Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Processing system for authenticating request

A technology for processing systems and verification requests, which is applied in the field of login verification and can solve problems such as weak data processing capabilities

Active Publication Date: 2019-01-22
WUHAN JIYI NETWORK TECH CO LTD
View PDF6 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The main purpose of the present invention is to provide a verification request processing system, aiming to solve the technical problem of weak data processing capability

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Processing system for authenticating request
  • Processing system for authenticating request
  • Processing system for authenticating request

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] It should be understood that the specific embodiments described herein are only used to explain the present invention, but not to limit the present invention.

[0047] refer to figure 1 , figure 1 It is a structural block diagram of the first embodiment of the verification request processing system of the present invention. The processing system for the verification request includes: a client 100 , a Kafka node 200 and a decision server 300 .

[0048] It is understandable that, in order to deal with the login requests with the daily activity of hundreds of millions, the server cluster can be rebuilt to establish a server cluster with strong data processing ability, so as to have the processing ability to handle the login request of the daily activity of hundreds of millions, and use the millisecond-level standard for request response.

[0049]The client 100 is configured to obtain a first login verification request, and send the first login verification request to th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a processing system for authenticating a request. The processing system for authenticating a request comprises a client side, a Kafka node and a decision server. The client sideis configured to obtain a first logon authentication request and send the first logon authentication request to the Kafka node; theKafka node for storing the first login authentication request by theBroker component; theKafka node, further configured to send a first logon authentication request to the decision server. The decision server is configured to verify the validity of the first login authentication request under the Spark Streaming framework. Obviously, by combining the Kafka deployment structure with the Spark Streaming deployment structure, the whole deployment structure has the ability to handle hundreds of millions of login requests per day, and respond to requests in milliseconds, which also solves the technical problem of weak data processing ability.

Description

technical field [0001] The invention relates to the technical field of login verification, in particular to a processing system for verification requests. Background technique [0002] Considering that when multiple users log in to the portal website, in order to prevent hackers from logging into other people's accounts and prevent malicious credential stuffing behavior, etc., the major portal websites can pre-verify the login request currently issued by the user to determine that the login request is the user. The normal login behavior is still illegal login behavior. When it is recognized as a normal login behavior, the permission to successfully log in to the portal website is granted. [0003] However, since there may be a large number of users on major portal websites, and the number of daily login requests that need to be verified is also massive, this requires that the server or server cluster that processes login requests in the background has strong data processing...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/08H04L63/0281H04L67/562H04L67/568H04L67/61
Inventor 黄胜蓝陈晨
Owner WUHAN JIYI NETWORK TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products