Unlock instant, AI-driven research and patent intelligence for your innovation.

Authority authentication method and device, and server device

A technology of server equipment and authorization authentication, which is applied in the field of communication, can solve problems such as consumption of system resources, poor processing ability, and poor ability, and achieve the effects of reducing system resources, improving processing ability, and improving randomness

Active Publication Date: 2020-09-25
BEIJING KINGSOFT CLOUD NETWORK TECH CO LTD
View PDF19 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When switching between user mode and kernel mode, it needs to consume certain system resources.
System resources consumed by authorization authentication are too high
However, the system resources of the server device are limited, resulting in the poor ability of the server device to perform authorization authentication in parallel in the MongoDB system.
[0006] In the MongoDB system, there are often a large number of client devices, and a large number of client devices may apply to the server device to establish a short connection in a short period of time, so the server device needs to perform a large number of authorization authentication
As mentioned above, due to the poor ability of the server device to perform authorization authentication in parallel, it takes more time to complete these authorization authentications, that is, in the MongoDB system, the server device has poor processing ability when faced with a large number of short connections.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authority authentication method and device, and server device
  • Authority authentication method and device, and server device
  • Authority authentication method and device, and server device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The following will clearly and completely describe the technical solutions in the embodiments of the present disclosure with reference to the accompanying drawings in the embodiments of the present disclosure. Apparently, the described embodiments are only some of the embodiments of the present disclosure, not all of them. Based on the embodiments in the present disclosure, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present disclosure.

[0044] In order to describe the authority authentication method provided by the embodiment of the present disclosure more clearly, a possible application scenario of the authority authentication method provided by the embodiment of the present disclosure will be described as an example below. This example is only one possible application scenario. In other possible embodiments, the authority authentication method provided by the embodiments ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides an authority authentication method and device and server equipment, and relates to the field of cloud computing. The method comprises the steps of: determiningwhether the generation number of a preset user state random number generator reaches a preset replacement threshold value or not, wherein the generation number is the number of random numbers which are generated by the preset user state random number generator through a current seed and used for authority authentication, and the preset user state random number generator operates in a user state;if the generation quantity reaches a preset replacement threshold value, obtaining new seeds; controlling the preset user state random number generator to generate a random number by using the new seed; and carrying out authority authentication on the user side equipment in the MongoDB system by utilizing the generated random number. On the premise of not influencing the accuracy of authority authentication, the processing capacity of the MongoDB system under the condition of facing a large number of short connections can be improved.

Description

technical field [0001] The present disclosure relates to the field of communication technologies, and in particular, to an authority authentication method, device and server equipment. Background technique [0002] MongoDB (a database based on distributed file storage), as a commonly used non-relational database (Not Only Structuured Query Language, NOSQL), is widely used in big data processing. In the MongoDB system, the client device can read and write data stored in the server device by establishing a communication connection with the server device. [0003] Considering the security of the server device, the server device can perform authority authentication on the client device. If the user device passes the authority authentication, the connection is allowed to be established, and if the user device does not pass the authority authentication, the connection establishment is refused. During the authentication process, the server device can generate one or more random nu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F16/21G06F16/27G06F21/31G06F7/58
CPCG06F16/21G06F16/27G06F21/31G06F7/588Y04S40/20
Inventor 陈青松
Owner BEIJING KINGSOFT CLOUD NETWORK TECH CO LTD