Login token generation and authentication method, device thereof, and storage medium

A verification method and token technology, applied in the security field, can solve problems such as hidden dangers of user security, and achieve the effect of preventing harm and improving the security of information interaction

Inactive Publication Date: 2019-01-04
PING AN TECH (SHENZHEN) CO LTD
View PDF7 Cites 57 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, the login token is generally randomly generated by a string of unintentional strings. After the client receive

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Login token generation and authentication method, device thereof, and storage medium
  • Login token generation and authentication method, device thereof, and storage medium
  • Login token generation and authentication method, device thereof, and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0039] like figure 1 Shown is a schematic diagram of a preferred embodiment of the electronic device 1 of the present invention.

[0040] In this embodiment, the electronic device 1 refers to a server system, and the electronic device 1 may be a computing device such as a rack server, a blade server, a tower server, or a cabinet server, and the electronic device 1 may be an independent server , or a server cluster composed of multiple servers.

[0041] The electronic device 1 includes but not limited to: a memory 11 , a processor 12 , a display 13 and a network interface 14 . The electronic device 1 is connected to the network through the network interface 14 to obtain raw data. Wherein, the network may be an intranet (Intranet), Internet (Internet), Global System of Mobile Communication (Global System of Mobilecom...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention relates to security techniques, and discloses a login token generation and authentication method, an electronic device thereof and a storage medium. That method comprises the steps of receiving account information and related information sent by a client, verifying the account information, and when the verification is passed, determining the access time of the client according to the mapping relationship between the related information and the preset related information and the access time. Then, according to the related information and the access time, the related information and the access time are encrypted by using a public key and a preset asymmetric encryption algorithm to generate a login token, and the login token is transmitted to the client. Finally, an access request of a client carrying a login token is received, whether the login token carried by the client is the generated login token is verified by using a preset authentication rule according to a private key corresponding to the public key, and permits the client to access if the authentication is passed. By using the method, the device thereof and the storage medium, the safety of informationexchange in the interaction process between the client and the server can be improved, and the hidden danger of safety can be reduced.

Description

technical field [0001] The present invention relates to the field of security technology, in particular to a login token generation and verification method, device and computer-readable storage medium. Background technique [0002] A login token is an identity authentication or token that represents the execution of certain operation instructions, such as a token token. During the interaction between the client and the server, in order to improve the security of information interaction, the server will send a login token to the client and store it in the local memory. When the client accesses the web page of the server, it calls the login token stored locally and sends it to the server for verification and access to data. At present, the login token is generally randomly generated by a string of unintentional character strings. After the client receives the login token, it stores it in the browser cookie. Once the cookie is leaked, it will bring security risks to the user. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3213H04L63/0442H04L63/0807
Inventor 陈晓芳
Owner PING AN TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products