Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for proxy client account authentication

A client and account technology, applied in the computer field, can solve problems such as user inconvenience

Active Publication Date: 2018-10-12
SANGFOR TECH INC
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If there are many client accounts to be proxied, they need to be manually configured one by one, which brings inconvenience to users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for proxy client account authentication
  • Method and device for proxy client account authentication
  • Method and device for proxy client account authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] The method for proxy client account authentication provided in the embodiment of the present invention can be applied to such as figure 1In the hardware environment shown. A client is installed on the terminal 102, and the client has a corresponding client account, and there may be multiple client accounts. A database proxy is installed on the load balancing device 104, and a database administrator account is pre-configured. The first database server 106 can implement the write operation of the database, and the second database server 108 can implement the read operation of the database. The client establishes a TCP (Transmission Control Protocol, Transmission Control Protocol) connection with the database agent, and the database agent establishes a TCP connection with the first database server 106 . The database proxy establishes a TCP connection with the first database server 108 . When the client account is authenticated with the first database server 106, the dat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for authenticating a proxy client account. The method comprises: acquiring analytic data of the client account and a first database server during authenticating; after the client account completes the authentication of the first database server, acquiring an encrypted password pre-stored in the first database server and corresponding to the client account by using a preconfigured database administrator account; calculating password intermediate data of the client account by using the analytic data and the encrypted password; generating a first authentication message according to the password intermediate data; and sending the first authentication message to a second database server, so that the second database server authenticates the client account. By adopting the method, the proxy client account and the second database server can be authenticated without manually configuring the client account and a clear-text password. Moreover, the invention further provides a device for authenticating a proxy client account.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a method and device for authenticating an account of a proxy client. Background technique [0002] In order to ensure the stability of the database, many databases currently have the function of reading and writing separation, which separates the operations of reading and writing to the database and corresponds to different database servers, that is, the write operation is performed through the database server host, and the read operation is performed through the database server backup machine. The client can write data to the database server host and read data from the database server standby through the database agent. Before the client accesses the database, it usually only sends an authentication request to the database server host, and after the authentication is completed, it does not continue to send the authentication request. Since the standby database server has not ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/083H04L63/0884
Inventor 周凯辛智敏
Owner SANGFOR TECH INC