CN107977570A - Information Authentication method, apparatus, electronic equipment and storage medium - Google Patents

Information Authentication method, apparatus, electronic equipment and storage medium Download PDF

Info

Publication number
CN107977570A
CN107977570A CN201711164196.8A CN201711164196A CN107977570A CN 107977570 A CN107977570 A CN 107977570A CN 201711164196 A CN201711164196 A CN 201711164196A CN 107977570 A CN107977570 A CN 107977570A
Authority
CN
China
Prior art keywords
logging request
user
account
account data
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201711164196.8A
Other languages
Chinese (zh)
Inventor
沈文策
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian Cnfol Information Technology Co Ltd
Original Assignee
Fujian Cnfol Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian Cnfol Information Technology Co Ltd filed Critical Fujian Cnfol Information Technology Co Ltd
Priority to CN201711164196.8A priority Critical patent/CN107977570A/en
Publication of CN107977570A publication Critical patent/CN107977570A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2133Verifying human interaction, e.g., Captcha

Abstract

An embodiment of the present invention provides Information Authentication method, apparatus, electronic equipment and storage medium, this method includes:Obtain the logging request of user;According to the logging request, account data corresponding with the logging request is read in memcached memory type databases;When key information in the logging request is identical with the key information in the account data, determine that the user passes through Information Authentication.Data are read in memcached memory type databases, data reading speed is fast, can shorten the verification time of user's logging request, and then can shorten the login time of user.

Description

Information Authentication method, apparatus, electronic equipment and storage medium
Technical field
The present invention relates to Internet technical field, is situated between more particularly to Information Authentication method, apparatus, electronic equipment and storage Matter.
Background technology
With the development of Internet technology, Web (World Wide Web, global wide area network) services become people and entertain life Essential service living.In Web service, no matter user is to play online game, still posts or see video, under normal circumstances It is required for logging in a user account.Each service provider determines the identity of user by user account, so as to provide to the user more excellent The service of matter.
In the prior art, when user submits logging request to server-side, server-side, can be right after logging request is received Relevant database carries out IO (Input/Output, input/output) operations, to obtain information corresponding with logging request, from And determine whether user is legal.
But server-side carries out I/O operation to relevant database, data reading speed is slow, please so as to cause user to log in The verification time asked is longer.
The content of the invention
The purpose of the embodiment of the present invention is to provide a kind of Information Authentication method, apparatus, electronic equipment and storage medium, with Realize the verification time for shortening user's logging request.Concrete technical scheme is as follows:
In a first aspect, an embodiment of the present invention provides a kind of Information Authentication method, the described method includes:
Obtain the logging request of user;
According to the logging request, account corresponding with the logging request is read in memcached memory type databases User data;
When key information in the logging request is identical with the key information in the account data, the use is determined Family passes through Information Authentication.
Optionally, account identification is included at least in the log on request, it is described according to the logging request, Account data corresponding with the logging request is read in memcached memory type databases, including:
Account identification and the account identification phase in the logging request are searched in the memcached memories type database Same account data, as the corresponding account data of the logging request;
Read the corresponding account data of the logging request.
Optionally, it is described to be searched in the memcached memories type database in account identification and the logging request The identical account data of account identification, as the corresponding account data of the logging request, including:
Determine the corresponding classification information of account identification in the logging request;
The database burst of classification corresponding with the classification information is searched in the memcached memories type database, As specified burst;
The account identification account data identical with the account identification in the logging request is searched in the specified burst, As the corresponding account data of the logging request.
Optionally, the key information in the logging request is identical with the key information in the account data When, the user is determined by Information Authentication, including:
When key information in the logging request is identical with the key information in the account data, the use is obtained The logon rights at family;
When the logon rights of the user meet default access rule, determine that the user passes through Information Authentication.
Optionally, the logon rights for obtaining the user, including:
Obtain the mark that the user submits the terminal of logging request;
Correspondingly, when the logon rights in the user meet default access rule, determine that the user passes through letter Breath verification, including:
When the mark of the terminal meets default access rule, determine that the user passes through Information Authentication.
Optionally, the logon rights for obtaining the user, including:
Obtain the network address that the user submits logging request;
Correspondingly, when the logon rights in the user meet default access rule, determine that the user passes through letter Breath verification, including:
When the network address meets default access rule, determine that the user passes through Information Authentication.
Second aspect, an embodiment of the present invention provides a kind of Information Authentication device, described device includes:
Acquisition request module, for obtaining the logging request of user;
Data acquisition module, for according to the logging request, read in memcached memory type databases with it is described The corresponding account data of logging request;
Requests verification module, for the key information in the key information in the logging request and the account data When identical, determine that the user passes through Information Authentication.
Optionally, the data acquisition module described in the Information Authentication device of the embodiment of the present invention, including:
Data search submodule, is stepped on for searching account identification in the memcached memories type database with described The identical account data of account identification in record request, as the corresponding account data of the logging request;
Digital independent submodule, for reading the corresponding account data of the logging request.
Optionally, the data search submodule described in the Information Authentication device of the embodiment of the present invention, including:
Classification information determination unit, for determining the corresponding classification information of account identification in the logging request;
Burst determination unit is specified, for being searched and the classification information in the memcached memories type database The database burst of corresponding classification, as specified burst;
Account data determination unit, for searching account identification and the account in the logging request in the specified burst Family identifies identical account data, as the corresponding account data of the logging request.
Optionally, the requests verification module described in the Information Authentication device of the embodiment of the present invention, including:
Authority acquiring submodule, believes for the key in the key information in the logging request and the account data Manner of breathing at the same time, obtains the logon rights of the user;
Authority Verification submodule, for when the logon rights of the user meet default access rule, determining the use Family passes through Information Authentication.
Optionally, the authority acquiring submodule described in the Information Authentication device of the embodiment of the present invention, is specifically used for:
When key information in the logging request is identical with the key information in the account data, the use is obtained Submit the mark of the terminal of logging request in family;
Correspondingly, the Authority Verification submodule, is specifically used for:
When the mark of the terminal meets default access rule, determine that the user passes through Information Authentication.
Optionally, the authority acquiring submodule described in the Information Authentication device of the embodiment of the present invention, is specifically used for:
When key information in the logging request is identical with the key information in the account data, the use is obtained Submit the network address of logging request in family;
Correspondingly, the Authority Verification submodule, is specifically used for:
When the network address meets default access rule, determine that the user passes through Information Authentication.
The third aspect, an embodiment of the present invention provides a kind of electronic equipment, including processor, communication interface, memory and Communication bus, wherein, the processor, the communication interface, the memory completes mutual communication by communication bus;
The memory, for storing computer program;
The processor, during for performing the program stored on the memory, realizes any institute of above-mentioned first aspect The Information Authentication method stated.
Fourth aspect, an embodiment of the present invention provides a kind of computer-readable recording medium, the computer-readable storage Dielectric memory contains computer program, and the computer program realizes that above-mentioned first aspect is any described when being executed by processor Information Authentication method.
Information Authentication method, apparatus, electronic equipment and storage medium provided in an embodiment of the present invention, obtain the login of user Request;According to the logging request, account number corresponding with the logging request is read in memcached memory type databases According to;When key information in the logging request is identical with the key information in the account data, determine that the user is led to Cross Information Authentication.Data are read in memcached memory type databases, data reading speed is fast, can shorten user's login The verification time of request.Certainly, implement any of the products of the present invention or method it is not absolutely required to reach above-described at the same time All advantages.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing There is attached drawing needed in technology description to be briefly described, it should be apparent that, drawings in the following description are only this Some embodiments of invention, for those of ordinary skill in the art, without creative efforts, can be with Other attached drawings are obtained according to these attached drawings.
Fig. 1 is a kind of flow diagram of the Information Authentication method of the embodiment of the present invention;
Fig. 2 is a kind of schematic diagram of the Information Authentication device of the embodiment of the present invention;
Fig. 3 is a kind of schematic diagram of the electronic equipment of the embodiment of the present invention.
Embodiment
Below in conjunction with the attached drawing in the embodiment of the present invention, the technical solution in the embodiment of the present invention is carried out clear, complete Site preparation describes, it is clear that described embodiment is only part of the embodiment of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, those of ordinary skill in the art are obtained every other without making creative work Embodiment, belongs to the scope of protection of the invention.
Quick registration is an important research topic, and existing login techniques, are all to pass through inquiry in Information Authentication Database, especially relevant database, to verify log-on message.Inquiry each time, will carry out database IO, consumption Performance, inquiry velocity are very slow.
In view of the above-mentioned problems, an embodiment of the present invention provides a kind of Information Authentication method, referring to Fig. 1, this method includes:
S101, obtains the logging request of user.
The Information Authentication method of the embodiment of the present invention can realize that login system is that can arbitrarily realize by login system The system of the Information Authentication method of the embodiment of the present invention.Such as:
Login system can be a kind of equipment, including:Processor, memory, communication interface and bus;Processor, storage Device is connected by bus with communication interface and completes mutual communication;Memory storage executable program code;Processor leads to Cross and read in memory the executable program code that stores to run program corresponding with executable program code, for performing The Information Authentication method of the embodiment of the present invention.
Login system can also be a kind of application program, for operationally performing the Information Authentication side of the embodiment of the present invention Method.
Login system can also be a kind of storage medium, and for storing executable code, executable code is used to perform sheet The Information Authentication method of inventive embodiments.
When user carries out Account Logon, user inputs key information in the client, and client sends to server-side and wraps Logging request containing key information.Server-side receives above-mentioned logging request, and the login system applied to server-side obtains the login Request.
S102, according to above-mentioned logging request, reads corresponding with above-mentioned logging request in memcached memory type databases Account data.
Memcached memory type databases are a high performance distributed memory target cache systems, for Dynamic Web Using.It reduces the number of reading database by data cached in memory and object, so as to improve dynamic, database drives The speed of dynamic website.Hashmap (Hash mapping) of the memcached memory type databases based on a storage key/value pair, its Daemon (finger daemon) is write with C, but client can be write with any language, and passes through memcached agreements Communicate with daemon.Memcached memory type databases reading speed quickly, and can carry out additions and deletions as needed and change, and use It is very useful to store data.
Account identification of the login system in logging request, inquires about account mark in memcached memory type databases Know the account data identical with account identification in logging request, and read account data.In memcached memory type databases Middle reading account data, can greatly improve the reading speed of account data.
S103, when the key information in above-mentioned logging request is identical with the key information in above-mentioned account data, determines Above-mentioned user passes through Information Authentication.
Login system is after the corresponding account data of logging request is obtained, the key information in reading account data, and with Key information in logging request is compared, and judges that user passes through Information Authentication if the two is identical, it is allowed to which user accesses system System;If the key information in account data is different from the key information in logging request, user is judged not by Information Authentication, Refuse subscriber access system.Key information is arbitrary identification information, such as password, identifying code or iris etc..
In embodiments of the present invention, data are read from memcached memory type databases, data reading speed is fast, can To shorten the verification time of user's logging request, and then the login time of user can be shortened.
Optionally, account identification is included at least in above-mentioned log on request, it is above-mentioned according to above-mentioned logging request, Account data corresponding with above-mentioned logging request is read in memcached memory type databases, including:
Step 1, searches account identification and the account in above-mentioned logging request in above-mentioned memcached memories type database Family identifies identical account data, as the corresponding account data of above-mentioned logging request.
Account identification of the login system in logging request, such as the face of user account, the fingerprint of user or user Information etc., searches the account data of same account mark in memcached memory type databases.
Step 2, reads the corresponding account data of above-mentioned logging request.
Memcached memory type databases also stored for the corresponding account of each account data while account data is stored Family identifies, such as user account etc..By account identification, the Rapid matching of logging request and related account data can be realized.
In embodiments of the present invention, the specific method of the corresponding account data of definite logging request is given, can be accurate Quickly read account data corresponding with logging request.
Optionally, account identification and the account in above-mentioned logging request are searched in above-mentioned memcached memories type database Family identifies identical account data, as the corresponding account data of above-mentioned logging request, including:
Step 1, determines the corresponding classification information of account identification in above-mentioned logging request.
Account identification may correspond to different classification in logging request, such as a user account, log in Account identification in request can be account, can also be cell-phone number or user certificate number etc..Login system determines account mark Know corresponding classification information.
Step 2, searches the data of classification corresponding with above-mentioned classification information in above-mentioned memcached memories type database Storehouse burst, as specified burst.
For example, when account identification is cell-phone number, is searched in memcached memory type databases and correspond to cell-phone number Database burst, as specified burst.When account identification is ID card No., in memcached memory type databases Search and by the corresponding database burst of ID card No., as specified burst.
Step 3, searches the account identification account identical with the account identification in above-mentioned logging request in above-mentioned specified burst User data, as the corresponding account data of above-mentioned logging request.
Account identification of the login system in logging request, searches the account number of same account mark in burst is specified According to as the corresponding account data of logging request.Optionally, in order to save memory space, each account identification of same account connects Connect same account data.Account identification of the login system in logging request, searches same account mark in burst is specified The index of the account data of knowledge, and read account data by indexing.
In embodiments of the present invention, specified burst corresponding with account identification in logging request is searched, in burst is specified Account data is searched, without traveling through whole memcached memories type database, the reading speed of account data can be increased, into And improve the login speed of user.
Optionally, when the key information in above-mentioned logging request is identical with the key information in above-mentioned account data, really Above-mentioned user is determined by Information Authentication, including:
Step 1, when the key information in above-mentioned logging request is identical with the key information in above-mentioned account data, is obtained Take the logon rights of above-mentioned user.
When key information is identical, login system continues to obtain the logon rights of active user;When key information is different, Active user is forbidden to log in.Logon rights are the mark of any user information, for example, the exclusive identification code of user's logging device, The entry address of user or the facial information of user etc..
Step 2, when the logon rights of above-mentioned user meet default access rule, determines that above-mentioned user is tested by information Card.
Default access rule is the rule of any judgement user's logon rights, for example, by the facial information of user, is determined When active user is the legitimate user of account, judge that active user passes through Information Authentication.
Optionally, when the key information in above-mentioned logging request is identical with the key information in above-mentioned account data, obtain After the logon rights for taking above-mentioned user, the method further includes:
When the logon rights of above-mentioned user do not meet default access rule, above-mentioned user is forbidden to log in or limit above-mentioned use The specified operation at family.
When logon rights do not meet default access rule, active user is forbidden to log in, for example, the smart mobile phone of user A Include online payment software, the finger print information that default access rule is user A is set, when the minor children of user A are logical When crossing the mobile phone progress online game of user A, charge stage property is triggered, and jumps to on-line payment software, the child of user A is defeated Enter correct password, but can not be by so it is soft to log in on-line payment in verification logon rights, i.e. fingerprint authentication Part buys above-mentioned charge stage property.
Or, when logon rights do not meet default access rule, the specified operation of user is limited, for example, user B is one The holder of ticket account fund, while user B has employed user C to help to carry out investment operation, user B and user C are used should Stock account invest, and the password of user C inputs has passed through key information verification, but the logon rights of user C do not lead to Verification is crossed, as the fingerprint authentication of user C can not be by the way that then user C enjoys the behaviour invested to the fund in the stock account Make, but the fund in stock account cannot be carried out to produce operation.
In embodiments of the present invention, when key information passes through verification, further judge to use according to the logon rights of user Whether family improves the security of Information Authentication, meets a variety of user demands by Information Authentication.
Optionally, the logon rights of the above-mentioned user of above-mentioned acquisition, including:
Obtain the mark that above-mentioned user submits the terminal of logging request.
It can also include the mark of terminal in logging request, the mark of terminal can be exclusive identification code or the user of terminal Exclusive identification code etc..
Correspondingly, when the logon rights of above-mentioned user meet default access rule, determine that above-mentioned user is tested by information Card, including:
When the mark of above-mentioned terminal meets default access rule, determine that above-mentioned user passes through Information Authentication.
When the mark of terminal meets default access rule, determine that above-mentioned user passes through Information Authentication;In the mark of terminal When not meeting default access rule, above-mentioned user is forbidden to log in.For example, user have submitted logging request by smart mobile phone, step on Account, password and IMSI (International Mobile Subscriber Identification are contained in record request Number, international mobile subscriber identity) after account and password are by verification, continue to verify the mark IMSI of terminal, When IMSI is the IMSI that default access rule is specified, determine that user passes through Information Authentication, it is allowed to which user logs in;It is not pre- in IMSI If during the IMSI that the rules of competence are specified, judge user information authentication failed, forbid user to log in.
In embodiments of the present invention, by verifying terminal iidentification, ensure that the log-on message of only designated equipment could lead to Verification is crossed, ensure that the safety of Information Authentication, meets many demands of user.
Optionally, the logon rights of the above-mentioned user of above-mentioned acquisition, including:
Obtain the network address that above-mentioned user submits logging request.
It can also include source address in logging request, i.e. user submits the IP address of the equipment of logging request.Login system Obtain the IP address.
Correspondingly, when the above-mentioned logon rights in above-mentioned user meet default access rule, determine that above-mentioned user passes through letter Breath verification, including:
When above-mentioned network address meets default access rule, determine that above-mentioned user passes through Information Authentication.
When IP address is in the network segment that default access rule is specified, judge that above-mentioned user passes through Information Authentication, it is allowed on State user's login;When IP address is not at the network segment that default access rule is specified, above-mentioned user is judged not by Information Authentication, Above-mentioned user is forbidden to log in.In a practical situation, the position of user's logon account is usually fixed, such as in company or family Deng can judge the login position of user according to IP address, if the account information of user is stolen, it logs in IP address generally can be with The IP address specified is different, therefore when IP address is not being specified in the network segment, judgement does not pass through Information Authentication.
In embodiments of the present invention, by verifying network address, it ensure that and only specify the log-on message of the network segment to lead to Verification is crossed, ensure that the safety of Information Authentication, meets many demands of user.
Referring to Fig. 2, the embodiment of the present invention additionally provides a kind of Information Authentication device, which includes:
Acquisition request module 201, for obtaining the logging request of user;
Data acquisition module 202, for according to above-mentioned logging request, read in memcached memory type databases with The corresponding account data of above-mentioned logging request;
Requests verification module 203, for the key in the key information in above-mentioned logging request and above-mentioned account data When information is identical, determine that above-mentioned user passes through Information Authentication.
In embodiments of the present invention, data are read from memcached memory type databases, data reading speed is fast, can To shorten the verification time of user's logging request, and then the login time of user can be shortened.
Optionally, the above-mentioned data acquisition module 202 in the Information Authentication device of the embodiment of the present invention, including:
Data search submodule, is stepped on for searching account identification in above-mentioned memcached memories type database with above-mentioned The identical account data of account identification in record request, as the corresponding account data of above-mentioned logging request;
Digital independent submodule, for reading the corresponding account data of above-mentioned logging request.
In embodiments of the present invention, the specific method of the corresponding account data of definite logging request is given, can be accurate Quickly read account data corresponding with logging request.
Optionally, the above-mentioned data search submodule in the Information Authentication device of the embodiment of the present invention, including:
Classification information determination unit, for determining the corresponding classification information of account identification in above-mentioned logging request;
Burst determination unit is specified, for being searched and above-mentioned classification information in above-mentioned memcached memories type database The database burst of corresponding classification, as specified burst;
Account data determination unit, for searching account identification and the account in above-mentioned logging request in above-mentioned specified burst Family identifies identical account data, as the corresponding account data of above-mentioned logging request.
In embodiments of the present invention, specified burst corresponding with account identification in logging request is searched, in burst is specified Account data is searched, without traveling through whole memcached memories type database, the reading speed of account data can be increased, into And improve the login speed of user.
Optionally, the above-mentioned requests verification module 203 in the Information Authentication device of the embodiment of the present invention, including:
Authority acquiring submodule, believes for the key in the key information in above-mentioned logging request and above-mentioned account data Manner of breathing at the same time, obtains the logon rights of above-mentioned user;
Authority Verification submodule, for when the logon rights of above-mentioned user meet default access rule, determining above-mentioned use Family passes through Information Authentication.
Optionally, above-mentioned requests verification module 203, further includes:
Operation limits module, for when the logon rights of above-mentioned user do not meet default access rule, forbidding above-mentioned use Family logs in or limits the specified operation of above-mentioned user.
In embodiments of the present invention, when key information passes through verification, further judge to use according to the logon rights of user Whether family improves the security of Information Authentication, meets a variety of user demands by Information Authentication.
Optionally, the above-mentioned authority acquiring submodule in the Information Authentication device of the embodiment of the present invention, is specifically used for:
When key information in above-mentioned logging request is identical with the key information in above-mentioned account data, above-mentioned use is obtained Submit the mark of the terminal of logging request in family;
Correspondingly, above-mentioned Authority Verification submodule, is specifically used for:
When the mark of above-mentioned terminal meets default access rule, determine that above-mentioned user passes through Information Authentication.
In embodiments of the present invention, by verifying terminal iidentification, ensure that the log-on message of only designated equipment could lead to Verification is crossed, ensure that the safety of Information Authentication, meets many demands of user.
Optionally, the above-mentioned authority acquiring submodule in the Information Authentication device of the embodiment of the present invention, is specifically used for:
When key information in above-mentioned logging request is identical with the key information in above-mentioned account data, above-mentioned use is obtained Submit the network address of logging request in family;
Correspondingly, above-mentioned Authority Verification submodule, is specifically used for:
When above-mentioned network address meets default access rule, determine that above-mentioned user passes through Information Authentication.
In embodiments of the present invention, by verifying network address, it ensure that and only specify the log-on message of the network segment to lead to Verification is crossed, ensure that the safety of Information Authentication, meets many demands of user.
The embodiment of the present invention additionally provides a kind of electronic equipment, as shown in figure 3, including processor 301, communication interface 302, Memory 303 and communication bus 304, wherein, processor 301, communication interface 302, memory 303 is complete by communication bus 304 Into mutual communication,
Memory 303, for storing computer program;
Processor 301, during for performing the program stored on memory 303, realizes following steps:
Obtain the logging request of user;
According to above-mentioned logging request, account corresponding with above-mentioned logging request is read in memcached memory type databases User data;
When key information in above-mentioned logging request is identical with the key information in above-mentioned account data, above-mentioned use is determined Family passes through Information Authentication.
In embodiments of the present invention, data are read from memcached memory type databases, data reading speed is fast, can To shorten the verification time of user's logging request, and then the login time of user can be shortened.
Optionally, processor 301 can also realize any of the above-described letter in the program stored on performing memory 303 Cease verification method.
The communication bus that above-mentioned electronic equipment is mentioned can be Peripheral Component Interconnect standard (Peripheral Component Interconnect, PCI) bus or expanding the industrial standard structure (Extended Industry Standard Architecture, EISA) bus etc..The communication bus can be divided into address bus, data/address bus, controlling bus etc..For just Only represented in expression, figure with a thick line, it is not intended that an only bus or a type of bus.
Communication interface is used for the communication between above-mentioned electronic equipment and other equipment.
Memory can include random access memory (Random Access Memory, RAM), can also include non-easy The property lost memory (Non-Volatile Memory, NVM), for example, at least a magnetic disk storage.Optionally, memory may be used also To be at least one storage device for being located remotely from aforementioned processor.
Above-mentioned processor can be general processor, including central processing unit (Central Processing Unit, CPU), network processing unit (Network Processor, NP) etc.;It can also be digital signal processor (Digital Signal Processing, DSP), it is application-specific integrated circuit (Application Specific Integrated Circuit, ASIC), existing It is field programmable gate array (Field-Programmable Gate Array, FPGA) or other programmable logic device, discrete Door or transistor logic, discrete hardware components.
An embodiment of the present invention provides a kind of computer-readable recording medium, which contains Computer program, above computer program realize following steps when being executed by processor:
Obtain the logging request of user;
According to above-mentioned logging request, account corresponding with above-mentioned logging request is read in memcached memory type databases User data;
When key information in above-mentioned logging request is identical with the key information in above-mentioned account data, above-mentioned use is determined Family passes through Information Authentication.
In embodiments of the present invention, data are read from memcached memory type databases, data reading speed is fast, can To shorten the verification time of user's logging request, and then the login time of user can be shortened.
Optionally, can be with when the computer program of above computer readable storage medium storing program for executing memory storage is executed by processor Realize any of the above-described Information Authentication method.
For the embodiment of Information Authentication device/electronic equipment/computer-readable recording medium, due to its basic phase The embodiment of Information Authentication method is similar to, so description is fairly simple, referring to the embodiment of Information Authentication method in place of correlation Explanation.
It should be noted that herein, relational terms such as first and second and the like are used merely to a reality Body or operation are distinguished with another entity or operation, are deposited without necessarily requiring or implying between these entities or operation In any this actual relation or order.Moreover, term " comprising ", "comprising" or its any other variant are intended to Non-exclusive inclusion, so that process, method, article or equipment including a series of elements not only will including those Element, but also including other elements that are not explicitly listed, or further include as this process, method, article or equipment Intrinsic key element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that Also there are other identical element in process, method, article or equipment including the key element.
Each embodiment in this specification is described using relevant mode, identical similar portion between each embodiment Divide mutually referring to what each embodiment stressed is the difference with other embodiment.It is real especially for system For applying example, since it is substantially similar to embodiment of the method, so description is fairly simple, related part is referring to embodiment of the method Part explanation.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the scope of the present invention.It is all Any modification, equivalent replacement, improvement and so within the spirit and principles in the present invention, are all contained in protection scope of the present invention It is interior.

Claims (10)

  1. A kind of 1. Information Authentication method, it is characterised in that the described method includes:
    Obtain the logging request of user;
    According to the logging request, account number corresponding with the logging request is read in memcached memory type databases According to;
    When key information in the logging request is identical with the key information in the account data, determine that the user is led to Cross Information Authentication.
  2. It is 2. described according to the method described in claim 1, it is characterized in that, include at least account identification in the log on request According to the logging request, account data corresponding with the logging request, bag are read in memcached memory type databases Include:
    It is identical with the account identification in the logging request that account identification is searched in the memcached memories type database Account data, as the corresponding account data of the logging request;
    Read the corresponding account data of the logging request.
  3. 3. according to the method described in claim 2, it is characterized in that, described look into the memcached memories type database The account identification account data identical with the account identification in the logging request is looked for, as the corresponding account of the logging request Data, including:
    Determine the corresponding classification information of account identification in the logging request;
    The database burst of classification corresponding with the classification information is searched in the memcached memories type database, as Specify burst;
    The account identification account data identical with the account identification in the logging request is searched in the specified burst, as The corresponding account data of the logging request.
  4. 4. according to the method described in claim 1, it is characterized in that, the key information in the logging request with it is described When key information in account data is identical, the user is determined by Information Authentication, including:
    When key information in the logging request is identical with the key information in the account data, obtain the user's Logon rights;
    When the logon rights of the user meet default access rule, determine that the user passes through Information Authentication.
  5. 5. according to the method described in claim 4, it is characterized in that, the logon rights for obtaining the user, including:
    Obtain the mark that the user submits the terminal of logging request;
    Correspondingly, when the logon rights in the user meet default access rule, determine that the user is tested by information Card, including:
    When the mark of the terminal meets default access rule, determine that the user passes through Information Authentication.
  6. 6. according to the method described in claim 4, it is characterized in that, the logon rights for obtaining the user, including:
    Obtain the network address that the user submits logging request;
    Correspondingly, when the logon rights in the user meet default access rule, determine that the user is tested by information Card, including:
    When the network address meets default access rule, determine that the user passes through Information Authentication.
  7. 7. a kind of Information Authentication device, it is characterised in that described device includes:
    Acquisition request module, for obtaining the logging request of user;
    Data acquisition module, for according to the logging request, being read and the login in memcached memory type databases Ask corresponding account data;
    Requests verification module is identical with the key information in the account data for the key information in the logging request When, determine that the user passes through Information Authentication.
  8. 8. device according to claim 7, it is characterised in that the data acquisition module, including:
    Data search submodule, please with the login for searching account identification in the memcached memories type database The identical account data of account identification in asking, as the corresponding account data of the logging request;
    Digital independent submodule, for reading the corresponding account data of the logging request.
  9. 9. a kind of electronic equipment, it is characterised in that including processor, communication interface, memory and communication bus, wherein, it is described Processor, the communication interface, the memory complete mutual communication by communication bus;
    The memory, for storing computer program;
    The processor, during for performing the program stored on the memory, realizes any sides of claim 1-6 Method step.
  10. 10. a kind of computer-readable recording medium, it is characterised in that the computer-readable recording medium memory contains computer Program, the computer program realize claim 1-6 any method and steps when being executed by processor.
CN201711164196.8A 2017-11-21 2017-11-21 Information Authentication method, apparatus, electronic equipment and storage medium Withdrawn CN107977570A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711164196.8A CN107977570A (en) 2017-11-21 2017-11-21 Information Authentication method, apparatus, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711164196.8A CN107977570A (en) 2017-11-21 2017-11-21 Information Authentication method, apparatus, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN107977570A true CN107977570A (en) 2018-05-01

Family

ID=62010633

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711164196.8A Withdrawn CN107977570A (en) 2017-11-21 2017-11-21 Information Authentication method, apparatus, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN107977570A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110659296A (en) * 2019-09-26 2020-01-07 广州华多网络科技有限公司 Storage method, device, equipment and computer readable medium
CN112395574A (en) * 2020-12-04 2021-02-23 航天信息股份有限公司 Safety login management method
CN114095239A (en) * 2021-11-17 2022-02-25 中国银行股份有限公司 Fragment login method and device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110252181A1 (en) * 2010-04-12 2011-10-13 Darryl Ouye Flexible way of specifying storage attributes in a flash memory-based object store
CN104009844A (en) * 2013-02-26 2014-08-27 成都勤智数码科技股份有限公司 Multilevel password processing method based on safety management
CN104506542A (en) * 2014-12-29 2015-04-08 深圳中兴网信科技有限公司 Security certification method and security certification system
CN105912601A (en) * 2016-04-05 2016-08-31 国电南瑞科技股份有限公司 Partition storage method for distributed real-time memory database of energy management system
CN107181757A (en) * 2017-06-27 2017-09-19 新浪网技术(中国)有限公司 Support Memcache Proxy Methods, the apparatus and system of certification and protocol conversion

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110252181A1 (en) * 2010-04-12 2011-10-13 Darryl Ouye Flexible way of specifying storage attributes in a flash memory-based object store
CN104009844A (en) * 2013-02-26 2014-08-27 成都勤智数码科技股份有限公司 Multilevel password processing method based on safety management
CN104506542A (en) * 2014-12-29 2015-04-08 深圳中兴网信科技有限公司 Security certification method and security certification system
CN105912601A (en) * 2016-04-05 2016-08-31 国电南瑞科技股份有限公司 Partition storage method for distributed real-time memory database of energy management system
CN107181757A (en) * 2017-06-27 2017-09-19 新浪网技术(中国)有限公司 Support Memcache Proxy Methods, the apparatus and system of certification and protocol conversion

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110659296A (en) * 2019-09-26 2020-01-07 广州华多网络科技有限公司 Storage method, device, equipment and computer readable medium
CN110659296B (en) * 2019-09-26 2021-02-12 广州方硅信息技术有限公司 Storage method, device, equipment and computer readable medium
CN112395574A (en) * 2020-12-04 2021-02-23 航天信息股份有限公司 Safety login management method
CN112395574B (en) * 2020-12-04 2024-02-23 航天信息股份有限公司 Safe login management method
CN114095239A (en) * 2021-11-17 2022-02-25 中国银行股份有限公司 Fragment login method and device
CN114095239B (en) * 2021-11-17 2024-04-19 中国银行股份有限公司 Method and device for logging in fragments

Similar Documents

Publication Publication Date Title
KR102197371B1 (en) Identity verification method and device
US20200294048A1 (en) Blockchain-based data verification method and apparatus, and electronic device
JP6859506B2 (en) Digital certificate management methods, devices, and systems
US8424061B2 (en) Method, system and program product for authenticating a user seeking to perform an electronic service request
US11138300B2 (en) Multi-factor profile and security fingerprint analysis
US11113412B2 (en) System and method for monitoring and verifying software behavior
US8904506B1 (en) Dynamic account throttling
EP2748781B1 (en) Multi-factor identity fingerprinting with user behavior
US20180196875A1 (en) Determining repeat website users via browser uniqueness tracking
WO2019084922A1 (en) Information processing method and system, server, terminal and computer storage medium
US8613059B2 (en) Methods, systems and computer program products for secure access to information
JP2021152953A (en) Authentication and approval method and authentication server
US10320624B1 (en) Access control policy simulation and testing
KR100786478B1 (en) System and Apparatus for verifing authenticity of a person useing customer behavior analysis information
CN107977570A (en) Information Authentication method, apparatus, electronic equipment and storage medium
US20200084199A1 (en) Techniques for identification of location of relevant fields in a credential-seeking web page
JP2021527858A (en) Location-based access to access-controlled resources
CN106656455A (en) Website access method and device
JP2022027416A (en) Data protection query interface
US20220237240A1 (en) Method and apparatus for collecting information regarding dark web
CN106102059B (en) For the method and apparatus for the owner for determining hotspot
US20200074566A1 (en) System and method for allocation, management and peer review based transfer of electronic tokens
CN107896210A (en) Safety protecting method, device, server and storage medium
CN111582868A (en) Transaction request processing method, device and equipment
CN107679383B (en) Identity verification method and device based on geographic position and touch area

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20180501