In almost every organization where user sensitive data is available, security and privacy of the data plays a vital role. As far as computer science is concerned, it is just a game of saving data in unrecognizable format and accessible to authorized person. User sensitive data mainly includes passwords which are required for the sessions but need to be handled and stored safely.As storage of these information is overhead in database, Tokens are generated which handles sessions and also self contains user details. One of such widely used stateless token is Json Web Token. This paper deals with the introduction, working and algorithms of Json web token. Also pros, cons, hacking possibilities, Proper usage and security measures of JWT are discussed.
CITATION STYLE
Mahindrakar*, P., & Pujeri, Dr. U. (2020). Insights of JSON Web Token. International Journal of Recent Technology and Engineering (IJRTE), 8(6), 1707–1710. https://doi.org/10.35940/ijrte.f7689.038620
Mendeley helps you to discover research relevant for your work.