CN109218256A - Authenticate method, system and the applications client of set-top box legitimacy - Google Patents
Authenticate method, system and the applications client of set-top box legitimacy Download PDFInfo
- Publication number
- CN109218256A CN109218256A CN201710520764.7A CN201710520764A CN109218256A CN 109218256 A CN109218256 A CN 109218256A CN 201710520764 A CN201710520764 A CN 201710520764A CN 109218256 A CN109218256 A CN 109218256A
- Authority
- CN
- China
- Prior art keywords
- client
- top box
- epg
- specific identity
- legal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
Abstract
The application proposes a kind of method, system and applications client for authenticating set-top box legitimacy, is related to Smart Home technical field.Wherein, a kind of method of certification set-top box legitimacy of the application include: positioned at set-top box client to electronic program guide (EPG) server send specific identity request;Obtain the specific identity from EPG server;Specific identity is forwarded to EPG server verifying through the operation system backstage of client, wherein the operation system backstage of client sends legal identification information to client according to the successful authentication result from EPG server;Client is provided services to the user according to the legal identification information from operation system backstage.By such method, operation system realizes certification of the operation system to set-top box legitimacy without reading authentication information from the data being stored on user local terminal.
Description
Technical field
This application involves Smart Home technical field, especially a kind of method for authenticating set-top box legitimacy, system and answer
Use client.
Background technique
As internet television is grown rapidly, more and more new products and new business enter IPTV set top box;These are produced
Product and business face universal authentication question: how to authenticate the legitimacy of IPTV set top box, determine request data from legal machine top
Does box issue?
In the prior art, the client in set-top box can pass through JS (JavaScript, a kind of literal translation formula scripting language)
Obtain EPG (Electronic Program Guide, the electronics section in cookie (being stored in the data on user local terminal)
Mesh guide) authentication information (such as Token), in the side that service server backstage uses EPG authentication information to authenticate to EPG server
Method meets the certification demand of most of set-top box;But the requirement with set-top box to safety is higher and higher, part browser
Start that HTTP-Only attribute, this attribute is supported to will limit JS script and obtain browser cookie, leads to not acquisition EPG and recognize
Demonstrate,prove information.
Summary of the invention
One of the application is designed to provide a kind of method that operation system authenticates set-top box legitimacy.
According to the one aspect of the application, a kind of method for authenticating set-top box legitimacy is proposed, comprising: positioned at set-top box
Client sends specific identity request to EPG server;Obtain the specific identity from EPG server;By specific identity through visitor
The operation system backstage at family end is forwarded to EPG server verifying, wherein the operation system backstage of client takes according to from EPG
The successful authentication result of business device sends legal identification information to client;Client is according to the legal mark from operation system backstage
Know information to provide services to the user.
Optionally, further includes: the EPG authentication information in client request cookie;If EPG authentication information can be obtained,
Then client allows to provide services to the user;If EPG authentication information can not be obtained, executes to EPG server and send dedicated mark
Know request.
Optionally, further includes: client judges set-top box with the presence or absence of legal mark;If legal mark is not present in set-top box
Know, then executes to EPG server and send specific identity request.
Optionally, further includes: if set-top box, there are legal mark, client judges legal identify whether in validity period
It is interior;It identifies if legal before the deadline, then client allows to provide services to the user;It identifies if legal not before the deadline, then
It executes to EPG server and sends specific identity request.
Optionally, specific identity is EPG server according to the session information and/or machine top generated after user's login set-top box
The identification information of box generates.
By such method, after client can obtain specific identity request and informing business system from EPG server
Platform, operation system backstage can provide legal identification information in the case where EPG server authenticates successful situation for set-top box, thus nothing
Authentication information need to be read from cookie, realize certification of the client to set-top box legitimacy.
According to further aspect of the application, a kind of applications client is proposed, comprising: request sending module is used for EPG
Server sends specific identity request;Specific identity obtains module, for obtaining the specific identity from EPG server;Forwarding
Authentication module, for specific identity to be forwarded to EPG server verifying through the operation system backstage of client, wherein client
Operation system backstage provide legal mark to client according to the successful authentication result from EPG server;Legal mark connects
Module is received, for receiving the legal identification information from operation system backstage, to provide a user according to legal identification information
Service.
Optionally, further includes: authentication information request module, for requesting the EPG authentication information in cookie;If can obtain
EPG authentication information is taken, then client allows to provide services to the user;If EPG authentication information can not be obtained, request is activated to send
Module.
Optionally, further includes: legal mark judgment module, for judging set-top box with the presence or absence of legal mark;If machine top
Legal mark is not present in box, then activates request sending module.
Optionally, legal mark judgment module is also used to when determining that set-top box there are when legal mark, judges legal mark
Whether before the deadline;It identifies if legal before the deadline, then client allows to provide services to the user;It identifies and does not exist if legal
In validity period, then request sending module is activated.
Optionally, specific identity is EPG server according to the session information and/or machine top generated after user's login set-top box
The identification information of box generates.
Such applications client can from EPG server obtain specific identity request and informing business system background so as to
There is provided legal identification information in the case where EPG server authenticates successful situation in operation system backstage for set-top box, without from
Authentication information is read in cookie, realizes certification of the client to set-top box legitimacy.
According to the another aspect of the application, a kind of system for authenticating set-top box legitimacy is proposed, comprising: application client
End, the method for executing any one the certification set-top box legitimacy being mentioned above;EPG server, for according to application
The specific identity of client requests to feed back specific identity to applications client, and to the special of the operation system backstage from client
It is verified with identification information;Operation system backstage, for receiving the specific identity from applications client and issuing EPG service
Device verifying, according to from EPG server be verified result generate it is legal mark and be handed down to applications client.
Optionally, EPG server is also used to log in the session information and/or set-top box generated after set-top box according to user
Identification information generates specific identity.
In the system of such certification set-top box legitimacy, client can obtain specific identity request from EPG server
And informing business system background, operation system backstage can provide conjunction in the case where EPG server authenticates successful situation for set-top box
Method identification information realizes certification of the client to set-top box legitimacy without reading authentication information from cookie.
According to another aspect of the application, a kind of system for authenticating set-top box legitimacy is proposed, comprising: memory;With
And it is coupled to the processor of memory, what processor was configured as being mentioned above based on the instruction execution for being stored in memory appoints
A kind of method for certification set-top box legitimacy of anticipating.
The system of such certification set-top box legitimacy can realize client without reading authentication information from cookie
Hold the certification to set-top box legitimacy.
In addition, proposing a kind of computer readable storage medium according to the one aspect of the application, being stored thereon with computer
Program instruction realizes the method for any one the certification set-top box legitimacy being mentioned above when the instruction is executed by processor
Step.
Such computer readable storage medium can need to read certification by executing program thereon from cookies
Information realizes certification of the client to set-top box legitimacy.
Detailed description of the invention
The drawings described herein are used to provide a further understanding of the present application, constitutes part of this application, this Shen
Illustrative embodiments and their description please are not constituted an undue limitation on the present application for explaining the application.In the accompanying drawings:
Fig. 1 is the schematic diagram of one embodiment of the system of the certification set-top box legitimacy of the application.
Fig. 2 is the schematic diagram of another embodiment of the system of the certification set-top box legitimacy of the application.
Fig. 3 is the flow chart of one embodiment of the method for the certification set-top box legitimacy of the application.
Fig. 4 is the flow chart of another embodiment of the method for the certification set-top box legitimacy of the application.
Fig. 5 is the schematic diagram of one embodiment of the applications client of the application.
Fig. 6 is the schematic diagram of another embodiment of the applications client of the application.
Fig. 7 is the schematic diagram of another embodiment of the system of the certification set-top box legitimacy of the application.
Specific embodiment
Below by drawings and examples, the technical solution of the application is described in further detail.
The structural schematic diagram that the application authenticates one embodiment of the system of set-top box legitimacy is as shown in Figure 1.Certification machine
The system of top box legitimacy includes memory 110 and processor 120.Wherein: memory 110 can be disk, flash memory or other
Any non-volatile memory medium.Memory is used to store in the corresponding embodiment of method for hereinafter authenticating set-top box legitimacy
Instruction.Processor 120 is coupled to memory 110, can be used as one or more integrated circuits to implement, such as microprocessor
Or microcontroller.The processor 120 can be realized client to set-top box legitimacy for executing the instruction stored in memory
Certification.
It in one embodiment, can be as shown in Fig. 2, the system 200 of certification set-top box legitimacy includes memory 210
With processor 220.Processor 220 is coupled to memory 210 by BUS bus 230.The system of the certification set-top box legitimacy
200 can also be connected to external memory 250 by memory interface 240 to call external data, can also pass through network
Interface 260 is connected to network or an other computer system (not shown).It no longer describes in detail herein.
In this embodiment, it is instructed by memory stores data, then above-metioned instruction is handled by processor, can be realized
Certification of the client to set-top box legitimacy.
In another embodiment, a kind of computer readable storage medium, is stored thereon with computer program instructions, this refers to
The step of enabling the method in the method corresponding embodiment for realizing certification set-top box legitimacy when being executed by processor.In the art
Technical staff is it should be appreciated that embodiments herein can provide as method, apparatus or computer program product.Therefore, the application can
Using the form of complete hardware embodiment, complete software embodiment or embodiment combining software and hardware aspects.Moreover, this
Application, which can be used to be stored with non-transient in the computer that one or more wherein includes computer usable program code, to be situated between
The form for the computer program product implemented in matter (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.).
The flow chart of one embodiment of the method for the certification set-top box legitimacy of the application is as shown in Figure 3.
In step 301, specific identity request is sent to EPG server positioned at the client of set-top box.Client can be with
It is the client for the various application programs installed in set-top box, is mentioned when determining that set-top box is legal set-top box to user
For service.It in one embodiment, may include set-top box identification in specific identity request, or including source address information,
So that EPG server identifies set-top box.
In step 302, industry after client obtains specific identity from EPG server, by specific identity through client
Business system background is forwarded to EPG server verifying, and EPG server can send to authenticate when authenticating successfully to operation system successfully to be believed
The operation system backstage of breath, client generates legal identification information, and is sent to client.In one embodiment, dedicated mark
Know and can be the identification information generation that EPG server logs in the session information and/or set-top box that generate after set-top box according to user,
The operation that EPG server is carried out can be but not limited to MD5, and (Message-Digest Algorithm 5, information-abstract are calculated
Method 5), the hash algorithms such as SHA (Secure Hash Algorithm, Secure Hash Algorithm).In one embodiment, business system
System backstage can be the server of the corresponding operation system of the client.
In step 303, client receives legal identification information, and can provide services to the user.
By such method, after client can obtain specific identity request and informing business system from EPG server
Platform, operation system backstage can provide legal identification information in the case where EPG server authenticates successful situation for set-top box, thus nothing
Authentication information need to be read from cookie, realize certification of the client to set-top box legitimacy.
The flow chart of another embodiment of the method for the certification set-top box legitimacy of the application is as shown in Figure 4.
In step 401, the EPG authentication information in the client request cookie of set-top box.EPG authentication information can
To be but not limited to the token Token that EPG server is issued, session identification sessionID etc..Client can be requested by JS
EPG authentication information in cookie.In step 402, judge whether to obtain EPG authentication information.If successfully obtaining EPG to recognize
Information is demonstrate,proved, thens follow the steps 407;EPG authentication information is obtained if failing, thens follow the steps 403.
In step 403, client sends specific identity request to EPG server.
In step 404, industry after client obtains specific identity from EPG server, by specific identity through client
Business system background is forwarded to EPG server verifying, and EPG server can send to authenticate when authenticating successfully to operation system successfully to be believed
The operation system backstage of breath, client generates legal identification information, and is sent to client.
In step 405, judge whether to receive the legal identification information from operation system backstage.If not receiving legal mark
Know information, thens follow the steps 406;If receiving legal identification information, 407 are thened follow the steps.
In a step 406, client refusal provides services to the user.
In step 407, client provides services to the user.
By such method, client can first attempt to obtain EPG authentication information from cookie, only cannot be from
It just sends and requests to EPG server when obtaining EPG authentication information in cookie, to improve authentication efficiency;It can be compatible with existing
Some part set-top boxes, are conducive to promote and apply.
In one embodiment, when user passes through EPG page access client, client is first inquired with the presence or absence of legal
Identification information, if existing legal mark, client provide services to the user, without verifying again, to improve client
Efficiency of service, also reduce EPG server burden.
In one embodiment, the legal identification information obtained from business system background has certain validity period, at this
Client can be provided services to the user without carrying out inquiry again in validity period;After legal identification information is expired, need
It is inquired again.When user selects client to provide service, client is first inquired with the presence or absence of legal identification information, and
Whether legal identification information is effective, if it exists legal identification information and within term of validity, then provides services to the user, no longer need to
Secondary verifying, otherwise, client send specific identity request to EPG server.By such method, in the clothes for improving client
While efficiency of being engaged in, safety is also ensured.
The schematic diagram of one embodiment of the applications client in the set-top box of the application is as shown in Figure 5.Request sends mould
Block 501 can send specific identity request to EPG server.Forward authentication module 502 can be by specific identity through client
Operation system backstage is forwarded to EPG server verifying, and EPG server can send to operation system when authenticating successfully and authenticate successfully
The operation system backstage of information, client generates legal identification information, and is sent to client.In one embodiment, dedicated
It is raw according to the identification information for generating session information and/or set-top box after user logs in set-top box that mark can be EPG server
At.Legal mark receiving module 503 can receive legal identification information, and client can be received in legal mark receiving module 503
Service is provided to legal identification information rear line.
Such applications client can obtain specific identity request and informing business system background, industry from EPG server
Business system background can provide legal identification information in the case where EPG server authenticates successful situation for set-top box, without from
Authentication information is read in cookies, realizes certification of the operation system to set-top box legitimacy.
The schematic diagram of another embodiment of the applications client of the application is as shown in Figure 6.Request sending module 601 turns
The structure and function for sending out authentication module 602 and legal mark receiving module 603 is similar to the embodiment of Fig. 5.Applications client
It further include authentication information request module 604.Authentication information request module 604 requests the EPG authentication information in cookie by JS,
If obtaining EPG authentication information, applications client provides service;If failing to obtain EPG authentication information, request is activated to send
Module 601 sends specific identity request to EPG server.
Such applications client can first attempt from cookie obtain EPG authentication information, only from cookie not
It just sends and requests to EPG server when EPG authentication information can be obtained, to improve authentication efficiency.
It in one embodiment, can as shown in fig. 6, applications client can also include legal mark judgment module 605
First inquiring whether there is legal identification information in set-top box, if existing legal mark, applications client provide a user clothes
Business, to improve the efficiency of service of client, also reduces the burden of EPG server without verifying again.
In one embodiment, the legal identification information obtained from business system background has certain validity period, at this
Client can be provided services to the user without carrying out inquiry again in validity period;After legal identification information is expired, need
It is inquired again.When user selects client to provide service, legal mark judgment module 605 is first inquired with the presence or absence of legal
Whether identification information and legal identification information are effective, if it exists legal identification information and within term of validity, then mention to user
For service, without verifying again, otherwise client sends specific identity request to EPG server.By such method, it is mentioning
While the efficiency of service of high client, safety is also ensured.
The schematic diagram of another embodiment of the system of the certification set-top box legitimacy of the application is as shown in Figure 7.Set-top box
Various applications clients 702 are installed in 71.Applications client 702 can execute any one the certification machine top being mentioned above
The method of box legitimacy;Operation system backstage 703 can be in communication with each other with EPG server, be come from by EPG server confirmation
In the case that the specific identity of client is legal, legal identification information is provided to client.The process of Signalling exchange may include:
In 711, applications client 701 sends specific identity request to EPG server 702, and EPG server 702 is to answering
Specific identity is returned with client 701.Specific identity can generate for EPG server 702 according to after user logs in set-top box
Session information and/or set-top box identification information generate.
In 712, which is sent to the operation system backstage 703 of client by applications client 701.
In 713, operation system backstage 703 sends the specific identity to EPG server 702.If EPG server 702 is recognized
Card passes through, then feeds back authentication pass information to operation system backstage 703.
In 714, after operation system backstage 703 receives authentication pass information, legal identification information is generated, and be sent to and answer
Use client.
In the system of such certification set-top box legitimacy, client can obtain specific identity request from EPG server
And informing business system background, operation system backstage can provide conjunction in the case where EPG server authenticates successful situation for set-top box
Method identification information realizes certification of the operation system to set-top box legitimacy without reading authentication information from cookie.
The application is reference according to the method for the embodiment of the present application, the flow chart of equipment (system) and computer program product
And/or block diagram describes.It should be understood that each process in flowchart and/or the block diagram can be realized by computer program instructions
And/or the combination of the process and/or box in box and flowchart and/or the block diagram.It can provide these computer programs to refer to
Enable the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to generate
One machine so that by the instruction that the processor of computer or other programmable data processing devices executes generate for realizing
The device for the function of being specified in one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates,
Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or
The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting
Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or
The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one
The step of function of being specified in a box or multiple boxes.
So far, the application is described in detail.In order to avoid covering the design of the application, it is public that this field institute is not described
The some details known.Those skilled in the art as described above, completely it can be appreciated how implementing technology disclosed herein
Scheme.
The present processes and device may be achieved in many ways.For example, can by software, hardware, firmware or
Person's software, hardware, firmware any combination realize the present processes and device.The step of for the method it is above-mentioned
Sequence is merely to be illustrated, and the step of the present processes is not limited to sequence described in detail above, unless with other sides
Formula illustrates.In addition, in some embodiments, the application can be also embodied as recording program in the recording medium, these
Program includes for realizing according to the machine readable instructions of the present processes.Thus, the application also covers storage for executing
According to the recording medium of the program of the present processes.
Finally it should be noted that: above embodiments are only to illustrate the technical solution of the application rather than its limitations;To the greatest extent
Pipe is described in detail the application referring to preferred embodiment, it should be understood by those ordinary skilled in the art that: still
It can modify to the specific embodiment of the application or some technical features can be equivalently replaced;Without departing from this Shen
Please technical solution spirit, should all cover in the claimed technical proposal scope of the application.
Claims (14)
1. a kind of method for authenticating set-top box legitimacy, comprising:
Client positioned at set-top box sends specific identity request to electronic program guide (EPG) server;
Obtain the specific identity from the EPG server;
The specific identity is forwarded to the EPG server through the operation system backstage of the client to verify, wherein described
The operation system backstage of client sends legal mark to the client according to the successful authentication result from the EPG server
Know information;
The client is provided services to the user according to the legal identification information from the operation system backstage.
2. according to the method described in claim 1, further include:
The client request is stored in the EPG authentication information in the data cookie on user local terminal;
If the EPG authentication information can be obtained, the client allows to provide services to the user;
If the EPG authentication information can not be obtained, executes to the EPG server and send specific identity request.
3. according to the method described in claim 1, further include:
The client judges the set-top box with the presence or absence of the legal mark;
If the legal mark is not present in the set-top box, executes to the EPG server and send specific identity request.
4. according to the method described in claim 1, wherein, further includes:
If the set-top box, there are the legal mark, the client judges described legal identify whether before the deadline;
If the legal mark is before the deadline, the client allows to provide services to the user;
If the legal mark before the deadline, does not execute to the EPG server and sends specific identity request.
5. according to the method described in claim 1, wherein,
The specific identity is that the EPG server logs in the session information and/or the machine generated after set-top box according to user
The identification information of top box generates.
6. a kind of applications client, comprising:
Request sending module, for sending specific identity request to electronic program guide (EPG) server;
Specific identity obtains module, for obtaining the specific identity from the EPG server;
Authentication module is forwarded, is taken for the specific identity to be forwarded to the EPG through the operation system backstage of the client
It is engaged in device verifying, wherein the operation system backstage of the client is according to the successful authentication result from the EPG server to institute
It states client and legal mark is provided;
Legal mark receiving module, for receiving the legal identification information from the operation system backstage, so as to according to
Legal identification information provides services to the user.
7. client according to claim 6, further includes:
Authentication information request module, for requesting the EPG authentication information in the data cookie being stored on user local terminal;
If the EPG authentication information can be obtained, the client allows to provide service to the set-top box;
If the EPG authentication information can not be obtained, the request sending module is activated.
8. client according to claim 6, further includes:
Legal mark judgment module, for judging the set-top box with the presence or absence of the legal mark;
If the legal mark is not present in the set-top box, the request sending module is activated.
9. client according to claim 6, wherein the legal mark judgment module is also used to when the determining set-top box
There are when the legal mark, judge described legal identify whether before the deadline;
If the legal mark is before the deadline, the client allows to provide service to the set-top box;
If the legal mark before the deadline, does not activate the request sending module.
10. client according to claim 6, wherein
The specific identity is that the EPG server logs in the session information and/or the machine generated after set-top box according to user
The identification information of top box generates.
11. a kind of system for authenticating set-top box legitimacy, comprising:
Applications client requires method described in 1~5 any one for perform claim;
Electronic program guide (EPG) server, for being requested according to the specific identity of the applications client to the application client
End feedback specific identity, and the specific identity information on the operation system backstage from client is verified;
The operation system backstage, for receiving the specific identity from the applications client and issuing the EPG clothes
Be engaged in device verifying, according to from the EPG server be verified result generate it is legal mark and be handed down to the application client
End.
12. system according to claim 11, wherein
The EPG server is also used to according to the mark for generating session information and/or the set-top box after user logs in set-top box
Know information and generates the specific identity.
13. a kind of system for authenticating set-top box legitimacy, comprising:
Memory;And
It is coupled to the processor of the memory, the processor is configured to based on the instruction execution for being stored in the memory
Such as method described in any one of claim 1 to 5.
14. a kind of computer readable storage medium, is stored thereon with computer program instructions, real when which is executed by processor
The step of method described in existing claim 1 to 5 any one.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710520764.7A CN109218256B (en) | 2017-06-30 | 2017-06-30 | Method, system and application client for authenticating validity of set top box |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710520764.7A CN109218256B (en) | 2017-06-30 | 2017-06-30 | Method, system and application client for authenticating validity of set top box |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109218256A true CN109218256A (en) | 2019-01-15 |
CN109218256B CN109218256B (en) | 2021-05-07 |
Family
ID=64976819
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710520764.7A Active CN109218256B (en) | 2017-06-30 | 2017-06-30 | Method, system and application client for authenticating validity of set top box |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109218256B (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101945102A (en) * | 2010-07-26 | 2011-01-12 | 中兴通讯股份有限公司 | Method, server and system for authenticating IPTV (intelligent personal television) user validation based on IMS (IP Multimedia Subsystem) |
US8108680B2 (en) * | 2007-07-23 | 2012-01-31 | Murray Mark R | Preventing unauthorized poaching of set top box assets |
CN102546648A (en) * | 2012-01-18 | 2012-07-04 | Ut斯达康通讯有限公司 | Resource access authorization method |
CN102710595A (en) * | 2012-04-11 | 2012-10-03 | 佳都新太科技股份有限公司 | Method for requesting authentication for digital television user service in three-network integration |
WO2014107311A1 (en) * | 2013-01-07 | 2014-07-10 | Gracenote, Inc. | Authorizing devices based on identifying content distributor |
CN105939488A (en) * | 2016-06-14 | 2016-09-14 | 天脉聚源(北京)传媒科技有限公司 | Method and system for obtaining product |
-
2017
- 2017-06-30 CN CN201710520764.7A patent/CN109218256B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8108680B2 (en) * | 2007-07-23 | 2012-01-31 | Murray Mark R | Preventing unauthorized poaching of set top box assets |
CN101945102A (en) * | 2010-07-26 | 2011-01-12 | 中兴通讯股份有限公司 | Method, server and system for authenticating IPTV (intelligent personal television) user validation based on IMS (IP Multimedia Subsystem) |
CN102546648A (en) * | 2012-01-18 | 2012-07-04 | Ut斯达康通讯有限公司 | Resource access authorization method |
CN102710595A (en) * | 2012-04-11 | 2012-10-03 | 佳都新太科技股份有限公司 | Method for requesting authentication for digital television user service in three-network integration |
WO2014107311A1 (en) * | 2013-01-07 | 2014-07-10 | Gracenote, Inc. | Authorizing devices based on identifying content distributor |
CN105939488A (en) * | 2016-06-14 | 2016-09-14 | 天脉聚源(北京)传媒科技有限公司 | Method and system for obtaining product |
Also Published As
Publication number | Publication date |
---|---|
CN109218256B (en) | 2021-05-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11003749B2 (en) | Risk analysis apparatus and method for risk based authentication | |
KR101842868B1 (en) | Method, apparatus, and system for providing a security check | |
EP3488590B1 (en) | Securing ordered resource access | |
US9055313B2 (en) | Device activation using encoded representation | |
US10630574B2 (en) | Link processing method, apparatus, and system | |
TW201822072A (en) | Two-dimensional code processing method, device and system | |
US9686344B2 (en) | Method for implementing cross-domain jump, browser, and domain name server | |
US20180302221A1 (en) | Barcode security authentication method | |
KR102015955B1 (en) | Method for authenticating client | |
US11336449B2 (en) | Information processing apparatus, computer program product, and resource providing method | |
CN109672675B (en) | OAuth 2.0-based WEB authentication method of password service middleware | |
CN111030812A (en) | Token verification method, device, storage medium and server | |
CN103139200A (en) | Single sign-on method of web service | |
CN104753892B (en) | Network resource transmission method, device and system | |
JP2006252418A (en) | Single sign-on cooperation method using authentication information, system thereof, mediation server, operation method, and operation program | |
RU2013157400A (en) | METHOD AND DEVICE FOR AUTHENTICATION OF HYBRID TERMINAL USERS | |
CN109995699B (en) | Multimedia equipment management system | |
WO2017206524A1 (en) | Electronic device control method, terminal and control system | |
CN106101134A (en) | User's multiple domain is under one's name across the method for station roaming checking logging status | |
CN102624687A (en) | Networking program user authentication method based on mobile terminal | |
CN106998332B (en) | Secure login method and device, storage medium and computer equipment | |
US10628574B2 (en) | Non-transitory computer-readable recording medium, communication management method, and communication management device | |
CN108111486B (en) | Method and device for avoiding repeated login | |
CN101360107A (en) | Method, system and apparatus enhancing security of single system login | |
KR20130077682A (en) | Recording medium, method and system for log-in confirmation use of smart phone |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |