CN105245596B - A remote control method and server - Google Patents
A remote control method and server Download PDFInfo
- Publication number
- CN105245596B CN105245596B CN201510642615.9A CN201510642615A CN105245596B CN 105245596 B CN105245596 B CN 105245596B CN 201510642615 A CN201510642615 A CN 201510642615A CN 105245596 B CN105245596 B CN 105245596B
- Authority
- CN
- China
- Prior art keywords
- password
- server
- account
- client
- access mode
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000000034 method Methods 0.000 title claims abstract description 46
- 230000002441 reversible effect Effects 0.000 claims description 86
- 230000003993 interaction Effects 0.000 claims description 64
- 230000004044 response Effects 0.000 claims description 33
- 238000004891 communication Methods 0.000 claims description 17
- 238000009434 installation Methods 0.000 claims description 5
- 230000006870 function Effects 0.000 claims description 3
- 238000004321 preservation Methods 0.000 claims description 3
- 150000003839 salts Chemical class 0.000 description 9
- 238000010586 diagram Methods 0.000 description 7
- 238000007726 management method Methods 0.000 description 6
- 101100217298 Mus musculus Aspm gene Proteins 0.000 description 5
- 230000005540 biological transmission Effects 0.000 description 5
- 230000002452 interceptive effect Effects 0.000 description 5
- 238000012545 processing Methods 0.000 description 5
- 230000009471 action Effects 0.000 description 4
- 238000012790 confirmation Methods 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 4
- 230000002427 irreversible effect Effects 0.000 description 4
- 230000004048 modification Effects 0.000 description 4
- 238000012986 modification Methods 0.000 description 4
- 238000004364 calculation method Methods 0.000 description 3
- 238000011161 development Methods 0.000 description 3
- 230000006399 behavior Effects 0.000 description 2
- 238000013523 data management Methods 0.000 description 2
- 238000000605 extraction Methods 0.000 description 2
- 238000013519 translation Methods 0.000 description 2
- 241001465382 Physalis alkekengi Species 0.000 description 1
- 238000004378 air conditioning Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000008595 infiltration Effects 0.000 description 1
- 238000001764 infiltration Methods 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
- H04L67/025—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/40—Support for services or applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/14—Session management
- H04L67/141—Setup of application sessions
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Multimedia (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Information Transfer Between Computers (AREA)
- Computer And Data Communications (AREA)
- Telephonic Communication Services (AREA)
Abstract
The invention discloses a kind of long-range control methods, user logs in the access mode that first server obtains second server by client, client is established P2P with second server with the help of first server using access mode and is connect, and then client logs in second server and sends control signal to terminal by second server, terminal receives control signal and executes operation according to control signal.The invention also discloses a kind of servers, a kind of network attached storage equipment.Through the above way, the present invention may be implemented to be among Intranet or do not have fixed IP even if second server, P2P can also be established with client with the help of first server to connect, user remotely manages and controls terminal realization by second server.
Description
Technical field
The present invention relates to network technology, in particular to a kind of long-range control method, server, system and network storage are set
It is standby.
Background technique
Under the background of Internet of Things high speed development, information-based high development, the open quick and network interconnection of communication are generated
Data volume increase, improve requirement of the people to the safety of work living environment, comfort and efficiency.Smart home
It is the certainty of computer technology, network technology and automatic control technology infiltration traditional home appliance industry development.
In the prior art, various household electrical appliance can be used in family life, user is by IR remote controller or manually
Mode controls household electrical appliance, thus user can only carry out the control of household electrical appliance at home, this mode be not easy to user's device with
When control the electric appliance of family everywhere.
In current Internet application, the storage of cloud data, data processing and data management etc. are provided in the public network
The server of shared resource service is referred to as publicly-owned Cloud Server.And data storage, data processing are provided in local area network
And the server of the shared resources service such as data management is referred to as privately owned Cloud Server.It can be with installing terminal interaction journey in private clound
Sequence controls the terminal in family, and user carries out the terminal in remote control home by remotely accessing privately owned Cloud Server.But by
It is limited in IP resource, privately owned Cloud Server is often positioned among Intranet, even if being located on public network, also without fixed IP
Location cannot also realize that user directly accesses private clound, can not achieve direct long-range control of the user to terminal in family.
Summary of the invention
Present invention solves the technical problem that being that cannot directly access private clound and right for user existing in the prior art
The problem of terminal is manipulated provides a kind of long-range control method, server, system and network attached storage equipment, for solving
It certainly can not achieve user in the prior art and directly access private clound and the problem of to the direct long-range control of terminal.
In order to solve the above technical problem, the present invention provides a technical solution be: a kind of long-range control method is provided,
It include: the access side that client obtains corresponding second server using the first account and first password login first server
Formula;Client is established P2P with second server with the help of first server using access mode and is connect;Client uses the
Two accounts and the second password login second server;Client sends control signal to terminal by second server;Terminal connects
It receives control signal and executes operation according to control signal.
Wherein, client logs in first server to include: client with the access mode for obtaining second server uses the
One account and first password log in first server;Client is checked using the addressable server list of the first account and is selected
When the second server to be accessed only may have access to second server with the access mode for obtaining second server or the first account,
Client directly obtains the access mode of second server from first server.
Wherein, each addressable server runs several terminal interaction programs, and periodically reports to first server
The mount message of terminal interaction program is further listed in addressable server using the addressable server list of the first account
The terminal interaction program listing of installation, in order to which client is checked and is managed.
Wherein, client is identical or different using permission possessed by different account login second servers.
Wherein, password needed for password needed for client logs in first server and login third server is third
Password;The step of client login first server includes: that first server reception client is close using the first account and first
The logging request of code;First server obtains the access mode and corresponding third account of third server according to the first account;
First server is according to access mode and corresponding third account request third server, to obtain the 4th password, the 4th password
It is to be obtained to third password using the first non-reversible algorithm;The 4th password and the 5th password are matched, wherein the 5th password is first
Server obtains first password using the first non-reversible algorithm;Logging request is responded according to matching result, if the 4th password
With the 5th password match, then client logs in first server success, otherwise login failure.
Wherein, password needed for password needed for client logs in first server and login third server is third
Password;The step of client login first server includes: that first server reception client is close using the first account and first
The logging request of code;First server obtains the access mode and corresponding third account of third server according to the first account;
First server is according to access mode and corresponding third account request third server, to obtain the 4th password, the 4th password
It is to be obtained to third password using the first non-reversible algorithm;The 6th password and the 7th password are matched, wherein the 6th password is first
Server obtains the 4th password with the 8th password combination, and the 8th password is making to third password of saving in advance of first server
The password obtained with the second non-reversible algorithm, the 7th password is obtained to the 5th password and the 9th password combination, wherein the 5th
Password is that first server obtains first password using the first non-reversible algorithm, and the 9th password is that first server is close to first
Code is obtained using the second non-reversible algorithm;Logging request is responded according to matching result, if the 6th password and the 7th password match,
Then client logs in first server success, otherwise login failure.
Wherein, second server runs several terminal interaction programs, the corresponding terminal of each terminal interaction program;Visitor
It includes: that client accesses second server that family end, which sends control signal to terminal by second server, with to selected end
Interactive program is held to issue control signal;Second server receives control signal, sends control signals to selected terminal and hands over
Mutual program;Terminal interaction program receives control signal and is sent to corresponding terminal.
Wherein, terminal generates feedback signal also according to the working condition of itself and is sent to corresponding terminal interaction program;Eventually
Interactive program is held to receive feedback signal and accordingly more new state, so that client is checked and is manipulated.
Wherein, first server is publicly-owned Cloud Server, and second server is privately owned Cloud Server.
Wherein, first server is publicly-owned Cloud Server, and third server is privately owned Cloud Server.
In order to solve the above technical problem, the present invention provides another technical solution be: a kind of remote control method is provided
Method, comprising: first server receives and customer in response end uses the logging request of the first account and first password;First server
The access mode of corresponding second server is sent to client;First server helps client to use access mode and the
Two servers establish P2P connection so that client using after the second account and the second code entry second server by the
Two servers send control signal to terminal, and terminal receives control signal and executes operation according to control signal.
Wherein, password needed for password needed for client logs in first server and login third server is third
Password;The step of first server reception and the logging request at customer in response end includes: that first server receives client use
The logging request of first account and first password;First server according to the first account obtain third server access mode and
Corresponding third account;First server is according to access mode and corresponding third account request third server, to obtain
Four passwords, the 4th password are to be obtained to third password using the first non-reversible algorithm;The 4th password and the 5th password are matched, wherein
5th password is that first server obtains first password using the first non-reversible algorithm;It is logged in and is asked according to matching result response
It asks, if the 4th password and the 5th password match, client logs in first server success, otherwise login failure.
Wherein, password needed for password needed for client logs in first server and login third server is third
Password;The step of first server reception and the logging request at customer in response end includes: that first server receives client use
The logging request of first account and first password;First server according to the first account obtain third server access mode and
Corresponding third account;First server is according to access mode and corresponding third account request third server, to obtain
Four passwords, the 4th password are to be obtained to third password using the first non-reversible algorithm;The 6th password and the 7th password are matched, wherein
6th password is that first server obtains the 4th password with the 8th password combination, and the 8th password is that first server saves in advance
The password that third password is obtained using the second non-reversible algorithm, the 7th password be to the 5th password and the 9th password combination and
It obtains, wherein the 5th password is that first server obtains first password using the first non-reversible algorithm, the 9th password is first
Server obtains first password using the second non-reversible algorithm;Logging request is responded according to matching result, if the 6th password
With the 7th password match, then client logs in first server success, otherwise login failure.
In order to solve the above technical problem, the present invention provides another technical solution be: a kind of server is provided, wrap
Include: login response module uses the logging request of the first account and first password for receiving simultaneously customer in response end;Send mould
Block, for the access mode of corresponding second server to be sent to client;Link block is established, being used to help client makes
It establishes P2P with second server with access mode to connect, so that client uses the second account and the second code entry second
Control signal is sent to terminal by second server after server, terminal receives control signal and executes behaviour according to control signal
Make.
Wherein, password needed for password needed for client logs in first server and login third server is third
Password;Login response module includes: receiving unit, is asked for receiving client using the login of the first account and first password
It asks;Unit is addressed, for obtaining the access mode and third account of third server according to the first account;Acquiring unit is used for
According to access mode and corresponding third account request third server, to obtain the 4th password, the 4th password is close to third
Code is obtained using the first non-reversible algorithm;Matching unit, for matching the 4th password and the 5th password, wherein the 5th password is pair
First password is obtained using the first non-reversible algorithm;Response unit, for responding logging request according to matching result, if the 4th
Password and the 5th password match, then the first account logins successfully, otherwise login failure.
Wherein, password needed for password needed for client logs in first server and login third server is third
Password;Login response module includes: receiving unit, is asked for receiving client using the login of the first account and first password
It asks;Unit is addressed, for obtaining the access mode and corresponding third account of third server according to the first account;It obtains single
Member, for according to access mode and corresponding third account request third server, to obtain the 4th password, the 4th password to be pair
Third password is obtained using the first non-reversible algorithm;Matching unit, for matching the 6th password and the 7th password, wherein the 6th is close
Code is obtained to the 4th password and the 8th password combination, and the 8th password is that using third password for pre- preservation is second irreversible
The password that algorithm obtains, the 7th password is obtained to the 5th password and the 9th password combination, wherein the 5th password is to first
Password is obtained using the first non-reversible algorithm, and the 9th password is to be obtained to first password using the second non-reversible algorithm;Response is single
Member, for according to matching result respond logging request, if the 6th password and the 7th password match, the first account log at
Function, otherwise login failure.
In order to solve the above technical problem, the present invention provides another technical solution be: a kind of server is provided, wrap
Include: processor, memory and network communications circuits, memory and network communications circuits are separately connected processor;Processor is used for
Operation service program is asked with receiving simultaneously customer in response end by network communications circuits using the login of the first account and first password
It asks, the access mode of corresponding second server is sent to client by network communications circuits, passes through network communications circuits
It helps client to establish P2P with second server using access mode to connect, so that client uses the second account and second
Control signal is sent to terminal by second server after code entry second server, terminal receives control signal and according to control
Signal processed executes operation.
Wherein processor is also used to operation service program, with check with management client application program, second server and
The control of second server installation.
In order to solve the above technical problem, the present invention provides another technical solution be: a kind of network attached deposit is provided
Store up equipment, comprising: processor, hard disk and routing circuit, hard disk and routing circuit are separately connected processor;Processor is for running
First service program is connect with establishing P2P with client by routing circuit with the help of first server, is received and is responded
The logging request of use the second account and the second password that client is sent by routing circuit, processor are also used to run second
Then service routine will control signal hair by routing circuit to receive the control signal that client is sent by routing circuit
Give terminal.
Wherein, processor is for running several terminal interaction programs, the corresponding terminal of each terminal interaction program;Place
Reason device is also used to run second service program, to receive the terminal interaction journey for manipulating selection that client is sent by routing circuit
The control signal of sequence sends control signals to selected terminal interaction program;Processor is used to run terminal interaction program,
To receive control signal and be sent to corresponding terminal by routing circuit.
Wherein, processor is also used to run terminal interaction program, is sent by routing circuit with to receive corresponding terminal
Feedback signal, and more new state based on the feedback signal, so that client is checked and is manipulated;Wherein feedback signal is terminal according to certainly
What the working condition of body generated.
The beneficial effects of the present invention are: the access side of first server management the first account and corresponding second server
Formula, so that client logs in the access mode of available second server after first server using the first account, and the
P2P is established with second server with the help of one server to connect, and allows user to pass through second server remotely to control
Terminal.Even if second server is among Intranet or does not have fixed IP, can also with the help of first server with
Client connection, and using client access second server to realize remote control terminal.
Detailed description of the invention
Fig. 1 is the flow chart of the first embodiment of long-range control method of the present invention;
Fig. 2 is the schematic diagram of the second embodiment of long-range control method of the present invention;
Fig. 3 is the flow chart of the fourth embodiment of long-range control method of the present invention;
Fig. 4 is the flow chart of the 5th embodiment of long-range control method of the present invention;
Fig. 5 is the flow chart of the sixth embodiment of long-range control method of the present invention;
Fig. 6 is the schematic diagram of the sixth embodiment of long-range control method of the present invention;
Fig. 7 is the flow chart of the 7th embodiment of long-range control method of the present invention;
Fig. 8 is the flow chart of the 8th embodiment of long-range control method of the present invention;
Fig. 9 is the flow chart of the 9th embodiment of long-range control method of the present invention;
Figure 10 is the schematic diagram of the first embodiment of server of the present invention;
Figure 11 is the schematic diagram of the second embodiment of server of the present invention;
Figure 12 is the schematic diagram of the 3rd embodiment of server of the present invention;
Figure 13 is the schematic diagram of the fourth embodiment of server of the present invention;
Figure 14 is the schematic diagram of the first embodiment of inventive network attached storage device.
Specific embodiment
As shown in Figure 1, the first embodiment of long-range control method of the present invention includes:
S110: client logs in first server using the first account and first password to obtain corresponding second server
Access mode;
User inputs the first account on client (such as browser or application program) and first password logs in the first clothes
It is engaged in device, operation is for recording the data of account and the information using the addressable another server of the account in first server
The first account is searched in library in the database, and obtains the address and port of corresponding second server, obtains corresponding second clothes
The access mode of business device.
S120: client is established P2P with second server with the help of first server using access mode and is connect;
If second server is located on public network, the access mode of second server can be used to connect second service for client
Device.If client and second server are located among two different Intranets, client uses the second service obtained
The address and port of device send the first connection request to second server, due to logical not with second server before client
Believed, the first connection of network address translation (Network Address Translation, NAT) refusal of second server side
Request.Although request is refused, the NAT of client-side is had recorded in the address and port information and this Intranet of second server
Client once initiated the connection this information to second server.The client that second server is issued according to first server
The second connection request is initiated to client in address and port, since the NAT of client-side retains the record of second server, the
Two servers are considered as the external host once crossed with client communication, and the second connection request is allowed through.Client end response is asked
It asks and establishes P2P with second server and connect.
S130: client uses the second account and the second password login second server;
Client and second server are established after P2P connect, and user is defeated at client (such as browser or application program)
Enter the second account and the second password login second server, log in the second password of second server and logs in first server
First password can be the same or different.
S140: client sends control signal to terminal by second server;
User checks the terminal list that second server is listed, chooses certain after client successfully logs in second server
A terminal makes control action, and client sends control signal to second server, control in signal comprising the terminal chosen and
Control action.Second server receives the control signal that client is sent, and then sends control signals to selected terminal.
The equipment that terminal refers to for manipulation further includes that other are controllable other than the household electrical appliances such as air-conditioning, water heater, humidifier, TV
Home equipment, such as lamps and lanterns, door lock, curtain etc..
S150: terminal receives control signal and executes operation according to control signal.
The terminal chosen receives the control signal that second server is sent, and is executed according to the control action in control signal
Corresponding operating.For example, user's client to be logged in, and by second server to the behaviour of terminal progress " opening " or " closing "
Make: firstly, control signal of the user in client input " opening " or " closing ", and then client is by " opening " or " closing "
Control signal is sent to second server, and " opening " or the control signal of " closing " are sent to accordingly by the second last server again
Terminal, terminal according to control signal execute " opening " or " closing " operation.
From above embodiments it is found that user inputs account and password login first server, first service on the client
Device operation data library obtains the access mode of corresponding second server, and access mode is sent to client by first server,
Client is established P2P with second server with the help of first server and is connect, and client inputs account number cipher and logs in second
Server.Client can be communicated directly with second server as a result, realize remotely controling and operating to terminal.
The second embodiment of long-range control method of the present invention is on the basis of first embodiment, and client logs in the first clothes
Business device includes: that client uses the first account and password login first server with the access mode for obtaining second server;Visitor
Family end is checked using the addressable server list of the first account and selects the second server to be accessed to obtain second service
The access mode of device;Or first account only may have access to second server when, client directly from first server obtain second clothes
The access mode of business device.
After client logs in first server, in the user interface of client, can view can using the first account
Server list with the server list of access, i.e., with the binding of the first account.After viewing accessible server list,
The server to be accessed is selected, selected server is second server, and obtains the access mode of second server.If
Using only one accessible second server of the first account, client directly obtains second server from first server
Access mode, no longer selected.
Each addressable server runs several terminal interaction programs, and periodically hands over to first server reporting terminal
The mount message of mutual program lists the end of each addressable server installation using the addressable server list of the first account
Interactive program list is held, as shown in Fig. 2, in order to which client is checked and is managed.
The terminal interaction program that first server is managed collectively addressable server and installs thereon, addressable service
Device is periodically to the mount message of first server reporting terminal interactive program, therefore addressable server list can be arranged further
The terminal interaction program listing of addressable server installation out, for client selection.
The 3rd embodiment of long-range control method of the present invention is on the basis of first embodiment, and client uses different
Account logs in that permission possessed by second server is identical or different, if any account can manage and to be installed on second server
All terminal interaction programs, and some accounts can only manage a portion terminal interaction program installed on second server.
Such as all terminal interaction programs can be managed using parent's account, the account of child is unable to the terminal interaction of Management Television machine
Program, guest's account cannot manage terminal interaction program of door lock etc..
As shown in figure 3, client logs in the close of first server in the fourth embodiment of long-range control method of the present invention
The step of code and the password for logging in third server are third password, and client logs in first server include:
S111: first server receives the logging request that client uses the first account and first password;
User inputs the first account and first password on the client (such as browser or application program) to attempt to log on
First server, first server operation service program further can be with operation data library.
S112: first server obtains the access mode and corresponding third account of third server according to the first account;
Client logs in first server and third server uses same password.Remember in the database of first server
It has recorded the first account, is corresponding with the first account using another server of same password and the information of corresponding another account,
To be verified for obtaining password.First server searches the first account in the database, and obtains the account corresponding
Address, port information and the corresponding third account of three servers.
S113: first server is according to access mode and corresponding third account request third server, to obtain the 4th
Password, the 4th password are to be obtained to third password using the first non-reversible algorithm;
First server establishes connection according to the address port information of corresponding third server and third server, to the
Three servers send obtain the 4th password request, the 4th password be third password is obtained using the first non-reversible algorithm it is close
Code.In general, the first non-reversible algorithm refer to Hash (Hash) algorithm or add salt hash algorithm, can be used MD5, SHA1,
SHA2, SHA256, SHA512, PBKDF2 any of them are as hash algorithm.User is when completing the setting of the first account
The user password of confirmation is third password, and the password that login first server and third server use is third password.
S114: matching the 4th password and the 5th password, wherein the 5th password, which is first server, uses the to first password
One non-reversible algorithm obtains;
First server obtains the 5th password using the first non-reversible algorithm to the first password that user inputs, and to the 4th
Password and the 5th password are matched, and judge that the 4th password and whether identical or both the relationship of the 5th password meet predetermined article
Part.
S115: responding logging request according to matching result, if the 4th password and the 5th password match, client is logged in
First server is successful, otherwise login failure;
If the 4th password and the success of the 5th password match, judgement first password is identical with third password or both pass
System meets predetermined condition, i.e. the password of user's input is identical as user password or both relationship meets predetermined condition, first service
Device refuses the logging request of client by the logging request of client, otherwise first server, and returns to miscue.
Client logs in third server and first server uses same password, saves on third server complete
Password does not save password in first server.First server is obtained to the request of third server when user logs in first server
Complete password is obtained, and the password of user's input is verified accordingly.Accordingly even when first server is broken, can not also obtain
User password is used to access third server, ensure that the safety of third server data.
As shown in figure 4, client logs in the close of first server in the 5th embodiment of long-range control method of the present invention
The step of code and the password for logging in third server are third password, and client logs in first server include:
S121: first server receives the logging request that client uses the first account and first password;
User inputs the first account and first password on the client (such as browser or application program) to attempt to log on
First server, first server operation service program further can be with operation data library.
S122: first server obtains the access mode and corresponding third account of third server according to the first account;
Client logs in first server and third server uses same password.Remember in the database of first server
It has recorded the first account, is corresponding with the first account using another server of same password and the information of corresponding another account,
To be verified for obtaining password.First server searches the first account in the database, and obtains the account corresponding
Address, port information and the corresponding third account of three servers.
S123: first server is according to access mode and corresponding third account request third server, to obtain the 4th
Password, the 4th password are to be obtained to third password using the first non-reversible algorithm;
First server establishes connection according to the address port information of corresponding third server and third server, to the
Three servers send obtain the 4th password request, the 4th password be third password is obtained using the first non-reversible algorithm it is close
Code.In general, the first non-reversible algorithm refer to Hash (Hash) algorithm or add salt hash algorithm, can be used MD5, SHA1,
SHA2, SHA256, SHA512, PBKDF2 any of them are as hash algorithm.User is when completing the setting of the first account
The user password of confirmation is third password, and the password that login first server and third server use is third password.The
Three servers can save third password, use the first non-reversible algorithm to third password after receiving the request of first server
First server is sent to after obtaining the 4th password;The 4th password can also be obtained using the first non-reversible algorithm to third password
And the 4th password is saved, the 4th password is directly transmitted after receiving the request of first server.It cannot be reversed according to the 4th password
Reckoning obtains third password, prevents the leakage for being trapped and causing user password in data transmission procedure.
S124: the 6th password of matching and the 7th password, wherein the 6th password is first server to the 4th password and the 8th
Password combination and obtain, the 8th password is being obtained to third password using the second non-reversible algorithm of saving in advance of first server
Password, the 7th password is obtained to the 5th password and the 9th password combination, wherein the 5th password is first server to first
Password is obtained using the first non-reversible algorithm, and the 9th password is that first server obtains first password using the second non-reversible algorithm
It arrives;
Preserve the 8th password in first server in advance, first server is just after each user confirms modification user password
The 8th password is obtained using the second non-reversible algorithm to the third password after modification and is saved;First server is to the 4th password
The 6th password is obtained with the 8th password combination.Hash calculation is reused after referring to extraction section digit using the second non-reversible algorithm
Method adds salt hash algorithm to be handled.Combination, which can be, is stitched together the 4th password and the 8th password, is also possible to
Refer to by the 4th password and the 8th password splicing after using hash algorithm or add salt hash algorithm handle.First server
The 5th password also is obtained using the first non-reversible algorithm to the first password of user's input, it is irreversible using second to first password
Algorithm obtains the 9th password, then obtains the 7th password to the 5th password and the 9th password combination;Then first server is to the 6th
Password and the 7th password are matched, and judge that the 6th password and whether identical or both the relationship of the 7th password meet predetermined article
Part.
S125: responding logging request according to matching result, if the 6th password and the 7th password match, client is logged in
First server is successful, otherwise login failure;
If the 6th password and the success of the 7th password match, judgement first password is identical with third password or both pass
System meets predetermined condition, that is, the password inputted is identical as user password or both relationship meets predetermined condition, and first server is logical
The logging request of client is crossed, the logging request of first server refusal client is otherwise returned, and returns to miscue.Such as
One account is equipped with a main password and at least one sub- password, and there are corresponding relationships, such as son between sub- password and main password
Password is a part of main password, and the first password of user's input can also be logged in successfully when being any one sub- password, at this time
The relationship of the relationship of 6th password and the 7th password, first password and third password meets scheduled condition.
From above embodiments it is found that needed for password needed for client login first server and login third server
Password is third password, and complete password is saved on third server, only saves in first server and passes through non-reversible algorithm
The password of processing, and complete password cannot be obtained according to the password saved in first server.User logs in first service
First server obtains complete password to the request of third server when device, and verifies accordingly to the password of user's input.This
Even if sample first server is broken, it can not also obtain user password and be used to access third server, ensure that third server
The safety of data.
As shown in Figure 5 and Figure 6, in the sixth embodiment of long-range control method of the present invention, second server operation is several
A terminal interaction program, the corresponding terminal of each terminal interaction program;Client is sent to terminal by second server and is controlled
Signal processed includes:
S210: client accesses second server, to issue control signal to selected terminal interaction program;
Client checks the terminal interaction program listing on second server, and the corresponding terminal of the terminal to be manipulated is selected to hand over
Mutual program simultaneously makes control action, and client sends control signal to selected terminal interaction program.
S220: second server receives control signal, sends control signals to selected terminal interaction program;
Second server receives the control signal that client is sent, then by the control of the selected terminal interaction program of manipulation
Signal processed is sent to selected terminal interaction program.
S230: terminal interaction program receives control signal and is sent to corresponding terminal;
Selected terminal interaction program receives control signal and simultaneously sends control signals to corresponding terminal, terminal according to
It controls signal and executes corresponding operating.
S240: terminal generates feedback signal according to the working condition of itself and is sent to corresponding terminal interaction program;
After terminal executes corresponding operating according to control signal, working condition may change, and terminal is according to certainly at this time
The working condition of body generates feedback signal, and is sent to corresponding terminal interaction program.
S250: terminal interaction program receives feedback signal and accordingly more new state, so that client is checked and is manipulated;
Terminal interaction program receives the feedback signal that corresponding terminal is sent, and more new state based on the feedback signal, so that
Terminal interaction program can reflect the working condition of counterpart terminal in real time, so that client is checked and is manipulated.
As seen from the above embodiment, client is established P2P with second server with the help of first server and is connect, visitor
Family end can directly log in second server, check simultaneously controlling terminal, realization pair by the terminal interaction program in second server
Terminal is remotely directly controlled and is operated.
In one embodiment of long-range control method of the present invention, first server is publicly-owned Cloud Server, second service
Device is privately owned Cloud Server, and second server is the server that user selects access.Public cloud is mainly used for managing user's letter
Breath, private clound facility information and entry maps relationship of corresponding user's private clound etc., private clound is mainly used for saving user
Private information and privately owned file etc..The present embodiment can be in conjunction with the embodiment of one server of any of the above.
In one embodiment of long-range control method of the present invention, first server is publicly-owned Cloud Server, third service
Device is privately owned Cloud Server, and third server can be the same or different with second server.Public cloud is mainly used for managing
User information, private clound facility information and entry maps relationship of corresponding user's private clound etc., private clound is mainly used for protecting
Deposit the private information and privately owned file etc. of user.The present embodiment can be combined with above-described embodiment four or embodiment five.
As shown in fig. 7, the 7th embodiment of long-range control method of the present invention includes:
S310: first server receives and customer in response end uses the logging request of the first account and first password;
User inputs the first account on the client and first password logs in first server, runs and uses in first server
In the database of record account and the information using the addressable another server of the account, the first account is searched in the database
Number, and obtain the address and port of corresponding second server, that is, obtain the access mode of corresponding second server.
S320: the access mode of corresponding second server is sent to client by first server;
The access mode for the second server that first server will acquire, the i.e. address and port of second server are sent to
Client connect so that client establishes P2P using access mode and second server and logs in second server.
S330: first server help client is established P2P with second server using access mode and is connect, so that
Client sends control signal to terminal by second server using after the second account and the second code entry second server,
Terminal receives control signal and executes operation according to control signal;
First server, which helps client to establish the process that P2P is connect with second server, can refer to long-range control of the invention
The description of S120 step in method first embodiment, the wherein main effect of first server is by the address and port of client
It issues second server and second server is notified to initiate the connection request.Client and second server are established after P2P connect,
The second account and the second code entry second server can be used in client, then sends control letter to terminal by second server
Number, terminal receives control signal and executes operation according to control signal.
From above embodiments it is found that first server receives and customer in response end stepping on using the first account and first password
Record request, first server operation data library obtains the access mode of corresponding second server and access mode is sent to visitor
Family end, first server also help client to establish P2P with second server to connect, allow client directly with the second clothes
Business device is communicated, and realizes remotely controling and operating to terminal.
As shown in figure 8, the 8th embodiment of long-range control method of the present invention is further limited on the basis of seven embodiments
Password needed for determining password needed for client logs in first server and logging in third server is third password;
First server receive and customer in response end logging request the step of include:
S311: first server receives the logging request that client uses the first account and first password;
User inputs the first account and first password on the client (such as browser or application program) to attempt to log on
First server, first server operation service program further can be with operation data library.
S312: first server obtains the access mode and corresponding third account of third server according to the first account;
Client logs in first server and third server uses same password.Remember in the database of first server
It has recorded the first account, is corresponding with the first account using another server of same password and the information of corresponding another account,
To be verified for obtaining password.First server searches the first account in the database, and obtains the account corresponding
Address, port information and the corresponding third account of three servers.
S313: first server is according to access mode and corresponding third account request third server, to obtain the 4th
Password, the 4th password are to be obtained to third password using the first non-reversible algorithm;
First server establishes connection according to the address port information of corresponding third server and third server, to the
Three servers send obtain the 4th password request, the 4th password be third password is obtained using the first non-reversible algorithm it is close
Code.In general, the first non-reversible algorithm refer to Hash (Hash) algorithm or add salt hash algorithm, can be used MD5, SHA1,
SHA2, SHA256, SHA512, PBKDF2 any of them are as hash algorithm.User is when completing the setting of the first account
The user password of confirmation is third password, and the password that login first server and third server use is third password.
S314: matching the 4th password and the 5th password, wherein the 5th password, which is first server, uses the to first password
One non-reversible algorithm obtains;
First server obtains the 5th password using the first non-reversible algorithm to the first password that user inputs, and to the 4th
Password and the 5th password are matched, and judge that the 4th password and whether identical or both the relationship of the 5th password meet predetermined article
Part.
S315: responding logging request according to matching result, if the 4th password and the 5th password match, client is logged in
First server is successful, otherwise login failure;
If the 4th password and the success of the 5th password match, judgement first password is identical with third password or both pass
System meets predetermined condition, i.e. the password of user's input is identical as user password or both relationship meets predetermined condition, first service
Device refuses the logging request of client by the logging request of client, otherwise first server, and returns to miscue.
Client logs in third server and first server uses same password, saves on third server complete
Password does not save password in first server.First server is obtained to the request of third server when user logs in first server
Complete password is obtained, and the password of user's input is verified accordingly.Accordingly even when first server is broken, can not also obtain
User password is used to access third server, ensure that the safety of third server data.
As shown in figure 9, client logs in needed for first server in the 9th embodiment of long-range control method of the present invention
Password and log in third server needed for password be third password;
First server receive and customer in response end logging request the step of include:
S321: first server receives the logging request that client uses the first account and first password;
User inputs the first account and first password on the client (such as browser or application program) to attempt to log on
First server, first server operation service program further can be with operation data library.
S322: first server obtains the access mode and corresponding third account of third server according to the first account;
Client logs in first server and third server uses same password.Remember in the database of first server
It has recorded the first account, is corresponding with the first account using another server of same password and the information of corresponding another account,
To be verified for obtaining password.First server searches the first account in the database, and obtains the account corresponding
Address, port information and the corresponding third account of three servers.
S323: first server is according to access mode and corresponding third account request third server, to obtain the 4th
Password, the 4th password are to be obtained to third password using the first non-reversible algorithm;
First server establishes connection according to the address port information of corresponding third server and third server, to the
Three servers send obtain the 4th password request, the 4th password be third password is obtained using the first non-reversible algorithm it is close
Code.In general, the first non-reversible algorithm refer to Hash (Hash) algorithm or add salt hash algorithm, can be used MD5, SHA1,
SHA2, SHA256, SHA512, PBKDF2 any of them are as hash algorithm.User is when completing the setting of the first account
The user password of confirmation is third password, and the password that login first server and third server use is third password.The
Three servers can save third password, use the first non-reversible algorithm to third password after receiving the request of first server
First server is sent to after obtaining the 4th password;The 4th password can also be obtained using the first non-reversible algorithm to third password
And the 4th password is saved, the 4th password is directly transmitted after receiving the request of first server.It cannot be reversed according to the 4th password
Reckoning obtains third password, prevents the leakage for being trapped and causing user password in data transmission procedure.
S324: the 6th password of matching and the 7th password, wherein the 6th password is first server to the 4th password and the 8th
Password combination and obtain, the 8th password is being obtained to third password using the second non-reversible algorithm of saving in advance of first server
Password, the 7th password is obtained to the 5th password and the 9th password combination, wherein the 5th password is first server to first
Password is obtained using the first non-reversible algorithm, and the 9th password is that first server obtains first password using the second non-reversible algorithm
It arrives;
Preserve the 8th password in first server in advance, first server is just after each user confirms modification user password
The 8th password is obtained using the second non-reversible algorithm to the third password after modification and is saved;First server is to the 4th password
The 6th password is obtained with the 8th password combination.Hash calculation is reused after referring to extraction section digit using the second non-reversible algorithm
Method adds salt hash algorithm to be handled.Combination, which can be, is stitched together the 4th password and the 8th password, is also possible to
Refer to by the 4th password and the 8th password splicing after using hash algorithm or add salt hash algorithm handle.First server
The 5th password also is obtained using the first non-reversible algorithm to the first password of user's input, it is irreversible using second to first password
Algorithm obtains the 9th password, then obtains the 7th password to the 5th password and the 9th password combination;Then first server is to the 6th
Password and the 7th password are matched, and judge that the 6th password and whether identical or both the relationship of the 7th password meet predetermined article
Part.
S325: responding logging request according to matching result, if the 6th password and the 7th password match, client is logged in
First server is successful, otherwise login failure;
If the 6th password and the success of the 7th password match, judgement first password is identical with third password or both pass
System meets predetermined condition, that is, the password inputted is identical as user password or both relationship meets predetermined condition, and first server is logical
The logging request of client is crossed, the logging request of first server refusal client is otherwise returned, and returns to miscue.Such as
One account is equipped with a main password and at least one sub- password, and there are corresponding relationships, such as son between sub- password and main password
Password is a part of main password, and the first password of user's input can also be logged in successfully when being any one sub- password, at this time
The relationship of the relationship of 6th password and the 7th password, first password and third password meets scheduled condition.
From above embodiments it is found that needed for password needed for client login first server and login third server
Password is third password, and complete password is saved on third server, only saves in first server and passes through non-reversible algorithm
The password of processing, and complete password cannot be obtained according to the password saved in first server.User logs in first service
First server obtains complete password to the request of third server when device, and verifies accordingly to the password of user's input.This
Even if sample first server is broken, it can not also obtain user password and be used to access third server, ensure that third server
The safety of data.
As shown in Figure 10, the first embodiment of server of the present invention includes:
Login response module 11 uses the logging request of the first account and first password for receiving simultaneously customer in response end;
Sending module 12, for the access mode of corresponding second server to be sent to client;
Link block 13 is established, is used to help client and establishes P2P with second server using access mode to connect, with
So that client sends control to terminal by second server using after the second account and the second code entry second server
Signal, terminal receive control signal and execute operation according to control signal.
From above embodiments it is found that first server receives and customer in response end stepping on using the first account and first password
Record request, first server operation data library obtains the access mode of corresponding second server and access mode is sent to visitor
Family end, first server also help client to establish P2P with second server to connect, allow client directly with second
Server is communicated, and realizes remotely controling and operating to terminal.
As shown in figure 11, the second embodiment of server of the present invention is on the basis of the first embodiment of server of the present invention
Improvement, wherein client log in first server needed for password and log in third server needed for password be that third is close
Code;Login response module 11 includes:
Receiving unit 111 uses the logging request of the first account and first password for receiving client;It is transported on server
Row service routine receives the logging request of user.
Unit 112 is addressed, for obtaining the access mode and corresponding third account of third server according to the first account;
Further operation data library on server, for recording the corresponding another clothes using same password of the first account, the first account
The information for device and the third account of being engaged in, to be verified for obtaining password.The first account is searched in the database, and obtains correspondence
Third server address and port and third account, refuse logging request if it can not find corresponding account information and return
Return miscue.
Acquiring unit 113 is used for according to access mode and corresponding third account request third server, to obtain the 4th
Password, the 4th password are to be obtained to third password using the first non-reversible algorithm.In general, the first non-reversible algorithm refers to Kazakhstan
Uncommon (Hash) algorithm adds salt hash algorithm, and it is wherein any that MD5, SHA1, SHA2, SHA256, SHA512, PBKDF2 can be used
It is a kind of to be used as hash algorithm.User is third password in the user password for completing to confirm when the setting of the first account, logs in first
Password needed for password needed for server and login third server is third password.Reverse push is unable to according to the 4th password
Calculation obtains third password, prevents the leakage for being trapped and causing user password in data transmission procedure.
Matching unit 114, for matching the 4th password and the 5th password, wherein the 5th password is to use the to first password
One non-reversible algorithm obtains;It is close that the 5th is calculated from the acquisition first password of receiving unit 111 and using the first non-reversible algorithm
Code obtains the 4th password from acquiring unit 113, and the two is compared.
Response unit 115, for responding logging request according to matching result, if the 4th password and the 5th password match,
Then client logins successfully, otherwise login failure;If the 4th password and the 5th password are identical or both relationship meets pre-
Fixed condition determines that identical with third password or both the relationship of first password meets predetermined condition, and server passes through client
Logging request, otherwise refuse the logging request of client, and return to miscue.Such as an account is equipped with a main password
With at least one sub- password, there are corresponding relationships between sub- password and main password, for example sub- password is a part of main password, is used
The first password of family input can also be logged in successfully when being any one sub- password, at this time the pass of the 4th password and the 5th password
The relationship of system, first password and third password meets scheduled condition.
As shown in figure 12, in the 3rd embodiment of server of the present invention, wherein client is logged in needed for first server
Password and log in third server needed for password be third password;Login response module 11 includes:
Receiving unit 211 uses the logging request of the first account and first password for receiving client;It is transported on server
Row service routine receives the logging request of user, stores user information in database.
Unit 212 is addressed, for obtaining the access mode and corresponding third account of third server according to the first account;
Further operation data library on server, for recording the first account, the corresponding another server of the first account and third account
Information, to be verified for obtaining password.The first account is searched in the database, and obtains corresponding third server
Address and port and third account refuse logging request if it can not find corresponding account information and return to miscue.
Acquiring unit 213 is used for according to access mode and corresponding third account request third server, to obtain the 4th
Password, the 4th password are to be obtained to third password using the first non-reversible algorithm;User is true when completing the setting of the first account
The user password recognized is third password, and password needed for password needed for logging in first server and login third server is
Third password.It cannot reversely be calculated according to the 4th password and obtain third password, prevent from being trapped and causing in data transmission procedure
The leakage of user password.
Matching unit 214, for matching the 6th password and the 7th password, wherein the 6th password is to from acquiring unit 213
The 4th password and the 8th password combination that obtain and obtain, the 8th password be the third password saved in advance is used it is second irreversible
The password that algorithm obtains;7th password is obtained to the 5th password and the 9th password combination, wherein the 5th password is to from connecing
It receives the first password that unit 211 obtains to obtain using the first non-reversible algorithm, the 9th password is obtained to from receiving unit 211
First password is obtained using the second non-reversible algorithm;Second non-reversible algorithm is different from the first non-reversible algorithm, even if second not
Reversible algorithm is cracked, and obtained result is also different from third password, and cannot extrapolate complete according to result is cracked
Three passwords.
Response unit 215, for responding logging request according to matching result, if the 6th password and the 7th password match,
Then client logins successfully, otherwise login failure;If the 6th password and the 7th password are identical or both relationship meets pre-
Fixed condition determines that identical with third password or both the relationship of first password meets predetermined condition, and server passes through client
Logging request, otherwise refuse the logging request of client, and return to miscue.Such as an account is equipped with a main password
With at least one sub- password, there are corresponding relationships between sub- password and main password, for example sub- password is a part of main password, is used
The first password of family input can also be logged in successfully when being any one sub- password, at this time the pass of the 6th password and the 7th password
The relationship of system, first password and third password meets scheduled condition.
From above embodiments it is found that needed for password needed for client login first server and login third server
Password is third password, and client uses the login first server of the first account and first password, first server according to
First account obtains the access mode and corresponding third account of third server, and then according to access mode and corresponding third
Account request third server carries out password authentification to obtain the 4th password, and the verifying correct client of password logins successfully, otherwise
Client login failure.
As shown in figure 13, the fourth embodiment of server of the present invention includes:
Processor, memory and network communications circuits, memory and network communications circuits are separately connected processor;
Processor uses first for running first service program, to receive simultaneously customer in response end by network communications circuits
The logging request of account and first password, runs and inquires database, searches the first account in the database, and obtains corresponding
The access mode (i.e. address and port) of corresponding second server is passed through network communication by the address and port of second server
Circuit is sent to client, helps client to establish P2P using access mode and second server by network communications circuits and connects
It connects, so that client is sent by second server to terminal using after the second account and the second code entry second server
Signal is controlled, and then terminal receives control signal and executes operation according to control signal.
5th embodiment of server of the present invention is on the basis of fourth embodiment, and processor is further used for operation
Two service routines are installed on second server and second server with issuing and safeguarding client application, check and manage
Terminal interaction program.Second service program is responsible for issuing new client application and carries out daily maintenance and pipe to it
Reason.Second service program is also responsible for that the terminal interaction program installed on second server and second server is checked and managed
Reason, including when terminal manufacturer update terminal interaction program, push and update to second server, the terminal interaction newly issued is provided
Program is for second server downloading.
The server that any embodiment of server of the present invention provides is usually publicly-owned Cloud Server, and second server is private
There is Cloud Server.Publicly-owned Cloud Server is for checking and management client application program, privately owned Cloud Server and privately owned cloud service
The terminal interaction program installed on device, and help privately owned Cloud Server to establish P2P with client and connect, so that client logs in private
There is Cloud Server and the long-range control and management to terminal are realized by privately owned Cloud Server.
As shown in figure 14, the first embodiment of inventive network attached storage device includes:
Processor, hard disk and routing circuit, hard disk and routing circuit are separately connected processor;The wan interface of routing circuit
It is connected through the internet to server, LAN interface is separately connected Intranet equipment, and routing circuit is for completing data packet in processor
Transmission between corresponding interface.Processor is for exchanging routing iinformation, searching routing table and forwarding data packet, cooperation routing electricity
Realize the routing functions such as the interconnection of local area network and wide area network, the processing of data and distribution, flow control in road.
Processor is also used to run first service program, to pass through routing circuit and client with the help of first server
P2P connection is established at end, receives the login of use the second account and the second password that simultaneously customer in response end is sent by routing circuit
Request, processor are also used to run second service program, to receive the control signal that client is sent by routing circuit, then
Terminal is sent control signals to by routing circuit.
The second embodiment of inventive network attached storage device is implemented in inventive network attached storage device first
On the basis of example, processor is also used to run several terminal interaction programs, the corresponding terminal of each terminal interaction program;Place
Reason device is also used to run second service program, to receive the terminal interaction journey that client is chosen by the manipulation that routing circuit is sent
The control signal of sequence sends control signals to selected terminal interaction program;Processor is used to run terminal interaction program,
To receive control signal and be sent to corresponding terminal by routing circuit, receive what corresponding terminal was sent by routing circuit
Feedback signal, and more new state based on the feedback signal, so that client is checked and is manipulated, wherein feedback signal is terminal according to certainly
What the working condition of body generated.
Each terminal interaction program corresponds to a terminal, and user logs in second server operation control terminal by client and hands over
Mutual program and realize the operation and control to corresponding terminal.Client first sends control signals to the terminal interaction journey chosen
Sequence, the terminal interaction program then chosen send control signals to corresponding terminal, and corresponding terminal makes phase according to control signal
It should operate.
Client is established the purpose that P2P is connect with second server and is, realization directly controls terminal, therefore terminal
Interactive program needs to show the current working status of counterpart terminal.Terminal will indicate that itself after itself working condition changes
The feedback signal of working condition issues corresponding terminal interaction program on second server, so that client is checked and is manipulated.This
One operation can be to be carried out after terminal receives the control signal sent of terminal interaction program and carries out corresponding operating, can also be
Other operations (such as reservation switch, manipulation of other user's short distances etc.) for changing terminal operating status carry out after occurring.
Network attached storage equipment is generally as privately owned Cloud Server, help of the privately owned Cloud Server in publicly-owned Cloud Server
P2P is established with client down to connect, and client is allowed to log in privately owned Cloud Server and by the realization pair of privately owned Cloud Server
The long-range control and management of terminal.
Mode the above is only the implementation of the present invention is not intended to limit the scope of the invention, all to utilize this
Equivalent structure or equivalent flow shift made by description of the invention and accompanying drawing content, it is relevant to be applied directly or indirectly in other
Technical field is included within the scope of the present invention.
Claims (12)
1. a kind of long-range control method characterized by comprising
Client logs in first server using the first account and first password to obtain the access mode of second server;
The client establishes P2P with the second server with the help of first server using the access mode
Connection;
The client uses second server described in the second account and the second password login;
The client sends control signal to terminal by the second server;
The terminal receives the control signal and executes operation according to the control signal;
Password needed for wherein the client logs in the first server and log in third server needed for password be
Third password;
The client logs in the step of first server and includes:
The first server receives the logging request that the client uses first account and the first password;It is described
First server obtains the access mode and corresponding third account of the third server according to first account;Described
One server third server according to the access mode and corresponding third account request, to obtain the 4th password, institute
Stating the 4th password is to be obtained to the third password using the first non-reversible algorithm;The 4th password and the 5th password are matched,
Wherein the 5th password is that the first server obtains the first password using first non-reversible algorithm;According to
Matching result responds the logging request, if the 4th password and the 5th password match, the client is logged in
The first server is successful, otherwise login failure;Or
The first server receives the logging request that the client uses first account and the first password;It is described
First server obtains the access mode and corresponding third account of third server according to first account;First clothes
It is engaged in device third server according to the access mode and corresponding third account request, to obtain the 4th password, described the
Four passwords are to be obtained to the third password using the first non-reversible algorithm;The 6th password and the 7th password are matched, wherein described
6th password is that the first server obtains the 4th password with the 8th password combination, and the 8th password is described
The password obtained to the third password using the second non-reversible algorithm that first server saves in advance, the 7th password is pair
5th password and the 9th password combination and obtain, wherein the 5th password is that the first server makes the first password
It is obtained with first non-reversible algorithm, the 9th password, which is the first server, uses described the to the first password
Two non-reversible algorithms obtain;The logging request is responded according to matching result, if the 6th password and the 7th password
Matching, then the client logs in the first server success, otherwise login failure.
2. the method according to claim 1, wherein
The client logs in the first server with the access mode for obtaining second server
The client logs in first server using the first account and first password;
The client checks using the addressable server list of first account and selects the second server to be accessed
When only may have access to the second server with the access mode for obtaining the second server or first account, the visitor
Family end directly obtains the access mode of the second server from the first server.
3. according to the method described in claim 2, it is characterized in that,
Each addressable server runs several terminal interaction programs, and periodically reports institute to the first server
The mount message of terminal interaction program is stated, the use addressable server list of the first account is further listed in described
The terminal interaction program listing of addressable server installation, in order to which the client is checked and is managed.
4. the method according to claim 1, wherein
The client is identical or different using permission possessed by the different account login second servers.
5. the method according to claim 1, wherein
The second server runs several terminal interaction programs, each corresponding terminal of the terminal interaction program;
The client sends control signal to the terminal by the second server
The client accesses the second server, to issue control signal to selected terminal interaction program;
The second server receives the control signal, and the control signal is sent to the selected terminal interaction journey
Sequence;
The terminal interaction program receives the control signal and is sent to corresponding terminal.
6. according to the method described in claim 5, it is characterized in that,
The terminal generates feedback signal also according to the working condition of itself and is sent to the corresponding terminal interaction program;
The terminal interaction program receives the feedback signal and accordingly more new state, so that the client is checked and is manipulated.
7. method according to any one of claims 1 to 6, which is characterized in that
The first server is publicly-owned Cloud Server, and the second server is privately owned Cloud Server.
8. method according to any one of claims 1 to 6, which is characterized in that
The first server is publicly-owned Cloud Server, and the third server is privately owned Cloud Server.
9. a kind of long-range control method characterized by comprising
First server receives and customer in response end uses the logging request of the first account and first password;
The access mode of second server is sent to the client by the first server;
The first server help client is established P2P with the second server using the access mode and is connect,
So that the client passes through the second server after using second server described in the second account and the second password login
Control signal is sent to terminal, the terminal receives the control signal and executes operation according to the control signal;
Password needed for wherein the client logs in the first server and log in third server needed for password be
Third password;
The first server receives and the step of logging request at customer in response end includes:
The first server receives the logging request that the client uses first account and the first password;It is described
First server obtains the access mode and corresponding third account of the third server according to first account;Described
One server third server according to the access mode and corresponding third account request, to obtain the 4th password, institute
Stating the 4th password is to be obtained to the third password using the first non-reversible algorithm;The 4th password and the 5th password are matched,
Wherein the 5th password is that the first server obtains the first password using first non-reversible algorithm;According to
Matching result responds the logging request, if the 4th password and the 5th password match, the client is logged in
The first server is successful, otherwise login failure;Or
The first server receives the logging request that the client uses first account and the first password;It is described
First server obtains the access mode and corresponding third account of third server according to first account;First clothes
It is engaged in device third server according to the access mode and corresponding third account request, to obtain the 4th password, described the
Four passwords are to be obtained to the third password using the first non-reversible algorithm;The 6th password and the 7th password are matched, wherein described
6th password is that the first server obtains the 4th password with the 8th password combination, and the 8th password is described
The password obtained to the third password using the second non-reversible algorithm that first server saves in advance, the 7th password is pair
5th password and the 9th password combination and obtain, wherein the 5th password is that the first server makes the first password
It is obtained with first non-reversible algorithm, the 9th password, which is the first server, uses described the to the first password
Two non-reversible algorithms obtain;The logging request is responded according to matching result, if the 6th password and the 7th password
Matching, then the client logs in the first server success, otherwise login failure.
10. a kind of server characterized by comprising
Login response module uses the logging request of the first account and first password for receiving simultaneously customer in response end;
Sending module, for the access mode of corresponding second server to be sent to the client;
Link block is established, the client is used to help using the access mode and the second server and establishes P2P company
It connects, so that the client passes through described second after using second server described in second account and the second code entry
Server sends control signal to terminal, and the terminal receives the control signal and executes operation according to the control signal;
Password needed for wherein the client logs in the first server and log in third server needed for password be
Third password;
The login response module includes:
Receiving unit uses the logging request of first account and the first password for receiving the client;Addressing
Unit, for obtaining the access mode and third account of third server according to first account;Acquiring unit is used for basis
Third server described in the access mode and corresponding third account request, to obtain the 4th password, the 4th password is
The third password is obtained using the first non-reversible algorithm;Matching unit, for matching the 4th password and the 5th password,
Wherein the 5th password is to be obtained to the first password using first non-reversible algorithm;Response unit is used for basis
Matching result responds the logging request, if the 4th password and the 5th password match, first account log at
Function, otherwise login failure;Or
Receiving unit uses the logging request of first account and the first password for receiving the client;Addressing
Unit, for obtaining the access mode and corresponding third account of third server according to first account;Acquiring unit is used
In the third server according to the access mode and corresponding third account request, to obtain the 4th password, the described 4th
Password is to be obtained to the third password using the first non-reversible algorithm;Matching unit, it is close for the 6th password of matching and the 7th
Code, wherein the 6th password is obtained to the 4th password and the 8th password combination, the 8th password is pre- preservation
The password that the third password is obtained using the second non-reversible algorithm, the 7th password is close to the 5th password and the 9th
Code character conjunction obtains, wherein the 5th password is to be obtained to the first password using first non-reversible algorithm, it is described
9th password is to be obtained to the first password using second non-reversible algorithm;Response unit, for according to matching result
The logging request is responded, if the 6th password and the 7th password match, first account is logined successfully, no
Then login failure.
11. a kind of server characterized by comprising
Processor, memory and network communications circuits, the memory and network communications circuits are separately connected the processor;
The processor is used for running first service program with receiving simultaneously customer in response end by the network communications circuits
The access mode of corresponding second server is passed through the network communications circuits by the logging request of the first account and first password
It is sent to the client, helps the client to use the access mode and described second by the network communications circuits
Server establishes P2P connection, so that after the client is using second server described in the second account and the second password login
Control signal is sent to terminal by the second server, the terminal receives the control signal and believes according to the control
Number execute operation;
Password needed for wherein the client logs in the server and log in third server needed for password be
Third password;
The processor uses first account and described first for running first service program, to receive the client
The logging request of password;The access mode and corresponding third account of the third server are obtained according to first account;
According to third server described in the access mode and corresponding third account request, to obtain the 4th password, the described 4th is close
Code is to be obtained to the third password using the first non-reversible algorithm;The 4th password and the 5th password are matched, wherein described
5th password is to be obtained to the first password using first non-reversible algorithm;The login is responded according to matching result to ask
It asks, if the 4th password and the 5th password match, the client logs in the server success, otherwise logs in
Failure;Or
The processor uses first account and described first for running first service program, to receive the client
The logging request of password;The access mode and corresponding third account of third server are obtained according to first account;According to
Third server described in the access mode and corresponding third account request, to obtain the 4th password, the 4th password is
The third password is obtained using the first non-reversible algorithm;The 6th password and the 7th password are matched, wherein the 6th password
It is to be obtained to the 4th password and the 8th password combination, the 8th password is using the third password for pre- preservation
The password that second non-reversible algorithm obtains, the 7th password are obtained to the 5th password and the 9th password combination, wherein institute
Stating the 5th password is to be obtained to the first password using first non-reversible algorithm, and the 9th password is to described first
Password is obtained using second non-reversible algorithm;The logging request is responded according to matching result, if the 6th password
With the 7th password match, then the client logs in the server success, otherwise login failure.
12. server according to claim 11, which is characterized in that
The processor, which is further used for operation second service program, to be checked and manages to issue and safeguard client application
Manage the terminal interaction program installed on the second server and the second server.
Priority Applications (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201510642615.9A CN105245596B (en) | 2015-09-30 | 2015-09-30 | A remote control method and server |
| PCT/CN2016/080664 WO2017054443A1 (en) | 2015-09-30 | 2016-04-29 | Remote control method, server and network attached storage |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201510642615.9A CN105245596B (en) | 2015-09-30 | 2015-09-30 | A remote control method and server |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN105245596A CN105245596A (en) | 2016-01-13 |
| CN105245596B true CN105245596B (en) | 2019-02-05 |
Family
ID=55043094
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201510642615.9A Expired - Fee Related CN105245596B (en) | 2015-09-30 | 2015-09-30 | A remote control method and server |
Country Status (2)
| Country | Link |
|---|---|
| CN (1) | CN105245596B (en) |
| WO (1) | WO2017054443A1 (en) |
Families Citing this family (16)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN105245596B (en) * | 2015-09-30 | 2019-02-05 | 深圳市先河系统技术有限公司 | A remote control method and server |
| CN207115046U (en) * | 2016-03-18 | 2018-03-16 | 上海科斗电子科技有限公司 | intelligent hardware network interaction system |
| CN105847243B (en) * | 2016-03-18 | 2021-02-26 | 北京小米移动软件有限公司 | Method and device for accessing a smart camera |
| CN106453238B (en) * | 2016-08-22 | 2020-02-21 | 深圳市先河系统技术有限公司 | Login method and system, electronic terminal, public network server and private cloud equipment |
| CN106331118A (en) * | 2016-08-26 | 2017-01-11 | 深圳市智物联网络有限公司 | A data processing system, a public cloud server and private cloud servers in an internet of things |
| WO2018099115A1 (en) * | 2016-11-30 | 2018-06-07 | 华为技术有限公司 | Method and device for detecting password, and terminal |
| CN106850384A (en) * | 2017-01-12 | 2017-06-13 | 深圳市先河系统技术有限公司 | A kind of method and mobile terminal for realizing accessing equipment in LAN |
| CN107104958B (en) * | 2017-04-14 | 2020-06-19 | 深圳市先河系统技术有限公司 | Method for managing private cloud equipment, private cloud, public cloud equipment and storage device |
| CN109413120B (en) * | 2017-08-16 | 2022-06-17 | 北京小鸟听听科技有限公司 | Communication method and device, electronic equipment and server |
| CN110298162A (en) * | 2019-05-22 | 2019-10-01 | 深圳壹账通智能科技有限公司 | Application client login method, device, computer equipment and storage medium |
| CN110488617A (en) * | 2019-07-08 | 2019-11-22 | 湖南优创智能科技有限公司 | Intelligent home control system, method and terminal device |
| CN112347439B (en) * | 2020-11-11 | 2023-04-11 | 西安万像电子科技有限公司 | Method and system for visitor login access |
| CN112702391B (en) * | 2020-12-09 | 2022-12-30 | 湖南新九方科技有限公司 | Remote networking method and networking system for industrial control equipment |
| CN115174128B (en) * | 2021-03-19 | 2024-07-02 | 北京金山云网络技术有限公司 | Login management method and device and private cloud control server |
| CN115811432B (en) * | 2022-12-06 | 2025-09-09 | 睿云联(厦门)网络通讯技术有限公司 | Terminal remote access method, equipment and medium based on TCP message proxy |
| CN116868740B (en) * | 2023-06-30 | 2024-08-13 | 广东环境保护工程职业学院 | Plant maintenance method, device, system and medium |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN102413182A (en) * | 2011-11-17 | 2012-04-11 | 南京天溯自动化控制系统有限公司 | Intelligent household equipment remote monitoring device and method |
| CN102594823A (en) * | 2012-02-20 | 2012-07-18 | 南京邮电大学 | Trusted system for remote secure access of intelligent home |
| CN104394051A (en) * | 2014-11-28 | 2015-03-04 | 杨光源 | Intelligent home control system and intelligent home router |
| CN104917748A (en) * | 2015-04-14 | 2015-09-16 | 百度在线网络技术(北京)有限公司 | Method and device for performing conversion and processing on password information |
Family Cites Families (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN202424779U (en) * | 2011-11-17 | 2012-09-05 | 南京天溯自动化控制系统有限公司 | Remote monitoring device for intelligent home furnishing equipment |
| CN102938729B (en) * | 2012-10-30 | 2016-12-21 | 山东智慧生活数据系统有限公司 | The long-range control method of intelligent gateway, intelligent domestic system and home appliance |
| US20140244001A1 (en) * | 2013-02-25 | 2014-08-28 | Qualcomm Incorporated | Controlling many different devices from a smart controller |
| US20150198938A1 (en) * | 2014-01-15 | 2015-07-16 | Green Edge Technologies, Inc. | Systems, devices, methods and graphical user interface for configuring a building automation system |
| CN104320494A (en) * | 2014-11-15 | 2015-01-28 | 周成亮 | Intelligent home doorbell system based on cloud technology and Internet of Things technology |
| CN204650255U (en) * | 2015-05-20 | 2015-09-16 | 宁夏中远智信科技有限公司 | A kind of intelligent home control system based on P2P interconnection technique |
| CN104917840A (en) * | 2015-06-15 | 2015-09-16 | 深圳市太太爱物联智能家居有限公司 | Equipment and method for implementing remote intelligent control of cooking |
| CN105245596B (en) * | 2015-09-30 | 2019-02-05 | 深圳市先河系统技术有限公司 | A remote control method and server |
-
2015
- 2015-09-30 CN CN201510642615.9A patent/CN105245596B/en not_active Expired - Fee Related
-
2016
- 2016-04-29 WO PCT/CN2016/080664 patent/WO2017054443A1/en not_active Ceased
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN102413182A (en) * | 2011-11-17 | 2012-04-11 | 南京天溯自动化控制系统有限公司 | Intelligent household equipment remote monitoring device and method |
| CN102594823A (en) * | 2012-02-20 | 2012-07-18 | 南京邮电大学 | Trusted system for remote secure access of intelligent home |
| CN104394051A (en) * | 2014-11-28 | 2015-03-04 | 杨光源 | Intelligent home control system and intelligent home router |
| CN104917748A (en) * | 2015-04-14 | 2015-09-16 | 百度在线网络技术(北京)有限公司 | Method and device for performing conversion and processing on password information |
Also Published As
| Publication number | Publication date |
|---|---|
| CN105245596A (en) | 2016-01-13 |
| WO2017054443A1 (en) | 2017-04-06 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN105245596B (en) | A remote control method and server | |
| EP3073699B1 (en) | System and method for controlling mutual access of smart devices | |
| KR102350430B1 (en) | Over-the-air provisioning and configuration of hardware elements in a home automation system | |
| US9769245B2 (en) | Method for communicating data between a domestic appliance and a user terminal, a domestic appliance, and a system comprising a domestic appliance and a user terminal | |
| US9479504B2 (en) | Method and apparatus for controlling access between home device and external server in home network system | |
| US9979729B2 (en) | Controlling access for a home control device including an online mode and an offline mode | |
| US11146643B2 (en) | Message bus agent apparatus, signaling server, message bus management server, connection establishment method, and program | |
| CN110557448A (en) | Control method and system for smart home | |
| US11677578B2 (en) | Automatic transitions in automation settings | |
| CN104683435B (en) | Network system keeps connection method, electronic equipment, server | |
| CN109474692A (en) | A kind of intelligent household appliance remote control method, apparatus and system | |
| CN110932944A (en) | Method and system for controlling intelligent household equipment by visitor terminal | |
| CN112312515B (en) | Binding method and device of intelligent equipment, electronic equipment and storage medium | |
| CN117751553A (en) | Method, device, computer equipment and storage medium for account association | |
| CN105743746A (en) | Intelligent home electric appliance management method, management apparatus and management system | |
| US11095471B2 (en) | Home-automation system and method for constituting the topology of a home-automation system | |
| CN105991698A (en) | Method, system and device for mobile terminal remotely managing intelligent router file | |
| CN103439934A (en) | Intelligent electrical appliance control method, server and system | |
| CN115695510B (en) | Control instruction sending method, device, storage medium and electronic device | |
| JP2014512719A (en) | Control system and pairing method for control system | |
| CN108370629B (en) | Lighting commissioning system and method for commissioning at least one infrastructure element | |
| KR102340693B1 (en) | METHOD AND HOME IoT SERVICE SYSTEM FOR SETTING USER AUTHORITY | |
| JP2014239369A (en) | Energy consumption apparatus control device and energy consumption apparatus control method | |
| US10554433B2 (en) | Method for discovering the configuration of a home-automation facility | |
| US20180084059A1 (en) | Communication device, communication method, controlled device, and non-transitory computer readable medium |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| C10 | Entry into substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant | ||
| CF01 | Termination of patent right due to non-payment of annual fee | ||
| CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20190205 |