Network token generation method and device, terminal equipment and storage medium
A token and network technology, applied in the field of network token generation, can solve the problems of inability to store user sensitive data, low security of technical specifications, and achieve the effect of enhancing authenticity and uniqueness, ensuring security and exclusivity
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0030] Example 1
[0031] figure 1 A flowchart of the method for generating a network token in this embodiment is shown. A network token is a concise and URL-secure expressive declaration specification used to transfer security information between the client and the server. The method of generating the network token is applied to the server. Such as figure 1 As shown, the method for generating the network token includes the following steps:
[0032] S110. Obtain a login request sent by the client. The login request includes the terminal ID and the validity of the token, and the validity of the token includes any of the initial value, validity and invalidity.
[0033] Specifically, the login request is a request sent when the client connects to the server through a browser or a third-party interface.
[0034] The terminal ID is an identifier used to uniquely identify the client that sends the login request. The terminal ID can be the login IP used by the client to connect to the serv...
Example Embodiment
[0142] Example 2
[0143] Figure 7 The principle block diagram of the device for generating a network token corresponding to the method for generating a network token in Embodiment 1 is shown. The network token is a concise, URL-secure expressive declaration specification used to transfer security information between the client and the server. The device for generating the network token is applied to the server. Such as Figure 7 As shown, the device for generating a network token includes a login request module 110, an identity authentication module 120, a load data generating module 130, a network token generating module 140, and a network token sending module 150. The steps of obtaining the login request module 110, performing the identity authentication module 120, generating the load data module 130, generating the network token module 140, and sending the network token module 150 are the steps corresponding to the network token generation method in the first embodiment. ...
Example Embodiment
[0173] Example 3
[0174] This embodiment provides a computer-readable storage medium with a computer program stored on the computer-readable storage medium. When the computer program is executed by a processor, the method for generating a network token in Embodiment 1 is implemented. In order to avoid repetition, it will not be repeated here. Repeat. Alternatively, when the computer program is executed by the processor, the function of each module / unit in the network token generation device in Embodiment 2 is realized. In order to avoid repetition, it will not be repeated here.
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap