Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Login token generation and verification method and device and server

A technology of token and login request, applied in the field of information, can solve the problems of low security, too simple generation of login token, easy to be stolen, etc.

Active Publication Date: 2019-11-22
ONE CONNECT SMART TECH CO LTD SHENZHEN
View PDF12 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the embodiment of the present invention provides a login token generation and verification method, device, and server to solve the problem that the login token generation method in the prior art is too simple, is extremely easy to be stolen, and has low security The problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Login token generation and verification method and device and server
  • Login token generation and verification method and device and server
  • Login token generation and verification method and device and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] In the following description, specific details such as specific system structures and technologies are presented for the purpose of illustration rather than limitation, so as to thoroughly understand the embodiments of the present invention. It will be apparent, however, to one skilled in the art that the invention may be practiced in other embodiments without these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present invention with unnecessary detail.

[0051] The technical solutions of the present invention are illustrated below through specific examples.

[0052] refer to figure 1 , which shows a schematic flow chart of the steps of a method for generating a login token according to an embodiment of the present invention, which may specifically include the following steps:

[0053] S101. Receive a login request submitted by a user through a b...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention is applicable to the technical field of information, and provides a login token generation and verification method and device and a server, and the login token generation method comprises the steps: receiving a login request submitted by a user through a browser, and verifying a user ID and a password contained in the login request; after verification succeeds, obtaining browser information and user information; splicing the user ID, the user information and the browser information into a key plaintext according to a predefined splicing mode and a predefined splicing sequence; generating an original data plaintext based on the user ID and preset token expiration time, and encrypting the original data plaintext by adopting a preset first encryption algorithmto obtain original data; encrypting the header, the original data and the key plaintext which are generated in advance by adopting a preset second encryption algorithm to obtain a dynamic key; and combining the header, the original data and the dynamic key into the login token, so that the security of the login token and the system is improved.

Description

technical field [0001] The invention belongs to the field of information technology, and in particular relates to a method for generating a login token, a method for verifying a login token, a device for generating a login token, a device for verifying a login token, a server and A computer readable storage medium. Background technique [0002] The login token (token) is a string of strings generated by the server as an identifier for the client to make a request. When the user logs in for the first time, the server generates a token and returns this token to the client. Afterwards, when the client initiates a request, it only needs to carry the token in the request, without entering the user name and password again. [0003] In the prior art, the server usually generates a login token according to the username and password used by the user to log in. This generation method is too simple, and only needs to verify the user name and password, and the generated token is extr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/32H04L9/08
CPCH04L9/0863H04L9/3213H04L63/08H04L63/083
Inventor 计波邹檬帆陶玥唐利军
Owner ONE CONNECT SMART TECH CO LTD SHENZHEN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products