CN111181728A - Data processing method and device - Google Patents

Data processing method and device Download PDF

Info

Publication number
CN111181728A
CN111181728A CN201911349959.5A CN201911349959A CN111181728A CN 111181728 A CN111181728 A CN 111181728A CN 201911349959 A CN201911349959 A CN 201911349959A CN 111181728 A CN111181728 A CN 111181728A
Authority
CN
China
Prior art keywords
target token
token
information
verification
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911349959.5A
Other languages
Chinese (zh)
Inventor
苏宁博
范志刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xian Wanxiang Electronics Technology Co Ltd
Original Assignee
Xian Wanxiang Electronics Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian Wanxiang Electronics Technology Co Ltd filed Critical Xian Wanxiang Electronics Technology Co Ltd
Priority to CN201911349959.5A priority Critical patent/CN111181728A/en
Publication of CN111181728A publication Critical patent/CN111181728A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • H04L9/3213Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a data processing method and device, relates to the technical field of electronic information, and can solve the problem of low efficiency in authentication management based on an authorization token. The specific technical scheme is as follows: after the target token is acquired, whether the target token is verified or not is determined through verification information of the target token, wherein the verification information comprises a first validity period and an operating state. The present disclosure is for authentication management of an authorization token.

Description

Data processing method and device
Technical Field
The present disclosure relates to the field of electronic information technologies, and in particular, to a data processing method and apparatus.
Background
In order to improve the use security of data, the use authority of the login device is verified by means of user authentication, in the prior art, the authentication function of the login user is completed by JWT (json web token, cross-domain authentication solution). However, after the first device generates the authorization token and the preset validity period corresponding to the authorization token, the token cannot be modified within the preset validity period, so that the user may need to log in again due to the expiration of the preset validity period of the token in the process of normally using the system, and a problem that a new token needs to be obtained is caused, which affects user experience; meanwhile, after the user exits the system within the preset valid period of the authorization token, the authorization token is still in the preset valid period, so that the problem that the authorization token is stolen may occur, and potential safety hazards exist.
Disclosure of Invention
The embodiment of the disclosure provides a data processing method and device, which can solve the problem of low efficiency in authentication management based on an authorization token. The technical scheme is as follows:
according to a first aspect of embodiments of the present disclosure, there is provided a data processing method, including:
acquiring a target token of second equipment;
and according to a preset rule, when the verification information of the target token is matched with the pre-stored verification information, determining that the target token is verified, wherein the verification information comprises the use state and the first valid period.
In one embodiment, before obtaining the target token of the second device, the method further includes:
acquiring login information, wherein the login information comprises a login name and a login password;
and after the login information passes the verification, generating the target token according to the login information and a preset rule, wherein the generation of the target token comprises setting a first validity period of the target token, and updating the use state of the target token to a first state.
In one embodiment, the method wherein determining that the target token is validated comprises:
analyzing the target token, and acquiring a use state and a first validity period corresponding to the target token according to an analysis result;
when the use state is displayed as a first state, acquiring access time, wherein the access time is the time of receiving data request information;
when the first validity period matches the access time, it is determined that the authentication information is authenticated.
In one embodiment, the method further comprises:
when the target token passes the verification, acquiring the current time in real time;
when the comparison result between the current time and the first validity period does not meet the preset condition, the first validity period is modified according to the preset rule.
In one embodiment, in the method, the target token is obtained through logout request information sent by the second device, the logout request information is used for requesting to log out of the server, and the method further includes:
and when the target token passes the verification, generating an exit instruction according to the exit request information, and updating the use state of the target token to be a second state.
According to the data processing method provided by the embodiment of the disclosure, after the target token is acquired, whether the target token passes the verification is determined through the verification information of the target token, wherein the verification information comprises the first validity period and the working state. After the target token passes the verification, the first validity period corresponding to the target token can be modified according to a specific use scenario in response to the request sent by the device. By setting the working state and the first validity period of the target token, different use scenes can be flexibly adapted under the condition that the preset validity period is fixed, so that the use safety of the token can be improved, and the token verification efficiency can also be improved.
According to a second aspect of the embodiments of the present disclosure, there is provided a data processing apparatus including:
a receiver and a processor, wherein the processor is connected with the receiver,
the receiver is connected with the processor;
the receiver is used for acquiring a target token of the second device;
the processor is used for determining that the target token is verified when verification information of the target token is matched with pre-stored verification information according to a preset rule, wherein the verification information comprises a use state and a first valid period.
In one embodiment, the processor is further configured to,
acquiring login information, wherein the login information comprises a login name and a login password;
and after the login information passes the verification, generating the target token according to the login information and a preset rule, wherein the generation of the target token comprises setting a first validity period of the target token, and updating the use state of the target token to a first state.
In one embodiment, the processor is further configured to,
analyzing the target token, and acquiring a use state and a first validity period corresponding to the target token according to an analysis result;
when the use state is displayed as a first state, acquiring access time, wherein the access time is the time of receiving data request information;
when the first validity period matches the access time, it is determined that the authentication information is authenticated.
In one embodiment, the processor is further configured to,
when the target token passes the verification, acquiring the current time in real time;
when the comparison result between the current time and the first validity period does not meet the preset condition, the first validity period is modified according to the preset rule.
In one embodiment, the processor is further configured to,
and when the target token passes the verification, generating an exit instruction according to the exit request information, and updating the use state of the target token to be a second state.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and together with the description, serve to explain the principles of the disclosure.
Fig. 1 is a flowchart of a data processing method provided by an embodiment of the present disclosure;
FIG. 2 is an interaction diagram of a data processing method provided by an embodiment of the present disclosure;
fig. 3 is a block diagram of a data processing apparatus according to an embodiment of the present disclosure.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The implementations described in the exemplary embodiments below are not intended to represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present disclosure, as detailed in the appended claims.
Example one
The embodiment of the present disclosure provides a data processing method, which is applied to a first device, and as shown in fig. 1, the data processing method includes the following steps:
101. a target token for the second device is obtained.
In an optional embodiment, the method provided by the present disclosure may obtain the target token of the second device in various ways, for example, by receiving the request information of the second device to carry the target token of the second device. The request information may be: and data request information or log-out request information and the like, wherein the data request information comprises a target token, and the data request information is used for requesting the first device to send target data.
In an optional embodiment, the method provided by the present disclosure further includes generating a target token for the second device, and the specific steps may include:
acquiring login information, wherein the login information comprises a login name and a login password, and also can comprise identification information of second equipment requesting to login the first equipment, and the login information is used for the second equipment requesting to login the first equipment;
after the login information passes the verification, acquiring a first validity period and a use state corresponding to the second device according to the login information and a preset rule;
and generating a target token according to the first valid period and the use state.
Specifically, after the first device verifies the user name and the password, the target token is generated according to the identification information of the second device and a preset algorithm. The target token may include: the preset expiry date, the first expiry date and the use state of token.
After the target token corresponding to the second device is generated, the method provided by the present disclosure may further store the parameter information, such as the use state, the preset validity period, and the first validity period, corresponding to the target token in any storage manner, for example, in any form of a database, a Cache memory, and a Remote Dictionary service (Remote Dictionary Server).
For example, when the two parameter information, i.e., the usage state and the first validity period corresponding to the token, are stored in the database, the two parameter information may be stored in a table in the database.
As mentioned above, the preset valid period and the first valid period corresponding to the target token are two independent periods.
Wherein the preset validity period of the target token is preset in JWT (json web token, cross-domain authentication solution), and the preset validity period is not modifiable within the preset validity period after the target token is generated according to the algorithm.
Further, when the preset validity period of the token is set, the preset validity period of the token can be set according to specific use scenes, and when the user uses the token for long-term login, the preset validity period of the target token can be set to 30 days, so that the problem that the user is forced to log in again in normal use due to the fact that the preset validity period of the token is short is avoided.
The first validity period of the target token is set according to a specific use scenario by the method provided by the present disclosure, and the first validity period can be modified and updated in real time when the use scenario changes. The first effective time limit is set, so that the target token can be limited through the first effective time limit of the target token under the condition that the preset effective time limit of the target token is longer and the user forgets to quit the first device after the use is finished, and the problem that the target token is stolen is avoided.
Further, the target token generated by the present disclosure further includes a use state corresponding to the token, where the use state is used to indicate whether the target token is in a use state, and the use state may include a first state and a second state, where the first state indicates that the target token is in a valid state, and the second state indicates that the target token belongs to a failed state. After the login information of the target user is verified, the use state of the token can be set to be a first state, namely a valid state. And setting the first validity period to be 20 minutes increased from the current time, for example, the current time is 10:00, and then the first validity period is 10:20, so as to ensure that the second device normally executes the task on the first device.
102. And according to a preset rule, when the verification information of the target token is matched with the pre-stored verification information, determining that the target token passes the verification.
The validation information includes a usage status and a first validity period.
The authentication message includes: the usage state is used for indicating whether the target token is in a usage state, and the usage state may include a first state and a second state, where the first state indicates that the target token is in a valid state, and the second state indicates that the target token belongs to a disabled state.
This target token of this verification of this disclosure, including information such as the identity information, preset valid period, first valid period and the user state that verify that target token corresponds, its verification process can include:
analyzing the target token, and acquiring a use state and a first validity period corresponding to the target token according to an analysis result;
when the use state is displayed as an activation state, acquiring access time, wherein the access time is the time of receiving data request information;
when the first validity period matches the access time, the token is determined to be authenticated.
Specific examples are set forth herein for illustration:
after login request information of second equipment is obtained, performing identity authentication on the login information according to identity information in the login request information;
and step two, after the identity authentication of the target token is passed, verifying whether the access time when the data request information is received exceeds a preset valid period corresponding to the target token.
And step three, if the identity authentication of the token passes and the access time when the first device receives the data request information does not exceed the preset validity limit corresponding to the target token, verifying whether the use state of the token is displayed as a first state, namely an available state, and judging whether the access time is within the first validity limit of the token.
And if the judgment results of the two are both yes, determining that the target token passes the verification.
And if the using state of the target token is the second state, namely the unavailable state, or the current time is not within the first validity period of the token, confirming that the target token fails to verify.
The method provided by the present disclosure further comprises: according to a specific use scenario, a first validity period corresponding to a target token is modified, for example, when a comparison result of the access time and the first validity period does not meet a preset condition, the first validity period is modified.
Specific examples are set forth herein for illustration: the preset first validity period of the target token is 10:20, and the current time of the first device for accepting the data request information is 10:10, after the target token is verified, since the difference between the first validity period and the current time is ten minutes, when the working time for which the user needs to log in the first device is more than 10 minutes, the user is forced to quit the first device forcibly because the difference is less than ten minutes, which causes the need of re-login authentication, reduces the efficiency of authentication, reduces the satisfaction degree of user use, the first expiry date of the target token may be modified, such as extending the first expiry date of the token by another 20 minutes, namely, the first validity period of the target token is 10:30, so that the problems that the second device is forced to log out, the data transmission is interrupted and the like due to the fact that the authentication is not passed because the first validity period of the token is expired in the data transmission process are avoided.
In an optional embodiment, the method provided by the present disclosure further includes monitoring the usage right of the target token in real time according to a preset rule when the target token passes the verification, and generating an exit instruction in real time to instruct the second device to exit the first device when the usage right of the target token does not meet a preset requirement. And if so, monitoring whether the time for the second device to log in the first device is within the first validity period in real time.
In an optional embodiment, after the target token passes the verification, the method provided by the present disclosure further includes performing a corresponding operation according to a way of obtaining the target token. Two examples are listed here for illustration:
example one, the target token is obtained through data request information sent by the second device, where the data request information is used to request the first device to send target data
And after the target token passes the verification, sending target data to the second device.
Further, in the process of sending the target data to the second device, the current time is obtained in real time.
Obtaining a comparison result between the current time and the first validity period;
and modifying the first validity period when the comparison result does not meet the preset condition.
By modifying the first validity period according to the current time, the flexibility of data processing can be improved, and the satisfaction degree of the user can be improved.
Example two, the target token is obtained through logout request information sent by the second device, and the logout request information is used for requesting to log out of the server.
And when the target token passes the verification, generating an exit instruction according to the exit request information, and updating the state of the target token to be a second state.
For example: after determining that the received message is the quit request message, the first device acquires the working state and the working period of the target token according to the target token in the quit request message, verifies that the target token and the preset valid period pass, and determines whether the using state of the target token and the first valid period of the target token meet the requirements, and if both the using state of the target token and the first valid period of the target token meet the requirements, the using state of the target token can be set to be 'unavailable', so that the problem that the target token can be stolen due to the fact that the preset valid period of the target token is not expired is solved.
Further, the method provided by the present disclosure may verify the target token after recognizing that the request instruction is a request instruction to exit the system, and may also recognize whether the request instruction is a request instruction to exit the system after verifying that the target token passes.
In a specific implementation, the request instruction exiting the system includes a logout parameter, and whether the request instruction is a request instruction exiting the system may be determined according to the logout parameter in the request instruction.
In the prior art, the time limit that the second device can access the first device can be limited by the token preset validity period, but since the token preset validity period cannot be modified, the second device may be forced to re-authenticate due to the expiration of the preset validity period in normal operation after logging in the first device.
In order to solve this problem, the prior art may set the token with the preset valid period longer, for example, three years later than the current time, so as to avoid the problem that the second device may be forced to be re-authenticated due to the expiration of the preset valid period in normal use, but the longer preset valid period may cause a safety hazard. In order to improve the security of identity authentication, after the logged second device executes the task, the use state of the target token can be changed into the second state, namely the failure state, by sending the quit request information to the first device, so that the target token fails, and the problem that the token is stolen is avoided.
Further, in order to improve the security of the identity authentication, for example, if the second device does not send a request instruction to the first device to quit the system, the data leakage may be avoided by verifying the first validity period of the token, and the token is disabled after the first validity period of the target token expires.
According to the data processing method provided by the embodiment of the disclosure, after the target token is acquired, whether the target token passes the verification is determined through the verification information of the target token, wherein the verification information comprises the first validity period and the working state. After the target token passes the verification, the first validity period corresponding to the target token can be modified according to a specific use scenario in response to the request sent by the device. By setting the working state and the first validity period of the target token, different use scenes can be flexibly adapted under the condition that the preset validity period is fixed, so that the use safety of the token can be improved, and the token verification efficiency can also be improved.
Example two
Based on the data processing method provided by the embodiment corresponding to fig. 1, another embodiment of the present disclosure provides a data processing method, which may be applied to security authentication, for example, the first device may be a second device or a network server, and the second device may also be a second device or a network server. The present embodiment is described by taking the transmission target data as an example, and does not represent that the present disclosure is limited thereto. Referring to fig. 2, the data processing method provided in this embodiment includes the following steps:
201. the second device sends login information to the first device.
The login information includes identity authentication information such as a login name and a login password.
The login information is used for requesting to login the first device.
202. The first device verifies the login information, generates a target token of the second device according to the login information after the login information is verified, and sends the target token to the second device.
The target token is generated, the first validity period and the working state of the target token are set, and the working state of the target token is set to be in work.
The target token is used for verifying at least one of identity information and operation authority of the second device.
After generating the target token, the first device stores parameter information corresponding to the target token, where the parameter information includes: the usage period of the target token and the activated usage status.
203. The second device stores the target token after receiving the target token.
204. The second device sends data request information to the first device.
The data request information is used for requesting the first device to send target data, and the data request information includes the target token.
205. And the first equipment verifies the target token according to a preset rule, and after the target token passes the verification, the first equipment sends target data to the second equipment.
The verifying the target token according to the disclosure includes verifying whether verification information of the target token is matched with pre-stored verification information according to a preset rule, and determining that the target token passes verification.
The validation information includes a usage status and a first validity period.
The authentication message includes: the usage state is used for indicating whether the target token is in a usage state, and the usage state may include a first state and a second state, where the first state indicates that the target token is in a valid state, and the second state indicates that the target token belongs to a disabled state.
206. The second device sends the logout request information to the first device.
The logout request information is used for requesting to log out from the first device, and the logout request information comprises a target token.
207. The first equipment verifies the target token according to the quitting request information;
and when the target token passes the verification, generating an exit instruction according to the exit request information, and updating the state of the target token to be a second state.
In the data processing method provided by the embodiment of the present disclosure, two pieces of verification information are added to the token in the JWT processing flow based on the prior art: a first expiration date and a use status. In a use scene of requesting to send data, the second device carries a target token to send data request information to the first device, and the first device determines whether to send the target data to the second device or not by verifying the use state and the first validity period of the target token; therefore, on one hand, the effective use duration of the token can be continuously updated after the second equipment is used every time, and the problem that the token needs to be logged again due to the fact that the preset validity period of the token is expired in the normal system use process of the second equipment logged in the first equipment is solved; on the other hand, the token is disabled after the user exits the system by verifying the using state of the token, so that the problem that the token is possibly stolen after the user exits the system is avoided.
EXAMPLE III
Based on the data processing method described in the embodiments corresponding to fig. 1 and fig. 2, the following is an embodiment of the apparatus of the present disclosure, which can be used to execute an embodiment of the method of the present disclosure.
The embodiment of the present disclosure provides a data processing apparatus, as shown in fig. 3, the data processing apparatus 30 includes: a receiver 301 and a processor 302, which,
the receiver 301 is connected to the processor 302;
the receiver 301 is configured to obtain a target token of the second device;
the processor 302 is configured to determine that the target token is verified when verification information of the target token matches pre-stored verification information according to a preset rule, where the verification information includes a usage status and a first validity period.
In one embodiment, the processor 302 in the system is further configured to,
acquiring login information, wherein the login information comprises a login name and a login password;
and after the login information passes the verification, generating the target token according to the login information and a preset rule, wherein the generation of the target token comprises setting a first validity period of the target token, and updating the use state of the target token to a first state.
In one embodiment, the processor 302 in the system is further configured to,
analyzing the target token, and acquiring a use state and a first validity period corresponding to the target token according to an analysis result;
when the use state is displayed as a first state, acquiring access time, wherein the access time is the time of receiving data request information;
when the first validity period matches the access time, it is determined that the authentication information is authenticated.
In one embodiment, the processor 302 in the system is further configured to,
when the target token passes the verification, acquiring the current time in real time;
when the comparison result between the current time and the first validity period does not meet the preset condition, the first validity period is modified according to the preset rule.
In one embodiment, the processor 302 in the system is further configured to,
and when the target token passes the verification, generating an exit instruction according to the exit request information, and updating the use state of the target token to be a second state.
The data processing device provided by the embodiment of the disclosure determines whether the target token passes the verification through the verification information of the target token after acquiring the target token, wherein the verification information includes a first validity period and a working state. After the target token passes the verification, the first validity period corresponding to the target token can be modified according to a specific use scenario in response to the request sent by the device. By setting the working state and the first validity period of the target token, different use scenes can be flexibly adapted under the condition that the preset validity period is fixed, so that the use safety of the token can be improved, and the token verification efficiency can also be improved.
In the data processing method described in the embodiment corresponding to fig. 1 and fig. 2, an embodiment of the present disclosure further provides a computer-readable storage medium, for example, the non-transitory computer-readable storage medium may be a Read Only Memory (ROM), a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like. The storage medium stores computer instructions for executing the data processing method described in the embodiment corresponding to fig. 1 and fig. 2, which is not described herein again.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This application is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.

Claims (10)

1. A data processing method, applied to a first device, the method comprising:
acquiring a target token of second equipment;
according to a preset rule, when verification information of the target token is matched with pre-stored verification information, the target token is determined to pass verification, and the verification information comprises a use state and a first valid period.
2. The method of claim 1, wherein prior to obtaining the target token for the second device, the method further comprises:
obtaining login information, wherein the login information comprises a login name and a login password;
and after the login information passes the verification, generating the target token according to the login information and a preset rule, wherein the generation of the target token comprises setting a first validity period of the target token, and updating the use state of the target token to a first state.
3. The method of claim 1, wherein the determining that the target token is validated comprises:
analyzing the target token, and acquiring a use state and a first validity period corresponding to the target token according to an analysis result;
when the use state is displayed as a first state, acquiring access time, wherein the access time is the time of receiving data request information;
when the first validity period matches the access time, it is determined that the authentication information is authenticated.
4. The method of claim 3, further comprising:
when the target token passes the verification, acquiring the current time;
and when the comparison result of the current time and the first valid period does not accord with a preset condition, modifying the first valid period according to a preset rule.
5. The method of claim 1, wherein the target token is obtained through logout request information sent by a second device, and the logout request information is used for requesting to log out of the server, and the method further comprises:
and when the target token passes the verification, generating an exit instruction according to the exit request information, and updating the use state of the target token to be a second state.
6. A data processing apparatus, comprising: a receiver and a processor, wherein the processor is connected with the receiver,
the receiver is connected with the processor;
the receiver is used for acquiring a target token of the second device;
the processor is used for determining that the target token is verified when verification information of the target token is matched with pre-stored verification information according to a preset rule, wherein the verification information comprises a use state and a first validity period.
7. The apparatus of claim 6, wherein the processor is further configured to,
obtaining login information, wherein the login information comprises a login name and a login password;
and after the login information passes the verification, generating the target token according to the login information and a preset rule, wherein the generation of the target token comprises setting a first validity period of the target token, and updating the use state of the target token to a first state.
8. The apparatus of claim 7, wherein the processor is further configured to,
analyzing the target token, and acquiring a use state and a first validity period corresponding to the target token according to an analysis result;
when the use state is displayed as a first state, acquiring access time, wherein the access time is the time of receiving data request information;
when the first validity period matches the access time, it is determined that the authentication information is authenticated.
9. The apparatus of claim 7, wherein the processor is further configured to,
when the target token passes the verification, acquiring the current time in real time;
and when the comparison result of the current time and the first valid period does not accord with a preset condition, modifying the first valid period according to a preset rule.
10. The apparatus of any of claims 6-9, wherein the processor is further configured to,
and when the target token passes the verification, generating an exit instruction according to the exit request information, and updating the use state of the target token to be a second state.
CN201911349959.5A 2019-12-24 2019-12-24 Data processing method and device Pending CN111181728A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911349959.5A CN111181728A (en) 2019-12-24 2019-12-24 Data processing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911349959.5A CN111181728A (en) 2019-12-24 2019-12-24 Data processing method and device

Publications (1)

Publication Number Publication Date
CN111181728A true CN111181728A (en) 2020-05-19

Family

ID=70623194

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911349959.5A Pending CN111181728A (en) 2019-12-24 2019-12-24 Data processing method and device

Country Status (1)

Country Link
CN (1) CN111181728A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111835513A (en) * 2020-07-17 2020-10-27 支付宝(杭州)信息技术有限公司 Method, device and equipment for updating certificate data
CN113592490A (en) * 2021-07-16 2021-11-02 青岛海尔科技有限公司 Data processing method and device, storage medium and electronic device
CN113691379A (en) * 2021-10-25 2021-11-23 徐州蜗牛智能科技有限公司 Authentication method and device for big data
CN117544378A (en) * 2023-11-21 2024-02-09 广州方舟信息科技有限公司 Authorization management method, device, equipment and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102611709A (en) * 2012-03-31 2012-07-25 奇智软件(北京)有限公司 Access control method and system for third party resources
CN103023657A (en) * 2012-12-26 2013-04-03 武汉天喻信息产业股份有限公司 Security verification system based on distributed network transaction
CN106209749A (en) * 2015-05-08 2016-12-07 阿里巴巴集团控股有限公司 Single-point logging method and the processing method and processing device of device, relevant device and application
CN106411825A (en) * 2015-08-03 2017-02-15 天脉聚源(北京)科技有限公司 WeChat access token acquisition method and system thereof
CN109309683A (en) * 2018-10-30 2019-02-05 泰华智慧产业集团股份有限公司 The method and system of client identity verifying based on token
CN110121873A (en) * 2017-10-23 2019-08-13 华为技术有限公司 A kind of access token management method, terminal and server

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102611709A (en) * 2012-03-31 2012-07-25 奇智软件(北京)有限公司 Access control method and system for third party resources
CN103023657A (en) * 2012-12-26 2013-04-03 武汉天喻信息产业股份有限公司 Security verification system based on distributed network transaction
CN106209749A (en) * 2015-05-08 2016-12-07 阿里巴巴集团控股有限公司 Single-point logging method and the processing method and processing device of device, relevant device and application
CN106411825A (en) * 2015-08-03 2017-02-15 天脉聚源(北京)科技有限公司 WeChat access token acquisition method and system thereof
CN110121873A (en) * 2017-10-23 2019-08-13 华为技术有限公司 A kind of access token management method, terminal and server
CN109309683A (en) * 2018-10-30 2019-02-05 泰华智慧产业集团股份有限公司 The method and system of client identity verifying based on token

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111835513A (en) * 2020-07-17 2020-10-27 支付宝(杭州)信息技术有限公司 Method, device and equipment for updating certificate data
CN111835513B (en) * 2020-07-17 2022-03-25 支付宝(杭州)信息技术有限公司 Method, device and equipment for updating certificate data
CN113592490A (en) * 2021-07-16 2021-11-02 青岛海尔科技有限公司 Data processing method and device, storage medium and electronic device
CN113691379A (en) * 2021-10-25 2021-11-23 徐州蜗牛智能科技有限公司 Authentication method and device for big data
CN117544378A (en) * 2023-11-21 2024-02-09 广州方舟信息科技有限公司 Authorization management method, device, equipment and storage medium

Similar Documents

Publication Publication Date Title
CN111181728A (en) Data processing method and device
US10230711B2 (en) System and methods for enhancing authentication procedures in an anti-fraud environment
CN106936835B (en) Method and system for accessing equipment
US20180351944A1 (en) System and method for authentication service
CN107465642B (en) Method and device for judging abnormal login of account
KR20180129194A (en) Risk analysis apparatus and method for risk based authentication
CN106453205B (en) identity verification method and device
CN109039987A (en) A kind of user account login method, device, electronic equipment and storage medium
CN105337997B (en) Login method of application client and related equipment
KR101451359B1 (en) User account recovery
CN113672897B (en) Data communication method, device, electronic equipment and storage medium
CN107241329B (en) Account login processing method and device
CN113542399B (en) Remote control method and device for vehicle, vehicle and storage medium
CN105323222B (en) Login validation method and system
CN106921663A (en) Identity based on intelligent terminal software/intelligent terminal continues Verification System and method
CN111490981A (en) Access management method and device, bastion machine and readable storage medium
CN110311895A (en) Session authorization check method, system and the electronic equipment of identity-based verifying
CN111565181A (en) Single equipment login method, server and client
CN105025039B (en) Auth method, terminal and server
CN104796408A (en) Single-point live login method and single-point live login device
CN111585970A (en) Token verification method and device
CN112685718A (en) Method for invalidating original access token during multi-terminal login of same account based on OAuth protocol
CN110995682A (en) Method and device for preventing multiple terminals from logging in at different places
CN108259163A (en) The authorization method of terminal device
CN112328986A (en) User identity authentication method, device, server and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200519