Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Access control method and device

An access control and access request technology, applied in the field of network communication, can solve problems such as increasing SSO system load, application system paralysis, application server overload, etc., to achieve the effect of reducing overload, reducing access requests, and improving reliability

Active Publication Date: 2020-03-03
TENCENT TECH (SHENZHEN) CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the resources of the SSO system are limited. If the number of access requests that the SSO system needs to process exceeds the processing capacity of the SSO system, the SSO system will be overloaded. For example, the bandwidth capacity of a certain network segment in the SSO system is insufficient. Some network segments are congested, one or more application servers in the SSO system are overloaded, or the SSO server is overloaded, etc.
When the SSO system is overloaded, the access request sent by the client may not be processed in time, and if the client does not receive a response to the access request for a long time, it will resend the access request to the SSO system, which is inevitable. It also increases the load of the SSO system. Such a vicious circle may eventually cause the SSO system or some application systems in the SSO system to be paralyzed, affecting the reliability of the SSO system.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control method and device
  • Access control method and device
  • Access control method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The network architecture and business scenarios described in the embodiments of the present invention are to more clearly illustrate the technical solutions of the embodiments of the present invention, and do not constitute limitations on the technical solutions provided by the embodiments of the present invention. The evolution of the architecture and the emergence of new business scenarios, the technical solutions provided by the embodiments of the present invention are also applicable to similar technical problems.

[0032] For ease of understanding, a possible application scenario of the embodiment of the present application is introduced. see figure 1 , in this application scenario, the single sign-on (SSO, Single Sign On) system may include: an SSO server 101 and multiple application services may be connected to multiple application servers 102 through a network.

[0033] The SSO server 101 is associated with the plurality of application servers 102 , so that the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application provides an access control method and device. In this method, the SSO server determines that the current access control target business service is required, and determines that the target client that requests the target business service is currently prohibited; by sending a message to the target client , so that the target client intercepts the access request for the target business service. The method and device can improve the reliability of the SSO system.

Description

technical field [0001] The present application relates to the technical field of network communication, in particular to an access control method and device. Background technique [0002] Single sign-on (SSO, Single Sign On) refers to establishing a relationship between multiple application systems in a specific way, so that a user can access any one of the multiple application systems after logging in once. The SSO system may include application servers and SSO servers corresponding to multiple application systems, wherein the SSO server may provide unified login authentication for each application system, and forward the access request sent by the client to the application server of the application system. [0003] However, the resources of the SSO system are limited. If the number of access requests that the SSO system needs to process exceeds the processing capacity of the SSO system, the SSO system will be overloaded. For example, the bandwidth capacity of a certain net...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/08H04L29/06
CPCH04L63/0815H04L67/1001H04L67/60
Inventor 陈锐龙吴海松陈车前谢晋黄光西吴铭津
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products