CN114189527A - Information synchronization method and device, electronic equipment and storage medium - Google Patents
Information synchronization method and device, electronic equipment and storage medium Download PDFInfo
- Publication number
- CN114189527A CN114189527A CN202111265002.XA CN202111265002A CN114189527A CN 114189527 A CN114189527 A CN 114189527A CN 202111265002 A CN202111265002 A CN 202111265002A CN 114189527 A CN114189527 A CN 114189527A
- Authority
- CN
- China
- Prior art keywords
- information
- intranet
- account
- registration
- login
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 104
- 230000001360 synchronised effect Effects 0.000 claims abstract description 65
- 238000012545 processing Methods 0.000 claims abstract description 16
- 230000004048 modification Effects 0.000 claims description 57
- 238000012986 modification Methods 0.000 claims description 57
- 230000008569 process Effects 0.000 claims description 46
- 230000004044 response Effects 0.000 claims description 5
- 238000004891 communication Methods 0.000 claims description 2
- 238000010586 diagram Methods 0.000 description 13
- 230000009191 jumping Effects 0.000 description 8
- 238000004590 computer program Methods 0.000 description 7
- 238000012795 verification Methods 0.000 description 7
- 238000012217 deletion Methods 0.000 description 6
- 230000037430 deletion Effects 0.000 description 6
- 238000012544 monitoring process Methods 0.000 description 6
- 230000006870 function Effects 0.000 description 4
- 230000002159 abnormal effect Effects 0.000 description 3
- 230000009471 action Effects 0.000 description 3
- 238000009938 salting Methods 0.000 description 2
- 230000004075 alteration Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000007613 environmental effect Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000002955 isolation Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000000750 progressive effect Effects 0.000 description 1
- 238000007789 sealing Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1095—Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/953—Querying, e.g. by the use of web search engines
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
Landscapes
- Engineering & Computer Science (AREA)
- Databases & Information Systems (AREA)
- Theoretical Computer Science (AREA)
- Signal Processing (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Physics & Mathematics (AREA)
- Data Mining & Analysis (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The embodiment of the application provides an information synchronization method, and belongs to the technical field of information synchronization. The method is applied to a terminal, the terminal is respectively communicated with an internal network and an external network, and the method comprises the following steps: inquiring account information input by a user on the intranet to obtain the current state of the account information on the intranet, wherein the current state comprises the following steps: the account information exists and the account information does not exist; acquiring information to be synchronized input by a user aiming at the current state, wherein the information to be synchronized comprises registration information and login information; and processing the information to be synchronized so as to make the information to be synchronized consistent on the inner network and the outer network. By using the information synchronization method provided by the application, the information to be synchronized of the internal network and the external network can be kept consistent.
Description
Technical Field
The embodiment of the application relates to the technical field of information synchronization, in particular to an information synchronization method, an information synchronization device, electronic equipment and a storage medium.
Background
In the traditional intranet service, based on the characteristics of intranet closure and isolation, data interaction between an intranet and an extranet is not allowed by the intranet, but a user can acquire video data such as monitoring videos from the extranet by using an application program specified by the intranet, so that data transmission is performed between the intranet and the extranet.
However, because the intranet and the extranet have two user data systems, when a user uses a specific application program to transmit data, the user information of the intranet and the user information of the extranet are not synchronized, which brings inconvenience to the user.
Disclosure of Invention
The embodiment of the application provides an information synchronization method, an information synchronization device, electronic equipment and a storage medium, and aims to solve the problem that user information of an internal network is not synchronized with user information of an external network.
A first aspect of an embodiment of the present application provides an information synchronization method, where the method is applied to a terminal, and the terminal communicates with an intranet and an extranet respectively, and the method includes:
inquiring account information input by a user on the intranet to obtain the current state of the account information on the intranet, wherein the current state comprises the following steps: the account information exists and the account information does not exist;
acquiring information to be synchronized input by a user aiming at the current state, wherein the information to be synchronized comprises registration information and login information;
and processing the information to be synchronized so as to make the information to be synchronized consistent on the inner network and the outer network.
Optionally, under the condition that the account information of the intranet does not exist, acquiring information to be synchronized, which is input by the user for the current state, includes:
skipping to a registration page under the condition that the account information of the intranet does not exist;
acquiring the registration information input by the user on the registration page, wherein the registration information at least comprises: account information, account password, work unit and identity information;
processing the information to be synchronized to make the information to be synchronized consistent on the inner network and the outer network, including:
registering the registration information to the intranet;
and after the registration of the internal network is successful, registering the registration information to the external network so as to make the registration information consistent between the internal network and the external network.
Optionally, the method further comprises:
after the intranet registration is successful, registering the registration information to the extranet registration failure, and jumping to a login page of the intranet;
and executing a login process on the login page so as to synchronize the registration information registered in the intranet into the extranet.
Optionally, acquiring information to be synchronized, which is input by a user for the current state, in the presence of the account information of the intranet, where the information to be synchronized includes:
skipping to a login page under the condition that the account information of the intranet exists;
obtaining login information input by a user on the login page, wherein the login information at least comprises an account password;
processing the information to be synchronized to make the information to be synchronized consistent on the inner network and the outer network, including:
encrypting the account password to obtain a current encrypted ciphertext;
comparing whether the current encrypted ciphertext is the same as a first ciphertext in the intranet, wherein the first ciphertext is an encrypted account password in the intranet;
under the condition that the current encrypted ciphertext is the same as the first ciphertext, inquiring the account information in the external network;
and under the condition that the account information does not exist in the external network, synchronizing the registration information in the internal network to the external network so as to keep the registration information consistent with the external network in the internal network.
Optionally, the method further comprises:
comparing whether the current encrypted ciphertext is the same as a second ciphertext in the external network or not under the condition that the account information exists in the external network, wherein the second ciphertext is an encrypted account password in the external network;
and under the condition that the current encrypted ciphertext is different from the second ciphertext, synchronizing the login information in the intranet to the extranet so as to keep the login information consistent between the intranet and the extranet.
Optionally, after the login information is consistent between the external network and the external network, the method further includes:
acquiring reset information input by a user on a preset page, wherein the reset information comprises adding information, deleting information and modifying information;
submitting the reset information to the intranet;
and synchronizing the reset information to the outer network under the condition that the reset information is successfully submitted to the inner network.
Optionally, in a case that the reset information is the modification information;
submitting the reset information to the intranet, including:
comparing whether the modification information is consistent with the corresponding login information in the intranet or not;
under the condition that the modification information is inconsistent with the corresponding login information in the intranet, modifying the corresponding login information in the intranet into the modification information;
synchronizing the reset information to the external network, comprising:
comparing whether the modification information is consistent with the corresponding login information in the external network;
and under the condition that the modification information is inconsistent with the corresponding login information in the external network, modifying the corresponding login information in the external network into the modification information.
A second aspect of the embodiments of the present application provides an information synchronization apparatus, the apparatus is disposed in a terminal, the apparatus communicates with an intranet and an extranet respectively, the apparatus includes:
the inquiry module is configured to inquire account information input by a user on the intranet to obtain a current state of the account information on the intranet, where the current state includes: the account information exists and the account information does not exist;
the response module is used for acquiring information to be synchronized input by a user aiming at the current state, wherein the information to be synchronized comprises registration information and login information;
and the synchronization module is used for processing the information to be synchronized so as to enable the information to be synchronized to be consistent on the inner network and the outer network.
A third aspect of the embodiments of the present application provides an electronic device, including:
one or more processors; and
one or more machine-readable media having instructions stored thereon, which when executed by the one or more processors, cause the electronic device to perform the information synchronization method as provided by the first aspect of an embodiment of the present application.
A fourth aspect of embodiments of the present application provides one or more machine-readable storage media having instructions stored thereon, which when executed by one or more processors, cause the processors to perform the information synchronization method as provided in the first aspect of embodiments of the present application.
By adopting the information synchronization method provided by the application, the account information input by the user can be inquired on the intranet to obtain two states of the existing account information and the nonexistent account information, and the registration information and the login information input by the user aiming at the two states are responded, and the registration information and the login information are synchronized to the intranet and the extranet so as to keep the synchronization of the information to be synchronized of the intranet and the extranet.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings needed to be used in the description of the embodiments of the present application will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art that other drawings can be obtained according to these drawings without inventive exercise.
Fig. 1 is a diagram of communication architecture among a terminal, an intranet, and an extranet according to an embodiment of the present application;
fig. 2 is a flowchart illustrating steps of an information synchronization method according to an embodiment of the present application;
FIG. 3 is a logic diagram of a portion of an information synchronization method according to an embodiment of the present application;
FIG. 4 is a logic diagram of another part of an information synchronization method according to an embodiment of the present application;
FIG. 5 is a logic diagram of resetting an account password according to an embodiment of the present application;
fig. 6 is a block diagram of an information synchronization apparatus according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some, but not all, embodiments of the present application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Referring to fig. 2, a flowchart of steps of an information synchronization method according to an embodiment of the present application is shown, where the information synchronization method is applied to a terminal, and specifically, may be applied to a terminal application program, and referring to fig. 1, the terminal communicates with an internal network and an external network respectively, and the method includes:
step 101: inquiring account information input by a user on the intranet to obtain the current state of the account information on the intranet, wherein the current state comprises the following steps: the account information exists and the account information does not exist.
In the embodiment of the application, the intranet generally refers to a local area network, the coverage area of the intranet is within thousands of meters, the intranet is a regional network with strong sealing performance, and terminal devices in the intranet can only communicate with each other but cannot communicate with an external network; the external network is an open network, for example, the external network may be the internet or under the internet of view.
Currently, an intranet can specify an application program to communicate with an extranet, that is, the intranet and the extranet can communicate with each other through the application program specified by the intranet, and the application program can be installed in terminal equipment, where the terminal equipment includes a mobile phone, a computer, a tablet and other equipment.
The account information is one of the registration information, for example, a mobile phone number in the registration information input by the user at the time of registration.
In practice, after the user opens the application program designated by the intranet, the user can input the mobile phone number on the account input page of the application program, and the application program can inquire the intranet, specifically, can inquire whether the mobile phone number exists on the intranet server, and if so, the application program obtains the current state of the "the intranet has the mobile phone number"; if the mobile phone number does not exist in the intranet, the application program can obtain the current state that the mobile phone number does not exist in the intranet.
Whether the account information exists in the intranet can be inquired by inputting the account information in the registration information on the account input page by the user, so that the user can inquire whether the registration information corresponding to the user exists in the intranet only by inputting one information in the registration information without inputting all the registration information such as the account information, account passwords, working units, identity information and the like, and convenience is brought to the operation of the user.
Step 102: and acquiring information to be synchronized input by a user aiming at the current state, wherein the information to be synchronized comprises registration information and login information.
In the embodiment of the application, the information to be synchronized is of various types and can be changed according to the change of the page.
For example, in the case of a registration page, the information to be synchronized may be registration information, which includes account information, an account password, work units, identity information, and the like. The account information can be a mobile phone number of the user; the account password is a password set when the user registers the application program; the work unit comprises information such as a unit address, a unit name and the like; the identity information includes an identification number, a user name, and the like.
In the case of a login page, the information to be synchronized may be login information, and the login information may be an account password.
In practice, when the application program determines that the current state of the intranet is that the account information does not exist after the user inputs the account information, it indicates that the intranet does not exist the account information. Therefore, the application program automatically jumps to the registration page, and the user performs registration operation of the registration information such as account information, account password, work unit, identity information and the like in the registration page, so that the application program acquires the registration information such as the account information, the account password, the work unit, the identity information and the like.
When the application program judges that the current state of the intranet is account information after the user inputs the account information, the application program indicates that the intranet has the account information. Therefore, the application program automatically jumps to the login page, and the user performs the login operation of inputting the account password in the login page, so that the application program acquires the login information such as the account password.
Step 103: and processing the information to be synchronized so as to make the information to be synchronized consistent on the inner network and the outer network.
In the embodiment of the application, after the application program acquires the information to be synchronized of different types, different business logics are executed according to the information to be synchronized of different types, so that the information to be synchronized of the intranet is consistent with the information to be synchronized of the extranet.
Different business logics mean that executed business logics are different when the input information to be synchronized is different.
For example, when the application detects that the account information in the intranet does not exist and the acquired information to be synchronized is the registration information such as the account information, the account password, the work unit, the identity information, and the like, it indicates that the user wants to perform the registration operation on the intranet and the extranet on the application, and therefore, the execution of the registration logic automatically jumps to the registration page, and the registration information input by the user in the registration page is registered on the intranet and the extranet.
When the application program detects that the account information in the intranet exists and the obtained information to be synchronized is the account password, the fact that the user wants to perform login operation on the intranet and the extranet on the application program is indicated, therefore, login logic is executed to automatically jump to a login page, and login information input by the user in the login page is synchronized to the intranet and the extranet.
Specifically, the service logic such as query and synchronization executed on the intranet may be a logic executed on an intranet server, and the service logic such as query and synchronization executed on the extranet may be a logic executed on an extranet server such as an internet server and a video network server, which is not limited herein.
Therefore, after different service logics are executed on information to be synchronized for processing, account information input by a user can be inquired to obtain two states of account information existing in the intranet and account information not existing in the intranet, and registration information and login information input by the user aiming at the two states are responded, and the registration information and the login information are synchronized to the intranet and the extranet so as to keep the synchronization of the information to be synchronized of the intranet and the extranet.
Referring to fig. 3, based on the same inventive concept, an embodiment of the present application provides an information synchronization method, where the method is applied to a terminal, and in particular, may be applied to a terminal application program, where the terminal communicates with an intranet and an extranet, respectively, and the method may be applied to a scenario in which a user registers, and the method includes:
step 201: inquiring account information input by a user on the intranet to obtain the current state of the account information on the intranet, wherein the current state comprises the following steps: the account information exists and the account information does not exist.
In the embodiment of the application, the application program can call the intranet interface to inquire the account information so as to determine whether the account information of the intranet exists or not.
Step 202: and jumping to a registration page under the condition that the account information of the intranet does not exist.
In the embodiment of the application, when the application program detects that the account information does not exist in the intranet, the application program indicates that the account information does not exist in the intranet, at this time, the application program jumps to the registration page, and after a user registers the registration information such as the account information, the account password, the work unit, the identity information and the like in the registration page, the application program acquires the registration information such as the account information, the account password, the work unit, the identity information and the like.
Step 203: acquiring the registration information input by the user on the registration page, wherein the registration information at least comprises: account information, account password, work unit, identity information.
Step 204: registering the registration information to the intranet; and after the registration of the internal network is successful, registering the registration information to the external network so as to make the registration information consistent between the internal network and the external network.
In the embodiment of the present application, since the registration information of the external network generally originates from the internal network, and the data of the internal network is not interfered by the external network, so that the security of the data of the internal network is high, in order to ensure the security of the data of the internal network and the external network, the registration information needs to be registered to the internal network first, and after the registration information of the internal network is successfully registered, the registration information is registered to the external network.
Therefore, the intranet is registered first and then the extranet is registered, so that the registration priority of the intranet is higher than that of the extranet, the safe registration information of the intranet can be synchronized into the extranet in the subsequent synchronization process, and the safety of the synchronous registration information of the intranet and the extranet is guaranteed.
In practice, after the registration information is registered to the intranet, if the registration fails in the intranet, the application program pops up an alarm page and pops up prompt information of 'service reason and retry after the environment is normal'; if the registration is successful on the internal network and the registration is successful on the external network, automatically jumping to a login page; if the registration information is registered to the external network again after the registration of the internal network is successful, the login page is still jumped to; and executing a login process on the login page so as to synchronize the registration information registered in the intranet into the extranet.
The reason why the login page still jumps to is that the login page still occurs when the intranet registration is successful and the extranet registration is failed: in the subsequent login process, the application program can automatically synchronize the registration information of the intranet to the extranet, so that even if the initial registration of the extranet fails, the registration information of the intranet can be submitted to the extranet during the login process to ensure that the registration information can be registered to the extranet, thereby ensuring the fault tolerance of submitting the registration information to the extranet.
It should be noted that, in the process of using the application program by the user, if the registration of the intranet is successful and the registration of the extranet is failed, the user can call the data in the intranet but cannot call the data in the extranet; and synchronizing the registered information in the intranet into the extranet under the condition that the subsequent login process detects that the account information of the extranet does not exist and indicates that the registered information does not exist in the extranet, and at the moment, the user can call the data in the intranet and the extranet when using the application program.
In steps 201 to 204, when detecting that the internal network does not have the account information, the application program automatically jumps to the registration page to automatically register the registration information registered by the user to the internal network and then to the external network, and the user does not need to manually register the registration information twice in the internal network and the external network, which is convenient for the user to operate.
In addition, whether account information exists or not is judged firstly, then registration information input by the user is registered, and the user can be prompted whether to register or log in under the condition that the user forgets whether to register the intranet or not. For example, under the condition that an intranet is registered, the application program automatically jumps to a login page to guide a user to execute login operation; under the condition that the intranet is not registered, the application program automatically jumps to a registration page to guide the user to perform registration operation.
Referring to fig. 3 and fig. 4, based on the same inventive concept, an embodiment of the present application provides an information synchronization method, where the method is applied to a terminal, and in particular, may be applied to a terminal application program, where the terminal communicates with an internal network and an external network, respectively, and the method may be applied to a user login scenario, and the method includes:
step 301: inquiring account information input by a user on the intranet to obtain the current state of the account information on the intranet, wherein the current state comprises the following steps: and the account information of the intranet does not exist.
Step 302: and jumping to a login page under the condition that the account information of the intranet exists.
In the embodiment of the application, when the application program detects that the account information exists in the intranet, the application program indicates that the account information exists in the intranet, at this time, the application program jumps to a login page, and after a user inputs login information such as an account password and the like in the login page, the application program acquires the account password.
Step 303: and obtaining login information input by a user on the login page, wherein the login information at least comprises an account password.
In the embodiment of the application, after the application program jumps to the login page, the login page is provided with an input box, a user inputs login information such as an account password in the input box, and the application program can acquire the account password.
Step 304: and encrypting the account password to obtain a current encrypted ciphertext.
In the embodiment of the application, the current encrypted ciphertext refers to the encrypted ciphertext obtained after the user inputs the account password on the login page.
In practice, if the account password input by the user on the login page is directly stored in the application program, the attacker directly obtains the account password input by the user after attacking the application program, and thus, the security of the account password input into the application program cannot be guaranteed.
In order to ensure the security of the account password, after the application program detects the account password input by the user, the application program immediately adopts an md5 salt-adding algorithm to randomly generate a character string for the account password, and encapsulates the randomly generated character string and the account password currently input by the user to obtain a current encrypted ciphertext.
Step 305: and comparing whether the current encrypted ciphertext is the same as a first ciphertext in the intranet, wherein the first ciphertext is an encrypted account password in the intranet.
And after the first ciphertext in the intranet submits the account password in the registration information submitted by the user to the intranet through the application program, encrypting the account password to obtain the first ciphertext.
The first ciphertext is obtained by: after a user inputs registration information on an application program registration page, an application program encrypts an account password in the registration information by using a secret key and sends the encrypted account password to an intranet, so that an attacker is prevented from maliciously obtaining the account password in the process of sending the account password to the intranet by the application program; the application program registers the account password into the intranet, and after the registration process is completed, the same key is adopted to decrypt the account password so as to obtain the account password; and the application program randomly generates a character string for the account password by adopting an md5 salt-adding algorithm, packages the randomly generated character string and the account password during registration to obtain a first ciphertext, and stores the first ciphertext in the intranet so as to prevent an attacker from maliciously acquiring the account password in the intranet.
In practice, comparing a current encrypted ciphertext obtained by encrypting an account password input by a user at the current application program login page with a first ciphertext generated by pre-registering an intranet, and under the condition that the current encrypted ciphertext is different from the first ciphertext, indicating that verification fails, and prompting the user to input the account password again if the account password input by the user is wrong; and under the condition that the current encrypted ciphertext is the same as the first ciphertext, the verification is successful, and the account information input by the user on the application program is inquired on the external network.
By comparing the current encrypted ciphertext with the first ciphertext, an authorized user (a user with correct account password input) can access the data of the account information in the intranet; and the user without permission cannot access the data corresponding to the account information in the intranet.
Step 306: and under the condition that the current encrypted ciphertext is the same as the first ciphertext, inquiring the account information in the external network.
In the embodiment of the application, under the condition that the current encrypted ciphertext is the same as the first ciphertext, the login process in the intranet is verified, the login process in the extranet can be verified, and at this time, whether account information exists in the extranet or not can be inquired firstly.
Step 307: and under the condition that the account information does not exist in the external network, synchronizing the registration information in the internal network to the external network so as to keep the registration information consistent with the external network in the internal network.
In the embodiment of the present application, in the process of registering the registration information in the external network in steps 201 to 204, the login process in steps 301 to 309 is skipped regardless of success or failure of registering the registration information in the external network, so that there is a possibility that the registration information fails to be registered in the external network when the login process is skipped, and the user cannot schedule data of the external network using the application program when the registration information fails to be registered in the external network.
In order to ensure that a user can schedule data of an external network when using an application program, in the login process, whether the external network has account information input by the user needs to be detected, if the account information input by the user does not exist, it is indicated that the registration of the registration information in steps 201 to 204 to the external network fails, at this time, the information to be synchronized registered to the internal network, namely the registration information such as the account information, the account password, the work unit and the identity information registered by the user to the internal network can be synchronized to the external network, so that the consistency of the registration information of the internal network and the registration information of the external network is ensured.
In practice, after the registration information is synchronously submitted to the external network successfully, the login process is completed; after the failure of synchronously submitting the registration information to the external network, the registration information cannot be submitted to the external network in the two processes of the registration process and the login process, and the external network cannot be registered to the registration information, so that prompt information of 'service reason, service termination, and normal retry after environment' needs to be popped up to prompt the user that the user is abnormal, and the user tries again later.
Step 308: and under the condition that the account information exists in the external network, comparing whether the current encrypted ciphertext is the same as a second ciphertext in the external network, wherein the second ciphertext is an encrypted account password in the external network.
And after the second ciphertext in the external network submits the account password in the registration information submitted by the user to the external network through the application program, encrypting the account password to obtain the second ciphertext.
The second ciphertext is obtained by: after a user inputs registration information on an application program registration page, an application program encrypts an account password in the registration information by using a secret key and sends the encrypted account password to an external network, so that an attacker is prevented from maliciously acquiring the account password in the process of sending the account password to the external network by the application program; the application program registers the account password in the external network, and after the registration process is completed, the same key is adopted to decrypt the account password so as to obtain the account password; and the application program randomly generates a character string for the account password by adopting an md5 salting algorithm, packages the randomly generated character string and the account password during registration to obtain a second ciphertext, and stores the second ciphertext in the external network so as to prevent an attacker from maliciously acquiring the account password in the external network.
In practice, comparing an encrypted ciphertext obtained by encrypting an account password input by a user at the current application program login page with a second ciphertext, and updating the account password in the internal network to the external network under the condition that the current encrypted ciphertext is different from the second ciphertext in the external network so as to enable the account password to be consistent on the internal network and the external network; and under the condition that the current encrypted ciphertext is the same as the second ciphertext in the external network, the login process is completed, and the user can directly check the external network data corresponding to the account information in the external network.
Step 309: and under the condition that the current encrypted ciphertext is different from the second ciphertext, synchronizing the login information in the intranet to the extranet so as to keep the login information consistent between the intranet and the extranet.
In the embodiment of the application, in the process of synchronizing the account password currently input by the user from the intranet to the extranet, if the synchronization is successfully updated, the login process is completed; if the synchronous updating fails, a prompt message of 'service reason, service termination and normal environment retry' is popped up on a display page of the application program to prompt a user that the account password in the internal network cannot be updated to the external network currently.
In steps 301 to 309, by setting the encrypted current encrypted ciphertext to be compared with the first ciphertext and the second ciphertext respectively, the security of the account password can be improved, and an attacker is prevented from maliciously acquiring the account password.
And whether the external network has the setting of the account information is detected in the login process, so that the account information in the external network can be ensured to exist when the user uses the application program, and the situation that the user cannot call the data in the external network because the user uses the application program and the external network does not have the registration information is avoided.
Referring to fig. 3 and 4, based on the same inventive concept, an embodiment of the present application provides an information synchronization method, which is applied to a terminal, and in particular, can be applied to a terminal application program, where the terminal communicates with an internal network and an external network, and the method can be applied to a scenario where an administrator or a user resets registered information, and the method includes:
step 401: the method comprises the steps of obtaining reset information input by a user on a preset page, wherein the reset information comprises adding information, deleting information and modifying information.
In the embodiment of the application, the preset page may include an addition page and a modification page, and the addition page and the modification page may be different pages or the same page.
The modification information may be a new account password, a new account name, a new administrative domain and the like which the user wants to reset at present, the deletion information may be blank information, and the addition information may be user information such as age information, head portrait information, gender information and the like which are newly added by the user.
Specifically, as shown in fig. 5, when the application program detects that the account information exists in the intranet, it indicates that the account information exists in the intranet, and at this time, the application program jumps to the login page, and after the user inputs an account password in the login page and logs in successfully, the user clicks a button such as "forget password" or "modify password" on the page where login is successful, and then the application program automatically jumps to the modify page; the user can input modification information, such as a modified new account password, on the modification page, and the application program acquires the modified new account password.
Step 402: and submitting the reset information to the intranet.
In this embodiment of the application, in the case that the reset information is modification information, step 402 includes: comparing whether the modification information is consistent with the corresponding login information in the intranet or not; and under the condition that the modification information is inconsistent with the corresponding login information in the intranet, modifying the corresponding login information in the intranet into the modification information.
When the modification information is inconsistent with the login information in the intranet, for example, the new account password is inconsistent with the old account password in the intranet, it indicates that the user wants to reset the password, and at this time, the old account password in the intranet may be modified to the new account password.
When the modification information is submitted to the intranet and fails, prompting information of 'service reason and retry after the environment is normal' is prompted so as to prompt that the modification information cannot be submitted to the intranet; after the modified information is successfully submitted to the intranet, a character string is randomly generated for the modified information by adopting an md5 salting algorithm, the character string and the modified information are repackaged into a first ciphertext of the intranet to replace the first ciphertext saved during intranet registration, and then the modified information is submitted to the extranet.
In this embodiment of the application, in the case that the reset information is the added information, step 402 includes: and adding the data carried in the adding information into a database of the intranet.
In this embodiment of the application, in the case that the reset information is the deletion information, step 402 includes: and deleting the data corresponding to the deletion information in the intranet database.
Step 403: and synchronizing the reset information to the outer network under the condition that the reset information is successfully submitted to the inner network.
In this embodiment of the application, in the case that the reset information is modification information, step 403 includes: comparing whether the modification information is consistent with the corresponding login information in the external network; and under the condition that the modification information is inconsistent with the corresponding login information in the external network, modifying the corresponding login information in the external network into the modification information.
And the application program directly jumps to the login page from the modification page no matter the modification information is successfully or unsuccessfully submitted to the external network. The reason is that, for example, the modified information is used as the account password, in the subsequent login process, when the account information of the external network exists, the application program compares and verifies the second ciphertext in the external network with the current encrypted ciphertext, when the user compares and verifies the reset account password with the account password before the reset, and when the result is inconsistent, the user indicates that the user wants to reset the account password in the external network, the reset account password in the internal network is updated to the external network. Therefore, no matter whether the reset account password is submitted to the outer network successfully or not, the subsequent password verification process can update the reset account password in the inner network to the outer network, so that the account password of the inner network and the account password of the outer network are kept consistent, and the fault tolerance of the updating of the outer network password is ensured.
In this embodiment of the application, in the case that the reset information is the added information, step 403 includes: and adding the data carried in the adding information into a database of the external network.
In this embodiment of the application, in the case that the reset information is the deletion information, step 403 includes: and deleting the data aiming at the deletion information in the external network database.
In some scenarios, taking the modification information as the account password, the user may modify the account password. When the application program detects that the account information exists in the internal network, the application program indicates that the account information exists in the internal network, the application program skips to a login page at the moment, a user inputs an account password in the login page and after the login is successful, the user clicks buttons such as 'forget password' or 'modify password' on the page after the login is successful, and the application program automatically skips to a modification page; the user can input the reset new account password application program on the modification page to acquire the new account password; the application program compares the new account password with the old account password in the intranet, and updates the new account password to the position where the old account password is stored under the condition that the new account password is inconsistent with the old account password in the intranet; the application program compares the new account password with the old account password in the external network, updates the new account password to the position stored by the old account password under the condition that the new account password is inconsistent with the old account password in the external network, automatically jumps to a login page regardless of success or failure of updating the new account password to the position stored by the old account password, and updates the new account password which is reset in the internal network to the external network in the subsequent login process in which the current encrypted ciphertext is different from the second ciphertext in the external network.
In some scenarios, taking the modification information as a jurisdiction, the user does not have the right to modify the jurisdiction, but the administrator has the right to modify the jurisdiction. In the conventional scheme, when the working location of the user changes, so that the jurisdiction area of the user for the monitoring video is changed from the area a to the area B, an administrator needs to manually update the jurisdiction areas of the user in the intranet and the extranet respectively (update the area a to the area B), and in the process of updating the jurisdiction area of the user, the administrator only can supervise the monitoring video in the area a and cannot supervise the monitoring video in the area B. Therefore, for an administrator, the jurisdiction areas need to be updated twice manually, and the manual updating process of the jurisdiction areas is complicated, so that the work of the administrator is inconvenient; for the user, the user cannot manage the monitoring video of the area with the changed work place in time, which brings inconvenience to the work of the user.
After the technical scheme of the application is adopted, after the working place of the user changes, the administrator can modify the area governed by the user from the area A to the area B in the application program, and the application program can automatically submit the area B to the intranet first and then submit the area B to the extranet. Therefore, for the administrator, the updating process is reduced, and convenience is brought to the work of the administrator; for the user, the application program can synchronize the updated region to the internal network and the external network in time, so that the user can have the jurisdiction right of the monitoring video with the changed location in time, and convenience is brought to the work of the user.
In some scenes, taking the added information as age information as an example, after a user clicks a 'personal information' button in a login page, an application program automatically jumps to a modification page; the user can click an 'age' button in the modification page, after an input box is popped up, the user inputs 24 years in the input box, and the application program can acquire the added age information; and the application program submits the acquired age information to the intranet and then to the extranet. By means of the setting that the added information such as age information and the like can be input in the modification page, after the user forgets to add the added information such as age information and gender information in the registration process, the user can jump to the modification page to add the added information such as age information and gender information.
In some scenes, taking the deleted information as blank information as an example, a user clicks a 'personal information' button in a login page and then jumps to a modification page; the user can click an age button in the modification page, and after the input box is popped up, the user can delete the age of 24 in the input box to obtain blank information; and the application program submits the acquired blank information to the intranet and then to the extranet. By deleting the setting of the age information at the modification page, the privacy of the user can be protected.
Referring to fig. 3 and 4, an embodiment of the present application provides an information synchronization method, which is illustrated by the following embodiments.
Under the condition that account information does not exist in the intranet, a user clicks the next step after inputting a mobile phone number on the application program, the intranet interface is called, whether the mobile phone number exists is inquired in the intranet by taking the mobile phone number as a key word, and if the mobile phone number does not exist, the application program directly jumps to a registration page. After inputting the registration information on the registration page, the user clicks a completion button to submit the registration information to the application program, wherein the submission mode of the application program is serial submission, and the registration information is submitted to the Internet firstly; if the intranet interface is not called, the intranet service is possibly abnormal, and the network is tried later; if the registration information is successfully submitted, the registration information is continuously submitted to the external network, the mobile platform interface is successfully called, the registration service is completed, and the login page is skipped to carry out login; if the data is failed to be submitted to the external network, the login page is directly jumped, because the whole business logic covers the registration of the external network registration information, if the data is not submitted to the external network, the registration information can be automatically registered to the external network in the subsequent login process.
When the account information of the internal network exists and the account information of the external network does not exist, the following automatic registration process is provided: and after the user inputs the mobile phone number in the application program and acquires the registration information of the intranet, jumping to a login page. After a user inputs an account password on a login page, an application program acquires the account password input by the user and registration information of an intranet, and encrypts the account password to obtain a current encrypted ciphertext and a first ciphertext in the intranet for verification; if the verification fails, prompting the user to input the password again; if the verification is successful, the mobile phone number is used as a key word to inquire whether the mobile phone number exists in the external network. Under the condition that the mobile phone number does not exist in the external network, in the login process, the obtained registration information of the internal network is used for carrying out user registration to the external network, if the registration fails, the login service is terminated, which may be a service reason, and the user is prompted to try again in the normal environment; and (5) after the registration is successful, directly entering the home page of the application program to finish the login process.
When the account information of the external network exists and the account information of the internal network exists, the following password automatic updating process is provided: when the acquired mobile phone number of the external network exists, the current encrypted ciphertext obtained by encrypting the account password input by the user and the second ciphertext of the external network are verified, if the current encrypted ciphertext and the second ciphertext are verified to be consistent, the login process is continued, and the login service is completed; if the verification is inconsistent, the account password is subject to the intranet, the extranet interface is called to update the account password of the intranet to the extranet, if the update is abnormal, the login is terminated, retry is performed after the service is normal, the update is successful, the login is continued, and the login process is completed.
The registration information of the intranet has the following password modifying process: after the user enters the login page and successfully logs in, clicking the forgotten password on the page successfully logged in to enter the modification page, calling the intranet interface to reset the password after the password modification is completed by the user, if the modification fails, terminating the service, which may be an environmental problem, and trying after the environment is normal; and if the modification is successful, modifying the acquired first ciphertext in the registration information of the intranet into a first ciphertext encrypted by the new password after the user has reset. And continuously calling the extranet interface to reset the account password, closing the modification page no matter success or failure, jumping back to the login page, and allowing the user to continue to operate.
Referring to fig. 6, based on the same inventive concept, an embodiment of the present application provides an information synchronization apparatus, where the apparatus is disposed in a terminal, and the apparatus communicates with an intranet and an extranet respectively, and the apparatus includes:
the inquiry module is configured to inquire account information input by a user on the intranet to obtain a current state of the account information on the intranet, where the current state includes: the account information of the intranet does not exist;
the response module is used for acquiring information to be synchronized input by a user aiming at the current state, wherein the information to be synchronized comprises registration information and login information;
and the synchronization module is used for processing the information to be synchronized so as to enable the information to be synchronized to be consistent on the inner network and the outer network.
Optionally, the response module includes:
the registration page jumping module is used for jumping to a registration page under the condition that the account information of the intranet does not exist;
a registration information obtaining module, configured to obtain, on the registration page, registration information input by a user, where the registration information at least includes: account information, account password, work unit and identity information;
the synchronization module includes:
the intranet registration module is used for registering the registration information to the intranet;
and the outer network registration module is used for registering the registration information to the outer network after the inner network is successfully registered so as to make the registration information consistent between the inner network and the outer network.
Optionally, the apparatus further comprises:
the first login page skipping module is used for skipping to a login page under the condition that the registration information is not registered to the external network after the internal network is successfully registered;
and the first login information input module is used for executing a login process on the login page so as to synchronize the registration information registered in the intranet into the extranet.
Optionally, the response module includes:
the second login page skipping module is used for skipping to a login page under the condition that the account information of the intranet exists;
the second login information input module is used for acquiring login information input by a user on the login page, and the login information at least comprises an account password;
the synchronization module includes:
the first encryption module is used for encrypting the account password to obtain a current encrypted ciphertext;
the first comparison module is used for comparing whether the current encrypted ciphertext is the same as a first ciphertext in the intranet or not, wherein the first ciphertext is an encrypted account password in the intranet;
the query submodule is used for querying the account information in the external network under the condition that the current encrypted ciphertext is the same as the first ciphertext;
and the first synchronization sub-module is used for synchronizing the registration information in the intranet to the extranet under the condition that the account information does not exist in the extranet so as to keep the registration information consistent with the extranet in the intranet.
Optionally, the apparatus further comprises:
a second comparing module, configured to compare whether the current encrypted ciphertext is the same as a second ciphertext in the external network when the account information exists in the external network, where the second ciphertext is an encrypted account password in the external network;
and the second synchronization submodule is used for synchronizing the login information in the intranet to the extranet under the condition that the current encrypted ciphertext is different from the second ciphertext so as to keep the login information consistent between the intranet and the extranet.
Optionally, the apparatus further comprises:
the system comprises a reset information acquisition module, a display module and a display module, wherein the reset information acquisition module is used for acquiring reset information input by a user on a preset page, and the reset information comprises addition information, deletion information and modification information;
the reset information intranet submitting module is used for submitting the reset information to the intranet;
and the reset information outer network submitting module is used for synchronizing the reset information to the outer network under the condition that the reset information is successfully submitted to the inner network.
Optionally, the module for submitting reset information intranet includes:
the third comparison module is used for comparing whether the modification information is consistent with the corresponding login information in the intranet or not;
the first submitting submodule is used for modifying the corresponding login information in the intranet into the modification information under the condition that the modification information is inconsistent with the corresponding login information in the intranet;
the reset information extranet submission module comprises:
the fourth comparison module is used for comparing whether the modification information is consistent with the corresponding login information in the external network or not;
and the second submitting submodule is used for modifying the corresponding login information in the external network into the modification information under the condition that the modification information is inconsistent with the corresponding login information in the external network.
Based on the same inventive concept, an embodiment of the present application provides an electronic device, including:
one or more processors; and
one or more machine-readable media having instructions stored thereon, which when executed by the one or more processors, cause the electronic device to perform the information synchronization method as described above.
Based on the same inventive concept, the present application provides one or more machine-readable storage media, characterized by instructions stored thereon, which when executed by one or more processors, cause the processors to perform the information synchronization method as described in the claims.
For the device embodiment, since it is basically similar to the method embodiment, the description is simple, and for the relevant points, refer to the partial description of the method embodiment.
The embodiments in the present specification are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other.
As will be appreciated by one of skill in the art, embodiments of the present application may be provided as a method, apparatus, or computer program product. Accordingly, embodiments of the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, embodiments of the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
Embodiments of the present application are described with reference to flowchart illustrations and/or block diagrams of methods, terminal devices (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing terminal to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing terminal, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing terminal to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing terminal to cause a series of operational steps to be performed on the computer or other programmable terminal to produce a computer implemented process such that the instructions which execute on the computer or other programmable terminal provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present application have been described, additional variations and modifications of these embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including the preferred embodiment and all such alterations and modifications as fall within the true scope of the embodiments of the application.
Finally, it should also be noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or terminal that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or terminal. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or terminal that comprises the element.
The above detailed description is given to an information synchronization method, an information synchronization apparatus, an electronic device, and a storage medium, and a specific example is applied in the description to explain the principles and embodiments of the present application, and the description of the above embodiment is only used to help understand the method and the core idea of the present application; meanwhile, for a person skilled in the art, according to the idea of the present application, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present application.
Claims (10)
1. An information synchronization method is applied to a terminal, wherein the terminal is respectively communicated with an internal network and an external network, and the method comprises the following steps:
inquiring account information input by a user on the intranet to obtain the current state of the account information on the intranet, wherein the current state comprises the following steps: the account information exists and the account information does not exist;
acquiring information to be synchronized input by a user aiming at the current state, wherein the information to be synchronized comprises registration information and login information;
and processing the information to be synchronized so as to make the information to be synchronized consistent on the inner network and the outer network.
2. The method according to claim 1, wherein acquiring the information to be synchronized input by the user for the current state in the case that the account information of the intranet does not exist comprises:
skipping to a registration page under the condition that the account information of the intranet does not exist;
acquiring the registration information input by the user on the registration page, wherein the registration information at least comprises: account information, account password, work unit and identity information;
processing the information to be synchronized to make the information to be synchronized consistent on the inner network and the outer network, including:
registering the registration information to the intranet;
and after the registration of the internal network is successful, registering the registration information to the external network so as to make the registration information consistent between the internal network and the external network.
3. The method of claim 2, further comprising:
after the intranet is successfully registered, the registration information is registered to the extranet and the login page is skipped to under the condition that the registration information is not registered to the extranet;
and executing a login process on the login page so as to synchronize the registration information registered in the intranet into the extranet.
4. The method according to claim 1, wherein acquiring the information to be synchronized, which is input by the user for the current state, in the case that the account information of the intranet exists, includes:
skipping to a login page under the condition that the account information of the intranet exists;
obtaining login information input by a user on the login page, wherein the login information at least comprises an account password;
processing the information to be synchronized to make the information to be synchronized consistent on the inner network and the outer network, including:
encrypting the account password to obtain a current encrypted ciphertext;
comparing whether the current encrypted ciphertext is the same as a first ciphertext in the intranet, wherein the first ciphertext is an encrypted account password in the intranet;
under the condition that the current encrypted ciphertext is the same as the first ciphertext, inquiring the account information in the external network;
and under the condition that the account information does not exist in the external network, synchronizing the registration information in the internal network to the external network so as to keep the registration information consistent with the external network in the internal network.
5. The method of claim 4, further comprising:
comparing whether the current encrypted ciphertext is the same as a second ciphertext in the external network or not under the condition that the account information exists in the external network, wherein the second ciphertext is an encrypted account password in the external network;
and under the condition that the current encrypted ciphertext is different from the second ciphertext, synchronizing the login information in the intranet to the extranet so as to keep the login information consistent between the intranet and the extranet.
6. The method of claim 1, wherein after the login information is consistent between the extranet and the extranet, the method further comprises:
acquiring reset information input by a user on a preset page, wherein the reset information comprises adding information, deleting information and modifying information;
submitting the reset information to the intranet;
and synchronizing the reset information to the outer network under the condition that the reset information is successfully submitted to the inner network.
7. The method according to claim 6, wherein in the case where the reset information is the modification information;
submitting the reset information to the intranet, including:
comparing whether the modification information is consistent with the corresponding login information in the intranet or not;
under the condition that the modification information is inconsistent with the corresponding login information in the intranet, modifying the corresponding login information in the intranet into the modification information;
synchronizing the reset information to the external network, comprising:
comparing whether the modification information is consistent with the corresponding login information in the external network;
and under the condition that the modification information is inconsistent with the corresponding login information in the external network, modifying the corresponding login information in the external network into the modification information.
8. An information synchronization device, characterized in that, the device sets up in the terminal, the device respectively with intranet and extranet communication, the device includes:
the inquiry module is configured to inquire account information input by a user on the intranet to obtain a current state of the account information on the intranet, where the current state includes: the account information exists and the account information does not exist;
the response module is used for acquiring information to be synchronized input by a user aiming at the current state, wherein the information to be synchronized comprises registration information and login information;
and the synchronization module is used for processing the information to be synchronized so as to enable the information to be synchronized to be consistent on the inner network and the outer network.
9. An electronic device, comprising:
one or more processors; and
one or more machine-readable media having instructions stored thereon that, when executed by the one or more processors, cause the electronic device to perform the information synchronization method of any of claims 1-7.
10. One or more machine-readable storage media having instructions stored thereon, which when executed by one or more processors, cause the processors to perform the information synchronization method of any of claims 1-7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111265002.XA CN114189527B (en) | 2021-10-28 | 2021-10-28 | Information synchronization method and device, electronic equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111265002.XA CN114189527B (en) | 2021-10-28 | 2021-10-28 | Information synchronization method and device, electronic equipment and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114189527A true CN114189527A (en) | 2022-03-15 |
CN114189527B CN114189527B (en) | 2024-06-28 |
Family
ID=80601664
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111265002.XA Active CN114189527B (en) | 2021-10-28 | 2021-10-28 | Information synchronization method and device, electronic equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114189527B (en) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106850517A (en) * | 2015-12-04 | 2017-06-13 | 北京京东尚科信息技术有限公司 | A kind of method, apparatus and system for solving intranet and extranet repeat logon |
WO2019237576A1 (en) * | 2018-06-13 | 2019-12-19 | 平安科技(深圳)有限公司 | Method and apparatus for verifying communication performance of virtual machine |
CN110830578A (en) * | 2019-11-11 | 2020-02-21 | 支付宝(杭州)信息技术有限公司 | Remote control method, system and equipment |
CN110855639A (en) * | 2019-10-29 | 2020-02-28 | 云深互联(北京)科技有限公司 | Method, device and equipment for controlling login of intranet and extranet of browser |
CN111049907A (en) * | 2019-12-12 | 2020-04-21 | 杭州安恒信息技术股份有限公司 | File transmission method, device, system, equipment and readable storage medium |
CN111062024A (en) * | 2019-11-25 | 2020-04-24 | 泰康保险集团股份有限公司 | Application login method and device |
CN113364800A (en) * | 2021-06-23 | 2021-09-07 | 北京天融信网络安全技术有限公司 | Resource access control method, device, electronic equipment and medium |
-
2021
- 2021-10-28 CN CN202111265002.XA patent/CN114189527B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106850517A (en) * | 2015-12-04 | 2017-06-13 | 北京京东尚科信息技术有限公司 | A kind of method, apparatus and system for solving intranet and extranet repeat logon |
WO2019237576A1 (en) * | 2018-06-13 | 2019-12-19 | 平安科技(深圳)有限公司 | Method and apparatus for verifying communication performance of virtual machine |
CN110855639A (en) * | 2019-10-29 | 2020-02-28 | 云深互联(北京)科技有限公司 | Method, device and equipment for controlling login of intranet and extranet of browser |
CN110830578A (en) * | 2019-11-11 | 2020-02-21 | 支付宝(杭州)信息技术有限公司 | Remote control method, system and equipment |
CN111062024A (en) * | 2019-11-25 | 2020-04-24 | 泰康保险集团股份有限公司 | Application login method and device |
CN111049907A (en) * | 2019-12-12 | 2020-04-21 | 杭州安恒信息技术股份有限公司 | File transmission method, device, system, equipment and readable storage medium |
CN113364800A (en) * | 2021-06-23 | 2021-09-07 | 北京天融信网络安全技术有限公司 | Resource access control method, device, electronic equipment and medium |
Also Published As
Publication number | Publication date |
---|---|
CN114189527B (en) | 2024-06-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10445487B2 (en) | Methods and apparatus for authentication of joint account login | |
JP6386069B2 (en) | Connection management method, apparatus, electronic equipment, program, and recording medium | |
US9131377B2 (en) | Method and apparatus for unlocking operating system | |
EP3346660B1 (en) | Authentication information update method and device | |
US10063538B2 (en) | System for secure login, and method and apparatus for same | |
CN105978917A (en) | System and method for trusted application security authentication | |
CN108259502A (en) | For obtaining the identification method of interface access rights, server-side and storage medium | |
CN116011005A (en) | Method and system for preventing phishing or luxury software attacks | |
CN111460410A (en) | Server login method, device and system and computer readable storage medium | |
US20200036525A1 (en) | Method for determining approval for access to gate through network, and server and computer-readable recording media using the same | |
CN110958239A (en) | Method and device for verifying access request, storage medium and electronic device | |
CN111405016B (en) | User information acquisition method and related equipment | |
US20220353081A1 (en) | User authentication techniques across applications on a user device | |
CN105809045A (en) | Method and device for processing equipment systems during data reset | |
CN109314711B (en) | Open authorization method, device and terminal | |
CN114189527A (en) | Information synchronization method and device, electronic equipment and storage medium | |
CN115037453B (en) | Data protection method and system and electronic equipment | |
CN116743496A (en) | Device remote operation method, device, computer device and storage medium | |
CN111984961B (en) | Password resetting system, method, device, equipment and storage medium | |
CN114499981A (en) | Video access method and device | |
KR20180116628A (en) | User access authentication system based on personal image | |
CN115037451A (en) | Data protection method and electronic equipment | |
CN115021894A (en) | Data protection method and system and electronic equipment | |
CN115037455B (en) | Data protection method and system and electronic equipment | |
CN117278204B (en) | Data protection method and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |