Information synchronization management method and device, computer system and readable storage medium
A technology of information synchronization and management methods, which is applied in the field of big data data processing, can solve problems such as the difficulty of smooth operation of authentication servers, and achieve the effect of eliminating the risk of information tampering and ensuring smoothness
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0038] Example one:
[0039] See figure 1 , An information synchronization management method of this embodiment, applied to an authentication server with an authentication program, includes:
[0040] S102: Receive the input account number and input password sent by the control terminal, and store them in the database as account information and authentication password;
[0041] S104: Read the account information and its authentication password in the database and send it to the buffer to synchronize information with the database;
[0042] S106: Receive the verification request sent by the verification program, identify the account information corresponding to the requested account in the verification request from the buffer, and return the verification password corresponding to the account information.
[0043] In order to solve the problems in the background technology, the account information and its authentication password are stored in the database, once the authenticator (such as th...
Example Embodiment
[0045] Embodiment two:
[0046] This embodiment is a specific application scenario of the first embodiment above. Through this embodiment, the method provided by the present invention can be explained more clearly and specifically.
[0047] In the following, in a service authentication server running an information synchronization management method and having an authentication program, information synchronization of the buffer and database and identification of the returned authentication password are taken as an example to describe the method provided in this embodiment in detail . It should be noted that this embodiment is only exemplary and does not limit the protection scope of the embodiment of the present invention.
[0048] figure 2 It schematically shows an environmental application diagram of the information synchronization management method according to the second embodiment of the present application.
[0049] In an exemplary embodiment, the authentication server 2 where ...
Example Embodiment
[0090] Example three:
[0091] See Figure 4 An information synchronization management device 1 of this embodiment, which is applied in an authentication server with an authentication program, includes:
[0092] The input module 12 is used to receive the input account number and the input password sent by the control terminal, and save it as account information and authentication password in a preset database;
[0093] The synchronization module 14 is used to read account information and its authentication password in the database and send it to the buffer to synchronize information with the database;
[0094] The output module 16 is configured to receive the verification request sent by the verification program, identify the account information corresponding to the requested account in the verification request from the buffer, and return the verification password corresponding to the account information.
[0095] Optionally, the information synchronization management apparatus 1 furthe...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap