Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authentication method and system based on JWT

An authentication method and authentication service technology, which is applied in the field of front-end and back-end communication, can solve problems such as resource loss and front-end application inaccessibility, and achieve the effect of avoiding security problems

Active Publication Date: 2021-02-02
SHENZHEN COMTOP INFORMATION TECH
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In the past single application system, when the front-end requests to the back-end, the authentication control is generally performed through the session sharing mechanism. When business services gradually expand and increase, once the shared storage goes down, the front-end application cannot be accessed, and each user After logging in, it is necessary to store its authentication information in the shared storage, even for a long time. In this case, there is a serious problem of resource consumption.
In addition, shared storage requires a certain protection mechanism, so it needs to be accessed through a secure link. The implementation of this scenario solution is quite complex

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method and system based on JWT
  • Authentication method and system based on JWT
  • Authentication method and system based on JWT

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] In order to facilitate understanding of the present invention, the present invention will be described more fully hereinafter with reference to the related drawings. Typical embodiments of the invention are shown in the drawings. However, the present invention may be embodied in many different forms and is not limited to the embodiments described herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete.

[0027] Unless otherwise defined, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. The terms used herein in the description of the present invention are for the purpose of describing specific embodiments only, and are not intended to limit the present invention.

[0028] refer to figure 1 , the general idea of ​​the present invention is: construct a JWT-based authentication method and system to realize the communi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an authentication method and system based on JWT. The method comprises the steps that a front-end application sends a login request carrying account password information to anauthentication service through a service gateway; the authentication service performs account and password verification on the account and password information according to the verification mode corresponding to the account and password information adaptation pair and the specific authentication interface of the visitor service; the authentication service creates a bill and returns the bill to thefront-end application when the visitor service returns verification passing information; the front-end application carries a bill to send a service access request to the service gateway; the servicegateway verifies the bill, refreshes the bill after successful verification, carries the refreshed bill to access the business service, and returns business data returned by the business service and the refreshed bill to the front-end application. According to the method, the defects that in the prior art, authentication control between the front end and the rear end through a session sharing mechanism is unreliable and complex, and the requirement for gradual expansion of business services cannot be well met can be overcome.

Description

technical field [0001] The present invention relates to the field of front-end and back-end communication, in particular to a JWT-based authentication method and system. Background technique [0002] In the past single application system, the front-end request to the back-end was generally controlled through the session sharing mechanism. When the business services gradually expanded, once the shared storage was down, the front-end application could not be accessed, and each user After logging in, the authentication information needs to be stored in the shared storage, and it even needs to be stored for a long time. In this case, there is a problem of serious resource consumption. In addition, shared storage requires a certain protection mechanism, so it needs to be accessed through a secure link. The implementation of this scenario solution is quite complex. SUMMARY OF THE INVENTION [0003] The technical problem to be solved by the present invention is to provide a JWT-...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0807H04L63/0815H04L63/101
Inventor 赵铭林镇锋易文峰翟羽佳蔡子琪杨赛昌宇顺
Owner SHENZHEN COMTOP INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products