JWT-based authorization method capable of being manually revoked

A technology of tokens and user information, applied in the application field of network authorization technology, can solve the problems of misappropriation of client permissions, consumption of server memory space, difficulty in dealing with high concurrent requests, etc., to achieve the effect of supporting high concurrent access and reducing consumption

Inactive Publication Date: 2020-02-28
无锡家校邦网络科技有限公司
View PDF6 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the cookie-based authentication method has web security problems, and it is easy to steal the client's authority through client redirection.
In addition, using Session to store user authorization information will consume the memory space of the server, making it difficult to cope with high concurrent requests

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • JWT-based authorization method capable of being manually revoked
  • JWT-based authorization method capable of being manually revoked

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The present invention will be further described below in conjunction with the accompanying drawings. The following examples are only used to illustrate the technical solution of the present invention more clearly, but not to limit the protection scope of the present invention.

[0035] A JWT-based manually revocable authorization method, including providing a login credential verification program and a server-to-access token verification process;

[0036] The verification procedure for providing login credentials includes the following steps:

[0037] 1a: Query user information based on login credentials;

[0038] 2a: Determine whether the user information can be obtained, and if the user information can be obtained, generate a token ID to assemble the token data;

[0039] 3a: Digitally sign the token data in 2a above;

[0040] 4a: Save the token information to the persistent database, and create an access token record;

[0041] 5a: Set the token to the X-Access-Tok...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to application of a network authorization technology, in particular to a JWT-based authorization method capable of being manually revoked, which is an efficient, recyclable and instantly-updated authorization mechanism based on an access token. The method comprises a program used for providing login certificate verification and a server access token verification process; theprogram for providing the login certificate verification comprises the following steps: 1a, querying user information according to the login certificate; 2a, judging whether the user information can be obtained or not, and generating token ID assembly token data if the user information can be obtained; 3a, performing digital signature on the token data in the 2a; 4a, storing the token informationin a persistent database, and creating an access token record; 5a, setting the token to an X-Access-Token response header, and ending the authentication; 6a, judging whether the user information can be obtained or not in the 2a, and if the user information cannot be obtained, directly ending the authentication.

Description

technical field [0001] The invention relates to the application of network authorization technology, in particular to a JWT-based authorization method that can be manually revoked. Background technique [0002] Granting and authentication of client user rights is an essential function of an Internet application. The mainstream authentication methods include cookie and session-based authentication methods and access token-based authentication methods. [0003] Traditional web applications use Session to store user authorization information on the server side. This method is easy to implement, and the client hardly needs to do additional processing. It is only necessary for the server to set the Session ID that needs to be saved in the client's Cookie in the response header, and only need to destroy the Session on the server side to realize the authority. recycling. However, the cookie-based authentication method has web security problems, and it is easy to steal the client...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/06H04L9/08H04L9/32
CPCH04L9/0643H04L9/0894H04L9/3213H04L9/3226H04L9/3247H04L63/0807H04L63/0815H04L63/083H04L63/0876
Inventor 司毅
Owner 无锡家校邦网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products