Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Processing system for authentication requests

A technology for processing systems and verification requests, which is applied in the field of login verification and can solve problems such as weak data processing capabilities

Active Publication Date: 2020-11-03
WUHAN JIYI NETWORK TECH CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The main purpose of the present invention is to provide a verification request processing system, aiming to solve the technical problem of weak data processing capability

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Processing system for authentication requests
  • Processing system for authentication requests
  • Processing system for authentication requests

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0047] refer to figure 1 , figure 1 It is a structural block diagram of the first embodiment of the verification request processing system of the present invention. The verification request processing system includes: a client 100 , a Kafka node 200 and a decision server 300 .

[0048] It is understandable that in order to deal with login requests with hundreds of millions of daily active users, the server cluster can be rebuilt to establish a server cluster with strong data processing capabilities, so as to be able to process hundreds of millions of login requests with daily active users. Millisecond standard for request response.

[0049]The client 100 is configured to obtain a first login verification request, and send the first login verification request to the Kafka node 200 .

[0050] In a specific implement...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a verification request processing system. The processing system of the verification request includes: client, Kafka node and decision server; Client, for obtaining the first login verification request, and the first login verification request is sent to Kafka node; Kafka node, for being used by Broker component The first login verification request is stored; the Kafka node is also used to send the first login verification request to the decision server; the decision server is used to verify the validity of the first login verification request under the Spark Streaming framework. Obviously, by combining the Kafka deployment structure and the Spark Streaming deployment structure, the entire deployment structure has the ability to handle hundreds of millions of login requests, and responds to requests at the millisecond level, which also solves the problem of weak data processing capabilities. technical problem.

Description

technical field [0001] The invention relates to the technical field of login verification, in particular to a verification request processing system. Background technique [0002] Considering that when multiple users are logging in to the portal website, in order to prevent hackers from logging into other people's accounts and guard against malicious data credentialing, etc., the major portal websites can pre-verify the current login request sent by the user to determine that the login request is a user. The normal login behavior is still an illegal login behavior. When it is recognized as a normal login behavior, the authority to successfully log in to the portal website is granted. [0003] However, since there may be a large number of users in major portal websites, and the number of login requests that need to be verified every day is also massive, this requires the server or server cluster that processes login requests in the background to have strong data processing c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/08H04L63/0281H04L67/562H04L67/568H04L67/61
Inventor 黄胜蓝陈晨
Owner WUHAN JIYI NETWORK TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products