CN109618194A - A kind of authentication order method and its device based on program request platform end - Google Patents

A kind of authentication order method and its device based on program request platform end Download PDF

Info

Publication number
CN109618194A
CN109618194A CN201811503575.XA CN201811503575A CN109618194A CN 109618194 A CN109618194 A CN 109618194A CN 201811503575 A CN201811503575 A CN 201811503575A CN 109618194 A CN109618194 A CN 109618194A
Authority
CN
China
Prior art keywords
terminal
user
program request
platform end
signature
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811503575.XA
Other languages
Chinese (zh)
Other versions
CN109618194B (en
Inventor
王作冰
黄玉斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bell hekong (Shenzhen) Technology Co., Ltd
Original Assignee
Shenzhen Baer Creative Science And Education Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Baer Creative Science And Education Co Ltd filed Critical Shenzhen Baer Creative Science And Education Co Ltd
Priority to CN201811503575.XA priority Critical patent/CN109618194B/en
Publication of CN109618194A publication Critical patent/CN109618194A/en
Application granted granted Critical
Publication of CN109618194B publication Critical patent/CN109618194B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/258Client or end-user data management, e.g. managing client capabilities, user preferences or demographics, processing of multiple end-users preferences to derive collaborative data
    • H04N21/25866Management of end-user data
    • H04N21/25875Management of end-user data involving end-user authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/239Interfacing the upstream path of the transmission network, e.g. prioritizing client content requests
    • H04N21/2393Interfacing the upstream path of the transmission network, e.g. prioritizing client content requests involving handling client requests
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/266Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/47End-user applications
    • H04N21/472End-user interface for requesting content, additional data or services; End-user interface for interacting with content, e.g. for content reservation or setting reminders, for requesting event notification, for manipulating displayed content
    • H04N21/47202End-user interface for requesting content, additional data or services; End-user interface for interacting with content, e.g. for content reservation or setting reminders, for requesting event notification, for manipulating displayed content for requesting content on demand, e.g. video on demand

Landscapes

  • Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Graphics (AREA)
  • Human Computer Interaction (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

The present invention provides a kind of authentication order method and its device based on program request platform end.The described method includes: program request platform end receives resource on-demand request;According to the temporal cache session of request terminal record and user's signature;According to temporal cache session record and user's signature, terminal is authenticated;If target video stream corresponding with request is played out by the front end player of terminal by authentication.In the present invention, program request platform end had not both needed to confirm the identity of user, the associated account information of storage user is not needed yet, user's signature relevant to User ID need to only be cached, on the one hand it avoids in the case where user information sensitivity, user information is obtained by third parties such as platforms, collects and cause the problem of leaking, on the other hand it can greatly reduce the occupancy of the intrinsic storage resource system resource for program request platform end, to make program request platform end that can provide better data service experience for more terminals.

Description

A kind of authentication order method and its device based on program request platform end
Technical field
The present invention relates to video streaming on demand technical fields, more specifically to a kind of authentication based on program request platform end Order method and its device.
Background technique
It is video-see, video management and the general name of application based on the application of cloud computing business model that cloud point, which is broadcast,.For example, can To support HTTP, FTP etc. to link, there are many usage modes.
As various cloud order program services (publicly-owned cloud service) are more and more, mechanism can be convenient in the flat of oneself Third party's service abundant, such as short message verification code, intelligent robot customer service, picture identification, education live streaming classroom are integrated on platform Equal SaaS service.And user can obtain the data of third party's service by registration terminal.
Currently, existing mode has a feature, user mentions in terminal traffic system, the server-side (platform) of actual use The service of confession, user itself perceive less than but the personal information data of user for certification are maintained in service end system , that is, it is the use for log in each by the user information authenticated stored in server-side by service end system Family is authenticated, and the middle personal information data for not only authenticating user is caused to occupy a large amount of intrinsic storage resources of server-side, certification Process also occupies the system resource of server-side, to make server-side that can not provide better data service body for more terminals It tests.
Summary of the invention
In view of this, the present invention provides a kind of authentication order method based on program request platform end and its device is existing to solve The deficiency of technology.
To solve the above problems, the present invention provides a kind of authentication order method based on program request platform end, it is applied to terminal Between program request platform end characterized by comprising
After user logs in the terminal, program request platform end receives the resource points that the terminal is directed to target video stream Broadcast request;
The temporal cache session of program request platform end terminal according to the resource program request request is recorded, And obtain the user's signature of the user in on-demand assets corresponding with target video stream address to be signed;
Program request platform end according to the temporal cache session record and the user's signature, to the terminal into Row authentication;
If the terminal is by authentication, program request platform end will target video corresponding with the resource on-demand request Stream is played out by the front end player of the terminal.
It is preferably, described that " after user logs in the terminal, program request platform end receives the terminal and regards for target Before the resource on-demand request of frequency stream ", further includes:
The terminal receives the logging request of user;
After being verified to the user information in the logging request, the terminal is constructed according to the user information and is used Family signature;
The terminal obtains the program request platform end group in the on-demand assets address to be signed of the target video stream;
The on-demand assets address to be signed is written in the user's signature by the terminal;It generates one and is directed to the target video The resource on-demand request of stream, and the resource on-demand request is sent to program request platform end.
It is preferably, described that " after being verified to the user information in the logging request, the terminal is according to the use After family information architecture user's signature ", further includes:
Program request platform end generates the first public key and the first private key;Also, first public key is sent out to the terminal It send;Wherein, the terminal encrypts the user's signature by first public key after receiving first public key;
It is described that " the on-demand assets address to be signed is written in the user's signature by the terminal;It generates one and is directed to the mesh The resource on-demand request of video flowing is marked, and the resource on-demand request is sent to program request platform end " include:
The terminal will be written the on-demand assets by the user's signature after first public key encryption and wait signing ground Location generates a resource on-demand request for being directed to the target video stream, and by the resource on-demand request to the program request Platform end is sent;
" the temporal cache session of program request platform end terminal according to the resource program request request Record, and obtain the user's signature of the user in on-demand assets corresponding with target video stream address to be signed " it Afterwards, further includes:
Program request platform end is decrypted using the user's signature after first private key pair encryption;
If successful decryption, the user's signature after being decrypted, in order to be remembered according to the temporal cache session Record and the user's signature, authenticate the terminal.
Preferably, described " program request platform end is recorded according to the temporal cache session and the user's signature, The terminal is authenticated " include:
Program request platform end confirms whether the application duration of the user's signature meets preset time rule;
If the application duration of the user's signature meets the preset time rule, the current of the terminal is obtained Session, and confirm whether the current session is the current session corresponding with the user's signature;
If the current session is the current session corresponding with the user's signature, judge described current Whether session is consistent with temporal cache session record;
If the current session and temporal cache session record is consistent, determine that the terminal passes through mirror Power;
If the current session and temporal cache session records inconsistent, determine that the terminal does not pass through Authentication.
It is preferably, described that " program request platform end confirms whether the application duration of the user's signature meets preset time After rule ", further includes:
If the application duration of the user's signature does not meet the preset time rule, determine that the terminal does not pass through mirror Power;
It is described " if the application duration of the user's signature meets the preset time rule, to obtain working as the terminal Preceding session, and confirm the current session whether be the current session " corresponding with the user's signature it Afterwards, further includes:
The current session is not the current session corresponding with the user's signature, then the program request platform End updates the corresponding temporal cache session record of the terminal, and by temporal cache session record as current Session, also, after confirming that current session is consistent with the temporal cache session record, determine that the terminal is logical Cross authentication.
It is preferably, described that " target video stream corresponding with the resource on-demand request is passed through institute by program request platform end The front end player for stating terminal plays out " include:
The corresponding temporal cache session of the terminal is recorded to the terminal and is sent by program request platform end, And obtaining the terminal, the temporal cache session records second generated based on the received after through authentication Public key;
Program request platform end encrypts target video stream by second public key, also, by encrypted institute State the front end player transmission that target video flows to the terminal;Wherein, the terminal utilizes corresponding with second public key Second private key decrypts the encrypted target video stream, and by the front end player to the mesh after decryption Mark video flowing plays out.
Preferably, the user's signature includes user's id information, timestamp and login age information.
In addition, to solve the above problems, being wrapped the present invention also provides a kind of authentication on-demand device based on program request platform end It includes:
Receiving module, for after user's registration terminal, program request platform end to obtain the terminal for target video stream Resource on-demand request;
Obtain module, the temporal cache for program request platform end terminal according to the resource program request request Session record, and obtain the user of the user in on-demand assets corresponding with target video stream address to be signed Signature;
Authentication module, for program request platform end according to the temporal cache session record and the user's signature, The terminal is authenticated;
Playing module, for when the terminal passes through authentication, then program request platform end will to be asked with the resource program request Corresponding target video stream is asked to play out by the front end player of the terminal.
In addition, to solve the above problems, the computer equipment includes terminal the present invention also provides a kind of computer equipment With program request platform end;Wherein, the terminal includes first memory and first processor;Program request platform end includes second Memory and second processor;
The first memory and the second memory are used to store the authentication program request program based on program request platform end, The first processor and the second memory run the authentication program request program based on program request platform end so that described Computer equipment executes the authentication order method as described above based on program request platform end.
In addition, to solve the above problems, the present invention also provides a kind of computer readable storage medium, it is described computer-readable The authentication program request program based on program request platform end, the authentication program request program based on program request platform end are stored on storage medium The authentication order method as described above based on program request platform end is realized when being executed by processor.
A kind of authentication order method and its device based on program request platform end provided by the invention.Wherein, the authentication point Broadcasting method obtains the interim slow of terminal by after user's registration terminal, receiving the resource on-demand request of terminal, and according to request Session record and user's signature are deposited, and terminal is authenticated by temporal cache session record and user's signature, If being played out to by the target video stream to terminal by authentication.In the present invention, user is made by the system of terminal During SasS service with program request platform end, order program data is generated in program request platform end.Next, program request platform end pair Terminal is authenticated, and the order video stream is sent if the authentication is passed.In the present invention, program request platform end both do not needed to The identity at family is confirmed, the associated account information of storage user is not needed yet, and need to only cache user's label relevant to User ID On the one hand name avoids in the case where user information sensitivity, user information is obtained by third parties such as platforms, collects and cause to leak The problem of, it on the other hand can greatly reduce the occupancy of the intrinsic storage resource system resource for program request platform end, to make a little Better data service experience can be provided for more terminals by broadcasting platform end.
Detailed description of the invention
Fig. 1 is the hardware running environment being related to the present invention is based on the authentication order method example scheme at program request platform end Structural schematic diagram;
Fig. 2 is the flow diagram of the authentication order method first embodiment the present invention is based on program request platform end;
Fig. 3 is the flow diagram of the authentication order method second embodiment the present invention is based on program request platform end;
Fig. 4 is that the present invention is based on another embodiments in the authentication order method second embodiment at program request platform end The flow diagram of step S80 refinement;
Fig. 5 is the process of step S30 refinement in the authentication order method second embodiment the present invention is based on program request platform end Schematic diagram;
Fig. 6 is the flow diagram of the authentication order method 3rd embodiment the present invention is based on program request platform end;
Fig. 7 is the stream that the point-to-point message of the authentication order method fourth embodiment the present invention is based on program request platform end is sent Journey schematic diagram;
Fig. 8 is that the present invention is based on the processes of the group messaging of the authentication order method fourth embodiment at program request platform end to show It is intended to;
Fig. 9 be the present invention is based on program request platform end authentication order method fourth embodiment routing, node and special line it Between structure connection diagram;
Figure 10 is the functional block diagram of the authentication on-demand device the present invention is based on program request platform end.
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific embodiment
The embodiment of the present invention is described below in detail, in which the same or similar labels are throughly indicated same or like Element or element with the same or similar functions.
In addition, term " first ", " second " are used for descriptive purposes only and cannot be understood as indicating or suggesting relative importance Or implicitly indicate the quantity of indicated technical characteristic.Define " first " as a result, the feature of " second " can be expressed or Implicitly include one or more of the features.In the description of the present invention, the meaning of " plurality " is two or more, Unless otherwise specifically defined.
In the present invention unless specifically defined or limited otherwise, term " installation ", " connected ", " connection ", " fixation " etc. Term shall be understood in a broad sense, for example, it may be being fixedly connected, may be a detachable connection, or integral;It can be mechanical connect It connects, is also possible to be electrically connected;It can be directly connected, can also can be in two elements indirectly connected through an intermediary The interaction relationship of the connection in portion or two elements.It for the ordinary skill in the art, can be according to specific feelings Condition understands the concrete meaning of above-mentioned term in the present invention.
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
As shown in Figure 1, Fig. 1 is the structural schematic diagram of the hardware running environment for the terminal that the embodiment of the present invention is related to.
Computer equipment of the embodiment of the present invention includes terminal and program request platform end, and the PC that may each be is also possible to intelligence The packaged types terminal device such as mobile phone, tablet computer or portable computer.As shown in Fig. 1, which be can wrap It includes: processor 1001, such as CPU, network interface 1004, user interface 1003, memory 1005, communication bus 1002.Wherein, Communication bus 1002 is for realizing the connection communication between these components.User interface 1003 may include display screen, input list First such as keyboard, remote controler, optional user interface 1003 can also include standard wireline interface and wireless interface.Network interface 1004 may include optionally standard wireline interface and wireless interface (such as WI-FI interface).Memory 1005 can be high speed RAM memory is also possible to stable memory, such as magnetic disk storage.Memory 1005 optionally can also be independently of The storage device of aforementioned processor 1001.Optionally, computer equipment can also include RF (Radio Frequency, radio frequency) Circuit, voicefrequency circuit, WiFi module etc..In addition, terminal and program request platform end can also configure gyroscope, barometer, hygrometer, The other sensors such as thermometer, infrared sensor, details are not described herein.
It will be understood by those skilled in the art that computer equipment shown in Fig. 1 does not constitute the restriction to it, can wrap It includes than illustrating more or fewer components, perhaps combines certain components or different component layouts.As shown in Figure 1, as one It may include operating system, data-interface control program, network connection in the memory 1005 of kind computer readable storage medium Program and authentication program request program based on program request platform end.
A kind of authentication order method and its device based on program request platform end provided by the invention.Wherein, the method is real The communication for having showed the receiving-transmitting sides of the dynamic analysis based on IM node substantially increases information biography in cross-border IM traffic scene Defeated stability.
Embodiment 1:
Referring to Fig. 2, first embodiment of the invention provides a kind of authentication order method based on program request platform end, is applied to eventually Between end and program request platform end, comprising:
Step S10, after user logs in the terminal, program request platform end receives the terminal and is directed to target video stream Resource on-demand request;
The present embodiment is applied under the scene that SaaS platform uses, and reaches by authorization terminal, point of the program request as server-side Broadcast the purpose of the resource at platform end.
It is above-mentioned, in the present embodiment, including user, terminal and program request platform end tripartite.Wherein, user is stepped on by terminal Record, and program request platform can be connected to based on wired or wireless network by the system in terminal.Program request platform end, to as Tripartite, by all or part of data integration in the system of terminal, so that user can get by terminal and provide data clothes The data at the third-party program request platform end of business.Existing third party provides the service based on SaaS platform technology of data service End, not only provides data service, but also must preserve the authentication information for having authenticated user, so occupying a large amount of storage resource and being System resource, leads to the problem of dragging slow system, wasting system resource.
And in the present embodiment, to solve the above problems, providing a kind of authentication order method based on program request platform end, pass through Terminal carries out the confirmation of the identity for user, and program request platform end only carries out authenticating the terminal being attached with it Movement, and need to only be recorded by the user's signature and temporal cache session of terminal when authenticating and carry out provisional authentication, Ji Keshi The storage resource and system resource that occupy a large amount of SaaS platform in existing method are now avoided, causes to drag slow SaaS platform system The problem of system, waste system resource.
It is above-mentioned, target video stream, by the video flowing in system that is being stored in program request platform end and being integrated in terminal, It can be some video, or certain a kind of or a certain region or even all videos.
It is above-mentioned, after user's registration terminal, as user's registration terminal, and be to have authenticated user by terminal check.
Above-mentioned, resource on-demand request is the requirement solicited message generated according to user.
Step S20, the temporal cache of program request platform end terminal according to the resource program request request Session record, and obtain the user of the user in on-demand assets corresponding with target video stream address to be signed Signature;
Step S30, program request platform end is according to temporal cache session record and the user's signature, to institute Terminal is stated to be authenticated;
Step S40, if the terminal is by authentication, program request platform end will be corresponding with the resource on-demand request Target video stream is played out by the front end player of the terminal.
It is above-mentioned, it should be noted that Session, in a computer, especially in network application, referred to as " session control System ".Attribute and configuration information needed for Session object stores specific user's session.In this way, when user is in application program When jumping between Web page, the variable being stored in Session object will not be lost, but in entire user conversation always In the presence of going down.When user requests the Web page from application program, if the user, there are no session, Web server will be certainly One Session object of dynamic creation.After session is expired or is abandoned, server will terminate the session.Due to user Session It can be significantly using user's signature and Session as the means of the permission of the uniqueness of identification terminal with terminal unforgeable Improve determination rates and safety.
Above-mentioned, on-demand assets address to be signed should address be signed and target view for the address to be signed that program request platform end provides Frequency flows corresponding.It should be wait sign writable terminal user's signature obtained in address, which is not used to identification and uses Whether family is the uniqueness for having authenticated the identity of user, but being used for identification terminal.
A kind of authentication order method based on program request platform end provided in this embodiment, by after user's registration terminal, The resource on-demand request of terminal is received, and obtains the temporal cache session record and user's signature of terminal according to request, And terminal is authenticated by temporal cache session record and user's signature, if being regarded by authentication to by the target Frequency stream plays out terminal.In the present embodiment, system of the user by terminal, the mistake serviced using the SasS at program request platform end Cheng Zhong generates order program data in program request platform end.Next, program request platform end authenticates terminal, if the authentication is passed Then send the order video stream.In the present embodiment, program request platform end had not both needed to confirm the identity of user, was not required to yet The associated account information of user is stored, only need to cache user's signature relevant to User ID, on the one hand avoids and believes in user In the case that breath is sensitive, user information is obtained by third parties such as platforms, collects and cause the problem of leaking, and on the other hand can subtract significantly The occupancy of few intrinsic storage resource system resource for program request platform end, to make program request platform end that can mention for more terminals It is experienced for better data service.
Embodiment 2:
Referring to Fig. 3-5, second embodiment of the invention provides a kind of authentication order method based on program request platform end, based on upper First embodiment shown in Fig. 2 is stated, the step S10, " after user logs in the terminal, program request platform end receives institute State the resource on-demand request that terminal is directed to target video stream " before, further includes:
Step S50, the terminal receive the logging request of user;
Step S60, after being verified to the user information in the logging request, the terminal is believed according to the user Breath building user's signature;
It is above-mentioned, user information, the log-on message provided when being logged in for user, wherein may include login account, password Etc..It can be that login frame is provided in such a way that the log-on message for user is verified, related letter is inserted by user Breath carry out with the verifying of prestored information, can also by other means, such as:
May include: after the S50
Obtain the user information in the logging request;User place is determined by the location information in the user information Current region;
If region is preset range, determine that the user passes through verifying.
Above-mentioned steps application scenarios are that the region where when needing user to carry out video render is in preset range Scene, for example, in the video flowing of program request course, do not need to verify the unique identities of user within the scope of colleges and universities, And need whether to be in the range of preset colleges and universities user and verify, if the location information of user is colleges and universities' range It is interior, then it can pass through verifying.
Step S70, the terminal obtain the program request platform end group and wait signing ground in the on-demand assets of the target video stream Location;
Above-mentioned, on-demand assets address to be signed authenticates address for the blank that program request platform end provides, fills out wherein for terminal Enter information, and then program request platform end carries out the authentication of uniqueness to filling information.The on-demand assets address to be signed of terminal filling In information do not need to be saved at platform end, only need to play the role of carry out provisional authentication.
The on-demand assets address to be signed is written in the user's signature by step S80, the terminal;One is generated for described The resource on-demand request of target video stream, and the resource on-demand request is sent to program request platform end.
Above-mentioned, user's signature is written in blank authentication address in terminal, and claims a resource for being directed to target video stream On-demand request, and send this request to program request platform end.In the present embodiment, terminal is identified and is tested to the identity of user Card inserts user's signature in blank authentication address after being verified, and blank authentication address is what program request platform end provided Address, after user's signature is written terminal, program request platform end can get the information of write-in by the address in real time.Meanwhile The resource on-demand request that terminal is proposed is sent to platform end, and the authentication of terminal is acted to trigger platform end.
In another embodiment, the step S60, " is verified to the user information in the logging request Afterwards, the terminal constructs user's signature according to the user information " after, further includes:
Step S90, program request platform end generate the first public key and the first private key;Also, by first public key to institute State terminal transmission;Wherein, the terminal is after receiving first public key, by first public key to the user's signature into Row encryption;
In the present embodiment, the interaction data between terminal and platform end is added using rivest, shamir, adelman It is close, thus safety when improving data interaction.Based on rivest, shamir, adelman, platform end generates a pair of of code key, including first Public key and the first private key;First public key is for encrypting, and the first private key is for decrypting.Platform sends the first public key to terminal, Sending method can be point-to-point transmission, or the form of broadcast, since public key is Encryption Tool, so public key is let out Dew will not influence the safety of data.After terminal receives the first public key, user's signature is encrypted using the public key, from And realize the ciphering process in rivest, shamir, adelman.
The step S80, " the on-demand assets address to be signed is written in the user's signature by the terminal;Generate a needle It is sent to the resource on-demand request of the target video stream, and by the resource on-demand request to program request platform end " Include:
Step S81, the terminal will be written the program request by the user's signature after first public key encryption and provide Source address to be signed, generate one be directed to the target video stream the resource on-demand request, and by the resource on-demand request to Program request platform end is sent;
In turn, it in the authentication address for the blank that terminal provides encrypted user's signature write-in platform, is received in platform When to the data, the safety of data interaction ensure that.
The step the S20, " temporal cache of program request platform end terminal according to the resource program request request Session record, and obtain the user of the user in on-demand assets corresponding with target video stream address to be signed After signature ", further includes:
Step S100, program request platform end are solved using the user's signature after first private key pair encryption It is close;
Step S110, if successful decryption, the user's signature after being decrypted, in order to according to the temporal cache Session record and the user's signature, authenticate the terminal.
Above-mentioned, platform after signing address, is carried out for wherein in the on-demand assets after receiving terminal and carrying out write-in information The extraction of user's signature, that is, the user's signature after passing through the first private key pair encryption corresponding with the first public key saved are solved It is close, to obtain user's signature after successful decryption.
The decrypting process is also simultaneously the authentication process of the identity for terminal, because the first public key and the first private key are one To the code key with incidence relation, if do not corresponded to, can not decrypt.When decrypting failure, then determine that terminal authentication fails, i.e., Identity uniqueness authentication error can control terminal display to return to the login interface of user, and prompt failed authentication.
The step S30, " program request platform end is recorded according to the temporal cache session and the user's signature, The terminal is authenticated " include:
Step S31, program request platform end confirm whether the application duration of the user's signature meets preset time rule;
Above-mentioned, each user's signature has a timeliness, which is limited by preset time rule, for example, Preset time rule is defined as 10 minutes, the no longer effective property of the overtime then user's signature, so needing to first confirm that user's signature Timeliness confirmed.
Step S32 obtains the terminal if the application duration of the user's signature meets the preset time rule Current session, and confirm whether the current session is the current session corresponding with the user's signature;
Step S33 judges if the current session is the current session corresponding with the user's signature Whether the current session is consistent with temporal cache session record;
Step S34 determines the terminal if the current session and temporal cache session record is consistent Pass through authentication.
Step S35 determines the end if the current session and temporal cache session records inconsistent End does not pass through authentication.
In addition, being updated if the current session is not the current session corresponding with the user's signature The temporal cache session record.
Session is the connection with terminal and platform end and the time domain caching record generated, when playing or the end of connection End changes, then Session can change in real time, so the uniqueness between Session characterization terminal.The present embodiment In, a side of the platform end as video-on-demand platform service, to prevent the terminal in addition to specified terminal from carrying out stealing chain broadcasting, Define the Session caching of the terminal connected for the first time be it is legal, other pass through the link or address or other modes access Terminal causes Session to change, and will be determined as illegal.
After confirmation user's signature has timeliness, needs to confirm Session, that is, judge current Session Whether with the user's signature there is corresponding relationship, if having corresponding relationship, can enter and further determine.That is, into one Step judges whether current Session is to record unanimously with temporal cache session, judges to connect if inconsistent Connect variation, it is possible to occur to steal chain phenomenon.In the present embodiment, by the way that " whether current Session and the user's signature of terminal are opposite Answer ", and " whether current Session records consistent with temporal cache session " two judgements, to confirm terminal Permission is connected, the correctness of the confirmation for terminal identity uniqueness is substantially increased, improves safety.
In addition, " program request platform end confirms whether the application duration of the user's signature meets preset time described After rule ", further includes:
If the application duration of the user's signature does not meet the preset time rule, determine that the terminal does not pass through mirror Power;
The step S31, " if the application duration of the user's signature meets preset time rule, obtain described in The current session of terminal, and confirm whether the current session is corresponding with the user's signature described current After session ", further includes:
Step S36, the current session are not the current sessions corresponding with the user's signature, then described Program request platform end updates the corresponding temporal cache session record of the terminal, and the temporal cache session is recorded and is made For current session, also, after confirming that current session is consistent with the temporal cache session record, described in judgement Terminal passes through authentication.
After determining that terminal does not pass through authentication, then determines that terminal authentication fails, i.e. identity uniqueness authentication error, can control Terminal display returns to the login interface of user, and prompts failed authentication.
Embodiment 3:
Referring to Fig. 6, third embodiment of the invention provides a kind of authentication order method based on program request platform end, based on above-mentioned First embodiment shown in Fig. 2, the step S40 " program request platform end will target corresponding with the resource on-demand request Video flowing is played out by the front end player of the terminal " include:
Step S41, program request platform end record the corresponding temporal cache session of the terminal to the end End is sent, and obtains the second public key that the terminal generates after through authentication;
Step S42, program request platform end encrypt target video stream by second public key, also, will add The front end player that the target video after close flows to the terminal is sent;Wherein, the terminal utilizes and second public affairs Corresponding second private key of key decrypts the encrypted target video stream, and by the front end player to decryption after The target video stream play out.
The user's signature includes user's id information, timestamp and login age information.
Above-mentioned, session record in temporal cache has terminal unforgeable, the uniqueness of provable terminal, in this reality It applies in example, to ensure the safety in data stream transmission process, target data stream is encrypted by rivest, shamir, adelman And decryption, substantially increase the safety of data flow.
Above-mentioned, temporal cache session is recorded as the information that platform end is sent to terminal, in turn, according to the unique information, Terminal generates a pair of of code key, as the second public key and the second private key, the two after receiving temporal cache session record It is corresponding, wherein the second public key is Encryption Tool, and the second private key is decoding tool.After program request platform termination receives the second public key, The video flowing for treating sending is encrypted, and is sent to terminal, and terminal passes through the second of reservation after receiving target video stream Private key carries out the decryption to target video stream, thus the target video stream after being decrypted, so as to further be passed through The broadcasting of leading portion player.In the present embodiment, by rivest, shamir, adelman, encryption and decryption are realized to target video stream, To in the high data interaction scene of security requirement, substantially increase the privacy of data transmission, data is prevented and have leaked Caused by influence for safety.
Embodiment 4:
In addition, method provided by order to better illustrate the present invention, provides in the present embodiment a kind of based on program request platform The authentication order method at end includes the following:
Application scenarios in the present embodiment are, under the scene that SaaS platform uses, reach by authorization terminal, program request program request The purpose of platform end resource.
Firstly, terminal user passes through terminal traffic system, during the SasS service using program request platform end, in program request Order program data is generated on the platform at platform end.Then, the blank that program request platform end provides on-demand assets authenticates list to terminal, by end The user's signature of end using terminal submits to program request platform end after filling in.After program request platform end receives, the label of decryption verification user Name information distributes interim secret key pair, for encrypting program request video flowing if correctly, terminal obtains the Session of user.
In the present embodiment, program request platform end does not need the user account information of storage terminal, it is only necessary to and cache user ID is right In the case that user information is sensitive, do not have to worry that user information is obtained by program request platform end, collected.
Since user Session has terminal unforgeable, after user's signature and Session are bound, terminal according to The current Session that platform end issues generates interim secret key pair (the second public key and the second private key), and the second public key is sent to platform Encrypted video stream is held, the second private key is returned to front end player and retained, carried out by player based on private key video flowing solution by terminal It is close.
It is terminal traffic process figure refering to Fig. 7.By following steps, user's signature is written to program request and provided by the terminal In the blank authentication address in source, program request platform end operation system is submitted in waiting.Specifically comprise the following steps:
Step 1, user log in terminal system;
Step 2, after logining successfully, terminal background system structuring user's signature;It (obtains program request platform end to be generated according to terminal The first public key)
Step 3 uses the first public key encryption user's signature;
Step 4 obtains on-demand assets address;
Step 5 fills in the signature after user encryption to program request address;
It is program request platform end business process map refering to Fig. 8.By following steps, after program request platform end receives request, decryption It verifies user's signature and using terminal and the second public key and the second private key in interim secret key pair is produced according to Session, encrypt, Decrypt the process of order video.It specifically includes as follows:
Step 1, program request platform end backstage receive on-demand assets request;
Step 2 is signed with the first private key decrypted user of preservation;
If step 3, decryption failure, return to terminal login page;The timeliness of user is verified if successful decryption;
If step 4, signature timeliness are out of date, terminal login page is returned;If timeliness is not out of date, check current Whether Session's is corresponding with user's signature, verifies legitimacy;
If step 6, current Session are not corresponded to, temporal cache session record is updated;If in correspondence with each other, sentenced Whether the current Session that breaks records consistent with temporal cache Session;
Step 7, if it is inconsistent, return terminal login page;If consistent, pass through authentication;
Step 8, by the way that current Session is sent to terminal after authentication, wherein terminal is generated according to current Session Interim secret key pair (the second public key and the second private key), and the second public key is sent to program request platform end;
Step 9, with the second public key encryption order video stream;
Encrypted video flowing is passed to front end player by step 10;
Step 11, terminal front end player using the second private key decryption video flowing after play;
Refering to Fig. 9, for the functional frame composition based on the corresponding device of the present embodiment method, the module of main composition includes:
Code key management service: issuing, verifying for code key is provided;
Terminal system: end user logs business;
Program request platform end system: the program request authentication for providing blank is single, verifies program request permission;
Recording order service: encryption program request video flowing;
Video recording storage: video file storage;
Video recording is recorded: the Video data that cloud video recording terminal generates;
Web terminal: web player;
1. generating the signature of terminal user, and the address of signature write-in on-demand assets according to Fig. 7 terminal traffic process In.The program request platform end operation flow of Fig. 2 adds the program request address decryption verification after signature using signing messages after being verified Close order video stream.Change method to be suitble to use in SaaS platform scene, terminal accesses SaaS platform, in program request platform end platform Generate data, resource.
2. for on-demand assets by being the first step after verifying, second is to Session according to the business process map of Fig. 8 Maintenance and update distribute interim secret key pair, and third portion is to be encrypted using interim secret key pair to video flowing, and the 4th step is Web Video flowing is decrypted and is played in front end.Because of the characteristic that there is Session terminal can not forge, therefore " user's signature-can be made The interim secret key pair of Session- " combination achievees the purpose that on-demand assets authentication, encryption, decryption viewing
In addition, the present invention also provides a kind of authentication on-demand devices based on program request platform end with reference to Figure 10, comprising:
Receiving module 10, for after user's registration terminal, program request platform end to obtain the terminal and is directed to target video stream Resource on-demand request;
Module 20 is obtained, for the interim slow of program request platform end terminal according to the resource program request request Session record is deposited, and obtains the use of the user in on-demand assets corresponding with target video stream address to be signed Family signature;
Authentication module 30 is signed for program request platform end according to temporal cache session record and the user Name, authenticates the terminal;
Playing module 40, for when the terminal passes through authentication, then program request platform end will be with the resource program request Corresponding target video stream is requested to play out by the front end player of the terminal.
In addition, the computer equipment includes terminal and program request platform end the present invention also provides a kind of computer equipment;Its In, the terminal includes first memory and first processor;Program request platform end includes second memory and second Processor;
The first memory and the second memory are used to store the authentication program request program based on program request platform end, The first processor and the second memory run the authentication program request program based on program request platform end so that described Computer equipment executes the authentication order method as described above based on program request platform end.
In addition, being stored on the computer readable storage medium the present invention also provides a kind of computer readable storage medium There is the authentication program request program based on program request platform end, when the authentication program request program based on program request platform end is executed by processor Realize the authentication order method as described above based on program request platform end.
The serial number of the above embodiments of the invention is only for description, does not represent the advantages or disadvantages of the embodiments.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art The part contributed out can be embodied in the form of software products, which is stored in one as described above In storage medium (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that terminal device (it can be mobile phone, Computer, server or network equipment etc.) execute method described in each embodiment of the present invention.The above is only of the invention Preferred embodiment is not intended to limit the scope of the invention, all using made by description of the invention and accompanying drawing content Equivalent structure or equivalent flow shift is applied directly or indirectly in other relevant technical fields, and is similarly included in this hair In bright scope of patent protection.

Claims (10)

1. a kind of authentication order method based on program request platform end is applied between terminal and program request platform end, which is characterized in that Include:
After user logs in the terminal, program request platform end receives the terminal and asks for the resource program request of target video stream It asks;
The temporal cache session of program request platform end terminal according to the resource program request request is recorded, and Obtain the user's signature of the user in on-demand assets corresponding with target video stream address to be signed;
Program request platform end reflects to the terminal according to temporal cache session record and the user's signature Power;
If the terminal, by authentication, program request platform end will target video circulation corresponding with the resource on-demand request The front end player for crossing the terminal plays out.
2. the authentication order method as described in claim 1 based on program request platform end, which is characterized in that described " to be logged in user After the terminal, program request platform end receives the resource on-demand request that the terminal is directed to target video stream " before, also wrap It includes:
The terminal receives the logging request of user;
After being verified to the user information in the logging request, the terminal constructs user according to the user information and signs Name;
The terminal obtains the program request platform end group in the on-demand assets address to be signed of the target video stream;
The on-demand assets address to be signed is written in the user's signature by the terminal;One is generated for the target video stream The resource on-demand request, and the resource on-demand request is sent to program request platform end.
3. the authentication order method as claimed in claim 2 based on program request platform end, which is characterized in that described " to be stepped on to described After user information in record request is verified, the terminal constructs user's signature according to the user information " after, also wrap It includes:
Program request platform end generates the first public key and the first private key;Also, first public key is sent to the terminal;Its In, the terminal encrypts the user's signature by first public key after receiving first public key;
It is described that " the on-demand assets address to be signed is written in the user's signature by the terminal;One is generated to regard for the target The resource on-demand request of frequency stream, and the resource on-demand request is sent to program request platform end " include:
The on-demand assets address to be signed will be written by the user's signature after first public key encryption in the terminal, raw The resource on-demand request for being directed to the target video stream at one, and by the resource on-demand request to program request platform end It sends;
Described " the temporal cache session of program request platform end terminal according to the resource program request request is recorded, And obtain the user's signature of the user in on-demand assets corresponding with target video stream address to be signed " after, also Include:
Program request platform end is decrypted using the user's signature after first private key pair encryption;
If successful decryption, the user's signature after being decrypted, in order to according to temporal cache session record and The user's signature authenticates the terminal.
4. the authentication order method as claimed in claim 3 based on program request platform end, which is characterized in that described " program request is flat End authenticates the terminal according to temporal cache session record and the user's signature " include:
Program request platform end confirms whether the application duration of the user's signature meets preset time rule;
If the application duration of the user's signature meets the preset time rule, the current session of the terminal is obtained, And confirm whether the current session is the current session corresponding with the user's signature;
If the current session is the current session corresponding with the user's signature, judge described current Whether session is consistent with temporal cache session record;
If the current session and temporal cache session record is consistent, determine that the terminal passes through authentication;
If the current session and temporal cache session records inconsistent, determine that the terminal does not pass through mirror Power.
5. the authentication order method as claimed in claim 4 based on program request platform end, which is characterized in that described " program request is flat End confirms whether the application duration of the user's signature meets preset time rule " after, further includes:
If the application duration of the user's signature does not meet the preset time rule, determine that the terminal does not pass through authentication;
It is described " if the application duration of the user's signature meets the preset time rule, to obtain the current of the terminal Session, and after confirming whether the current session is the current session " corresponding with the user's signature, Further include:
The current session is not the current session corresponding with the user's signature, then program request platform end is more The newly corresponding temporal cache session record of the terminal, and by temporal cache session record as current Session, also, after confirming that current session is consistent with the temporal cache session record, determine that the terminal is logical Cross authentication.
6. the authentication order method as described in claim 1 based on program request platform end, which is characterized in that described " program request is flat End plays out target video stream corresponding with the resource on-demand request by the front end player of the terminal " packet It includes:
The corresponding temporal cache session of the terminal is recorded to the terminal and is sent by program request platform end, and Obtain the second public key that the terminal generates after through authentication;
Program request platform end encrypts target video stream by second public key, also, by the encrypted mesh The front end player that mark video flows to the terminal is sent;Wherein, the terminal utilizes and second public key corresponding second Private key decrypts the encrypted target video stream, and is regarded by the front end player to the target after decryption Frequency stream plays out.
7. the authentication order method based on program request platform end as described in claim any one of 1-6, which is characterized in that the user Signature includes User ID information, timestamp and login age information.
8. a kind of authentication on-demand device based on program request platform end characterized by comprising
Receiving module, for after user's registration terminal, program request platform end to obtain the resource that the terminal is directed to target video stream On-demand request;
Obtain module, the temporal cache for program request platform end terminal according to the resource program request request Session record, and obtain the user of the user in on-demand assets corresponding with target video stream address to be signed Signature;
Authentication module, for program request platform end according to temporal cache session record and the user's signature, to institute Terminal is stated to be authenticated;
Playing module, for when the terminal passes through authentication, then program request platform end will be with the resource on-demand request pair The target video stream answered is played out by the front end player of the terminal.
9. a kind of computer equipment, which is characterized in that the computer equipment includes terminal and program request platform end;Wherein, described Terminal includes first memory and first processor;Program request platform end includes second memory and second processor;
The first memory and the second memory are used to store the authentication program request program based on program request platform end, described First processor and the second memory run the authentication program request program based on program request platform end so that the calculating Machine equipment executes the authentication order method based on program request platform end as described in any one of claim 1-7.
10. a kind of computer readable storage medium, which is characterized in that be stored on the computer readable storage medium based on point The authentication program request program at platform end is broadcast, is realized when the authentication program request program based on program request platform end is executed by processor as weighed Benefit requires the authentication order method based on program request platform end described in any one of 1-7.
CN201811503575.XA 2018-12-10 2018-12-10 Authentication on-demand method and device based on-demand platform end Active CN109618194B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811503575.XA CN109618194B (en) 2018-12-10 2018-12-10 Authentication on-demand method and device based on-demand platform end

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811503575.XA CN109618194B (en) 2018-12-10 2018-12-10 Authentication on-demand method and device based on-demand platform end

Publications (2)

Publication Number Publication Date
CN109618194A true CN109618194A (en) 2019-04-12
CN109618194B CN109618194B (en) 2021-05-11

Family

ID=66008778

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811503575.XA Active CN109618194B (en) 2018-12-10 2018-12-10 Authentication on-demand method and device based on-demand platform end

Country Status (1)

Country Link
CN (1) CN109618194B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110769287A (en) * 2019-11-07 2020-02-07 中影环球(北京)科技有限公司 Counting method based on cinema on-demand system
CN113973116A (en) * 2020-07-22 2022-01-25 拉扎斯网络科技(上海)有限公司 Resource management method, resource propagation method, device, system, equipment and medium

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101005364A (en) * 2006-01-16 2007-07-25 中兴通讯股份有限公司 Medium service system
CN101202893A (en) * 2007-06-27 2008-06-18 深圳市同洲电子股份有限公司 Method, system for preventing non-authorization user from obtaining service and video server
CN101668016A (en) * 2009-09-30 2010-03-10 华为技术有限公司 Authentication method and device
CN101754215A (en) * 2008-12-01 2010-06-23 华为技术有限公司 Authentication method and system
CN101860521A (en) * 2009-04-13 2010-10-13 中国联合网络通信集团有限公司 Authentication treatment method and system
US20120117639A1 (en) * 2010-11-09 2012-05-10 International Business Machines Corporation Remote authentication based on challenge-response using digital certificates
CN103023638A (en) * 2011-09-22 2013-04-03 阿里巴巴集团控股有限公司 Identity verification method and device based on mobile terminal
CN103634265A (en) * 2012-08-20 2014-03-12 腾讯科技(深圳)有限公司 Method, device and system for security authentication
US20160019536A1 (en) * 2012-10-17 2016-01-21 Royal Bank Of Canada Secure processing of data
US20160224799A1 (en) * 2015-02-03 2016-08-04 Palo Alto Research Center Incorporated Access control framework for information centric networking
CN106487812A (en) * 2016-12-02 2017-03-08 努比亚技术有限公司 A kind of method for authenticating and device
CN107079038A (en) * 2013-12-31 2017-08-18 谷歌公司 For providing method, system and medium to the access control of computing device
WO2018053456A1 (en) * 2016-09-19 2018-03-22 Ebay Inc. Multi-session authentication
US20180124049A1 (en) * 2015-10-08 2018-05-03 Feitian Technologies Co., Ltd. Method and device for authenticating based on authenticating device
CN108809988A (en) * 2018-06-14 2018-11-13 北京中电普华信息技术有限公司 A kind of authentication method and system of request

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101005364A (en) * 2006-01-16 2007-07-25 中兴通讯股份有限公司 Medium service system
CN101202893A (en) * 2007-06-27 2008-06-18 深圳市同洲电子股份有限公司 Method, system for preventing non-authorization user from obtaining service and video server
CN101754215A (en) * 2008-12-01 2010-06-23 华为技术有限公司 Authentication method and system
CN101860521A (en) * 2009-04-13 2010-10-13 中国联合网络通信集团有限公司 Authentication treatment method and system
CN101668016A (en) * 2009-09-30 2010-03-10 华为技术有限公司 Authentication method and device
US20120117639A1 (en) * 2010-11-09 2012-05-10 International Business Machines Corporation Remote authentication based on challenge-response using digital certificates
CN103023638A (en) * 2011-09-22 2013-04-03 阿里巴巴集团控股有限公司 Identity verification method and device based on mobile terminal
CN103634265A (en) * 2012-08-20 2014-03-12 腾讯科技(深圳)有限公司 Method, device and system for security authentication
US20160019536A1 (en) * 2012-10-17 2016-01-21 Royal Bank Of Canada Secure processing of data
CN107079038A (en) * 2013-12-31 2017-08-18 谷歌公司 For providing method, system and medium to the access control of computing device
US20160224799A1 (en) * 2015-02-03 2016-08-04 Palo Alto Research Center Incorporated Access control framework for information centric networking
US20180124049A1 (en) * 2015-10-08 2018-05-03 Feitian Technologies Co., Ltd. Method and device for authenticating based on authenticating device
WO2018053456A1 (en) * 2016-09-19 2018-03-22 Ebay Inc. Multi-session authentication
CN106487812A (en) * 2016-12-02 2017-03-08 努比亚技术有限公司 A kind of method for authenticating and device
CN108809988A (en) * 2018-06-14 2018-11-13 北京中电普华信息技术有限公司 A kind of authentication method and system of request

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
杨小东 等: "基于无证书签名的云端跨域身份认证方案", 《计算机工程》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110769287A (en) * 2019-11-07 2020-02-07 中影环球(北京)科技有限公司 Counting method based on cinema on-demand system
CN113973116A (en) * 2020-07-22 2022-01-25 拉扎斯网络科技(上海)有限公司 Resource management method, resource propagation method, device, system, equipment and medium

Also Published As

Publication number Publication date
CN109618194B (en) 2021-05-11

Similar Documents

Publication Publication Date Title
CN106850699B (en) A kind of mobile terminal login authentication method and system
CN110324276B (en) Method, system, terminal and electronic device for logging in application
CN108965230B (en) Secure communication method, system and terminal equipment
CN104980477B (en) Data access control method and system under cloud storage environment
CN107347068A (en) Single-point logging method and system, electronic equipment
CN107508796A (en) A kind of data communications method and device
CN107948736A (en) A kind of audio and video preservation of evidence method and system
CN106790183A (en) Logging on authentication method of calibration, device
CN106789897B (en) Digital certificate authentication method and system for application program for mobile terminal
CN101262342A (en) Distributed authorization and validation method, device and system
KR20130109322A (en) Apparatus and method to enable a user authentication in a communication system
CN110365486A (en) A kind of certificate request method, device and equipment
CN114553441B (en) Electronic contract signing method and system
CN109618194A (en) A kind of authentication order method and its device based on program request platform end
CN112039878A (en) Equipment registration method and device, computer equipment and storage medium
CN109618313A (en) A kind of vehicle-mounted Bluetooth equipment and attaching method thereof, system
CN108462671A (en) A kind of authentication protection method and system based on reverse proxy
CN110166471A (en) A kind of portal authentication method and device
CN109495458A (en) A kind of method, system and the associated component of data transmission
CN109802927B (en) Security service providing method and device
CN109460993A (en) Information processing method, device and storage medium
CN108123917B (en) Method and equipment for updating authentication voucher of terminal of Internet of things
CN110113339A (en) Elevator information display terminal letter of identity acquisition methods and device
CN115604862A (en) Video streaming transmission method and system
CN107682380A (en) A kind of method and device of cross-certification

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20200804

Address after: Room 903, South Block, Yuanxing science and technology building, Xili street, Nanshan District, Shenzhen City, Guangdong Province

Applicant after: Bell hekong (Shenzhen) Technology Co., Ltd

Address before: 518000 Guangdong city of Shenzhen province Nanshan District Xili Street Song Ping mountain road 1 Lite Technology Building South 902

Applicant before: SHENZHEN BELL CREATIVE SCIENCE AND EDUCATION Co.,Ltd.

GR01 Patent grant
GR01 Patent grant