A login verification processing method, system and device

A technology of login verification and processing method, which is applied in the field of login verification processing method, system and device, and can solve problems such as request failure, invalidation, business server cannot guarantee the order of concurrent refresh tokens, etc., so as to improve user experience and ensure logical correctness Effect

Active Publication Date: 2021-10-12
GUANGZHOU XIAOPENG MOTORS TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] When refreshing the login state token concurrently according to the RefreshToken, if there are multiple concurrent refresh token requests, since the business server cannot guarantee the order of concurrent refresh token requests, the login server verifies the consistency of the random string correctly After that, a new random string will be generated immediately to overwrite the current cache, which will lead to concurrent refresh token requests. Only one request to update the token succeeds, while other requests will be caused by the inconsistency between the cached random string and the requested random string. Request failed
And the return packets of concurrent requests cannot guarantee the sequence, so it is possible that before the request for successful refresh is returned, the random string is inconsistent, resulting in the return packet of the request for refresh token failure being returned to the client, causing the client to respond to the user's status The user login state fails, and the user needs to log in again through the account password, which cannot guarantee the idempotency of the login state, and seriously affects the user experience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A login verification processing method, system and device
  • A login verification processing method, system and device
  • A login verification processing method, system and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] method embodiment

[0042] refer to figure 1 , this embodiment provides a login verification processing method, the method is mainly executed in the login server, and is used to realize the process of refreshing the login state supporting idempotence, and specifically includes the following steps:

[0043] S1. After receiving the verification request information carrying the login information sent by the first terminal, perform login verification, and after the verification is successful, proceed to the next step; the login information includes login account number and password and other information; in the actual execution process , only after verifying that the login information is correct, continue to perform the following steps, and use the login state verification method to log in to the account; here, the first terminal can be various smart terminals such as smart phones, tablets, computers, and vehicle-mounted terminals;

[0044] S2. When the login information s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a login verification processing method, system and device. The method includes: when receiving a login request carrying a first token sent by a first terminal, after decrypting the first token, reading the obtained After the version number of the first token, compare the read version number with the cached version number, and perform login state verification; when receiving the token update request carrying the second token sent by the first terminal , after decrypting the second token, read the version number in the second token, compare the read version number with the cached version number, and execute the corresponding token update process; wherein, the second token The valid period of the first token is longer than that of the first token, and the second token is used for the first terminal to refresh the first token. The method can ensure idempotent processing of request information for multiple concurrent requests to update tokens, ensure logical correctness of login state verification, improve user experience, and can be widely used in the information security industry.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to a login verification processing method, system and device. Background technique [0002] Explanation of terms: [0003] OAuth: An open protocol that provides a secure, open and simple standard for authorization of user resources. [0004] Token: Token, mark, computer term. [0005] In the current technology, the login mechanism of the login system based on the OAuth2.0 protocol is to allocate a bunch of login tokens, including the short-period token AccessToken and the long-period token RefreshToken. The general validity period of AccessToken is several hours, and the general validity period of RefreshToken is for several months. In the traditional technology, the system randomly assigns two random strings as AccessToken and RefreshToken, and then caches the pair of random strings in the cache server respectively. Consistent, if it is consistent, it is a ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L29/06H04L29/08H04L9/08G06F8/71
CPCH04L9/0891H04L9/3213H04L63/08G06F8/71H04L67/568
Inventor 朱朝卓唐正洪基明周慧能谭绍龙
Owner GUANGZHOU XIAOPENG MOTORS TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products