Information Security 9 min read

Token-Based Identity Authentication: Scenarios, Types, and Hierarchical Design

This article analyzes various client scenarios in multi‑client systems, classifies authentication tokens into password, session, and interface categories, compares their natural and controllable attributes, and proposes a layered token hierarchy to improve security, privacy, and usability across web, mobile, and API platforms.

IT Architects Alliance
IT Architects Alliance
IT Architects Alliance
Token-Based Identity Authentication: Scenarios, Types, and Hierarchical Design

Overview

In information systems with account management, identity verification is crucial. The rise of mobile internet introduces multiple client types, leading to a “one server, N clients” architecture, each with distinct security threats, session lifecycles, permission models, and interface call patterns.

Usage Scenarios

Typical scenarios include web browser login, Android/iOS app login, API‑based login, PC‑to‑mobile QR‑code authorization, and mobile‑to‑PC QR‑code login.

Token Categories

Tokens are grouped into three main families:

1. Account‑Password Tokens

Username/password

API app_id/app_key

2. Session Tokens

Browser token

Mobile token

API application token

3. Interface Call Tokens

API access token

Authorization token

Cross‑platform PC‑mobile token

Token Comparison

Tokens are evaluated on natural attributes (usage cost, change cost) and controllable attributes (usage frequency, validity period). Security goals focus on minimizing exposure and limiting impact if a token is compromised.

Token Hierarchy

Four layers are defined: password layer, session layer, invocation layer, and application layer. The flow proceeds from user credential authentication → generation of client‑specific session tokens → exchange for short‑lived access tokens → optional generation of QR‑code tokens for cross‑device authorization.

Key Token Types

Account‑Password

Traditional username/password and app_id/app_key, rarely changed, high impact if leaked.

Client Session Token

Acts as a session, with differing lifetimes on web (short, higher exposure) and mobile (longer, lower exposure).

Access Token

Used for API calls, derived from a long‑lived session token, short lifespan to reduce risk.

pam_token & map_token

Special QR‑code based tokens for PC‑mobile mutual authentication, with very short lifetimes and rapid invalidation.

Conclusion and Outlook

The proposed token‑based authentication framework addresses token classification, privacy parameter settings, usage scenarios, and hierarchical conversion across lifecycles. It can be applied to user login, time‑limited coupons, invitation codes, QR‑code authorizations, OTP verification, multi‑platform API access, and unified identity centers.

Access Controlsecurityauthenticationtokenidentity
IT Architects Alliance
Written by

IT Architects Alliance

Discussion and exchange on system, internet, large‑scale distributed, high‑availability, and high‑performance architectures, as well as big data, machine learning, AI, and architecture adjustments with internet technologies. Includes real‑world large‑scale architecture case studies. Open to architects who have ideas and enjoy sharing.

0 followers
Reader feedback

How this landed with the community

login Sign in to like

Rate this article

Was this worth your time?

Sign in to rate
Discussion

0 Comments

Thoughtful readers leave field notes, pushback, and hard-won operational detail here.