CN109361714A - User logs in method for authenticating, device, equipment and computer storage medium - Google Patents
User logs in method for authenticating, device, equipment and computer storage medium Download PDFInfo
- Publication number
- CN109361714A CN109361714A CN201811548508.XA CN201811548508A CN109361714A CN 109361714 A CN109361714 A CN 109361714A CN 201811548508 A CN201811548508 A CN 201811548508A CN 109361714 A CN109361714 A CN 109361714A
- Authority
- CN
- China
- Prior art keywords
- user
- information
- cache database
- logs
- database
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The invention discloses a kind of users to log in method for authenticating, device, equipment and computer storage medium.The described method includes: after the completion of the first subscription authentication, the information of the first user is stored into cache database and memory database in response to the log on request for the first time of the first user;Δ T=T is set by the blank duration that logs in of each user in cache database in addition to the first usernow‑Tlt, obtained multiple Δ T are compared, using maximum Δ T as Tmax, and a length of T when blank will be logged inmaxThe information of second user deleted from cache database;When the first user logs in again, the information based on the first user saved in cache database is authenticated, and the information of the first user is stored again into the cache database.According to embodiments of the present invention, the speed that user logs in authentication is improved, moreover it is possible to save memory headroom, save hardware investment.
Description
Technical field
The invention belongs to technical field of data processing more particularly to a kind of user to log in method for authenticating, device, equipment and meter
Calculation machine storage medium.
Background technique
Currently, the business of telecommunications operator system carrying all increases daily, the operation pressure is huge.The user of certain telecommunication carrier
Verification System carries the login authentication services of the closely up to ten million users of more than ten of districts and cities daily.It is sought including online business hall, palm
The authentication services of a system of the industry Room, the business hall WAP, the end CRM, agent's channel etc. more than 20.Number of authentications is up to 30,000,000/day.
System bearing pressure is big, especially enters an item of expenditure in the accounts the phase in the end of month user query business and business change peak period and beginning of the month user, pressure
Power is huge, carries nearly 50,000,000 times requests daily, and system high position operation causes the operation pressure huge, when be carved with and break down
Risk.At present system use subdivision city store principle, check numbers and clustered according to districts and cities, by memory caching technology come
Improve access speed.But with business development, the bigger system pressure the bigger.System needs continuous dilatation.Requirement to hardware
Higher and higher, system maintenance cost is also also higher and higher.
In addition the heavy workload of system business support, interacts frequently between other subsystems.And every subsystem all needs
It to be retrieved according to districts and cities and number in full customer data base.Cause the radix for retrieving data big.Hit rate is with user's
Increase and is gradually reduced.
Fig. 1 shows the flow chart that tradition logs in authentication services system, front-end access: front end refers to that user inputs user
Name, password carry out the visualization window of verification submission;Memory database: the data in memory database increase in explosive at present
Long, with increasingly blocking up for number of users, memory database is increasing to the consumption of memory, and the hardware resource for needing to expend is also
It is more and more.It is quick to the demand growth of cost.But the data in memory database are to carry out authenticating in N minutes at present
The caching of data, in the case where unstable networks, this cache hit rate is higher.And in the case where network stabilization, Yong Hutong
Crossing primary authentication can both be operated with finishing service, and the probability logged in is smaller within N minutes.
Previous scheme is dependent on the index effect in database index and memory database.Whether can be in memory
It is hit in database, whether has carried out register dependent on user in N minutes before current authentication moment times, do not had
The characteristics of in view of user characteristics attribute.Therefore cache hit rate is relatively low.Techniqueflow is as follows at present: user submits user name close
Code;It searches in the buffer, if hit returns the result, and updates login time finding;It does not hit in the buffer, then
It goes in database to search, pulls in caching and stored after finding;For at the data that were not logged on more than N minutes
Reason.It is rejected in please caching, to save space;After user password operation, data-base recording is modified, while deleting caching record.
User password record is read from database again.
Current processing mode, which has the following deficiencies:, depends critically upon N minutes this extension and contraction control point;If necessary
Average response speed is improved, then must extend the size of N;The size and user volume of N is positively correlated, and it is empty that user data occupies storage
Between;Memory database is flexible to depend critically upon hardware resource, excessive to hardware consumption.
Summary of the invention
The embodiment of the present invention provides a kind of user and logs in method for authenticating, device, equipment and computer storage medium, Neng Gouti
High system high-frequency user logs in the speed of authentication, moreover it is possible to save memory headroom, save hardware investment.
On the one hand, the embodiment of the present invention provides a kind of user's login method for authenticating, this method comprises:
In response to the log on request for the first time of the first user, after the completion of the first subscription authentication, the information of the first user is deposited
Storage is into cache database and memory database;
Δ T=T is set by the blank duration that logs in of each user in cache database in addition to the first usernow-
Tlt, wherein TnowFor the time that the first user first logs into, TltIt is each user in addition to the first user in TnowBefore
The last login time;
Obtained multiple Δ T are compared, using maximum Δ T as Tmax, and a length of T when blank will be logged inmax?
The information of two users is deleted from cache database;
When the first user logs in again, the information based on the first user saved in cache database is authenticated, and
The information of first user is stored again into the cache database.
User according to an embodiment of the present invention logs in method for authenticating, when the first user logs in, the method also includes: slow
User information corresponding to the first user is searched in deposit data library, if finding user information corresponding to the first user, is led to
Cross authentication.
User according to an embodiment of the present invention logs in method for authenticating, the method also includes: it is logged in again in the first user
When, information corresponding to the first user is searched in cache database, if information corresponding to the first user is not present,
Information corresponding to the first user is searched in memory database, if information corresponding to the first user exists, first is used
The information at family is loaded into cache database.
User according to an embodiment of the present invention logs in method for authenticating, if in cache database and inner data library not
There are information corresponding to the first user, then store the information of the first user into cache database and memory database.
User according to an embodiment of the present invention logs in method for authenticating, and the method also includes being arranged timer TM0, when opening
Dynamic timer TM0When, blank duration will be logged in and reach TM0User information deleted from cache database.
User according to an embodiment of the present invention logs in method for authenticating, the method also includes: after the first user logs in more
Its new login time.
User according to an embodiment of the present invention logs in method for authenticating, the method also includes: the login times of user are remembered
Login times are updated to N=N+1 when users log on for N.
User according to an embodiment of the present invention logs in method for authenticating, the method also includes: the login times based on user
Construct data tree structure B+ tree.
User according to an embodiment of the present invention logs in method for authenticating, when user's Modify password, modifies user in database
In corresponding user information record, while deleting user's corresponding user information record in the buffer.
User according to an embodiment of the present invention logs in method for authenticating, when first logging into after user's Modify password, from data
Corresponding user information is searched in library.
On the other hand, the embodiment of the invention provides a kind of users to log in authentication device, and device includes:
User logs in processing module, for the log on request for the first time in response to the first user, in first subscription authentication
After the completion, the information of first user is stored into cache database and memory database;
Logon information processing module, for by each user's in the cache database in addition to first user
It logs in blank duration and is set as Δ T=Tnow-Tlt, wherein TnowFor the time that first user first logs into, TltFor except institute
Each user except the first user is stated in TnowThe last login time before;
User information removing module, for being compared to obtained multiple Δ T, using maximum Δ T as Tmax, and will
Log in a length of T when blankmaxThe information of second user deleted from the cache database;
Subscription authentication processing module, for when first user logs in again, based on being protected in the cache database
The information of first user deposited authenticates, and the information of first user is stored again to the cache database
In.
Fast authentication equipment is logged in for Verification System high frequency user in another aspect, the embodiment of the invention provides one kind,
Equipment includes: processor and the memory for being stored with computer program instructions;Processor executes real when computer program instructions
Now such as settlement method provided in an embodiment of the present invention.
In another aspect, being stored in computer storage medium the embodiment of the invention provides a kind of computer storage medium
Computer program instructions realize such as processing side provided in an embodiment of the present invention when the computer program instructions are executed by processor
Method.
The user of the embodiment of the present invention logs in method for authenticating, device, equipment and computer storage medium, and load logs in for the first time
The first user information into cache database and memory database, and blank duration will be logged in and meet TmaxSecond user letter
Breath is deleted from cache database;The first user information logged in again is loaded into cache database.According to the above method
Data volume criterion stores the information of high frequency user for a long time in cache database, and the user information in cache database
Quantity increases and increases with user's login times, improves the cache hit rate that user logs in authentication, therefore can mention
Height improves the speed that user logs in authentication, moreover it is possible to save memory headroom, save hardware investment.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, will make below to required in the embodiment of the present invention
Attached drawing is briefly described, for those of ordinary skill in the art, without creative efforts, also
Other drawings may be obtained according to these drawings without any creative labor.
Fig. 1 is mobile subscriber's Verification System structural schematic diagram of the embodiment of the present invention;
Fig. 2 is that the user of the embodiment of the present invention logs in authentication services flow diagram;
Fig. 3 is that the user of the embodiment of the present invention logs in the schematic block diagram of method for authenticating;
Fig. 4 is that the user of the embodiment of the present invention logs in the structural block diagram of authentication device;
Fig. 5 is that the user of the embodiment of the present invention logs in the structural schematic diagram of authentication device.
Specific embodiment
The feature and exemplary embodiment of various aspects of the invention is described more fully below, in order to make mesh of the invention
, technical solution and advantage be more clearly understood, below in conjunction with drawings and the specific embodiments, the present invention is carried out further detailed
Description.It should be understood that specific embodiment described herein is only configured to explain the present invention, it is not configured as limiting this hair
It is bright.To those skilled in the art, the present invention can be in the case where not needing some details in these details
Implement.The description of embodiment is preferably managed just for the sake of being provided by showing example of the invention of the invention below
Solution.
It should be noted that, in this document, relational terms such as first and second and the like are used merely to a reality
Body or operation are distinguished with another entity or operation, are deposited without necessarily requiring or implying between these entities or operation
In any actual relationship or order or sequence.Moreover, the terms "include", "comprise" or its any other variant are intended to
Non-exclusive inclusion, so that the process, method, article or equipment including a series of elements is not only wanted including those
Element, but also including other elements that are not explicitly listed, or further include for this process, method, article or equipment
Intrinsic element.In the absence of more restrictions, the element limited by sentence " including ... ", it is not excluded that including
There is also other identical elements in the process, method, article or equipment of the element.
In order to solve prior art problem, the embodiment of the invention provides a kind of users to log in method for authenticating, device, equipment
And computer storage medium.User's login method for authenticating is provided for the embodiments of the invention first below to be introduced.
Fig. 2 shows the flow diagrams that user provided by one embodiment of the present invention logs in method for authenticating.Such as Fig. 2 institute
Show,
S101, in response to the log on request for the first time of the first user, after the completion of first subscription authentication, by described first
The information of user is stored into cache database and memory database;
Each user in the cache database in addition to first user is logged in the setting of blank duration by S102
For Δ T=Tnow-Tlt, wherein TnowFor the time that first user first logs into, TltFor in addition to first user
Each user is in TnowThe last login time before;
S103 is compared obtained multiple Δ T, using maximum Δ T as Tmax, and a length of T when blank will be logged inmax
The information of second user deleted from the cache database;
S104, when first user logs in again, based on first user saved in the cache database
Information authenticated, and the information of first user is stored again into the cache database.
The present invention will log in sky by loading the first user information logged in for the first time into cache database and database
Bai Shichang meets TmaxSecond user information extractd from cache database;The first user information for logging in again is loaded to slow
In deposit data library.According to the data volume criterion of the above method, the information of high frequency user is stored for a long time in cache database, and
And the increasing and increase with user's login times of the user information quantity in cache database.It improves user and logs in authentication
Cache hit rate, therefore can be improved and improve the speed that user logs in authentication, moreover it is possible to save memory headroom, save hardware and throw
Money.
In an embodiment of the present invention, its login time is updated after the first user logs in.Specifically, user is when logging in
Username and password is submitted, searches user information corresponding to the user in the buffer first, if finding corresponding user
Information is then hit and is returned the result, and updates login time, and this logon information is cached in internal storage data by user.
In an embodiment of the present invention, when the first user logs in again, the first user institute is searched in cache database
Corresponding information is searched corresponding to the first user if information corresponding to the first user is not present in memory database
Information, if information corresponding to the first user exist, the information of the first user is loaded into cache database.Specifically
Ground goes in memory database to search, find if not finding user information corresponding to the user in cache database
Corresponding user information is pulled later to be stored into caching.
In an embodiment of the present invention, if all not finding corresponding user information in caching and database,
The user information of the user is cached in database and internal storage data, and extracts apart from present time maximum Tmax=Tnow-
TltUser information, wherein TltIt is set as user's last time login time.
In an embodiment of the present invention, when user's Modify password, modification user corresponding user's letter in the database
Breath record, while deleting user's corresponding user information record in the buffer.Specifically, if user has the feelings of Modify password
Condition occurs, then modifies user's corresponding user information record in the database, while it is corresponding in the buffer to delete user
User information record, therefore when being first logged into after user's Modify password, corresponding user information need to be found from database.
It defines a length of when user averagely authenticates
WhereinFor the duration of cache hit,The duration that do not order in the buffer.
Based on this, the present invention is considered using user's login times as attribute in the logic of the replacement in caching, for replacing
Principle is changed to take into account using user's login times as attribute.Simultaneously using time and number as caching extension and contraction control point.?
While improving hit rate, memory headroom is further saved, to save hardware investment.
Firstly, memory database starts, first subscription authentication, subscription authentication finishes, the information such as the password of user is added
It is downloaded in internal storage data, while increasing user's login times N after data tuple and executing N=N+1 operation.And to flexible control
Data control label N processedtExecute Nt=Nt-1.Building simultaneously is based on number sequence B+ tree.
Wherein, if extension and contraction control data control label NtThere is new subscription authentication in >=0, by user cache to internal storage data
In, the child node of tree is found, if extension and contraction control data control label Nt=0, there is new subscription authentication, by user cache to memory number
In.It removes in the child node under most apart from present time maximum T simultaneouslymax=Tnow-TltWherein TltThis node is last
Login time.Because sorting according to number, therefore bottom child node is the smallest node of login times.
Secondly, the control method T for the leaf removedmaxIt is in advance in default.N can also be passed throughtIt indirectly controls.Control
Method processed is setting timer TM0, as starting timer TM0When, for more than TmaxLeaf node extractd.
Again, the control method for removing leaf is extension and contraction control data control label NtThreshold value setting, work as extension and contraction control
Data control label NtWhen=0, is not carrying out being inserted into newly-increased operation, but be replaced operation.Ensure residence data in memory
For high-frequency user.
Finally, for NtAnd TmaxSetting jointly controls unit Ut&maxAfter having new subscription authentication.Meet NtOr TmaxNumber
It will be picked-off according to node.And new data enter in memory database.
The user that Fig. 4 show the embodiment of the present invention logs in the structural block diagram of authentication device, method shown in processing unit 200
Include:
User logs in processing module 210, complete in the first subscription authentication for the log on request for the first time in response to the first user
Cheng Hou stores the information of the first user into cache database and memory database;
Logon information processing module 220, for logging in each user in cache database in addition to the first user
Blank duration is set as Δ T=Tnow-Tlt, wherein TnowFor the time that the first user first logs into, TltFor except the first user it
Outer each user is in TnowThe last login time before;
User information removing module 230, for being compared to obtained multiple Δ T, using maximum Δ T as Tmax, and
A length of T when blank will be logged inmaxThe information of second user deleted from cache database;
Subscription authentication processing module 240, for when the first user logs in again, based on the institute saved in cache database
The information for stating the first user authenticates, and the information of the first user is stored into cache database again.
Fig. 5 shows the hardware structural diagram that user provided in an embodiment of the present invention logs in authentication.
It may include processor 301 and the memory 302 for being stored with computer program instructions that user, which logs in authentication device,.
Specifically, above-mentioned processor 301 may include central processing unit (CPU) or specific integrated circuit
(Application Specific Integrated Circuit, ASIC), or may be configured to implement implementation of the present invention
One or more integrated circuits of example.
Memory 302 may include the mass storage for data or instruction.For example it rather than limits, memory
302 may include hard disk drive (Hard Disk Drive, HDD), floppy disk drive, flash memory, CD, magneto-optic disk, tape or logical
With the combination of universal serial bus (Universal Serial Bus, USB) driver or two or more the above.It is closing
In the case where suitable, memory 302 may include the medium of removable or non-removable (or fixed).In a suitable case, it stores
Device 302 can be inside or outside synthesized gateway disaster tolerance equipment.In a particular embodiment, memory 302 is nonvolatile solid state
Memory.In a particular embodiment, memory 302 includes read-only memory (ROM).In a suitable case, which can be
ROM, programming ROM (PROM), erasable PROM (EPROM), the electric erasable PROM (EEPROM), electrically rewritable of masked edit program
The combination of ROM (EAROM) or flash memory or two or more the above.
Processor 301 is by reading and executing the computer program instructions stored in memory 302, to realize above-mentioned implementation
Any one user in example logs in method for authenticating.
In one example, user, which logs in authentication device, may also include communication interface 303 and bus 310.Wherein, such as Fig. 5
Shown, processor 301, memory 302, communication interface 303 connect by bus 310 and complete mutual communication.
Communication interface 303 is mainly used for realizing in the embodiment of the present invention between each module, device, unit and/or equipment
Communication.
Bus 310 includes hardware, software or both, and the component that user logs in authentication device is coupled to each other together.It lifts
It for example rather than limits, bus may include accelerated graphics port (AGP) or other graphics bus, enhancing Industry Standard Architecture
(EISA) bus, front side bus (FSB), super transmission (HT) interconnection, Industry Standard Architecture (ISA) bus, infinite bandwidth interconnect, are low
Number of pins (LPC) bus, memory bus, micro- channel architecture (MCA) bus, peripheral component interconnection (PCI) bus, PCI-
Express (PCI-X) bus, Serial Advanced Technology Attachment (SATA) bus, Video Electronics Standards Association part (VLB) bus or
The combination of other suitable buses or two or more the above.In a suitable case, bus 310 may include one
Or multiple buses.Although specific bus has been described and illustrated in the embodiment of the present invention, the present invention considers any suitable bus
Or interconnection.
The user, which logs in authentication device, can execute the login method for authenticating of the user in the embodiment of the present invention, to realize knot
The user for closing Fig. 2 and Fig. 4 description logs in method for authenticating and device.
In addition, logging in method for authenticating in conjunction with the user in above-described embodiment, the embodiment of the present invention can provide a kind of computer
Storage medium is realized.Computer program instructions are stored in the computer storage medium;The computer program instructions are processed
Device realizes that any one user in above-described embodiment logs in method for authenticating when executing.
It should be clear that the invention is not limited to specific configuration described above and shown in figure and processing.
For brevity, it is omitted here the detailed description to known method.In the above-described embodiments, several tools have been described and illustrated
The step of body, is as example.But method process of the invention is not limited to described and illustrated specific steps, this field
Technical staff can be variously modified, modification and addition after understanding spirit of the invention, or suitable between changing the step
Sequence.
Functional block shown in structures described above block diagram can be implemented as hardware, software, firmware or their group
It closes.When realizing in hardware, it may, for example, be electronic circuit, specific integrated circuit (ASIC), firmware appropriate, insert
Part, function card etc..When being realized with software mode, element of the invention is used to execute program or the generation of required task
Code section.Perhaps code segment can store in machine readable media program or the data-signal by carrying in carrier wave is passing
Defeated medium or communication links are sent." machine readable media " may include any medium for capableing of storage or transmission information.
The example of machine readable media includes electronic circuit, semiconductor memory devices, ROM, flash memory, erasable ROM (EROM), soft
Disk, CD-ROM, CD, hard disk, fiber medium, radio frequency (RF) link, etc..Code segment can be via such as internet, inline
The computer network of net etc. is downloaded.
It should also be noted that, the exemplary embodiment referred in the present invention, is retouched based on a series of step or device
State certain methods or system.But the present invention is not limited to the sequence of above-mentioned steps, that is to say, that can be according in embodiment
The sequence referred to executes step, may also be distinct from that the sequence in embodiment or several steps are performed simultaneously.
The above description is merely a specific embodiment, it is apparent to those skilled in the art that,
For convenience of description and succinctly, the system, module of foregoing description and the specific work process of unit can refer to preceding method
Corresponding process in embodiment, details are not described herein.It should be understood that scope of protection of the present invention is not limited thereto, it is any to be familiar with
Those skilled in the art in the technical scope disclosed by the present invention, can readily occur in various equivalent modifications or substitutions,
These modifications or substitutions should be covered by the protection scope of the present invention.
Claims (13)
1. a kind of user logs in method for authenticating characterized by comprising
In response to the log on request for the first time of the first user, after the completion of first subscription authentication, by the letter of first user
Breath is stored into cache database and memory database;
Δ T=is set by the blank duration that logs in of each user in the cache database in addition to first user
Tnow-Tlt, wherein TnowFor the time that first user first logs into, TltIt is described each in addition to first user
User is in TnowThe last login time before;
Obtained multiple Δ T are compared, using maximum Δ T as Tmax, and a length of T when blank will be logged inmaxSecond use
The information at family is deleted from the cache database;
When first user logs in again, the information based on first user saved in the cache database is carried out
Authentication, and the information of first user is stored again into the cache database.
2. the method according to claim 1, wherein the method also includes: stepped on again in first user
Lu Shi searches information corresponding to first user in the cache database, if corresponding to first user
Information exists, then passes through authentication.
3. the method according to claim 1, wherein the method also includes: stepped on again in first user
Lu Shi searches information corresponding to first user in the cache database, if corresponding to first user
Information is not present, then searches information corresponding to first user in the memory database, if first user
Corresponding information exists, then the information of first user is loaded into the cache database.
4. the method according to claim 1, wherein if in the cache database and the inner data library
In there is no information corresponding to first user, then by the information storage of first user to the cache database
In the memory database.
5. the method according to claim 1, wherein the method also includes being arranged timer TM0, when starting is fixed
When device TM0When, blank duration will be logged in and reach TM0User information deleted from the cache database.
6. the method according to claim 1, wherein the method also includes: after first user logs in
Update its login time.
7. the method according to claim 1, wherein the method also includes: the login times of user are denoted as
Login times are updated to N=N+1 when users log on by N.
8. the method according to claim 1, wherein the method also includes login times structures based on user
Achievement data structure B+ tree.
9. the method according to claim 1, wherein the method also includes modifying when user's Modify password
User's corresponding user information record in the database, while deleting user's user information corresponding in cache database
Record.
10. according to the method described in claim 9, it is characterized in that, delaying when being first logged into after user's Modify password from described
Corresponding user information is searched in deposit data library.
11. a kind of user logs in authentication device, which is characterized in that described device includes:
User logs in processing module, for the log on request for the first time in response to the first user, completes in first subscription authentication
Afterwards, the information of first user is stored into cache database and memory database;
Logon information processing module, for logging in each user in the cache database in addition to first user
Blank duration is set as Δ T=Tnow-Tlt, wherein TnowFor the time that first user first logs into, TltFor except described
Each user except one user is in TnowThe last login time before;
User information removing module, for being compared to obtained multiple Δ T, using maximum Δ T as Tmax, and will log in
A length of T when blankmaxThe information of second user deleted from the cache database;
Subscription authentication processing module, for when first user logs in again, based on what is saved in the cache database
The information of first user authenticates, and the information of first user is stored again into the cache database.
12. a kind of calculating equipment, which is characterized in that the equipment includes: processor and is stored with computer program instructions
Memory;The processor realizes the user as described in claim 1-10 any one when executing the computer program instructions
Log in method for authenticating.
13. a kind of computer storage medium, which is characterized in that be stored with computer program in the computer storage medium and refer to
It enables, realizes that the user as described in claim 1-10 any one logs in mirror when the computer program instructions are executed by processor
Power method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811548508.XA CN109361714B (en) | 2018-12-18 | 2018-12-18 | User login authentication method, device, equipment and computer storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811548508.XA CN109361714B (en) | 2018-12-18 | 2018-12-18 | User login authentication method, device, equipment and computer storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109361714A true CN109361714A (en) | 2019-02-19 |
CN109361714B CN109361714B (en) | 2021-11-16 |
Family
ID=65329743
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811548508.XA Active CN109361714B (en) | 2018-12-18 | 2018-12-18 | User login authentication method, device, equipment and computer storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109361714B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110782559A (en) * | 2019-10-16 | 2020-02-11 | 浙江大华技术股份有限公司 | Access control device, access control authentication method, access control authentication device and storage medium |
CN115134134A (en) * | 2022-06-23 | 2022-09-30 | 中国民航信息网络股份有限公司 | Information processing method, device and equipment |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060187908A1 (en) * | 2003-06-18 | 2006-08-24 | Hitachi, Ltd. | Network system and its switches |
CN1866895A (en) * | 2006-06-12 | 2006-11-22 | 北京金山数字娱乐科技有限公司 | User log-on method and system in network game |
CN101075241A (en) * | 2006-12-26 | 2007-11-21 | 腾讯科技(深圳)有限公司 | Method and system for processing buffer |
CN101431594A (en) * | 2007-11-07 | 2009-05-13 | 富士施乐株式会社 | Information processing device, information processing method |
US20140157376A1 (en) * | 2012-12-03 | 2014-06-05 | Aruba Networks, Inc. | System and method for maintaining captive portal user authentication |
US20160112419A1 (en) * | 2013-06-25 | 2016-04-21 | Huawei Technologies Co., Ltd. | Account Login Method, Device, and System |
CN106487744A (en) * | 2015-08-25 | 2017-03-08 | 北京京东尚科信息技术有限公司 | A kind of Shiro verification method based on Redis storage |
CN107147660A (en) * | 2017-06-01 | 2017-09-08 | 上海斐讯数据通信技术有限公司 | A kind of efficient login authentication method of mass users and system |
CN107395679A (en) * | 2017-06-23 | 2017-11-24 | 上海斐讯数据通信技术有限公司 | Magnanimity authentication information store method and system, mass users authentication method and system |
-
2018
- 2018-12-18 CN CN201811548508.XA patent/CN109361714B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060187908A1 (en) * | 2003-06-18 | 2006-08-24 | Hitachi, Ltd. | Network system and its switches |
CN1866895A (en) * | 2006-06-12 | 2006-11-22 | 北京金山数字娱乐科技有限公司 | User log-on method and system in network game |
CN101075241A (en) * | 2006-12-26 | 2007-11-21 | 腾讯科技(深圳)有限公司 | Method and system for processing buffer |
CN101431594A (en) * | 2007-11-07 | 2009-05-13 | 富士施乐株式会社 | Information processing device, information processing method |
US20140157376A1 (en) * | 2012-12-03 | 2014-06-05 | Aruba Networks, Inc. | System and method for maintaining captive portal user authentication |
US20160112419A1 (en) * | 2013-06-25 | 2016-04-21 | Huawei Technologies Co., Ltd. | Account Login Method, Device, and System |
CN106487744A (en) * | 2015-08-25 | 2017-03-08 | 北京京东尚科信息技术有限公司 | A kind of Shiro verification method based on Redis storage |
CN107147660A (en) * | 2017-06-01 | 2017-09-08 | 上海斐讯数据通信技术有限公司 | A kind of efficient login authentication method of mass users and system |
CN107395679A (en) * | 2017-06-23 | 2017-11-24 | 上海斐讯数据通信技术有限公司 | Magnanimity authentication information store method and system, mass users authentication method and system |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110782559A (en) * | 2019-10-16 | 2020-02-11 | 浙江大华技术股份有限公司 | Access control device, access control authentication method, access control authentication device and storage medium |
CN115134134A (en) * | 2022-06-23 | 2022-09-30 | 中国民航信息网络股份有限公司 | Information processing method, device and equipment |
Also Published As
Publication number | Publication date |
---|---|
CN109361714B (en) | 2021-11-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10409828B2 (en) | Methods and apparatus for incremental frequent subgraph mining on dynamic graphs | |
CN103154943B (en) | The search based on enterprise of new data and the data for updating | |
US10042875B2 (en) | Bloom filter index for device discovery | |
US9129010B2 (en) | System and method of partitioned lexicographic search | |
US20070201458A1 (en) | System and method for implementing ACLs using multiple hash-trie-key tables | |
CN106569963A (en) | Buffering method and buffering device | |
CN109361714A (en) | User logs in method for authenticating, device, equipment and computer storage medium | |
US11681770B2 (en) | Determining whether to process identified uniform resource locators | |
US7934093B2 (en) | Assigning security levels to a shared component | |
US20210286730A1 (en) | Method, electronic device and computer program product for managing cache | |
CN113051448A (en) | Data processing method and device, electronic equipment and storage medium | |
US8140499B2 (en) | Context based cache infrastructure to enable subset query over a cached object | |
CN115114335A (en) | Software application multi-level caching and flow filtering method | |
US7509461B1 (en) | Method and apparatus for intelligent buffer cache pre-emption | |
US20170329705A1 (en) | Determining a Data Layout in a Log Structured Storage System | |
WO2018001120A1 (en) | Method and device facilitating expansion of primary payment instruments | |
CN105897931B (en) | Network exempts from method of flow control and device | |
CN113010747B (en) | Information matching method, device, equipment and storage medium | |
CN111865576B (en) | Method and device for synchronizing URL classification data | |
CN110413215B (en) | Method, apparatus and computer program product for obtaining access rights | |
US10223404B2 (en) | Efficient tracking of an alternate global update and read values using exception lists | |
US20130290378A1 (en) | Adaptive probabilistic indexing with skip lists | |
CN109981540A (en) | Firewall data optimization methods, device, computer equipment and readable storage medium storing program for executing | |
US11586604B2 (en) | In-memory data structure for data access | |
CN111177157B (en) | Account blacklist detection method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |