Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Shiro authentication method based on Redis storage

A verification method, login verification technology, applied in advanced technology, electrical components, transmission systems, etc., to achieve the effect of solving redundancy and data deviation, reliable storage, and improving verification efficiency

Active Publication Date: 2017-03-08
BEIJING JINGDONG SHANGKE INFORMATION TECH CO LTD +1
View PDF4 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0016] In view of this, the present invention provides a Shiro verification method based on Redis storage, which stores data based on Redis caching technology, and the storage method is more flexible. By placing the session in Redis for caching, memory consumption can be reduced to solve the problem of memory overflow. Problem: Introduce an expiration time algorithm to automatically clear the cache, improving the efficiency and hit rate of the cache, thereby ensuring efficient and reliable data storage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Shiro authentication method based on Redis storage
  • Shiro authentication method based on Redis storage
  • Shiro authentication method based on Redis storage

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] Exemplary embodiments of the present invention are described below in conjunction with the accompanying drawings, which include various details of the embodiments of the present invention to facilitate understanding, and they should be regarded as exemplary only. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the invention. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.

[0035] The present invention is a secondary development of the Shiro framework. By modifying some core classes in the application programming interface provided by the Shiro framework, the Shiro framework supports Realm storage for Redis.

[0036] figure 2 It is a schematic diagram of main steps of a Shiro verification method based on Redis storage according to an embodime...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a Shiro authentication method based on Redis storage. Through placing a session into an Redis for caching, the memory consumption can be reduced to solve the problem of memory overflow; and as an expiration time algorithm is introduced to automatically eliminate a cache, the efficiency and the hit rate of the cache are improved, thereby guaranteeing data to be stored efficiently and reliably. The method comprises the steps of carrying out encapsulation on identification information of a user according to login parameters of the user to generate a unique identifier; according to the unique identifier, finding whether the corresponding cache exists in an Redis server; if the corresponding cache exists, obtaining login information of the unique identifier and encapsulating login successful information; and if the corresponding cache does not exist, calling a login authentication method and an authority authentication method for authentication, if the authentication is passed, encapsulating the login successful information, and if the authentication is failed, prompting the login authentication is failed.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a Shiro verification method based on Redis storage. Background technique [0002] With the birth of a series of new Internet products such as e-commerce, social networks, and microblogs, Internet applications based on the Web environment are becoming more and more extensive. In the process of enterprise informatization, various applications are set up on the Web platform, and the rapid development of Web services has also attracted the strong attention of hackers, followed by the emergence of Web security threats. Hackers use the loopholes of the website operating system and the SQL injection loopholes of the Web service program to obtain the control authority of the Web server, tamper with the content of the webpage, steal important internal data, or implant malicious code that makes website visitors vulnerable. For developers, an authoritative security framework is urgently...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/083H04L67/568Y02D30/50
Inventor 王素达
Owner BEIJING JINGDONG SHANGKE INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products