Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security authentication interception method based on json verification code

A security authentication and verification code technology, applied in the field of computer software, can solve problems such as downtime, inapplicability, and server memory exhaustion, and achieve the effects of avoiding information leakage, strong practicability, and a wide range of applications

Inactive Publication Date: 2017-02-15
INSPUR QILU SOFTWARE IND
View PDF2 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In a distributed environment, there will be a large number of users online at the same time, and the session data containing a large amount of user information will quickly exhaust the server memory, which is likely to cause downtime
Therefore, the session mode is not suitable for a distributed environment with a large number of online users at the same time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security authentication interception method based on json verification code

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments.

[0020] as attached figure 1 As shown, the present invention provides a method for intercepting security authentication based on json verification codes, and the purpose of the invention is to prevent users from directly accessing system resources without logging into the system.

[0021] The implementation process is as follows: first, all access links in the system are regarded as system resources, and only users who have successfully logged in can access, and users who have not logged in cannot access; after successful login, a json verification code is granted to the user, When a user accesses system resources, the json verification code is attached to each user's access request, that is, an access request without a json verification code or with an expired json verification code is considered an illegal request and no permission is granted....

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a security authentication interception method based on a json verification code. The method comprises the steps that all access links in a system are regarded as the resources of the system, and access is available for users who successfully log in, but is unavailable for users who do not log in; after successful login, the json verification code is granted to a user; when the user accesses the system resources, the json verification code is attached to each access request of the user; and access requests without the json verification code or with an expired json verification code are identified as illegal requests, and permission granting is prevented. Compared with the prior art, the security authentication interception method based on the json verification code has the advantages that the access efficiency of a server in a distributed environment is greatly improved; downtime caused by massive online users at the same time is avoided; the json verification code is AES265 encrypted and is time-based, which avoids the risk of information leak after the json verification code is intercepted; and the security authentication interception method has the advantages of high practicality, wide application range and easy promotion.

Description

technical field [0001] The invention relates to the technical field of computer software, in particular to a method for intercepting security authentication based on JSON verification codes. Background technique [0002] For applications in a distributed environment, the security of resource access is very important. If system resources can be accessed directly without logging in, the resources in the system may be leaked at any time, causing immeasurable losses. In addition, in a distributed environment, security authentication interception of user behavior will require higher performance. While ensuring information security, we must also ensure that security audits will not cause performance pressure, so as to improve the efficiency of security audits. [0003] Traditional security authentication interception methods rely on sessions to store user IDs and context information, requiring a large amount of server memory. To determine whether the user has logged in by detect...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 王文英王柏华李照川赵海兴
Owner INSPUR QILU SOFTWARE IND
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products