Unlock instant, AI-driven research and patent intelligence for your innovation.

Information synchronization management method, device, computer system and readable storage medium

A technology of information synchronization and management methods, which is applied in the field of big data data processing, can solve problems such as the difficulty of smooth operation of authentication servers, and achieve the effect of eliminating the risk of information tampering and ensuring smoothness

Active Publication Date: 2022-07-22
CHINA PING AN PROPERTY INSURANCE CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, this method can easily lead to arbitrary tampering of account information and / or authentication passwords by clients who have the right to access the authentication server, causing the security of account information and authentication passwords to be greatly challenged; Authorization is performed in one server, and the authentication passwords of the account information on different servers may be completely different. Therefore, at present, it is usually necessary to set multiple account information and their authentication passwords in the configuration file of the authentication program to satisfy the service requirements. However, once the authenticator or owner of the account information modifies the account information or password, a large-scale modification of the configuration file is required to deal with this change, and the authentication server needs to be restarted to restart it. Loading the configuration file makes it difficult for the authentication server to run smoothly

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information synchronization management method, device, computer system and readable storage medium
  • Information synchronization management method, device, computer system and readable storage medium
  • Information synchronization management method, device, computer system and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0039] see figure 1 , an information synchronization management method of this embodiment, applied in an authentication server with an authentication program, includes:

[0040] S102: Receive the input account number and the input password sent by the control terminal, and store them in the database as account information and authentication password;

[0041] S104: Read the account information in the database and its authentication password and send it to the buffer, so that it realizes information synchronization with the database;

[0042] S106: Receive a verification request sent by an authentication program, identify account information corresponding to the requested account in the verification request from the cache, and return an authentication password corresponding to the account information.

[0043]In order to solve the problems in the background technology, by saving the account information and its authentication password in the database, once the authenticating pa...

Embodiment 2

[0046] This embodiment is a specific application scenario of the above-mentioned first embodiment, and through this embodiment, the method provided by the present invention can be described more clearly and specifically.

[0047] Hereinafter, the method provided by this embodiment will be described in detail by taking as an example that the cache and the database in the service authentication server running the information synchronization management method and having the authentication program perform information synchronization and return authentication password identification as an example. . It should be noted that this embodiment is only exemplary, and does not limit the protection scope of the embodiment of the present invention.

[0048] figure 2 A schematic diagram of an environment application of the information synchronization management method according to the second embodiment of the present application is schematically shown.

[0049] In the exemplary embodiment...

Embodiment 3

[0091] see Figure 4 , an information synchronization management device 1 of this embodiment is applied in an authentication server with an authentication program, including:

[0092] The input module 12 is used to receive the input account number and the input password thereof sent by the control terminal, and store them in the preset database as account information and authentication password;

[0093] The synchronization module 14 is used to read the account information in the database and its authentication password and send it to the buffer, so that it can realize information synchronization with the database;

[0094] The output module 16 is configured to receive a verification request sent by the verification program, identify account information corresponding to the requested account in the verification request from the cache, and return an authentication password corresponding to the account information.

[0095] Optionally, the information synchronization management...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an information synchronization management method, a device, a computer system and a readable storage medium, which are applied in the field of data processing of big data and include: receiving an input account number and an input password sent by a control terminal, and using them as account information and authentication The password is stored in the preset database; the account information and the authentication password in the database are read and sent to the buffer, so that information synchronization between it and the database is realized; The account information corresponding to the requested account in the verification request is identified in the cache, and an authentication password corresponding to the account information is returned. The present invention only needs to modify the information in the database accordingly, and can realize account change or password change in time without restarting the authentication server, which ensures the smoothness of the information change of the authentication server and realizes the isolation between the external device and the data source. , which greatly eliminates the risk of tampering with the information in the database.

Description

technical field [0001] The present invention relates to the technical field of data processing of big data, and in particular, to an information synchronization management method, device, computer system and readable storage medium. Background technique [0002] The authentication server is an authentication system that verifies the authentication request of the client through the trust certificate to determine whether it has the right to access an application server; usually, the authentication server needs to save account information and information in the configuration file of its authentication program. Its authentication password; when the authentication server receives the authentication request, it will obtain the authentication password corresponding to the authentication account in the authentication request from the configuration file through the authentication program, and compare the authentication password with the password in the authentication request. , it is...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40G06F16/27G06F21/62G06F21/64
CPCH04L63/083H04L63/0846G06F16/27G06F21/6218G06F21/64
Inventor 张波
Owner CHINA PING AN PROPERTY INSURANCE CO LTD