Distributed system and registration verification method thereof

A distributed system, login verification technology, applied in transmission systems, electrical components, etc., can solve business system security threats and other issues, achieve the effects of maintaining login security, improving system security, and preventing cookie cracking

Active Publication Date: 2017-10-20
BEIJING JINGDONG SHANGKE INFORMATION TECH CO LTD +1
View PDF6 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this way, the user's login cookie information can be cracked, or the login cookie can be forged by r

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Distributed system and registration verification method thereof
  • Distributed system and registration verification method thereof
  • Distributed system and registration verification method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0012] In order to make the object, technical solution and advantages of the present invention clearer, the solutions of the present invention will be further described in detail below with reference to the accompanying drawings and examples.

[0013] Aiming at the defects existing in the existing distributed system, the present invention adopts a key list and a method for dynamically managing keys to add and invalidate keys, so as to regularly replace keys. Prevent a series of problems caused by key disclosure.

[0014] The schematic flow chart of the login verification method of the distributed system in the embodiment of the present invention is as follows figure 1 shown, including the following steps:

[0015] Step 11, after the login system successfully verifies the client's account password, it uses the highest version of the effective key in the key list to generate a login cookie value with the highest version number, and returns the login cookie value to the client; ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a distributed system and a registration verification method thereof. The method includes the steps of generating registration cookie value with the highest version number by using effective secret key of the highest version in a secret key list after a registration system successfully verifying the account password of a client, and returning the registration cookie value to the client, the business system after receiving the business request, with the registration cookie value, of the client, obtaining the secret key version of the registration cookie value, inquiring corresponding secret key in the secret key list stored in the secret key version, decrypting the registration cookie value by using the secret key, and processing normal business requests after decryption result is verified to be valid. The invention further discloses a distributed system. The registration safety of a system can be ensured.

Description

technical field [0001] The invention relates to the technical field of distributed systems, in particular to a distributed system and a login verification method thereof. Background technique [0002] With the vigorous development of the network, distributed systems have become a necessary means for large-scale system websites. Complex business systems are split into several functional systems to form large-scale distributed system applications. In this way, it involves the unified login problem of several functional systems, that is, single sign-on. That is, after logging in from the login system, you can access the corresponding functions without logging in when accessing other business systems. [0003] The existing technical solution is that the user enters the account password for login verification through the single sign-on system every time. After the verification is successful, the login system will generate encrypted information (login cookie value) through a uniq...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0846H04L67/10
Inventor 韩松
Owner BEIJING JINGDONG SHANGKE INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products