Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for carrying out cloud protection certification, server and client

A client and server technology, applied in the field of network security, can solve the problem of Token authentication of request information that cannot be Token

Active Publication Date: 2018-01-12
BEIJING QIANXIN TECH
View PDF3 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The technical problem to be solved by the present invention is how to solve the problem that in the existing Token-based identity verification method, it is impossible to carry out Token-based identity verification for request information that does not carry Token

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for carrying out cloud protection certification, server and client
  • Method for carrying out cloud protection certification, server and client
  • Method for carrying out cloud protection certification, server and client

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0082] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0083] figure 1 It is a schematic flowchart of a method for performing cloud protection authentication on a client provided in this embodiment, see figure 1 , the method includes:

[0084] 101: Receive the first request information sent by the client to access the source site, and if the first request information does not carry a Token, gen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Embodiments of the invention disclose a method for carrying out cloud protection certification, a server and a client. According to the method, after received request information is judged to not carry a Token, a response content which is encapsulated by a cloud random number, certification time and a key package is generated and is sent to the client; the client obtains a newborn Token accordingto the response content, a client identifier and a client random number generated by the client, generates second request information carrying the newborn Token and sends the second request information to the server; and the server realizes certification about whether to allow the client to visit a source station through the Token. According to the method, through interaction with the client, theclient which sends the first request information without the Token regenerates the second request information carrying the Token, so that the legality of the Token carried by the second request information about the request information and the authenticity about the client are checked, and the authentication of the Token is carried out on the request information without the Token.

Description

technical field [0001] Embodiments of the present invention relate to the technical field of network security, in particular to a method for performing cloud protection authentication on a client, a server and a client. Background technique [0002] Token, which is used as a token or cipher in computer authentication, represents the object of the right to perform certain operations. For example, before some data is transmitted, it is necessary to check the password through Token, and different passwords are authorized for different data operations. [0003] In the traditional Token-based authentication method, the client uses a user name and password to request login, and the server receives the request to verify the user name and password. After the verification is successful, the server will issue a Token, and then send the Token to the client. , after the client receives the Token, it can store it, such as putting it in a cookie or in LocalStorage (local storage). Every ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/08
Inventor 王照旗
Owner BEIJING QIANXIN TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products