The content of the invention
It is described the invention provides a kind of binding processing method of shared data to solve the problem of prior art is present
Method includes:
The second terminal number of second mobile terminal is sent to server by the first mobile terminal;
Server generates the first authentication information corresponding with the second terminal number and sent to the described second movement
Terminal;
First mobile terminal generates the corresponding login password of second mobile terminal, and by the login password and
Second authentication information is sent to server;
Second authentication information described in the server authentication carries out uniformity with first authentication information and matched, if
The login password and the second terminal number are then subjected to binding processing with success;
First mobile terminal sends bind request information to the server, and the bind request information includes institute
State the first terminal number of the first mobile terminal, the second terminal number;
The server confirms website links addresses according to bind request information generation, and by the website links
Location is sent to the second terminal;
The corresponding network address generation access information in website links address described in second mobile terminal accessing;
The validity that the server is recognized according to the access information, binding acknowledgement is sent to second mobile terminal
Information;
Second mobile terminal sends identifying code solicited message according to the binding acknowledgement message to the server;
The server generates the 3rd authentication information and is sent to second mobile terminal;
Second mobile terminal sends the 4th authentication information to the server;
The uniformity of 3rd authentication information and the 4th authentication information described in the server authentication, if unanimously by described
One termination number associates binding processing with second terminal number.
Further, processing is identified to second terminal number after receiving second terminal number in the server, if clothes
The first authentication information corresponding with the second terminal number is then generated in the absence of second terminal number and be sent to institute in business device
State the second mobile terminal.
Further, the server carries out binding before processing, the server to login password and second terminal number
Processing is authenticated to the login password, if the login password meets certification rule, the login password passes through certification.
Further, the server will confirm that website links address sends second mobile terminal, and by first eventually
End number, second terminal number and the confirmation website links address are sent to database purchase.
Further, the server sets the first mobile terminal to submit the of the second authentication information in Database field
One effective time threshold value;Second mobile terminal submits the of the corresponding network address generation access information in the website links address
Two effective time threshold values;Second mobile terminal submits the 3rd effective time threshold of the 4th authentication information to the server
Value.
Further, the corresponding network address generation access information in second authentication information, the website links address and the
Whether the submission time of four authentication informations is submitted into corresponding effective time threshold value if effective time threshold value is no more than
Work(.
Further, the binding acknowledgement message that the server is sent to second mobile terminal includes first terminal number
Code, identifying code input frame, identifying code obtain button and confirm binding button.
Further, the transmission of the first mobile terminal, which is checked, has bound mobile terminal request to server, and server is returned
Bind information of mobile terminal;
Further, the first mobile terminal transmission acquisition has been bound mobile terminal data and asked to server, if server
Judge that first terminal has been bound with the mobile terminal, then send the mobile terminal data to the first mobile terminal;If service
Device judge mobile terminal not with the first mobile terminal binding, then send user error information to the first mobile terminal.
Further, the server is by the first authentication information, the second authentication information, the 3rd authentication information and the 4th certification
Information is sent to database purchase.
The invention further relates to a kind of binding processing unit of shared data, described device includes the first mobile terminal, second
Mobile terminal and server;
First mobile terminal is used to the second terminal number of the second mobile terminal being sent to server;It is additionally operable to life
Server is sent into the corresponding login password of second mobile terminal, and by the login password and the second authentication information;
First mobile terminal is additionally operable to send bind request information to the server, and the bind request information includes described
The first terminal number of first mobile terminal, the second terminal number;
Second mobile terminal is used to access the corresponding network address generation access information in the website links address;It is additionally operable to
Identifying code solicited message and the 4th authentication information are sent to the server according to the binding acknowledgement message;
The server is used to generate the first authentication information corresponding with the second terminal number and sent to described
Second mobile terminal;It is additionally operable to match second authentication information and first authentication information progress uniformity, if
The login password and the second terminal number are then subjected to binding processing with success;The server is used to tie up according to
Determine solicited message generation and confirm website links address, and the website links address is sent to the second terminal, and recognize
The validity of the access information, binding acknowledgement message is sent to second mobile terminal;The server is additionally operable to generation
3rd authentication information is simultaneously sent to second mobile terminal;The server is additionally operable to checking the 3rd authentication information and the
The uniformity of four authentication informations, if consistent associate binding processing with second terminal number by the first terminal number.
The binding processing method of shared data provided in an embodiment of the present invention can prevent that account is stolen to cause internal network to meet with
It is dangerous to the wind.
Embodiment
Below by drawings and examples, technical scheme is described in further detail.
Fig. 1 is the flow chart of the binding processing method of shared data of the present invention, as illustrated, methods described includes:
Step 101:The second terminal number of second mobile terminal is sent to server by the first mobile terminal.
When the second mobile terminal needs to add local Intranet, the first mobile terminal of the local Intranet is had been added to by the
Two mobile terminal numbers are sent to server, while sending the request that the second mobile terminal adds local Intranet.
Further, processing is identified to second terminal number after receiving second terminal number in the server, if clothes
The first authentication information corresponding with the second terminal number is then generated in the absence of second terminal number and be sent to institute in business device
State the second mobile terminal.If having existed for corresponding second terminal number in server, server returns to second terminal number
The already present information of code.
Step 102:Server generates the first authentication information corresponding with the second terminal number and sent to described
Second mobile terminal.
The second mobile terminal number and the second mobile terminal that server receives the transmission of the first mobile terminal add local
During the request of Intranet, generation is directed to the first authentication information of second mobile terminal number and is sent to first authentication information
Above-mentioned second mobile terminal, first authentication information is used to confirm whether the second mobile terminal number is authentic and valid.If
First authentication information is sent to the first mobile terminal, then is likely to occur, and the first mobile terminal carries out illegal operation and fake registrations
One the second mobile terminal number, so that the other users of local area Intranet cause damage.First authentication information is sent to
Two mobile terminals are it is possible to prevente effectively from the generation of such case.
Step 103:First mobile terminal generates the corresponding login password of second mobile terminal, and is stepped on described
Record password and the second authentication information are sent to server.
Second mobile terminal is received after the first authentication information of server transmission, and the is changed by the input of the first mobile terminal
Corresponding second authentication information of one authentication information, the first mobile terminal generates the corresponding login of second mobile terminal simultaneously to be recognized
Demonstrate,prove information, such as identity ID, login password etc..First mobile terminal is by the login authentication information and second certification
Information is sent to server.
Step 104:Second authentication information described in the server authentication carries out uniformity with first authentication information
Match somebody with somebody.
Server is received after the second authentication information of the first mobile terminal transmission, by the second authentication information and the first certification
Information carries out matching certification.Second authentication information and the first authentication information implication that the match is successful are the second authentication information and first
Authentication information is corresponding.And the second authentication information has several with the unmatched reason of the first authentication information, such as, and the second certification letter
Typing mistake is ceased, the entry time of the second authentication information has exceeded effective time threshold value.
Further, the server sets the first mobile terminal to submit the of the second authentication information in Database field
One effective time threshold value;The first effective time threshold value can be the time of a determination, such as 15min or 30min.When
When the submission time of second authentication information exceeds the first effective time threshold value, it is believed that second authentication information is invalid, and returns
Return the invalid information of second authentication information.
Step 105:The login password and the second terminal number are subjected to binding processing if the match is successful.
If server is to the second authentication information and the first authentication information, the match is successful, and server sends out the first mobile terminal
The login authentication information sent and the second terminal number of most second mobile terminals are bound, that is, generate the second terminal number
Log-on message in the local Intranet, i.e. the second mobile terminal succeed in registration in the local Intranet.If the second authentication information
It is failed with the matching of the first authentication information, then the server information that returns to that it fails to match, and generate the transmission of the first authentication information again
To the second mobile terminal or terminate this operation.
Further, the server carries out binding before processing, the server to login password and second terminal number
Processing is authenticated to the login password, if the login password meets certification rule, the login password passes through certification.
Such as, examine login password number of characters whether at 6-18 and whether comprising the spcial character and this account for not allowing to register whether
It is existing, succeeded in registration if verification if, and receipt succeeds in registration information to the first mobile terminal in real time;It is real-time if failure
Receipt gives the first mobile terminal registration failure information.
Step 106:First mobile terminal sends bind request information, the bind request information to the server
Include the first terminal number of first mobile terminal, the second terminal number;
After the second mobile terminal successful registration enters the local Intranet, the first mobile terminal can initiate to move with described second
It should include the first terminal of first mobile terminal in the solicited message that dynamic terminal is bound, the bind request information
The second terminal number of number, second mobile terminal.The first terminal number and the second terminal number be in order to
Server extracts the respective identity information of the two termination numbers and end message and bound.
Step 107:The server confirms website links addresses according to bind request information generation, and by the net
Location chained address is sent to second mobile terminal.
The server is received after the bind request of the first mobile terminal transmission, generates corresponding confirmation, institute
Stating the form of expression of confirmation has many kinds, such as confirms website links address, network validation identifying code, SMS confirmation checking
Code etc., and the confirmation is sent to the second described mobile terminal.
Further, while the server will confirm that website links address sends second mobile terminal, will also
First terminal number, second terminal number and the confirmation website links address are sent to database purchase.
Step 108:The corresponding network address generation access information in website links address described in second mobile terminal accessing.
Second mobile terminal is received after the confirmation that server is sent, and generates corresponding authentication information.Such as
If it is confirmed that information is to confirm website links address, the corresponding network address access information in the website links address is generated;If really
It is network validation identifying code to recognize information, generates corresponding network verification code;If it is confirmed that information is SMS confirmation identifying code, then give birth to
Into corresponding short message verification code, if the confirmation of other forms, then the identifying code of its corresponding form is generated.
Step 109:The validity that the server is recognized according to the access information, sends to second mobile terminal
Binding acknowledgement message.
If the success of the second mobile terminal such as confirms the corresponding network address in website links address to server return authentication information
Access information, then confirm that the bind request is authentic and valid, that is, confirms whether the second mobile terminal is agreed to carry out this bindings.This
The meaning of step operation is, if the first mobile terminal sends wrong binding instruction, the second mobile terminal can be refused, or second moves
Dynamic terminal thinks to refuse to protect itself rights and interests not suffer a loss when binding instruction is illegal instruction.Server is to immediately
Two mobile terminals send the binding acknowledgement message of the first mobile terminal.
Further, server presets second mobile terminal and submits the corresponding network address in the website links address
Generate the second effective time threshold value of access information;The second effective time threshold value can be the time of a determination, such as
15min or 30min.When second mobile terminal submits the corresponding network address generation access information in the website links address
When submission time exceeds the second effective time threshold value, it is believed that the access information is invalid, and it is invalid to return to the access information
Information.
Step 110:Second mobile terminal sends identifying code according to the binding acknowledgement message to the server please
Seek information.
Step 111:The server generates the 3rd authentication information and is sent to second mobile terminal.
Second mobile terminal receives the binding acknowledgement message of server transmission and agreed to after this bindings, to clothes
Business device sends identifying code solicited message, and server, which is received, to be generated the 3rd authentication information and send after the identifying code solicited message
To the second mobile terminal.3rd authentication information is used to reaffirm whether the second mobile terminal is agreed to and the first mobile terminal
Bound, if the second mobile terminal agree to binding be not the first mobile terminal if can refuse this time bind.
Further, the binding acknowledgement message that the server is sent to second mobile terminal includes first terminal number
Code, identifying code input frame, identifying code obtain button and confirm binding button.In order to remind the second shifting when sending first terminal number
Dynamic terminal, the object that will be bound is the first mobile terminal, and it is then to be used for the second mobile terminal to clothes that identifying code, which obtains button,
Device of being engaged in sends identifying code solicited message, and identifying code input frame is used for input validation code, confirms that binding button is then to agree to
The bind request of first mobile terminal.
Step 112:Second mobile terminal sends the 4th authentication information to the server.
Second mobile terminal receives the 3rd authentication information of server transmission and agrees to enter with the first mobile terminal
After row binding, then the second mobile terminal sends the 4th authentication information to server.
Step 113:The uniformity of 3rd authentication information and the 4th authentication information described in the server authentication.
Server is received after the 4th authentication information of the second mobile terminal transmission, and the 4th authentication information and the 3rd are recognized
The uniformity of card information is judged, if the 4th authentication information is mismatched with the 3rd authentication information or the 4th authentication information is carried
The friendship time is not in default effective time threshold value, then it is assumed that it fails to match, after it fails to match, and server can generate again
Three authentication informations stop this operation.
Further, server presets second mobile terminal and submits the 4th authentication information to the server
3rd effective time threshold value.The 3rd effective time threshold value can be the time of a determination, such as 15min or 30min.
When second mobile terminal submits the submission time of the 4th authentication information to exceed the 3rd effective time threshold value, it is believed that should
4th authentication information is invalid, and returns to the invalid information of the 4th authentication information.
Further, methods described also includes, and the server recognizes the first authentication information, the second authentication information, the 3rd
Card information and the 4th authentication information are sent to database purchase.
Step 114:The first terminal number is associated binding processing with second terminal number by server.
When server judges the 4th authentication information and the 3rd authentication information the match is successful after, then it is assumed that second moves
Dynamic terminal agrees to be associated binding with the first mobile terminal, will the first terminal number and second terminal number closed
Join binding processing.
It should be noted that in this local Intranet, any one mobile terminal or terminal can be asked and other
Mobile terminal or terminal set up association binding, and other mobile terminals such as the second mobile terminal request is built with the first mobile terminal
The process of vertical association binding relationship sets up the process phase for associating binding relationship with the first mobile terminal request and the second mobile terminal
It is similar.
Further, the transmission of the first mobile terminal, which is checked, has bound mobile terminal request to server, and server is returned
Bind information of mobile terminal.
After the first mobile terminal and the second mobile terminal are successfully bound, it can send and check that the machine has bound mobile terminal
Request is to server, and server receives the checking after request of the first mobile terminal, according to the identity information of the first mobile terminal
Retrieved with end message in database, and the information of mobile terminal of binding retrieved is sent to the first movement eventually
End.Similarly, other mobile terminals in this local Intranet can also carry out this operation.
Mobile terminal data has been bound in the transmission acquisition of first mobile terminal asks to server, if server judges first eventually
End has been bound with the mobile terminal, then sends the mobile terminal data to the first mobile terminal;If server judges movement
Terminal not with the first mobile terminal binding, then send user error information to the first mobile terminal.
Specifically, having been tied up when the first mobile terminal needs to obtain and bound the data of mobile terminal, it is necessary to send acquisition
Determine mobile terminal data to ask to server, server is first carried out really the binding relationship of the first mobile terminal and the mobile terminal
Recognize, if server confirms that the mobile terminal and the first mobile terminal had carried out binding, first is sent to the mobile terminal
Acquisition for mobile terminal request of data, if the mobile terminal agrees to the request, server is by the data of the mobile terminal to first
Mobile terminal;If the mobile terminal refuses the request, server sends refusal solicited message to the first mobile terminal.De- service
Device judges that the mobile terminal is not bound with the first mobile terminal, then sends user error information or mobile terminal is not tied up
Information is determined to the first mobile terminal, and the first mobile terminal can initiate the bind request with the mobile terminal.
Fig. 2 is the schematic diagram of the binding processing unit of shared data of the present invention, is moved as illustrated, described device includes first
Dynamic terminal 2, the second mobile terminal 3 and server 1, there is electrical connection in first mobile terminal 2 and server 1, described
There is electrical connection in the second mobile terminal 3 and server 1.
First mobile terminal 2 is used to the second terminal number of the second mobile terminal 3 being sent to server 1;Also use
In the generation corresponding login password of second mobile terminal 3, and the login password and the second authentication information are sent to clothes
Business device 1;First mobile terminal 2 is additionally operable to send in bind request information, the bind request information to the server 1
First terminal number including first mobile terminal 2, the second terminal number.
First mobile terminal 2 is the essential tool that the second mobile terminal 3 adds local Intranet, if without the first mobile terminal
2 cooperation, the second mobile terminal 3 is successfully joined local Intranet in the case of can not being set not changing server 1, is kept away with this
Exempt from there is mobile terminal or terminal to add local Intranet by illegal operation, caused with other mobile terminals in local area Intranet
Loss, or the data message of local area Intranet are stolen etc..
Second mobile terminal 3 is used to access the corresponding network address generation access information in the website links address;Also use
In sending identifying code solicited message and the 4th authentication information to the server 1 according to the binding acknowledgement message.
After the second mobile terminal 3 is successfully joined local Intranet, it can be set up with other mobile terminals and associate binding relationship,
When set up association binding relationship when, by Requested Party, i.e., the primary operational that the second mobile terminal 3 is bound, such as agree to and
The associative operation that first mobile terminal 2 is bound.
The server 1 is used to generate the first authentication information corresponding with the second terminal number and sent to described
Second mobile terminal 3;It is additionally operable to match second authentication information and first authentication information progress uniformity, if
The login password and the second terminal number are then subjected to binding processing with success;The server 1 is used for according to described
The generation of bind request information confirms website links address, and the website links address is sent into the second terminal, and knows
The validity of not described access information, binding acknowledgement message is sent to second mobile terminal 3;The server 1 is additionally operable to
Generate the 3rd authentication information and be sent to second mobile terminal 3;The server 1 is additionally operable to checking the 3rd certification letter
The uniformity of breath and the 4th authentication information, if unanimously associated the first terminal number at binding with second terminal number
Reason.
Professional should further appreciate that, each example described with reference to the embodiments described herein
Unit and algorithm steps, can be realized with electronic hardware, computer software or the combination of the two, hard in order to clearly demonstrate
The interchangeability of part and software, generally describes the composition and step of each example according to function in the above description.
These functions are performed with hardware or software mode actually, depending on the application-specific and design constraint of technical scheme.
Professional and technical personnel can realize described function to each specific application using distinct methods, but this realize
It is not considered that beyond the scope of this invention.
The method that is described with reference to the embodiments described herein can use hardware, computing device the step of algorithm
Software module, or the two combination are implemented.Software module can be placed in random access memory (RAM), internal memory, read-only storage
(ROM), electrically programmable ROM, electrically erasable ROM, register, hard disk, moveable magnetic disc, CD-ROM or technical field
In any other form of storage medium well known to interior.
Above-described embodiment, has been carried out further to the purpose of the present invention, technical scheme and beneficial effect
Describe in detail, should be understood that the embodiment that the foregoing is only the present invention, be not intended to limit the present invention
Protection domain, within the spirit and principles of the invention, any modification, equivalent substitution and improvements done etc. all should be included
Within protection scope of the present invention.