Token generation method, token-based tracking method and device

A technology with preset algorithm and encryption algorithm, applied in the Internet field, it can solve problems such as low request efficiency, insecure information, and inability to track clients.

Active Publication Date: 2021-07-06
HANGZHOU ANHENG INFORMATION TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] A Token generation method and device provided by the embodiments of the present invention can solve the technical problems of low request efficiency and insecure information existing in the prior art
[0006] A Token-based tracking method and device provided by the embodiments of the present invention can solve the technical problem of being unable to track client behavior in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Token generation method, token-based tracking method and device
  • Token generation method, token-based tracking method and device
  • Token generation method, token-based tracking method and device

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0030] see figure 1 , is a flow chart of the Token generation method provided by the embodiment of the present invention. The following will be figure 1 The specific process shown will be described in detail.

[0031] Step S101, acquiring user information.

[0032] Optionally, the user information includes, but is not limited to, a user site ID and a MAC (MediaAccess Control or MediumAccessControl) address. For example, the MAC address could be 00:1d:d8:b7:1e:27.

[0033] User information is collected through a pre-installed client program, and the client program is a program delivered to the user by the service platform. The client program is mainly used to query and collect service platform data.

[0034] Wherein, the user site identifier refers to the name of the customer. For example, the customer name is XXX company or business.

[0035] Step S102, encrypting the user information to generate encrypted data.

[0036] As a possible implementation manner, step S102 i...

no. 2 example

[0047] Corresponding to the Token generation method in the first embodiment, figure 2 It shows a Token generation device that adopts the Token generation method shown in the first embodiment in one-to-one correspondence. Such as figure 2 As shown, the Token generation device 400 includes a data acquisition unit 410 , an encryption unit 420 , a digest generation unit 430 , a marking unit 440 and a data sending unit 450 . Among them, the implementation functions of the data acquisition unit 410, the encryption unit 420, the abstract generation unit 430, the marking unit 440 and the data sending unit 450 correspond to the corresponding steps in the second embodiment one by one. a detailed description.

[0048] The data acquiring unit 410 is configured to acquire user information.

[0049] The encryption unit 420 is configured to encrypt the user information to generate encrypted data.

[0050] Optionally, the user information includes a user site ID and a MAC address, and t...

no. 3 example

[0056] see image 3 , is a flow chart of the Token-based tracking method provided by the embodiment of the present invention. The following will be image 3 The specific process shown will be described in detail.

[0057] In step S201, the server receives the request information sent by the client, and the request information includes the client Token and behavior information.

[0058] Optionally, each time the client requests an operation from the server, it will POST the client Token to the server. That is, the server obtains the client Token and behavior information sent by the client by requesting a session.

[0059] Wherein, for the specific implementation manner of the client Token, please refer to the content recorded in the first embodiment, which will not be repeated here.

[0060] The behavior information may be operation information requested by the user, such as update, query and other operation information.

[0061] For example, the client token is 2FE6A8A20D...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The Token generation method, Token-based tracking method and device provided by the present invention belong to the technical field of the Internet. The Token generation method includes acquiring user information; encrypting the user information to generate encrypted data; processing the encrypted data based on a preset algorithm to generate abstract data; using the abstract data as a client token; Token and the user information are sent to the server for storage. By collecting user information and encrypting the user information, encrypted data is generated. The digest data is generated after the encrypted data is processed, so that no matter how long the input data is, the size of the output data after digest processing is fixed. In this way, the size of the request packet is not affected by the client information, thereby effectively improving the request efficiency.

Description

technical field [0001] The present invention relates to the technical field of the Internet, in particular, to a Token generation method, a Token-based tracking method and a device. Background technique [0002] With the development of Internet technology and the maturity of application software, SaaS has emerged as a completely innovative software application model. It is a mode of providing software through the Internet. The manufacturer uniformly deploys the application software on its own server. Customers can order the required application software services from the manufacturer through the Internet according to their actual needs, and obtain the software provided by the manufacturer through the Internet. Serve. [0003] The SaaS service model is the development trend of future management software. It relies on software and the Internet and can support multiple clients. SaaS services are usually based on a set of standard software systems to provide services to hundr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/06
CPCH04L9/0631H04L9/3213H04L9/3239
Inventor 冯明潇范渊刘博龙文洁
Owner HANGZHOU ANHENG INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products