WO2018219007A1 - User login method, electronic device and storage medium in data query system - Google Patents

User login method, electronic device and storage medium in data query system Download PDF

Info

Publication number
WO2018219007A1
WO2018219007A1 PCT/CN2018/078631 CN2018078631W WO2018219007A1 WO 2018219007 A1 WO2018219007 A1 WO 2018219007A1 CN 2018078631 W CN2018078631 W CN 2018078631W WO 2018219007 A1 WO2018219007 A1 WO 2018219007A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
login
user
data query
query system
Prior art date
Application number
PCT/CN2018/078631
Other languages
French (fr)
Chinese (zh)
Inventor
尹义
邱璐
石小华
苏建钢
彭程
Original Assignee
深圳云天励飞技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳云天励飞技术有限公司 filed Critical 深圳云天励飞技术有限公司
Publication of WO2018219007A1 publication Critical patent/WO2018219007A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/18Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels

Definitions

  • the present invention relates to the field of communications, and in particular, to a user login method, an electronic device, and a storage medium in a data query system.
  • the data query system is a commonly used system in the current application management system.
  • the data query function may have different permissions for different users in the data query system, thereby providing different services for different users.
  • the existing data query system cannot remind the user to log in, and the user experience is poor.
  • One of the objectives of the present invention is to provide a user login method, an electronic device, and a storage medium in a data query system, which mainly solve the shortcomings of the existing user experience.
  • the first aspect provides a user login method in a data query system, where the method includes the following steps:
  • the data query system receives a login request of the user, where the login request includes: a user login ID, a password, and a terminal ID;
  • the data query system queries the historical terminal ID of the user login ID
  • the prompt information is sent to the historical terminal, and after receiving the confirmation message returned by the historical terminal, the data query system allows the user to log in.
  • the prompt information is: a short message or an instant messaging software message.
  • the method further includes:
  • the data query system counts the number of logins of the terminal ID in the set time. If the number of logins exceeds the set threshold, the terminal ID is replaced with the historical terminal ID.
  • the login request further includes: any one or any combination of fingerprint information, palm print information, and facial photos.
  • the method further includes:
  • the data query system counts the registration frequency of the terminal ID in the set time. If the login frequency exceeds the frequency threshold, the terminal ID is replaced with the historical terminal ID.
  • the method includes:
  • the data query system reads the second RF identifier corresponding to the second RF communication protocol of the access card through the card reader of the second RF communication protocol, the access card includes: a first RF communication protocol and a second RF communication protocol, the first The RF communication protocol is incompatible with the second RF communication protocol, and the data query system acquires the second login ID corresponding to the second RF identifier according to the mapping relationship between the pre-configured second RF identifier and the login ID, such as the second login ID and the user ID. The same is determined as a normal login, and the user ID is assigned a high authority.
  • the data query system If the data query system cannot read the second RF identifier by the card reader of the second RF communication protocol or the read second login ID is different from the user ID, and the login abnormality is determined, the data query system allocates a hidden identifier for the user ID. Permissions and execute the hidden alarm process.
  • a data query system comprising:
  • a transceiver unit configured to receive a login request of the user, where the login request includes: a user login ID, a password, and a terminal ID;
  • the processing unit is configured to query the historical terminal ID of the user login ID; if the terminal ID is different from the historical terminal ID, send the prompt information to the historical terminal, and after receiving the confirmation message returned by the historical terminal, allow the user to log in.
  • the prompt information is: a short message or an instant messaging software message.
  • the processing unit is further configured to count the number of logins of the terminal ID in the set time, and if the number of logins exceeds the set threshold, replace the terminal ID with the historical terminal ID.
  • the system further includes: an RF reading unit, the RF reading unit supports a second RF communication protocol;
  • the RF reading unit is configured to read a second RF identifier corresponding to a second RF communication protocol of the access card, where the access card comprises: a first RF communication protocol and a second RF communication protocol, the first RF communication The protocol is not compatible with the second RF communication protocol;
  • the processing unit is configured to acquire a second login ID corresponding to the second RF identifier according to a mapping relationship between the second RF identifier and the login ID, where the second login ID is the same as the user ID, and is determined to be normal. Login, assigning high privileges to the user ID.
  • the processing unit is further configured to: the card reader that is unable to read the second RF identifier by the second RF communication protocol or the second login ID that is read is different from the user ID, and determine that the login abnormality is performed, and the data query system is Assign hidden permissions to the user ID and perform a hidden alert process.
  • an electronic device comprising a processor, the processor for implementing a user login method in the data query system when executing a computer program stored in a memory.
  • a fourth aspect provides a computer readable storage medium having stored thereon a computer program that, when executed by a processor, implements a user login method in the data query system.
  • the data query system After adopting the user login method and system in the data query system, the data query system can extract the user login ID and the terminal ID in the login request, and the data query system queries the history of the user login ID. The terminal ID compares the historical terminal ID with the terminal ID. If the comparison is inconsistent, the prompt information is sent to the history terminal, and after receiving the confirmation message, the user is allowed to log in.
  • the data query system of the public security department since the stored data has certain confidentiality or privacy, the registration of the data query system of the public security department requires strict control, that is, under the premise of ensuring its security.
  • the verification of the user login ID is implemented by recording the historical terminal ID of the user login ID, because for the user login ID, the terminal that is logged in in the public security department is relatively fixed, so the history The terminal ID is relatively fixed. If the user replaces the terminal login, because the history terminal is secure, when the new terminal performs the login of the user login ID, it sends a prompt message to the secure history terminal to verify whether the new terminal is secure. The verification succeeds in allowing new terminal logins to improve security.
  • the historical terminal belongs to the terminal device commonly used by the user, the user is more convenient to use, so the user can send the confirmation message at any time, and the user's use is not affected. Therefore, the technical solution provided by the present invention can affect the user's use, Users make reminders to improve the security of the data query system and enhance the user experience.
  • FIG. 1 is a schematic flowchart of a user login method in a data query system according to a preferred embodiment of the present invention.
  • FIG. 2 is a schematic flowchart of a user login method in a data query system according to still another preferred embodiment of the present invention.
  • FIG. 3 is a schematic structural diagram of a data query system according to another preferred embodiment of the present invention.
  • FIG. 4 is a structural diagram of an electronic device according to the present invention.
  • terminal refers to an intelligent electronic device that can perform predetermined processing procedures such as numerical calculations and/or logical calculations by running predetermined programs or instructions, which may include a processor and The memory is executed by the processor to execute a predetermined process pre-stored in the memory to execute a predetermined process, or is executed by hardware such as an ASIC, an FPGA, a DSP, or the like, or a combination of the two.
  • Terminals include, but are not limited to, tablets, smart phones, personal digital assistants, e-books, and the like.
  • a user login method of a data query system is provided.
  • the method is implemented by a data query system, which may be: a computer device, a server, a mobile phone terminal, etc., the data query system. It can be applied to the public security department.
  • the data query system is set up in the Shenzhen Public Security Bureau.
  • the query authority corresponding to each login ID may also be Different data, and the data that can be queried generally have confidential requirements, such as the location information of the person, the video of the vehicle, etc., and have certain confidentiality requirements for the data, so what method is used for the data query system to restrict the login It is very important to provide a user login method for the data query system in order to restrict the login of the data query system without affecting the normal login.
  • the method is as shown in FIG. 1 and includes the following steps:
  • Step S101 The data query system receives a login request of the user, where the login request includes: a user login ID, a password, and a terminal ID.
  • the login request in the above step S101 may have different representations according to different platforms.
  • an internal system it can be an internal login message (eg, an Office Automation (OA) message).
  • OA Office Automation
  • an external system it may be a login message of a communication protocol (for example, a HyperText Transfer Protocol (HTTP) request).
  • HTTP HyperText Transfer Protocol
  • the specific communication protocol is not limited in the specific embodiment of the present invention.
  • the terminal ID may be a number of the login terminal, a MAC address of the login terminal, or another identifier capable of identifying the login terminal.
  • Step S102 The data query system queries the historical terminal ID of the user login ID.
  • the history terminal in the above step S102 is the terminal ID used when the user login ID is successfully registered before step S101.
  • the historical terminal may be a terminal ID used when the user login ID is successfully registered N times.
  • the historical terminal can be queried in the database of the data query system.
  • a database of the user login ID can be set in the database of the data query system, and the historical terminal ID used after the login ID of the user is successfully logged is recorded in the list.
  • the database queries the user login ID list corresponding to the user login ID, and extracts the historical terminal ID in the list.
  • Step S103 If the terminal ID is different from the historical terminal ID, send the prompt information to the historical terminal, and after receiving the confirmation message returned by the historical terminal, the data query system allows the user to log in.
  • the data query system directly allows the user to log in.
  • the prompt information in the above step S103 may be a short message, and of course, in actual applications, other types of messages, such as instant messaging messages, including but not limited to: WeChat messages, QQ messages, Facebook messages, nailed messages, and more.
  • the foregoing manner of sending the prompt information to the historical terminal may be:
  • the data query system it is very likely that it is an internal data query system, that is, the data query system is not connected to the Internet or the mobile communication network.
  • a closed data query system in addition to sending a prompt to the history terminal.
  • Information in addition to receiving confirmation messages for verification, it is also necessary to increase its security, because for closed data query systems, the security requirements of the data are generally high, so you should set a higher security for the closed data query system.
  • Level in order to improve the security level, here combined with the employee's access card to comprehensive verification. This application improves the security by identifying the employee's access control card by radio frequency (English: Radio Frequency, RF). Specifically, two kinds of RF communication protocols are set for the employee's access card.
  • the first RF communication protocol and the second RF communication protocol are named here, and the first RF communication protocol is incompatible with the second RF communication protocol.
  • An RF communication protocol corresponds to the first RF identifier, and the first communication protocol and the first RF identifier are not displayed.
  • the first RF identifier can be used to implement an ordinary access control office area, etc., and the second RF communication protocol is hidden. This will increase the difficulty of cracking.
  • the data query system reads the second RF identifier corresponding to the second RF communication protocol of the access card through the card reader of the second RF communication protocol, and obtains the second RF identifier according to the mapping relationship between the second RF identifier and the login ID.
  • the second login ID if the second login ID is the same as the user ID, is determined to be a normal login, and the user ID is assigned a high authority. If the data query system cannot read the second RF identifier by the card reader of the second RF communication protocol or the read second login ID is different from the user ID, and the login abnormality is determined, the data query system allocates a hidden identifier for the user ID. Permissions and execute the hidden alarm process.
  • the above-mentioned hidden authority that is, the right allocated by the data query system for the user ID can only query some specific data, and the specific data is generally non-confidential data, so that the user mistakenly believes that the login has been successfully performed, so that the subsequent alarm process is processed. Staff strive to deal with time.
  • the above-mentioned hidden alarm process may be an alarm process that is not detected by the user login. The specific expression of the alarm process is not limited.
  • the technical solution provided by the present invention directly acquires the terminal ID when the user logs in, compares the terminal ID with the historical terminal ID, implements matching identification of the login terminal, and sends a prompt message to the login terminal to remind the user to improve the user experience. .
  • FIG. 2 provides a user login method in a data query system.
  • the method is implemented by a data query system.
  • the data query system may be: a computer device, a server, a mobile phone terminal, and the like.
  • the method is as shown in FIG. 2 . Including the following steps:
  • Step S201 The data query system receives a login request of the user, where the login request includes: a user login ID, a password, and a terminal ID.
  • the login request in the above step S201 can be represented by different representations according to different platforms.
  • it can pass an internal login message.
  • it may be a login message of a communication protocol, and the specific communication protocol is not limited in the specific embodiment of the present invention.
  • the terminal ID may be a number of the login terminal, a MAC address of the login terminal, or another identifier capable of identifying the login terminal.
  • Step S202 The data query system queries the historical terminal ID of the user login ID.
  • the history terminal in the above step S202 is the terminal ID used when the user login ID is successfully registered before step S201.
  • the historical terminal may be a terminal ID used when the user login ID is successfully registered N times.
  • Step S203 If the terminal ID is different from the historical terminal ID, send the prompt information to the historical terminal, and after receiving the confirmation message returned by the historical terminal, the data query system allows the user to log in.
  • the prompt information in the above step S203 may be a short message, of course, in actual applications, other types of messages, such as instant messaging messages, including but not limited to: WeChat messages, QQ messages, Facebook messages, and nail messages. and many more.
  • Step S204 The data query system counts the number of logins of the terminal ID in the set time. If the number of logins exceeds the set threshold, the terminal ID is replaced with the historical terminal ID.
  • the number of logins may be the number of successful logins.
  • the number of logins can be effectively recorded only after the login is successful.
  • Other embodiments or other steps of the application, if not specified, the number of logins can be understood as the number of successful logins.
  • the technical solution provided by the present invention directly acquires the terminal ID when the user logs in, compares the terminal ID with the historical terminal ID, implements matching identification of the login terminal, and sends a prompt message to the login terminal to remind the user to improve the user experience. .
  • the foregoing login request may further include: any one or any combination of fingerprint information, palm print information, and facial photo.
  • step S204 may also be replaced by any one of the following steps S204-1, S204-2 or S204-3.
  • Step S204-1 The data query system counts the registration frequency of the terminal ID in the set time. If the login frequency exceeds the frequency threshold, the terminal ID is replaced with the historical terminal ID.
  • the specific statistical method of the above login frequency may be, for example, the set time is 1 day, within 1 day, the terminal ID is successfully registered once, and the counter is incremented by 1. If the login succeeds 5 times within 1 day, the login frequency may be 5 Times/day. Replacing the historical terminal ID by the login frequency can speed up the update of the historical terminal ID, because for the public security department, if a user ID successfully logs in many times in the same terminal, it is likely that the police officer corresponding to the user ID has been replaced. If the terminal counts by the number of logins, the threshold is generally set for security. Therefore, the time required for statistics is long, and the frequency of updating the historical terminal ID is also reduced, which makes the user inconvenient to use. When the historical terminal ID is replaced by the login frequency of the set time, the replacement of the historical terminal ID can be realized within the set time, and the rapid replacement of the historical terminal ID is realized.
  • Step S204-2 The data query system acquires location information of the login terminal. If the location information is within the set range, the terminal ID is replaced with the historical terminal ID.
  • the above location information can be obtained through terminal location.
  • the public security department is used to explain the technical effect.
  • the public security department especially the speciality of its department makes it difficult for the public security department's office address to enter the office address, that is, if it enters the office address, it can use the office.
  • the terminal in the address can basically determine the personnel belonging to the public security department, and directly replace the historical terminal ID, and increase the update frequency of the historical terminal ID.
  • Step S204-3 The data query system acquires location information of the login terminal, determines whether the location information is one of the plurality of set location information, and if yes, replaces the terminal ID with the historical terminal ID.
  • the above location information can be obtained through terminal location.
  • step S204-2 is that instead of setting the range, multiple setting position information is used as a trigger condition for performing historical terminal ID replacement, combined with the actual application scenario of the public security department, for the public security department. Due to the importance and confidentiality of data query by the public security department, the allocation of rights is more important. Therefore, the query of the data query system may need to be set in a specific number of locations. This technical solution can limit the login of the user ID. On a limited number of terminals, avoiding the login of the user ID through other terminals improves security.
  • FIG. 3 provides a data query system 30.
  • the system includes:
  • the transceiver unit 301 is configured to receive a login request of the user, where the login request includes: a user login ID, a password, and a terminal ID;
  • the processing unit 302 is configured to query the historical terminal ID of the user login ID; if the terminal ID is different from the historical terminal ID, send the prompt information to the historical terminal, and after receiving the confirmation message returned by the historical terminal, allow the user to log in.
  • the prompt information is: a short message or an instant messaging software message.
  • the processing unit 302 is further configured to count the number of logins of the terminal ID in the set time, and if the number of logins exceeds the set threshold, replace the terminal ID with the historical terminal ID.
  • the login request further includes: any one or any combination of fingerprint information, palm print information, and facial photos.
  • the processing unit 302 is further configured to collect a registration frequency of the terminal ID in the set time, and if the login frequency exceeds the frequency threshold, replace the terminal ID with the historical terminal ID.
  • the specific statistical method of the above login frequency may be, for example, the set time is 1 day, within 1 day, the terminal ID is successfully registered once, and the counter is incremented by 1. If the login succeeds 5 times within 1 day, the login frequency may be 5 Times/day. Replacing the historical terminal ID by the login frequency can speed up the update of the historical terminal ID, because for the public security department, if a user ID successfully logs in many times in the same terminal, it is likely that the police officer corresponding to the user ID has been replaced. If the terminal counts by the number of logins, the threshold is generally set for security. Therefore, the time required for statistics is long, and the frequency of updating the historical terminal ID is also reduced, which makes the user inconvenient to use. When the historical terminal ID is replaced by the login frequency of the set time, the replacement of the historical terminal ID can be realized within the set time, and the rapid replacement of the historical terminal ID is realized.
  • the processing unit 302 is further configured to obtain location information of the login terminal, where the location information is located in the set range, and replace the terminal ID with the historical terminal ID.
  • the above location information can be obtained through terminal location.
  • the public security department is used to explain the technical effect.
  • the public security department especially the speciality of its department makes it difficult for the public security department's office address to enter the office address, that is, if it enters the office address, it can use the office.
  • the terminal in the address can basically determine the personnel belonging to the public security department, and directly replace the historical terminal ID, and increase the update frequency of the historical terminal ID.
  • the processing unit 302 is further configured to acquire location information of the login terminal, determine whether the location information is one of the plurality of set location information, and if yes, replace the terminal ID with the historical terminal ID.
  • the above location information can be obtained through terminal location.
  • terminal location is not a set range, but a plurality of set position information for triggering whether to change the historical terminal ID, combined with the actual application scenario of the public security department, for the public security department, due to the importance of data query by the public security department and Confidentiality, the allocation of rights is more important, so the query of the data query system may need to be set in a specific number of positions.
  • This technical solution can limit the login of the user ID to a limited number of terminals, avoiding the passage. Other terminals log in to the user ID, which improves security.
  • the foregoing system further includes: an RF reading unit 303, and the RF reading unit 303 supports the second RF communication protocol;
  • the RF reading unit 303 is configured to read a second RF identifier corresponding to the second RF communication protocol of the access card, where the access card comprises: a first RF communication protocol and a second RF communication protocol, the first RF communication protocol Not compatible with the second RF communication protocol;
  • the processing unit 302 is further configured to acquire, according to the mapping relationship between the pre-configured second RF identifier and the login ID, the second login ID corresponding to the second RF identifier, where the second login ID is the same as the user ID, and is determined to be normal. Login, assigning high privileges to the user ID.
  • the processing unit 302 is further configured to: the second RF identifier cannot be read by the card reader of the second RF communication protocol, or the read second login ID is different from the user ID, and the login abnormality is determined, and the data is determined.
  • the query system assigns hidden rights to the user ID and performs a hidden alarm process.
  • an embodiment of the present invention further provides an electronic device 40, including but not limited to: a computer device or a server.
  • the electronic device 40 includes: a processor 401, a memory 402, and a transceiver. 403 and bus 405.
  • the transceiver 403 is configured to transmit and receive data with and from an external device.
  • the number of processors 401 in the electronic device 40 may be one or more.
  • the electronic device 40 may further include an RF card reader (such as 4 not shown).
  • the processor 401, the memory 402, the RF card reader, and the transceiver 403 may be connected to the meanings and examples of the terms involved in the embodiment by using a bus system or other manners. Referring to FIG. 1 or FIG. 2 Corresponding instructions. I will not repeat them here.
  • the processor 401 herein may be a processing component or a collective name of multiple processing components.
  • the processing element can be a central processing unit, a specific integrated circuit, or one or more integrated circuits configured to implement the embodiments of the present application, such as one or more microprocessors, or one or Multiple field programmable gate arrays.
  • the program code is stored in the memory 402.
  • the memory 402 may be a storage device or a collective name of a plurality of storage elements, and is used to store executable program code or parameters, data, and the like required for the application running device to operate.
  • the memory 402 may include random access memory (RAM), and may also include non-volatile memory such as a magnetic disk memory, a flash memory, or the like.
  • the bus 405 can be an industry standard architecture bus, an external device interconnect bus, or an extended industry standard architecture bus.
  • the bus can be divided into an address bus, a data bus, a control bus, and the like.
  • the electronic device 40 can also include input and output devices coupled to the bus 405 for connection to other portions, such as the processor 401, via a bus.
  • the input/output device can provide an input interface for the operator, so that the operator can select the control item through the input interface, and can also be other interfaces through which other devices can be externally connected.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The present invention belongs to the field of communications, and provided thereby are a user login method, an electronic device and a storage medium in a data query system, wherein the method comprises the following steps: a data query system receiving a login request of a user, the login request comprising a user login ID, a password and a terminal ID; the data query system querying a historical terminal ID for the login ID of the user; if the terminal ID is not the same as the historical terminal ID, sending indication information to the historical terminal, and the data query system allowing the user to log in after receiving a confirmation message returned by the historical terminal. The technical solution provided by the present invention has the advantages of a good user experience.

Description

数据查询***中用户登录方法、电子设备及存储介质User login method, electronic device and storage medium in data query system
本申请要求于2017年5月31日提交中国专利局,申请号为201710400092.6、发明名称为“数据查询***中用户登录的方法及设备”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。This application claims the priority of the Chinese Patent Application filed on May 31, 2017, the Chinese Patent Application No. 201710400092.6, entitled "Method and Equipment for User Login in Data Query System", the entire contents of which are incorporated by reference. In this application.
技术领域Technical field
本发明涉及通信领域,尤其涉及一种数据查询***中用户登录方法、电子设备及存储介质。The present invention relates to the field of communications, and in particular, to a user login method, an electronic device, and a storage medium in a data query system.
背景技术Background technique
数据查询***是目前应用管理***中常用的***,对于用户来说,数据查询功能在数据查询***中可能针对不同的用户可能具有有不同的权限,从而为不同用户提供不同的服务。The data query system is a commonly used system in the current application management system. For the user, the data query function may have different permissions for different users in the data query system, thereby providing different services for different users.
现有的数据查询***无法对用户登录进行提醒,用户体验感差。The existing data query system cannot remind the user to log in, and the user experience is poor.
发明内容Summary of the invention
本发明的目的之一是提供一种数据查询***中用户登录方法、电子设备及存储介质,其主要解决现有的用户体验感差的缺点。One of the objectives of the present invention is to provide a user login method, an electronic device, and a storage medium in a data query system, which mainly solve the shortcomings of the existing user experience.
第一方面,提供一种数据查询***中用户登录方法,所述方法包括如下步骤:The first aspect provides a user login method in a data query system, where the method includes the following steps:
数据查询***接收用户的登录请求,该登录请求包括:用户登录ID、密码以及终端ID;The data query system receives a login request of the user, where the login request includes: a user login ID, a password, and a terminal ID;
数据查询***查询该用户登录ID的历史终端ID;The data query system queries the historical terminal ID of the user login ID;
如该终端ID与历史终端ID不相同,则向该历史终端发送提示信息,接收历史终端返回的确认消息后,数据查询***允许用户登录。If the terminal ID is different from the historical terminal ID, the prompt information is sent to the historical terminal, and after receiving the confirmation message returned by the historical terminal, the data query system allows the user to log in.
可选的,所述提示信息为:短消息或即时通信软件消息。Optionally, the prompt information is: a short message or an instant messaging software message.
可选的,所述方法还包括:Optionally, the method further includes:
数据查询***统计设定时间内终端ID的登录次数,如该登录次数超过设定阈值,则将终端ID替换历史终端ID。The data query system counts the number of logins of the terminal ID in the set time. If the number of logins exceeds the set threshold, the terminal ID is replaced with the historical terminal ID.
可选的,所述登录请求中还包括:指纹信息、掌纹信息、面部照片中的任意一种或任意组合。Optionally, the login request further includes: any one or any combination of fingerprint information, palm print information, and facial photos.
可选的,所述方法还包括:Optionally, the method further includes:
数据查询***统计设定时间内终端ID的登录频率,如该登录频率超过频率阈值,则将该终端ID替换历史终端ID。The data query system counts the registration frequency of the terminal ID in the set time. If the login frequency exceeds the frequency threshold, the terminal ID is replaced with the historical terminal ID.
可选的,该方法包括:Optionally, the method includes:
数据查询***通过第二RF通信协议的读卡器读取门禁卡的第二RF通信协议对应的第二RF标识,该门禁卡包括:第一RF通信协议和第二RF通信协议,该第一RF通信协议与第二RF通信协议不兼容,数据查询***依据预配置的第二RF标识与登录ID的映射关系获取该第二RF标识对应的第二登录ID,如第二登录ID与用户ID相同,确定为正常的登录,为该用户ID分配高权限。如数据查询***通过第二RF通信协议的读卡器无法读取该第二RF标识或读取的该第二登录ID与用户ID不同,确定登录异常,则数据查询***为该用户ID分配隐藏权限,并执行隐藏告警流程。The data query system reads the second RF identifier corresponding to the second RF communication protocol of the access card through the card reader of the second RF communication protocol, the access card includes: a first RF communication protocol and a second RF communication protocol, the first The RF communication protocol is incompatible with the second RF communication protocol, and the data query system acquires the second login ID corresponding to the second RF identifier according to the mapping relationship between the pre-configured second RF identifier and the login ID, such as the second login ID and the user ID. The same is determined as a normal login, and the user ID is assigned a high authority. If the data query system cannot read the second RF identifier by the card reader of the second RF communication protocol or the read second login ID is different from the user ID, and the login abnormality is determined, the data query system allocates a hidden identifier for the user ID. Permissions and execute the hidden alarm process.
第二方面,提供一种数据查询***,所述***包括:In a second aspect, a data query system is provided, the system comprising:
收发单元,用于接收用户的登录请求,该登录请求包括:用户登录ID、密码以及终端ID;a transceiver unit, configured to receive a login request of the user, where the login request includes: a user login ID, a password, and a terminal ID;
处理单元,用于查询该用户登录ID的历史终端ID;如该终端ID与历史终端ID不相同,则向该历史终端发送提示信息,接收历史终端返回的确认消息后,允许用户登录。The processing unit is configured to query the historical terminal ID of the user login ID; if the terminal ID is different from the historical terminal ID, send the prompt information to the historical terminal, and after receiving the confirmation message returned by the historical terminal, allow the user to log in.
可选的,所述提示信息为:短消息或即时通信软件消息。Optionally, the prompt information is: a short message or an instant messaging software message.
可选的,所述处理单元,还用于统计设定时间内终端ID的登录次数,如该登录次数超过设定阈值,则将终端ID替换历史终端ID。Optionally, the processing unit is further configured to count the number of logins of the terminal ID in the set time, and if the number of logins exceeds the set threshold, replace the terminal ID with the historical terminal ID.
可选的,所述***还包括:RF读取单元,所述RF读取单元支持第二RF通信协议;Optionally, the system further includes: an RF reading unit, the RF reading unit supports a second RF communication protocol;
所述RF读取单元,用于读取门禁卡的第二RF通信协议对应的第二RF标识,所述门禁卡包括:第一RF通信协议和第二RF通信协议,所述第一RF通信协议 与第二RF通信协议不兼容;The RF reading unit is configured to read a second RF identifier corresponding to a second RF communication protocol of the access card, where the access card comprises: a first RF communication protocol and a second RF communication protocol, the first RF communication The protocol is not compatible with the second RF communication protocol;
所述处理单元,用于依据预配置的第二RF标识与登录ID的映射关系获取所述第二RF标识对应的第二登录ID,如所述第二登录ID与用户ID相同,确定为正常的登录,为所述用户ID分配高权限。The processing unit is configured to acquire a second login ID corresponding to the second RF identifier according to a mapping relationship between the second RF identifier and the login ID, where the second login ID is the same as the user ID, and is determined to be normal. Login, assigning high privileges to the user ID.
可选的,处理单元,还用于通过第二RF通信协议的读卡器无法读取该第二RF标识或读取的该第二登录ID与用户ID不同,确定登录异常,则数据查询***为该用户ID分配隐藏权限,并执行隐藏告警流程。Optionally, the processing unit is further configured to: the card reader that is unable to read the second RF identifier by the second RF communication protocol or the second login ID that is read is different from the user ID, and determine that the login abnormality is performed, and the data query system is Assign hidden permissions to the user ID and perform a hidden alert process.
第三方面,提供一种电子设备,所述电子设备包括处理器、所述处理器用于执行存储器中存储的计算机程序时实现上述数据查询***中用户登录方法。In a third aspect, an electronic device is provided, the electronic device comprising a processor, the processor for implementing a user login method in the data query system when executing a computer program stored in a memory.
第四方面,提供一种计算机可读存储介质,其上存储有计算机程序,该程序被处理器执行时实现上述数据查询***中用户登录方法。A fourth aspect provides a computer readable storage medium having stored thereon a computer program that, when executed by a processor, implements a user login method in the data query system.
实施本发明实施例,将具有如下有益效果,采用数据查询***中用户登录方法、***后,数据查询***可以提取登录请求中的用户登录ID以及终端ID,数据查询***查询该用户登录ID的历史终端ID,将历史终端ID与终端ID进行比对,如比对不一致,则向历史终端发送提示信息,接收到确认消息后,允许用户登录。对于公安部门的数据查询***来说,由于其存储的数据均具有一定的保密性或隐私性,所以对于公安部门的数据查询***的登录需要严格的控制,即需要在保证其安全性的前提下,方便用户登录,本发明实施例通过对用户登录ID的历史终端ID的记录来实现对用户登录ID的验证,因为对于用户登录ID来说,在公安部门内其登录的终端相对固定,所以历史终端ID相对固定,如果用户更换终端登录,因为历史终端是安全的,所以在新的终端进行用户登录ID的登录时,通过向安全的历史终端发送提示信息以验证该新的终端是否安全,如果验证成功允许新的终端登录,从而提高安全性。另外,由于历史终端属于用户常用的终端设备,用户使用也比较方便,所以用户可以随时发送确认消息,进而不影响用户的使用,所以本发明提供的技术方案能够不影响用户使用的情况下,对用户进行提醒,提高数据查询***的安全,提升用户的体验度。The embodiment of the present invention has the following beneficial effects. After adopting the user login method and system in the data query system, the data query system can extract the user login ID and the terminal ID in the login request, and the data query system queries the history of the user login ID. The terminal ID compares the historical terminal ID with the terminal ID. If the comparison is inconsistent, the prompt information is sent to the history terminal, and after receiving the confirmation message, the user is allowed to log in. For the data query system of the public security department, since the stored data has certain confidentiality or privacy, the registration of the data query system of the public security department requires strict control, that is, under the premise of ensuring its security. In the embodiment of the present invention, the verification of the user login ID is implemented by recording the historical terminal ID of the user login ID, because for the user login ID, the terminal that is logged in in the public security department is relatively fixed, so the history The terminal ID is relatively fixed. If the user replaces the terminal login, because the history terminal is secure, when the new terminal performs the login of the user login ID, it sends a prompt message to the secure history terminal to verify whether the new terminal is secure. The verification succeeds in allowing new terminal logins to improve security. In addition, since the historical terminal belongs to the terminal device commonly used by the user, the user is more convenient to use, so the user can send the confirmation message at any time, and the user's use is not affected. Therefore, the technical solution provided by the present invention can affect the user's use, Users make reminders to improve the security of the data query system and enhance the user experience.
附图说明DRAWINGS
通过阅读参照以下附图所作的对非限制性实施例所作的详细描述,本发明的其它特征、目的和优点将会变得更明显:Other features, objects, and advantages of the present invention will become more apparent from the Detailed Description of Description
图1为根据本发明一个优选实施例提供的数据查询***中用户登录方法的流程示意图。FIG. 1 is a schematic flowchart of a user login method in a data query system according to a preferred embodiment of the present invention.
图2为根据本发明又一个优选实施例提供的数据查询***中用户登录方法的流程示意图。FIG. 2 is a schematic flowchart of a user login method in a data query system according to still another preferred embodiment of the present invention.
图3为根据本发明又一优选实施例提供的数据查询***的结构示意图。FIG. 3 is a schematic structural diagram of a data query system according to another preferred embodiment of the present invention.
图4为本发明提供的一种电子设备的结构图。FIG. 4 is a structural diagram of an electronic device according to the present invention.
具体实施方式detailed description
在更加详细地讨论示例性实施例之前应当提到的是,一些示例性实施例被描述成作为流程图描绘的处理或方法。虽然流程图将各项操作描述成顺序的处理,但是其中的许多操作可以被并行地、并发地或者同时实施。此外,各项操作的顺序可以被重新安排。当其操作完成时所述处理可以被终止,但是还可以具有未包括在附图中的附加步骤。所述处理可以对应于方法、函数、规程、子例程、子程序等等。Before discussing the exemplary embodiments in more detail, it should be noted that some exemplary embodiments are described as a process or method depicted as a flowchart. Although the flowcharts describe various operations as a sequential process, many of the operations can be implemented in parallel, concurrently or concurrently. In addition, the order of operations can be rearranged. The process may be terminated when its operation is completed, but may also have additional steps not included in the figures. The processing may correspond to methods, functions, procedures, subroutines, subroutines, and the like.
在上下文中所称“终端”,也称为“智能终端”,是指可以通过运行预定程序或指令来执行数值计算和/或逻辑计算等预定处理过程的智能电子设备,其可以包括处理器与存储器,由处理器执行在存储器中预存的存续指令来执行预定处理过程,或是由ASIC、FPGA、DSP等硬件执行预定处理过程,或是由上述二者组合来实现。终端包括但不限于平板电脑、智能手机、个人数字助理、电子书等。The term "terminal" as used in the context, also referred to as "intelligent terminal", refers to an intelligent electronic device that can perform predetermined processing procedures such as numerical calculations and/or logical calculations by running predetermined programs or instructions, which may include a processor and The memory is executed by the processor to execute a predetermined process pre-stored in the memory to execute a predetermined process, or is executed by hardware such as an ASIC, an FPGA, a DSP, or the like, or a combination of the two. Terminals include, but are not limited to, tablets, smart phones, personal digital assistants, e-books, and the like.
这里所公开的具体结构细节仅仅是代表性的,并且是用于描述本发明的示例性实施例的目的。但是本发明可以通过许多替换形式来具体实现,并且不应当被解释成仅仅受限于这里所阐述的实施例。The specific structural details disclosed herein are merely representative and are for the purpose of describing exemplary embodiments of the invention. The present invention may, however, be embodied in many alternative forms and should not be construed as being limited only to the embodiments set forth herein.
这里所使用的术语仅仅是为了描述具体实施例而不意图限制示例性实施例。除非上下文明确地另有所指,否则这里所使用的单数形式“一个”、“一项”还意图包括复数。还应当理解的是,这里所使用的术语“包括”和/或“包含”规定所陈述的特征、整数、步骤、操作、单元和/或组件的存在,而不排除存在 或添加一个或更多其他特征、整数、步骤、操作、单元、组件和/或其组合。The terminology used herein is for the purpose of describing the particular embodiments, The singular forms "a", "an", It is also to be understood that the terms "comprising" and """ Other features, integers, steps, operations, units, components, and/or combinations thereof.
下面结合附图对本发明作进一步详细描述。The invention is further described in detail below with reference to the accompanying drawings.
根据本发明的一个方面,提供了一种数据查询***的用户登录方法,该方法由数据查询***完成,该数据查询***具体可以为:计算机设备、服务器、手机终端等等设备,该数据查询***可以应用到公安部门内,例如,在深圳市公安局设置该数据查询***,对于公安部门来说,由于其人员众多,且能够登录的设备也很多,并且每个登录ID对应的查询权限可能也不相同,并且能够查询的数据一般具有保密的要求,例如人员的位置信息、车辆的视频等等数据,对于这些数据都具有一定的保密的要求,那么对数据查询***采用何种方式限制登录就显得非常重要,为了既对数据查询***进行限制登录,又不影响正常的登录进行数据查询,本发明提供了数据查询***的用户登录方法,该方法如图1所示,包括如下步骤:According to an aspect of the present invention, a user login method of a data query system is provided. The method is implemented by a data query system, which may be: a computer device, a server, a mobile phone terminal, etc., the data query system. It can be applied to the public security department. For example, the data query system is set up in the Shenzhen Public Security Bureau. For the public security department, there are many people who can log in because of the large number of personnel, and the query authority corresponding to each login ID may also be Different data, and the data that can be queried generally have confidential requirements, such as the location information of the person, the video of the vehicle, etc., and have certain confidentiality requirements for the data, so what method is used for the data query system to restrict the login It is very important to provide a user login method for the data query system in order to restrict the login of the data query system without affecting the normal login. The method is as shown in FIG. 1 and includes the following steps:
步骤S101、数据查询***接收用户的登录请求,该登录请求包括:用户登录ID、密码以及终端ID。Step S101: The data query system receives a login request of the user, where the login request includes: a user login ID, a password, and a terminal ID.
上述步骤S101中的登录请求根据不同的平台可以有不同的表现形式。例如,对于内部***来说,其可以为一个内部的登录消息(例如一个办公自动化(英文:Office Automation,OA)消息)。又如,对于外部***来说,其可以为一个通信协议的登录消息(例如一个超文本传输协议(HyperText Transfer Protocol,HTTP)请求),具体的通信协议本发明具体实施方式并不限制。该终端ID可以为登录终端的号码,登录终端的MAC地址或其他的能够识别该登录终端的标识。The login request in the above step S101 may have different representations according to different platforms. For example, for an internal system, it can be an internal login message (eg, an Office Automation (OA) message). For example, for an external system, it may be a login message of a communication protocol (for example, a HyperText Transfer Protocol (HTTP) request). The specific communication protocol is not limited in the specific embodiment of the present invention. The terminal ID may be a number of the login terminal, a MAC address of the login terminal, or another identifier capable of identifying the login terminal.
步骤S102、数据查询***查询该用户登录ID的历史终端ID。Step S102: The data query system queries the historical terminal ID of the user login ID.
上述步骤S102中的历史终端即为步骤S101之前通过该用户登录ID登录成功时使用的终端ID。当然在实际应用中,上述历史终端也可以是通过该用户登录ID登录成功N次时使用的终端ID。The history terminal in the above step S102 is the terminal ID used when the user login ID is successfully registered before step S101. Of course, in an actual application, the historical terminal may be a terminal ID used when the user login ID is successfully registered N times.
上述历史终端可以在数据查询***的数据库内查询得到,具体的,该数据查询***的数据库中可以设置一个用户登录ID列表,该列表内记录了该用户登录ID成功登录后所使用的历史终端ID。在数据查询***接收到该用户登录ID的登录请求时,从数据库中查询该用户登录ID对应的用户登录ID列表,提取 该列表中的历史终端ID。The historical terminal can be queried in the database of the data query system. Specifically, a database of the user login ID can be set in the database of the data query system, and the historical terminal ID used after the login ID of the user is successfully logged is recorded in the list. . When the data query system receives the login request of the user login ID, the database queries the user login ID list corresponding to the user login ID, and extracts the historical terminal ID in the list.
步骤S103、如该终端ID与历史终端ID不相同,则向该历史终端发送提示信息,接收历史终端返回的确认消息后,数据查询***允许用户登录。Step S103: If the terminal ID is different from the historical terminal ID, send the prompt information to the historical terminal, and after receiving the confirmation message returned by the historical terminal, the data query system allows the user to log in.
如终端ID与历史终端ID相同,数据查询***直接允许用户登录。If the terminal ID is the same as the historical terminal ID, the data query system directly allows the user to log in.
对于联网的数据查询***,上述步骤S103中的提示信息可以为一个短信消息,当然在实际应用中,也可以为其他形式的消息,例如即时通信消息,包括但不限于:微信消息、QQ消息、脸书消息、钉钉消息等等。For the networked data query system, the prompt information in the above step S103 may be a short message, and of course, in actual applications, other types of messages, such as instant messaging messages, including but not limited to: WeChat messages, QQ messages, Facebook messages, nailed messages, and more.
可选的,上述向该历史终端发送提示信息的方式具体可以为:Optionally, the foregoing manner of sending the prompt information to the historical terminal may be:
对于数据查询***来说,很有可能是内部的数据查询***,即该数据查询***并未与互联网或移动通信网络连接,对于这种封闭的数据查询***来说,除了通过向历史终端发送提示信息,接收确认消息进行验证以外,还需要增加其安全性,因为对于封闭的数据查询***来说,其数据的安全要求一般都很高,所以应该为该封闭的数据查询***设置更高的安全级别,为了提高安全级别,这里结合员工的门禁卡来综合验证。本申请通过对员工的门禁卡进行射频(英文:Radio Frequency,RF)识别,从而提高安全性。具体的,对员工的门禁卡设置两种RF通信协议,为了方便说明,这里命名为第一RF通信协议以及第二RF通信协议,该第一RF通信协议与第二RF通信协议不兼容,第一RF通信协议对应第一RF标识,该第一通信协议与第一RF标识均未显示的,例如可以通过该第一RF标识实现普通门禁的进入办公区域等,该第二RF通信协议为隐藏的,这样对破解增加一定的难度。数据查询***通过第二RF通信协议的读卡器读取门禁卡的第二RF通信协议对应的第二RF标识,依据该第二RF标识与登录ID的映射关系获取该第二RF标识对应的第二登录ID,如第二登录ID与用户ID相同,确定为正常的登录,为该用户ID分配高权限。如数据查询***通过第二RF通信协议的读卡器无法读取该第二RF标识或读取的该第二登录ID与用户ID不同,确定登录异常,则数据查询***为该用户ID分配隐藏权限,并执行隐藏告警流程。上述隐藏权限即数据查询***为该用户ID分配的权限仅仅能够查询一些特定的数据,此特定的数据一般为非保密性数据,使得该用户误认为已经成功登陆,这样为后续的告警流程的处理人员争取处理时间。上述隐藏告警流程具体可以为,用户登录不会察觉的告警流程,本申请对该告警流程的 具体表现形式并不限定。For the data query system, it is very likely that it is an internal data query system, that is, the data query system is not connected to the Internet or the mobile communication network. For such a closed data query system, in addition to sending a prompt to the history terminal. Information, in addition to receiving confirmation messages for verification, it is also necessary to increase its security, because for closed data query systems, the security requirements of the data are generally high, so you should set a higher security for the closed data query system. Level, in order to improve the security level, here combined with the employee's access card to comprehensive verification. This application improves the security by identifying the employee's access control card by radio frequency (English: Radio Frequency, RF). Specifically, two kinds of RF communication protocols are set for the employee's access card. For convenience of explanation, the first RF communication protocol and the second RF communication protocol are named here, and the first RF communication protocol is incompatible with the second RF communication protocol. An RF communication protocol corresponds to the first RF identifier, and the first communication protocol and the first RF identifier are not displayed. For example, the first RF identifier can be used to implement an ordinary access control office area, etc., and the second RF communication protocol is hidden. This will increase the difficulty of cracking. The data query system reads the second RF identifier corresponding to the second RF communication protocol of the access card through the card reader of the second RF communication protocol, and obtains the second RF identifier according to the mapping relationship between the second RF identifier and the login ID. The second login ID, if the second login ID is the same as the user ID, is determined to be a normal login, and the user ID is assigned a high authority. If the data query system cannot read the second RF identifier by the card reader of the second RF communication protocol or the read second login ID is different from the user ID, and the login abnormality is determined, the data query system allocates a hidden identifier for the user ID. Permissions and execute the hidden alarm process. The above-mentioned hidden authority, that is, the right allocated by the data query system for the user ID can only query some specific data, and the specific data is generally non-confidential data, so that the user mistakenly believes that the login has been successfully performed, so that the subsequent alarm process is processed. Staff strive to deal with time. The above-mentioned hidden alarm process may be an alarm process that is not detected by the user login. The specific expression of the alarm process is not limited.
本发明提供的技术方案在用户进行登录时,直接获取终端ID,将终端ID与历史终端ID进行比对,实现对登录终端的匹配识别,并对登录终端发送提示信息进行提醒以提高用户体验度。The technical solution provided by the present invention directly acquires the terminal ID when the user logs in, compares the terminal ID with the historical terminal ID, implements matching identification of the login terminal, and sends a prompt message to the login terminal to remind the user to improve the user experience. .
参阅图2,图2提供数据查询***中用户登录方法,该方法由数据查询***完成,该数据查询***具体可以为:计算机设备、服务器、手机终端等等设备,该方法如图2所示,包括如下步骤:Referring to FIG. 2, FIG. 2 provides a user login method in a data query system. The method is implemented by a data query system. The data query system may be: a computer device, a server, a mobile phone terminal, and the like. The method is as shown in FIG. 2 . Including the following steps:
步骤S201、数据查询***接收用户的登录请求,该登录请求包括:用户登录ID、密码以及终端ID。Step S201: The data query system receives a login request of the user, where the login request includes: a user login ID, a password, and a terminal ID.
上述步骤S201中的登录请求根据不同的平台可以由不同的表现形式。例如,对于内部***来说,其可以通过一个内部的登录消息。又如,对于外部***来说,其可以为一个通信协议的登录消息,具体的通信协议本发明具体实施方式并不限制。该终端ID可以为登录终端的号码,登录终端的MAC地址或其他的能够识别该登录终端的标识。The login request in the above step S201 can be represented by different representations according to different platforms. For example, for an internal system, it can pass an internal login message. For another example, for an external system, it may be a login message of a communication protocol, and the specific communication protocol is not limited in the specific embodiment of the present invention. The terminal ID may be a number of the login terminal, a MAC address of the login terminal, or another identifier capable of identifying the login terminal.
步骤S202、数据查询***查询该用户登录ID的历史终端ID。Step S202: The data query system queries the historical terminal ID of the user login ID.
上述步骤S202中的历史终端即为步骤S201之前通过该用户登录ID登录成功时使用的终端ID。当然在实际应用中,上述历史终端也可以是通过该用户登录ID登录成功N次时使用的终端ID。The history terminal in the above step S202 is the terminal ID used when the user login ID is successfully registered before step S201. Of course, in an actual application, the historical terminal may be a terminal ID used when the user login ID is successfully registered N times.
步骤S203、如该终端ID与历史终端ID不相同,则向该历史终端发送提示信息,接收历史终端返回的确认消息后,数据查询***允许用户登录。Step S203: If the terminal ID is different from the historical terminal ID, send the prompt information to the historical terminal, and after receiving the confirmation message returned by the historical terminal, the data query system allows the user to log in.
上述步骤S203中的提示信息可以为一个短信消息,当然在实际应用中,也可以为其他形式的消息,例如即时通信消息,包括但不限于:微信消息、QQ消息、脸书消息、钉钉消息等等。The prompt information in the above step S203 may be a short message, of course, in actual applications, other types of messages, such as instant messaging messages, including but not limited to: WeChat messages, QQ messages, Facebook messages, and nail messages. and many more.
步骤S204、数据查询***统计设定时间内终端ID的登录次数,如该登录次数超过设定阈值,则将终端ID替换历史终端ID。Step S204: The data query system counts the number of logins of the terminal ID in the set time. If the number of logins exceeds the set threshold, the terminal ID is replaced with the historical terminal ID.
上述登录次数具体可以为,登录成功的次数,对于数据查询***来说,也只有在登录成功以后才能够对登录次数进行有效的记录。本申请其他实施例或其他步骤,如无特殊说明,登录次数均可以理解为登录成功的次数。The number of logins may be the number of successful logins. For the data query system, the number of logins can be effectively recorded only after the login is successful. Other embodiments or other steps of the application, if not specified, the number of logins can be understood as the number of successful logins.
本发明提供的技术方案在用户进行登录时,直接获取终端ID,将终端ID 与历史终端ID进行比对,实现对登录终端的匹配识别,并对登录终端发送提示信息进行提醒以提高用户体验度。The technical solution provided by the present invention directly acquires the terminal ID when the user logs in, compares the terminal ID with the historical terminal ID, implements matching identification of the login terminal, and sends a prompt message to the login terminal to remind the user to improve the user experience. .
可选的,上述登录请求中还可以包括:指纹信息、掌纹信息、面部照片中的任意一种或任意组合。Optionally, the foregoing login request may further include: any one or any combination of fingerprint information, palm print information, and facial photo.
可选的,上述步骤S204还可以采用下述步骤S204-1、S204-2或S204-3中的任意一个替换。Optionally, the foregoing step S204 may also be replaced by any one of the following steps S204-1, S204-2 or S204-3.
步骤S204-1、数据查询***统计设定时间内终端ID的登录频率,如该登录频率超过频率阈值,则将该终端ID替换历史终端ID。Step S204-1: The data query system counts the registration frequency of the terminal ID in the set time. If the login frequency exceeds the frequency threshold, the terminal ID is replaced with the historical terminal ID.
上述登录频率的具体统计方法可以为,如设定时间为1天,在1天以内,终端ID每登录成功一次,计数器加1,如1天内登录成功了5次,则该登录频率可以为5次/天。通过登录频率来替换历史终端ID能够加快历史终端ID的更新频率,因为对于公安部门来说,如果一个用户ID在同一个终端内成功登录很多次,很有可能此用户ID对应的警员更换了终端,如果通过登录次数来统计,为了安全性,该次数阈值一般都设定的比较大,那么其需要统计的时间比较长,历史终端ID更新的频率也会降低,导致用户使用不方便。而采用设定时间的登录频率来替换历史终端ID,则在设定时间内就可以实现对历史终端ID的更换,实现了历史终端ID的快速更换。The specific statistical method of the above login frequency may be, for example, the set time is 1 day, within 1 day, the terminal ID is successfully registered once, and the counter is incremented by 1. If the login succeeds 5 times within 1 day, the login frequency may be 5 Times/day. Replacing the historical terminal ID by the login frequency can speed up the update of the historical terminal ID, because for the public security department, if a user ID successfully logs in many times in the same terminal, it is likely that the police officer corresponding to the user ID has been replaced. If the terminal counts by the number of logins, the threshold is generally set for security. Therefore, the time required for statistics is long, and the frequency of updating the historical terminal ID is also reduced, which makes the user inconvenient to use. When the historical terminal ID is replaced by the login frequency of the set time, the replacement of the historical terminal ID can be realized within the set time, and the rapid replacement of the historical terminal ID is realized.
步骤S204-2、数据查询***获取登录终端的位置信息,如该位置信息位于设定范围内,将该终端ID替换历史终端ID。Step S204-2: The data query system acquires location information of the login terminal. If the location information is within the set range, the terminal ID is replaced with the historical terminal ID.
上述位置信息可以通过终端定位获取。对于依据位置信息来替换历史终端ID,其能够快速的对历史终端ID进行替换。这里结合公安部门来说明该技术效果,对于公安部门来说,尤其其部门的特殊性使得公安部门的办公地址无关人员很难进入到该办公地址,即如果进入到该办公地址,并能够使用办公地址内的终端,基本就能够确定是属于公安部门的人员,进而直接进行历史终端ID的替换,增加了历史终端ID的更新频率。The above location information can be obtained through terminal location. For replacing the historical terminal ID with the location information, it can quickly replace the historical terminal ID. Here, the public security department is used to explain the technical effect. For the public security department, especially the speciality of its department makes it difficult for the public security department's office address to enter the office address, that is, if it enters the office address, it can use the office. The terminal in the address can basically determine the personnel belonging to the public security department, and directly replace the historical terminal ID, and increase the update frequency of the historical terminal ID.
步骤S204-3、数据查询***获取登录终端的位置信息,确定该位置信息是否为多个设定的位置信息中的一个,如是,则将终端ID替换历史终端ID。Step S204-3: The data query system acquires location information of the login terminal, determines whether the location information is one of the plurality of set location information, and if yes, replaces the terminal ID with the historical terminal ID.
上述位置信息可以通过终端定位获取。其与步骤S204-2不同点在于,这里不是以设定范围,而是以多个设定位置信息为是否进行历史终端ID更换的触发 条件,结合公安部门的实际应用场景,对于公安部门来说,由于公安部门数据查询的重要性以及保密性,权限的分配就更加重要,所以对于数据查询***的查询,可能需要设定在特定的几个位置中,此技术方案能够将用户ID的登录限定在有限的几个终端上,避免通过其他终端登录该用户ID,提高了安全性。The above location information can be obtained through terminal location. The difference from step S204-2 is that instead of setting the range, multiple setting position information is used as a trigger condition for performing historical terminal ID replacement, combined with the actual application scenario of the public security department, for the public security department. Due to the importance and confidentiality of data query by the public security department, the allocation of rights is more important. Therefore, the query of the data query system may need to be set in a specific number of locations. This technical solution can limit the login of the user ID. On a limited number of terminals, avoiding the login of the user ID through other terminals improves security.
参阅图3,图3提供一种数据查询***30,下述***中的术语的定义可以参见如图2所示实施例中的描述,这里不再赘述,该***包括:Referring to FIG. 3, FIG. 3 provides a data query system 30. For definitions of terms in the following system, refer to the description in the embodiment shown in FIG. 2, and details are not described herein. The system includes:
收发单元301,用于接收用户的登录请求,该登录请求包括:用户登录ID、密码以及终端ID;The transceiver unit 301 is configured to receive a login request of the user, where the login request includes: a user login ID, a password, and a terminal ID;
处理单元302,用于查询该用户登录ID的历史终端ID;如该终端ID与历史终端ID不相同,则向该历史终端发送提示信息,接收历史终端返回的确认消息后,允许用户登录。The processing unit 302 is configured to query the historical terminal ID of the user login ID; if the terminal ID is different from the historical terminal ID, send the prompt information to the historical terminal, and after receiving the confirmation message returned by the historical terminal, allow the user to log in.
可选的,所述提示信息为:短消息或即时通信软件消息。Optionally, the prompt information is: a short message or an instant messaging software message.
可选的,处理单元302,还用于统计设定时间内终端ID的登录次数,如该登录次数超过设定阈值,则将终端ID替换历史终端ID。Optionally, the processing unit 302 is further configured to count the number of logins of the terminal ID in the set time, and if the number of logins exceeds the set threshold, replace the terminal ID with the historical terminal ID.
可选的,所述登录请求中还包括:指纹信息、掌纹信息、面部照片中的任意一种或任意组合。Optionally, the login request further includes: any one or any combination of fingerprint information, palm print information, and facial photos.
可选的,处理单元302,还用于统计设定时间内终端ID的登录频率,如该登录频率超过频率阈值,则将该终端ID替换历史终端ID。Optionally, the processing unit 302 is further configured to collect a registration frequency of the terminal ID in the set time, and if the login frequency exceeds the frequency threshold, replace the terminal ID with the historical terminal ID.
上述登录频率的具体统计方法可以为,如设定时间为1天,在1天以内,终端ID每登录成功一次,计数器加1,如1天内登录成功了5次,则该登录频率可以为5次/天。通过登录频率来替换历史终端ID能够加快历史终端ID的更新频率,因为对于公安部门来说,如果一个用户ID在同一个终端内成功登录很多次,很有可能此用户ID对应的警员更换了终端,如果通过登录次数来统计,为了安全性,该次数阈值一般都设定的比较大,那么其需要统计的时间比较长,历史终端ID更新的频率也会降低,导致用户使用不方便。而采用设定时间的登录频率来替换历史终端ID,则在设定时间内就可以实现对历史终端ID的更换,实现了历史终端ID的快速更换。The specific statistical method of the above login frequency may be, for example, the set time is 1 day, within 1 day, the terminal ID is successfully registered once, and the counter is incremented by 1. If the login succeeds 5 times within 1 day, the login frequency may be 5 Times/day. Replacing the historical terminal ID by the login frequency can speed up the update of the historical terminal ID, because for the public security department, if a user ID successfully logs in many times in the same terminal, it is likely that the police officer corresponding to the user ID has been replaced. If the terminal counts by the number of logins, the threshold is generally set for security. Therefore, the time required for statistics is long, and the frequency of updating the historical terminal ID is also reduced, which makes the user inconvenient to use. When the historical terminal ID is replaced by the login frequency of the set time, the replacement of the historical terminal ID can be realized within the set time, and the rapid replacement of the historical terminal ID is realized.
可选的,处理单元302,还用于获取登录终端的位置信息,如该位置信息位于设定范围内,将该终端ID替换历史终端ID。Optionally, the processing unit 302 is further configured to obtain location information of the login terminal, where the location information is located in the set range, and replace the terminal ID with the historical terminal ID.
上述位置信息可以通过终端定位获取。对于依据位置信息来替换历史终端ID,其能够快速的对历史终端ID进行替换。这里结合公安部门来说明该技术效果,对于公安部门来说,尤其其部门的特殊性使得公安部门的办公地址无关人员很难进入到该办公地址,即如果进入到该办公地址,并能够使用办公地址内的终端,基本就能够确定是属于公安部门的人员,进而直接进行历史终端ID的替换,增加了历史终端ID的更新频率。The above location information can be obtained through terminal location. For replacing the historical terminal ID with the location information, it can quickly replace the historical terminal ID. Here, the public security department is used to explain the technical effect. For the public security department, especially the speciality of its department makes it difficult for the public security department's office address to enter the office address, that is, if it enters the office address, it can use the office. The terminal in the address can basically determine the personnel belonging to the public security department, and directly replace the historical terminal ID, and increase the update frequency of the historical terminal ID.
可选的,处理单元302,还用于获取登录终端的位置信息,确定该位置信息是否为多个设定的位置信息中的一个,如是,则将终端ID替换历史终端ID。Optionally, the processing unit 302 is further configured to acquire location information of the login terminal, determine whether the location information is one of the plurality of set location information, and if yes, replace the terminal ID with the historical terminal ID.
上述位置信息可以通过终端定位获取。这里不是以设定范围,而是以多个设定位置信息为是否进行历史终端ID更换的触发条件,结合公安部门的实际应用场景,对于公安部门来说,由于公安部门数据查询的重要性以及保密性,权限的分配就更加重要,所以对于数据查询***的查询,可能需要设定在特定的几个位置中,此技术方案能够将用户ID的登录限定在有限的几个终端上,避免通过其他终端登录该用户ID,提高了安全性。The above location information can be obtained through terminal location. Here is not a set range, but a plurality of set position information for triggering whether to change the historical terminal ID, combined with the actual application scenario of the public security department, for the public security department, due to the importance of data query by the public security department and Confidentiality, the allocation of rights is more important, so the query of the data query system may need to be set in a specific number of positions. This technical solution can limit the login of the user ID to a limited number of terminals, avoiding the passage. Other terminals log in to the user ID, which improves security.
可选的,上述***还包括:RF读取单元303,RF读取单元303支持第二RF通信协议;Optionally, the foregoing system further includes: an RF reading unit 303, and the RF reading unit 303 supports the second RF communication protocol;
RF读取单元303,用于读取门禁卡的第二RF通信协议对应的第二RF标识,所述门禁卡包括:第一RF通信协议和第二RF通信协议,所述第一RF通信协议与第二RF通信协议不兼容;The RF reading unit 303 is configured to read a second RF identifier corresponding to the second RF communication protocol of the access card, where the access card comprises: a first RF communication protocol and a second RF communication protocol, the first RF communication protocol Not compatible with the second RF communication protocol;
处理单元302,还用于依据预配置的第二RF标识与登录ID的映射关系获取所述第二RF标识对应的第二登录ID,如所述第二登录ID与用户ID相同,确定为正常的登录,为所述用户ID分配高权限。The processing unit 302 is further configured to acquire, according to the mapping relationship between the pre-configured second RF identifier and the login ID, the second login ID corresponding to the second RF identifier, where the second login ID is the same as the user ID, and is determined to be normal. Login, assigning high privileges to the user ID.
可选的,上述处理单元302,还用于通过第二RF通信协议的读卡器无法读取该第二RF标识或读取的该第二登录ID与用户ID不同,确定登录异常,则数据查询***为该用户ID分配隐藏权限,并执行隐藏告警流程。Optionally, the processing unit 302 is further configured to: the second RF identifier cannot be read by the card reader of the second RF communication protocol, or the read second login ID is different from the user ID, and the login abnormality is determined, and the data is determined. The query system assigns hidden rights to the user ID and performs a hidden alarm process.
本发明实施例的细节,而且在不背离本发明的精神或基本特征的情况下,能够以其他的具体形式实现本发明。因此,无论从哪一点来看,均应将实施例看作是示范性的,而且是非限制性的,本发明的范围由所附权利要求而不是上述说明限定,因此旨在将落在权利要求的等同要件的含义和范围内的所有变化 涵括在本发明内。不应将权利要求中的任何附图标记视为限制所涉及的权利要求。此外,显然“包括”一词不排除其他单元,单数不排除复数。***权利要求中陈述的多个单元或装置也可以由一个单元或装置通过软件或者硬件来实现。第一,第二等词语用来表示名称,而并不表示任何特定的顺序。The invention may be embodied in other specific forms without departing from the spirit or essential characteristics of the invention. Therefore, the present embodiments are to be considered as illustrative and not restrictive, and the scope of the invention is defined by the appended claims instead All changes in the meaning and scope of equivalent elements are included in the present invention. Any reference signs in the claims should not be construed as limiting the claim. In addition, it is to be understood that the term "comprising" does not exclude other elements, and the singular does not exclude the plural. A plurality of units or devices recited in the system claims can also be implemented by a unit or device by software or hardware. The first, second, etc. words are used to denote names and do not denote any particular order.
参见图4,本发明实施例还提供一种电子设备40,该电子设备40包括但不限于:计算机设备或服务器,如图4所示,该电子设备40包括:处理器401、存储器402、收发器403和总线405。收发器403用于与外部设备之间收发数据。电子设备40中的处理器401的数量可以是一个或多个,可选的,该电子设备40还可以包括RF读卡器(如4未画出)。本申请的一些实施例中,处理器401、存储器402、RF读卡器和收发器403可通过总线***或其他方式连接关于本实施例涉及的术语的含义以及举例,可以参考图1或图2对应的说明。此处不再赘述。Referring to FIG. 4, an embodiment of the present invention further provides an electronic device 40, including but not limited to: a computer device or a server. As shown in FIG. 4, the electronic device 40 includes: a processor 401, a memory 402, and a transceiver. 403 and bus 405. The transceiver 403 is configured to transmit and receive data with and from an external device. The number of processors 401 in the electronic device 40 may be one or more. Optionally, the electronic device 40 may further include an RF card reader (such as 4 not shown). In some embodiments of the present application, the processor 401, the memory 402, the RF card reader, and the transceiver 403 may be connected to the meanings and examples of the terms involved in the embodiment by using a bus system or other manners. Referring to FIG. 1 or FIG. 2 Corresponding instructions. I will not repeat them here.
需要说明的是,这里的处理器401可以是一个处理元件,也可以是多个处理元件的统称。例如,该处理元件可以是中央处理器,也可以是特定集成电路,或者是被配置成实施本申请实施例的一个或多个集成电路,例如:一个或多个微处理器,或,一个或者多个现场可编程门阵列。It should be noted that the processor 401 herein may be a processing component or a collective name of multiple processing components. For example, the processing element can be a central processing unit, a specific integrated circuit, or one or more integrated circuits configured to implement the embodiments of the present application, such as one or more microprocessors, or one or Multiple field programmable gate arrays.
其中,存储器402中存储程序代码。存储器402可以是一个存储装置,也可以是多个存储元件的统称,且用于存储可执行程序代码或应用程序运行装置运行所需要参数、数据等。且存储器402可以包括随机存储器(RAM),也可以包括非易失性存储器,例如磁盘存储器,闪存等。The program code is stored in the memory 402. The memory 402 may be a storage device or a collective name of a plurality of storage elements, and is used to store executable program code or parameters, data, and the like required for the application running device to operate. And the memory 402 may include random access memory (RAM), and may also include non-volatile memory such as a magnetic disk memory, a flash memory, or the like.
总线405可以是工业标准体系结构总线、外部设备互连总线或扩展工业标准体系结构总线等。该总线可以分为地址总线、数据总线、控制总线等。The bus 405 can be an industry standard architecture bus, an external device interconnect bus, or an extended industry standard architecture bus. The bus can be divided into an address bus, a data bus, a control bus, and the like.
该电子设备40还可以包括输入输出装置,连接于总线405,以通过总线与处理器401等其它部分连接。该输入输出装置可以为操作人员提供一输入界面,以便操作人员通过该输入界面选择布控项,还可以是其它接口,可通过该接口外接其它设备。The electronic device 40 can also include input and output devices coupled to the bus 405 for connection to other portions, such as the processor 401, via a bus. The input/output device can provide an input interface for the operator, so that the operator can select the control item through the input interface, and can also be other interfaces through which other devices can be externally connected.
最后应说明的是:以上各实施例仅用以说明本发明的技术方案,而非对其限制;尽管参照前述各实施例对本发明进行了详细的说明,本领域的普通技术人员应当理解:其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分或者全部技术特征进行等同替换;而这些修改或者替换,并不使相应技术方案的本质脱离本发明各实施例技术方案的范围,其均应涵盖在本发明的权利要求和说明书的范围当中。Finally, it should be noted that the above embodiments are merely illustrative of the technical solutions of the present invention, and are not intended to be limiting; although the present invention has been described in detail with reference to the foregoing embodiments, those skilled in the art will understand that The technical solutions described in the foregoing embodiments may be modified, or some or all of the technical features may be equivalently replaced; and the modifications or substitutions do not deviate from the technical solutions of the embodiments of the present invention. The scope is intended to be included within the scope of the claims and the description of the invention.

Claims (11)

  1. 一种数据查询***中用户登录方法,其特征在于,所述方法包括如下步骤:A user login method in a data query system, characterized in that the method comprises the following steps:
    数据查询***接收用户的登录请求,该登录请求包括:用户登录ID、密码以及终端ID;The data query system receives a login request of the user, where the login request includes: a user login ID, a password, and a terminal ID;
    数据查询***查询该用户登录ID的历史终端ID;The data query system queries the historical terminal ID of the user login ID;
    如该终端ID与历史终端ID不相同,则向该历史终端发送提示信息,接收历史终端返回的确认消息后,数据查询***允许用户登录。If the terminal ID is different from the historical terminal ID, the prompt information is sent to the historical terminal, and after receiving the confirmation message returned by the historical terminal, the data query system allows the user to log in.
  2. 根据权利要求1所述的方法,其特征在于,The method of claim 1 wherein
    所述提示信息为:短消息或即时通信软件消息。The prompt information is: a short message or an instant messaging software message.
  3. 根据权利要求1所述的方法,其特征在于,所述方法还包括:The method of claim 1 further comprising:
    数据查询***统计设定时间内终端ID的登录次数,如该登录次数超过设定阈值,则用终端ID替换历史终端ID。The data query system counts the number of logins of the terminal ID in the set time. If the number of logins exceeds the set threshold, the historical terminal ID is replaced with the terminal ID.
  4. 根据权利要求1所述的方法,其特征在于,所述登录请求中还包括:指纹信息、掌纹信息、面部照片中的任意一种或任意组合。The method according to claim 1, wherein the login request further comprises: any one or any combination of fingerprint information, palm print information, and facial photos.
  5. 根据权利要求1所述的方法,其特征在于,所述方法还包括:The method of claim 1 further comprising:
    数据查询***通过第二RF通信协议的读卡器读取门禁卡的第二RF通信协议对应的第二RF标识,所述门禁卡包括:第一RF通信协议和第二RF通信协议,所述第一RF通信协议与第二RF通信协议不兼容;The data query system reads the second RF identifier corresponding to the second RF communication protocol of the access card through the card reader of the second RF communication protocol, where the access card includes: a first RF communication protocol and a second RF communication protocol, The first RF communication protocol is incompatible with the second RF communication protocol;
    数据查询***依据预配置的第二RF标识与登录ID的映射关系获取所述第二RF标识对应的第二登录ID,如所述第二登录ID与用户ID相同,确定为正常的登录,为所述用户ID分配高权限。The data query system acquires the second login ID corresponding to the second RF identifier according to the mapping relationship between the second RF identifier and the login ID. If the second login ID is the same as the user ID, the data is determined to be a normal login. The user ID is assigned a high authority.
  6. 一种数据查询***,其特征在于,所述***包括:A data query system, characterized in that the system comprises:
    收发单元,用于接收用户的登录请求,该登录请求包括:用户登录ID、密码以及终端ID;a transceiver unit, configured to receive a login request of the user, where the login request includes: a user login ID, a password, and a terminal ID;
    处理单元,用于查询该用户登录ID的历史终端ID;如该终端ID与历史终端ID不相同,则向该历史终端发送提示信息,接收历史终端返回的确认消息后,允许用户登录。The processing unit is configured to query the historical terminal ID of the user login ID; if the terminal ID is different from the historical terminal ID, send the prompt information to the historical terminal, and after receiving the confirmation message returned by the historical terminal, allow the user to log in.
  7. 根据权利要求6所述的***,其特征在于,The system of claim 6 wherein:
    所述提示信息为:短消息或即时通信软件消息。The prompt information is: a short message or an instant messaging software message.
  8. 根据权利要求6所述的***,其特征在于,所述处理单元,还用于统计设定时间内终端ID的登录次数,如该登录次数超过设定阈值,则将终端ID替换历史终端ID。The system according to claim 6, wherein the processing unit is further configured to count the number of logins of the terminal ID in the set time, and if the number of logins exceeds the set threshold, replace the terminal ID with the historical terminal ID.
  9. 根据权利要求1所述的***,其特征在于,所述***还包括:RF读取单元,所述RF读取单元支持第二RF通信协议;The system of claim 1 wherein said system further comprises: an RF reading unit, said RF reading unit supporting a second RF communication protocol;
    所述RF读取单元,用于读取门禁卡的第二RF通信协议对应的第二RF标识,所述门禁卡包括:第一RF通信协议和第二RF通信协议,所述第一RF通信协议与第二RF通信协议不兼容;The RF reading unit is configured to read a second RF identifier corresponding to a second RF communication protocol of the access card, where the access card comprises: a first RF communication protocol and a second RF communication protocol, the first RF communication The protocol is not compatible with the second RF communication protocol;
    所述处理单元,用于依据预配置的第二RF标识与登录ID的映射关系获取所述第二RF标识对应的第二登录ID,如所述第二登录ID与用户ID相同,确定为正常的登录,为所述用户ID分配高权限。The processing unit is configured to acquire a second login ID corresponding to the second RF identifier according to a mapping relationship between the second RF identifier and the login ID, where the second login ID is the same as the user ID, and is determined to be normal. Login, assigning high privileges to the user ID.
  10. 一种电子设备,其特征在于,所述电子设备包括处理器、所述处理器用于执行存储器中存储的计算机程序时实现如权利要求1-5中任意一项所述的数据查询***中用户登录方法。An electronic device, comprising: a processor, wherein the processor is configured to perform a user login in a data query system according to any one of claims 1-5 when executing a computer program stored in a memory method.
  11. 一种计算机可读存储介质,其上存储有计算机程序,该程序被处理器执行时实现如权利要求1-5任意一项所述的数据查询***中用户登录方法。A computer readable storage medium having stored thereon a computer program, the program being executed by a processor to implement a user login method in a data query system according to any of claims 1-5.
PCT/CN2018/078631 2017-05-31 2018-03-09 User login method, electronic device and storage medium in data query system WO2018219007A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710400092.6 2017-05-31
CN201710400092.6A CN107222481B (en) 2017-05-31 2017-05-31 The method and apparatus that user logs in data query system

Publications (1)

Publication Number Publication Date
WO2018219007A1 true WO2018219007A1 (en) 2018-12-06

Family

ID=59947230

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/078631 WO2018219007A1 (en) 2017-05-31 2018-03-09 User login method, electronic device and storage medium in data query system

Country Status (2)

Country Link
CN (1) CN107222481B (en)
WO (1) WO2018219007A1 (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107222481B (en) * 2017-05-31 2018-03-27 深圳云天励飞技术有限公司 The method and apparatus that user logs in data query system
CN108197480A (en) * 2017-12-12 2018-06-22 泰康保险集团股份有限公司 Access control method, device and computer readable storage medium
CN109413460B (en) * 2018-08-30 2021-10-08 视联动力信息技术股份有限公司 Method and system for displaying function menu of video network terminal
CN109088943B (en) * 2018-09-17 2021-09-21 视联动力信息技术股份有限公司 Blood pressure detection method and device
CN110427747B (en) * 2019-06-20 2021-12-14 中国科学院信息工程研究所 Identity authentication method and device supporting service security mark
CN114327517B (en) * 2021-12-29 2022-07-29 深圳市驱动人生科技股份有限公司 Software-driven implementation method and system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104125062A (en) * 2013-04-26 2014-10-29 腾讯科技(深圳)有限公司 Login method, device, login authentication device, server, terminals and system
WO2014173160A1 (en) * 2013-04-27 2014-10-30 Tencent Technology (Shenzhen) Company Limited Method and system for access control
CN105072079A (en) * 2015-06-30 2015-11-18 小米科技有限责任公司 Account logon method, account logon device and terminal device
CN105306610A (en) * 2014-07-04 2016-02-03 腾讯科技(深圳)有限公司 Network identifier detection method and device
CN105847245A (en) * 2016-03-21 2016-08-10 杭州朗和科技有限公司 Electronic mail box login authentication method and device
CN107222481A (en) * 2017-05-31 2017-09-29 深圳云天励飞技术有限公司 The method and apparatus of User logs in data query system

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100931326B1 (en) * 2008-09-09 2009-12-11 주식회사 로그 A managing system for id/password search list and login list and the method thereof
JP5613855B1 (en) * 2014-04-23 2014-10-29 株式会社 ディー・エヌ・エー User authentication system
CN105656948A (en) * 2016-03-30 2016-06-08 北京小米移动软件有限公司 Account login method and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104125062A (en) * 2013-04-26 2014-10-29 腾讯科技(深圳)有限公司 Login method, device, login authentication device, server, terminals and system
WO2014173160A1 (en) * 2013-04-27 2014-10-30 Tencent Technology (Shenzhen) Company Limited Method and system for access control
CN105306610A (en) * 2014-07-04 2016-02-03 腾讯科技(深圳)有限公司 Network identifier detection method and device
CN105072079A (en) * 2015-06-30 2015-11-18 小米科技有限责任公司 Account logon method, account logon device and terminal device
CN105847245A (en) * 2016-03-21 2016-08-10 杭州朗和科技有限公司 Electronic mail box login authentication method and device
CN107222481A (en) * 2017-05-31 2017-09-29 深圳云天励飞技术有限公司 The method and apparatus of User logs in data query system

Also Published As

Publication number Publication date
CN107222481A (en) 2017-09-29
CN107222481B (en) 2018-03-27

Similar Documents

Publication Publication Date Title
WO2018219007A1 (en) User login method, electronic device and storage medium in data query system
US9432358B2 (en) System and method of authenticating user account login request messages
US10681026B2 (en) Secure shell public key audit system
US11874914B2 (en) Authentication system, and information recording medium
CN110086783B (en) Multi-account management method and device, electronic equipment and storage medium
CN108701175B (en) Associating user accounts with enterprise workspaces
WO2018133683A1 (en) Network authentication method and apparatus
US20190199530A1 (en) Device attestation server and method for attesting to the integrity of a mobile device
EP2888855A1 (en) Systems and methods for lock access management using wireless signals
US20130144960A1 (en) Method and system for announcing death of a user in a communication network
WO2020233356A1 (en) Test environment control method and apparatus, computer-readable storage medium and server
US9178874B2 (en) Method, device and system for logging in through a browser application at a client terminal
US20140283125A1 (en) Facial recognition-based information discovery
CN110602216A (en) Method and device for using single account by multiple terminals, cloud server and storage medium
US20170238279A1 (en) Method for processing notification message in wireless communication system and apparatus therefor
EP4242891A2 (en) Systems and methods for securing login access
US11363017B2 (en) Smart home network security through blockchain
CA3024158A1 (en) Method and apparatus for issuing a credential for an incident area network
US10051085B2 (en) System and method of data and command request processing
KR20150133055A (en) An electronic attendance method with a wireless access point
US10044838B2 (en) Method of automatically setting protocol in programmable logic controller system
CN108494749B (en) Method, device and equipment for disabling IP address and computer readable storage medium
US11444950B2 (en) Automated verification of authenticated users accessing a physical resource
US20170279686A1 (en) Terminal Topology Management Service Method, Device, and System for Internet of Things
WO2015117362A1 (en) Method and device for sharing personal information on terminal

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18808791

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18808791

Country of ref document: EP

Kind code of ref document: A1

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 13.03.2020)

122 Ep: pct application non-entry in european phase

Ref document number: 18808791

Country of ref document: EP

Kind code of ref document: A1