Unlock instant, AI-driven research and patent intelligence for your innovation.

Token generation method and device, nonvolatile storage medium and processor

A non-volatile storage and processor technology, applied in the field of network security, can solve the problem that simple tokens cannot protect user information security, and achieve the effect of improving security and solving user information security

Pending Publication Date: 2022-04-08
CHINA TELECOM CORP LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Embodiments of the present invention provide a token generation method, device, non-volatile storage medium, and processor to at least solve the technical problem that simple tokens cannot protect user information security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Token generation method and device, nonvolatile storage medium and processor
  • Token generation method and device, nonvolatile storage medium and processor
  • Token generation method and device, nonvolatile storage medium and processor

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] In order to enable those skilled in the art to better understand the solutions of the present invention, the following will clearly and completely describe the technical solutions in the embodiments of the present invention in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments are only It is an embodiment of a part of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts shall fall within the protection scope of the present invention.

[0022] It should be noted that the terms "first" and "second" in the description and claims of the present invention and the above drawings are used to distinguish similar objects, but not necessarily used to describe a specific sequence or sequence. It is to be understood that the data so used are interchangeable under appropriate ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a token generation method and device, a nonvolatile storage medium and a processor. The method comprises the following steps: receiving an access request sent by a client; generating a first wavelength and a second wavelength based on the access request; based on the physical characteristics of the target biaxial crystal, determining a first optical axis angle and a second optical axis angle corresponding to the first wavelength and the second wavelength respectively in the target biaxial crystal; and determining a target encryption method for generating the access token according to the first optical axis angle and the second optical axis angle, and generating a target access token according to the access request and the target encryption method. The technical problem that a simple token cannot protect user information security is solved.

Description

technical field [0001] The present invention relates to the field of network security, in particular to a token generation method, device, non-volatile storage medium and processor. Background technique [0002] With the development of Internet technology and the maturity of application software, user information, as a resource, is of special significance to human beings due to its universality, sharing, value-added, processability and multi-utility. Information security is an area that the industry has paid more and more attention to over the past few years. It protects computer hardware, software, and data from being damaged, changed, and leaked due to accidental or malicious reasons. In the software industry, tokens are a very important link as the only security certificate for the interaction between the client and the server. The market is flooded with a large number of low-priced tokens that have no practical effect. Bad token rules will cause information leakage pose...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/40H04L9/32
Inventor 孙科王乾蒋艳军赵轶新
Owner CHINA TELECOM CORP LTD