CN107977570A - Information Authentication method, apparatus, electronic equipment and storage medium - Google Patents
Information Authentication method, apparatus, electronic equipment and storage medium Download PDFInfo
- Publication number
- CN107977570A CN107977570A CN201711164196.8A CN201711164196A CN107977570A CN 107977570 A CN107977570 A CN 107977570A CN 201711164196 A CN201711164196 A CN 201711164196A CN 107977570 A CN107977570 A CN 107977570A
- Authority
- CN
- China
- Prior art keywords
- logging request
- user
- account
- account data
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2133—Verifying human interaction, e.g., Captcha
Abstract
An embodiment of the present invention provides Information Authentication method, apparatus, electronic equipment and storage medium, this method includes:Obtain the logging request of user;According to the logging request, account data corresponding with the logging request is read in memcached memory type databases;When key information in the logging request is identical with the key information in the account data, determine that the user passes through Information Authentication.Data are read in memcached memory type databases, data reading speed is fast, can shorten the verification time of user's logging request, and then can shorten the login time of user.
Description
Technical field
The present invention relates to Internet technical field, is situated between more particularly to Information Authentication method, apparatus, electronic equipment and storage
Matter.
Background technology
With the development of Internet technology, Web (World Wide Web, global wide area network) services become people and entertain life
Essential service living.In Web service, no matter user is to play online game, still posts or see video, under normal circumstances
It is required for logging in a user account.Each service provider determines the identity of user by user account, so as to provide to the user more excellent
The service of matter.
In the prior art, when user submits logging request to server-side, server-side, can be right after logging request is received
Relevant database carries out IO (Input/Output, input/output) operations, to obtain information corresponding with logging request, from
And determine whether user is legal.
But server-side carries out I/O operation to relevant database, data reading speed is slow, please so as to cause user to log in
The verification time asked is longer.
The content of the invention
The purpose of the embodiment of the present invention is to provide a kind of Information Authentication method, apparatus, electronic equipment and storage medium, with
Realize the verification time for shortening user's logging request.Concrete technical scheme is as follows:
In a first aspect, an embodiment of the present invention provides a kind of Information Authentication method, the described method includes:
Obtain the logging request of user;
According to the logging request, account corresponding with the logging request is read in memcached memory type databases
User data;
When key information in the logging request is identical with the key information in the account data, the use is determined
Family passes through Information Authentication.
Optionally, account identification is included at least in the log on request, it is described according to the logging request,
Account data corresponding with the logging request is read in memcached memory type databases, including:
Account identification and the account identification phase in the logging request are searched in the memcached memories type database
Same account data, as the corresponding account data of the logging request;
Read the corresponding account data of the logging request.
Optionally, it is described to be searched in the memcached memories type database in account identification and the logging request
The identical account data of account identification, as the corresponding account data of the logging request, including:
Determine the corresponding classification information of account identification in the logging request;
The database burst of classification corresponding with the classification information is searched in the memcached memories type database,
As specified burst;
The account identification account data identical with the account identification in the logging request is searched in the specified burst,
As the corresponding account data of the logging request.
Optionally, the key information in the logging request is identical with the key information in the account data
When, the user is determined by Information Authentication, including:
When key information in the logging request is identical with the key information in the account data, the use is obtained
The logon rights at family;
When the logon rights of the user meet default access rule, determine that the user passes through Information Authentication.
Optionally, the logon rights for obtaining the user, including:
Obtain the mark that the user submits the terminal of logging request;
Correspondingly, when the logon rights in the user meet default access rule, determine that the user passes through letter
Breath verification, including:
When the mark of the terminal meets default access rule, determine that the user passes through Information Authentication.
Optionally, the logon rights for obtaining the user, including:
Obtain the network address that the user submits logging request;
Correspondingly, when the logon rights in the user meet default access rule, determine that the user passes through letter
Breath verification, including:
When the network address meets default access rule, determine that the user passes through Information Authentication.
Second aspect, an embodiment of the present invention provides a kind of Information Authentication device, described device includes:
Acquisition request module, for obtaining the logging request of user;
Data acquisition module, for according to the logging request, read in memcached memory type databases with it is described
The corresponding account data of logging request;
Requests verification module, for the key information in the key information in the logging request and the account data
When identical, determine that the user passes through Information Authentication.
Optionally, the data acquisition module described in the Information Authentication device of the embodiment of the present invention, including:
Data search submodule, is stepped on for searching account identification in the memcached memories type database with described
The identical account data of account identification in record request, as the corresponding account data of the logging request;
Digital independent submodule, for reading the corresponding account data of the logging request.
Optionally, the data search submodule described in the Information Authentication device of the embodiment of the present invention, including:
Classification information determination unit, for determining the corresponding classification information of account identification in the logging request;
Burst determination unit is specified, for being searched and the classification information in the memcached memories type database
The database burst of corresponding classification, as specified burst;
Account data determination unit, for searching account identification and the account in the logging request in the specified burst
Family identifies identical account data, as the corresponding account data of the logging request.
Optionally, the requests verification module described in the Information Authentication device of the embodiment of the present invention, including:
Authority acquiring submodule, believes for the key in the key information in the logging request and the account data
Manner of breathing at the same time, obtains the logon rights of the user;
Authority Verification submodule, for when the logon rights of the user meet default access rule, determining the use
Family passes through Information Authentication.
Optionally, the authority acquiring submodule described in the Information Authentication device of the embodiment of the present invention, is specifically used for:
When key information in the logging request is identical with the key information in the account data, the use is obtained
Submit the mark of the terminal of logging request in family;
Correspondingly, the Authority Verification submodule, is specifically used for:
When the mark of the terminal meets default access rule, determine that the user passes through Information Authentication.
Optionally, the authority acquiring submodule described in the Information Authentication device of the embodiment of the present invention, is specifically used for:
When key information in the logging request is identical with the key information in the account data, the use is obtained
Submit the network address of logging request in family;
Correspondingly, the Authority Verification submodule, is specifically used for:
When the network address meets default access rule, determine that the user passes through Information Authentication.
The third aspect, an embodiment of the present invention provides a kind of electronic equipment, including processor, communication interface, memory and
Communication bus, wherein, the processor, the communication interface, the memory completes mutual communication by communication bus;
The memory, for storing computer program;
The processor, during for performing the program stored on the memory, realizes any institute of above-mentioned first aspect
The Information Authentication method stated.
Fourth aspect, an embodiment of the present invention provides a kind of computer-readable recording medium, the computer-readable storage
Dielectric memory contains computer program, and the computer program realizes that above-mentioned first aspect is any described when being executed by processor
Information Authentication method.
Information Authentication method, apparatus, electronic equipment and storage medium provided in an embodiment of the present invention, obtain the login of user
Request;According to the logging request, account number corresponding with the logging request is read in memcached memory type databases
According to;When key information in the logging request is identical with the key information in the account data, determine that the user is led to
Cross Information Authentication.Data are read in memcached memory type databases, data reading speed is fast, can shorten user's login
The verification time of request.Certainly, implement any of the products of the present invention or method it is not absolutely required to reach above-described at the same time
All advantages.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing
There is attached drawing needed in technology description to be briefly described, it should be apparent that, drawings in the following description are only this
Some embodiments of invention, for those of ordinary skill in the art, without creative efforts, can be with
Other attached drawings are obtained according to these attached drawings.
Fig. 1 is a kind of flow diagram of the Information Authentication method of the embodiment of the present invention;
Fig. 2 is a kind of schematic diagram of the Information Authentication device of the embodiment of the present invention;
Fig. 3 is a kind of schematic diagram of the electronic equipment of the embodiment of the present invention.
Embodiment
Below in conjunction with the attached drawing in the embodiment of the present invention, the technical solution in the embodiment of the present invention is carried out clear, complete
Site preparation describes, it is clear that described embodiment is only part of the embodiment of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, those of ordinary skill in the art are obtained every other without making creative work
Embodiment, belongs to the scope of protection of the invention.
Quick registration is an important research topic, and existing login techniques, are all to pass through inquiry in Information Authentication
Database, especially relevant database, to verify log-on message.Inquiry each time, will carry out database IO, consumption
Performance, inquiry velocity are very slow.
In view of the above-mentioned problems, an embodiment of the present invention provides a kind of Information Authentication method, referring to Fig. 1, this method includes:
S101, obtains the logging request of user.
The Information Authentication method of the embodiment of the present invention can realize that login system is that can arbitrarily realize by login system
The system of the Information Authentication method of the embodiment of the present invention.Such as:
Login system can be a kind of equipment, including:Processor, memory, communication interface and bus;Processor, storage
Device is connected by bus with communication interface and completes mutual communication;Memory storage executable program code;Processor leads to
Cross and read in memory the executable program code that stores to run program corresponding with executable program code, for performing
The Information Authentication method of the embodiment of the present invention.
Login system can also be a kind of application program, for operationally performing the Information Authentication side of the embodiment of the present invention
Method.
Login system can also be a kind of storage medium, and for storing executable code, executable code is used to perform sheet
The Information Authentication method of inventive embodiments.
When user carries out Account Logon, user inputs key information in the client, and client sends to server-side and wraps
Logging request containing key information.Server-side receives above-mentioned logging request, and the login system applied to server-side obtains the login
Request.
S102, according to above-mentioned logging request, reads corresponding with above-mentioned logging request in memcached memory type databases
Account data.
Memcached memory type databases are a high performance distributed memory target cache systems, for Dynamic Web
Using.It reduces the number of reading database by data cached in memory and object, so as to improve dynamic, database drives
The speed of dynamic website.Hashmap (Hash mapping) of the memcached memory type databases based on a storage key/value pair, its
Daemon (finger daemon) is write with C, but client can be write with any language, and passes through memcached agreements
Communicate with daemon.Memcached memory type databases reading speed quickly, and can carry out additions and deletions as needed and change, and use
It is very useful to store data.
Account identification of the login system in logging request, inquires about account mark in memcached memory type databases
Know the account data identical with account identification in logging request, and read account data.In memcached memory type databases
Middle reading account data, can greatly improve the reading speed of account data.
S103, when the key information in above-mentioned logging request is identical with the key information in above-mentioned account data, determines
Above-mentioned user passes through Information Authentication.
Login system is after the corresponding account data of logging request is obtained, the key information in reading account data, and with
Key information in logging request is compared, and judges that user passes through Information Authentication if the two is identical, it is allowed to which user accesses system
System;If the key information in account data is different from the key information in logging request, user is judged not by Information Authentication,
Refuse subscriber access system.Key information is arbitrary identification information, such as password, identifying code or iris etc..
In embodiments of the present invention, data are read from memcached memory type databases, data reading speed is fast, can
To shorten the verification time of user's logging request, and then the login time of user can be shortened.
Optionally, account identification is included at least in above-mentioned log on request, it is above-mentioned according to above-mentioned logging request,
Account data corresponding with above-mentioned logging request is read in memcached memory type databases, including:
Step 1, searches account identification and the account in above-mentioned logging request in above-mentioned memcached memories type database
Family identifies identical account data, as the corresponding account data of above-mentioned logging request.
Account identification of the login system in logging request, such as the face of user account, the fingerprint of user or user
Information etc., searches the account data of same account mark in memcached memory type databases.
Step 2, reads the corresponding account data of above-mentioned logging request.
Memcached memory type databases also stored for the corresponding account of each account data while account data is stored
Family identifies, such as user account etc..By account identification, the Rapid matching of logging request and related account data can be realized.
In embodiments of the present invention, the specific method of the corresponding account data of definite logging request is given, can be accurate
Quickly read account data corresponding with logging request.
Optionally, account identification and the account in above-mentioned logging request are searched in above-mentioned memcached memories type database
Family identifies identical account data, as the corresponding account data of above-mentioned logging request, including:
Step 1, determines the corresponding classification information of account identification in above-mentioned logging request.
Account identification may correspond to different classification in logging request, such as a user account, log in
Account identification in request can be account, can also be cell-phone number or user certificate number etc..Login system determines account mark
Know corresponding classification information.
Step 2, searches the data of classification corresponding with above-mentioned classification information in above-mentioned memcached memories type database
Storehouse burst, as specified burst.
For example, when account identification is cell-phone number, is searched in memcached memory type databases and correspond to cell-phone number
Database burst, as specified burst.When account identification is ID card No., in memcached memory type databases
Search and by the corresponding database burst of ID card No., as specified burst.
Step 3, searches the account identification account identical with the account identification in above-mentioned logging request in above-mentioned specified burst
User data, as the corresponding account data of above-mentioned logging request.
Account identification of the login system in logging request, searches the account number of same account mark in burst is specified
According to as the corresponding account data of logging request.Optionally, in order to save memory space, each account identification of same account connects
Connect same account data.Account identification of the login system in logging request, searches same account mark in burst is specified
The index of the account data of knowledge, and read account data by indexing.
In embodiments of the present invention, specified burst corresponding with account identification in logging request is searched, in burst is specified
Account data is searched, without traveling through whole memcached memories type database, the reading speed of account data can be increased, into
And improve the login speed of user.
Optionally, when the key information in above-mentioned logging request is identical with the key information in above-mentioned account data, really
Above-mentioned user is determined by Information Authentication, including:
Step 1, when the key information in above-mentioned logging request is identical with the key information in above-mentioned account data, is obtained
Take the logon rights of above-mentioned user.
When key information is identical, login system continues to obtain the logon rights of active user;When key information is different,
Active user is forbidden to log in.Logon rights are the mark of any user information, for example, the exclusive identification code of user's logging device,
The entry address of user or the facial information of user etc..
Step 2, when the logon rights of above-mentioned user meet default access rule, determines that above-mentioned user is tested by information
Card.
Default access rule is the rule of any judgement user's logon rights, for example, by the facial information of user, is determined
When active user is the legitimate user of account, judge that active user passes through Information Authentication.
Optionally, when the key information in above-mentioned logging request is identical with the key information in above-mentioned account data, obtain
After the logon rights for taking above-mentioned user, the method further includes:
When the logon rights of above-mentioned user do not meet default access rule, above-mentioned user is forbidden to log in or limit above-mentioned use
The specified operation at family.
When logon rights do not meet default access rule, active user is forbidden to log in, for example, the smart mobile phone of user A
Include online payment software, the finger print information that default access rule is user A is set, when the minor children of user A are logical
When crossing the mobile phone progress online game of user A, charge stage property is triggered, and jumps to on-line payment software, the child of user A is defeated
Enter correct password, but can not be by so it is soft to log in on-line payment in verification logon rights, i.e. fingerprint authentication
Part buys above-mentioned charge stage property.
Or, when logon rights do not meet default access rule, the specified operation of user is limited, for example, user B is one
The holder of ticket account fund, while user B has employed user C to help to carry out investment operation, user B and user C are used should
Stock account invest, and the password of user C inputs has passed through key information verification, but the logon rights of user C do not lead to
Verification is crossed, as the fingerprint authentication of user C can not be by the way that then user C enjoys the behaviour invested to the fund in the stock account
Make, but the fund in stock account cannot be carried out to produce operation.
In embodiments of the present invention, when key information passes through verification, further judge to use according to the logon rights of user
Whether family improves the security of Information Authentication, meets a variety of user demands by Information Authentication.
Optionally, the logon rights of the above-mentioned user of above-mentioned acquisition, including:
Obtain the mark that above-mentioned user submits the terminal of logging request.
It can also include the mark of terminal in logging request, the mark of terminal can be exclusive identification code or the user of terminal
Exclusive identification code etc..
Correspondingly, when the logon rights of above-mentioned user meet default access rule, determine that above-mentioned user is tested by information
Card, including:
When the mark of above-mentioned terminal meets default access rule, determine that above-mentioned user passes through Information Authentication.
When the mark of terminal meets default access rule, determine that above-mentioned user passes through Information Authentication;In the mark of terminal
When not meeting default access rule, above-mentioned user is forbidden to log in.For example, user have submitted logging request by smart mobile phone, step on
Account, password and IMSI (International Mobile Subscriber Identification are contained in record request
Number, international mobile subscriber identity) after account and password are by verification, continue to verify the mark IMSI of terminal,
When IMSI is the IMSI that default access rule is specified, determine that user passes through Information Authentication, it is allowed to which user logs in;It is not pre- in IMSI
If during the IMSI that the rules of competence are specified, judge user information authentication failed, forbid user to log in.
In embodiments of the present invention, by verifying terminal iidentification, ensure that the log-on message of only designated equipment could lead to
Verification is crossed, ensure that the safety of Information Authentication, meets many demands of user.
Optionally, the logon rights of the above-mentioned user of above-mentioned acquisition, including:
Obtain the network address that above-mentioned user submits logging request.
It can also include source address in logging request, i.e. user submits the IP address of the equipment of logging request.Login system
Obtain the IP address.
Correspondingly, when the above-mentioned logon rights in above-mentioned user meet default access rule, determine that above-mentioned user passes through letter
Breath verification, including:
When above-mentioned network address meets default access rule, determine that above-mentioned user passes through Information Authentication.
When IP address is in the network segment that default access rule is specified, judge that above-mentioned user passes through Information Authentication, it is allowed on
State user's login;When IP address is not at the network segment that default access rule is specified, above-mentioned user is judged not by Information Authentication,
Above-mentioned user is forbidden to log in.In a practical situation, the position of user's logon account is usually fixed, such as in company or family
Deng can judge the login position of user according to IP address, if the account information of user is stolen, it logs in IP address generally can be with
The IP address specified is different, therefore when IP address is not being specified in the network segment, judgement does not pass through Information Authentication.
In embodiments of the present invention, by verifying network address, it ensure that and only specify the log-on message of the network segment to lead to
Verification is crossed, ensure that the safety of Information Authentication, meets many demands of user.
Referring to Fig. 2, the embodiment of the present invention additionally provides a kind of Information Authentication device, which includes:
Acquisition request module 201, for obtaining the logging request of user;
Data acquisition module 202, for according to above-mentioned logging request, read in memcached memory type databases with
The corresponding account data of above-mentioned logging request;
Requests verification module 203, for the key in the key information in above-mentioned logging request and above-mentioned account data
When information is identical, determine that above-mentioned user passes through Information Authentication.
In embodiments of the present invention, data are read from memcached memory type databases, data reading speed is fast, can
To shorten the verification time of user's logging request, and then the login time of user can be shortened.
Optionally, the above-mentioned data acquisition module 202 in the Information Authentication device of the embodiment of the present invention, including:
Data search submodule, is stepped on for searching account identification in above-mentioned memcached memories type database with above-mentioned
The identical account data of account identification in record request, as the corresponding account data of above-mentioned logging request;
Digital independent submodule, for reading the corresponding account data of above-mentioned logging request.
In embodiments of the present invention, the specific method of the corresponding account data of definite logging request is given, can be accurate
Quickly read account data corresponding with logging request.
Optionally, the above-mentioned data search submodule in the Information Authentication device of the embodiment of the present invention, including:
Classification information determination unit, for determining the corresponding classification information of account identification in above-mentioned logging request;
Burst determination unit is specified, for being searched and above-mentioned classification information in above-mentioned memcached memories type database
The database burst of corresponding classification, as specified burst;
Account data determination unit, for searching account identification and the account in above-mentioned logging request in above-mentioned specified burst
Family identifies identical account data, as the corresponding account data of above-mentioned logging request.
In embodiments of the present invention, specified burst corresponding with account identification in logging request is searched, in burst is specified
Account data is searched, without traveling through whole memcached memories type database, the reading speed of account data can be increased, into
And improve the login speed of user.
Optionally, the above-mentioned requests verification module 203 in the Information Authentication device of the embodiment of the present invention, including:
Authority acquiring submodule, believes for the key in the key information in above-mentioned logging request and above-mentioned account data
Manner of breathing at the same time, obtains the logon rights of above-mentioned user;
Authority Verification submodule, for when the logon rights of above-mentioned user meet default access rule, determining above-mentioned use
Family passes through Information Authentication.
Optionally, above-mentioned requests verification module 203, further includes:
Operation limits module, for when the logon rights of above-mentioned user do not meet default access rule, forbidding above-mentioned use
Family logs in or limits the specified operation of above-mentioned user.
In embodiments of the present invention, when key information passes through verification, further judge to use according to the logon rights of user
Whether family improves the security of Information Authentication, meets a variety of user demands by Information Authentication.
Optionally, the above-mentioned authority acquiring submodule in the Information Authentication device of the embodiment of the present invention, is specifically used for:
When key information in above-mentioned logging request is identical with the key information in above-mentioned account data, above-mentioned use is obtained
Submit the mark of the terminal of logging request in family;
Correspondingly, above-mentioned Authority Verification submodule, is specifically used for:
When the mark of above-mentioned terminal meets default access rule, determine that above-mentioned user passes through Information Authentication.
In embodiments of the present invention, by verifying terminal iidentification, ensure that the log-on message of only designated equipment could lead to
Verification is crossed, ensure that the safety of Information Authentication, meets many demands of user.
Optionally, the above-mentioned authority acquiring submodule in the Information Authentication device of the embodiment of the present invention, is specifically used for:
When key information in above-mentioned logging request is identical with the key information in above-mentioned account data, above-mentioned use is obtained
Submit the network address of logging request in family;
Correspondingly, above-mentioned Authority Verification submodule, is specifically used for:
When above-mentioned network address meets default access rule, determine that above-mentioned user passes through Information Authentication.
In embodiments of the present invention, by verifying network address, it ensure that and only specify the log-on message of the network segment to lead to
Verification is crossed, ensure that the safety of Information Authentication, meets many demands of user.
The embodiment of the present invention additionally provides a kind of electronic equipment, as shown in figure 3, including processor 301, communication interface 302,
Memory 303 and communication bus 304, wherein, processor 301, communication interface 302, memory 303 is complete by communication bus 304
Into mutual communication,
Memory 303, for storing computer program;
Processor 301, during for performing the program stored on memory 303, realizes following steps:
Obtain the logging request of user;
According to above-mentioned logging request, account corresponding with above-mentioned logging request is read in memcached memory type databases
User data;
When key information in above-mentioned logging request is identical with the key information in above-mentioned account data, above-mentioned use is determined
Family passes through Information Authentication.
In embodiments of the present invention, data are read from memcached memory type databases, data reading speed is fast, can
To shorten the verification time of user's logging request, and then the login time of user can be shortened.
Optionally, processor 301 can also realize any of the above-described letter in the program stored on performing memory 303
Cease verification method.
The communication bus that above-mentioned electronic equipment is mentioned can be Peripheral Component Interconnect standard (Peripheral Component
Interconnect, PCI) bus or expanding the industrial standard structure (Extended Industry Standard
Architecture, EISA) bus etc..The communication bus can be divided into address bus, data/address bus, controlling bus etc..For just
Only represented in expression, figure with a thick line, it is not intended that an only bus or a type of bus.
Communication interface is used for the communication between above-mentioned electronic equipment and other equipment.
Memory can include random access memory (Random Access Memory, RAM), can also include non-easy
The property lost memory (Non-Volatile Memory, NVM), for example, at least a magnetic disk storage.Optionally, memory may be used also
To be at least one storage device for being located remotely from aforementioned processor.
Above-mentioned processor can be general processor, including central processing unit (Central Processing Unit,
CPU), network processing unit (Network Processor, NP) etc.;It can also be digital signal processor (Digital Signal
Processing, DSP), it is application-specific integrated circuit (Application Specific Integrated Circuit, ASIC), existing
It is field programmable gate array (Field-Programmable Gate Array, FPGA) or other programmable logic device, discrete
Door or transistor logic, discrete hardware components.
An embodiment of the present invention provides a kind of computer-readable recording medium, which contains
Computer program, above computer program realize following steps when being executed by processor:
Obtain the logging request of user;
According to above-mentioned logging request, account corresponding with above-mentioned logging request is read in memcached memory type databases
User data;
When key information in above-mentioned logging request is identical with the key information in above-mentioned account data, above-mentioned use is determined
Family passes through Information Authentication.
In embodiments of the present invention, data are read from memcached memory type databases, data reading speed is fast, can
To shorten the verification time of user's logging request, and then the login time of user can be shortened.
Optionally, can be with when the computer program of above computer readable storage medium storing program for executing memory storage is executed by processor
Realize any of the above-described Information Authentication method.
For the embodiment of Information Authentication device/electronic equipment/computer-readable recording medium, due to its basic phase
The embodiment of Information Authentication method is similar to, so description is fairly simple, referring to the embodiment of Information Authentication method in place of correlation
Explanation.
It should be noted that herein, relational terms such as first and second and the like are used merely to a reality
Body or operation are distinguished with another entity or operation, are deposited without necessarily requiring or implying between these entities or operation
In any this actual relation or order.Moreover, term " comprising ", "comprising" or its any other variant are intended to
Non-exclusive inclusion, so that process, method, article or equipment including a series of elements not only will including those
Element, but also including other elements that are not explicitly listed, or further include as this process, method, article or equipment
Intrinsic key element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that
Also there are other identical element in process, method, article or equipment including the key element.
Each embodiment in this specification is described using relevant mode, identical similar portion between each embodiment
Divide mutually referring to what each embodiment stressed is the difference with other embodiment.It is real especially for system
For applying example, since it is substantially similar to embodiment of the method, so description is fairly simple, related part is referring to embodiment of the method
Part explanation.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the scope of the present invention.It is all
Any modification, equivalent replacement, improvement and so within the spirit and principles in the present invention, are all contained in protection scope of the present invention
It is interior.
Claims (10)
- A kind of 1. Information Authentication method, it is characterised in that the described method includes:Obtain the logging request of user;According to the logging request, account number corresponding with the logging request is read in memcached memory type databases According to;When key information in the logging request is identical with the key information in the account data, determine that the user is led to Cross Information Authentication.
- It is 2. described according to the method described in claim 1, it is characterized in that, include at least account identification in the log on request According to the logging request, account data corresponding with the logging request, bag are read in memcached memory type databases Include:It is identical with the account identification in the logging request that account identification is searched in the memcached memories type database Account data, as the corresponding account data of the logging request;Read the corresponding account data of the logging request.
- 3. according to the method described in claim 2, it is characterized in that, described look into the memcached memories type database The account identification account data identical with the account identification in the logging request is looked for, as the corresponding account of the logging request Data, including:Determine the corresponding classification information of account identification in the logging request;The database burst of classification corresponding with the classification information is searched in the memcached memories type database, as Specify burst;The account identification account data identical with the account identification in the logging request is searched in the specified burst, as The corresponding account data of the logging request.
- 4. according to the method described in claim 1, it is characterized in that, the key information in the logging request with it is described When key information in account data is identical, the user is determined by Information Authentication, including:When key information in the logging request is identical with the key information in the account data, obtain the user's Logon rights;When the logon rights of the user meet default access rule, determine that the user passes through Information Authentication.
- 5. according to the method described in claim 4, it is characterized in that, the logon rights for obtaining the user, including:Obtain the mark that the user submits the terminal of logging request;Correspondingly, when the logon rights in the user meet default access rule, determine that the user is tested by information Card, including:When the mark of the terminal meets default access rule, determine that the user passes through Information Authentication.
- 6. according to the method described in claim 4, it is characterized in that, the logon rights for obtaining the user, including:Obtain the network address that the user submits logging request;Correspondingly, when the logon rights in the user meet default access rule, determine that the user is tested by information Card, including:When the network address meets default access rule, determine that the user passes through Information Authentication.
- 7. a kind of Information Authentication device, it is characterised in that described device includes:Acquisition request module, for obtaining the logging request of user;Data acquisition module, for according to the logging request, being read and the login in memcached memory type databases Ask corresponding account data;Requests verification module is identical with the key information in the account data for the key information in the logging request When, determine that the user passes through Information Authentication.
- 8. device according to claim 7, it is characterised in that the data acquisition module, including:Data search submodule, please with the login for searching account identification in the memcached memories type database The identical account data of account identification in asking, as the corresponding account data of the logging request;Digital independent submodule, for reading the corresponding account data of the logging request.
- 9. a kind of electronic equipment, it is characterised in that including processor, communication interface, memory and communication bus, wherein, it is described Processor, the communication interface, the memory complete mutual communication by communication bus;The memory, for storing computer program;The processor, during for performing the program stored on the memory, realizes any sides of claim 1-6 Method step.
- 10. a kind of computer-readable recording medium, it is characterised in that the computer-readable recording medium memory contains computer Program, the computer program realize claim 1-6 any method and steps when being executed by processor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711164196.8A CN107977570A (en) | 2017-11-21 | 2017-11-21 | Information Authentication method, apparatus, electronic equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711164196.8A CN107977570A (en) | 2017-11-21 | 2017-11-21 | Information Authentication method, apparatus, electronic equipment and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107977570A true CN107977570A (en) | 2018-05-01 |
Family
ID=62010633
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711164196.8A Withdrawn CN107977570A (en) | 2017-11-21 | 2017-11-21 | Information Authentication method, apparatus, electronic equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107977570A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110659296A (en) * | 2019-09-26 | 2020-01-07 | 广州华多网络科技有限公司 | Storage method, device, equipment and computer readable medium |
CN112395574A (en) * | 2020-12-04 | 2021-02-23 | 航天信息股份有限公司 | Safety login management method |
CN114095239A (en) * | 2021-11-17 | 2022-02-25 | 中国银行股份有限公司 | Fragment login method and device |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110252181A1 (en) * | 2010-04-12 | 2011-10-13 | Darryl Ouye | Flexible way of specifying storage attributes in a flash memory-based object store |
CN104009844A (en) * | 2013-02-26 | 2014-08-27 | 成都勤智数码科技股份有限公司 | Multilevel password processing method based on safety management |
CN104506542A (en) * | 2014-12-29 | 2015-04-08 | 深圳中兴网信科技有限公司 | Security certification method and security certification system |
CN105912601A (en) * | 2016-04-05 | 2016-08-31 | 国电南瑞科技股份有限公司 | Partition storage method for distributed real-time memory database of energy management system |
CN107181757A (en) * | 2017-06-27 | 2017-09-19 | 新浪网技术(中国)有限公司 | Support Memcache Proxy Methods, the apparatus and system of certification and protocol conversion |
-
2017
- 2017-11-21 CN CN201711164196.8A patent/CN107977570A/en not_active Withdrawn
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110252181A1 (en) * | 2010-04-12 | 2011-10-13 | Darryl Ouye | Flexible way of specifying storage attributes in a flash memory-based object store |
CN104009844A (en) * | 2013-02-26 | 2014-08-27 | 成都勤智数码科技股份有限公司 | Multilevel password processing method based on safety management |
CN104506542A (en) * | 2014-12-29 | 2015-04-08 | 深圳中兴网信科技有限公司 | Security certification method and security certification system |
CN105912601A (en) * | 2016-04-05 | 2016-08-31 | 国电南瑞科技股份有限公司 | Partition storage method for distributed real-time memory database of energy management system |
CN107181757A (en) * | 2017-06-27 | 2017-09-19 | 新浪网技术(中国)有限公司 | Support Memcache Proxy Methods, the apparatus and system of certification and protocol conversion |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110659296A (en) * | 2019-09-26 | 2020-01-07 | 广州华多网络科技有限公司 | Storage method, device, equipment and computer readable medium |
CN110659296B (en) * | 2019-09-26 | 2021-02-12 | 广州方硅信息技术有限公司 | Storage method, device, equipment and computer readable medium |
CN112395574A (en) * | 2020-12-04 | 2021-02-23 | 航天信息股份有限公司 | Safety login management method |
CN112395574B (en) * | 2020-12-04 | 2024-02-23 | 航天信息股份有限公司 | Safe login management method |
CN114095239A (en) * | 2021-11-17 | 2022-02-25 | 中国银行股份有限公司 | Fragment login method and device |
CN114095239B (en) * | 2021-11-17 | 2024-04-19 | 中国银行股份有限公司 | Method and device for logging in fragments |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR102197371B1 (en) | Identity verification method and device | |
US20200294048A1 (en) | Blockchain-based data verification method and apparatus, and electronic device | |
JP6859506B2 (en) | Digital certificate management methods, devices, and systems | |
US8424061B2 (en) | Method, system and program product for authenticating a user seeking to perform an electronic service request | |
US11138300B2 (en) | Multi-factor profile and security fingerprint analysis | |
US11113412B2 (en) | System and method for monitoring and verifying software behavior | |
US8904506B1 (en) | Dynamic account throttling | |
EP2748781B1 (en) | Multi-factor identity fingerprinting with user behavior | |
US20180196875A1 (en) | Determining repeat website users via browser uniqueness tracking | |
WO2019084922A1 (en) | Information processing method and system, server, terminal and computer storage medium | |
US8613059B2 (en) | Methods, systems and computer program products for secure access to information | |
JP2021152953A (en) | Authentication and approval method and authentication server | |
US10320624B1 (en) | Access control policy simulation and testing | |
KR100786478B1 (en) | System and Apparatus for verifing authenticity of a person useing customer behavior analysis information | |
CN107977570A (en) | Information Authentication method, apparatus, electronic equipment and storage medium | |
US20200084199A1 (en) | Techniques for identification of location of relevant fields in a credential-seeking web page | |
JP2021527858A (en) | Location-based access to access-controlled resources | |
CN106656455A (en) | Website access method and device | |
JP2022027416A (en) | Data protection query interface | |
US20220237240A1 (en) | Method and apparatus for collecting information regarding dark web | |
CN106102059B (en) | For the method and apparatus for the owner for determining hotspot | |
US20200074566A1 (en) | System and method for allocation, management and peer review based transfer of electronic tokens | |
CN107896210A (en) | Safety protecting method, device, server and storage medium | |
CN111582868A (en) | Transaction request processing method, device and equipment | |
CN107679383B (en) | Identity verification method and device based on geographic position and touch area |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20180501 |