Network token generation method and device, terminal equipment and storage medium

A token and network technology, applied in the field of network token generation, can solve the problems of inability to store user sensitive data, low security of technical specifications, and achieve the effect of enhancing authenticity and uniqueness, ensuring security and exclusivity

Active Publication Date: 2018-08-28
PING AN TECH (SHENZHEN) CO LTD
View PDF6 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Embodiments of the present invention provide a method, device, terminal device, and storage medium for generating a network token, so as to s

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network token generation method and device, terminal equipment and storage medium
  • Network token generation method and device, terminal equipment and storage medium
  • Network token generation method and device, terminal equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0030] Example 1

[0031] figure 1 A flowchart of the method for generating a network token in this embodiment is shown. A network token is a concise and URL-secure expressive declaration specification used to transfer security information between the client and the server. The method of generating the network token is applied to the server. Such as figure 1 As shown, the method for generating the network token includes the following steps:

[0032] S110. Obtain a login request sent by the client. The login request includes the terminal ID and the validity of the token, and the validity of the token includes any of the initial value, validity and invalidity.

[0033] Specifically, the login request is a request sent when the client connects to the server through a browser or a third-party interface.

[0034] The terminal ID is an identifier used to uniquely identify the client that sends the login request. The terminal ID can be the login IP used by the client to connect to the serv...

Example Embodiment

[0142] Example 2

[0143] Figure 7 The principle block diagram of the device for generating a network token corresponding to the method for generating a network token in Embodiment 1 is shown. The network token is a concise, URL-secure expressive declaration specification used to transfer security information between the client and the server. The device for generating the network token is applied to the server. Such as Figure 7 As shown, the device for generating a network token includes a login request module 110, an identity authentication module 120, a load data generating module 130, a network token generating module 140, and a network token sending module 150. The steps of obtaining the login request module 110, performing the identity authentication module 120, generating the load data module 130, generating the network token module 140, and sending the network token module 150 are the steps corresponding to the network token generation method in the first embodiment. ...

Example Embodiment

[0173] Example 3

[0174] This embodiment provides a computer-readable storage medium with a computer program stored on the computer-readable storage medium. When the computer program is executed by a processor, the method for generating a network token in Embodiment 1 is implemented. In order to avoid repetition, it will not be repeated here. Repeat. Alternatively, when the computer program is executed by the processor, the function of each module / unit in the network token generation device in Embodiment 2 is realized. In order to avoid repetition, it will not be repeated here.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network token generation method and device, terminal equipment and a storage medium, and relates to the field of the network security authentication. The network token generation method comprises the following steps: acquiring a login request sent by a client, wherein the login request comprises a terminal ID and a token effectiveness, the token effectiveness comprises any one of an initial value, effectiveness and ineffectiveness; if the token effectiveness is the initial value or ineffectiveness, performing identity authentication based on user sensitive data in thelogin request; generating load data if the identity authentication is passed; generating the network token with a token rule based on the load data and the user sensitive data, setting the effectiveness of the token as effective. Through the network token generation method disclosed by the invention, the security of the user sensitive data in the transmission process is guaranteed when the authenticity and the uniqueness of the user identity are enhanced.

Description

technical field [0001] The invention relates to the field of network security authentication, in particular to a method, device, terminal equipment and storage medium for generating a network token. Background technique [0002] JWT (JSON Web Token, JSON Network Token) is a concise, URL-safe representation specification for transferring security information between clients and servers. The JWT-based stateless authentication mechanism will carry the signed Token information (that is, the token) in each request, which means that there is no need to re-authenticate the user identity of the application server that is authenticated by the token, providing for the extension of the application. convenience. [0003] The JWT includes a payload part for obtaining and recording user login data, and a signature part based on the payload part and user login data, wherein the data carried by the payload part and the signature part can be decrypted. It can be seen from the composition s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L9/08H04L29/06
CPCH04L9/0866H04L9/3213H04L63/0807
Inventor 辜坤
Owner PING AN TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products