Unlock instant, AI-driven research and patent intelligence for your innovation.

Authentication method, device, equipment and computer readable medium

An authentication and authority technology, applied in the information field, can solve problems such as slow authentication process, and achieve the effect of solving the slow authentication process

Active Publication Date: 2021-11-16
广州锦行网络科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] This application provides an authentication method, device, equipment and computer-readable medium to solve the technical problem of slow authentication process caused by high concurrency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method, device, equipment and computer readable medium
  • Authentication method, device, equipment and computer readable medium
  • Authentication method, device, equipment and computer readable medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] In order to make the purposes, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments It is a part of the embodiments of this application, but not all of them. Based on the embodiments in the present application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present application.

[0033] In the following description, use of suffixes such as 'module', 'part' or 'unit' for denoting elements is only for facilitating the description of the present application and has no specific meaning by itself. Therefore, "module" and "component" may be mixedly used.

[0034] In related technologies, the proposed permission contr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application relates to an authentication method, device, equipment and computer-readable medium. The method includes: obtaining the first operation requested by the target object to be performed on the target resource, and the target resource is a virtual resource; generating a first bitmap according to the operation information of the first operation, and obtaining a second bitmap of the target object, the first bitmap It is used to save the encoded data of the permission required to perform the first operation on the target resource, and the second bitmap is used to save the encoded data of the permission of the role owned by the target object. Different roles are associated with permission combinations for performing different operations on each resource , the authority of an operation corresponds to a flag in the encoded data; the first operation is performed bit by bit on the corresponding bits of the first bitmap and the second bitmap to obtain the third bitmap; between the third bitmap and the first bitmap In the same case, the authentication passes. This application solves the technical problem that high concurrency causes the authentication process to be slow.

Description

technical field [0001] The present application relates to the field of information technology, and in particular to an authentication method, device, equipment and computer-readable medium. Background technique [0002] A bit is a bit, which is the smallest unit of data in the current computer system. 8 bits are 1 byte (byte), and 1 bit can only store up to 2 pieces of information: 0 or 1. Bitmap refers to a data structure that uses a bit array to store data, and since bit is the smallest unit of data, Bitmap can save storage space very much. When storing massive data, such as 4 billion unique unsigned integer sets, it takes about 14.9GB of storage space, but if you use Bitmap storage, it takes about 512MB of storage space, so when the amount of data is huge , the advantages of Bitmap are quite obvious. [0003] Today's user systems generally have role-based authority divisions, and with the rapid development of network applications, the systems have become more and more c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/45G06F21/31G06F16/22
CPCG06F21/31G06F21/45G06F2221/2141G06F16/2237
Inventor 吴建亮胡鹏沈雄优
Owner 广州锦行网络科技有限公司