Method, device and system for degrading token generation service

A server-side, success-rate technology, applied in the computer field, can solve problems that affect business progress and affect the high availability of token services, and achieve the effect of improving high availability

Pending Publication Date: 2022-01-28
BEIJING SANKUAI ONLINE TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The embodiment of the present application provides a method for downgrading the token generation service, which can solve the problems in the prior art that affect the progress of the business and the high availability of the token service

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and system for degrading token generation service
  • Method, device and system for degrading token generation service
  • Method, device and system for degrading token generation service

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0099] In order to make the purpose, technical solution and advantages of the present application clearer, the implementation manners of the present application will be further described in detail below in conjunction with the accompanying drawings.

[0100] The embodiment of the present application provides a method for downgrading the token generation service. The method can be completed by multiple computer devices. The multi-side computer devices can include a client side and a token server side. The client side can be a terminal and a server. etc., the terminal can be a desktop computer, basic computer, tablet computer, mobile phone, etc., the server can be a single server or a server cluster, etc., and the token server can be a server. figure 1 shows a possible network architecture provided by the embodiment of the present invention, such as figure 1 As shown, the client and the token server can transmit data to each other.

[0101] A computer device may include a proce...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an method, a device and a system for degrading token generation service, and belongs to the technical field of computers. The method comprises the following steps: detecting whether a token generation service of a token server side is normal or not; when the token generation service of the token server side is abnormal, starting a local token generation service; in the operation process of the local token generation service, generating ciphertext data and a first token value corresponding to plaintext data whenever the plaintext data to be stored is obtained; and when the token generation service of the token server returns to normal, sending the stored ciphertext data and the first token value to the token server, and closing the local token generation service. By adopting the method, the device and the system, the high availability of the token service is effectively improved.

Description

technical field [0001] The present application relates to the field of computer technology, in particular to a method, device and system for downgrading token generation services. Background technique [0002] With the rapid development of computer technology, more and more attention has been paid to the security of sensitive information, and a token (token) solution for sensitive information has also emerged. The token solution is: randomly generate a token for each plaintext of sensitive information Unique identification information. The unique identification information is the token value corresponding to the plain text of sensitive information. When data is transmitted in various business systems, the token value can be used instead of the plain text transmission of sensitive information to avoid leakage of sensitive information as much as possible. For example, in a consumer application, the user's phone number, bank card number, etc. are sensitive information. When the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F9/54H04L9/32
CPCG06F9/543H04L9/3213
Inventor 吕亚明赵发武江涛刘运闫洪康
Owner BEIJING SANKUAI ONLINE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products