Authorized access method for browser client and server

A technology of browser client and authorized access, which is applied in the field of authorized access of browser client and server, and can solve problems such as indistinguishability and information leakage

Active Publication Date: 2016-06-29
SHANGHAI SIIC LONGCHUANG SMARTER ENERGY TECH CO LTD
View PDF5 Cites 35 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this way, if the token is intercepted, others can pretend to be users, causing inf

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authorized access method for browser client and server
  • Authorized access method for browser client and server
  • Authorized access method for browser client and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0056] Such as figure 1 As shown, an authorized access method for a browser client and server, the method includes the following steps:

[0057] Step 1: The browser client sends a login verification request. The server receives the login verification request and performs login verification. At the same time, it sends the verification result to the browser client. The browser client judges whether the login is successful based on the login verification result. If successful, the server generates the dynamic password key, server time, and dynamic password key expiration time, and stores the dynamic password key, server time, and dynamic password key expiration time in the browser client cache at the same time, and perform step 2, otherwise Login failed, end;

[0058] Step 2: Determine whether the expiration time of the dynamic password key in the browser client cache is reached, if it is to go to step 3, otherwise go to step 5;

[0059] Step 3: The browser client sends a dynamic passw...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an authorized access method for a browser client and a server. The method comprises following steps of (1), login verification; generating a dynamic password secret key, server time and dynamic password secret key expiration time by a server if the login verification is successful; storing in client cache; executing a step (2); otherwise, finishing; (2) judging whether the dynamic password secret key expiration time in the client cache arrives or not, if the expiration time arrives, executing a step (3); otherwise, executing a step (4); (3), switching the dynamic password secret key; obtaining new dynamic password secret key, server time and dynamic password secret key expiration time if the dynamic password secret key is switched successfully; correspondingly updating the client cache; executing the step (4); otherwise, finishing; (4), generating a dynamic password through adoption of the dynamic password secret key and the server time in the client cache of a browser; carrying out authorized access to the server; and returning to the step (2). Compared with the prior art, the method has the advantages that the authorized access process is safe and reliable and is not liable to be cracked.

Description

Technical field [0001] The invention relates to an authorized access method, in particular to an authorized access method for a browser client and a server. Background technique [0002] With the continuous development of information technology, account information security has received more and more attention. When a user accesses a server on a browser client, in order to obtain more personalized services, it is usually necessary to register an account corresponding to the server. In order to ensure the security of the account, the user needs to edit a password corresponding to the account. During the browser client's access to the server, it needs to continuously perform permission verification, generally by storing the token after login verification, and uploading the saved token to the server every time permission verification is required to achieve the purpose of verifying the user's identity. In this way, if the token is intercepted, others can pretend to be a user, causin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/045H04L63/083H04L63/0846H04L63/10H04L67/02
Inventor 陈华沈杰张博蒋秋明曹文龙
Owner SHANGHAI SIIC LONGCHUANG SMARTER ENERGY TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products