属于最高级别,该最高级别的密码具有重新设置登录认证信息(可以包括用户名、和/或密码)的权限。
通常情况下,在用户名输入正确的情况下,输入所述N个不同等级的密码中的任意一个密码,都可以启动所述第一对象。但是,输入级别高的密码时,会无效掉级别低的密码。
这里,并不对所述密码的形式进行限制,所述密码可以是数字,也可 以是图形等其他形式。
本实施例中,所述终端可以是如手机、平板电脑、笔记本电脑等。
举例来说,用户使用手机时,当唤醒手机后,需要输入密码才能解锁,此时,用户输入N个密码中的任意一个,都可以解锁该手机;也就是说,只要用户能够记得所述N个密码中的一个密码,就能对手机进行解锁,如此,可以避免因用户忘记设置的唯一密码而引起的找回密码繁琐的问题。而且,由于密码存储于云端服务器中,提高了手机的安全等级。即使用户无意间泄露了一个密码,偷手机的人用该泄露的密码打开了手机,但是,偷手机的人不具有更改密码的权限;用户可以在其他手机上输入所述被偷的手机的用户名和其他密码,无效掉被泄露的较低级的密码,甚至可以更改被偷手机的密码,当所述被泄露的较低级的密码被无效掉后,偷手机的人将不能再解锁所述被偷的手机,如此,可以第一时间防止手机中重要数据的泄漏。
通过本实施例所述技术方案,获取用户在客户端的登录界面上输入的登录认证信息,其中,所述登录认证信息用于启动第一对象;将所述登录认证信息发送至云端服务器,以由所述云端服务器判断所述登录认证信息是否正确且有效;根据所述云端服务器返回的判断结果控制第一对象的启动;如此,能很便捷地无效掉已泄漏的密码,可以第一时间防止重要数据的泄漏,提高移动终端的安全等级,提高了用户的使用体验。
实施例二
图2为本发明实施例提供的信息处理方法的流程示意图二,应用于终端侧,如图2所示,所述信息处理方法主要包括以下步骤:
步骤201:获取用户在客户端的注册界面上输入的登录注册信息。
其中,所述登录注册信息包括用于启动第一对象的登录认证信息,所述登录认证信息包括用户名和密码,一个用户名对应N个不同级别的密码, N为大于等于2的正整数。
这里,所述第一对象可以是终端,也可以是安装于终端上的应用。
这里,所述应用包括终端中自带的应用,例如,通讯录应用等;也包括由用户安装的第三方应用,例如,游戏应用、即时聊天应用、邮件应用等。
通常情况下,在用户名输入正确的情况下,输入所述N个不同等级的密码中的任意一个密码,都可以启动所述第一对象。但是,输入级别高的密码时,会无效掉级别低的密码。
需要说明的是,所述N个不同级别的密码中,有一个属于最高级别,该最高级别的密码具有重新设置登录认证信息(可以包括用户名、和/或密码)的权限。
这里,并不对所述密码的形式进行限制,所述密码可以是数字,也可以是图形等其他形式。
步骤202:将所述登录注册信息发送至云端云服务器,以由所述云端云服务器对所述登录注册信息进行管理控制。
步骤203:获取用户在客户端的登录界面上输入的登录认证信息,其中,所述登录认证信息用于启动第一对象。
在一具体子实施例中,当所述第一对象为应用时,所述登录认证信息可以包括用户名和一个密码;当所述第一对象为终端(如手机)时,若在该终端上输入登录认证信息,所述登录认证信息可以只包括一个密码,若在其他终端上输入与该终端相关的登录认证信息,所述登录认证信息既包括该终端的用户名,也包括一个密码。
这里,当所述第一对象为终端时,所述用户名可以是安装于所述终端上的用户身份识别卡上所存储的第一信息,所述用户身份识别卡可以是SIM卡、UIM卡等,所述第一信息可以是SIM卡号码、UIM卡号码。
步骤204:将所述登录认证信息发送至云端服务器,以由所述云端服务器判断所述登录认证信息是否正确且有效。
步骤205:根据所述云端服务器返回的判断结果控制第一对象的启动。
在一具体子实施例中,所述根据所述云端服务器返回的判断结果控制第一对象的启动,可以包括:
当所述判断结果为所述登录认证信息不正确或者正确但无效时,控制所述客户端不启动所述第一对象;
当所述判断结果为所述登录认证信息正确且有效时,控制所述客户端启动所述第一对象。
例如,当所述第一对象为应用时,若所述登录认证信息不正确或者正确但无效时,不打开所述应用;若所述登录认证信息正确且有效时,打开所述应用。
例如,当所述第一对象为终端时,若所述登录认证信息不正确或者正确但无效时,解锁终端失败;若所述登录认证信息正确且有效时,解锁终端成功,进而使用户能够使用所述终端,如浏览所述终端中所存储的内容。
本实施例中,所述终端可以是如手机、平板电脑、笔记本电脑等。
举例来说,启动应用A时,需要输入用户名和密码才能打开应用A,此时,用户输入N个密码中的任意一个,都可以打开应用A;也就是说,只要用户能够记得所述N个密码中的一个密码,就能打开应用A,如此,可以避免因用户忘记设置的唯一密码而引起的找回密码繁琐的问题。而且,由于密码存储于云端服务器中,提高了应用的安全等级。即使用户无意间泄露了一个密码,但是,盗用应用A的用户名和密码的人不具有更改密码的权限;用户可以在其他装载有应用A的终端上输入应用A的用户名和其他密码,将被泄露的较低级的密码无效掉,当所述被泄露的较低级的密码被无效掉后,盗用应用A的人使用其盗用的用户名和密码将不能再打开应 用A,如此,能够便于找回关于应用的用户名和密码,也能找回应用A的重要数据。
通过本实施例所述技术方案,获取用户在客户端的注册界面上输入的登录注册信息;将所述登录注册信息发送至云端云服务器,以由所述云端云服务器对所述登录注册信息进行管理控制;获取用户在客户端的登录界面上输入的登录认证信息,其中,所述登录认证信息用于启动第一对象;将所述登录认证信息发送至云端服务器,以由所述云端服务器判断所述登录认证信息是否正确且有效;根据所述云端服务器返回的判断结果控制第一对象的启动;如此,能很便捷地无效掉已泄漏的密码,可以第一时间防止重要数据的泄漏,提高移动终端的安全等级,提高了用户的使用体验。
实施例三
图3为本发明实施例提供的信息处理方法的流程示意图三,应用于服务器侧,如图3所示,所述信息处理方法主要包括以下步骤:
步骤301:云端服务器接收客户端发送的登录认证信息,其中,所述登录认证信息用于启动第一对象。
这里,所述第一对象可以是终端,也可以是安装于终端上的应用。
这里,所述应用包括终端中自带的应用,例如,通讯录应用等;也包括由用户安装的第三方应用,例如,游戏应用、即时聊天应用、邮件应用等。
步骤302:云端服务器判断所述登录认证信息是否正确且有效,并生成判断结果。
其中,云端服务器中存储有用于启动第一对象的登录认证信息,其中,所述登录认证信息包括用户名和密码,一个用户名对应N个不同级别的密码,N为大于等于2的正整数。
也就是说,假设客户端所发送的登录认证信息包括用户名和密码,当 云端服务器接收到客户端发送的登录认证信息时,在用户名正确时,判断所述密码是否是所述N个密码中的一个,如果是,判断所述登录认证信息正确;如果否,判断所述登录认证信息不正确。
需要说明的是,当用户使用级别较高的密码启动第一对象时,级别较低的密码将被云端服务器无效掉。
也就是说,假设用户名B对应有5个不同等级的密码,分别记为密码1、密码2、密码3、密码4、密码5;其中,密码1的级别<密码2的级别<密码3的级别<密码4的级别<密码5的级别;用户使用所述5个密码中的任意一个密码都可以启动第一对象;当用户使用密码1启动第一对象时,所述5个密码均为有效密码;当用户使用密码2启动第一对象时,密码1将被无效掉。同理,当用户使用密码3启动第一对象时,密码1、密码2均被无效掉,此时,如果用户仍输入密码1或密码2,所述密码1或密码2均被判定为无效的密码。
在一具体子实施例中,所述判断所述登录认证信息是否正确且有效,可以包括:
当判断所述登录认证信息正确且有效时,判断是否存在级别低于所述登录认证信息的登录认证信息,如果存在,将级别低于所述登录认证信息的登录认证信息设置为无效状态。
步骤303:云端服务器向客户端返回所述判断结果,以使客户端根据所述判断结果控制第一对象的启动。
在一具体子实施例中,当所述判断结果为所述登录认证信息不正确或者正确但无效时,客户端不启动所述第一对象;当所述判断结果为所述登录认证信息正确且有效时,客户端启动所述第一对象。
通过本实施例所述技术方案,云端服务器接收客户端发送的登录认证信息,其中,所述登录认证信息用于启动第一对象;判断所述登录认证信 息是否正确且有效,并生成判断结果;向客户端返回所述判断结果,以使客户端根据所述判断结果控制第一对象的启动。如此,通过云端服务器对第一对象的登录认证信息进行管理与控制,能很便捷地无效掉已泄漏的密码,可以第一时间防止重要数据的泄漏,提高移动终端的安全等级,提高了用户的使用体验。
实施例四
图4为本发明实施例提供的信息处理方法的流程示意图四,应用于服务器侧,如图4所示,所述信息处理方法主要包括以下步骤:
步骤401:云端服务器接收客户端发送的登录注册信息。
其中,所述登录注册信息包括用于启动第一对象的登录认证信息,所述登录认证信息包括用户名和密码,一个用户名对应N个不同级别的密码,N为大于等于2的正整数。
步骤402:云端服务器存储所述登录注册信息,并对所述登录注册信息进行管理控制。
步骤403:云端服务器接收客户端发送的登录认证信息,其中,所述登录认证信息用于启动第一对象。
这里,所述第一对象可以是终端,也可以是安装于终端上的应用。
这里,所述应用包括终端中自带的应用,例如,通讯录应用等;也包括由用户安装的第三方应用,例如,游戏应用、即时聊天应用、邮件应用等。
步骤404:云端服务器判断所述登录认证信息是否正确且有效,并生成判断结果。
在一具体子实施例中,所述判断所述登录认证信息是否正确且有效,可以包括:
当判断所述登录认证信息正确且有效时,判断是否存在级别低于所述 登录认证信息的登录认证信息,如果存在,将级别低于所述登录认证信息的登录认证信息设置为无效状态。
步骤405:云端服务器向客户端返回所述判断结果,以使客户端根据所述判断结果控制第一对象的启动。
通过本实施例所述技术方案,接收客户端发送的登录注册信息;储所述登录注册信息,并对所述登录注册信息进行管理控制;接收客户端发送的登录认证信息,其中,所述登录认证信息用于启动第一对象;判断所述登录认证信息是否正确且有效,并生成判断结果;向客户端返回所述判断结果,以使客户端根据所述判断结果控制第一对象的启动。如此,通过云端服务器对第一对象的登录认证信息进行管理与控制,能很便捷地无效掉已泄漏的密码,可以第一时间防止重要数据的泄漏,提高终端的安全等级。
实施例五
图5为本发明实施例提供的信息处理方法的流程示意图五,应用于服务器侧,如图5所示,所述信息处理方法主要包括以下步骤:
步骤501:云端服务器接收到客户端发送的正确且有效的第一登录认证信息。
其中,所述第一登录认证信息用于启动第一对象。
步骤502:云端服务器接收到客户端发送的登录认证信息更新请求,然后执行步骤503。
步骤503:判断所述第一登录认证信息是否为级别最高的登录认证信息,如果是,执行步骤505;如果否,执行步骤504。
其中,云端服务器中存储有用于启动第一对象的登录认证信息,所述登录认证信息包括用户名和密码,一个用户名对应N个不同级别的密码,N为大于等于2的正整数。
步骤504:向客户端返回提示信息,以提醒用户输入符合预设条件的登 录认证信息。
这里,所述客户端可以第一方式输出提示信息。其中,所述第一方式包括但不限于邮件、短信、语音。
步骤505:将之前所保存的与第一对象相关的登录认证信息设置为无效状态,并向客户端发送允许更新指示,然后执行步骤506。
步骤506:根据客户端发送的登录认证更新信息更新所存储的与第一对象相关的登录认证信息;其中,所述登录认证更新信息包括用户名和密码,一个用户名对应M个不同级别的密码,M为大于等于2的正整数。
这里,所述M可以与N相同或不同。
如此,当用户输入符合预设条件的登录认证信息时,云端服务器可以允许用户重新设定用于启动第一对象的登录认证信息,提高了终端的安全等级。当终端被偷或应用的用户名和密码被盗时,可以在第一时间更改登录认证信息,以防止重要数据的泄露,提高终端的安全等级。
实施例六
图6为本发明实施例提供的信息处理装置的组成结构示意图一,如图6所示,所述装置包括获取单元61、第一发送单元62和控制单元63;其中,
所述获取单元61,配置为获取用户在客户端的登录界面上输入的登录认证信息,其中,所述登录认证信息用于启动第一对象;
所述第一发送单元62,配置为将所述登录认证信息发送至云端服务器,以由所述云端服务器判断所述登录认证信息是否正确且有效;
所述控制单元63,配置为根据所述云端服务器返回的判断结果控制第一对象的启动。
在一具体子实施例中,所述控制单元63,还配置为:
当所述判断结果为所述登录认证信息不正确或者正确但无效时,控制所述客户端不启动所述第一对象;
当所述判断结果为所述登录认证信息正确且有效时,控制所述客户端启动所述第一对象。
在一具体子实施例中,所述获取单元61,还配置为获取用户在客户端的注册界面上输入的登录注册信息,其中,所述登录注册信息包括用于启动第一对象的登录认证信息,所述登录认证信息包括用户名和密码,一个用户名对应N个不同级别的密码,N为大于等于2的正整数;
相应地,所述第一发送单元62,还配置为将所述登录注册信息发送至云端云服务器,以由所述云端云服务器对所述登录注册信息进行管理控制。
上述信息处理装置可设置于客户端中,或设置于终端中。
本实施例所述信息处理装置,能很便捷地无效掉已泄漏的密码,可以第一时间防止重要数据的泄漏,提高终端的安全等级,提高了用户的使用体验。
本领域技术人员应当理解,图6所示的信息处理装置中的各单元的实现功能可参照前述信息处理方法的相关描述而理解。
实际应用中,所述控制单元63均可由信息处理装置或信息处理装置所属终端中的中央处理器(CPU,Central Processing Unit)、微处理器(MPU,Micro Processor Unit)、数字信号处理器(DSP,Digital Signal Processor)或现场可编程门阵列(FPGA,Field Programmable Gate Array)等实现;所述获取单元61可以由接收器来实现;第一发送单元62可以由发送器来实现。
实施例七
图7为本发明实施例提供的信息处理装置的组成结构示意图二,如图7所示,所述装置包括接收单元71、判断单元72和第二发送单元73;其中,
所述接收单元71,配置为接收客户端发送的登录认证信息,其中,所述登录认证信息用于启动第一对象;
所述判断单元72,配置为判断所述登录认证信息是否正确且有效,并 生成判断结果;
所述第二发送单元73,配置为向客户端返回所述判断结果,以使客户端根据所述判断结果控制第一对象的启动。
优选地,所述判断单元72,还配置为:
当判断所述登录认证信息正确且有效时,判断是否存在级别低于所述登录认证信息的登录认证信息,如果存在,将级别低于所述登录认证信息的登录认证信息设置为无效状态。
在一具体子实施例中,所述接收单元71,还配置为接收客户端发送的登录注册信息,其中,所述登录注册信息包括用于启动第一对象的登录认证信息,所述登录认证信息包括用户名和密码,一个用户名对应N个不同级别的密码,N为大于等于2的正整数;
在一具体子实施例中,所述装置还包括:
管理单元74,配置为存储所述登录注册信息,并对所述登录注册信息进行管理控制。
在一具体子实施例中,所述判断单元72,还配置为:当所述接收单元71接收到客户端发送的正确且有效的第一登录认证信息时,其中,所述第一登录认证信息用于启动第一对象;若所述接收单元71还接收到客户端发送的登录认证信息更新请求,判断所述第一登录认证信息是否为级别最高的登录认证信息;
相应地,所述管理单元74,还配置为:
当所述第一登录认证信息不是级别最高的登录认证信息时,控制所述第二发送单元73向客户端发送提示信息,以使客户端提醒用户输入符合预设条件的登录认证信息;
当所述第一登录认证信息是级别最高的登录认证信息时,将之前所保存的与第一对象相关的登录认证信息设置为无效状态,并通过第二发送单 元73向客户端发送允许更新指示,根据接收单元71所接收到的客户端发送的登录认证更新信息更新所存储的与第一对象相关的登录认证信息;其中,所述登录认证更新信息包括用户名和密码,一个用户名对应M个不同级别的密码,M为大于等于2的正整数。
上述信息处理装置可设置于云服务器中。
本实施例所述信息处理装置,通过云端服务器对第一对象的登录认证信息进行管理与控制,能很便捷地无效掉已泄漏的密码,可以第一时间防止重要数据的泄漏,提高终端的安全等级。
本领域技术人员应当理解,图7所示的信息处理装置中的各单元的实现功能可参照前述信息处理方法的相关描述而理解。
实际应用中,所述判断单元72和管理单元74均可由信息处理装置或信息处理装置所属服务器中的CPU、MPU、DSP或FPGA等实现;所述接收单元71可以由接收器来实现;所述第二发送单元73可以由发送器来实现。
实施例八
图8为本发明实施例提供的信息处理系统的组成结构示意图,如图8所示,所述系统包括客户端81和云端服务器82;其中,
所述客户端81,配置为获取用户输入的登录认证信息,其中,所述登录认证信息用于启动第一对象;将所述登录认证信息发送至云端服务器82,以由所述云端服务器82判断所述登录认证信息是否正确且有效;根据所述云端服务器82返回的判断结果控制第一对象的启动;
所述云端服务器82,配置为接收客户端81发送的登录认证信息,其中,所述登录认证信息用于启动第一对象;判断所述登录认证信息是否正确且有效,并生成判断结果;向客户端81返回所述判断结果。
在一具体子实施例中,所述客户端中可以包括如图6所示的信息处理 装置,所述云端服务器中可以包括如图7所示的信息处理装置,在此不再赘述。
本发明实施例还提供了一种计算机存储介质,所述计算机存储介质中存储有计算机可执行指令,所述计算机可执行指令用于执行前述的信息处理方法。
在本申请所提供的几个实施例中,应该理解到,所揭露的设备和方法,可以通过其它的方式实现。以上所描述的设备实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,如:多个单元或组件可以结合,或可以集成到另一个系统,或一些特征可以忽略,或不执行。另外,所显示或讨论的各组成部分相互之间的耦合、或直接耦合、或通信连接可以是通过一些接口,设备或单元的间接耦合或通信连接,可以是电性的、机械的或其它形式的。
上述作为分离部件说明的单元可以是、或也可以不是物理上分开的,作为单元显示的部件可以是、或也可以不是物理单元,即可以位于一个地方,也可以分布到多个网络单元上;可以根据实际的需要选择其中的部分或全部单元来实现本实施例方案的目的。
另外,在本发明各实施例中的各功能单元可以全部集成在一个处理单元中,也可以是各单元分别单独作为一个单元,也可以两个或两个以上单元集成在一个单元中;上述集成的单元既可以采用硬件的形式实现,也可以采用硬件加软件功能单元的形式实现。
本领域普通技术人员可以理解:实现上述方法实施例的全部或部分步骤可以通过程序指令相关的硬件来完成,前述的程序可以存储于一计算机可读取存储介质中,该程序在执行时,执行包括上述方法实施例的步骤;而前述的存储介质包括:移动存储设备、只读存储器(ROM,Read-Only Memory)、磁碟或者光盘等各种可以存储程序代码的介质。
或者,本发明上述集成的单元如果以软件功能模块的形式实现并作为独立的产品销售或使用时,也可以存储在一个计算机可读取存储介质中。基于这样的理解,本发明实施例的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机、服务器、或者网络设备等)执行本发明各个实施例所述方法的全部或部分。而前述的存储介质包括:移动存储设备、ROM、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述,仅为本发明的较佳实施例而已,并非用于限定本发明的保护范围。凡在本发明的精神和原则之内所作的任何修改、等同替换和改进等,均应包含在本发明的保护范围之内。
工业实用性
本发明实施例中,获取在客户端的登录界面上输入的登录认证信息,其中,所述登录认证信息用于启动第一对象;将所述登录认证信息发送至云端服务器,以由所述云端服务器判断所述登录认证信息是否正确且有效;根据所述云端服务器返回的判断结果控制第一对象的启动;如此,能很便捷地无效掉已泄漏的密码,可以第一时间防止重要数据的泄漏,提高移动终端的安全等级,提高了用户的使用体验。

Claims (17)

  1. 一种信息处理方法,所述方法包括:
    获取用户在客户端的登录界面上输入的登录认证信息,其中,所述登录认证信息用于启动第一对象;
    将所述登录认证信息发送至云端服务器,以由所述云端服务器判断所述登录认证信息是否正确且有效;
    根据所述云端服务器返回的判断结果控制第一对象的启动。
  2. 根据权利要求1所述的方法,其中,所述根据所述云端服务器返回的判断结果控制第一对象的启动,包括:
    当所述判断结果为所述登录认证信息不正确或者正确但无效时,控制所述客户端不启动所述第一对象;
    当所述判断结果为所述登录认证信息正确且有效时,控制所述客户端启动所述第一对象。
  3. 根据权利要求1所述的方法,其中,所述方法还包括:
    获取用户在客户端的注册界面上输入的登录注册信息,其中,所述登录注册信息包括用于启动第一对象的登录认证信息,所述登录认证信息包括用户名和密码,一个用户名对应N个不同级别的密码,N为大于等于2的正整数;
    将所述登录注册信息发送至云端云服务器,以由所述云端云服务器对所述登录注册信息进行管理控制。
  4. 一种信息处理方法,所述方法包括:
    接收客户端发送的登录认证信息,其中,所述登录认证信息用于启动第一对象;
    判断所述登录认证信息是否正确且有效,并生成判断结果;
    向客户端返回所述判断结果,以使客户端根据所述判断结果控制第一 对象的启动。
  5. 根据权利要求4所述的方法,其中,所述判断所述登录认证信息是否正确且有效,包括:
    当判断所述登录认证信息正确且有效时,判断是否存在级别低于所述登录认证信息的登录认证信息,如果存在,将级别低于所述登录认证信息的登录认证信息设置为无效状态。
  6. 根据权利要求4所述的方法,其中,所述方法还包括:
    接收客户端发送的登录注册信息,其中,所述登录注册信息包括用于启动第一对象的登录认证信息,所述登录认证信息包括用户名和密码,一个用户名对应N个不同级别的密码,N为大于等于2的正整数;
    存储所述登录注册信息,并对所述登录注册信息进行管理控制。
  7. 根据权利要求4所述的方法,其中,所述方法还包括:
    当接收到客户端发送的正确且有效的第一登录认证信息时,其中,所述第一登录认证信息用于启动第一对象;
    若接收到客户端发送的登录认证信息更新请求,判断所述第一登录认证信息是否为级别最高的登录认证信息;
    如果否,向客户端发送提示信息,以提醒用户输入符合预设条件的登录认证信息;
    如果是,将之前所保存的与第一对象相关的登录认证信息设置为无效状态,并向客户端发送允许更新指示,根据客户端发送的登录认证更新信息更新所存储的与第一对象相关的登录认证信息;其中,所述登录认证更新信息包括用户名和密码,一个用户名对应M个不同级别的密码,M为大于等于2的正整数。
  8. 一种信息处理装置,所述装置包括:
    获取单元,配置为获取用户在客户端的登录界面上输入的登录认证信 息,其中,所述登录认证信息用于启动第一对象;
    第一发送单元,配置为将所述登录认证信息发送至云端服务器,以由所述云端服务器判断所述登录认证信息是否正确且有效;
    控制单元,配置为根据所述云端服务器返回的判断结果控制第一对象的启动。
  9. 根据权利要求8所述的装置,其中,所述控制单元,还配置为:
    当所述判断结果为所述登录认证信息不正确或者正确但无效时,控制所述客户端不启动所述第一对象;
    当所述判断结果为所述登录认证信息正确且有效时,控制所述客户端启动所述第一对象。
  10. 根据权利要求8所述的装置,其中,
    所述获取单元,还配置为获取用户在客户端的注册界面上输入的登录注册信息,其中,所述登录注册信息包括用于启动第一对象的登录认证信息,所述登录认证信息包括用户名和密码,一个用户名对应N个不同级别的密码,N为大于等于2的正整数;
    所述第一发送单元,还配置为将所述登录注册信息发送至云端云服务器,以由所述云端云服务器对所述登录注册信息进行管理控制。
  11. 一种信息处理装置,所述装置包括:
    接收单元,配置为接收客户端发送的登录认证信息,其中,所述登录认证信息用于启动第一对象;
    判断单元,配置为判断所述登录认证信息是否正确且有效,并生成判断结果;
    第二发送单元,用于向客户端返回所述判断结果,以使客户端根据所述判断结果控制第一对象的启动。
  12. 根据权利要求11所述的装置,其中,所述判断单元,还配置为:
    当判断所述登录认证信息正确且有效时,判断是否存在级别低于所述登录认证信息的登录认证信息,如果存在,将级别低于所述登录认证信息的登录认证信息设置为无效状态。
  13. 根据权利要求11所述的装置,其中,
    所述接收单元,还配置为接收客户端发送的登录注册信息,其中,所述登录注册信息包括用于启动第一对象的登录认证信息,所述登录认证信息包括用户名和密码,一个用户名对应N个不同级别的密码,N为大于等于2的正整数;
    所述装置还包括:
    管理单元,配置为存储所述登录注册信息,并对所述登录注册信息进行管理控制。
  14. 根据权利要求13所述的装置,其中,
    所述判断单元,还配置为:当所述接收单元接收到客户端发送的正确且有效的第一登录认证信息时,其中,所述第一登录认证信息用于启动第一对象;若所述接收单元还接收到客户端发送的登录认证信息更新请求,判断所述第一登录认证信息是否为级别最高的登录认证信息;
    相应地,所述管理单元,还配置为:
    当所述第一登录认证信息不是级别最高的登录认证信息时,控制所述第二发送单元向客户端发送提示信息,以使客户端提醒用户输入符合预设条件的登录认证信息;
    当所述第一登录认证信息是级别最高的登录认证信息时,将之前所保存的与第一对象相关的登录认证信息设置为无效状态,并通过第二发送单元向客户端发送允许更新指示,根据接收单元所接收到的客户端发送的登录认证更新信息更新所存储的与第一对象相关的登录认证信息;其中,所述登录认证更新信息包括用户名和密码,一个用户名对应M个不同级别的 密码,M为大于等于2的正整数。
  15. 一种信息处理系统,所述系统包括:
    客户端,配置为获取用户输入的登录认证信息,其中,所述登录认证信息用于启动第一对象;将所述登录认证信息发送至云端服务器,以由所述云端服务器判断所述登录认证信息是否正确且有效;根据所述云端服务器返回的判断结果控制第一对象的启动;
    云端服务器,配置为接收客户端发送的登录认证信息,其中,所述登录认证信息用于启动第一对象;判断所述登录认证信息是否正确且有效,并生成判断结果;向客户端返回所述判断结果。
  16. 根据权利要求15所述的系统,其中,所述客户端包括权利要求8至10任一项所述的信息处理装置;所述云端服务器包括权利要求11至14任一项所述的信息处理装置。
  17. 一种计算机存储介质,所述计算机存储介质中存储有计算机可执行指令,所述计算机可执行指令用于执行权利要求1至3任一项所述的方法、和/或用于执行权利要求4至7任一项所述的方法。
PCT/CN2015/091732 2015-07-17 2015-10-12 一种信息处理方法、装置、系统及计算机存储介质 WO2017012212A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US15/745,491 US20180212948A1 (en) 2015-07-17 2015-10-12 Information processing method, device, system and computer storage medium
EP15898768.5A EP3328013B1 (en) 2015-07-17 2015-10-12 Information processing method and device

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510423637.6A CN106341379B (zh) 2015-07-17 2015-07-17 一种信息处理方法、装置及系统
CN201510423637.6 2015-07-17

Publications (1)

Publication Number Publication Date
WO2017012212A1 true WO2017012212A1 (zh) 2017-01-26

Family

ID=57826843

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/091732 WO2017012212A1 (zh) 2015-07-17 2015-10-12 一种信息处理方法、装置、系统及计算机存储介质

Country Status (4)

Country Link
US (1) US20180212948A1 (zh)
EP (1) EP3328013B1 (zh)
CN (1) CN106341379B (zh)
WO (1) WO2017012212A1 (zh)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI590072B (zh) * 2015-12-29 2017-07-01 宏碁股份有限公司 雲端管理系統及其裝置管理方法
CN112771826B (zh) * 2018-11-05 2023-01-10 深圳市欢太科技有限公司 一种应用程序登录方法、应用程序登录装置及移动终端
CN112671786B (zh) * 2020-12-29 2022-06-28 科来网络技术股份有限公司 一种基于第三方认证的安全登陆的系统及方法

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120167180A1 (en) * 2010-12-22 2012-06-28 Hon Hai Precision Industry Co., Ltd. Cloud server and access management method
CN103095735A (zh) * 2011-10-27 2013-05-08 深圳市同洲电子股份有限公司 读取sim卡上数据信息的方法、移动终端、云服务器及系统
CN103685255A (zh) * 2013-12-06 2014-03-26 上海众人网络安全技术有限公司 一种基于二维码扫描的文件加密方法
CN104468581A (zh) * 2014-12-10 2015-03-25 小米科技有限责任公司 登录应用程序的方法及装置

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050175201A1 (en) * 2004-02-06 2005-08-11 Herman Barry S. Secure key reset using encryption
US8255696B2 (en) * 2007-05-01 2012-08-28 Microsoft Corporation One-time password access to password-protected accounts
US7865950B2 (en) * 2007-06-19 2011-01-04 International Business Machines Corporation System of assigning permissions to a user by password
US8875261B2 (en) * 2008-10-22 2014-10-28 International Business Machines Corporation Rules driven multiple passwords
US9875463B2 (en) * 2010-03-17 2018-01-23 Infostreet, Inc. Cloud-based desktop and subscription application platform apparatuses, methods and systems
US8856955B2 (en) * 2010-05-18 2014-10-07 ServiceSource International, Inc. Remediating unauthorized sharing of account access to online resources
CN101931576B (zh) * 2010-07-21 2015-04-01 中兴通讯股份有限公司 一种无线接入设备及方法
US20120272301A1 (en) * 2011-04-21 2012-10-25 International Business Machines Corporation Controlled user account access with automatically revocable temporary password
US8914900B2 (en) * 2012-05-23 2014-12-16 Box, Inc. Methods, architectures and security mechanisms for a third-party application to access content in a cloud-based platform
CN104410622A (zh) * 2014-11-25 2015-03-11 珠海格力电器股份有限公司 登陆Web系统的安全认证方法、客户端及系统

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120167180A1 (en) * 2010-12-22 2012-06-28 Hon Hai Precision Industry Co., Ltd. Cloud server and access management method
CN103095735A (zh) * 2011-10-27 2013-05-08 深圳市同洲电子股份有限公司 读取sim卡上数据信息的方法、移动终端、云服务器及系统
CN103685255A (zh) * 2013-12-06 2014-03-26 上海众人网络安全技术有限公司 一种基于二维码扫描的文件加密方法
CN104468581A (zh) * 2014-12-10 2015-03-25 小米科技有限责任公司 登录应用程序的方法及装置

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP3328013A4 *

Also Published As

Publication number Publication date
US20180212948A1 (en) 2018-07-26
CN106341379A (zh) 2017-01-18
EP3328013A1 (en) 2018-05-30
EP3328013A4 (en) 2018-07-18
CN106341379B (zh) 2020-01-24
EP3328013B1 (en) 2020-08-12

Similar Documents

Publication Publication Date Title
US10572639B2 (en) Selectively providing personal information and access to functionality on lock screen based on biometric user authentication
US10523665B2 (en) Authentication on thin clients using independent devices
KR101696612B1 (ko) 사용자 인증 관리
CN107079031B (zh) 经由与第二设备的通信对第一设备的基于用户认证的批准
US10154026B2 (en) Secure remote modification of device credentials using device-generated credentials
CN104540129B (zh) 第三方应用的注册和登录方法及系统
US11038684B2 (en) User authentication using a companion device
KR20110020921A (ko) 개선된 생체 인증 및 신원확인
US9160744B1 (en) Increasing entropy for password and key generation on a mobile device
US9697346B2 (en) Method and apparatus for identifying and associating devices using visual recognition
WO2018054387A1 (zh) 终端权限的管理方法和装置
TW201828162A (zh) 設備配置方法及裝置、系統
WO2017012212A1 (zh) 一种信息处理方法、装置、系统及计算机存储介质
US20240129411A1 (en) Techniques for implementing phone number-based user accounts with permissions to access varying levels of services utilizing visible and hidden contact addresses
CN109804608B (zh) 提供对结构化存储数据的访问
WO2019179041A1 (zh) 账号登陆验证方法、装置、计算机设备及存储介质
CN104966008B (zh) 一种鉴权数据的管理方法和装置
WO2019005423A1 (en) APPARATUS, SYSTEM AND METHOD FOR AUTHENTICATION FOR CONVERSATIONAL USER EXPERIENCE

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15898768

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 15745491

Country of ref document: US

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 2015898768

Country of ref document: EP