Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Verification method and verification device

A verification method and a verification device technology, applied in the direction of electrical components, transmission systems, etc., can solve problems that affect system performance, session information cannot be shared, and achieve the effect of protecting interests

Inactive Publication Date: 2009-10-07
YONYOU NETWORK TECH
View PDF0 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] (1) Cannot work in a specific cluster environment
Because session information cannot be shared by default between multiple server instances, unless session replication technology is used, but this technology will seriously affect the performance of the system;
[0006] (2) Cannot work between multiple applications
Because each application can only manage its own session information and cannot share it with other applications

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verification method and verification device
  • Verification method and verification device
  • Verification method and verification device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] Hereinafter, referring to the preferred embodiments of the present invention in detail, examples of the preferred embodiments will be described based on the accompanying drawings.

[0022] figure 1 It is a flowchart of the verification method according to the present invention. Such as figure 1 As shown, the verification method for restricting repeated logins of the same user name in multiple applications in the B / S architecture according to the present invention includes: step S102, after the user logs in to the system using the account, the login server serves the user Generate a first login information identifier corresponding to the account; step S104, when other users log in using the same account, the login server generates a second login information identifier corresponding to the account, and sends the first login information The identifier is set to be invalid; and step S106, when the originally logged-in user accesses the system again, the system verifies the l...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a verification method to limit the repeated login with the same user name in multiple applications of the B / S architecture, including: after the user logs on the system with an account, the login server generates the first login information ID corresponding to the account for the user; when other users log on using the same account, the login server generates the first login information ID corresponding to the account and sets it as the invalid first login information ID; and when the original user pays another visit to the mentioned system, the system verifies the first login information ID through the mentioned login server, and determines whether the account has been logged on in other places according to the validity of the first login information ID. The verification method of this invention can limit the simultaneous system login by multiple users using the same account and can protect the interests of the service operator.

Description

Technical field [0001] The present invention relates to SaaS technology, and more specifically, to a verification method and a verification device for verifying user logins in multiple applications in a B / S architecture. Background technique [0002] SaaS is the abbreviation of Software-as-a-service (Software-as-a-service). It is a mode of providing software through the Internet. Users no longer need to purchase software, but instead rent Web-based software from providers to manage business operations. Activities, and there is no need to maintain the software, the service operator will have full authority to manage and maintain the software. [0003] In SaaS applications, users need to pay according to the number of authorizations purchased when accessing an application. However, some users only purchase one authorization number and multiple people use it at the same time. The traditional method can only control the user's access to a single application and cannot control between...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
Inventor 伍国锋题华龙
Owner YONYOU NETWORK TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products