Tagged articles
230 articles
Page 1 of 3
Architect's Guide
Architect's Guide
May 4, 2026 · Industry Insights

Would You Accept a Salary Made of Base Pay Plus Tokens?

The article explains how "Token"—the smallest unit of AI processing—has become a measurable, priceable, and allocatable resource that companies are treating as a fourth form of compensation, shifting focus from time to AI‑amplified ability and productivity.

AICompensationToken
0 likes · 5 min read
Would You Accept a Salary Made of Base Pay Plus Tokens?
Machine Learning Algorithms & Natural Language Processing
Machine Learning Algorithms & Natural Language Processing
Mar 24, 2026 · Artificial Intelligence

China’s Tech Circle Wars Over the Chinese Name for AI Tokens – Trends and Aesthetics

Amid a heated debate over the proper Chinese translation of “Token,” China’s AI community examines the term’s technical origins, massive global consumption—30 trillion daily tokens worldwide, 4.69 trillion from China alone—and its economic impact, while proposing names like CiYuan, MoYuan, and ZhiYuan to reflect cultural aesthetics.

Chinese NamingNLPToken
0 likes · 12 min read
China’s Tech Circle Wars Over the Chinese Name for AI Tokens – Trends and Aesthetics
Java Architect Handbook
Java Architect Handbook
Mar 16, 2026 · Backend Development

Cookie vs Session vs Token: Master Java Authentication for Interviews

This guide outlines interview focus points, core definitions, and deep analysis of Cookie, Session, and Token (JWT), compares their storage, security, scalability, and cross‑origin support, and provides high‑frequency follow‑up questions, common variants, memory mnemonics, and selection principles for Java authentication.

AuthenticationCookieJWT
0 likes · 15 min read
Cookie vs Session vs Token: Master Java Authentication for Interviews
Senior Tony
Senior Tony
Feb 26, 2026 · Information Security

Why Most Projects Choose Token + Redis Over Stateless JWT

Although JWT is marketed as a decentralized, stateless solution, the majority of real‑world applications still rely on a Token + Redis approach because it simplifies logout handling, avoids Redis outages, and aligns better with practical security requirements.

AuthenticationBackendJWT
0 likes · 7 min read
Why Most Projects Choose Token + Redis Over Stateless JWT
Mike Chen's Internet Architecture
Mike Chen's Internet Architecture
Feb 11, 2026 · Information Security

Mastering Single Sign-On: Cookie, Token, and CAS Approaches Explained

This article explains three core Single Sign-On architectures—same‑domain cookie/session, distributed token‑based (JWT/OAuth2), and Central Authentication Service—detailing their workflows, advantages, drawbacks, and ideal use cases, helping architects choose the right SSO solution for web, mobile, and micro‑service environments.

AuthenticationCASOAuth2
0 likes · 5 min read
Mastering Single Sign-On: Cookie, Token, and CAS Approaches Explained
Lobster Programming
Lobster Programming
Jan 19, 2026 · Information Security

How CSRF Attacks Exploit Trusted Sessions and How to Defend Them

This article explains the principle and step‑by‑step flow of Cross‑Site Request Forgery attacks, illustrates common exploitation techniques such as forged GET/POST requests and click‑bait links, and outlines practical defenses including POST usage, HttpOnly cookies, CSRF tokens, and double‑submit cookie validation.

CSRFCross-Site Request ForgeryToken
0 likes · 6 min read
How CSRF Attacks Exploit Trusted Sessions and How to Defend Them
Ray's Galactic Tech
Ray's Galactic Tech
Jan 13, 2026 · Cloud Native

Why Short‑Lived Tokens Are the Key to True Kubernetes Security

This article explains how ServiceAccount, Token, RBAC, and NetworkPolicy work together in Kubernetes, why short‑lived tokens with audience restrictions are essential, and provides practical manifests, version history, attack‑defense models, and cloud‑provider identity integrations for robust cloud‑native security.

RBACServiceAccountToken
0 likes · 8 min read
Why Short‑Lived Tokens Are the Key to True Kubernetes Security
Architect's Guide
Architect's Guide
Jan 11, 2026 · Information Security

10 Common Authentication Techniques Explained: From Basic Auth to OAuth and QR‑Login

This article systematically introduces ten widely used authentication methods—including HTTP Basic Auth, Session‑Cookie, Token, JWT, Single Sign‑On, OAuth 2.0, federated login, unique‑device login, QR‑code login, and one‑click mobile login—explaining their principles, workflows, advantages, drawbacks, and typical implementation libraries.

AuthenticationJWTOAuth
0 likes · 45 min read
10 Common Authentication Techniques Explained: From Basic Auth to OAuth and QR‑Login
Senior Tony
Senior Tony
Jan 7, 2026 · Information Security

How to Implement Seamless Token Auto‑Renewal: Frontend Refresh, Sliding Window, and Double‑Token Strategies

Token expiration can be handled with three main strategies—frontend‑driven periodic refresh, backend sliding‑window renewal, and the industry‑standard double‑token (access + refresh) scheme—each balancing implementation simplicity, user experience, and security, with the double‑token approach offering the most robust solution.

AuthenticationBackend DevelopmentRefresh token
0 likes · 7 min read
How to Implement Seamless Token Auto‑Renewal: Frontend Refresh, Sliding Window, and Double‑Token Strategies
Top Architect
Top Architect
Dec 13, 2025 · Information Security

Why Many Developers Avoid Using JWT: Risks and Drawbacks Explained

This article introduces JSON Web Tokens (JWT), explains how they work in authentication flows, and examines their major drawbacks such as token size overhead, redundant signatures, revocation challenges, stale data risks, and lack of encryption, concluding that JWTs are suited for short‑lived claims but not for long‑term session management.

JWTTokenWeb Development
0 likes · 11 min read
Why Many Developers Avoid Using JWT: Risks and Drawbacks Explained
Top Architect
Top Architect
Dec 7, 2025 · Backend Development

How QR‑Code Login Works: From Token Generation to Authentication

This article explains the technical principles behind QR‑code login, covering QR‑code basics, token‑based authentication, the complete client‑server workflow, state transitions, and implementation details such as token structures and polling mechanisms.

AuthenticationTokenbackend-development
0 likes · 13 min read
How QR‑Code Login Works: From Token Generation to Authentication
ShiZhen AI
ShiZhen AI
Dec 4, 2025 · Artificial Intelligence

What Is a Context Window? Explaining LLM Memory Capacity

The article explains that a context window defines an LLM's token‑level memory capacity, shows how longer windows cause quadratic computation growth, introduces KV Cache as a way to extend context without exploding resources, and covers advanced techniques like Ring Attention, NIAH benchmarking, and attention decay in long sequences.

Context WindowKV cacheLLM
0 likes · 6 min read
What Is a Context Window? Explaining LLM Memory Capacity
Frontend AI Walk
Frontend AI Walk
Dec 2, 2025 · Artificial Intelligence

Understanding LLMs: A Frontend Developer’s Primer on Large Language Models

The article demystifies large language models for frontend developers by likening token prediction to autocomplete, explaining tokens, context windows, temperature, the two-stage training process, and the critical role of prompts, using concrete code examples and analogies to familiar frontend concepts.

Fine-tuningFrontend AnalogyLLM
0 likes · 10 min read
Understanding LLMs: A Frontend Developer’s Primer on Large Language Models
Top Architect
Top Architect
Nov 11, 2025 · Information Security

Mastering Authentication & Authorization: Cookies, Sessions, Tokens, and JWT Explained

This comprehensive guide explores the fundamentals of authentication and authorization, detailing how credentials, cookies, and sessions work together, and compares traditional session-based approaches with modern token-based solutions such as JWT, covering their mechanisms, advantages, drawbacks, and best practices for secure, scalable web applications.

AuthenticationAuthorizationJWT
0 likes · 38 min read
Mastering Authentication & Authorization: Cookies, Sessions, Tokens, and JWT Explained
Top Architect
Top Architect
Nov 9, 2025 · Backend Development

Mastering Idempotency: 4 Proven Techniques for Reliable Backend Operations

This article explains four common idempotency strategies—token, database unique index, distributed lock, and request‑body digest—detailing their core ideas, key concepts, and providing ready‑to‑copy Spring/Redis code examples to prevent duplicate requests in high‑traffic backend systems.

IdempotencyTokenUnique Index
0 likes · 10 min read
Mastering Idempotency: 4 Proven Techniques for Reliable Backend Operations
Architect's Guide
Architect's Guide
Nov 9, 2025 · Information Security

Understanding Authentication, Authorization, and Tokens: From Cookies to JWT

This article explains the fundamentals of authentication, authorization, and credentials, compares cookies, sessions, and tokens, introduces JWT structure and usage, discusses common security concerns, and outlines practical solutions for distributed systems and modern web applications.

AuthenticationAuthorizationCookie
0 likes · 36 min read
Understanding Authentication, Authorization, and Tokens: From Cookies to JWT
Architect
Architect
Nov 7, 2025 · Backend Development

Mastering Idempotency: 4 Proven Strategies for Reliable APIs

This article explains four practical idempotency solutions—token tokens, database unique indexes, distributed locks, and request content digests—detailing their concepts, core keywords, and providing ready‑to‑copy Spring Boot code examples, along with implementation tips and a comparison table to help you choose the right approach for high‑concurrency APIs.

Database IndexIdempotencySpring Boot
0 likes · 10 min read
Mastering Idempotency: 4 Proven Strategies for Reliable APIs
Java Architect Essentials
Java Architect Essentials
Oct 17, 2025 · Mobile Development

Master WeChat Mini‑Program Login: From Code to Token in 10 Steps

This guide walks you through the complete WeChat mini‑program login flow, covering front‑end wx.login usage, back‑end code2Session exchange for openId and unionId, phone number retrieval, database schema design, API contracts, token generation, interceptor validation, and environment configuration.

JavaMiniProgramOpenID
0 likes · 16 min read
Master WeChat Mini‑Program Login: From Code to Token in 10 Steps
Architecture Digest
Architecture Digest
Oct 7, 2025 · Backend Development

Prevent Duplicate Submissions in SpringBoot: 4 Proven Solutions

This article explains why front‑end debouncing is insufficient for preventing duplicate orders, then walks through four backend strategies—local cache with AOP, Redis atomic operations, database unique indexes, and token verification—providing core principles, code examples, and pros/cons for each.

Database IndexSpringBootToken
0 likes · 18 min read
Prevent Duplicate Submissions in SpringBoot: 4 Proven Solutions
Top Architect
Top Architect
Oct 5, 2025 · Information Security

Securing Third‑Party APIs: AK/SK Generation, Signature Rules, and Anti‑Replay Strategies

This guide explains how to secure third‑party APIs by generating unique Access Key/Secret Key pairs, designing signature processes with timestamps and nonces, implementing permission division, creating robust API endpoints, and applying best‑practice security measures such as HTTPS, token handling, rate limiting, and idempotency.

AK/SKAPI SecurityAnti-replay
0 likes · 33 min read
Securing Third‑Party APIs: AK/SK Generation, Signature Rules, and Anti‑Replay Strategies
Su San Talks Tech
Su San Talks Tech
Oct 4, 2025 · Mobile Development

Master WeChat Mini Program Login: From wx.login to Secure Token Authentication

This guide walks through the complete implementation of WeChat Mini Program login, covering front‑end wx.login calls, back‑end code2Session exchanges, database schema design, API specifications, environment configuration, token validation via interceptors, and key security considerations, all illustrated with code snippets and diagrams.

JavaMini ProgramOpenID
0 likes · 18 min read
Master WeChat Mini Program Login: From wx.login to Secure Token Authentication
Architect
Architect
Oct 1, 2025 · Information Security

How to Secure Third‑Party APIs with AK/SK, Signatures, Tokens and Anti‑Replay Measures

This article presents a comprehensive guide to designing secure third‑party APIs, covering the generation and management of Access Key/Secret Key pairs, signature creation, timestamp and nonce anti‑replay techniques, token handling, request throttling, IP whitelisting, idempotency, versioning, response standards, and practical code examples in Java and SQL.

AK/SKAPI SecurityAuthentication
0 likes · 32 min read
How to Secure Third‑Party APIs with AK/SK, Signatures, Tokens and Anti‑Replay Measures
Su San Talks Tech
Su San Talks Tech
Sep 19, 2025 · Information Security

JWT vs Token+Redis: Which Authentication Strategy Wins for Your Backend?

This article thoroughly compares JWT and Token‑plus‑Redis authentication approaches, detailing their underlying principles, Java implementations, performance, security trade‑offs, and ideal use‑cases, and even proposes a hybrid solution that combines the strengths of both methods for modern applications.

AuthenticationJWTSecurity
0 likes · 16 min read
JWT vs Token+Redis: Which Authentication Strategy Wins for Your Backend?
Su San Talks Tech
Su San Talks Tech
Aug 23, 2025 · Information Security

Cookie, Session, Token, JWT, OAuth2: Which One Fits Your Project?

This article demystifies the differences between Cookie, Session, Token, JWT, and OAuth2, explains their underlying mechanisms, shows practical Spring code examples, compares their security properties and suitable scenarios, and provides clear guidance on choosing the right authentication strategy for modern web applications.

CookieJWTOAuth2
0 likes · 13 min read
Cookie, Session, Token, JWT, OAuth2: Which One Fits Your Project?
Lobster Programming
Lobster Programming
Aug 13, 2025 · Information Security

How to Seamlessly Refresh Expired Tokens: 5 Proven Strategies

This article examines five practical token‑renewal approaches—brute‑force redirect, front‑end refresh request, server‑side refresh, Redis‑tracked expiration, and a dual‑token mechanism—highlighting their workflows, advantages, and drawbacks to help developers choose the most user‑friendly solution.

Front-endToken
0 likes · 6 min read
How to Seamlessly Refresh Expired Tokens: 5 Proven Strategies
JavaScript
JavaScript
Jul 9, 2025 · Information Security

How to Achieve a Seamless “Never‑Logout” Experience with Token Refresh

This article explains why short‑lived access tokens cause user interruptions, introduces the dual‑token authentication model with refresh tokens, and provides a complete Axios interceptor implementation that transparently renews tokens, handles concurrency, and gracefully logs out when refresh fails.

AuthenticationSecurityToken
0 likes · 9 min read
How to Achieve a Seamless “Never‑Logout” Experience with Token Refresh
Java Architect Essentials
Java Architect Essentials
Jul 2, 2025 · Information Security

How to Bulletproof JWTs: Prevent Token Theft, None Attacks, and Brute‑Force

This article examines common JWT vulnerabilities—including token exposure via localStorage, algorithm‑tampering “none” attacks, weak signing keys, and lack of revocation—and presents a robust solution using HTTPS transmission, HttpOnly Secure cookies, SM9 cryptographic signatures, and a Redis‑based blacklist to achieve dramatically improved security.

FlaskJWTPython
0 likes · 12 min read
How to Bulletproof JWTs: Prevent Token Theft, None Attacks, and Brute‑Force
Architect
Architect
Jun 22, 2025 · Backend Development

Mastering Idempotency: Ensure Reliable Operations in Distributed Systems

Idempotency ensures that repeated service calls or user actions produce the same effect without unintended side effects, a critical concern in distributed and microservice architectures; this article explains its principles, SQL examples, HTTP semantics, token strategies, lock handling, and message‑queue solutions.

IdempotencyMessage QueueToken
0 likes · 13 min read
Mastering Idempotency: Ensure Reliable Operations in Distributed Systems
Rare Earth Juejin Tech Community
Rare Earth Juejin Tech Community
Apr 27, 2025 · Backend Development

Implementing MCP over SSE/HTTP in a SpringBoot Backend

This article explains how to extend an open‑source smart production management system with MCP support by creating SSE/HTTP endpoints, a token‑based MAP, and a McpService that scans, executes, and pushes results, and demonstrates client configuration using CherryStudio.

BackendHTTPMCP
0 likes · 6 min read
Implementing MCP over SSE/HTTP in a SpringBoot Backend
Top Architect
Top Architect
Apr 17, 2025 · Information Security

Designing Secure Third‑Party API Authentication with AK/SK, Signatures and Replay‑Attack Prevention

This article presents a comprehensive design for securing third‑party APIs by using Access Key/Secret Key pairs, timestamp and nonce validation, signature generation, token handling, HTTPS, rate limiting, logging, idempotency, versioning, standardized response formats and practical Java code examples to prevent tampering and replay attacks.

API SecurityAccess KeyAuthentication
0 likes · 32 min read
Designing Secure Third‑Party API Authentication with AK/SK, Signatures and Replay‑Attack Prevention
php Courses
php Courses
Apr 10, 2025 · Backend Development

Implementing Debounce and Preventing Duplicate Submissions in PHP

This article explains how to implement debounce functionality and prevent duplicate form submissions in PHP using session storage, providing step‑by‑step code examples for creating a debounce helper, generating and validating tokens, and integrating them into web forms.

DebounceFormSession
0 likes · 5 min read
Implementing Debounce and Preventing Duplicate Submissions in PHP
Selected Java Interview Questions
Selected Java Interview Questions
Apr 8, 2025 · Backend Development

Authentication Implementation: Choosing Between JWT and Session in Backend Development

This article explains the technical selection between JWT and session for authentication, compares their differences, advantages, and disadvantages, and provides a complete Java implementation—including token generation, Redis storage, login/logout, password update, and request interception—demonstrating why JWT was chosen for a distributed backend system.

AuthenticationBackendJWT
0 likes · 13 min read
Authentication Implementation: Choosing Between JWT and Session in Backend Development
Su San Talks Tech
Su San Talks Tech
Mar 14, 2025 · Backend Development

Ensuring Idempotency in Distributed Systems: Patterns, Code, and Best Practices

This article explains the concept of idempotency, outlines scenarios where it is essential, analyzes common causes of idempotency problems, and presents a comprehensive set of solutions—including unique constraints, optimistic and pessimistic locks, distributed locks, token mechanisms, state machines, deduplication tables, and global request IDs—accompanied by practical code examples and database design guidelines.

BackendDistributed SystemsIdempotency
0 likes · 14 min read
Ensuring Idempotency in Distributed Systems: Patterns, Code, and Best Practices
Top Architect
Top Architect
Jan 22, 2025 · Information Security

Designing Secure Third‑Party API Authentication with AK/SK, Signatures and Token Management

This article presents a comprehensive design for securing third‑party API calls by generating unique Access Key/Secret Key pairs, defining permission granularity, implementing signature generation with timestamps and nonces, handling token lifecycle, and providing concrete Java and SQL code examples for practical deployment.

AK/SKAPI SecurityAuthentication
0 likes · 31 min read
Designing Secure Third‑Party API Authentication with AK/SK, Signatures and Token Management
Lobster Programming
Lobster Programming
Jan 9, 2025 · Information Security

5 Effective Anti-Hotlinking Techniques: Nginx, SpringBoot, Tokens, Timestamps & Captchas

Hotlinking attacks steal popular media by fetching resources from major platforms, but developers can protect assets using anti-leech methods such as Nginx referer checks, SpringBoot filters, token validation, timestamp verification, and graphical captchas, each with strengths and limitations against forged requests.

CaptchaNGINXSpringBoot
0 likes · 7 min read
5 Effective Anti-Hotlinking Techniques: Nginx, SpringBoot, Tokens, Timestamps & Captchas
Rare Earth Juejin Tech Community
Rare Earth Juejin Tech Community
Dec 24, 2024 · Backend Development

Preventing Duplicate Order Submissions with Token Mechanism and Redis in Spring Boot

This article explains how to prevent duplicate order submissions in e‑commerce systems by using a token mechanism and Redis‑based distributed locks within a Spring Boot backend, detailing the workflow, code implementation, and best‑practice optimizations for idempotent processing.

Backend DevelopmentIdempotencySpring Boot
0 likes · 11 min read
Preventing Duplicate Order Submissions with Token Mechanism and Redis in Spring Boot
Architect's Guide
Architect's Guide
Dec 16, 2024 · Information Security

Understanding the Mechanics of QR Code Login and Token‑Based Authentication

This article explains how QR code login works by describing QR code fundamentals, token‑based authentication, and the step‑by‑step process—including QR generation, scanning, state transitions, and final confirmation—that enables a mobile device to securely authenticate a PC session.

AuthenticationMobileQR code
0 likes · 11 min read
Understanding the Mechanics of QR Code Login and Token‑Based Authentication
Top Architect
Top Architect
Dec 6, 2024 · Information Security

Design and Implementation of Secure Third‑Party API Authentication Using AK/SK, Signatures, and Tokens

This article presents a comprehensive design for securing third‑party APIs, covering permission segmentation, AK/SK generation, signature workflow and rules, anti‑replay mechanisms, token handling, detailed API endpoint specifications, and best‑practice security measures with illustrative Java code examples.

AK/SKAPI SecurityAuthentication
0 likes · 32 min read
Design and Implementation of Secure Third‑Party API Authentication Using AK/SK, Signatures, and Tokens
Architect
Architect
Dec 3, 2024 · Information Security

How to Secure Third‑Party APIs with AK/SK, Signatures, and Token Strategies

This guide presents a comprehensive design for securing third‑party API calls, covering Access Key/Secret Key generation, permission granularity, timestamp and nonce based replay protection, signature creation and verification, token handling, TLS encryption, rate limiting, logging, and practical Java code examples.

API SecurityAccess KeyJava
0 likes · 28 min read
How to Secure Third‑Party APIs with AK/SK, Signatures, and Token Strategies
Architect
Architect
Nov 21, 2024 · Information Security

Common Authentication Methods: HTTP Basic, Session‑Cookie, Token, and OAuth

This article reviews four widely used authentication mechanisms—HTTP Basic Authentication, session‑cookie, token‑based verification (including JWT), and OAuth—explaining their workflows, security characteristics, implementation details with Node.js/Express code samples, and comparative advantages for different application scenarios.

HTTP BasicNode.jsOAuth
0 likes · 18 min read
Common Authentication Methods: HTTP Basic, Session‑Cookie, Token, and OAuth
Mike Chen's Internet Architecture
Mike Chen's Internet Architecture
Nov 21, 2024 · Information Security

Mastering Single Sign-On (SSO): Principles, Tokens, and Real-World Applications

This article provides a comprehensive overview of Single Sign-On (SSO), explaining its core concepts, authentication flow, token generation and validation, and practical use cases across enterprises, education, finance, and e‑commerce, while also offering insights into security benefits and implementation details.

AuthenticationSSOSecurity
0 likes · 5 min read
Mastering Single Sign-On (SSO): Principles, Tokens, and Real-World Applications
37 Interactive Technology Team
37 Interactive Technology Team
Nov 11, 2024 · Information Security

Background, Definition, Structure, and Authentication Process of JWT (JSON Web Token)

JSON Web Token (JWT) is a compact, self‑contained, stateless token that encodes header, payload, and signature in Base64URL, enabling secure, signature‑verified authentication without server‑side session storage, simplifying scaling, supporting cross‑domain use, while offering advantages like lightweight extensibility and drawbacks such as revocation difficulty and secret‑key reliance.

AuthenticationAuthorizationJSON
0 likes · 16 min read
Background, Definition, Structure, and Authentication Process of JWT (JSON Web Token)
Infra Learning Club
Infra Learning Club
Oct 31, 2024 · Artificial Intelligence

What Is a Token in Large Language Models?

The article explains that a token is the unit processed by large language models, describes three common tokenizer methods—word‑level, character‑level, and sub‑word level—with English and Chinese examples, discusses their advantages and limitations, and shows how OpenAI’s tokenizer varies across model versions.

NLPTokencharacter-level
0 likes · 5 min read
What Is a Token in Large Language Models?
Su San Talks Tech
Su San Talks Tech
Aug 11, 2024 · Backend Development

Mastering Idempotency: Design Patterns and Code Examples for Reliable APIs

This article explains the concept of idempotency, outlines scenarios where it is essential, analyzes common causes of idempotency issues, and presents multiple practical solutions—including unique constraints, optimistic and pessimistic locks, distributed locks, token mechanisms, state machines, deduplication tables, and global request IDs—accompanied by concrete code examples.

Distributed SystemsIdempotencyToken
0 likes · 14 min read
Mastering Idempotency: Design Patterns and Code Examples for Reliable APIs
Java Architect Essentials
Java Architect Essentials
Jul 30, 2024 · Backend Development

Transparent Token Refresh: Client‑Side and Server‑Side Implementations

This article explains how to implement seamless, invisible token refresh for authentication systems, covering client‑side strategies using Axios interceptors and timers, server‑side gateway filters with Spring Boot, code examples for detecting token expiration, obtaining new tokens, and choosing between client and server approaches based on security and performance considerations.

AuthenticationJWTToken
0 likes · 23 min read
Transparent Token Refresh: Client‑Side and Server‑Side Implementations
Rare Earth Juejin Tech Community
Rare Earth Juejin Tech Community
Jul 29, 2024 · Frontend Development

Ensuring a Single Token Request Across Multiple API Calls with a repeatOnce Function

This article explains how to prevent multiple simultaneous token requests in a web application by using a custom repeatOnce function that caches the token in localStorage and coordinates pending calls through an event emitter, ensuring only the first request fetches the token while others wait for its result.

JavaScriptPromiseToken
0 likes · 5 min read
Ensuring a Single Token Request Across Multiple API Calls with a repeatOnce Function
Top Architect
Top Architect
Jul 24, 2024 · Information Security

Understanding Session and Token-Based Authentication with JWT in Web Applications

The article explains how HTTP’s stateless nature requires session or token mechanisms for preserving user state, compares session‑based and JWT token authentication, details JWT structure, and provides Java code examples for generating, verifying, and extracting token information, while also promoting related services.

AuthenticationJWTJava
0 likes · 10 min read
Understanding Session and Token-Based Authentication with JWT in Web Applications
Java Architect Essentials
Java Architect Essentials
Jul 17, 2024 · Information Security

Why Many Experts Advise Against Using JWT for Authentication

This article explains what JSON Web Tokens are, outlines their typical workflow, and critically examines their drawbacks—including size overhead, redundant signatures, revocation challenges, lack of encryption, and broader security concerns—before concluding with practical recommendations for their use.

AuthenticationJWTSecurity
0 likes · 8 min read
Why Many Experts Advise Against Using JWT for Authentication
Architecture Digest
Architecture Digest
Jul 14, 2024 · Information Security

Why Many People Discourage Using JWT (JSON Web Tokens)

This article explains what JWT is, outlines its workflow, and critically examines its drawbacks—including size overhead, redundant signatures, token revocation challenges, stale data, lack of encryption, and broader security concerns—concluding that JWT is suitable only for short‑lived authorization tokens rather than long‑term session management.

JWTToken
0 likes · 7 min read
Why Many People Discourage Using JWT (JSON Web Tokens)
macrozheng
macrozheng
Jul 12, 2024 · Information Security

Understanding JWT: Secure Token-Based Authentication for Modern Apps

This article explains the evolution from traditional cookie‑session authentication to token‑based JWT, detailing its structure, security mechanisms, implementation steps, advantages, limitations, and practical Java code examples, while also comparing it with modern authentication challenges in web and mobile environments.

AuthenticationJWTJava
0 likes · 15 min read
Understanding JWT: Secure Token-Based Authentication for Modern Apps
Architect
Architect
Jul 10, 2024 · Information Security

Evolution and Design of Login Authentication Systems

This article examines the historical evolution of login authentication technologies, from simple cookie‑based methods to token mechanisms, unified account centers, OAuth 2.0, and modern one‑click solutions, while discussing design considerations, security challenges, and future trends such as AI‑driven identity verification.

Identity ManagementOAuthSecurity
0 likes · 12 min read
Evolution and Design of Login Authentication Systems
Java Tech Enthusiast
Java Tech Enthusiast
Jul 6, 2024 · Information Security

Seamless Token Auto‑Refresh with Spring Cloud Gateway and Axios

The article presents a full‑stack solution for seamless token auto‑refresh, combining a Spring Cloud Gateway GlobalFilter that signals expiration with a custom 511 status, Axios response interceptors and a TypeScript timer on the client, plus server‑side token metadata, allowing developers to choose server‑centric or client‑centric refresh strategies.

SpringBootTokenTypeScript
0 likes · 21 min read
Seamless Token Auto‑Refresh with Spring Cloud Gateway and Axios
Architect's Guide
Architect's Guide
Jun 1, 2024 · Backend Development

Implementing API Idempotency with Spring Boot, Redis, and Custom Annotations

This article explains how to achieve reliable API idempotency in Spring Boot applications by using Redis for token storage, defining a custom @AutoIdempotent annotation, implementing token generation and validation services, configuring an interceptor, and providing test cases to demonstrate the workflow.

IdempotencyInterceptorJava
0 likes · 11 min read
Implementing API Idempotency with Spring Boot, Redis, and Custom Annotations
Architect
Architect
May 25, 2024 · Information Security

Design and Implementation of Secure Third‑Party API Authentication Using Access Key/Secret Key, Signatures, and Tokens

This article presents a comprehensive design for securing third‑party API calls by generating unique Access Key/Secret Key pairs, implementing request signing with timestamps and nonces, managing token‑based authentication, defining permission granularity, and providing concrete Java and SQL code examples along with best‑practice recommendations for HTTPS, rate limiting, logging, and idempotency.

Access KeyToken
0 likes · 31 min read
Design and Implementation of Secure Third‑Party API Authentication Using Access Key/Secret Key, Signatures, and Tokens
Top Architect
Top Architect
May 25, 2024 · Backend Development

Java Backend Token Generation Using JWT: Implementation and Usage Guide

This article explains how to prevent duplicate form submissions in Java web applications by generating and validating JWT tokens on the backend, provides complete utility classes and controller examples, and includes step‑by‑step usage instructions with full source code.

JWTJavaToken
0 likes · 16 min read
Java Backend Token Generation Using JWT: Implementation and Usage Guide
Open Source Tech Hub
Open Source Tech Hub
May 17, 2024 · Information Security

How to Secure WebSocket Connections with JWT Authentication

This guide explains the security challenges of WebSocket, outlines a step‑by‑step JWT authentication flow, and presents three practical token‑passing techniques—including URL parameters, post‑connection messages, and sub‑protocols—while emphasizing the use of wss:// and safe token storage.

AuthenticationJWTSecurity
0 likes · 5 min read
How to Secure WebSocket Connections with JWT Authentication
Open Source Tech Hub
Open Source Tech Hub
May 7, 2024 · Information Security

JWT vs Session: Which Authentication Method Fits Your Web App?

This article explains what JWT and Session are, compares their storage, state management, security, performance, cross‑domain support, expiration, use cases, logout mechanisms, and one‑time use scenarios, and helps you decide which authentication approach best suits your application’s needs.

AuthenticationJWTSession
0 likes · 6 min read
JWT vs Session: Which Authentication Method Fits Your Web App?
Architect
Architect
May 4, 2024 · Information Security

How to Secure Third‑Party APIs with AK/SK, Tokens, and Signature Strategies

This article walks through a complete security design for third‑party APIs, covering API‑key generation, request signing with timestamps and nonces, token handling, permission granularity, database schema, and practical implementation details such as rate limiting, idempotency, and TLS encryption.

API SecurityAuthenticationBackend
0 likes · 34 min read
How to Secure Third‑Party APIs with AK/SK, Tokens, and Signature Strategies
Architecture Digest
Architecture Digest
Apr 24, 2024 · Information Security

Secure Third‑Party API Design: AK/SK, Token, Signature, Timestamp & Nonce

The article presents a comprehensive guide to designing secure third‑party APIs, covering access‑key/secret‑key generation, token management, signature algorithms, timestamp and nonce anti‑replay mechanisms, permission granularity, request logging, rate limiting, and example Java and SQL implementations.

Access KeySecret KeyToken
0 likes · 28 min read
Secure Third‑Party API Design: AK/SK, Token, Signature, Timestamp & Nonce
Baidu Geek Talk
Baidu Geek Talk
Apr 1, 2024 · Information Security

How Login Authentication Evolved: From Cookies to Tokens and One‑Click Solutions

This article traces the evolution of login authentication—from simple username/password and cookie storage to token‑based, OAuth, and sub‑token architectures—while presenting practical one‑click login methods such as carrier mobile verification, trusted device history, and facial recognition, and it looks ahead to AI‑driven, privacy‑focused identity systems.

Identity ManagementOAuthSecurity
0 likes · 14 min read
How Login Authentication Evolved: From Cookies to Tokens and One‑Click Solutions
Selected Java Interview Questions
Selected Java Interview Questions
Mar 31, 2024 · Backend Development

Understanding API Idempotency: Concepts, Necessity, and Practical Implementation Strategies

This article uses a relatable story to illustrate a real‑world incident caused by missing API idempotency, explains what idempotency is, why it is essential, which interfaces require it, and presents practical backend and frontend solutions such as unique indexes, optimistic/pessimistic locks, token mechanisms, and distributed locks.

APIBackendIdempotency
0 likes · 13 min read
Understanding API Idempotency: Concepts, Necessity, and Practical Implementation Strategies
Goodme Frontend Team
Goodme Frontend Team
Mar 18, 2024 · Frontend Development

How to Implement Seamless, Secure Login in WeChat Mini‑Programs

This article explains why user authentication is essential for mobile mini‑programs, outlines security measures using AccessToken and RefreshToken, and provides step‑by‑step techniques—including automatic login, token refresh, request queuing, and user‑state handling—to achieve a frictionless user experience.

AuthenticationTokenWeChat
0 likes · 9 min read
How to Implement Seamless, Secure Login in WeChat Mini‑Programs
Java Tech Enthusiast
Java Tech Enthusiast
Mar 13, 2024 · Information Security

Understanding QR Code Login and Token-Based Authentication

QR‑code login lets a already‑authenticated mobile app scan a code shown on a PC, using a server‑issued token tied to the user’s account and device ID; the scan creates a temporary token, the user confirms, and a permanent token is issued to the PC, enabling password‑less, secure authentication.

AuthenticationBackendMobile
0 likes · 11 min read
Understanding QR Code Login and Token-Based Authentication
php Courses
php Courses
Jan 31, 2024 · Information Security

How to Defend Against CSRF Attacks in PHP

This article explains the principles of CSRF attacks and provides practical PHP techniques to prevent them, including token generation and verification, checking Referer and Origin headers, configuring secure cookie attributes, and ensuring safe login and logout processes.

CSRFCookieOrigin
0 likes · 5 min read
How to Defend Against CSRF Attacks in PHP
Architecture Development Notes
Architecture Development Notes
Jan 4, 2024 · Information Security

How to Implement Seamless, Secure Token Refresh for Modern Apps

This article explains the concept, workflow, and step‑by‑step implementation of a seamless token refresh mechanism, providing code examples and security best practices to keep user sessions alive without interruption while maintaining strong protection against token theft and replay attacks.

AuthenticationBackendSecurity
0 likes · 7 min read
How to Implement Seamless, Secure Token Refresh for Modern Apps
php Courses
php Courses
Dec 1, 2023 · Backend Development

Implement Debounce and Duplicate Submission Prevention in PHP

This article explains how to implement debounce to limit frequent event triggers and prevent duplicate form submissions in PHP by using session storage and token validation, providing step‑by‑step instructions and complete code examples.

DebouncePHPSession
0 likes · 4 min read
Implement Debounce and Duplicate Submission Prevention in PHP
Rare Earth Juejin Tech Community
Rare Earth Juejin Tech Community
Nov 13, 2023 · Backend Development

Using SpringMVC Interceptor to Prevent Duplicate Submissions

This article explains how duplicate form submissions occur, outlines common prevention techniques such as token validation and timestamp checks, and demonstrates a practical SpringMVC interceptor implementation with token storage and scheduled cleanup to ensure request uniqueness and reduce server load.

BackendInterceptorJava
0 likes · 8 min read
Using SpringMVC Interceptor to Prevent Duplicate Submissions
Open Source Tech Hub
Open Source Tech Hub
Oct 16, 2023 · Information Security

Mastering JWT Authentication in PHP: From Basics to Advanced Usage

This guide explains the limitations of traditional session authentication, introduces JSON Web Token (JWT) as a scalable cross‑domain solution, and provides step‑by‑step instructions for installing, configuring, generating, and validating JWTs in PHP applications, including supported algorithms and practical code examples.

APIAuthenticationJWT
0 likes · 9 min read
Mastering JWT Authentication in PHP: From Basics to Advanced Usage
Top Architect
Top Architect
Oct 16, 2023 · Information Security

Understanding SSO and OAuth2.0: Concepts, Processes, and Differences

This article explains the fundamentals of Single Sign‑On (SSO) and OAuth2.0, compares their token‑based authentication mechanisms, details typical implementation flows such as CAS, and clarifies the distinctions among SSO, OAuth2, JWT, Spring Security and Shiro, while also noting related promotional content.

CASOAuth2SSO
0 likes · 9 min read
Understanding SSO and OAuth2.0: Concepts, Processes, and Differences