Unlock instant, AI-driven research and patent intelligence for your innovation.

A redis-based authority authentication method, system, medium and equipment

A technology of authority authentication and user authority, applied in the direction of digital data authentication, instruments, computer security devices, etc., can solve problems such as increasing development costs, achieve efficient account authentication, and improve account reliability.

Active Publication Date: 2022-05-17
汇元银通(北京)在线支付技术有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this case, the existing technology has the following problems: each subsystem needs to build basic modules related to users, roles, and permissions, which increases unnecessary development costs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A redis-based authority authentication method, system, medium and equipment
  • A redis-based authority authentication method, system, medium and equipment
  • A redis-based authority authentication method, system, medium and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0097] In some processes described in the specification and claims of the present invention and the above-mentioned drawings, a plurality of operations appearing in a specific order are contained, but it should be clearly understood that these operations may not be performed in the order in which they appear herein Execution or parallel execution, the serial numbers of the operations, such as 101, 102, etc., are only used to distinguish different operations, and the serial numbers themselves do not represent any execution order. Additionally, these processes can include more or fewer operations, and these operations can be performed sequentially or in parallel. It should be noted that the descriptions of "first" and "second" in this article are used to distinguish different messages, devices, modules, etc. are different types.

[0098] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a Redis-based authority authentication method, system, medium and equipment. The solution includes inputting the current user's login account and login password, performing online analysis based on the login account information, and judging the current login account level; obtaining the current verification time and current login account level, judging whether the login account information verification is successful, issuing a verification failure command or Verify successful command; initiate a permission judgment request, complete user permission update and judgment through Redis, and return the permission judgment result; send a logout message, and the permission authentication service subscribes to the logout message received by Redis; after receiving the logout message, according to Set the target clearing command at the current login account level; clear user rights according to the target clearing command. This solution realizes multi-node local memory synchronization through multi-level and multi-period self-adaptive online verification combined with Redis' publish and subscribe functions, and realizes simple, stable and efficient account authentication.

Description

technical field [0001] The present invention relates to the technical field of authority authentication, and more specifically, to a Redis-based authority authentication method, system, medium and equipment. Background technique [0002] With the development of Internet technology, more and more systems have evolved into distributed system structures with huge subsystems. In this case, although it is possible to perform separate execution on a single field or a single type of business, it can improve the execution efficiency of the corresponding single type of business, and at the same time, due to the large and comprehensive information of the system, it makes it easier to query information. [0003] Prior to the technology of the present invention, the authority of each subsystem was managed in a decentralized manner. The existing platform mainly has a unified login entry. After a successful login, a Token is generated. When the user jumps to the subsystem, the Token is p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/62G06F21/31G06F16/23G06F16/2455
CPCG06F21/6218G06F21/31G06F16/23G06F16/24552
Inventor 吴妍冰夏敦煌江利国
Owner 汇元银通(北京)在线支付技术有限公司