Check patentability & draft patents in minutes with Patsnap Eureka AI!

User identification security verification method and device based on shiro framework, and computer medium

A security verification and user identification technology, applied in the field of network security, can solve the problems of not setting token timeliness, validity or valid for a period of time, illegal use, etc., to save resources, ensure security, and have strong compatibility Effect

Pending Publication Date: 2022-01-07
紫金诚征信有限公司
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, most front-end and back-end separation projects on the market are based on tokens for security verification. Many projects do not set the timeliness of tokens, and tokens may be valid all the time or for a period of time. Therefore, the existing technology has the following security problems : Once other personnel obtain the token after the user logs in to the page, they can directly request various interfaces without operating the page, the user ID may be intercepted, and the user information may be parsed, thereby being illegally used

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User identification security verification method and device based on shiro framework, and computer medium
  • User identification security verification method and device based on shiro framework, and computer medium
  • User identification security verification method and device based on shiro framework, and computer medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the drawings in the embodiments of the present invention.

[0043] At present, most front-end and back-end separation projects on the market are based on tokens for security verification, but many projects do not set the timeliness of tokens, and tokens are always valid or valid within one day. After the user logs in on the page, illegal elements get the token, which can achieve the purpose of directly requesting various interfaces without operating on the page, which is very low in security.

[0044] According to the technical solution of the present invention, the token obtained by the user after logging in is valid within five minutes, and the synchronously generated mark for refreshing the token is half an hour. Five minutes later, if the request comes and finds that the token has expired, but the token is still valid, the request ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a user identification security verification method based on a shiro framework, which relates to the field of network security, and the method comprises the following steps that: a user inputs a verification code and an account password in a browser, and the browser sends the verification code and the account password to a server in a post form; the server carries out verification after receiving the verification, and if the verification is passed, the server generates a JWT token and presets the expiration time of the token; the server returns the generated JWT to the browser; the browser comprises a JWT (JavaScript Weighted Table) in an augmentation header, and then sends a request to the server; the server extracts user information from the JWT fed back by the browser and configures the user information in a data structure server Redis; related configuration files in the shiro framework are rewritten, and enhanced security verification is carried out on the token; and if the verification is passed, the network interface needing to be accessed is called. The problem that illegal operation is carried out due to the fact that the item is not provided with the timeliness of the token, the security risk exists, the user identifier is likely to be intercepted and the user information is analyzed is solved.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a shiro framework-based user identification security verification method, device and computer medium. Background technique [0002] At present, most front-end and back-end separation projects on the market are based on tokens for security verification. Many projects do not set the timeliness of tokens, and tokens may be valid all the time or for a period of time. Therefore, the existing technology has the following security problems : Once other personnel obtain this token after the user logs in to the page, they can directly request various interfaces without operating the page, and the user ID may be intercepted and user information parsed, thereby being illegally used. Contents of the invention [0003] Aiming at the deficiencies of the prior art, the present invention provides a user identification security verification method, device and computer medium based on t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/62G06F21/64G06F21/31
CPCG06F21/602G06F21/6218G06F21/64G06F21/31
Inventor 王锦胤贺浪杨凯
Owner 紫金诚征信有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More