Unlock instant, AI-driven research and patent intelligence for your innovation.

Authentication method and device for big data

An authentication method and authentication device technology, applied in the Internet field, can solve the problems of inflexible and convenient access authorization methods, and achieve the effect of improving flexibility and convenience

Active Publication Date: 2022-01-18
徐州蜗牛智能科技有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the existing technology, access tokens (validity certificates) are usually used to authenticate users. However, due to the expiration time of the validity period certificates, in the communication process between the front and back ends, once the time limit expires, the backend must re-issue the validity period. Credentials, from the user's point of view, you must log out and log in again
[0004] Therefore, the access authorization method in the prior art is not flexible and convenient enough

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method and device for big data
  • Authentication method and device for big data
  • Authentication method and device for big data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is only some embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0052] see figure 1 , is a schematic diagram of an application scenario provided by an embodiment of the present invention. The user terminal 11 can be a web page terminal, an APP terminal, or other front-end UI, and the user terminal 11 can be used for the user to input user information, such as inputting a user name and a user password, so...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A big data authentication method and device provided by the present invention relates to Internet technology, by receiving the user's login information; based on the login information and multiple preset initial tokens, multiple pending tokens are obtained, wherein each The effective duration of each of the initial tokens is different; the first predicted duration input by the user is received; one or more valid tokens are obtained according to the first predicted duration and a plurality of pending tokens; according to one or more The expiration time of the valid token determines the login status of the client and improves the flexibility and convenience of the access authorization method. The present invention sets multiple initial tokens, each of which has a different valid time. At the same time, an optimal token is matched based on the online time entered by the user. When the user transmits data with the server, the token can be carried for verification. The authorization of the user's access time can be completed according to the actual needs of the user, which is flexible and convenient.

Description

technical field [0001] The invention relates to Internet technology, in particular to a big data authentication method and device. Background technique [0002] In the era of big data, more and more content tends to be Internet-based, followed by more and more network users. In order to improve user access security, a verification process is usually set up, and only if the verification passes (authorized) Only users can access the data. [0003] In the existing technology, access tokens (validity certificates) are usually used to authenticate users. However, due to the expiration time of the validity period certificates, in the communication process between the front and back ends, once the time limit expires, the backend must re-issue the validity period. Credentials, from the user's point of view, you must log out and log in again. [0004] Therefore, the access authorization method in the prior art is not flexible and convenient enough. Contents of the invention [0...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32
CPCH04L9/3213
Inventor 谷雪美
Owner 徐州蜗牛智能科技有限公司