CN109361714B - User login authentication method, device, equipment and computer storage medium - Google Patents

User login authentication method, device, equipment and computer storage medium Download PDF

Info

Publication number
CN109361714B
CN109361714B CN201811548508.XA CN201811548508A CN109361714B CN 109361714 B CN109361714 B CN 109361714B CN 201811548508 A CN201811548508 A CN 201811548508A CN 109361714 B CN109361714 B CN 109361714B
Authority
CN
China
Prior art keywords
user
login
information
database
cache database
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811548508.XA
Other languages
Chinese (zh)
Other versions
CN109361714A (en
Inventor
徐朋朋
王鑫
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
China Mobile Group Jiangsu Co Ltd
Original Assignee
China Mobile Communications Group Co Ltd
China Mobile Group Jiangsu Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd, China Mobile Group Jiangsu Co Ltd filed Critical China Mobile Communications Group Co Ltd
Priority to CN201811548508.XA priority Critical patent/CN109361714B/en
Publication of CN109361714A publication Critical patent/CN109361714A/en
Application granted granted Critical
Publication of CN109361714B publication Critical patent/CN109361714B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations

Abstract

The invention discloses a user login authentication method, a user login authentication device, user login authentication equipment and a computer storage medium. The method comprises the following steps: in response to the firstAfter the first user authentication is completed, the information of the first user is stored in a cache database and a memory database; setting the login blank time length of each user except the first user in the cache database to be delta T-Tnow‑TltComparing the obtained plurality of Δ T, and defining the maximum Δ T as TmaxAnd the blank time length of login is TmaxThe information of the second user is deleted from the cache database; and when the first user logs in again, authenticating based on the information of the first user stored in the cache database, and storing the information of the first user in the cache database again. According to the embodiment of the invention, the speed of user login authentication is improved, the memory space can be saved, and the hardware investment is saved.

Description

User login authentication method, device, equipment and computer storage medium
Technical Field
The invention belongs to the technical field of data processing, and particularly relates to a user login authentication method, device, equipment and computer storage medium.
Background
At present, the service carried by the telecommunication operator system is increased every day, and the operation pressure is huge. The user authentication system of a certain telecom operator carries the login authentication service of hundreds of millions of users in the city every day. The system comprises more than 20 authentication services of a system, such as an online business hall, a palm business hall, a WAP business hall, a CRM terminal, an agent channel and the like. The authentication times are up to 3000 ten thousand per day. The system has large bearing pressure, particularly in the period of inquiring service by a user at the bottom of a month, the peak period of changing the service and the period of sending out accounts by the user at the beginning of the month, the pressure is huge, nearly 5000 ten thousand requests are born each day, the operation pressure is huge due to high-level operation of the system, and the risk of failure exists all the time. The current system uses the principle of local city storage, clusters numbers according to local cities, and improves the access speed through a memory cache technology. But as business evolves, the more the system pressure increases. The system needs to be continuously expanded. The requirements on hardware are higher and higher, and the maintenance cost of the system is also higher and higher.
In addition, the system has large workload of service support and frequent interaction with other subsystems. And each time the system needs to search in the full-user database according to the city and the number. Resulting in a large cardinality of retrieved data. The hit rate gradually decreases as the number of users increases.
Fig. 1 shows a flow chart of a conventional login authentication service system, where a front-end accesses: the front end refers to a visual window for a user to input a user name and a password and check and submit; a memory database: at present, data in the memory database is increased explosively, the memory database consumes more and more memory and more hardware resources are consumed along with the increasing blockage of the number of users. The demand for cost is growing rapidly. However, the data in the memory database is the cache of the data authenticated within N minutes at present, and the cache hit rate is high under the condition that the network is unstable. And under the condition that the network is stable, the user can complete the service operation through one-time authentication, and the probability of logging in N minutes is low.
Previous solutions rely on database indexing and indexing effects in-memory databases. Whether the user can hit the in-memory database depends on whether the user has logged in within N minutes before the current authentication time, and the characteristic of the characteristic attribute of the user is not considered. The cache hit rate is low. The current technical process is as follows: a user submits a user name and a password; searching in the cache, if the result is found, hitting and returning the result, and updating the login time; if the cache is not hit, searching in the database, and pulling the cache for storage after the database is searched; data that was not registered for more than N minutes was processed. The cache is requested to be removed, so that the space is saved; and after the password operation of the user, modifying the database record and deleting the cache record. The user password record is read again from the database.
The current treatment mode has the following defects: the method is seriously dependent on the stretch control point of N minutes; if the average response speed needs to be improved, the size of N must be prolonged; the size of N is positively correlated with the user quantity, and the user data occupies the storage space; the expansion and contraction of the memory database are seriously dependent on hardware resources, and the consumption of the hardware is overlarge.
Disclosure of Invention
The embodiment of the invention provides a user login authentication method, a device, equipment and a computer storage medium, which can improve the high-frequency user login authentication speed of a system, save the memory space and save the hardware investment.
In one aspect, an embodiment of the present invention provides a user login authentication method, where the method includes:
responding to a first login request of a first user, and storing information of the first user into a cache database and a memory database after authentication of the first user is completed;
setting the login blank time length of each user except the first user in the cache database to be delta T-Tnow-TltWherein, TnowTime of first login for first user, TltFor each user other than the first user at TnowPrevious last login time;
comparing the obtained plurality of Δ T, and defining the maximum Δ T as TmaxAnd the blank time length of login is TmaxThe information of the second user is deleted from the cache database;
and when the first user logs in again, authenticating based on the information of the first user stored in the cache database, and storing the information of the first user in the cache database again.
According to the user login authentication method provided by the embodiment of the invention, when a first user logs in, the method further comprises the following steps: and searching the user information corresponding to the first user in the cache database, and if the user information corresponding to the first user is found, passing the authentication.
According to the user login authentication method of the embodiment of the invention, the method further comprises the following steps: when the first user logs in again, searching the information corresponding to the first user in the cache database, if the information corresponding to the first user does not exist, searching the information corresponding to the first user in the memory database, and if the information corresponding to the first user exists, loading the information of the first user into the cache database.
According to the user login authentication method provided by the embodiment of the invention, if the information corresponding to the first user does not exist in the cache database and the inner side database, the information of the first user is stored in the cache database and the memory database.
The user login authentication method according to the embodiment of the invention also comprises the step of setting a timer TM0When starting the timer TM0When the time is up to TM, the time of the login blank reaches0Is deleted from the caching database.
According to the user login authentication method of the embodiment of the invention, the method further comprises the following steps: and updating the login time of the first user after the first user logs in.
According to the user login authentication method of the embodiment of the invention, the method further comprises the following steps: the login frequency of the user is recorded as N, and when the user logs in, the login frequency is updated to be N + 1.
According to the user login authentication method of the embodiment of the invention, the method further comprises the following steps: and building a tree data structure B + tree based on the login times of the user.
According to the user login authentication method provided by the embodiment of the invention, when the user modifies the password, the user information record corresponding to the user in the database is modified, and the user information record corresponding to the user in the cache is deleted.
According to the user login authentication method provided by the embodiment of the invention, when the user logs in for the first time after modifying the password, the corresponding user information is searched from the database.
On the other hand, the embodiment of the invention provides a user login authentication device, which comprises:
the user login processing module is used for responding to a first login request of a first user and storing the information of the first user into a cache database and a memory database after the authentication of the first user is completed;
a login information processing module, configured to set a login blank duration of each user except the first user in the cache database to be Δ T ═ Tnow-TltWherein, TnowTime of first login, T, of the first userltAt T for said each user other than said first usernowThe last one beforeA secondary login time;
a user information deleting module for comparing the obtained multiple delta T and taking the maximum delta T as TmaxAnd the blank time length of login is TmaxThe information of the second user is deleted from the cache database;
and the user authentication processing module is used for authenticating based on the information of the first user stored in the cache database when the first user logs in again, and storing the information of the first user in the cache database again.
In another aspect, an embodiment of the present invention provides a fast authentication device for high-frequency user login of an authentication system, where the device includes: a processor and a memory storing computer program instructions; the processor, when executing the computer program instructions, implements the settlement method as provided by embodiments of the present invention.
In still another aspect, an embodiment of the present invention provides a computer storage medium, on which computer program instructions are stored, and when the computer program instructions are executed by a processor, the computer program instructions implement the processing method provided by the embodiment of the present invention.
The user login authentication method, the device, the equipment and the computer storage medium of the embodiment of the invention load the first user information of the first login into the cache database and the memory database, and the login blank time length is enabled to meet TmaxThe second user information is deleted from the cache database; and loading the first user information logged in again into a cache database. According to the data volume criterion of the method, the information of the high-frequency user is stored in the cache database for a long time, the number of the user information in the cache database is increased along with the increase of the login times of the user, and the cache hit rate of the login authentication of the user is improved, so that the login authentication speed of the user can be improved, the memory space can be saved, and the hardware investment can be saved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings required to be used in the embodiments of the present invention will be briefly described below, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a schematic diagram of a mobile subscriber authentication system according to an embodiment of the present invention;
FIG. 2 is a schematic diagram of a user login authentication service flow according to an embodiment of the present invention;
FIG. 3 is a schematic block diagram illustrating the principles of a user login authentication method according to an embodiment of the present invention;
FIG. 4 is a block diagram of a user login authentication apparatus according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of a user login authentication device according to an embodiment of the present invention.
Detailed Description
Features and exemplary embodiments of various aspects of the present invention will be described in detail below, and in order to make objects, technical solutions and advantages of the present invention more apparent, the present invention will be further described in detail below with reference to the accompanying drawings and specific embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not to be construed as limiting the invention. It will be apparent to one skilled in the art that the present invention may be practiced without some of these specific details. The following description of the embodiments is merely intended to provide a better understanding of the present invention by illustrating examples of the present invention.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
In order to solve the problems in the prior art, embodiments of the present invention provide a method, an apparatus, a device, and a computer storage medium for user login authentication. The following first introduces the user login authentication method provided by the embodiment of the present invention.
Fig. 2 is a flowchart illustrating a user login authentication method according to an embodiment of the present invention. As shown in figure 2 of the drawings, in which,
s101, responding to a first login request of a first user, and storing information of the first user into a cache database and a memory database after authentication of the first user is completed;
s102, setting login blank duration of each user except the first user in the cache database to be delta T-Tnow-TltWherein, TnowTime of first login, T, of the first userltAt T for said each user other than said first usernowPrevious last login time;
s103, comparing the obtained plurality of delta T, and taking the maximum delta T as TmaxAnd the blank time length of login is TmaxThe information of the second user is deleted from the cache database;
and S104, when the first user logs in again, authenticating based on the information of the first user stored in the cache database, and storing the information of the first user in the cache database again.
The invention loads the first user information logged in for the first time into the cache database and the database, and the blank time of logging in is satisfied with TmaxRemoving the second user information from the cache database; and loading the first user information logged in again into a cache database. According to the data volume criterion of the method, the information of the high-frequency users is stored in the cache database for a long time, and the number of the user information in the cache database is increased along with the increase of the login times of the users. Cache hit for improving user login authenticationTherefore, the speed of user login authentication can be improved, the memory space can be saved, and the hardware investment can be saved.
In an embodiment of the invention, the login time of the first user is updated after the first user logs in. Specifically, a user submits a user name and a password during login, user information corresponding to the user is searched in a cache, if the corresponding user information is found, a return result is hit, login time is updated, and the login information of the user is cached in memory data.
In the embodiment of the invention, when the first user logs in again, the information corresponding to the first user is searched in the cache database, if the information corresponding to the first user does not exist, the information corresponding to the first user is searched in the memory database, and if the information corresponding to the first user exists, the information of the first user is loaded into the cache database. Specifically, if the user information corresponding to the user is not found in the cache database, the user information is searched in the memory database, and the user information corresponding to the user is pulled to the cache for storage.
In the embodiment of the invention, if the corresponding user information is not found in the cache and the database, the user information of the user is cached in the database and the memory data, and the maximum T of the current time is removedmax=Tnow-TltUser information of (2), wherein TltThe last login time of the user is set.
In the embodiment of the invention, when the user modifies the password, the user information record corresponding to the user in the database is modified, and the user information record corresponding to the user in the cache is deleted. Specifically, if the user has a password modification situation, the user information record corresponding to the user in the database is modified, and the user information record corresponding to the user in the cache is deleted, so that when the user logs in for the first time after modifying the password, the corresponding user information needs to be searched from the database.
Defining the average authentication duration of the user as
Figure BDA0001909994870000071
Wherein
Figure BDA0001909994870000072
In order to be the length of the cache hit,
Figure BDA0001909994870000073
there is no length of time for the command in the cache.
Based on the above, the invention takes the user login times as the attribute into the logic of replacement in the cache, and takes the user login times as the attribute for the replacement principle. And meanwhile, time and times are used as cache expansion control points. The hit rate is improved, and meanwhile, the memory space is further saved, so that the hardware investment is saved.
Firstly, starting a memory database, authenticating a first user, loading information such as a user password into memory data after the user authentication is finished, and simultaneously increasing a user login time N to execute an operation of N-N +1 after a data tuple. And controls the flag N to the expansion control datatExecuting Nt=Nt-1. And meanwhile, constructing a B + tree based on time ordering.
Wherein, if the scaling control data controls the flag NtIf there is new user authentication, caching the user in the memory data, searching the subnode of the tree, if the expansion control data control mark NtAnd (0) authenticating the new user, and caching the user into the memory data. Simultaneously, the maximum T of the current time is taken off from the lowest child nodemax=Tnow-TltWherein T isltThe last time this node logged in. Because the nodes are sorted according to the times, the lowest child node is the node with the minimum login time.
Secondly, the control method T of the removed leavesmaxIs preset in the system. Or through NtAnd (4) indirect control. The control method is setting timer TM0When starting the timer TM0At time, for exceeding TmaxThe leaf node of (a) is removed.
Thirdly, the control method for removing the leaves is a flexible control data control mark NtWhen the scaling control data controls the flag NtWhen 0, the insertion addition operation is not performed, but the replacement operation is performed. And ensuring that the resident data in the memory is a high-frequency user.
Finally, for NtAnd TmaxSetting a joint control unit Ut&maxAnd when a new user is authenticated. Satisfies NtOr TmaxWill be dropped. And the new data is entered into the in-memory database.
Fig. 4 is a block diagram illustrating a structure of a user login authentication apparatus according to an embodiment of the present invention, wherein a processing apparatus 200 illustrates a method including:
the user login processing module 210 is configured to respond to a first login request of a first user, and store information of the first user into the cache database and the memory database after authentication of the first user is completed;
a login information processing module 220, configured to set a login blank duration of each user except the first user in the cache database to be Δ T ═ Tnow-TltWherein, TnowTime of first login for first user, TltFor each of said users other than the first user at TnowPrevious last login time;
a user information deleting module 230, configured to compare the obtained Δ ts, and take the largest Δ T as TmaxAnd the blank time length of login is TmaxThe information of the second user is deleted from the cache database;
and the user authentication processing module 240 is configured to authenticate the first user based on the information of the first user stored in the cache database when the first user logs in again, and store the information of the first user in the cache database again.
Fig. 5 is a schematic diagram illustrating a hardware structure of user login authentication according to an embodiment of the present invention.
The user login authentication device may comprise a processor 301 and a memory 302 storing computer program instructions.
In particular, the processor 301 may include a Central Processing Unit (CPU), or an Application Specific Integrated Circuit (ASIC), or may be configured as one or more Integrated circuits implementing embodiments of the present invention.
Memory 302 may include mass storage for data or instructions. By way of example, and not limitation, memory 302 may include a Hard Disk Drive (HDD), floppy Disk Drive, flash memory, optical Disk, magneto-optical Disk, tape, or Universal Serial Bus (USB) Drive or a combination of two or more of these. Memory 302 may include removable or non-removable (or fixed) media, where appropriate. The memory 302 may be internal or external to the integrated gateway disaster recovery device, where appropriate. In a particular embodiment, the memory 302 is a non-volatile solid-state memory. In a particular embodiment, the memory 302 includes Read Only Memory (ROM). Where appropriate, the ROM may be mask-programmed ROM, Programmable ROM (PROM), Erasable PROM (EPROM), Electrically Erasable PROM (EEPROM), electrically rewritable ROM (EAROM), or flash memory or a combination of two or more of these.
The processor 301 reads and executes the computer program instructions stored in the memory 302 to implement any one of the user login authentication methods in the above embodiments.
In one example, the user login authentication device may also include a communication interface 303 and a bus 310. As shown in fig. 5, the processor 301, the memory 302, and the communication interface 303 are connected via a bus 310 to complete communication therebetween.
The communication interface 303 is mainly used for implementing communication between modules, apparatuses, units and/or devices in the embodiment of the present invention.
Bus 310 includes hardware, software, or both to couple the components of the user login authentication device to each other. By way of example, and not limitation, a bus may include an Accelerated Graphics Port (AGP) or other graphics bus, an Enhanced Industry Standard Architecture (EISA) bus, a Front Side Bus (FSB), a Hypertransport (HT) interconnect, an Industry Standard Architecture (ISA) bus, an infiniband interconnect, a Low Pin Count (LPC) bus, a memory bus, a Micro Channel Architecture (MCA) bus, a Peripheral Component Interconnect (PCI) bus, a PCI-Express (PCI-X) bus, a Serial Advanced Technology Attachment (SATA) bus, a video electronics standards association local (VLB) bus, or other suitable bus or a combination of two or more of these. Bus 310 may include one or more buses, where appropriate. Although specific buses have been described and shown in the embodiments of the invention, any suitable buses or interconnects are contemplated by the invention.
The user login authentication device may execute the user login authentication method in the embodiment of the present invention, thereby implementing the user login authentication method and apparatus described in conjunction with fig. 2 and 4.
In addition, in combination with the user login authentication method in the above embodiment, the embodiment of the present invention may provide a computer storage medium to implement. The computer storage medium having computer program instructions stored thereon; the computer program instructions, when executed by a processor, implement any of the user login authentication methods in the above embodiments.
It is to be understood that the invention is not limited to the specific arrangements and instrumentality described above and shown in the drawings. A detailed description of known methods is omitted herein for the sake of brevity. In the above embodiments, several specific steps are described and shown as examples. However, the method processes of the present invention are not limited to the specific steps described and illustrated, and those skilled in the art can make various changes, modifications and additions or change the order between the steps after comprehending the spirit of the present invention.
The functional blocks shown in the above-described structural block diagrams may be implemented as hardware, software, firmware, or a combination thereof. When implemented in hardware, it may be, for example, an electronic circuit, an Application Specific Integrated Circuit (ASIC), suitable firmware, plug-in, function card, or the like. When implemented in software, the elements of the invention are the programs or code segments used to perform the required tasks. The program or code segments may be stored in a machine-readable medium or transmitted by a data signal carried in a carrier wave over a transmission medium or a communication link. A "machine-readable medium" may include any medium that can store or transfer information. Examples of a machine-readable medium include electronic circuits, semiconductor memory devices, ROM, flash memory, Erasable ROM (EROM), floppy disks, CD-ROMs, optical disks, hard disks, fiber optic media, Radio Frequency (RF) links, and so forth. The code segments may be downloaded via computer networks such as the internet, intranet, etc.
It should also be noted that the exemplary embodiments mentioned in this patent describe some methods or systems based on a series of steps or devices. However, the present invention is not limited to the order of the above-described steps, that is, the steps may be performed in the order mentioned in the embodiments, may be performed in an order different from the order in the embodiments, or may be performed simultaneously.
As described above, only the specific embodiments of the present invention are provided, and it can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes of the system, the module and the unit described above may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again. It should be understood that the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive various equivalent modifications or substitutions within the technical scope of the present invention, and these modifications or substitutions should be covered within the scope of the present invention.

Claims (13)

1. A user login authentication method is characterized by comprising the following steps:
responding to a first login request of a first user, and storing information of the first user into a cache database and a memory database after authentication of the first user is completed;
setting login blank duration of each user except the first user in the cache database to be delta T-Tnow-TltWherein, TnowTime of first login, T, of the first userltAt T for said each user other than said first usernowPrevious last login time;
comparing the obtained plurality of Δ T, and defining the maximum Δ T as TmaxAnd the blank time length of login is TmaxThe information of the second user is deleted from the cache database;
and when the first user logs in again, authenticating based on the information of the first user stored in the cache database, and storing the information of the first user into the cache database again.
2. The method of claim 1, further comprising: and when the first user logs in again, searching the information corresponding to the first user in the cache database, and if the information corresponding to the first user exists, passing authentication.
3. The method of claim 1, further comprising: when the first user logs in again, searching the information corresponding to the first user in the cache database, if the information corresponding to the first user does not exist, searching the information corresponding to the first user in the memory database, and if the information corresponding to the first user exists, loading the information of the first user into the cache database.
4. The method according to claim 1, wherein if the information corresponding to the first user does not exist in the cache database and the in-memory database, the information of the first user is stored in the cache database and the in-memory database.
5. The method of claim 1, further comprising setting a Timer (TM)0When starting the timer TM0When the time is up to TM, the time of the login blank reaches0Is deleted from the cache database.
6. The method of claim 1, further comprising: and updating the login time of the first user after the first user logs in.
7. The method of claim 1, further comprising: the login frequency of the user is recorded as N, and when the user logs in, the login frequency is updated to be N + 1.
8. The method of claim 1, further comprising: and building a tree data structure B + tree based on the login times of the user.
9. The method of claim 1, further comprising modifying the user information record corresponding to the user in the in-memory database and deleting the user information record corresponding to the user in the cache database when the user modifies the password.
10. The method of claim 9, wherein when the user logs in for the first time after modifying the password, the corresponding user information is searched from the in-memory database.
11. A user login authentication device, the device comprising:
the user login processing module is used for responding to a first login request of a first user and storing the information of the first user into a cache database and a memory database after the authentication of the first user is completed;
a login information processing module, configured to set a login blank duration of each user except the first user in the cache database to be Δ T ═ Tnow-TltWherein, TnowTime of first login, T, of the first userltAt T for said each user other than said first usernowPrevious last login time;
a user information deleting module for deleting the user information,comparing the obtained plurality of Δ T, and defining the maximum Δ T as TmaxAnd the blank time length of login is TmaxThe information of the second user is deleted from the cache database;
and the user authentication processing module is used for authenticating based on the information of the first user stored in the cache database when the first user logs in again, and storing the information of the first user in the cache database again.
12. A computing device, the device comprising: a processor and a memory storing computer program instructions; the processor, when executing the computer program instructions, implements the user login authentication method of any one of claims 1-10.
13. A computer-readable storage medium having computer program instructions stored thereon, which when executed by a processor implement the method of user login authentication according to any one of claims 1-10.
CN201811548508.XA 2018-12-18 2018-12-18 User login authentication method, device, equipment and computer storage medium Active CN109361714B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811548508.XA CN109361714B (en) 2018-12-18 2018-12-18 User login authentication method, device, equipment and computer storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811548508.XA CN109361714B (en) 2018-12-18 2018-12-18 User login authentication method, device, equipment and computer storage medium

Publications (2)

Publication Number Publication Date
CN109361714A CN109361714A (en) 2019-02-19
CN109361714B true CN109361714B (en) 2021-11-16

Family

ID=65329743

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811548508.XA Active CN109361714B (en) 2018-12-18 2018-12-18 User login authentication method, device, equipment and computer storage medium

Country Status (1)

Country Link
CN (1) CN109361714B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110782559A (en) * 2019-10-16 2020-02-11 浙江大华技术股份有限公司 Access control device, access control authentication method, access control authentication device and storage medium
CN115134134A (en) * 2022-06-23 2022-09-30 中国民航信息网络股份有限公司 Information processing method, device and equipment

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4278445B2 (en) * 2003-06-18 2009-06-17 株式会社日立製作所 Network system and switch
CN100534056C (en) * 2006-06-12 2009-08-26 北京金山数字娱乐科技有限公司 User log-on method and system in network game
CN100530186C (en) * 2006-12-26 2009-08-19 腾讯科技(深圳)有限公司 Method and system for processing buffer
JP4640402B2 (en) * 2007-11-07 2011-03-02 富士ゼロックス株式会社 Information processing apparatus and user authentication program
US9800503B2 (en) * 2012-12-03 2017-10-24 Aruba Networks, Inc. Control plane protection for various tables using storm prevention entries
CN104253686B (en) * 2013-06-25 2017-12-29 华为技术有限公司 Method, equipment and the system that account logs in
CN106487744B (en) * 2015-08-25 2020-06-05 北京京东尚科信息技术有限公司 Shiro verification method based on Redis storage
CN107147660A (en) * 2017-06-01 2017-09-08 上海斐讯数据通信技术有限公司 A kind of efficient login authentication method of mass users and system
CN107395679A (en) * 2017-06-23 2017-11-24 上海斐讯数据通信技术有限公司 Magnanimity authentication information store method and system, mass users authentication method and system

Also Published As

Publication number Publication date
CN109361714A (en) 2019-02-19

Similar Documents

Publication Publication Date Title
CN109361714B (en) User login authentication method, device, equipment and computer storage medium
CN110351115A (en) Reduce method, apparatus, computer equipment and the storage medium of network access time delay
CN107301215B (en) Search result caching method and device and search method and device
US20180165085A1 (en) System and method of managing application updates
CN113157198A (en) Method, apparatus and computer program product for managing a cache
CN107094160B (en) Method and system for downloading data file
CN112286559A (en) Upgrading method and device for vehicle-mounted intelligent terminal
CN105897931A (en) Network traffic-free control method and device
CN114172998B (en) File transmission method and device, electronic equipment and storage medium
CN111865576B (en) Method and device for synchronizing URL classification data
CN109976896B (en) Service re-ranking processing method and device
CN113360348A (en) Exception request processing method and device, electronic equipment and storage medium
CN110019671B (en) Method and system for processing real-time message
CN114692191A (en) Data desensitization method, device and storage system
CN111162920A (en) Ticket processing method and device of Internet of things
CN114697147B (en) Equipment searching method, device, equipment and storage medium
CN112235332A (en) Read-write switching method and device for cluster
CN114553894B (en) Data synchronization method, device, system and storage medium
CN112162991B (en) Intelligent management method and device for data
CN113852692B (en) Service determination method, device, equipment and computer storage medium
CN112866179B (en) Current limiting method and current limiting device
CN111328156B (en) Access network caching method, device, base station and medium
CN116094908A (en) Log file storage method, device, equipment and storage medium
CN107423375B (en) Application program searching method and device
CN117114836A (en) Service parameter configuration method, device, equipment, storage medium and program product

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant