CN109361714A - User logs in method for authenticating, device, equipment and computer storage medium - Google Patents

User logs in method for authenticating, device, equipment and computer storage medium Download PDF

Info

Publication number
CN109361714A
CN109361714A CN201811548508.XA CN201811548508A CN109361714A CN 109361714 A CN109361714 A CN 109361714A CN 201811548508 A CN201811548508 A CN 201811548508A CN 109361714 A CN109361714 A CN 109361714A
Authority
CN
China
Prior art keywords
user
information
cache database
logs
database
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811548508.XA
Other languages
Chinese (zh)
Other versions
CN109361714B (en
Inventor
徐朋朋
王鑫
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
China Mobile Group Jiangsu Co Ltd
Original Assignee
China Mobile Communications Group Co Ltd
China Mobile Group Jiangsu Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd, China Mobile Group Jiangsu Co Ltd filed Critical China Mobile Communications Group Co Ltd
Priority to CN201811548508.XA priority Critical patent/CN109361714B/en
Publication of CN109361714A publication Critical patent/CN109361714A/en
Application granted granted Critical
Publication of CN109361714B publication Critical patent/CN109361714B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention discloses a kind of users to log in method for authenticating, device, equipment and computer storage medium.The described method includes: after the completion of the first subscription authentication, the information of the first user is stored into cache database and memory database in response to the log on request for the first time of the first user;Δ T=T is set by the blank duration that logs in of each user in cache database in addition to the first usernow‑Tlt, obtained multiple Δ T are compared, using maximum Δ T as Tmax, and a length of T when blank will be logged inmaxThe information of second user deleted from cache database;When the first user logs in again, the information based on the first user saved in cache database is authenticated, and the information of the first user is stored again into the cache database.According to embodiments of the present invention, the speed that user logs in authentication is improved, moreover it is possible to save memory headroom, save hardware investment.

Description

User logs in method for authenticating, device, equipment and computer storage medium
Technical field
The invention belongs to technical field of data processing more particularly to a kind of user to log in method for authenticating, device, equipment and meter Calculation machine storage medium.
Background technique
Currently, the business of telecommunications operator system carrying all increases daily, the operation pressure is huge.The user of certain telecommunication carrier Verification System carries the login authentication services of the closely up to ten million users of more than ten of districts and cities daily.It is sought including online business hall, palm The authentication services of a system of the industry Room, the business hall WAP, the end CRM, agent's channel etc. more than 20.Number of authentications is up to 30,000,000/day. System bearing pressure is big, especially enters an item of expenditure in the accounts the phase in the end of month user query business and business change peak period and beginning of the month user, pressure Power is huge, carries nearly 50,000,000 times requests daily, and system high position operation causes the operation pressure huge, when be carved with and break down Risk.At present system use subdivision city store principle, check numbers and clustered according to districts and cities, by memory caching technology come Improve access speed.But with business development, the bigger system pressure the bigger.System needs continuous dilatation.Requirement to hardware Higher and higher, system maintenance cost is also also higher and higher.
In addition the heavy workload of system business support, interacts frequently between other subsystems.And every subsystem all needs It to be retrieved according to districts and cities and number in full customer data base.Cause the radix for retrieving data big.Hit rate is with user's Increase and is gradually reduced.
Fig. 1 shows the flow chart that tradition logs in authentication services system, front-end access: front end refers to that user inputs user Name, password carry out the visualization window of verification submission;Memory database: the data in memory database increase in explosive at present Long, with increasingly blocking up for number of users, memory database is increasing to the consumption of memory, and the hardware resource for needing to expend is also It is more and more.It is quick to the demand growth of cost.But the data in memory database are to carry out authenticating in N minutes at present The caching of data, in the case where unstable networks, this cache hit rate is higher.And in the case where network stabilization, Yong Hutong Crossing primary authentication can both be operated with finishing service, and the probability logged in is smaller within N minutes.
Previous scheme is dependent on the index effect in database index and memory database.Whether can be in memory It is hit in database, whether has carried out register dependent on user in N minutes before current authentication moment times, do not had The characteristics of in view of user characteristics attribute.Therefore cache hit rate is relatively low.Techniqueflow is as follows at present: user submits user name close Code;It searches in the buffer, if hit returns the result, and updates login time finding;It does not hit in the buffer, then It goes in database to search, pulls in caching and stored after finding;For at the data that were not logged on more than N minutes Reason.It is rejected in please caching, to save space;After user password operation, data-base recording is modified, while deleting caching record. User password record is read from database again.
Current processing mode, which has the following deficiencies:, depends critically upon N minutes this extension and contraction control point;If necessary Average response speed is improved, then must extend the size of N;The size and user volume of N is positively correlated, and it is empty that user data occupies storage Between;Memory database is flexible to depend critically upon hardware resource, excessive to hardware consumption.
Summary of the invention
The embodiment of the present invention provides a kind of user and logs in method for authenticating, device, equipment and computer storage medium, Neng Gouti High system high-frequency user logs in the speed of authentication, moreover it is possible to save memory headroom, save hardware investment.
On the one hand, the embodiment of the present invention provides a kind of user's login method for authenticating, this method comprises:
In response to the log on request for the first time of the first user, after the completion of the first subscription authentication, the information of the first user is deposited Storage is into cache database and memory database;
Δ T=T is set by the blank duration that logs in of each user in cache database in addition to the first usernow- Tlt, wherein TnowFor the time that the first user first logs into, TltIt is each user in addition to the first user in TnowBefore The last login time;
Obtained multiple Δ T are compared, using maximum Δ T as Tmax, and a length of T when blank will be logged inmax? The information of two users is deleted from cache database;
When the first user logs in again, the information based on the first user saved in cache database is authenticated, and The information of first user is stored again into the cache database.
User according to an embodiment of the present invention logs in method for authenticating, when the first user logs in, the method also includes: slow User information corresponding to the first user is searched in deposit data library, if finding user information corresponding to the first user, is led to Cross authentication.
User according to an embodiment of the present invention logs in method for authenticating, the method also includes: it is logged in again in the first user When, information corresponding to the first user is searched in cache database, if information corresponding to the first user is not present, Information corresponding to the first user is searched in memory database, if information corresponding to the first user exists, first is used The information at family is loaded into cache database.
User according to an embodiment of the present invention logs in method for authenticating, if in cache database and inner data library not There are information corresponding to the first user, then store the information of the first user into cache database and memory database.
User according to an embodiment of the present invention logs in method for authenticating, and the method also includes being arranged timer TM0, when opening Dynamic timer TM0When, blank duration will be logged in and reach TM0User information deleted from cache database.
User according to an embodiment of the present invention logs in method for authenticating, the method also includes: after the first user logs in more Its new login time.
User according to an embodiment of the present invention logs in method for authenticating, the method also includes: the login times of user are remembered Login times are updated to N=N+1 when users log on for N.
User according to an embodiment of the present invention logs in method for authenticating, the method also includes: the login times based on user Construct data tree structure B+ tree.
User according to an embodiment of the present invention logs in method for authenticating, when user's Modify password, modifies user in database In corresponding user information record, while deleting user's corresponding user information record in the buffer.
User according to an embodiment of the present invention logs in method for authenticating, when first logging into after user's Modify password, from data Corresponding user information is searched in library.
On the other hand, the embodiment of the invention provides a kind of users to log in authentication device, and device includes:
User logs in processing module, for the log on request for the first time in response to the first user, in first subscription authentication After the completion, the information of first user is stored into cache database and memory database;
Logon information processing module, for by each user's in the cache database in addition to first user It logs in blank duration and is set as Δ T=Tnow-Tlt, wherein TnowFor the time that first user first logs into, TltFor except institute Each user except the first user is stated in TnowThe last login time before;
User information removing module, for being compared to obtained multiple Δ T, using maximum Δ T as Tmax, and will Log in a length of T when blankmaxThe information of second user deleted from the cache database;
Subscription authentication processing module, for when first user logs in again, based on being protected in the cache database The information of first user deposited authenticates, and the information of first user is stored again to the cache database In.
Fast authentication equipment is logged in for Verification System high frequency user in another aspect, the embodiment of the invention provides one kind, Equipment includes: processor and the memory for being stored with computer program instructions;Processor executes real when computer program instructions Now such as settlement method provided in an embodiment of the present invention.
In another aspect, being stored in computer storage medium the embodiment of the invention provides a kind of computer storage medium Computer program instructions realize such as processing side provided in an embodiment of the present invention when the computer program instructions are executed by processor Method.
The user of the embodiment of the present invention logs in method for authenticating, device, equipment and computer storage medium, and load logs in for the first time The first user information into cache database and memory database, and blank duration will be logged in and meet TmaxSecond user letter Breath is deleted from cache database;The first user information logged in again is loaded into cache database.According to the above method Data volume criterion stores the information of high frequency user for a long time in cache database, and the user information in cache database Quantity increases and increases with user's login times, improves the cache hit rate that user logs in authentication, therefore can mention Height improves the speed that user logs in authentication, moreover it is possible to save memory headroom, save hardware investment.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, will make below to required in the embodiment of the present invention Attached drawing is briefly described, for those of ordinary skill in the art, without creative efforts, also Other drawings may be obtained according to these drawings without any creative labor.
Fig. 1 is mobile subscriber's Verification System structural schematic diagram of the embodiment of the present invention;
Fig. 2 is that the user of the embodiment of the present invention logs in authentication services flow diagram;
Fig. 3 is that the user of the embodiment of the present invention logs in the schematic block diagram of method for authenticating;
Fig. 4 is that the user of the embodiment of the present invention logs in the structural block diagram of authentication device;
Fig. 5 is that the user of the embodiment of the present invention logs in the structural schematic diagram of authentication device.
Specific embodiment
The feature and exemplary embodiment of various aspects of the invention is described more fully below, in order to make mesh of the invention , technical solution and advantage be more clearly understood, below in conjunction with drawings and the specific embodiments, the present invention is carried out further detailed Description.It should be understood that specific embodiment described herein is only configured to explain the present invention, it is not configured as limiting this hair It is bright.To those skilled in the art, the present invention can be in the case where not needing some details in these details Implement.The description of embodiment is preferably managed just for the sake of being provided by showing example of the invention of the invention below Solution.
It should be noted that, in this document, relational terms such as first and second and the like are used merely to a reality Body or operation are distinguished with another entity or operation, are deposited without necessarily requiring or implying between these entities or operation In any actual relationship or order or sequence.Moreover, the terms "include", "comprise" or its any other variant are intended to Non-exclusive inclusion, so that the process, method, article or equipment including a series of elements is not only wanted including those Element, but also including other elements that are not explicitly listed, or further include for this process, method, article or equipment Intrinsic element.In the absence of more restrictions, the element limited by sentence " including ... ", it is not excluded that including There is also other identical elements in the process, method, article or equipment of the element.
In order to solve prior art problem, the embodiment of the invention provides a kind of users to log in method for authenticating, device, equipment And computer storage medium.User's login method for authenticating is provided for the embodiments of the invention first below to be introduced.
Fig. 2 shows the flow diagrams that user provided by one embodiment of the present invention logs in method for authenticating.Such as Fig. 2 institute Show,
S101, in response to the log on request for the first time of the first user, after the completion of first subscription authentication, by described first The information of user is stored into cache database and memory database;
Each user in the cache database in addition to first user is logged in the setting of blank duration by S102 For Δ T=Tnow-Tlt, wherein TnowFor the time that first user first logs into, TltFor in addition to first user Each user is in TnowThe last login time before;
S103 is compared obtained multiple Δ T, using maximum Δ T as Tmax, and a length of T when blank will be logged inmax The information of second user deleted from the cache database;
S104, when first user logs in again, based on first user saved in the cache database Information authenticated, and the information of first user is stored again into the cache database.
The present invention will log in sky by loading the first user information logged in for the first time into cache database and database Bai Shichang meets TmaxSecond user information extractd from cache database;The first user information for logging in again is loaded to slow In deposit data library.According to the data volume criterion of the above method, the information of high frequency user is stored for a long time in cache database, and And the increasing and increase with user's login times of the user information quantity in cache database.It improves user and logs in authentication Cache hit rate, therefore can be improved and improve the speed that user logs in authentication, moreover it is possible to save memory headroom, save hardware and throw Money.
In an embodiment of the present invention, its login time is updated after the first user logs in.Specifically, user is when logging in Username and password is submitted, searches user information corresponding to the user in the buffer first, if finding corresponding user Information is then hit and is returned the result, and updates login time, and this logon information is cached in internal storage data by user.
In an embodiment of the present invention, when the first user logs in again, the first user institute is searched in cache database Corresponding information is searched corresponding to the first user if information corresponding to the first user is not present in memory database Information, if information corresponding to the first user exist, the information of the first user is loaded into cache database.Specifically Ground goes in memory database to search, find if not finding user information corresponding to the user in cache database Corresponding user information is pulled later to be stored into caching.
In an embodiment of the present invention, if all not finding corresponding user information in caching and database, The user information of the user is cached in database and internal storage data, and extracts apart from present time maximum Tmax=Tnow- TltUser information, wherein TltIt is set as user's last time login time.
In an embodiment of the present invention, when user's Modify password, modification user corresponding user's letter in the database Breath record, while deleting user's corresponding user information record in the buffer.Specifically, if user has the feelings of Modify password Condition occurs, then modifies user's corresponding user information record in the database, while it is corresponding in the buffer to delete user User information record, therefore when being first logged into after user's Modify password, corresponding user information need to be found from database.
It defines a length of when user averagely authenticates
WhereinFor the duration of cache hit,The duration that do not order in the buffer.
Based on this, the present invention is considered using user's login times as attribute in the logic of the replacement in caching, for replacing Principle is changed to take into account using user's login times as attribute.Simultaneously using time and number as caching extension and contraction control point.? While improving hit rate, memory headroom is further saved, to save hardware investment.
Firstly, memory database starts, first subscription authentication, subscription authentication finishes, the information such as the password of user is added It is downloaded in internal storage data, while increasing user's login times N after data tuple and executing N=N+1 operation.And to flexible control Data control label N processedtExecute Nt=Nt-1.Building simultaneously is based on number sequence B+ tree.
Wherein, if extension and contraction control data control label NtThere is new subscription authentication in >=0, by user cache to internal storage data In, the child node of tree is found, if extension and contraction control data control label Nt=0, there is new subscription authentication, by user cache to memory number In.It removes in the child node under most apart from present time maximum T simultaneouslymax=Tnow-TltWherein TltThis node is last Login time.Because sorting according to number, therefore bottom child node is the smallest node of login times.
Secondly, the control method T for the leaf removedmaxIt is in advance in default.N can also be passed throughtIt indirectly controls.Control Method processed is setting timer TM0, as starting timer TM0When, for more than TmaxLeaf node extractd.
Again, the control method for removing leaf is extension and contraction control data control label NtThreshold value setting, work as extension and contraction control Data control label NtWhen=0, is not carrying out being inserted into newly-increased operation, but be replaced operation.Ensure residence data in memory For high-frequency user.
Finally, for NtAnd TmaxSetting jointly controls unit Ut&maxAfter having new subscription authentication.Meet NtOr TmaxNumber It will be picked-off according to node.And new data enter in memory database.
The user that Fig. 4 show the embodiment of the present invention logs in the structural block diagram of authentication device, method shown in processing unit 200 Include:
User logs in processing module 210, complete in the first subscription authentication for the log on request for the first time in response to the first user Cheng Hou stores the information of the first user into cache database and memory database;
Logon information processing module 220, for logging in each user in cache database in addition to the first user Blank duration is set as Δ T=Tnow-Tlt, wherein TnowFor the time that the first user first logs into, TltFor except the first user it Outer each user is in TnowThe last login time before;
User information removing module 230, for being compared to obtained multiple Δ T, using maximum Δ T as Tmax, and A length of T when blank will be logged inmaxThe information of second user deleted from cache database;
Subscription authentication processing module 240, for when the first user logs in again, based on the institute saved in cache database The information for stating the first user authenticates, and the information of the first user is stored into cache database again.
Fig. 5 shows the hardware structural diagram that user provided in an embodiment of the present invention logs in authentication.
It may include processor 301 and the memory 302 for being stored with computer program instructions that user, which logs in authentication device,.
Specifically, above-mentioned processor 301 may include central processing unit (CPU) or specific integrated circuit (Application Specific Integrated Circuit, ASIC), or may be configured to implement implementation of the present invention One or more integrated circuits of example.
Memory 302 may include the mass storage for data or instruction.For example it rather than limits, memory 302 may include hard disk drive (Hard Disk Drive, HDD), floppy disk drive, flash memory, CD, magneto-optic disk, tape or logical With the combination of universal serial bus (Universal Serial Bus, USB) driver or two or more the above.It is closing In the case where suitable, memory 302 may include the medium of removable or non-removable (or fixed).In a suitable case, it stores Device 302 can be inside or outside synthesized gateway disaster tolerance equipment.In a particular embodiment, memory 302 is nonvolatile solid state Memory.In a particular embodiment, memory 302 includes read-only memory (ROM).In a suitable case, which can be ROM, programming ROM (PROM), erasable PROM (EPROM), the electric erasable PROM (EEPROM), electrically rewritable of masked edit program The combination of ROM (EAROM) or flash memory or two or more the above.
Processor 301 is by reading and executing the computer program instructions stored in memory 302, to realize above-mentioned implementation Any one user in example logs in method for authenticating.
In one example, user, which logs in authentication device, may also include communication interface 303 and bus 310.Wherein, such as Fig. 5 Shown, processor 301, memory 302, communication interface 303 connect by bus 310 and complete mutual communication.
Communication interface 303 is mainly used for realizing in the embodiment of the present invention between each module, device, unit and/or equipment Communication.
Bus 310 includes hardware, software or both, and the component that user logs in authentication device is coupled to each other together.It lifts It for example rather than limits, bus may include accelerated graphics port (AGP) or other graphics bus, enhancing Industry Standard Architecture (EISA) bus, front side bus (FSB), super transmission (HT) interconnection, Industry Standard Architecture (ISA) bus, infinite bandwidth interconnect, are low Number of pins (LPC) bus, memory bus, micro- channel architecture (MCA) bus, peripheral component interconnection (PCI) bus, PCI- Express (PCI-X) bus, Serial Advanced Technology Attachment (SATA) bus, Video Electronics Standards Association part (VLB) bus or The combination of other suitable buses or two or more the above.In a suitable case, bus 310 may include one Or multiple buses.Although specific bus has been described and illustrated in the embodiment of the present invention, the present invention considers any suitable bus Or interconnection.
The user, which logs in authentication device, can execute the login method for authenticating of the user in the embodiment of the present invention, to realize knot The user for closing Fig. 2 and Fig. 4 description logs in method for authenticating and device.
In addition, logging in method for authenticating in conjunction with the user in above-described embodiment, the embodiment of the present invention can provide a kind of computer Storage medium is realized.Computer program instructions are stored in the computer storage medium;The computer program instructions are processed Device realizes that any one user in above-described embodiment logs in method for authenticating when executing.
It should be clear that the invention is not limited to specific configuration described above and shown in figure and processing. For brevity, it is omitted here the detailed description to known method.In the above-described embodiments, several tools have been described and illustrated The step of body, is as example.But method process of the invention is not limited to described and illustrated specific steps, this field Technical staff can be variously modified, modification and addition after understanding spirit of the invention, or suitable between changing the step Sequence.
Functional block shown in structures described above block diagram can be implemented as hardware, software, firmware or their group It closes.When realizing in hardware, it may, for example, be electronic circuit, specific integrated circuit (ASIC), firmware appropriate, insert Part, function card etc..When being realized with software mode, element of the invention is used to execute program or the generation of required task Code section.Perhaps code segment can store in machine readable media program or the data-signal by carrying in carrier wave is passing Defeated medium or communication links are sent." machine readable media " may include any medium for capableing of storage or transmission information. The example of machine readable media includes electronic circuit, semiconductor memory devices, ROM, flash memory, erasable ROM (EROM), soft Disk, CD-ROM, CD, hard disk, fiber medium, radio frequency (RF) link, etc..Code segment can be via such as internet, inline The computer network of net etc. is downloaded.
It should also be noted that, the exemplary embodiment referred in the present invention, is retouched based on a series of step or device State certain methods or system.But the present invention is not limited to the sequence of above-mentioned steps, that is to say, that can be according in embodiment The sequence referred to executes step, may also be distinct from that the sequence in embodiment or several steps are performed simultaneously.
The above description is merely a specific embodiment, it is apparent to those skilled in the art that, For convenience of description and succinctly, the system, module of foregoing description and the specific work process of unit can refer to preceding method Corresponding process in embodiment, details are not described herein.It should be understood that scope of protection of the present invention is not limited thereto, it is any to be familiar with Those skilled in the art in the technical scope disclosed by the present invention, can readily occur in various equivalent modifications or substitutions, These modifications or substitutions should be covered by the protection scope of the present invention.

Claims (13)

1. a kind of user logs in method for authenticating characterized by comprising
In response to the log on request for the first time of the first user, after the completion of first subscription authentication, by the letter of first user Breath is stored into cache database and memory database;
Δ T=is set by the blank duration that logs in of each user in the cache database in addition to first user Tnow-Tlt, wherein TnowFor the time that first user first logs into, TltIt is described each in addition to first user User is in TnowThe last login time before;
Obtained multiple Δ T are compared, using maximum Δ T as Tmax, and a length of T when blank will be logged inmaxSecond use The information at family is deleted from the cache database;
When first user logs in again, the information based on first user saved in the cache database is carried out Authentication, and the information of first user is stored again into the cache database.
2. the method according to claim 1, wherein the method also includes: stepped on again in first user Lu Shi searches information corresponding to first user in the cache database, if corresponding to first user Information exists, then passes through authentication.
3. the method according to claim 1, wherein the method also includes: stepped on again in first user Lu Shi searches information corresponding to first user in the cache database, if corresponding to first user Information is not present, then searches information corresponding to first user in the memory database, if first user Corresponding information exists, then the information of first user is loaded into the cache database.
4. the method according to claim 1, wherein if in the cache database and the inner data library In there is no information corresponding to first user, then by the information storage of first user to the cache database In the memory database.
5. the method according to claim 1, wherein the method also includes being arranged timer TM0, when starting is fixed When device TM0When, blank duration will be logged in and reach TM0User information deleted from the cache database.
6. the method according to claim 1, wherein the method also includes: after first user logs in Update its login time.
7. the method according to claim 1, wherein the method also includes: the login times of user are denoted as Login times are updated to N=N+1 when users log on by N.
8. the method according to claim 1, wherein the method also includes login times structures based on user Achievement data structure B+ tree.
9. the method according to claim 1, wherein the method also includes modifying when user's Modify password User's corresponding user information record in the database, while deleting user's user information corresponding in cache database Record.
10. according to the method described in claim 9, it is characterized in that, delaying when being first logged into after user's Modify password from described Corresponding user information is searched in deposit data library.
11. a kind of user logs in authentication device, which is characterized in that described device includes:
User logs in processing module, for the log on request for the first time in response to the first user, completes in first subscription authentication Afterwards, the information of first user is stored into cache database and memory database;
Logon information processing module, for logging in each user in the cache database in addition to first user Blank duration is set as Δ T=Tnow-Tlt, wherein TnowFor the time that first user first logs into, TltFor except described Each user except one user is in TnowThe last login time before;
User information removing module, for being compared to obtained multiple Δ T, using maximum Δ T as Tmax, and will log in A length of T when blankmaxThe information of second user deleted from the cache database;
Subscription authentication processing module, for when first user logs in again, based on what is saved in the cache database The information of first user authenticates, and the information of first user is stored again into the cache database.
12. a kind of calculating equipment, which is characterized in that the equipment includes: processor and is stored with computer program instructions Memory;The processor realizes the user as described in claim 1-10 any one when executing the computer program instructions Log in method for authenticating.
13. a kind of computer storage medium, which is characterized in that be stored with computer program in the computer storage medium and refer to It enables, realizes that the user as described in claim 1-10 any one logs in mirror when the computer program instructions are executed by processor Power method.
CN201811548508.XA 2018-12-18 2018-12-18 User login authentication method, device, equipment and computer storage medium Active CN109361714B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811548508.XA CN109361714B (en) 2018-12-18 2018-12-18 User login authentication method, device, equipment and computer storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811548508.XA CN109361714B (en) 2018-12-18 2018-12-18 User login authentication method, device, equipment and computer storage medium

Publications (2)

Publication Number Publication Date
CN109361714A true CN109361714A (en) 2019-02-19
CN109361714B CN109361714B (en) 2021-11-16

Family

ID=65329743

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811548508.XA Active CN109361714B (en) 2018-12-18 2018-12-18 User login authentication method, device, equipment and computer storage medium

Country Status (1)

Country Link
CN (1) CN109361714B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110782559A (en) * 2019-10-16 2020-02-11 浙江大华技术股份有限公司 Access control device, access control authentication method, access control authentication device and storage medium
CN115134134A (en) * 2022-06-23 2022-09-30 中国民航信息网络股份有限公司 Information processing method, device and equipment

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060187908A1 (en) * 2003-06-18 2006-08-24 Hitachi, Ltd. Network system and its switches
CN1866895A (en) * 2006-06-12 2006-11-22 北京金山数字娱乐科技有限公司 User log-on method and system in network game
CN101075241A (en) * 2006-12-26 2007-11-21 腾讯科技(深圳)有限公司 Method and system for processing buffer
CN101431594A (en) * 2007-11-07 2009-05-13 富士施乐株式会社 Information processing device, information processing method
US20140157376A1 (en) * 2012-12-03 2014-06-05 Aruba Networks, Inc. System and method for maintaining captive portal user authentication
US20160112419A1 (en) * 2013-06-25 2016-04-21 Huawei Technologies Co., Ltd. Account Login Method, Device, and System
CN106487744A (en) * 2015-08-25 2017-03-08 北京京东尚科信息技术有限公司 A kind of Shiro verification method based on Redis storage
CN107147660A (en) * 2017-06-01 2017-09-08 上海斐讯数据通信技术有限公司 A kind of efficient login authentication method of mass users and system
CN107395679A (en) * 2017-06-23 2017-11-24 上海斐讯数据通信技术有限公司 Magnanimity authentication information store method and system, mass users authentication method and system

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060187908A1 (en) * 2003-06-18 2006-08-24 Hitachi, Ltd. Network system and its switches
CN1866895A (en) * 2006-06-12 2006-11-22 北京金山数字娱乐科技有限公司 User log-on method and system in network game
CN101075241A (en) * 2006-12-26 2007-11-21 腾讯科技(深圳)有限公司 Method and system for processing buffer
CN101431594A (en) * 2007-11-07 2009-05-13 富士施乐株式会社 Information processing device, information processing method
US20140157376A1 (en) * 2012-12-03 2014-06-05 Aruba Networks, Inc. System and method for maintaining captive portal user authentication
US20160112419A1 (en) * 2013-06-25 2016-04-21 Huawei Technologies Co., Ltd. Account Login Method, Device, and System
CN106487744A (en) * 2015-08-25 2017-03-08 北京京东尚科信息技术有限公司 A kind of Shiro verification method based on Redis storage
CN107147660A (en) * 2017-06-01 2017-09-08 上海斐讯数据通信技术有限公司 A kind of efficient login authentication method of mass users and system
CN107395679A (en) * 2017-06-23 2017-11-24 上海斐讯数据通信技术有限公司 Magnanimity authentication information store method and system, mass users authentication method and system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110782559A (en) * 2019-10-16 2020-02-11 浙江大华技术股份有限公司 Access control device, access control authentication method, access control authentication device and storage medium
CN115134134A (en) * 2022-06-23 2022-09-30 中国民航信息网络股份有限公司 Information processing method, device and equipment

Also Published As

Publication number Publication date
CN109361714B (en) 2021-11-16

Similar Documents

Publication Publication Date Title
US10409828B2 (en) Methods and apparatus for incremental frequent subgraph mining on dynamic graphs
CN110019211A (en) The methods, devices and systems of association index
US20190179948A1 (en) Storing unstructured data in a structured framework
US20180089243A1 (en) Bloom filter index for device discovery
US20070201458A1 (en) System and method for implementing ACLs using multiple hash-trie-key tables
CN106569963A (en) Buffering method and buffering device
CN109361714A (en) User logs in method for authenticating, device, equipment and computer storage medium
US20200250095A1 (en) Method, device and computer program product for accessing data
US11593268B2 (en) Method, electronic device and computer program product for managing cache
US20180046729A1 (en) Determining whether to process identified uniform resource locators
US8140499B2 (en) Context based cache infrastructure to enable subset query over a cached object
US10628305B2 (en) Determining a data layout in a log structured storage system
US20080133493A1 (en) Method for maintaining database clustering when replacing tables with inserts
US7509461B1 (en) Method and apparatus for intelligent buffer cache pre-emption
WO2018001120A1 (en) Method and device facilitating expansion of primary payment instruments
CN105897931B (en) Network exempts from method of flow control and device
US7386724B2 (en) Assigning security levels to a shared component
CN111865576B (en) Method and device for synchronizing URL classification data
CN110413215B (en) Method, apparatus and computer program product for obtaining access rights
US9824105B2 (en) Adaptive probabilistic indexing with skip lists
US10223404B2 (en) Efficient tracking of an alternate global update and read values using exception lists
US11907128B2 (en) Managing data of different cache types within a storage system
CN111124279B (en) Storage deduplication processing method and device based on host
US11586604B2 (en) In-memory data structure for data access
US11829296B2 (en) Cache management based on compression rates of data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant