Session access method and server

A session server and access method technology, applied in the field of session access, can solve the problems of acquiring sessions, session failures, and inability to satisfy users, and achieve the effects of ensuring security, avoiding security problems, and improving security.

Inactive Publication Date: 2019-04-05
YONYOU NETWORK TECH
View PDF6 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, by setting the current limit and fuse mechanism, the session will fail. When the user feels the most directly, the session cannot be obtained from the session server, which affects the user experience and cannot meet the user's needs.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Session access method and server
  • Session access method and server
  • Session access method and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] In order to understand the above-mentioned purpose, features and advantages of the present invention more clearly, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments. It should be noted that, in the case of no conflict, the embodiments of the present application and the features in the embodiments can be combined with each other.

[0048] In the following description, many specific details are set forth in order to fully understand the present invention. However, the present invention can also be implemented in other ways different from those described here. Therefore, the protection scope of the present invention is not limited by the specific details disclosed below. EXAMPLE LIMITATIONS.

[0049] Such as figure 1 As shown, a schematic flowchart of a session access method provided according to an embodiment of the present invention. Among them, session access methods include:

[0050...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the present invention provides a session access method and a server. The method includes the steps of: obtaining a session request sent by a terminal; parsing the session request, determining whether the token information included in the session request is within a valid time or not; if yes, it is determined whether the session identification number and the token information in the session request are matched or not, and when the session identification number and the token information are matched, obtaining the identity information corresponding to the token information; whenthe session identification number and the token information in the session request are not matched, obtaining the identity information from the session server; and if the token information included in the session request is within a valid time, obtaining identity information from the session server. The valid time is set for the token information to allow the token information to need to obtain the identity information to the session server only outside the valid time so as to reduce the request frequency of the terminal to the session server, achieve capacity expansion, ensure the user use experience and reduce the possibility of blocking of the server.

Description

technical field [0001] The embodiments disclosed in the present invention relate to the field of session access, and in particular, relate to a session access method and a server. Background technique [0002] At present, the technical solution of distributed session is usually realized by using shared memory. Specifically, when the end user accesses the microserver, the browser will send a request containing authentication credentials to the microserver, and the microserver will obtain the credentials sent by the end user , and then access the session server to obtain the user's identity information. [0003] All micro-servers in the above method rely on a session server. In a business scenario where a large number of users are online and requests are concurrent, the session server will bear huge pressure. In order to prevent the business server from being overwhelmed by sudden traffic, usually access session The server sets current limit and fuse to ensure that the sessio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04L9/32
CPCH04L9/3213H04L67/14
Inventor 毛坤刘昆鹏
Owner YONYOU NETWORK TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products