Security authentication interception method based on json verification code
A security authentication and verification code technology, applied in the field of computer software, can solve problems such as downtime, inapplicability, and server memory exhaustion, and achieve the effects of avoiding information leakage, strong practicability, and a wide range of applications
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0019] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments.
[0020] as attached figure 1 As shown, the present invention provides a method for intercepting security authentication based on json verification codes, and the purpose of the invention is to prevent users from directly accessing system resources without logging into the system.
[0021] The implementation process is as follows: first, all access links in the system are regarded as system resources, and only users who have successfully logged in can access, and users who have not logged in cannot access; after successful login, a json verification code is granted to the user, When a user accesses system resources, the json verification code is attached to each user's access request, that is, an access request without a json verification code or with an expired json verification code is considered an illegal request and no permission is granted....
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com