CN111181728A - Data processing method and device - Google Patents
Data processing method and device Download PDFInfo
- Publication number
- CN111181728A CN111181728A CN201911349959.5A CN201911349959A CN111181728A CN 111181728 A CN111181728 A CN 111181728A CN 201911349959 A CN201911349959 A CN 201911349959A CN 111181728 A CN111181728 A CN 111181728A
- Authority
- CN
- China
- Prior art keywords
- target token
- token
- information
- verification
- target
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000003672 processing method Methods 0.000 title claims abstract description 20
- 238000012795 verification Methods 0.000 claims abstract description 65
- 238000000034 method Methods 0.000 claims description 26
- 238000012545 processing Methods 0.000 claims description 8
- 238000004458 analytical method Methods 0.000 claims description 6
- 238000013475 authorization Methods 0.000 abstract description 8
- 230000008569 process Effects 0.000 description 4
- 230000005540 biological transmission Effects 0.000 description 3
- 230000004044 response Effects 0.000 description 3
- 238000010586 diagram Methods 0.000 description 2
- 238000012544 monitoring process Methods 0.000 description 2
- 238000010200 validation analysis Methods 0.000 description 2
- 230000004913 activation Effects 0.000 description 1
- 230000006978 adaptation Effects 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
- H04L9/3213—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
The invention provides a data processing method and device, relates to the technical field of electronic information, and can solve the problem of low efficiency in authentication management based on an authorization token. The specific technical scheme is as follows: after the target token is acquired, whether the target token is verified or not is determined through verification information of the target token, wherein the verification information comprises a first validity period and an operating state. The present disclosure is for authentication management of an authorization token.
Description
Technical Field
The present disclosure relates to the field of electronic information technologies, and in particular, to a data processing method and apparatus.
Background
In order to improve the use security of data, the use authority of the login device is verified by means of user authentication, in the prior art, the authentication function of the login user is completed by JWT (json web token, cross-domain authentication solution). However, after the first device generates the authorization token and the preset validity period corresponding to the authorization token, the token cannot be modified within the preset validity period, so that the user may need to log in again due to the expiration of the preset validity period of the token in the process of normally using the system, and a problem that a new token needs to be obtained is caused, which affects user experience; meanwhile, after the user exits the system within the preset valid period of the authorization token, the authorization token is still in the preset valid period, so that the problem that the authorization token is stolen may occur, and potential safety hazards exist.
Disclosure of Invention
The embodiment of the disclosure provides a data processing method and device, which can solve the problem of low efficiency in authentication management based on an authorization token. The technical scheme is as follows:
according to a first aspect of embodiments of the present disclosure, there is provided a data processing method, including:
acquiring a target token of second equipment;
and according to a preset rule, when the verification information of the target token is matched with the pre-stored verification information, determining that the target token is verified, wherein the verification information comprises the use state and the first valid period.
In one embodiment, before obtaining the target token of the second device, the method further includes:
acquiring login information, wherein the login information comprises a login name and a login password;
and after the login information passes the verification, generating the target token according to the login information and a preset rule, wherein the generation of the target token comprises setting a first validity period of the target token, and updating the use state of the target token to a first state.
In one embodiment, the method wherein determining that the target token is validated comprises:
analyzing the target token, and acquiring a use state and a first validity period corresponding to the target token according to an analysis result;
when the use state is displayed as a first state, acquiring access time, wherein the access time is the time of receiving data request information;
when the first validity period matches the access time, it is determined that the authentication information is authenticated.
In one embodiment, the method further comprises:
when the target token passes the verification, acquiring the current time in real time;
when the comparison result between the current time and the first validity period does not meet the preset condition, the first validity period is modified according to the preset rule.
In one embodiment, in the method, the target token is obtained through logout request information sent by the second device, the logout request information is used for requesting to log out of the server, and the method further includes:
and when the target token passes the verification, generating an exit instruction according to the exit request information, and updating the use state of the target token to be a second state.
According to the data processing method provided by the embodiment of the disclosure, after the target token is acquired, whether the target token passes the verification is determined through the verification information of the target token, wherein the verification information comprises the first validity period and the working state. After the target token passes the verification, the first validity period corresponding to the target token can be modified according to a specific use scenario in response to the request sent by the device. By setting the working state and the first validity period of the target token, different use scenes can be flexibly adapted under the condition that the preset validity period is fixed, so that the use safety of the token can be improved, and the token verification efficiency can also be improved.
According to a second aspect of the embodiments of the present disclosure, there is provided a data processing apparatus including:
a receiver and a processor, wherein the processor is connected with the receiver,
the receiver is connected with the processor;
the receiver is used for acquiring a target token of the second device;
the processor is used for determining that the target token is verified when verification information of the target token is matched with pre-stored verification information according to a preset rule, wherein the verification information comprises a use state and a first valid period.
In one embodiment, the processor is further configured to,
acquiring login information, wherein the login information comprises a login name and a login password;
and after the login information passes the verification, generating the target token according to the login information and a preset rule, wherein the generation of the target token comprises setting a first validity period of the target token, and updating the use state of the target token to a first state.
In one embodiment, the processor is further configured to,
analyzing the target token, and acquiring a use state and a first validity period corresponding to the target token according to an analysis result;
when the use state is displayed as a first state, acquiring access time, wherein the access time is the time of receiving data request information;
when the first validity period matches the access time, it is determined that the authentication information is authenticated.
In one embodiment, the processor is further configured to,
when the target token passes the verification, acquiring the current time in real time;
when the comparison result between the current time and the first validity period does not meet the preset condition, the first validity period is modified according to the preset rule.
In one embodiment, the processor is further configured to,
and when the target token passes the verification, generating an exit instruction according to the exit request information, and updating the use state of the target token to be a second state.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and together with the description, serve to explain the principles of the disclosure.
Fig. 1 is a flowchart of a data processing method provided by an embodiment of the present disclosure;
FIG. 2 is an interaction diagram of a data processing method provided by an embodiment of the present disclosure;
fig. 3 is a block diagram of a data processing apparatus according to an embodiment of the present disclosure.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The implementations described in the exemplary embodiments below are not intended to represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present disclosure, as detailed in the appended claims.
Example one
The embodiment of the present disclosure provides a data processing method, which is applied to a first device, and as shown in fig. 1, the data processing method includes the following steps:
101. a target token for the second device is obtained.
In an optional embodiment, the method provided by the present disclosure may obtain the target token of the second device in various ways, for example, by receiving the request information of the second device to carry the target token of the second device. The request information may be: and data request information or log-out request information and the like, wherein the data request information comprises a target token, and the data request information is used for requesting the first device to send target data.
In an optional embodiment, the method provided by the present disclosure further includes generating a target token for the second device, and the specific steps may include:
acquiring login information, wherein the login information comprises a login name and a login password, and also can comprise identification information of second equipment requesting to login the first equipment, and the login information is used for the second equipment requesting to login the first equipment;
after the login information passes the verification, acquiring a first validity period and a use state corresponding to the second device according to the login information and a preset rule;
and generating a target token according to the first valid period and the use state.
Specifically, after the first device verifies the user name and the password, the target token is generated according to the identification information of the second device and a preset algorithm. The target token may include: the preset expiry date, the first expiry date and the use state of token.
After the target token corresponding to the second device is generated, the method provided by the present disclosure may further store the parameter information, such as the use state, the preset validity period, and the first validity period, corresponding to the target token in any storage manner, for example, in any form of a database, a Cache memory, and a Remote Dictionary service (Remote Dictionary Server).
For example, when the two parameter information, i.e., the usage state and the first validity period corresponding to the token, are stored in the database, the two parameter information may be stored in a table in the database.
As mentioned above, the preset valid period and the first valid period corresponding to the target token are two independent periods.
Wherein the preset validity period of the target token is preset in JWT (json web token, cross-domain authentication solution), and the preset validity period is not modifiable within the preset validity period after the target token is generated according to the algorithm.
Further, when the preset validity period of the token is set, the preset validity period of the token can be set according to specific use scenes, and when the user uses the token for long-term login, the preset validity period of the target token can be set to 30 days, so that the problem that the user is forced to log in again in normal use due to the fact that the preset validity period of the token is short is avoided.
The first validity period of the target token is set according to a specific use scenario by the method provided by the present disclosure, and the first validity period can be modified and updated in real time when the use scenario changes. The first effective time limit is set, so that the target token can be limited through the first effective time limit of the target token under the condition that the preset effective time limit of the target token is longer and the user forgets to quit the first device after the use is finished, and the problem that the target token is stolen is avoided.
Further, the target token generated by the present disclosure further includes a use state corresponding to the token, where the use state is used to indicate whether the target token is in a use state, and the use state may include a first state and a second state, where the first state indicates that the target token is in a valid state, and the second state indicates that the target token belongs to a failed state. After the login information of the target user is verified, the use state of the token can be set to be a first state, namely a valid state. And setting the first validity period to be 20 minutes increased from the current time, for example, the current time is 10:00, and then the first validity period is 10:20, so as to ensure that the second device normally executes the task on the first device.
102. And according to a preset rule, when the verification information of the target token is matched with the pre-stored verification information, determining that the target token passes the verification.
The validation information includes a usage status and a first validity period.
The authentication message includes: the usage state is used for indicating whether the target token is in a usage state, and the usage state may include a first state and a second state, where the first state indicates that the target token is in a valid state, and the second state indicates that the target token belongs to a disabled state.
This target token of this verification of this disclosure, including information such as the identity information, preset valid period, first valid period and the user state that verify that target token corresponds, its verification process can include:
analyzing the target token, and acquiring a use state and a first validity period corresponding to the target token according to an analysis result;
when the use state is displayed as an activation state, acquiring access time, wherein the access time is the time of receiving data request information;
when the first validity period matches the access time, the token is determined to be authenticated.
Specific examples are set forth herein for illustration:
after login request information of second equipment is obtained, performing identity authentication on the login information according to identity information in the login request information;
and step two, after the identity authentication of the target token is passed, verifying whether the access time when the data request information is received exceeds a preset valid period corresponding to the target token.
And step three, if the identity authentication of the token passes and the access time when the first device receives the data request information does not exceed the preset validity limit corresponding to the target token, verifying whether the use state of the token is displayed as a first state, namely an available state, and judging whether the access time is within the first validity limit of the token.
And if the judgment results of the two are both yes, determining that the target token passes the verification.
And if the using state of the target token is the second state, namely the unavailable state, or the current time is not within the first validity period of the token, confirming that the target token fails to verify.
The method provided by the present disclosure further comprises: according to a specific use scenario, a first validity period corresponding to a target token is modified, for example, when a comparison result of the access time and the first validity period does not meet a preset condition, the first validity period is modified.
Specific examples are set forth herein for illustration: the preset first validity period of the target token is 10:20, and the current time of the first device for accepting the data request information is 10:10, after the target token is verified, since the difference between the first validity period and the current time is ten minutes, when the working time for which the user needs to log in the first device is more than 10 minutes, the user is forced to quit the first device forcibly because the difference is less than ten minutes, which causes the need of re-login authentication, reduces the efficiency of authentication, reduces the satisfaction degree of user use, the first expiry date of the target token may be modified, such as extending the first expiry date of the token by another 20 minutes, namely, the first validity period of the target token is 10:30, so that the problems that the second device is forced to log out, the data transmission is interrupted and the like due to the fact that the authentication is not passed because the first validity period of the token is expired in the data transmission process are avoided.
In an optional embodiment, the method provided by the present disclosure further includes monitoring the usage right of the target token in real time according to a preset rule when the target token passes the verification, and generating an exit instruction in real time to instruct the second device to exit the first device when the usage right of the target token does not meet a preset requirement. And if so, monitoring whether the time for the second device to log in the first device is within the first validity period in real time.
In an optional embodiment, after the target token passes the verification, the method provided by the present disclosure further includes performing a corresponding operation according to a way of obtaining the target token. Two examples are listed here for illustration:
example one, the target token is obtained through data request information sent by the second device, where the data request information is used to request the first device to send target data
And after the target token passes the verification, sending target data to the second device.
Further, in the process of sending the target data to the second device, the current time is obtained in real time.
Obtaining a comparison result between the current time and the first validity period;
and modifying the first validity period when the comparison result does not meet the preset condition.
By modifying the first validity period according to the current time, the flexibility of data processing can be improved, and the satisfaction degree of the user can be improved.
Example two, the target token is obtained through logout request information sent by the second device, and the logout request information is used for requesting to log out of the server.
And when the target token passes the verification, generating an exit instruction according to the exit request information, and updating the state of the target token to be a second state.
For example: after determining that the received message is the quit request message, the first device acquires the working state and the working period of the target token according to the target token in the quit request message, verifies that the target token and the preset valid period pass, and determines whether the using state of the target token and the first valid period of the target token meet the requirements, and if both the using state of the target token and the first valid period of the target token meet the requirements, the using state of the target token can be set to be 'unavailable', so that the problem that the target token can be stolen due to the fact that the preset valid period of the target token is not expired is solved.
Further, the method provided by the present disclosure may verify the target token after recognizing that the request instruction is a request instruction to exit the system, and may also recognize whether the request instruction is a request instruction to exit the system after verifying that the target token passes.
In a specific implementation, the request instruction exiting the system includes a logout parameter, and whether the request instruction is a request instruction exiting the system may be determined according to the logout parameter in the request instruction.
In the prior art, the time limit that the second device can access the first device can be limited by the token preset validity period, but since the token preset validity period cannot be modified, the second device may be forced to re-authenticate due to the expiration of the preset validity period in normal operation after logging in the first device.
In order to solve this problem, the prior art may set the token with the preset valid period longer, for example, three years later than the current time, so as to avoid the problem that the second device may be forced to be re-authenticated due to the expiration of the preset valid period in normal use, but the longer preset valid period may cause a safety hazard. In order to improve the security of identity authentication, after the logged second device executes the task, the use state of the target token can be changed into the second state, namely the failure state, by sending the quit request information to the first device, so that the target token fails, and the problem that the token is stolen is avoided.
Further, in order to improve the security of the identity authentication, for example, if the second device does not send a request instruction to the first device to quit the system, the data leakage may be avoided by verifying the first validity period of the token, and the token is disabled after the first validity period of the target token expires.
According to the data processing method provided by the embodiment of the disclosure, after the target token is acquired, whether the target token passes the verification is determined through the verification information of the target token, wherein the verification information comprises the first validity period and the working state. After the target token passes the verification, the first validity period corresponding to the target token can be modified according to a specific use scenario in response to the request sent by the device. By setting the working state and the first validity period of the target token, different use scenes can be flexibly adapted under the condition that the preset validity period is fixed, so that the use safety of the token can be improved, and the token verification efficiency can also be improved.
Example two
Based on the data processing method provided by the embodiment corresponding to fig. 1, another embodiment of the present disclosure provides a data processing method, which may be applied to security authentication, for example, the first device may be a second device or a network server, and the second device may also be a second device or a network server. The present embodiment is described by taking the transmission target data as an example, and does not represent that the present disclosure is limited thereto. Referring to fig. 2, the data processing method provided in this embodiment includes the following steps:
201. the second device sends login information to the first device.
The login information includes identity authentication information such as a login name and a login password.
The login information is used for requesting to login the first device.
202. The first device verifies the login information, generates a target token of the second device according to the login information after the login information is verified, and sends the target token to the second device.
The target token is generated, the first validity period and the working state of the target token are set, and the working state of the target token is set to be in work.
The target token is used for verifying at least one of identity information and operation authority of the second device.
After generating the target token, the first device stores parameter information corresponding to the target token, where the parameter information includes: the usage period of the target token and the activated usage status.
203. The second device stores the target token after receiving the target token.
204. The second device sends data request information to the first device.
The data request information is used for requesting the first device to send target data, and the data request information includes the target token.
205. And the first equipment verifies the target token according to a preset rule, and after the target token passes the verification, the first equipment sends target data to the second equipment.
The verifying the target token according to the disclosure includes verifying whether verification information of the target token is matched with pre-stored verification information according to a preset rule, and determining that the target token passes verification.
The validation information includes a usage status and a first validity period.
The authentication message includes: the usage state is used for indicating whether the target token is in a usage state, and the usage state may include a first state and a second state, where the first state indicates that the target token is in a valid state, and the second state indicates that the target token belongs to a disabled state.
206. The second device sends the logout request information to the first device.
The logout request information is used for requesting to log out from the first device, and the logout request information comprises a target token.
207. The first equipment verifies the target token according to the quitting request information;
and when the target token passes the verification, generating an exit instruction according to the exit request information, and updating the state of the target token to be a second state.
In the data processing method provided by the embodiment of the present disclosure, two pieces of verification information are added to the token in the JWT processing flow based on the prior art: a first expiration date and a use status. In a use scene of requesting to send data, the second device carries a target token to send data request information to the first device, and the first device determines whether to send the target data to the second device or not by verifying the use state and the first validity period of the target token; therefore, on one hand, the effective use duration of the token can be continuously updated after the second equipment is used every time, and the problem that the token needs to be logged again due to the fact that the preset validity period of the token is expired in the normal system use process of the second equipment logged in the first equipment is solved; on the other hand, the token is disabled after the user exits the system by verifying the using state of the token, so that the problem that the token is possibly stolen after the user exits the system is avoided.
EXAMPLE III
Based on the data processing method described in the embodiments corresponding to fig. 1 and fig. 2, the following is an embodiment of the apparatus of the present disclosure, which can be used to execute an embodiment of the method of the present disclosure.
The embodiment of the present disclosure provides a data processing apparatus, as shown in fig. 3, the data processing apparatus 30 includes: a receiver 301 and a processor 302, which,
the receiver 301 is connected to the processor 302;
the receiver 301 is configured to obtain a target token of the second device;
the processor 302 is configured to determine that the target token is verified when verification information of the target token matches pre-stored verification information according to a preset rule, where the verification information includes a usage status and a first validity period.
In one embodiment, the processor 302 in the system is further configured to,
acquiring login information, wherein the login information comprises a login name and a login password;
and after the login information passes the verification, generating the target token according to the login information and a preset rule, wherein the generation of the target token comprises setting a first validity period of the target token, and updating the use state of the target token to a first state.
In one embodiment, the processor 302 in the system is further configured to,
analyzing the target token, and acquiring a use state and a first validity period corresponding to the target token according to an analysis result;
when the use state is displayed as a first state, acquiring access time, wherein the access time is the time of receiving data request information;
when the first validity period matches the access time, it is determined that the authentication information is authenticated.
In one embodiment, the processor 302 in the system is further configured to,
when the target token passes the verification, acquiring the current time in real time;
when the comparison result between the current time and the first validity period does not meet the preset condition, the first validity period is modified according to the preset rule.
In one embodiment, the processor 302 in the system is further configured to,
and when the target token passes the verification, generating an exit instruction according to the exit request information, and updating the use state of the target token to be a second state.
The data processing device provided by the embodiment of the disclosure determines whether the target token passes the verification through the verification information of the target token after acquiring the target token, wherein the verification information includes a first validity period and a working state. After the target token passes the verification, the first validity period corresponding to the target token can be modified according to a specific use scenario in response to the request sent by the device. By setting the working state and the first validity period of the target token, different use scenes can be flexibly adapted under the condition that the preset validity period is fixed, so that the use safety of the token can be improved, and the token verification efficiency can also be improved.
In the data processing method described in the embodiment corresponding to fig. 1 and fig. 2, an embodiment of the present disclosure further provides a computer-readable storage medium, for example, the non-transitory computer-readable storage medium may be a Read Only Memory (ROM), a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like. The storage medium stores computer instructions for executing the data processing method described in the embodiment corresponding to fig. 1 and fig. 2, which is not described herein again.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This application is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
Claims (10)
1. A data processing method, applied to a first device, the method comprising:
acquiring a target token of second equipment;
according to a preset rule, when verification information of the target token is matched with pre-stored verification information, the target token is determined to pass verification, and the verification information comprises a use state and a first valid period.
2. The method of claim 1, wherein prior to obtaining the target token for the second device, the method further comprises:
obtaining login information, wherein the login information comprises a login name and a login password;
and after the login information passes the verification, generating the target token according to the login information and a preset rule, wherein the generation of the target token comprises setting a first validity period of the target token, and updating the use state of the target token to a first state.
3. The method of claim 1, wherein the determining that the target token is validated comprises:
analyzing the target token, and acquiring a use state and a first validity period corresponding to the target token according to an analysis result;
when the use state is displayed as a first state, acquiring access time, wherein the access time is the time of receiving data request information;
when the first validity period matches the access time, it is determined that the authentication information is authenticated.
4. The method of claim 3, further comprising:
when the target token passes the verification, acquiring the current time;
and when the comparison result of the current time and the first valid period does not accord with a preset condition, modifying the first valid period according to a preset rule.
5. The method of claim 1, wherein the target token is obtained through logout request information sent by a second device, and the logout request information is used for requesting to log out of the server, and the method further comprises:
and when the target token passes the verification, generating an exit instruction according to the exit request information, and updating the use state of the target token to be a second state.
6. A data processing apparatus, comprising: a receiver and a processor, wherein the processor is connected with the receiver,
the receiver is connected with the processor;
the receiver is used for acquiring a target token of the second device;
the processor is used for determining that the target token is verified when verification information of the target token is matched with pre-stored verification information according to a preset rule, wherein the verification information comprises a use state and a first validity period.
7. The apparatus of claim 6, wherein the processor is further configured to,
obtaining login information, wherein the login information comprises a login name and a login password;
and after the login information passes the verification, generating the target token according to the login information and a preset rule, wherein the generation of the target token comprises setting a first validity period of the target token, and updating the use state of the target token to a first state.
8. The apparatus of claim 7, wherein the processor is further configured to,
analyzing the target token, and acquiring a use state and a first validity period corresponding to the target token according to an analysis result;
when the use state is displayed as a first state, acquiring access time, wherein the access time is the time of receiving data request information;
when the first validity period matches the access time, it is determined that the authentication information is authenticated.
9. The apparatus of claim 7, wherein the processor is further configured to,
when the target token passes the verification, acquiring the current time in real time;
and when the comparison result of the current time and the first valid period does not accord with a preset condition, modifying the first valid period according to a preset rule.
10. The apparatus of any of claims 6-9, wherein the processor is further configured to,
and when the target token passes the verification, generating an exit instruction according to the exit request information, and updating the use state of the target token to be a second state.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911349959.5A CN111181728A (en) | 2019-12-24 | 2019-12-24 | Data processing method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911349959.5A CN111181728A (en) | 2019-12-24 | 2019-12-24 | Data processing method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111181728A true CN111181728A (en) | 2020-05-19 |
Family
ID=70623194
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911349959.5A Pending CN111181728A (en) | 2019-12-24 | 2019-12-24 | Data processing method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111181728A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111835513A (en) * | 2020-07-17 | 2020-10-27 | 支付宝(杭州)信息技术有限公司 | Method, device and equipment for updating certificate data |
CN113592490A (en) * | 2021-07-16 | 2021-11-02 | 青岛海尔科技有限公司 | Data processing method and device, storage medium and electronic device |
CN113691379A (en) * | 2021-10-25 | 2021-11-23 | 徐州蜗牛智能科技有限公司 | Authentication method and device for big data |
CN117544378A (en) * | 2023-11-21 | 2024-02-09 | 广州方舟信息科技有限公司 | Authorization management method, device, equipment and storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102611709A (en) * | 2012-03-31 | 2012-07-25 | 奇智软件(北京)有限公司 | Access control method and system for third party resources |
CN103023657A (en) * | 2012-12-26 | 2013-04-03 | 武汉天喻信息产业股份有限公司 | Security verification system based on distributed network transaction |
CN106209749A (en) * | 2015-05-08 | 2016-12-07 | 阿里巴巴集团控股有限公司 | Single-point logging method and the processing method and processing device of device, relevant device and application |
CN106411825A (en) * | 2015-08-03 | 2017-02-15 | 天脉聚源(北京)科技有限公司 | WeChat access token acquisition method and system thereof |
CN109309683A (en) * | 2018-10-30 | 2019-02-05 | 泰华智慧产业集团股份有限公司 | The method and system of client identity verifying based on token |
CN110121873A (en) * | 2017-10-23 | 2019-08-13 | 华为技术有限公司 | A kind of access token management method, terminal and server |
-
2019
- 2019-12-24 CN CN201911349959.5A patent/CN111181728A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102611709A (en) * | 2012-03-31 | 2012-07-25 | 奇智软件(北京)有限公司 | Access control method and system for third party resources |
CN103023657A (en) * | 2012-12-26 | 2013-04-03 | 武汉天喻信息产业股份有限公司 | Security verification system based on distributed network transaction |
CN106209749A (en) * | 2015-05-08 | 2016-12-07 | 阿里巴巴集团控股有限公司 | Single-point logging method and the processing method and processing device of device, relevant device and application |
CN106411825A (en) * | 2015-08-03 | 2017-02-15 | 天脉聚源(北京)科技有限公司 | WeChat access token acquisition method and system thereof |
CN110121873A (en) * | 2017-10-23 | 2019-08-13 | 华为技术有限公司 | A kind of access token management method, terminal and server |
CN109309683A (en) * | 2018-10-30 | 2019-02-05 | 泰华智慧产业集团股份有限公司 | The method and system of client identity verifying based on token |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111835513A (en) * | 2020-07-17 | 2020-10-27 | 支付宝(杭州)信息技术有限公司 | Method, device and equipment for updating certificate data |
CN111835513B (en) * | 2020-07-17 | 2022-03-25 | 支付宝(杭州)信息技术有限公司 | Method, device and equipment for updating certificate data |
CN113592490A (en) * | 2021-07-16 | 2021-11-02 | 青岛海尔科技有限公司 | Data processing method and device, storage medium and electronic device |
CN113691379A (en) * | 2021-10-25 | 2021-11-23 | 徐州蜗牛智能科技有限公司 | Authentication method and device for big data |
CN117544378A (en) * | 2023-11-21 | 2024-02-09 | 广州方舟信息科技有限公司 | Authorization management method, device, equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111181728A (en) | Data processing method and device | |
US10230711B2 (en) | System and methods for enhancing authentication procedures in an anti-fraud environment | |
CN106936835B (en) | Method and system for accessing equipment | |
US20180351944A1 (en) | System and method for authentication service | |
CN107465642B (en) | Method and device for judging abnormal login of account | |
KR20180129194A (en) | Risk analysis apparatus and method for risk based authentication | |
CN106453205B (en) | identity verification method and device | |
CN109039987A (en) | A kind of user account login method, device, electronic equipment and storage medium | |
CN105337997B (en) | Login method of application client and related equipment | |
KR101451359B1 (en) | User account recovery | |
CN113672897B (en) | Data communication method, device, electronic equipment and storage medium | |
CN107241329B (en) | Account login processing method and device | |
CN113542399B (en) | Remote control method and device for vehicle, vehicle and storage medium | |
CN105323222B (en) | Login validation method and system | |
CN106921663A (en) | Identity based on intelligent terminal software/intelligent terminal continues Verification System and method | |
CN111490981A (en) | Access management method and device, bastion machine and readable storage medium | |
CN110311895A (en) | Session authorization check method, system and the electronic equipment of identity-based verifying | |
CN111565181A (en) | Single equipment login method, server and client | |
CN105025039B (en) | Auth method, terminal and server | |
CN104796408A (en) | Single-point live login method and single-point live login device | |
CN111585970A (en) | Token verification method and device | |
CN112685718A (en) | Method for invalidating original access token during multi-terminal login of same account based on OAuth protocol | |
CN110995682A (en) | Method and device for preventing multiple terminals from logging in at different places | |
CN108259163A (en) | The authorization method of terminal device | |
CN112328986A (en) | User identity authentication method, device, server and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200519 |