Tagged articles
7 articles
Page 1 of 1
Architect
Architect
Jul 10, 2024 · Information Security

Evolution and Design of Login Authentication Systems

This article examines the historical evolution of login authentication technologies, from simple cookie‑based methods to token mechanisms, unified account centers, OAuth 2.0, and modern one‑click solutions, while discussing design considerations, security challenges, and future trends such as AI‑driven identity verification.

Identity ManagementOAuthSecurity
0 likes · 12 min read
Evolution and Design of Login Authentication Systems
Baidu Geek Talk
Baidu Geek Talk
Apr 1, 2024 · Information Security

How Login Authentication Evolved: From Cookies to Tokens and One‑Click Solutions

This article traces the evolution of login authentication—from simple username/password and cookie storage to token‑based, OAuth, and sub‑token architectures—while presenting practical one‑click login methods such as carrier mobile verification, trusted device history, and facial recognition, and it looks ahead to AI‑driven, privacy‑focused identity systems.

Identity ManagementOAuthSecurity
0 likes · 14 min read
How Login Authentication Evolved: From Cookies to Tokens and One‑Click Solutions
Java High-Performance Architecture
Java High-Performance Architecture
Mar 4, 2024 · Information Security

How QR Code Login Works: From Token Authentication to Secure Scanning

This article explains the principles behind QR code login, covering everyday QR code usage, the two-step authentication concept of identifying and proving identity, token-based mechanisms, and a detailed step‑by‑step flow—from QR code generation to mobile confirmation—illustrated with diagrams and code examples.

MobileQR codeSecurity
0 likes · 11 min read
How QR Code Login Works: From Token Authentication to Secure Scanning
Selected Java Interview Questions
Selected Java Interview Questions
Nov 17, 2022 · Backend Development

Spring Boot Login Authentication: Filters, Interceptors, AOP, ThreadLocal, and Parameter Resolver

This article presents a comprehensive Spring Boot tutorial on implementing non‑intrusive login authentication using three techniques—Filter, Interceptor, and AOP with custom annotations—plus extensions such as ThreadLocal storage and a Spring MVC argument resolver, complete with project setup, Maven dependencies, and test screenshots.

InterceptorParameter ResolverSpring Boot
0 likes · 13 min read
Spring Boot Login Authentication: Filters, Interceptors, AOP, ThreadLocal, and Parameter Resolver
21CTO
21CTO
Aug 25, 2021 · Information Security

Why Simple Web Login Is Vulnerable and How to Secure It with Encryption and Tokens

This article examines common security flaws in basic web login forms, demonstrates how plain‑text passwords can be intercepted, and presents practical countermeasures such as client‑side encryption, hashing, captchas, tokens, and digital signatures to protect credentials and data integrity.

CaptchaMD5Token
0 likes · 13 min read
Why Simple Web Login Is Vulnerable and How to Secure It with Encryption and Tokens
Top Architect
Top Architect
Oct 30, 2020 · Backend Development

Implementing Login Authentication with Session and JWT in Spring Boot

This article provides a step‑by‑step guide to implementing login authentication in Spring Boot, covering both session‑based and JWT‑based approaches, including code for controllers, filters, interceptors, context utilities, and best‑practice considerations for secure and scalable backend development.

JWTJavaSecurity
0 likes · 22 min read
Implementing Login Authentication with Session and JWT in Spring Boot