Unlock instant, AI-driven research and patent intelligence for your innovation.

Token verification method, device and equipment and storage medium

A verification method and token technology, which are applied in secure communication devices, user identity/authority verification, digital transmission systems, etc., can solve the problem of low token reliability, affecting network access security, and token verification process. and other problems to avoid replay attacks, ensure integrity, and improve security.

Inactive Publication Date: 2020-11-13
HUMAN HORIZONS (JIANGSU) TECH CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The existing token verification process is relatively simple. When the token provided by the client corresponds to the token stored in the server, the verification is passed. A more rigorous verification process is not performed on the token, resulting in The reliability is not high, thus affecting the security of network access

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Token verification method, device and equipment and storage medium
  • Token verification method, device and equipment and storage medium
  • Token verification method, device and equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0042] see figure 1 , figure 1 It is a flowchart of a token verification method provided by an embodiment of the present invention; the token verification method includes:

[0043] S11. Obtain the token to be verified in the service request in response to the service request sent by the client;

[0044] S12. Obtain the identifier in the token to be verified;

[0045] S13. Determine whether the token to be verified has been used based on the identifier;

[0046]...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a token verification method, which comprises the following steps: in response to a service request sent by a client, obtaining a to-be-verified token in the service request; obtaining an identifier in the to-be-verified token; judging whether the to-be-verified token is used or not based on the identifier; when the to-be-verified token is not used, judging whether the to-be-verified token meets a preset token compliance condition or not, wherein the token compliance condition comprises that the generation time of the to-be-verified token is earlier than the preset request arrival time; if so, judging that the to-be-verified token is successfully verified; and if not, judging that the verification of the to-be-verified token fails. The invention further discloses a token verification device, token verification equipment and a computer readable storage medium. By adopting the embodiment of the invention, the security of the network access process can be improved.

Description

technical field [0001] The present invention relates to the technical field of network access control, in particular to a token verification method, device, equipment and storage medium. Background technique [0002] Tokens are a concept aimed at the security of smart terminals. With the continuous development of network data security, tokens, as one of the most secure authentication technologies, have been applied by more and more industries. When the client needs to access the server, the server will create an access token, which can be used for identity authentication, which can effectively improve the security of identity authentication, and is widely used in application fields such as online banking, telecom operators, and e-government affairs. The commonly used token verification method in the prior art is: the client applies for a token to the server in advance, the server generates the token, stores the token in the database and returns the token to the client, and t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
CPCH04L9/3213H04L9/3247H04L9/3297
Inventor 陈晨
Owner HUMAN HORIZONS (JIANGSU) TECH CO LTD