Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

User authority identification method and system and computer device

A technology of user authority and identification method, which is applied in the field of computer-readable storage media and user authority identification, can solve problems such as easy tampering, large authority information, and untrustworthiness, and avoid single-point problems caused by centralized session management. The Effects of Performance Issues

Active Publication Date: 2018-02-23
YONYOU NETWORK TECH
View PDF6 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] 1. The information stored in the cookie on the browser side is untrustworthy and easy to be tampered with;
[0008] 2. The permission information is too large. In an enterprise-level system, a single user will have hundreds or even thousands of resource permissions, but the size of cookies is limited, and a large number of cookies will affect the transmission speed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User authority identification method and system and computer device
  • User authority identification method and system and computer device
  • User authority identification method and system and computer device

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment

[0128] A stateless and session-free device for authenticating login user authority is proposed. Including: Bloom Filter (Bloom Filter): Bloom Filter is a random data structure with high space efficiency. It uses a bit array to represent a collection concisely, and can determine whether an element belongs to this collection. Bloom Filter stores 1w Only 5k space is required for different permissions;

[0129] The secret key is stored on the application server side, and the information is converted into the input parameters in the ciphertext process through the HMAC algorithm;

[0130] The rights manager implements the creation, distribution and authentication of tokens, and its components include:

[0131] Token (Token) means token (temporary) in computer identity authentication, representing the object of the right to perform certain operations;

[0132]Token information (TokenParameter) is used to identify the information contained in the Token, such as user ID, timestamp wh...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a user authority identification method and system and a computer device. The user authority identification method comprises the steps of obtaining user information and user authority resource information and storing the information to token information; encrypting the token information and generating a token; writing the token and the token information into Cookie of a browser; receiving a request sent by the browser; reading a current token and current token information in the Cookie of the browser; and carrying out credibility verification on the Cookie of the browseraccording to the current token. According to the user authority identification method provided by the invention, the authority information is enabled to be applicable to network transmission through the Cookie, so the credibility problem of the Cookie stored in the browser is solved thoroughly and statelessly. The performance problem resulting from session replication under a super-large scale cluster and the single-point problem resulting from centralized session management in related technologies are avoided.

Description

technical field [0001] The present invention relates to the field of big data technology, in particular to a user authority authentication method, a user authority authentication system, a computer device, and a computer-readable storage medium. Background technique [0002] In web applications, the http protocol is generally used for communication. Due to the stateless feature of http, the session (Session) mechanism is relied on during authentication: that is, the user's login status and permission information are stored in the session. [0003] In order to deal with large-scale access, it is necessary to implement cluster deployment of applications. To implement cluster deployment, it is necessary to unify sessions among multiple application servers. Most mainstream web servers such as Tomcat, WEBLogic, and WebSphere have adopted the session replication mechanism. The session replication network topology is as follows: figure 1 shown. Sessions are replicated between se...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06G06F21/60H04L9/06
CPCG06F21/602G06F2221/2151H04L9/0643H04L9/3213H04L63/0807
Inventor 李传忠司春利
Owner YONYOU NETWORK TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products