Unlock instant, AI-driven research and patent intelligence for your innovation.

Token managing method and system

A management system and token technology, applied in the Internet field, can solve the problems of low security, too long, and difficult to apply, and achieve the effect of overcoming potential security risks and improving security.

Active Publication Date: 2013-01-30
BEIJING QIHOO TECH CO LTD
View PDF6 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The existing Token timeout setting scheme is a fixed duration. This setting method is often difficult to apply to all application environments. For example, some applications need to use Token frequently. It is hoped that the timeout time will be long, but the longer the timeout time, the lower the security. Because after the Token is lost, the user's account is within the validity period of the Token, and the thief can use this Token to illegally call the interface to use the stolen user's information
However, some applications only use Token to obtain user information once when logging in, and do not need a particularly long timeout period.
If the application is allowed to choose the timeout time, it is difficult for the application to choose an appropriate timeout time, and it tends to set the timeout time too long, and if it is too long, there will be security problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Token managing method and system
  • Token managing method and system
  • Token managing method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] The specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. The following examples are used to illustrate the present invention, but are not intended to limit the scope of the present invention.

[0048] According to the analysis of the existing technology, the key to overcome the problems in the existing technology lies in when the token will be canceled after the token is generated. The original mechanism is to cancel when the fixed time exceeds, that is, to judge whether the token is timed out or not when the token is used. Then get the token again. The key point of the present invention is to add a token cancellation interface for canceling tokens on the basis of the original interface.

[0049]After the token cancellation interface is set, when the application provider calls the token cancellation interface is also very important, because the application provi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a token managing method and system, relating to the field of Internet. The token managing method comprises the steps that: a user interface receives an authorization command of a user and sends the authorization command to an application provider; the application provider calls a token obtaining interface in an open platform for obtaining a token according to the authorization command, then generates overtime of the token and stores the overtime; the application provider calls a third interface in the open platform by using the token for realizing the corresponding application; the application provider calls a token cancelling interface for cancelling the token when the token is not needed by the subsequent process of the application or the application is completed; and the user interface receives an exit command of the user and calls the token canceling interface for cancelling the token according to the exit command under the condition that the token is not cancelled. According to the method and the system, the potential safety hazards caused by cancelling the token according to the overtime with fixed duration in the prior art are overcome, the token is self-adaptively canceled, and the safety of user information is improved.

Description

technical field [0001] The present invention relates to the technical field of the Internet, in particular to a token (Token) management method and system. Background technique [0002] In the Internet age, some platforms will encapsulate their own services as interfaces for use by third-party developers. We generally call these platforms open platforms. By calling the interface provided by the open platform, third-party developers can easily import user information and provide recharge and other services, saving a lot of development and operating costs for third-party developers. [0003] For an open platform, since user information must be provided to third-party developers, this involves user authentication and authorization. As a result, the OAuth authentication and authorization protocol came into being. So far, two versions of the OAuth protocol are widely used, namely OAuth1.0a and OAuth2.0. In OAuth1.0a, the application side needs to apply for a RequestToken in a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 胡聪
Owner BEIJING QIHOO TECH CO LTD