CN111711641A - State control method and device for browser and server architecture identity authentication token - Google Patents

State control method and device for browser and server architecture identity authentication token Download PDF

Info

Publication number
CN111711641A
CN111711641A CN202010660742.2A CN202010660742A CN111711641A CN 111711641 A CN111711641 A CN 111711641A CN 202010660742 A CN202010660742 A CN 202010660742A CN 111711641 A CN111711641 A CN 111711641A
Authority
CN
China
Prior art keywords
token
state
bit
browser
operation time
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010660742.2A
Other languages
Chinese (zh)
Other versions
CN111711641B (en
Inventor
林飞
吴超武
孙远洋
李晨光
易永波
龙泉
陈浏天
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Act Technology Development Co ltd
Original Assignee
Beijing Act Technology Development Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Act Technology Development Co ltd filed Critical Beijing Act Technology Development Co ltd
Priority to CN202010660742.2A priority Critical patent/CN111711641B/en
Publication of CN111711641A publication Critical patent/CN111711641A/en
Application granted granted Critical
Publication of CN111711641B publication Critical patent/CN111711641B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/088Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • H04L9/3213Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer And Data Communications (AREA)

Abstract

A state control method and device for browser and server architecture identity authentication tokens relates to the technical field of information. The invention is composed of a token state controller, a token state base and a token validity checker; the invention realizes the state control and identification of the token; realizing the dynamic validity period control of the identity authentication of a user login system; when the user operates the system, the prompt information of the token state to the user is diversified, and the user experience is improved; the invention solves the problem of data resource leakage caused by security threat to illegal tokens, improves the security of the system, is realized by modifying the upper application entrance of the gateway, has low modification cost and is suitable for popularization and use.

Description

State control method and device for browser and server architecture identity authentication token
Technical Field
The invention relates to the technical field of information, in particular to the technical field of information security.
Background
Identity authentication is a set of identity authentication system which can be controlled and transplanted independently and is an important construction target of the authentication system.
In recent years, Browser and server architectures, i.e. B/S architectures, gradually replace client and server architectures, i.e. C/S architectures, http/https protocols are usually adopted for front-end and back-end interaction, and since the http/https protocols are stateless, the Browser end is a new request for access each time. Thus, each request requires authentication, traditionally session + cookie is used to record/transmit user information, and JWT is a more secure and convenient way. Its advantages are simple structure, compact structure, self-contained, no space occupation, high transmission speed, and high mutual connection between multiple terminals.
JWT is JSON style lightweight authorization and identity authentication specification, and because a Token issued by JWT authorization is stateless, the state of the Token cannot be effectively identified at a server end when a system browser end carries the Token issued by the authentication to carry out service request on the server end, and some safety problems of information leakage are generated.
In order to solve the security threat of system identity authentication in a browser and server architecture, a Token authorized by JWT must be state-controlled, so that the security of the system can be improved, and diversified requirements of the system on identity authentication, such as authentication login, authentication exit, authentication illegal, authentication overtime and the like can be better met.
In the prior art, the security threats encountered by the browser server architecture have the following situations:
1. token security threat problem.
Since the JWT authorizes the Token to be issued by encryption through the secret key or the public and private key, once the secret key or the public and private key is violently solved, the Token is easy to be forged, and the security of the system is threatened.
2. The user does not operate for a long time after logging in the system, and the logging-in state cannot be dynamically identified to be invalid when the user operates again.
After the user logs in the system and passes the identity verification, the JWT in the authentication center authorizes to issue the Token and returns the Token to the browser end, the operation is carried out after the user logs in the system successfully, the Token is carried to send a request to the server end to acquire data resources each time, and the server end does not have state control on the Token carried in the request, so that the server end cannot identify whether the Token is not operated for a long time or not. This presents a security problem in that it is easy for a spectator to use a system in which a principal is already in a logged-in state, in the event that the principal is not present, to perform illegal operations or steal the current Token for private use.
3. And after the user exits the system, the previous Token can be used continuously.
When the user successfully logs out of the system normally, the Server can still successfully acquire the data resource by continuously using the previous Token sending request to the Server, and the Server cannot identify whether the Token logs out and is invalid or not because the Server does not have state control on the Token carried in the request.
Disclosure of Invention
In view of the defects of the prior art, the state control device for the browser and server architecture identity authentication token provided by the invention comprises a token state controller, a token state base and a token validity checker;
the token state controller, the token state library and the token validity checker are arranged at an application upper layer inlet of a gateway filter, so that information sent to a server application system by a browser must first pass through the token state controller, and information sent to the browser by the server application system must first pass through the token state controller;
the token state library is used for recording tokens and states of the tokens, and the format of the token record is as follows: adding token bit, token state bit, login time bit and operation time bit to token bit;
the token position is of a character string type, and the character string of the token is recorded;
the token state bit, the type is a number, when the type number is 0, the entry state is represented, when the type number is 1, the failure state is represented, and when the type number is 2, the exit state is represented;
logging in the time bit, wherein the type is a number, and recording the time of acquiring the token for the first time;
the operation time position is digital, and the time when the browser accesses the server application system last time is recorded;
the method comprises the steps that a token state controller identifies information sent to a server application system by a browser, when the information sent to the server application system by the browser is a login instruction, the token state controller transmits the login instruction in a transparent mode, a token issuer of the server application system receives the login instruction and issues a token and returns the issued token to the browser, the token state controller intercepts and analyzes the token issued by the token issuer of the server application system, records the token into a token state library, records a token state flag bit as 0 and records initial token obtaining time;
when the information sent to the server application system by the browser is a service operation request, the token state controller identifies a token in the service operation request, informs the token validity checker to judge the validity of the token according to the token, and updates the token state recorded by the token state library after the token validity checker judges the validity of the token;
setting an operation time difference threshold of the token by a token validity checker, wherein the operation time difference threshold of the token determines a time interval for which the token is valid under the condition that no information is communicated between a browser and a server application system, and when the condition that no information is communicated between the browser and the server application system is greater than the operation time difference threshold of the token, the token is in a failure state;
the token validity checker acquires the current state of the token according to the token-to-token state base, judges that the token is invalid or illegal when the token state bit is null, and returns the information of the browser identity verification failure; when the token state bit is 1, judging that the token is invalid, and returning the information of overdue browser identity verification; when the token state bit is 2, judging that the token exits the system, and returning information that the browser identity verifier exits the system; when the token state bit is 0, the token validity checker reads the login time bit and the operation time bit corresponding to the token in the token state library, the operation time difference of the token is obtained by subtracting the time recorded by the login time bit from the current system time under the condition that the operation time bit has no record, and when the operation time difference of the token is greater than or equal to the operation time difference threshold of the token, the token validity checker updates the token state bit to 1 and returns the information of overdue browser identity check; when the token state bit is 0, the token validity checker reads the login time bit and the operation time bit corresponding to the token in the token state library, the operation time difference of the token is obtained by subtracting the time of the operation time bit record from the current system time under the condition that the operation time bit has the record, when the operation time difference of the token is less than or equal to the operation time difference threshold of the token, the token validity checker determines that the token is valid, the information of the browser accessing the server application system is passed, and the token validity checker updates the operation time bit corresponding to the token in the token state library to be the value of the current system time; when the token state bit is 0, the token validity checker reads the login time bit and the operation time bit corresponding to the token in the token state library, the operation time difference of the token is obtained by subtracting the time of the operation time bit record from the current system time under the condition that the operation time bit has the record, and when the operation time difference of the token is more than or equal to the operation time difference threshold of the token, the token validity checker updates the token state bit to 1 and returns the information that the browser identity check is overdue;
when the information sent to the server application system by the browser is login operation, the token state controller identifies the token in the login operation request, informs the token validity checker to modify the token state bit corresponding to the token in the token state base to be 2, and the operation time bit corresponding to the token in the token state base modified by the token validity checker is the value of the current system time.
Advantageous effects
The invention realizes the state control and identification of the token; realizing the dynamic validity period control of the identity authentication of a user login system; when the user operates the system, the prompt information of the token state to the user is diversified, and the user experience is improved; the invention solves the problem of data resource leakage caused by security threat to illegal tokens, improves the security of the system, is realized by modifying the upper application entrance of the gateway, has low modification cost and is suitable for popularization and use.
Drawings
FIG. 1 is a system block diagram of the present invention.
Detailed Description
Referring to fig. 1, the state control method and apparatus for implementing the browser and server architecture identity authentication token provided by the present invention is composed of a token state controller 1, a token state library 2 and a token validity checker 3;
the token state controller 1, the token state library 2 and the token validity checker 3 are arranged at an application upper layer inlet of a gateway filter A, so that information sent to a server application system C by a browser B must first pass through the token state controller 1, and information sent to the browser B by the server application system C must first pass through the token state controller 1;
the token state library 2 is used to record tokens and states of the tokens, and the format of the token record is: adding token bit, token state bit, login time bit and operation time bit to token bit;
the token position is of a character string type, and the character string of the token is recorded;
the token state bit, the type is a number, when the type number is 0, the entry state is represented, when the type number is 1, the failure state is represented, and when the type number is 2, the exit state is represented;
logging in the time bit, wherein the type is a number, and recording the time of acquiring the token for the first time;
the operation time position is digital, and the time when the browser accesses the server application system C last time is recorded;
the method comprises the steps that a token state controller 1 identifies information sent to a server application system C by a browser B, when the information sent to the server application system C by the browser B is a login instruction, the token state controller 1 transparently transmits the login instruction, a token issuer 4 of the server application system C receives the login instruction, issues a token and returns the issued token to the browser B, the token state controller 1 intercepts and analyzes the token issued by the token issuer 4 of the server application system C, records the token in a token state base 2, records a token state flag bit as 0, and records initial token obtaining time;
when the information sent to the server application system C by the browser B is a service operation request, the token state controller 1 identifies a token in the service operation request, informs the token validity checker 3 to judge the validity of the token according to the token, and updates the token state recorded by the token state base 2 after the token validity checker 3 judges the validity of the token;
setting an operation time difference threshold of the token by a token validity checker 3, wherein the operation time difference threshold of the token determines a time interval for which the token is valid under the condition that the token is in no-information communication between a browser B and a server application system C, and when the condition that the token is in no-information communication between the browser B and the server application system C is greater than the operation time difference threshold of the token, the token is in a failure state;
the token validity checker 3 acquires the current state of the token according to the token-to-token state base 2, judges that the token is invalid or illegal when the token state bit is empty, and returns the information that the identity verification of the browser B fails; when the token state bit is 1, judging that the token is invalid, and returning to the information of overdue identity verification of the browser B; when the token state bit is 2, judging that the token exits the system, and returning information that the browser identity verifier exits the system; when the token state bit is 0, the token validity checker 3 reads the login time bit and the operation time bit corresponding to the token in the token state library, obtains the operation time difference of the token by subtracting the time recorded by the login time bit from the current system time under the condition that the operation time bit has no record, updates the token state bit to 1 when the operation time difference of the token is greater than or equal to the operation time difference threshold of the token, and returns the information that the identity check of the browser B is overdue; when the token state bit is 0, the token validity checker reads the login time bit and the operation time bit corresponding to the token in the token state library, the operation time difference of the token is obtained by subtracting the time of the operation time bit record from the current system time under the condition that the operation time bit has the record, when the operation time difference of the token is less than or equal to the operation time difference threshold of the token, the token validity checker 3 determines that the token is valid, the information of the browser B accessing the server application system C is allowed to pass, and the token validity checker 3 updates the operation time bit corresponding to the token in the token state library 2 to be the value of the current system time; when the token state bit is 0, the token validity checker 3 reads the login time bit and the operation time bit corresponding to the token in the token state base 2, obtains the operation time difference of the token by subtracting the time of the operation time bit record from the current system time under the condition that the operation time bit has a record, and when the operation time difference of the token is greater than or equal to the operation time difference threshold of the token, the token validity checker 3 updates the token state bit to 1 and returns the information that the identity check of the browser B is overdue;
when the information sent to the server application system C by the browser B is a logout operation, the token state controller 1 identifies a token in the logout operation request, notifies the token validity checker 3 to modify the token state bit corresponding to the token in the token state base 2 to be 2, and the token validity checker 3 modifies the operation time bit corresponding to the token in the token state base 2 to be a value of the current system time.

Claims (1)

1. The browser and the server construct a state control device of the identity authentication token, which is characterized by consisting of a token state controller, a token state library and a token validity checker;
the token state controller, the token state library and the token validity checker are arranged at an application upper layer inlet of a gateway filter, so that information sent to a server application system by a browser must first pass through the token state controller, and information sent to the browser by the server application system must first pass through the token state controller;
the token state library is used for recording tokens and states of the tokens, and the format of the token record is as follows: adding token bit, token state bit, login time bit and operation time bit to token bit;
the token position is of a character string type, and the character string of the token is recorded;
the token state bit, the type is a number, when the type number is 0, the entry state is represented, when the type number is 1, the failure state is represented, and when the type number is 2, the exit state is represented;
logging in the time bit, wherein the type is a number, and recording the time of acquiring the token for the first time;
the operation time position is digital, and the time when the browser accesses the server application system last time is recorded;
the method comprises the steps that a token state controller identifies information sent to a server application system by a browser, when the information sent to the server application system by the browser is a login instruction, the token state controller transmits the login instruction in a transparent mode, a token issuer of the server application system receives the login instruction and issues a token and returns the issued token to the browser, the token state controller intercepts and analyzes the token issued by the token issuer of the server application system, records the token into a token state library, records a token state flag bit as 0 and records initial token obtaining time;
when the information sent to the server application system by the browser is a service operation request, the token state controller identifies a token in the service operation request, informs the token validity checker to judge the validity of the token according to the token, and updates the token state recorded by the token state library after the token validity checker judges the validity of the token;
setting an operation time difference threshold of the token by a token validity checker, wherein the operation time difference threshold of the token determines a time interval for which the token is valid under the condition that no information is communicated between a browser and a server application system, and when the condition that no information is communicated between the browser and the server application system is greater than the operation time difference threshold of the token, the token is in a failure state;
the token validity checker acquires the current state of the token according to the token-to-token state base, judges that the token is invalid or illegal when the token state bit is null, and returns the information of the browser identity verification failure; when the token state bit is 1, judging that the token is invalid, and returning the information of overdue browser identity verification; when the token state bit is 2, judging that the token exits the system, and returning information that the browser identity verifier exits the system; when the token state bit is 0, the token validity checker reads the login time bit and the operation time bit corresponding to the token in the token state library, the operation time difference of the token is obtained by subtracting the time recorded by the login time bit from the current system time under the condition that the operation time bit has no record, and when the operation time difference of the token is greater than or equal to the operation time difference threshold of the token, the token validity checker updates the token state bit to 1 and returns the information of overdue browser identity check; when the token state bit is 0, the token validity checker reads the login time bit and the operation time bit corresponding to the token in the token state library, the operation time difference of the token is obtained by subtracting the time of the operation time bit record from the current system time under the condition that the operation time bit has the record, when the operation time difference of the token is less than or equal to the operation time difference threshold of the token, the token validity checker determines that the token is valid, the information of the browser accessing the server application system is passed, and the token validity checker updates the operation time bit corresponding to the token in the token state library to be the value of the current system time; when the token state bit is 0, the token validity checker reads the login time bit and the operation time bit corresponding to the token in the token state library, the operation time difference of the token is obtained by subtracting the time of the operation time bit record from the current system time under the condition that the operation time bit has the record, and when the operation time difference of the token is more than or equal to the operation time difference threshold of the token, the token validity checker updates the token state bit to 1 and returns the information that the browser identity check is overdue;
when the information sent to the server application system by the browser is login operation, the token state controller identifies the token in the login operation request, informs the token validity checker to modify the token state bit corresponding to the token in the token state base to be 2, and the operation time bit corresponding to the token in the token state base modified by the token validity checker is the value of the current system time.
CN202010660742.2A 2020-07-10 2020-07-10 State control method and device for browser and server architecture identity authentication token Active CN111711641B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010660742.2A CN111711641B (en) 2020-07-10 2020-07-10 State control method and device for browser and server architecture identity authentication token

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010660742.2A CN111711641B (en) 2020-07-10 2020-07-10 State control method and device for browser and server architecture identity authentication token

Publications (2)

Publication Number Publication Date
CN111711641A true CN111711641A (en) 2020-09-25
CN111711641B CN111711641B (en) 2022-03-08

Family

ID=72545290

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010660742.2A Active CN111711641B (en) 2020-07-10 2020-07-10 State control method and device for browser and server architecture identity authentication token

Country Status (1)

Country Link
CN (1) CN111711641B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114301683A (en) * 2021-12-29 2022-04-08 四创科技有限公司 Method and system for ensuring security of token

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050129025A1 (en) * 2003-12-15 2005-06-16 International Business Machines Corporation Random access memory initialization
CN101582763A (en) * 2009-04-02 2009-11-18 北京飞天诚信科技有限公司 Method and system for identity authentication based on dynamic password
CN101651666A (en) * 2008-08-14 2010-02-17 中兴通讯股份有限公司 Method and device for identity authentication and single sign-on based on virtual private network
EP2592807A1 (en) * 2011-11-10 2013-05-15 Research In Motion Limited Timestamp-Based Token Revocation
CN103188248A (en) * 2011-12-31 2013-07-03 卓望数码技术(深圳)有限公司 Identity authentication system and method based on single sign-on
CN103457738A (en) * 2013-08-30 2013-12-18 优视科技有限公司 Method and system for login processing based on browser
CN104767731A (en) * 2015-03-12 2015-07-08 江苏中天科技软件技术有限公司 Identity authentication protection method of Restful mobile transaction system
CN106161462A (en) * 2016-08-29 2016-11-23 无锡华云数据技术服务有限公司 A kind of network security certification method
US20180039501A1 (en) * 2016-08-05 2018-02-08 Oracle International Corporation Tenant self-service troubleshooting for a multi-tenant identity and data security management cloud service
CN107769930A (en) * 2017-11-20 2018-03-06 飞天诚信科技股份有限公司 A kind of authentication mode forwarding method and device
CN109639730A (en) * 2019-01-21 2019-04-16 北京工业大学 Information system data interface authentication method under HTTP stateless protocol based on token
CN110855672A (en) * 2019-11-15 2020-02-28 无锡家校邦网络科技有限公司 JWT-based authorization method capable of being manually cancelled
CN111030828A (en) * 2019-12-19 2020-04-17 中国电建集团华东勘测设计研究院有限公司 Authority control method and system under micro-service architecture and access token
CN111147453A (en) * 2019-12-11 2020-05-12 东软集团股份有限公司 System login method and integrated login system
CN111371805A (en) * 2020-03-17 2020-07-03 北京工业大学 Token-based unified identity authentication interface and method

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050129025A1 (en) * 2003-12-15 2005-06-16 International Business Machines Corporation Random access memory initialization
CN101651666A (en) * 2008-08-14 2010-02-17 中兴通讯股份有限公司 Method and device for identity authentication and single sign-on based on virtual private network
CN101582763A (en) * 2009-04-02 2009-11-18 北京飞天诚信科技有限公司 Method and system for identity authentication based on dynamic password
EP2592807A1 (en) * 2011-11-10 2013-05-15 Research In Motion Limited Timestamp-Based Token Revocation
CN103188248A (en) * 2011-12-31 2013-07-03 卓望数码技术(深圳)有限公司 Identity authentication system and method based on single sign-on
CN103457738A (en) * 2013-08-30 2013-12-18 优视科技有限公司 Method and system for login processing based on browser
CN104767731A (en) * 2015-03-12 2015-07-08 江苏中天科技软件技术有限公司 Identity authentication protection method of Restful mobile transaction system
US20180039501A1 (en) * 2016-08-05 2018-02-08 Oracle International Corporation Tenant self-service troubleshooting for a multi-tenant identity and data security management cloud service
CN106161462A (en) * 2016-08-29 2016-11-23 无锡华云数据技术服务有限公司 A kind of network security certification method
CN107769930A (en) * 2017-11-20 2018-03-06 飞天诚信科技股份有限公司 A kind of authentication mode forwarding method and device
CN109639730A (en) * 2019-01-21 2019-04-16 北京工业大学 Information system data interface authentication method under HTTP stateless protocol based on token
CN110855672A (en) * 2019-11-15 2020-02-28 无锡家校邦网络科技有限公司 JWT-based authorization method capable of being manually cancelled
CN111147453A (en) * 2019-12-11 2020-05-12 东软集团股份有限公司 System login method and integrated login system
CN111030828A (en) * 2019-12-19 2020-04-17 中国电建集团华东勘测设计研究院有限公司 Authority control method and system under micro-service architecture and access token
CN111371805A (en) * 2020-03-17 2020-07-03 北京工业大学 Token-based unified identity authentication interface and method

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
F. SATOH;T. ITOH: "Single Sign On architecture with dynamic tokens", 《2004 INTERNATIONAL SYMPOSIUM ON APPLICATIONS AND THE INTERNET. PROCEEDINGS.》 *
周虎: "一种基于JWT认证token刷新机制研究", 《软件工程》 *
邹军国: "基于Token的身份认证在高校实训互动平台中的应用研究", 《无线互联科技》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114301683A (en) * 2021-12-29 2022-04-08 四创科技有限公司 Method and system for ensuring security of token
CN114301683B (en) * 2021-12-29 2024-05-10 四创科技有限公司 Method and system for guaranteeing token security

Also Published As

Publication number Publication date
CN111711641B (en) 2022-03-08

Similar Documents

Publication Publication Date Title
US10122715B2 (en) Enhanced multi factor authentication
KR102358546B1 (en) System and method for authenticating a client to a device
CA2440546C (en) Cryptographic authentication with ephemeral modules
CN109981561A (en) Monomer architecture system moves to the user authen method of micro services framework
CN105229987B (en) Actively united mobile authentication
US10219154B1 (en) Frictionless or near-frictionless 3 factor user authentication method and system by use of triad network
CN101257489A (en) Method for protecting account number safety
US20130347129A1 (en) System and Method for Second Factor Authentication Services
WO2014130141A1 (en) Methods and apparatus for selecting an authentication mode at time of issuance of an access token
CN106790260A (en) A kind of multiple-factor identity identifying method
KR20000076529A (en) Personal device, terminal, server and methods for establishing a trustworthy connection between a user and a terminal
JP2006040307A (en) Smart card
EP1716468A1 (en) System and method for preventing identity theft using a secure computing device.
US20150067808A1 (en) Client Identification System Using Video Conferencing Technology
CN111711641B (en) State control method and device for browser and server architecture identity authentication token
CN113438081B (en) Authentication method, device and equipment
CN109462572B (en) Multi-factor authentication method, system, storage medium and security gateway based on encryption card and UsbKey
EP3793163B1 (en) Control method, information processing apparatus, control program, and information processing system
CN112383401B (en) User name generation method and system for providing identity authentication service
CN105592031B (en) The user log-in method and system of identity-based certification
CN108183906B (en) Time bank management method, server, terminal, storage medium and electronic device
KR101331575B1 (en) Method and system blocking for detour hacking of telephone certification
CN109639649A (en) A kind of single-point logging method
CN118157894A (en) Access control method, device and system and storage medium
CN116032493A (en) Security detection method and decoding server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant