Unlock instant, AI-driven research and patent intelligence for your innovation.

Security control method and system based on dynamic token

A dynamic token and security control technology, applied in the field of communication, can solve problems such as increasing the operating pressure of the server, and achieve the effect of enhancing information security and reducing pressure

Pending Publication Date: 2020-07-17
CHINA CONSTRUCTION BANK
View PDF7 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] But this will undoubtedly increase the operating pressure on the server. Is there a way to verify whether the user is the previous user without querying the database every time the client requests data to determine whether the user name and password are correct?

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security control method and system based on dynamic token
  • Security control method and system based on dynamic token
  • Security control method and system based on dynamic token

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] The following will clearly and completely describe the technical solutions in the embodiments of the present application with reference to the drawings in the embodiments of the present application. The described embodiments are only some of the embodiments of the present application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0056] The principle and spirit of the present application will be explained in detail below with reference to several representative implementations of the present application.

[0057] Although the present application provides method operation steps or device structures as shown in the following embodiments or accompanying drawings, more or less operation steps or module units may be included in the method or device based on conventional or creative work . In the step...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a security control method and system based on a dynamic token, and the method comprises the steps: receiving an authentication request message sent by a client, the authentication request message carrying user login information; determining whether the client is in an authorization range or not according to the authentication request message; if so, returning an authentication success message to the client; if the user login information is not in the authorization range, sending the authentication request message to an authentication server to obtain a dynamic token corresponding to the user login information; and sending the dynamic token corresponding to the user login information and an authentication success message to the client. Through the application of thedynamic token, the information security is enhanced, and meanwhile, the pressure of database interaction is also reduced.

Description

technical field [0001] The present application relates to the technical field of communication, and in particular to a security control method and system based on a dynamic token. Background technique [0002] This section is intended to provide a background or context to the embodiments of the application that are recited in the claims. The descriptions herein are not admitted to be prior art by inclusion in this section. [0003] When the client requests data from the server multiple times, the server needs to query the user name and password from the database multiple times and compare them to determine whether the user name and password are correct and give corresponding prompts. [0004] But this will undoubtedly increase the operating pressure on the server. Is there a way to only verify whether the user is the previous user, instead of querying the database every time the client requests data to determine whether the user name and password are correct. Contents of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0807H04L67/02
Inventor 安兴朝赵钊杨宇鹏
Owner CHINA CONSTRUCTION BANK