CN109218256A - Authenticate method, system and the applications client of set-top box legitimacy - Google Patents

Authenticate method, system and the applications client of set-top box legitimacy Download PDF

Info

Publication number
CN109218256A
CN109218256A CN201710520764.7A CN201710520764A CN109218256A CN 109218256 A CN109218256 A CN 109218256A CN 201710520764 A CN201710520764 A CN 201710520764A CN 109218256 A CN109218256 A CN 109218256A
Authority
CN
China
Prior art keywords
client
top box
epg
specific identity
legal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710520764.7A
Other languages
Chinese (zh)
Other versions
CN109218256B (en
Inventor
杨豪杰
徐雄
梁冰
袁立宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Telecom Corp Ltd
Original Assignee
China Telecom Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Telecom Corp Ltd filed Critical China Telecom Corp Ltd
Priority to CN201710520764.7A priority Critical patent/CN109218256B/en
Publication of CN109218256A publication Critical patent/CN109218256A/en
Application granted granted Critical
Publication of CN109218256B publication Critical patent/CN109218256B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint

Abstract

The application proposes a kind of method, system and applications client for authenticating set-top box legitimacy, is related to Smart Home technical field.Wherein, a kind of method of certification set-top box legitimacy of the application include: positioned at set-top box client to electronic program guide (EPG) server send specific identity request;Obtain the specific identity from EPG server;Specific identity is forwarded to EPG server verifying through the operation system backstage of client, wherein the operation system backstage of client sends legal identification information to client according to the successful authentication result from EPG server;Client is provided services to the user according to the legal identification information from operation system backstage.By such method, operation system realizes certification of the operation system to set-top box legitimacy without reading authentication information from the data being stored on user local terminal.

Description

Authenticate method, system and the applications client of set-top box legitimacy
Technical field
This application involves Smart Home technical field, especially a kind of method for authenticating set-top box legitimacy, system and answer Use client.
Background technique
As internet television is grown rapidly, more and more new products and new business enter IPTV set top box;These are produced Product and business face universal authentication question: how to authenticate the legitimacy of IPTV set top box, determine request data from legal machine top Does box issue?
In the prior art, the client in set-top box can pass through JS (JavaScript, a kind of literal translation formula scripting language) Obtain EPG (Electronic Program Guide, the electronics section in cookie (being stored in the data on user local terminal) Mesh guide) authentication information (such as Token), in the side that service server backstage uses EPG authentication information to authenticate to EPG server Method meets the certification demand of most of set-top box;But the requirement with set-top box to safety is higher and higher, part browser Start that HTTP-Only attribute, this attribute is supported to will limit JS script and obtain browser cookie, leads to not acquisition EPG and recognize Demonstrate,prove information.
Summary of the invention
One of the application is designed to provide a kind of method that operation system authenticates set-top box legitimacy.
According to the one aspect of the application, a kind of method for authenticating set-top box legitimacy is proposed, comprising: positioned at set-top box Client sends specific identity request to EPG server;Obtain the specific identity from EPG server;By specific identity through visitor The operation system backstage at family end is forwarded to EPG server verifying, wherein the operation system backstage of client takes according to from EPG The successful authentication result of business device sends legal identification information to client;Client is according to the legal mark from operation system backstage Know information to provide services to the user.
Optionally, further includes: the EPG authentication information in client request cookie;If EPG authentication information can be obtained, Then client allows to provide services to the user;If EPG authentication information can not be obtained, executes to EPG server and send dedicated mark Know request.
Optionally, further includes: client judges set-top box with the presence or absence of legal mark;If legal mark is not present in set-top box Know, then executes to EPG server and send specific identity request.
Optionally, further includes: if set-top box, there are legal mark, client judges legal identify whether in validity period It is interior;It identifies if legal before the deadline, then client allows to provide services to the user;It identifies if legal not before the deadline, then It executes to EPG server and sends specific identity request.
Optionally, specific identity is EPG server according to the session information and/or machine top generated after user's login set-top box The identification information of box generates.
By such method, after client can obtain specific identity request and informing business system from EPG server Platform, operation system backstage can provide legal identification information in the case where EPG server authenticates successful situation for set-top box, thus nothing Authentication information need to be read from cookie, realize certification of the client to set-top box legitimacy.
According to further aspect of the application, a kind of applications client is proposed, comprising: request sending module is used for EPG Server sends specific identity request;Specific identity obtains module, for obtaining the specific identity from EPG server;Forwarding Authentication module, for specific identity to be forwarded to EPG server verifying through the operation system backstage of client, wherein client Operation system backstage provide legal mark to client according to the successful authentication result from EPG server;Legal mark connects Module is received, for receiving the legal identification information from operation system backstage, to provide a user according to legal identification information Service.
Optionally, further includes: authentication information request module, for requesting the EPG authentication information in cookie;If can obtain EPG authentication information is taken, then client allows to provide services to the user;If EPG authentication information can not be obtained, request is activated to send Module.
Optionally, further includes: legal mark judgment module, for judging set-top box with the presence or absence of legal mark;If machine top Legal mark is not present in box, then activates request sending module.
Optionally, legal mark judgment module is also used to when determining that set-top box there are when legal mark, judges legal mark Whether before the deadline;It identifies if legal before the deadline, then client allows to provide services to the user;It identifies and does not exist if legal In validity period, then request sending module is activated.
Optionally, specific identity is EPG server according to the session information and/or machine top generated after user's login set-top box The identification information of box generates.
Such applications client can from EPG server obtain specific identity request and informing business system background so as to There is provided legal identification information in the case where EPG server authenticates successful situation in operation system backstage for set-top box, without from Authentication information is read in cookie, realizes certification of the client to set-top box legitimacy.
According to the another aspect of the application, a kind of system for authenticating set-top box legitimacy is proposed, comprising: application client End, the method for executing any one the certification set-top box legitimacy being mentioned above;EPG server, for according to application The specific identity of client requests to feed back specific identity to applications client, and to the special of the operation system backstage from client It is verified with identification information;Operation system backstage, for receiving the specific identity from applications client and issuing EPG service Device verifying, according to from EPG server be verified result generate it is legal mark and be handed down to applications client.
Optionally, EPG server is also used to log in the session information and/or set-top box generated after set-top box according to user Identification information generates specific identity.
In the system of such certification set-top box legitimacy, client can obtain specific identity request from EPG server And informing business system background, operation system backstage can provide conjunction in the case where EPG server authenticates successful situation for set-top box Method identification information realizes certification of the client to set-top box legitimacy without reading authentication information from cookie.
According to another aspect of the application, a kind of system for authenticating set-top box legitimacy is proposed, comprising: memory;With And it is coupled to the processor of memory, what processor was configured as being mentioned above based on the instruction execution for being stored in memory appoints A kind of method for certification set-top box legitimacy of anticipating.
The system of such certification set-top box legitimacy can realize client without reading authentication information from cookie Hold the certification to set-top box legitimacy.
In addition, proposing a kind of computer readable storage medium according to the one aspect of the application, being stored thereon with computer Program instruction realizes the method for any one the certification set-top box legitimacy being mentioned above when the instruction is executed by processor Step.
Such computer readable storage medium can need to read certification by executing program thereon from cookies Information realizes certification of the client to set-top box legitimacy.
Detailed description of the invention
The drawings described herein are used to provide a further understanding of the present application, constitutes part of this application, this Shen Illustrative embodiments and their description please are not constituted an undue limitation on the present application for explaining the application.In the accompanying drawings:
Fig. 1 is the schematic diagram of one embodiment of the system of the certification set-top box legitimacy of the application.
Fig. 2 is the schematic diagram of another embodiment of the system of the certification set-top box legitimacy of the application.
Fig. 3 is the flow chart of one embodiment of the method for the certification set-top box legitimacy of the application.
Fig. 4 is the flow chart of another embodiment of the method for the certification set-top box legitimacy of the application.
Fig. 5 is the schematic diagram of one embodiment of the applications client of the application.
Fig. 6 is the schematic diagram of another embodiment of the applications client of the application.
Fig. 7 is the schematic diagram of another embodiment of the system of the certification set-top box legitimacy of the application.
Specific embodiment
Below by drawings and examples, the technical solution of the application is described in further detail.
The structural schematic diagram that the application authenticates one embodiment of the system of set-top box legitimacy is as shown in Figure 1.Certification machine The system of top box legitimacy includes memory 110 and processor 120.Wherein: memory 110 can be disk, flash memory or other Any non-volatile memory medium.Memory is used to store in the corresponding embodiment of method for hereinafter authenticating set-top box legitimacy Instruction.Processor 120 is coupled to memory 110, can be used as one or more integrated circuits to implement, such as microprocessor Or microcontroller.The processor 120 can be realized client to set-top box legitimacy for executing the instruction stored in memory Certification.
It in one embodiment, can be as shown in Fig. 2, the system 200 of certification set-top box legitimacy includes memory 210 With processor 220.Processor 220 is coupled to memory 210 by BUS bus 230.The system of the certification set-top box legitimacy 200 can also be connected to external memory 250 by memory interface 240 to call external data, can also pass through network Interface 260 is connected to network or an other computer system (not shown).It no longer describes in detail herein.
In this embodiment, it is instructed by memory stores data, then above-metioned instruction is handled by processor, can be realized Certification of the client to set-top box legitimacy.
In another embodiment, a kind of computer readable storage medium, is stored thereon with computer program instructions, this refers to The step of enabling the method in the method corresponding embodiment for realizing certification set-top box legitimacy when being executed by processor.In the art Technical staff is it should be appreciated that embodiments herein can provide as method, apparatus or computer program product.Therefore, the application can Using the form of complete hardware embodiment, complete software embodiment or embodiment combining software and hardware aspects.Moreover, this Application, which can be used to be stored with non-transient in the computer that one or more wherein includes computer usable program code, to be situated between The form for the computer program product implemented in matter (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.).
The flow chart of one embodiment of the method for the certification set-top box legitimacy of the application is as shown in Figure 3.
In step 301, specific identity request is sent to EPG server positioned at the client of set-top box.Client can be with It is the client for the various application programs installed in set-top box, is mentioned when determining that set-top box is legal set-top box to user For service.It in one embodiment, may include set-top box identification in specific identity request, or including source address information, So that EPG server identifies set-top box.
In step 302, industry after client obtains specific identity from EPG server, by specific identity through client Business system background is forwarded to EPG server verifying, and EPG server can send to authenticate when authenticating successfully to operation system successfully to be believed The operation system backstage of breath, client generates legal identification information, and is sent to client.In one embodiment, dedicated mark Know and can be the identification information generation that EPG server logs in the session information and/or set-top box that generate after set-top box according to user, The operation that EPG server is carried out can be but not limited to MD5, and (Message-Digest Algorithm 5, information-abstract are calculated Method 5), the hash algorithms such as SHA (Secure Hash Algorithm, Secure Hash Algorithm).In one embodiment, business system System backstage can be the server of the corresponding operation system of the client.
In step 303, client receives legal identification information, and can provide services to the user.
By such method, after client can obtain specific identity request and informing business system from EPG server Platform, operation system backstage can provide legal identification information in the case where EPG server authenticates successful situation for set-top box, thus nothing Authentication information need to be read from cookie, realize certification of the client to set-top box legitimacy.
The flow chart of another embodiment of the method for the certification set-top box legitimacy of the application is as shown in Figure 4.
In step 401, the EPG authentication information in the client request cookie of set-top box.EPG authentication information can To be but not limited to the token Token that EPG server is issued, session identification sessionID etc..Client can be requested by JS EPG authentication information in cookie.In step 402, judge whether to obtain EPG authentication information.If successfully obtaining EPG to recognize Information is demonstrate,proved, thens follow the steps 407;EPG authentication information is obtained if failing, thens follow the steps 403.
In step 403, client sends specific identity request to EPG server.
In step 404, industry after client obtains specific identity from EPG server, by specific identity through client Business system background is forwarded to EPG server verifying, and EPG server can send to authenticate when authenticating successfully to operation system successfully to be believed The operation system backstage of breath, client generates legal identification information, and is sent to client.
In step 405, judge whether to receive the legal identification information from operation system backstage.If not receiving legal mark Know information, thens follow the steps 406;If receiving legal identification information, 407 are thened follow the steps.
In a step 406, client refusal provides services to the user.
In step 407, client provides services to the user.
By such method, client can first attempt to obtain EPG authentication information from cookie, only cannot be from It just sends and requests to EPG server when obtaining EPG authentication information in cookie, to improve authentication efficiency;It can be compatible with existing Some part set-top boxes, are conducive to promote and apply.
In one embodiment, when user passes through EPG page access client, client is first inquired with the presence or absence of legal Identification information, if existing legal mark, client provide services to the user, without verifying again, to improve client Efficiency of service, also reduce EPG server burden.
In one embodiment, the legal identification information obtained from business system background has certain validity period, at this Client can be provided services to the user without carrying out inquiry again in validity period;After legal identification information is expired, need It is inquired again.When user selects client to provide service, client is first inquired with the presence or absence of legal identification information, and Whether legal identification information is effective, if it exists legal identification information and within term of validity, then provides services to the user, no longer need to Secondary verifying, otherwise, client send specific identity request to EPG server.By such method, in the clothes for improving client While efficiency of being engaged in, safety is also ensured.
The schematic diagram of one embodiment of the applications client in the set-top box of the application is as shown in Figure 5.Request sends mould Block 501 can send specific identity request to EPG server.Forward authentication module 502 can be by specific identity through client Operation system backstage is forwarded to EPG server verifying, and EPG server can send to operation system when authenticating successfully and authenticate successfully The operation system backstage of information, client generates legal identification information, and is sent to client.In one embodiment, dedicated It is raw according to the identification information for generating session information and/or set-top box after user logs in set-top box that mark can be EPG server At.Legal mark receiving module 503 can receive legal identification information, and client can be received in legal mark receiving module 503 Service is provided to legal identification information rear line.
Such applications client can obtain specific identity request and informing business system background, industry from EPG server Business system background can provide legal identification information in the case where EPG server authenticates successful situation for set-top box, without from Authentication information is read in cookies, realizes certification of the operation system to set-top box legitimacy.
The schematic diagram of another embodiment of the applications client of the application is as shown in Figure 6.Request sending module 601 turns The structure and function for sending out authentication module 602 and legal mark receiving module 603 is similar to the embodiment of Fig. 5.Applications client It further include authentication information request module 604.Authentication information request module 604 requests the EPG authentication information in cookie by JS, If obtaining EPG authentication information, applications client provides service;If failing to obtain EPG authentication information, request is activated to send Module 601 sends specific identity request to EPG server.
Such applications client can first attempt from cookie obtain EPG authentication information, only from cookie not It just sends and requests to EPG server when EPG authentication information can be obtained, to improve authentication efficiency.
It in one embodiment, can as shown in fig. 6, applications client can also include legal mark judgment module 605 First inquiring whether there is legal identification information in set-top box, if existing legal mark, applications client provide a user clothes Business, to improve the efficiency of service of client, also reduces the burden of EPG server without verifying again.
In one embodiment, the legal identification information obtained from business system background has certain validity period, at this Client can be provided services to the user without carrying out inquiry again in validity period;After legal identification information is expired, need It is inquired again.When user selects client to provide service, legal mark judgment module 605 is first inquired with the presence or absence of legal Whether identification information and legal identification information are effective, if it exists legal identification information and within term of validity, then mention to user For service, without verifying again, otherwise client sends specific identity request to EPG server.By such method, it is mentioning While the efficiency of service of high client, safety is also ensured.
The schematic diagram of another embodiment of the system of the certification set-top box legitimacy of the application is as shown in Figure 7.Set-top box Various applications clients 702 are installed in 71.Applications client 702 can execute any one the certification machine top being mentioned above The method of box legitimacy;Operation system backstage 703 can be in communication with each other with EPG server, be come from by EPG server confirmation In the case that the specific identity of client is legal, legal identification information is provided to client.The process of Signalling exchange may include:
In 711, applications client 701 sends specific identity request to EPG server 702, and EPG server 702 is to answering Specific identity is returned with client 701.Specific identity can generate for EPG server 702 according to after user logs in set-top box Session information and/or set-top box identification information generate.
In 712, which is sent to the operation system backstage 703 of client by applications client 701.
In 713, operation system backstage 703 sends the specific identity to EPG server 702.If EPG server 702 is recognized Card passes through, then feeds back authentication pass information to operation system backstage 703.
In 714, after operation system backstage 703 receives authentication pass information, legal identification information is generated, and be sent to and answer Use client.
In the system of such certification set-top box legitimacy, client can obtain specific identity request from EPG server And informing business system background, operation system backstage can provide conjunction in the case where EPG server authenticates successful situation for set-top box Method identification information realizes certification of the operation system to set-top box legitimacy without reading authentication information from cookie.
The application is reference according to the method for the embodiment of the present application, the flow chart of equipment (system) and computer program product And/or block diagram describes.It should be understood that each process in flowchart and/or the block diagram can be realized by computer program instructions And/or the combination of the process and/or box in box and flowchart and/or the block diagram.It can provide these computer programs to refer to Enable the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to generate One machine so that by the instruction that the processor of computer or other programmable data processing devices executes generate for realizing The device for the function of being specified in one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates, Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one The step of function of being specified in a box or multiple boxes.
So far, the application is described in detail.In order to avoid covering the design of the application, it is public that this field institute is not described The some details known.Those skilled in the art as described above, completely it can be appreciated how implementing technology disclosed herein Scheme.
The present processes and device may be achieved in many ways.For example, can by software, hardware, firmware or Person's software, hardware, firmware any combination realize the present processes and device.The step of for the method it is above-mentioned Sequence is merely to be illustrated, and the step of the present processes is not limited to sequence described in detail above, unless with other sides Formula illustrates.In addition, in some embodiments, the application can be also embodied as recording program in the recording medium, these Program includes for realizing according to the machine readable instructions of the present processes.Thus, the application also covers storage for executing According to the recording medium of the program of the present processes.
Finally it should be noted that: above embodiments are only to illustrate the technical solution of the application rather than its limitations;To the greatest extent Pipe is described in detail the application referring to preferred embodiment, it should be understood by those ordinary skilled in the art that: still It can modify to the specific embodiment of the application or some technical features can be equivalently replaced;Without departing from this Shen Please technical solution spirit, should all cover in the claimed technical proposal scope of the application.

Claims (14)

1. a kind of method for authenticating set-top box legitimacy, comprising:
Client positioned at set-top box sends specific identity request to electronic program guide (EPG) server;
Obtain the specific identity from the EPG server;
The specific identity is forwarded to the EPG server through the operation system backstage of the client to verify, wherein described The operation system backstage of client sends legal mark to the client according to the successful authentication result from the EPG server Know information;
The client is provided services to the user according to the legal identification information from the operation system backstage.
2. according to the method described in claim 1, further include:
The client request is stored in the EPG authentication information in the data cookie on user local terminal;
If the EPG authentication information can be obtained, the client allows to provide services to the user;
If the EPG authentication information can not be obtained, executes to the EPG server and send specific identity request.
3. according to the method described in claim 1, further include:
The client judges the set-top box with the presence or absence of the legal mark;
If the legal mark is not present in the set-top box, executes to the EPG server and send specific identity request.
4. according to the method described in claim 1, wherein, further includes:
If the set-top box, there are the legal mark, the client judges described legal identify whether before the deadline;
If the legal mark is before the deadline, the client allows to provide services to the user;
If the legal mark before the deadline, does not execute to the EPG server and sends specific identity request.
5. according to the method described in claim 1, wherein,
The specific identity is that the EPG server logs in the session information and/or the machine generated after set-top box according to user The identification information of top box generates.
6. a kind of applications client, comprising:
Request sending module, for sending specific identity request to electronic program guide (EPG) server;
Specific identity obtains module, for obtaining the specific identity from the EPG server;
Authentication module is forwarded, is taken for the specific identity to be forwarded to the EPG through the operation system backstage of the client It is engaged in device verifying, wherein the operation system backstage of the client is according to the successful authentication result from the EPG server to institute It states client and legal mark is provided;
Legal mark receiving module, for receiving the legal identification information from the operation system backstage, so as to according to Legal identification information provides services to the user.
7. client according to claim 6, further includes:
Authentication information request module, for requesting the EPG authentication information in the data cookie being stored on user local terminal;
If the EPG authentication information can be obtained, the client allows to provide service to the set-top box;
If the EPG authentication information can not be obtained, the request sending module is activated.
8. client according to claim 6, further includes:
Legal mark judgment module, for judging the set-top box with the presence or absence of the legal mark;
If the legal mark is not present in the set-top box, the request sending module is activated.
9. client according to claim 6, wherein the legal mark judgment module is also used to when the determining set-top box There are when the legal mark, judge described legal identify whether before the deadline;
If the legal mark is before the deadline, the client allows to provide service to the set-top box;
If the legal mark before the deadline, does not activate the request sending module.
10. client according to claim 6, wherein
The specific identity is that the EPG server logs in the session information and/or the machine generated after set-top box according to user The identification information of top box generates.
11. a kind of system for authenticating set-top box legitimacy, comprising:
Applications client requires method described in 1~5 any one for perform claim;
Electronic program guide (EPG) server, for being requested according to the specific identity of the applications client to the application client End feedback specific identity, and the specific identity information on the operation system backstage from client is verified;
The operation system backstage, for receiving the specific identity from the applications client and issuing the EPG clothes Be engaged in device verifying, according to from the EPG server be verified result generate it is legal mark and be handed down to the application client End.
12. system according to claim 11, wherein
The EPG server is also used to according to the mark for generating session information and/or the set-top box after user logs in set-top box Know information and generates the specific identity.
13. a kind of system for authenticating set-top box legitimacy, comprising:
Memory;And
It is coupled to the processor of the memory, the processor is configured to based on the instruction execution for being stored in the memory Such as method described in any one of claim 1 to 5.
14. a kind of computer readable storage medium, is stored thereon with computer program instructions, real when which is executed by processor The step of method described in existing claim 1 to 5 any one.
CN201710520764.7A 2017-06-30 2017-06-30 Method, system and application client for authenticating validity of set top box Active CN109218256B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710520764.7A CN109218256B (en) 2017-06-30 2017-06-30 Method, system and application client for authenticating validity of set top box

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710520764.7A CN109218256B (en) 2017-06-30 2017-06-30 Method, system and application client for authenticating validity of set top box

Publications (2)

Publication Number Publication Date
CN109218256A true CN109218256A (en) 2019-01-15
CN109218256B CN109218256B (en) 2021-05-07

Family

ID=64976819

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710520764.7A Active CN109218256B (en) 2017-06-30 2017-06-30 Method, system and application client for authenticating validity of set top box

Country Status (1)

Country Link
CN (1) CN109218256B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101945102A (en) * 2010-07-26 2011-01-12 中兴通讯股份有限公司 Method, server and system for authenticating IPTV (intelligent personal television) user validation based on IMS (IP Multimedia Subsystem)
US8108680B2 (en) * 2007-07-23 2012-01-31 Murray Mark R Preventing unauthorized poaching of set top box assets
CN102546648A (en) * 2012-01-18 2012-07-04 Ut斯达康通讯有限公司 Resource access authorization method
CN102710595A (en) * 2012-04-11 2012-10-03 佳都新太科技股份有限公司 Method for requesting authentication for digital television user service in three-network integration
WO2014107311A1 (en) * 2013-01-07 2014-07-10 Gracenote, Inc. Authorizing devices based on identifying content distributor
CN105939488A (en) * 2016-06-14 2016-09-14 天脉聚源(北京)传媒科技有限公司 Method and system for obtaining product

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8108680B2 (en) * 2007-07-23 2012-01-31 Murray Mark R Preventing unauthorized poaching of set top box assets
CN101945102A (en) * 2010-07-26 2011-01-12 中兴通讯股份有限公司 Method, server and system for authenticating IPTV (intelligent personal television) user validation based on IMS (IP Multimedia Subsystem)
CN102546648A (en) * 2012-01-18 2012-07-04 Ut斯达康通讯有限公司 Resource access authorization method
CN102710595A (en) * 2012-04-11 2012-10-03 佳都新太科技股份有限公司 Method for requesting authentication for digital television user service in three-network integration
WO2014107311A1 (en) * 2013-01-07 2014-07-10 Gracenote, Inc. Authorizing devices based on identifying content distributor
CN105939488A (en) * 2016-06-14 2016-09-14 天脉聚源(北京)传媒科技有限公司 Method and system for obtaining product

Also Published As

Publication number Publication date
CN109218256B (en) 2021-05-07

Similar Documents

Publication Publication Date Title
US11003749B2 (en) Risk analysis apparatus and method for risk based authentication
KR101842868B1 (en) Method, apparatus, and system for providing a security check
EP3488590B1 (en) Securing ordered resource access
US9055313B2 (en) Device activation using encoded representation
US10630574B2 (en) Link processing method, apparatus, and system
TW201822072A (en) Two-dimensional code processing method, device and system
US9686344B2 (en) Method for implementing cross-domain jump, browser, and domain name server
US20180302221A1 (en) Barcode security authentication method
KR102015955B1 (en) Method for authenticating client
US11336449B2 (en) Information processing apparatus, computer program product, and resource providing method
CN109672675B (en) OAuth 2.0-based WEB authentication method of password service middleware
CN111030812A (en) Token verification method, device, storage medium and server
CN103139200A (en) Single sign-on method of web service
CN104753892B (en) Network resource transmission method, device and system
JP2006252418A (en) Single sign-on cooperation method using authentication information, system thereof, mediation server, operation method, and operation program
RU2013157400A (en) METHOD AND DEVICE FOR AUTHENTICATION OF HYBRID TERMINAL USERS
CN109995699B (en) Multimedia equipment management system
WO2017206524A1 (en) Electronic device control method, terminal and control system
CN106101134A (en) User's multiple domain is under one's name across the method for station roaming checking logging status
CN102624687A (en) Networking program user authentication method based on mobile terminal
CN106998332B (en) Secure login method and device, storage medium and computer equipment
US10628574B2 (en) Non-transitory computer-readable recording medium, communication management method, and communication management device
CN108111486B (en) Method and device for avoiding repeated login
CN101360107A (en) Method, system and apparatus enhancing security of single system login
KR20130077682A (en) Recording medium, method and system for log-in confirmation use of smart phone

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant