Unlock instant, AI-driven research and patent intelligence for your innovation.

Authentication processing method, node and system

A processing method and node management technology, applied in the field of authentication processing methods, nodes and systems, can solve the problems of consuming server computing resources, client authentication dependence, and inability to complete the client authentication process, so as to reduce resource consumption, The effect of ensuring stability

Active Publication Date: 2018-10-30
TENCENT TECH (SHENZHEN) CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The server’s authentication of the client relies on the session key maintained in the form of a database. The authentication of the client inevitably sets up database operations, which not only consumes considerable computing resources on the server, but also uses the database to store and issue session keys. key, which causes the authentication of the client to rely heavily on the database. Once the database crashes, the authentication process to the client cannot be completed.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication processing method, node and system
  • Authentication processing method, node and system
  • Authentication processing method, node and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] The present invention will be described in further detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the examples provided here are only used to explain the present invention, not to limit the present invention. In addition, the examples provided below are some examples for implementing the present invention, rather than providing all the examples for implementing the present invention. In the case of no conflict, the technical solutions recorded in the embodiments of the present invention can be combined in any manner implement.

[0050] The nouns and terms involved in the embodiments of the present invention are applicable to the following explanations.

[0051] The client refers to a program that corresponds to a server and provides local services for users. Except for some applications that only run locally, they are generally installed on the terminal device on the user side and need to cooperate with the ser...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an authentication processing method, node and system. The method comprises the following steps: indicating a service node to acquire session keys in a gather to be loaded from a network file system by using a management node; loading the obtained session keys in the gather to be loaded at the local of the service node by using the service node; acquiring the loading progress of the session keys of the service node in the gather to be loaded at the local of the service node by using the management node, and determining an issuing gather corresponding to the session keys, which can be issued to client sides, of the service node on the basis of the progress; indicating the issuing gather to the service node by the management node; and authenticating the client sides by using the service node, and issuing the session keys in the issuing gather to the client sides when authentication is successful, wherein the session keys issued to the different client sides are different, and the session keys are used for transmitting business between a client side authenticated successfully and a business distribution node. By the authentication processing method, node and system, resource consumption of authentication certification to the client sides can be reduced, and reliability of authentication processing is ensured.

Description

technical field [0001] The present invention relates to authentication technology in the communication field, in particular to an authentication processing method, node and system. Background technique [0002] In the business system based on the client / server architecture model, based on security considerations, the client needs to access the server for authentication before requesting the server for business interaction, and the server sends the session key to the client after passing the authentication. key, the client uses the session key to perform business interactions with the server in an encrypted session. [0003] The server’s authentication of the client relies on the session key maintained in the form of a database. The authentication of the client inevitably sets up database operations, which not only consumes considerable computing resources on the server, but also uses the database to store and issue session keys. key, the authentication of the client is heav...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/062H04L63/083
Inventor 周远
Owner TENCENT TECH (SHENZHEN) CO LTD