Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Token generation and authentication method and authentication server

An authentication server and token authentication technology, which is applied in the field of method and authentication server, token generation and authentication, can solve the problems of waste of authentication server cluster storage resources, consumption of authentication server cluster data transmission resources, and high authentication server capacity requirements

Active Publication Date: 2017-02-01
HUAWEI TECH CO LTD
View PDF7 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] Each authentication server needs to copy the sessions in all other authentication servers, which will greatly consume the data transmission resources in the authentication server cluster. Moreover, each authentication server stores all user sessions, which requires high capacity of the authentication server and wastes authentication. Storage resources for server clusters

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Token generation and authentication method and authentication server
  • Token generation and authentication method and authentication server
  • Token generation and authentication method and authentication server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0083] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0084] Among them, the network architecture applied by the token authentication method in the embodiment of the present invention can be found in image 3 As shown, it includes: an authentication server cluster 340 composed of a client 310, m application system servers 320 (m≥2), a load balancing server 330, and n authentication servers 3401 (n≥2); wherein, the load balancing servers 330 are respectively Connect with the client 310, each application system serve...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a token generation and authentication method and an authentication server. The method comprises steps: the first authentication server authenticates a login request of a user; when the first authentication server succeeds in authenticating the login request of the user, a session is built for the user, and a token comprising identifier information and token addressing information is generated for the user, wherein the identifier information is used for identifying the session of the user, and the token addressing information is used for indicating the storage position of the token in an authentication server cluster, and the first authentication server is located in the authentication server cluster. In a condition of correctly authenticating the token, the data transmission resources and the storage resources in the authentication server cluster can be saved.

Description

technical field [0001] The invention relates to the communication field, in particular to a token generation and authentication method and an authentication server. Background technique [0002] Single sign-on means that in multiple mutual trust application systems, users only need to log in once to access all application systems. Generally, a website can include multiple application systems. For example, a website can include application systems such as an online business hall, online shopping mall, points mall, and Portal. If the website supports single sign-on, users can only log in once on the website to access All application systems in the website. [0003] In a website that supports single sign-on, the website generally includes an application system server that supports various application systems, an authentication system for login and token authentication, and the authentication system of the website generates a token for the user after the user successfully logs ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/32H04L9/3234H04L63/08H04L63/083H04L63/0807H04L63/0815H04L9/3213H04L67/1004
Inventor 郭光明
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products