Method for achieving data roaming
An implementation method and data technology, applied in the field of data roaming implementation methods and devices, can solve the problems of not being able to protect the user's personal privacy well, and cannot safely isolate the user's personal roaming data information, so as to enhance security and realize security isolation Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0035] figure 2 The flow of the method for implementing data roaming provided by the first embodiment of the present invention is shown. A method for implementing data roaming is described in detail as follows:
[0036] In step S101, the client terminal obtains a data roaming credential uniquely corresponding to the user login information.
[0037] In the embodiment of the present invention, the data roaming ticket can be identified and confirmed by the data roaming server. In a specific implementation, the data roaming ticket can uniquely identify the user login information of the client. Yes, the user login information is usually an account that uniquely identifies the user. Correspondingly, the data roaming credential may be a series of serial codes that include the account information, and the data roaming server can identify whether the current data roaming request is legal based on the serial code. .
[0038] In step S102, the client sends a data roaming request with a data r...
Embodiment 2
[0045] image 3 Shows the time sequence interaction diagram between communication entities of the data roaming model provided by the second embodiment of the present invention. This time sequence interaction diagram clearly describes each process of implementing data roaming. figure 2 On the basis of, the implementation method for the client to obtain the data roaming credential uniquely corresponding to the user login information is further optimized. The data roaming implementation method described in this embodiment includes the following steps:
[0046] In step S201, the client logs in to the account management server and sends a roaming credential application containing user login information to the account management server.
[0047] In this embodiment, in order to enable the client to obtain data roaming credentials, an account management server is added to the embodiment of the present invention. The account management server is responsible for verifying the legitimacy of t...
Embodiment 3
[0060] Figure 4 The corresponding relationship between the data roaming server and the client provided by the third embodiment of the present invention is shown. This embodiment further describes the implementation structure of the data roaming server. The data roaming server adopts this structure to ensure the location of user roaming data. Scalability and versatility.
[0061] The data roaming server adopted in this embodiment allocates a user network file system for storing user data to each user, and each user network file system is isolated from each other. In the figure, only two network file systems used for back are taken as an example.
[0062] The user network system is similar to a local file system, and the files in the system are stored in the root directory or a folder in it. Here, the network file system of each user is a root directory, in which the corresponding user can create subdirectories or files. In the implementation of the present invention, relative path...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


