Unlock instant, AI-driven research and patent intelligence for your innovation.

A shiro verification method based on redis storage

A verification method, login verification technology, applied in the direction of advanced technology, climate sustainability, sustainable communication technology, etc., to achieve the effect of simplifying the verification process, improving verification efficiency, and solving memory overflow

Active Publication Date: 2020-06-05
BEIJING JINGDONG SHANGKE INFORMATION TECH CO LTD +1
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0016] In view of this, the present invention provides a Shiro verification method based on Redis storage, which stores data based on Redis caching technology, and the storage method is more flexible. By placing the session in Redis for caching, memory consumption can be reduced to solve the problem of memory overflow. Problem: Introduce an expiration time algorithm to automatically clear the cache, improving the efficiency and hit rate of the cache, thereby ensuring efficient and reliable data storage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A shiro verification method based on redis storage
  • A shiro verification method based on redis storage
  • A shiro verification method based on redis storage

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] Exemplary embodiments of the present invention are described below in conjunction with the accompanying drawings, which include various details of the embodiments of the present invention to facilitate understanding, and they should be regarded as exemplary only. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the invention. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.

[0035] The present invention is a secondary development of the Shiro framework. By modifying some core classes in the application programming interface provided by the Shiro framework, the Shiro framework supports Realm storage for Redis.

[0036] figure 2 It is a schematic diagram of main steps of a Shiro verification method based on Redis storage according to an embodime...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a Shiro verification method based on Redis storage. By placing the session in Redis for caching, memory consumption can be reduced to solve the problem of memory overflow; the expiration time algorithm is introduced to automatically clear the cache, which improves the efficiency and hit of the cache rate, so as to ensure efficient and reliable data storage. The method includes: according to the user's login parameters, encapsulating the user's identification information to generate a unique identification; according to the unique identification, searching whether there is a corresponding cache in the Redis server; if there is the corresponding cache, obtaining the Uniquely identified login information, and encapsulate the successful login information; if there is no corresponding cache, call the login verification method and authority verification method for verification, if the verification is passed, encapsulate the successful login information, and if the verification fails, prompt the login verification failure.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a Shiro verification method based on Redis storage. Background technique [0002] With the birth of a series of new Internet products such as e-commerce, social networks, and microblogs, Internet applications based on the Web environment are becoming more and more extensive. In the process of enterprise informatization, various applications are set up on the Web platform, and the rapid development of Web services has also attracted the strong attention of hackers, followed by the emergence of Web security threats. Hackers use the loopholes of the website operating system and the SQL injection loopholes of the Web service program to obtain the control authority of the Web server, tamper with the content of the webpage, steal important internal data, or implant malicious code that makes website visitors vulnerable. For developers, an authoritative security framework is urgently...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/083H04L67/568Y02D30/50
Inventor 王素达
Owner BEIJING JINGDONG SHANGKE INFORMATION TECH CO LTD