Token check method and device

A verification method and a technology of a verification device, which are applied in secure communication devices, user identity/authority verification, digital transmission systems, etc., can solve the problems of small-scale systems such as increased cost, high logic complexity, and many steps, and achieve token The effect of low cost of verification overhead

Active Publication Date: 2018-06-29
HANGZHOU AUTOMOTIVE TECH CO LTD
View PDF7 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] 2. Distributed lock server is required, which increases the complexity of the system and increases the cost of small systems
[0008] 4. The logic complexity is high and there are many steps. If one of the steps fails, many fault-tolerant steps are required, and deadlock is prone to occur

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Token check method and device
  • Token check method and device
  • Token check method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] In order to make the object, technical solution and advantages of the present invention clearer, the implementation manner of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0052] figure 1 is a schematic diagram of an exemplary implementation environment for practicing the invention. see figure 1 , the implementation environment includes: a server cluster 101, a client 103, and the server cluster 101 includes a server 102.

[0053] The client 103 may be a portable terminal such as a mobile phone, or may be a personal computer or a workstation. The server cluster 101 gathers a plurality of servers 102 to provide the same service or multiple services, and it looks like there is only one server to the client. It should be understood that in the server cluster 101, the number of servers 102 is one or more than one.

[0054]The client 103 communicates with the server cluster 101 in a wireless or wired mann...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of network access control, and discloses a token generation method and device and a token check method and device. The token generation method in the invention is applied to a server cluster. The method comprises the steps of: receiving the identification character string of a token needing to be checked sent by a client side; searching a key of the identification character string in a token database, wherein the token database stores a generated token, including the identification character string stored as the key and an information character string stored as the key value of the corresponding value; after the key of the identification character string is searched in the token database, obtaining the key value of the key, and then, setting thekey value of the key stored in the token database to an invalid value; and, detecting the obtained key value of the key, when the key value is not the invalid value, representing that a check resultis passed, and, when the key value is the invalid value, representing that the check result is not passed. By means of the token check method and device disclosed by the invention, one-time effectiveness of the token is ensured through a simple and convenient mechanism.

Description

technical field [0001] The invention relates to the technical field of network access control, in particular to a token verification method and device. Background technique [0002] In a distributed system, passing user identities through tokens between components is the most common solution, such as single sign-on, streaming in video applications, and so on. There have been a large number of inventions on how to use tokens for single sign-on and identity verification, but how to ensure that tokens are valid for one time is not yet a better solution before the present invention. Many systems do not really realize that the token is valid once, and there are large loopholes, or in order to achieve the purpose of being valid once, the system will become very complicated. [0003] In the prior art, the general scheme to ensure that the token is valid once is: the client applies for a token to the server cluster, the server cluster generates the token, stores the token in the da...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
CPCH04L9/3213
Inventor 孙莹杰
Owner HANGZHOU AUTOMOTIVE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products