Check patentability & draft patents in minutes with Patsnap Eureka AI!

Token generation and verification method and device

A token and device technology, applied in the field of computer networks, can solve the problems of poor security and occupy server-side storage resources, and achieve the effect of high security

Inactive Publication Date: 2014-10-01
BEIJING OAK PACIFIC NETSCAPE TECH DEV
View PDF7 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method not only has poor security, but also occupies a large amount of storage resources on the server side.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Token generation and verification method and device
  • Token generation and verification method and device
  • Token generation and verification method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] Embodiments of the present invention will be explained and described in more detail below in conjunction with the accompanying drawings. It should be understood that the drawings and implementations of the present invention are for exemplary purposes only, and are not intended to limit the protection scope of the present invention.

[0021] The flowcharts and block diagrams in the accompanying drawings illustrate the possible architecture, functions and operations of the methods and devices according to various embodiments of the present invention. In this regard, each block in a flowchart or block diagram may represent a module, program segment, or portion of code that contains one or more logical functions for implementing specified executable instructions. It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be ex...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a token generation and verification method and device. The token generation method comprises the steps that a random character string is generated and used as a key; information contained in a token and the key are assembled into a first character string, and a token signature is obtained by encrypting the first character string; the information and the token signature are assembled into a second character string in a detachable mode, and the second character string serves as the token. The token generation and verification method and device can provide high-safety internet application service access.

Description

technical field [0001] The embodiments of the present invention relate to the technical field of computer networks, and more specifically, to token generation and verification methods and devices. Background technique [0002] With the development and popularization of Internet technology, various web application services have pervaded all aspects of people's daily life, such as shopping, email, news browsing, forums and so on. However, web applications have security risks. In order to ensure the security of access, it is often necessary to authenticate user identities. [0003] At present, among the three mainstream web service implementation schemes, because the Representational State Transfer (REST) ​​model web service is compatible with the complex Simple Object Access Protocol (SOAP) and Extensible Markup Language-Remote Procedure Call (XML-RPC) It is more concise than REST, so more and more web services are beginning to be designed and implemented in REST style. The...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
Inventor 戴洵
Owner BEIJING OAK PACIFIC NETSCAPE TECH DEV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More