Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network token generation method and device, terminal equipment and storage medium

A token and network technology, applied in the field of network token generation, can solve the problems of inability to store user sensitive data, low security of technical specifications, and achieve the effect of enhancing authenticity and uniqueness, ensuring security and exclusivity

Active Publication Date: 2018-08-28
PING AN TECH (SHENZHEN) CO LTD
View PDF6 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Embodiments of the present invention provide a method, device, terminal device, and storage medium for generating a network token, so as to solve the problem that the existing JWT network token generation technical specifications are not highly secure and cannot store user sensitive data.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network token generation method and device, terminal equipment and storage medium
  • Network token generation method and device, terminal equipment and storage medium
  • Network token generation method and device, terminal equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0031] figure 1 A flowchart showing the method for generating a network token in this embodiment. Web Tokens are a compact, URL-safe specification of representational claims for passing security information between clients and servers. The method for network token generation is applied on the server. Such as figure 1 As shown, the method for generating a network token includes the following steps:

[0032] S110. Obtain a login request sent by the client, where the login request includes a terminal ID and token validity, and the token validity includes any one of an initial value, valid and invalid.

[0033] Specifically, the login request is a request sent by the client when connecting to the server through a browser or a third-party interface.

[0034] The terminal ID is used to uniquely identify the client that sends the login request. The terminal ID can be the login IP used by the client to connect to the server or the hardware MAC address of the client, depending on t...

Embodiment 2

[0143] Figure 7 A functional block diagram of a device for generating a network token corresponding to the method for generating a network token in Embodiment 1 is shown. A Web Token is a concise, URL-safe representation specification for passing security information between a client and a server. The device for generating the network token is applied on the server. Such as Figure 7 As shown, the device for generating a network token includes an acquisition login request module 110 , an identity authentication module 120 , a payload data generation module 130 , a network token generation module 140 , and a network token sending module 150 . Wherein, the realization functions of the obtaining login request module 110, performing the identity authentication module 120, generating the load data module 130, generating the network token module 140 and sending the network token module 150 correspond to the steps of the method for generating the network token in Embodiment 1 One...

Embodiment 3

[0174] This embodiment provides a computer-readable storage medium, and a computer program is stored on the computer-readable storage medium. When the computer program is executed by a processor, the method for generating a network token in Embodiment 1 is implemented. To avoid repetition, it is not repeated here repeat. Alternatively, when the computer program is executed by the processor, the functions of the modules / units in the device for generating network tokens in Embodiment 2 are implemented. To avoid repetition, details are not repeated here.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network token generation method and device, terminal equipment and a storage medium, and relates to the field of the network security authentication. The network token generation method comprises the following steps: acquiring a login request sent by a client, wherein the login request comprises a terminal ID and a token effectiveness, the token effectiveness comprises any one of an initial value, effectiveness and ineffectiveness; if the token effectiveness is the initial value or ineffectiveness, performing identity authentication based on user sensitive data in thelogin request; generating load data if the identity authentication is passed; generating the network token with a token rule based on the load data and the user sensitive data, setting the effectiveness of the token as effective. Through the network token generation method disclosed by the invention, the security of the user sensitive data in the transmission process is guaranteed when the authenticity and the uniqueness of the user identity are enhanced.

Description

technical field [0001] The invention relates to the field of network security authentication, in particular to a method, device, terminal equipment and storage medium for generating a network token. Background technique [0002] JWT (JSON Web Token, JSON Network Token) is a concise, URL-safe representation specification for transferring security information between clients and servers. The JWT-based stateless authentication mechanism will carry the signed Token information (that is, the token) in each request, which means that there is no need to re-authenticate the user identity of the application server that is authenticated by the token, providing for the extension of the application. convenience. [0003] The JWT includes a payload part for obtaining and recording user login data, and a signature part based on the payload part and user login data, wherein the data carried by the payload part and the signature part can be decrypted. It can be seen from the composition s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L9/08H04L29/06
CPCH04L9/0866H04L9/3213H04L63/0807
Inventor 辜坤
Owner PING AN TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products