Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Token-based client identity verification method and system

A client identity and client technology, applied in the information field, can solve problems such as being unable to prevent others from logging in and existing security risks, and achieve the effect of protecting rights and ensuring account security

Active Publication Date: 2019-02-05
TAIHUA WISDOM IND GRP CO LTD
View PDF3 Cites 59 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this way, after the user password or token is leaked, changing the password cannot prevent others from logging in, and it is impossible to know in time that the account information has been leaked, which poses a security risk

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Token-based client identity verification method and system
  • Token-based client identity verification method and system
  • Token-based client identity verification method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042]Certain terms are used, for example, in the description and claims to refer to particular components. Those skilled in the art should understand that hardware manufacturers may use different terms to refer to the same component. The specification and claims do not use the difference in name as a way to distinguish components, but use the difference in function of components as a criterion for distinguishing. As mentioned throughout the specification and claims, "comprising" is an open term, so it should be interpreted as "including but not limited to". "Approximately" means that within an acceptable error range, those skilled in the art can solve the technical problem within a certain error range and basically achieve the technical effect. In addition, the term "coupled" herein includes any direct and indirect electrical coupling means. Therefore, if it is described that a first device is coupled to a second device, it means that the first device may be directly electr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a token-based client identity verification method and system, and relates to the field of information technology. The method comprises the following steps: waiting for to receive a user name and password information sent by a client; judging whether the user name and the password information match with the user name and the password information stored in a server, and if not, prompting re-input; if so, generating an authorization token corresponding to a user ID; storing the authorization token in a database and returning the authorization token to the client; waiting for to receive request information sent by the client, and judging whether the request information carries the authorization token: if the request information carries the authorization token, judging whether the authorization token is valid, and if the authorization token invalid, returning re-login information; if the authorization token is valid, judging whether the authorization token stored inthe database is consistent with the authorization token carried in the request information, and if so, indicating that the verification is passed; if not, indicating that the verification fails, and returning account remote login information; and if the request information does not carry the authorization token, returning the re-login information.

Description

technical field [0001] The present application relates to the field of information technology, in particular, to a method and system for token-based client authentication. Background technique [0002] Json web token (JWT) is a JSON-based development standard (RFC 7519) implemented for the transmission of claims between network application environments. The token is designed to be compact and secure, and is especially suitable for single sign-on on distributed sites ( SSO) scenario. The statement of JWT is generally used to pass the authenticated user identity information between the identity provider and the service provider, so as to obtain resources from the resource server, and can also add some additional statement information necessary for other business logic. The token is also Can be used directly for authentication or encrypted. [0003] In the traditional sessino-based authentication, after each user is authenticated by the application, a record must be made on t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0807H04L63/083
Inventor 郝敬全王涛赵建云辛国茂马述杰
Owner TAIHUA WISDOM IND GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products