Unlock instant, AI-driven research and patent intelligence for your innovation.

Token authentication method, toke terminal and token server

A verification method and server technology, applied in the field of network data security, can solve problems such as login failure, inconvenient operation, unfavorable token memory, etc., and achieve the effect of saving computing resources and improving user experience

Active Publication Date: 2017-05-03
ADVANCED NEW TECH CO LTD
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If any of the three contents are entered incorrectly, the login may fail
However, this method shows that the time to produce tokens is relatively short; the server may not have received the token entered by the user, and the current token has expired and become invalid, which is inconvenient to operate
[0006] On the other hand, there is no correlation between tokens generally generated in the prior art, that is, each bit in each generated token is randomly generated
In this way, for the case of generating new tokens at short intervals, it will consume more computing resources of the server and the token terminal; at the same time, since each bit in each generated token may be brand new, it is not conducive to User's memory of the token

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Token authentication method, toke terminal and token server
  • Token authentication method, toke terminal and token server
  • Token authentication method, toke terminal and token server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] In order to enable those skilled in the art to better understand the technical solutions in the present application, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described The embodiments are only some of the embodiments of the present application, but not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the scope of protection of this application.

[0047] In the prior art, token generation may need to wait for half a minute or one minute. Once the token is used and expires, the user needs to spend time waiting for a new token to be generated. This application provides a token that solves the aforementioned problems The method of generation and verification will be described in detai...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

One embodiment of the application discloses a token authentication method, a toke terminal and a token server. The method comprises the following steps: a token terminal generates a first character at a predetermined time interval according to a default algorithm, inserts the generated first character into one end of a first token, and removes m bits of the other end; the first token after adjustment is displayed; a first terminal sends an authentication token input by a user according to the first token on the token terminal to a token server; the token server receives the authentication token and judges whether the authentication token is contained in a set of second tokens generated by the token server within a first predetermined time before the authentication token is received; and if the authentication token is contained in the set of second tokens, the authentication token passes authentication of the first terminal. By implementing the embodiment of the application, the computing resources of the token terminal and the token server can be saved.

Description

technical field [0001] This application relates to the field of network data security, in particular to a token verification method, a token terminal and a token server. Background technique [0002] With the continuous development of the field of network data security, tokens, as one of the most secure authentication technologies, have been applied by more and more industries. [0003] Generally speaking, when a user logs in to the system, he needs to enter a user name, password, token, etc., and if the three contents are entered correctly at the same time, the login is successful. If any of the three contents are entered incorrectly, the login may fail. After login failure, the entered token may be invalidated. For example, if the user name, password, and token entered by the operator log in to the system, if the password is entered incorrectly, the server cannot pass the user's login verification; at this time, the token used for this login will generally be blocked. v...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3213H04L63/0807H04L63/0838
Inventor 魏永冬
Owner ADVANCED NEW TECH CO LTD