Token authentication method, toke terminal and token server
A verification method and server technology, applied in the field of network data security, can solve problems such as login failure, inconvenient operation, unfavorable token memory, etc., and achieve the effect of saving computing resources and improving user experience
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0046] In order to enable those skilled in the art to better understand the technical solutions in the present application, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described The embodiments are only some of the embodiments of the present application, but not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the scope of protection of this application.
[0047] In the prior art, token generation may need to wait for half a minute or one minute. Once the token is used and expires, the user needs to spend time waiting for a new token to be generated. This application provides a token that solves the aforementioned problems The method of generation and verification will be described in detai...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


