Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Generation method, generation device, authentication method and authentication system for authorization token

An authorization token and token technology, applied in the Internet field, can solve the problems of easy forgery or tampering, high maintenance cost, low security, etc., and achieve the effect of observable verification process, reduced maintenance cost, and strong scalability.

Active Publication Date: 2013-09-18
BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
View PDF5 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In the process of realizing the present invention, the inventors found that the prior art has at least the following problems: the authorization token generated by the random algorithm has no encryption function and is easy to be counterfeited or tampered with; There are security holes and low security; and the authorization token itself occupies a large amount of storage space in the database, which is not conducive to management and high maintenance costs
The authorization token generated by the symmetric encryption algorithm does not have any readability due to encryption, which is not conducive to service debugging, problem location, statistics, etc., and the authentication process must be decrypted first, and the encryption and decryption process must use the preset Assuming that the algorithm and key are fixed, it is easy to be leaked, and there is a great security risk

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Generation method, generation device, authentication method and authentication system for authorization token
  • Generation method, generation device, authentication method and authentication system for authorization token
  • Generation method, generation device, authentication method and authentication system for authorization token

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention. On the contrary, the embodiments of the present invention include all changes, modifications and equivalents coming within the spirit and scope of the appended claims.

[0030] In the description of the present invention, it should be understood that the terms "first", "second" and so on are used for descriptive purposes only, and cannot be interpreted as indicating or implying relative importance. In the description of the present invention, it should be noted that unless otherwise specified and limited, the terms "connected" and "connect...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a generation method, a generation device, an authentication method and an authentication system for an authorization token. The generation method for the authorization token comprises the steps of matching an identify label, token generation time and token survival time of a third-party application to generate a related information string of the authorization token; according to the related information string of the authorization token, generating a signature key; according to the signature key and a preset signature algorithm, generating signature information corresponding to the related information string of the authorization token; and according to the related information string of the authorization token and the signature information, generating a character string of the authorization token. According to the generation method, the authorization token can be used immediately when generated, the safety is high, no storage space is required, the maintenance cost can be effectively reduced, the character string of the authorization token is a plaintext, the expandability is high, and the user experience is good.

Description

technical field [0001] The invention relates to the technical field of the Internet, in particular to a method for generating an authorization token, a generating device, an authentication method and an authentication system. Background technique [0002] With the continuous development of open platforms and cloud computing technologies, more and more Internet service providers (such as Facebook, Google, Baidu, Tencent, Taobao, Sina Weibo, etc.) Provide Open API (Open Application Programming Interface, open application programming interface), through which services or data can be opened to third-party applications. [0003] In order to ensure the security of the external Open API, prevent platform services or data from being used by unauthorized third-party applications, and prevent third-party applications from using services or data that have not been authorized by the platform or users, most Internet service providers provide All platforms require that third-party applic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32
Inventor 朱建庭武林郑伟德
Owner BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products