Table of Contents
Reply content:
Home Backend Development PHP Tutorial api design - php interface token data encryption

api design - php interface token data encryption

Jul 06, 2016 pm 01:52 PM
api design php

I am using php to write the app interface recently, and I have some questions

First of all, about token (token)
Token is generated when the user logs in
The user token is saved on the server and cached locally on the client. Most interfaces require the client to send the token to the server. Verify the token in the database

The unique token for each user is composed of the year and month and the client machine code identifying the user ID
(The year and month are the machine codes used for the login retention period to ensure that the user can quickly identify the login the next time he logs in. Source, important credentials to determine whether you need to log in again, the user ID is actually added by the way)

Here comes the problem
=. = This thing feels like it is no different from a session
**If you capture the package directly
Every user’s token on the client of the same platform is the same, which is of no use in preventing attacks**
And this kind of token is based on the user, so this kind of token cannot help with the user's login registration verification (anti-robot) verification
=. =I am still designing something to verify (is there a way to also do login and registration verification based on this token idea)

Reply content:

I am using php to write the app interface recently, and I have some questions

First of all, about token (token)
Token is generated when the user logs in
The user token is saved on the server and cached locally on the client. Most interfaces require the client to send the token to the server. Verify the token in the database

The unique token for each user is composed of the year and month and the client machine code identifying the user ID
(The year and month are the machine codes used for the login retention period to ensure that the user can quickly identify the login the next time he logs in. Source, important credentials to determine whether you need to log in again, the user ID is actually added by the way)

Here comes the problem
=. = This thing feels like it is no different from a session
**If you capture the package directly
Every user’s token on the client of the same platform is the same, which is of no use in preventing attacks**
And this kind of token is based on the user, so this kind of token cannot help with the user's login and registration verification (anti-robot) verification
=. =I am still designing something to verify (is there a way to also do login and registration verification based on this token idea)

This question is extremely simple, take PHP as an example.
But it is different from session, it is a bit close to cookies. This is designed to solve the problem of troublesome cookie value transfer.


First of all, during the login process, the data submitted by the user to the server should be
username, password, client_key
. After php gets these data on the server, it uses the verification algorithm to obtain Check value, such as md5.
(ps: It’s not possible without a password, otherwise the user can still log in quickly after changing the password. Isn’t this a scam?)
$salt is a 加密key to prevent others from guessing the encryption algorithm.

$token=md5($username.$password.date('yyyy').date('mm').$client_key.$salt);
Copy after login

After the calculation is completed, $token will be returned to the client as storage. In the future, the client only needs to send this $token and user name to the server.

When php receives this $token, it will do the above operation again to see if it is consistent and it can be quickly judged.


If you need to prevent malicious registration and login, you need to encrypt client_key on the client and then decrypt it on the server for verification. However, this is of no use. All client codes are unsafe. , can be analyzed through decompilation and deobfuscation, and then forged as usual. So client-side encryption makes no sense.
In addition, judging the server by IP is also a way.
However, fundamentally speaking, preventing malicious attacks requires verification of mobile phone numbers before registration, which is currently basically achieved through this method.

I am also writing, but it has not been implemented yet

1. If the user logs in through token verification, which is something similar to a cookie on the app, there is no problem with the user using it to log in. If the user logs in from another client, he or she needs to log in again. Then the verification Then get the client machine code and match it.

In addition, the client's token can also be complicated, encrypted using js, obtained in php and then parsed.

Although tokens are insecure to a certain extent, they are safer than passing user passwords.
The scenario of using token is generally a stateless and cookie-free mode. If there is a token, it acts as the sessionID in cookies.
Although the token is not secure, it can still be trusted with a certain degree of verification mode

I just wrote a blog not long ago. Although it didn’t involve some technical details, the ideas are still there. Let’s see if it helps you.

First of all, you have to make it clear that Token is used to verify identity after logging in, so it denies your expectation to use it to prevent malicious registration from the beginning. The two are completely incompatible. Secondly, if you want to talk about the difference between Token and Session, the difference is that Token is more customized, because it is implemented by you, you can do a lot of things that Session is inconvenient to do, such as better Device authentication, more convenient control of validity period, better cross-platform performance... Most importantly, the HTTP protocol itself is defined as stateless, and the existence of Cookie undoubtedly damages the definition of stateless, so Almost all interfaces refuse to use Cookie and abandon Cookie, so Token naturally becomes the first choice for verification. Finally, the security of Token focuses on whether it will be cracked or tampered with, not whether it will be intercepted during transmission and cause a man-in-the-middle attack. Interception protection should be achieved by strengthening the security during the transmission process, such as adding parameter signatures, or directly using HTTPS.

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Roblox: Bubble Gum Simulator Infinity - How To Get And Use Royal Keys
3 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
Nordhold: Fusion System, Explained
4 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
Mandragora: Whispers Of The Witch Tree - How To Unlock The Grappling Hook
3 weeks ago By 尊渡假赌尊渡假赌尊渡假赌

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

Hot Topics

Java Tutorial
1670
14
PHP Tutorial
1274
29
C# Tutorial
1256
24
PHP: A Key Language for Web Development PHP: A Key Language for Web Development Apr 13, 2025 am 12:08 AM

PHP is a scripting language widely used on the server side, especially suitable for web development. 1.PHP can embed HTML, process HTTP requests and responses, and supports a variety of databases. 2.PHP is used to generate dynamic web content, process form data, access databases, etc., with strong community support and open source resources. 3. PHP is an interpreted language, and the execution process includes lexical analysis, grammatical analysis, compilation and execution. 4.PHP can be combined with MySQL for advanced applications such as user registration systems. 5. When debugging PHP, you can use functions such as error_reporting() and var_dump(). 6. Optimize PHP code to use caching mechanisms, optimize database queries and use built-in functions. 7

PHP vs. Python: Understanding the Differences PHP vs. Python: Understanding the Differences Apr 11, 2025 am 12:15 AM

PHP and Python each have their own advantages, and the choice should be based on project requirements. 1.PHP is suitable for web development, with simple syntax and high execution efficiency. 2. Python is suitable for data science and machine learning, with concise syntax and rich libraries.

PHP and Python: Comparing Two Popular Programming Languages PHP and Python: Comparing Two Popular Programming Languages Apr 14, 2025 am 12:13 AM

PHP and Python each have their own advantages, and choose according to project requirements. 1.PHP is suitable for web development, especially for rapid development and maintenance of websites. 2. Python is suitable for data science, machine learning and artificial intelligence, with concise syntax and suitable for beginners.

PHP in Action: Real-World Examples and Applications PHP in Action: Real-World Examples and Applications Apr 14, 2025 am 12:19 AM

PHP is widely used in e-commerce, content management systems and API development. 1) E-commerce: used for shopping cart function and payment processing. 2) Content management system: used for dynamic content generation and user management. 3) API development: used for RESTful API development and API security. Through performance optimization and best practices, the efficiency and maintainability of PHP applications are improved.

The Enduring Relevance of PHP: Is It Still Alive? The Enduring Relevance of PHP: Is It Still Alive? Apr 14, 2025 am 12:12 AM

PHP is still dynamic and still occupies an important position in the field of modern programming. 1) PHP's simplicity and powerful community support make it widely used in web development; 2) Its flexibility and stability make it outstanding in handling web forms, database operations and file processing; 3) PHP is constantly evolving and optimizing, suitable for beginners and experienced developers.

PHP and Python: Different Paradigms Explained PHP and Python: Different Paradigms Explained Apr 18, 2025 am 12:26 AM

PHP is mainly procedural programming, but also supports object-oriented programming (OOP); Python supports a variety of paradigms, including OOP, functional and procedural programming. PHP is suitable for web development, and Python is suitable for a variety of applications such as data analysis and machine learning.

PHP vs. Other Languages: A Comparison PHP vs. Other Languages: A Comparison Apr 13, 2025 am 12:19 AM

PHP is suitable for web development, especially in rapid development and processing dynamic content, but is not good at data science and enterprise-level applications. Compared with Python, PHP has more advantages in web development, but is not as good as Python in the field of data science; compared with Java, PHP performs worse in enterprise-level applications, but is more flexible in web development; compared with JavaScript, PHP is more concise in back-end development, but is not as good as JavaScript in front-end development.

PHP and Python: Code Examples and Comparison PHP and Python: Code Examples and Comparison Apr 15, 2025 am 12:07 AM

PHP and Python have their own advantages and disadvantages, and the choice depends on project needs and personal preferences. 1.PHP is suitable for rapid development and maintenance of large-scale web applications. 2. Python dominates the field of data science and machine learning.

See all articles