Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Request authentication method and system

An authentication method and authentication result technology, applied in the field of network security, can solve problems such as congestion in the authentication process and increased server memory overhead

Inactive Publication Date: 2018-11-13
BEIJING CHINA POWER INFORMATION TECH +2
View PDF5 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the present invention provides a request authentication method and system to solve each request in the prior art, a Session will be created on the server side to store the request information, when more and more clients initiate requests , the overhead of server memory will continue to increase, and it will also cause congestion in the verification process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Request authentication method and system
  • Request authentication method and system
  • Request authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0046] The above description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the general principles defined herein may be implemented in other embodiments without departing from the spirit or scope of the invention. Therefore, the present invention will not be limited to the embodiments shown herein...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a request authentication method. The method comprises the steps of obtaining preset token information contained in a request when the request initiated by a target client is received; obtaining an encryption key in a configuration file, and decrypting and decoding the preset token information according to the encryption key, thereby obtaining signature information; judgingwhether the signature information is the same as preset target signature information or not; authenticating the request successfully if the signature information is the same as the preset target signature information; and authenticating the request unsuccessfully if the signature information is different from the preset target signature information. According to the authentication method, the authentication is carried out through utilization of the preset token information of the client, and the information does not need to be stored by a server. The problem that each time when the request isinitiated, session storage request information needs to be established at the server, when more and more clients initiate the requests, the cost of the memory of the server is continuously increased,and an authentication process also can be congested is avoided.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a request authentication method and system. Background technique [0002] In the network communication process, the premise that the client and the server can communicate is that the server must verify the request sent by the client, and the verification is successful. In the prior art, every time the client initiates a request, the server will create a Seesion to store the request information, and verify the identity of the client according to the request information. [0003] The inventor researched the existing request verification process and found that every time a request is made, a Session will be created on the server side to store the request information. When more and more clients initiate requests, the memory overhead of the server will also continue to increase. And it will also cause congestion in the verification process. Contents of the invention [00...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08H04L9/32
CPCH04L9/3213H04L63/0807H04L63/083H04L67/30
Inventor 严永兵陈亮郭伟恩董国龙吴宇婷张馨月
Owner BEIJING CHINA POWER INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products