摘要 |
Methods, systems, and devices for determining a time-expiry algorithm based on a cached and verified security token, a disposition of the security token, and a cache table, where the disposition of the security token is based on whether the received security token is a single-use token or a multiple-use token and where the cache table is selected from two separate cache tables. |
主权项 |
1. A method comprising:
receiving, by a client device, a security token from an authentication server based on user credentials submitted to the authentication server; sending, by the client device, the security token to an application server; verifying, by the application server, the security token with the authentication server and determining whether to allow or deny access to the client device based on the security token verification; determining, by the application server, a disposition of the security token based on whether the received security token is a single-use token or a multiple-use token; associating, by the application server, the security token with a corresponding cache table based on the determined disposition of the token; caching, by the application server, the security token based on the associated cache table; and determining a time-expiry algorithm for the cache table based on the cached security token, the disposition of the security token, and associated cache table. |