Method for logging in terminal equipment by cloud user

A terminal device and cloud technology, applied in the field of network security, to achieve the effect of maintaining security and reliability and reducing risks

Inactive Publication Date: 2021-03-16
SICHUAN CHANGHONG ELECTRIC CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The purpose of the present invention is to provide a method for cloud users to log in terminal equipment, which is used to solve the problem that there is no safe and efficient login method in the prior art that can satisfy cloud user login security and business operations on terminal equipment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for logging in terminal equipment by cloud user
  • Method for logging in terminal equipment by cloud user

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0024] combine figure 1 and figure 2 As shown, a method for a cloud user to log in on a terminal device includes the following steps:

[0025] Step S101, the cloud user initiates a login request on the terminal device for the first time, the cloud creates and initializes a token cache pool, creates a security token and pushes it into area 1, and creates an associated token (associated token 1) of the security token at the same time, The terminal device initiates a login request to the cloud based on the entered user name, password, and device SN number; the cloud intercepts the user information reported by the terminal device, and verifies the validity of the password after the verification of the user name and SN number passes; if the password If it is illegal, it will return a message indicating that the password is wrong to the terminal device; if the password is legal, it will obtain the necessary basic data; according to the basic necessary data, create a security token...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for logging in a terminal device by a cloud user. The method comprises the steps that a terminal device initiates a login request to a cloud; the cloud creates a security token and an association token; the cloud initiates a request for creating a token cache pool to the database; the cloud returns the created security token to the terminal device; the terminal device sends a service request to the cloud and reports a security token; and the cloud checks the legality of the reported arrangement token, returns a re-sending login request according to a check result, and returns an associated token or triggers a terminal device locking mechanism. According to the method, a token cache pool is maintained for a cloud user, and the token cache pool in an area inthe token cache pool is set; the token cache pool is maintained; after the terminal equipment initiates the service request, the user security token carried by the terminal equipment is verified according to the token cache pool, and the validity period and identity legality of the security token are judged, so that the security reliability of service processing of a cloud user on the same terminal equipment is maintained, and the risk of the user is reduced.

Description

technical field [0001] The present invention relates to the technical field of network security, and specifically relates to a method for a cloud user to log in to a terminal device. Background technique [0002] Under the joint promotion of Internet of Things technology and Internet cloud services, terminal devices are becoming more and more intelligent. In the process of data interaction with the cloud, the terminal device needs a legal identity, that is, the cloud user, and maintaining the legitimacy of the cloud user is a common problem faced by the terminal device and the cloud. In this case, the user identity has the dual attributes of the cloud and the device, and also faces relatively complex technical problems, the most prominent being security and the communication and interaction between cloud users and devices. From the perspective of business, realizing the secure login of cloud users on terminal devices can avoid the disorder and conflict of business data; fro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3213H04L63/0807H04L63/083H04L63/0876H04L63/108
Inventor 康钟荣谌烜
Owner SICHUAN CHANGHONG ELECTRIC CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products