Unlock instant, AI-driven research and patent intelligence for your innovation.

Double idempotent authentication method and server

A verification method and verifier technology, applied in the field of communication, can solve problems such as construction errors, idempotent verification system is difficult to verify repeated requests, user fund loss, etc., and achieve the effect of improving reliability

Active Publication Date: 2022-08-05
CHINA UNITED NETWORK COMM GRP CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the inventors found that the existing technology has at least the following disadvantages: when the developer of the idempotent function builds the idempotent verification system, there may be construction errors, which makes it difficult for the idempotent verification system to verify repeated requests, resulting in idempotent Invalid status, which leads to repeated business processing by the business processor due to repeated requests from the business requester, resulting in the loss of users' funds

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Double idempotent authentication method and server
  • Double idempotent authentication method and server
  • Double idempotent authentication method and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] In order to make the purposes, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments These are some embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0048] figure 1 This is a schematic diagram of a service system architecture provided by an embodiment of the present invention. like figure 1 As shown, the service system includes a terminal 11 and a server 12, and the terminal 11 and the server 12 communicate through a network. The terminal 11 is used for receiving a service re...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Embodiments of the present invention provide a double idempotent verification method and server. The method includes: receiving a service request sent by a terminal, wherein the service request includes a service identifier; acquiring a first verification switch flag bit, if the first verification switch flag If the bit is indicated as open, the service identifier is verified according to the distributed lock idempotent verifier, wherein the first verification is the distributed lock idempotent verification; if the switch flag bit of the first verification is indicated as off, the second verification is obtained. If the switch flag bit of the second verification is indicated as off, configure the switch flag bit of the second verification to be on, wherein the second verification is an idempotent table verification; when the switch flag bit of the second verification is When on, the service identity is validated against the idempotent table validator. The double idempotent verification function is realized through distributed lock idempotent verification and idempotent table verification, which improves the reliability of the idempotent verification function.

Description

technical field [0001] Embodiments of the present invention relate to the field of communication technologies, and in particular, to a double idempotent verification method and server. Background technique [0002] With the continuous development of Internet technology, the performance of traditional monolithic architecture systems cannot meet the rapid growth of business in terms of data processing performance. Distributed systems with high performance and high reliability are gradually replacing monolithic applications. While the distributed system brings high performance, because the services in the system are deployed on different hosts, network communication is frequently used between services, and network jitter, packet loss, and client retries will all lead to repeated requests. Therefore, it is urgent to provide a reliable idempotent guarantee method for service operations to ensure the data processing performance of distributed systems. [0003] In order to achiev...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/40G06F16/27G06F16/22
CPCH04L9/32H04L63/0876H04L63/108G06F16/2282G06F16/27
Inventor 张加伟裴宏祥李学政周文卿谷永平黄群
Owner CHINA UNITED NETWORK COMM GRP CO LTD