CN109618194A - A kind of authentication order method and its device based on program request platform end - Google Patents
A kind of authentication order method and its device based on program request platform end Download PDFInfo
- Publication number
- CN109618194A CN109618194A CN201811503575.XA CN201811503575A CN109618194A CN 109618194 A CN109618194 A CN 109618194A CN 201811503575 A CN201811503575 A CN 201811503575A CN 109618194 A CN109618194 A CN 109618194A
- Authority
- CN
- China
- Prior art keywords
- terminal
- user
- program request
- platform end
- signature
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/25—Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
- H04N21/258—Client or end-user data management, e.g. managing client capabilities, user preferences or demographics, processing of multiple end-users preferences to derive collaborative data
- H04N21/25866—Management of end-user data
- H04N21/25875—Management of end-user data involving end-user authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
- H04N21/239—Interfacing the upstream path of the transmission network, e.g. prioritizing client content requests
- H04N21/2393—Interfacing the upstream path of the transmission network, e.g. prioritizing client content requests involving handling client requests
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/25—Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
- H04N21/266—Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/47—End-user applications
- H04N21/472—End-user interface for requesting content, additional data or services; End-user interface for interacting with content, e.g. for content reservation or setting reminders, for requesting event notification, for manipulating displayed content
- H04N21/47202—End-user interface for requesting content, additional data or services; End-user interface for interacting with content, e.g. for content reservation or setting reminders, for requesting event notification, for manipulating displayed content for requesting content on demand, e.g. video on demand
Landscapes
- Engineering & Computer Science (AREA)
- Databases & Information Systems (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Graphics (AREA)
- Human Computer Interaction (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
Abstract
The present invention provides a kind of authentication order method and its device based on program request platform end.The described method includes: program request platform end receives resource on-demand request;According to the temporal cache session of request terminal record and user's signature;According to temporal cache session record and user's signature, terminal is authenticated;If target video stream corresponding with request is played out by the front end player of terminal by authentication.In the present invention, program request platform end had not both needed to confirm the identity of user, the associated account information of storage user is not needed yet, user's signature relevant to User ID need to only be cached, on the one hand it avoids in the case where user information sensitivity, user information is obtained by third parties such as platforms, collects and cause the problem of leaking, on the other hand it can greatly reduce the occupancy of the intrinsic storage resource system resource for program request platform end, to make program request platform end that can provide better data service experience for more terminals.
Description
Technical field
The present invention relates to video streaming on demand technical fields, more specifically to a kind of authentication based on program request platform end
Order method and its device.
Background technique
It is video-see, video management and the general name of application based on the application of cloud computing business model that cloud point, which is broadcast,.For example, can
To support HTTP, FTP etc. to link, there are many usage modes.
As various cloud order program services (publicly-owned cloud service) are more and more, mechanism can be convenient in the flat of oneself
Third party's service abundant, such as short message verification code, intelligent robot customer service, picture identification, education live streaming classroom are integrated on platform
Equal SaaS service.And user can obtain the data of third party's service by registration terminal.
Currently, existing mode has a feature, user mentions in terminal traffic system, the server-side (platform) of actual use
The service of confession, user itself perceive less than but the personal information data of user for certification are maintained in service end system
, that is, it is the use for log in each by the user information authenticated stored in server-side by service end system
Family is authenticated, and the middle personal information data for not only authenticating user is caused to occupy a large amount of intrinsic storage resources of server-side, certification
Process also occupies the system resource of server-side, to make server-side that can not provide better data service body for more terminals
It tests.
Summary of the invention
In view of this, the present invention provides a kind of authentication order method based on program request platform end and its device is existing to solve
The deficiency of technology.
To solve the above problems, the present invention provides a kind of authentication order method based on program request platform end, it is applied to terminal
Between program request platform end characterized by comprising
After user logs in the terminal, program request platform end receives the resource points that the terminal is directed to target video stream
Broadcast request;
The temporal cache session of program request platform end terminal according to the resource program request request is recorded,
And obtain the user's signature of the user in on-demand assets corresponding with target video stream address to be signed;
Program request platform end according to the temporal cache session record and the user's signature, to the terminal into
Row authentication;
If the terminal is by authentication, program request platform end will target video corresponding with the resource on-demand request
Stream is played out by the front end player of the terminal.
It is preferably, described that " after user logs in the terminal, program request platform end receives the terminal and regards for target
Before the resource on-demand request of frequency stream ", further includes:
The terminal receives the logging request of user;
After being verified to the user information in the logging request, the terminal is constructed according to the user information and is used
Family signature;
The terminal obtains the program request platform end group in the on-demand assets address to be signed of the target video stream;
The on-demand assets address to be signed is written in the user's signature by the terminal;It generates one and is directed to the target video
The resource on-demand request of stream, and the resource on-demand request is sent to program request platform end.
It is preferably, described that " after being verified to the user information in the logging request, the terminal is according to the use
After family information architecture user's signature ", further includes:
Program request platform end generates the first public key and the first private key;Also, first public key is sent out to the terminal
It send;Wherein, the terminal encrypts the user's signature by first public key after receiving first public key;
It is described that " the on-demand assets address to be signed is written in the user's signature by the terminal;It generates one and is directed to the mesh
The resource on-demand request of video flowing is marked, and the resource on-demand request is sent to program request platform end " include:
The terminal will be written the on-demand assets by the user's signature after first public key encryption and wait signing ground
Location generates a resource on-demand request for being directed to the target video stream, and by the resource on-demand request to the program request
Platform end is sent;
" the temporal cache session of program request platform end terminal according to the resource program request request
Record, and obtain the user's signature of the user in on-demand assets corresponding with target video stream address to be signed " it
Afterwards, further includes:
Program request platform end is decrypted using the user's signature after first private key pair encryption;
If successful decryption, the user's signature after being decrypted, in order to be remembered according to the temporal cache session
Record and the user's signature, authenticate the terminal.
Preferably, described " program request platform end is recorded according to the temporal cache session and the user's signature,
The terminal is authenticated " include:
Program request platform end confirms whether the application duration of the user's signature meets preset time rule;
If the application duration of the user's signature meets the preset time rule, the current of the terminal is obtained
Session, and confirm whether the current session is the current session corresponding with the user's signature;
If the current session is the current session corresponding with the user's signature, judge described current
Whether session is consistent with temporal cache session record;
If the current session and temporal cache session record is consistent, determine that the terminal passes through mirror
Power;
If the current session and temporal cache session records inconsistent, determine that the terminal does not pass through
Authentication.
It is preferably, described that " program request platform end confirms whether the application duration of the user's signature meets preset time
After rule ", further includes:
If the application duration of the user's signature does not meet the preset time rule, determine that the terminal does not pass through mirror
Power;
It is described " if the application duration of the user's signature meets the preset time rule, to obtain working as the terminal
Preceding session, and confirm the current session whether be the current session " corresponding with the user's signature it
Afterwards, further includes:
The current session is not the current session corresponding with the user's signature, then the program request platform
End updates the corresponding temporal cache session record of the terminal, and by temporal cache session record as current
Session, also, after confirming that current session is consistent with the temporal cache session record, determine that the terminal is logical
Cross authentication.
It is preferably, described that " target video stream corresponding with the resource on-demand request is passed through institute by program request platform end
The front end player for stating terminal plays out " include:
The corresponding temporal cache session of the terminal is recorded to the terminal and is sent by program request platform end,
And obtaining the terminal, the temporal cache session records second generated based on the received after through authentication
Public key;
Program request platform end encrypts target video stream by second public key, also, by encrypted institute
State the front end player transmission that target video flows to the terminal;Wherein, the terminal utilizes corresponding with second public key
Second private key decrypts the encrypted target video stream, and by the front end player to the mesh after decryption
Mark video flowing plays out.
Preferably, the user's signature includes user's id information, timestamp and login age information.
In addition, to solve the above problems, being wrapped the present invention also provides a kind of authentication on-demand device based on program request platform end
It includes:
Receiving module, for after user's registration terminal, program request platform end to obtain the terminal for target video stream
Resource on-demand request;
Obtain module, the temporal cache for program request platform end terminal according to the resource program request request
Session record, and obtain the user of the user in on-demand assets corresponding with target video stream address to be signed
Signature;
Authentication module, for program request platform end according to the temporal cache session record and the user's signature,
The terminal is authenticated;
Playing module, for when the terminal passes through authentication, then program request platform end will to be asked with the resource program request
Corresponding target video stream is asked to play out by the front end player of the terminal.
In addition, to solve the above problems, the computer equipment includes terminal the present invention also provides a kind of computer equipment
With program request platform end;Wherein, the terminal includes first memory and first processor;Program request platform end includes second
Memory and second processor;
The first memory and the second memory are used to store the authentication program request program based on program request platform end,
The first processor and the second memory run the authentication program request program based on program request platform end so that described
Computer equipment executes the authentication order method as described above based on program request platform end.
In addition, to solve the above problems, the present invention also provides a kind of computer readable storage medium, it is described computer-readable
The authentication program request program based on program request platform end, the authentication program request program based on program request platform end are stored on storage medium
The authentication order method as described above based on program request platform end is realized when being executed by processor.
A kind of authentication order method and its device based on program request platform end provided by the invention.Wherein, the authentication point
Broadcasting method obtains the interim slow of terminal by after user's registration terminal, receiving the resource on-demand request of terminal, and according to request
Session record and user's signature are deposited, and terminal is authenticated by temporal cache session record and user's signature,
If being played out to by the target video stream to terminal by authentication.In the present invention, user is made by the system of terminal
During SasS service with program request platform end, order program data is generated in program request platform end.Next, program request platform end pair
Terminal is authenticated, and the order video stream is sent if the authentication is passed.In the present invention, program request platform end both do not needed to
The identity at family is confirmed, the associated account information of storage user is not needed yet, and need to only cache user's label relevant to User ID
On the one hand name avoids in the case where user information sensitivity, user information is obtained by third parties such as platforms, collects and cause to leak
The problem of, it on the other hand can greatly reduce the occupancy of the intrinsic storage resource system resource for program request platform end, to make a little
Better data service experience can be provided for more terminals by broadcasting platform end.
Detailed description of the invention
Fig. 1 is the hardware running environment being related to the present invention is based on the authentication order method example scheme at program request platform end
Structural schematic diagram;
Fig. 2 is the flow diagram of the authentication order method first embodiment the present invention is based on program request platform end;
Fig. 3 is the flow diagram of the authentication order method second embodiment the present invention is based on program request platform end;
Fig. 4 is that the present invention is based on another embodiments in the authentication order method second embodiment at program request platform end
The flow diagram of step S80 refinement;
Fig. 5 is the process of step S30 refinement in the authentication order method second embodiment the present invention is based on program request platform end
Schematic diagram;
Fig. 6 is the flow diagram of the authentication order method 3rd embodiment the present invention is based on program request platform end;
Fig. 7 is the stream that the point-to-point message of the authentication order method fourth embodiment the present invention is based on program request platform end is sent
Journey schematic diagram;
Fig. 8 is that the present invention is based on the processes of the group messaging of the authentication order method fourth embodiment at program request platform end to show
It is intended to;
Fig. 9 be the present invention is based on program request platform end authentication order method fourth embodiment routing, node and special line it
Between structure connection diagram;
Figure 10 is the functional block diagram of the authentication on-demand device the present invention is based on program request platform end.
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific embodiment
The embodiment of the present invention is described below in detail, in which the same or similar labels are throughly indicated same or like
Element or element with the same or similar functions.
In addition, term " first ", " second " are used for descriptive purposes only and cannot be understood as indicating or suggesting relative importance
Or implicitly indicate the quantity of indicated technical characteristic.Define " first " as a result, the feature of " second " can be expressed or
Implicitly include one or more of the features.In the description of the present invention, the meaning of " plurality " is two or more,
Unless otherwise specifically defined.
In the present invention unless specifically defined or limited otherwise, term " installation ", " connected ", " connection ", " fixation " etc.
Term shall be understood in a broad sense, for example, it may be being fixedly connected, may be a detachable connection, or integral;It can be mechanical connect
It connects, is also possible to be electrically connected;It can be directly connected, can also can be in two elements indirectly connected through an intermediary
The interaction relationship of the connection in portion or two elements.It for the ordinary skill in the art, can be according to specific feelings
Condition understands the concrete meaning of above-mentioned term in the present invention.
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
As shown in Figure 1, Fig. 1 is the structural schematic diagram of the hardware running environment for the terminal that the embodiment of the present invention is related to.
Computer equipment of the embodiment of the present invention includes terminal and program request platform end, and the PC that may each be is also possible to intelligence
The packaged types terminal device such as mobile phone, tablet computer or portable computer.As shown in Fig. 1, which be can wrap
It includes: processor 1001, such as CPU, network interface 1004, user interface 1003, memory 1005, communication bus 1002.Wherein,
Communication bus 1002 is for realizing the connection communication between these components.User interface 1003 may include display screen, input list
First such as keyboard, remote controler, optional user interface 1003 can also include standard wireline interface and wireless interface.Network interface
1004 may include optionally standard wireline interface and wireless interface (such as WI-FI interface).Memory 1005 can be high speed
RAM memory is also possible to stable memory, such as magnetic disk storage.Memory 1005 optionally can also be independently of
The storage device of aforementioned processor 1001.Optionally, computer equipment can also include RF (Radio Frequency, radio frequency)
Circuit, voicefrequency circuit, WiFi module etc..In addition, terminal and program request platform end can also configure gyroscope, barometer, hygrometer,
The other sensors such as thermometer, infrared sensor, details are not described herein.
It will be understood by those skilled in the art that computer equipment shown in Fig. 1 does not constitute the restriction to it, can wrap
It includes than illustrating more or fewer components, perhaps combines certain components or different component layouts.As shown in Figure 1, as one
It may include operating system, data-interface control program, network connection in the memory 1005 of kind computer readable storage medium
Program and authentication program request program based on program request platform end.
A kind of authentication order method and its device based on program request platform end provided by the invention.Wherein, the method is real
The communication for having showed the receiving-transmitting sides of the dynamic analysis based on IM node substantially increases information biography in cross-border IM traffic scene
Defeated stability.
Embodiment 1:
Referring to Fig. 2, first embodiment of the invention provides a kind of authentication order method based on program request platform end, is applied to eventually
Between end and program request platform end, comprising:
Step S10, after user logs in the terminal, program request platform end receives the terminal and is directed to target video stream
Resource on-demand request;
The present embodiment is applied under the scene that SaaS platform uses, and reaches by authorization terminal, point of the program request as server-side
Broadcast the purpose of the resource at platform end.
It is above-mentioned, in the present embodiment, including user, terminal and program request platform end tripartite.Wherein, user is stepped on by terminal
Record, and program request platform can be connected to based on wired or wireless network by the system in terminal.Program request platform end, to as
Tripartite, by all or part of data integration in the system of terminal, so that user can get by terminal and provide data clothes
The data at the third-party program request platform end of business.Existing third party provides the service based on SaaS platform technology of data service
End, not only provides data service, but also must preserve the authentication information for having authenticated user, so occupying a large amount of storage resource and being
System resource, leads to the problem of dragging slow system, wasting system resource.
And in the present embodiment, to solve the above problems, providing a kind of authentication order method based on program request platform end, pass through
Terminal carries out the confirmation of the identity for user, and program request platform end only carries out authenticating the terminal being attached with it
Movement, and need to only be recorded by the user's signature and temporal cache session of terminal when authenticating and carry out provisional authentication, Ji Keshi
The storage resource and system resource that occupy a large amount of SaaS platform in existing method are now avoided, causes to drag slow SaaS platform system
The problem of system, waste system resource.
It is above-mentioned, target video stream, by the video flowing in system that is being stored in program request platform end and being integrated in terminal,
It can be some video, or certain a kind of or a certain region or even all videos.
It is above-mentioned, after user's registration terminal, as user's registration terminal, and be to have authenticated user by terminal check.
Above-mentioned, resource on-demand request is the requirement solicited message generated according to user.
Step S20, the temporal cache of program request platform end terminal according to the resource program request request
Session record, and obtain the user of the user in on-demand assets corresponding with target video stream address to be signed
Signature;
Step S30, program request platform end is according to temporal cache session record and the user's signature, to institute
Terminal is stated to be authenticated;
Step S40, if the terminal is by authentication, program request platform end will be corresponding with the resource on-demand request
Target video stream is played out by the front end player of the terminal.
It is above-mentioned, it should be noted that Session, in a computer, especially in network application, referred to as " session control
System ".Attribute and configuration information needed for Session object stores specific user's session.In this way, when user is in application program
When jumping between Web page, the variable being stored in Session object will not be lost, but in entire user conversation always
In the presence of going down.When user requests the Web page from application program, if the user, there are no session, Web server will be certainly
One Session object of dynamic creation.After session is expired or is abandoned, server will terminate the session.Due to user Session
It can be significantly using user's signature and Session as the means of the permission of the uniqueness of identification terminal with terminal unforgeable
Improve determination rates and safety.
Above-mentioned, on-demand assets address to be signed should address be signed and target view for the address to be signed that program request platform end provides
Frequency flows corresponding.It should be wait sign writable terminal user's signature obtained in address, which is not used to identification and uses
Whether family is the uniqueness for having authenticated the identity of user, but being used for identification terminal.
A kind of authentication order method based on program request platform end provided in this embodiment, by after user's registration terminal,
The resource on-demand request of terminal is received, and obtains the temporal cache session record and user's signature of terminal according to request,
And terminal is authenticated by temporal cache session record and user's signature, if being regarded by authentication to by the target
Frequency stream plays out terminal.In the present embodiment, system of the user by terminal, the mistake serviced using the SasS at program request platform end
Cheng Zhong generates order program data in program request platform end.Next, program request platform end authenticates terminal, if the authentication is passed
Then send the order video stream.In the present embodiment, program request platform end had not both needed to confirm the identity of user, was not required to yet
The associated account information of user is stored, only need to cache user's signature relevant to User ID, on the one hand avoids and believes in user
In the case that breath is sensitive, user information is obtained by third parties such as platforms, collects and cause the problem of leaking, and on the other hand can subtract significantly
The occupancy of few intrinsic storage resource system resource for program request platform end, to make program request platform end that can mention for more terminals
It is experienced for better data service.
Embodiment 2:
Referring to Fig. 3-5, second embodiment of the invention provides a kind of authentication order method based on program request platform end, based on upper
First embodiment shown in Fig. 2 is stated, the step S10, " after user logs in the terminal, program request platform end receives institute
State the resource on-demand request that terminal is directed to target video stream " before, further includes:
Step S50, the terminal receive the logging request of user;
Step S60, after being verified to the user information in the logging request, the terminal is believed according to the user
Breath building user's signature;
It is above-mentioned, user information, the log-on message provided when being logged in for user, wherein may include login account, password
Etc..It can be that login frame is provided in such a way that the log-on message for user is verified, related letter is inserted by user
Breath carry out with the verifying of prestored information, can also by other means, such as:
May include: after the S50
Obtain the user information in the logging request;User place is determined by the location information in the user information
Current region;
If region is preset range, determine that the user passes through verifying.
Above-mentioned steps application scenarios are that the region where when needing user to carry out video render is in preset range
Scene, for example, in the video flowing of program request course, do not need to verify the unique identities of user within the scope of colleges and universities,
And need whether to be in the range of preset colleges and universities user and verify, if the location information of user is colleges and universities' range
It is interior, then it can pass through verifying.
Step S70, the terminal obtain the program request platform end group and wait signing ground in the on-demand assets of the target video stream
Location;
Above-mentioned, on-demand assets address to be signed authenticates address for the blank that program request platform end provides, fills out wherein for terminal
Enter information, and then program request platform end carries out the authentication of uniqueness to filling information.The on-demand assets address to be signed of terminal filling
In information do not need to be saved at platform end, only need to play the role of carry out provisional authentication.
The on-demand assets address to be signed is written in the user's signature by step S80, the terminal;One is generated for described
The resource on-demand request of target video stream, and the resource on-demand request is sent to program request platform end.
Above-mentioned, user's signature is written in blank authentication address in terminal, and claims a resource for being directed to target video stream
On-demand request, and send this request to program request platform end.In the present embodiment, terminal is identified and is tested to the identity of user
Card inserts user's signature in blank authentication address after being verified, and blank authentication address is what program request platform end provided
Address, after user's signature is written terminal, program request platform end can get the information of write-in by the address in real time.Meanwhile
The resource on-demand request that terminal is proposed is sent to platform end, and the authentication of terminal is acted to trigger platform end.
In another embodiment, the step S60, " is verified to the user information in the logging request
Afterwards, the terminal constructs user's signature according to the user information " after, further includes:
Step S90, program request platform end generate the first public key and the first private key;Also, by first public key to institute
State terminal transmission;Wherein, the terminal is after receiving first public key, by first public key to the user's signature into
Row encryption;
In the present embodiment, the interaction data between terminal and platform end is added using rivest, shamir, adelman
It is close, thus safety when improving data interaction.Based on rivest, shamir, adelman, platform end generates a pair of of code key, including first
Public key and the first private key;First public key is for encrypting, and the first private key is for decrypting.Platform sends the first public key to terminal,
Sending method can be point-to-point transmission, or the form of broadcast, since public key is Encryption Tool, so public key is let out
Dew will not influence the safety of data.After terminal receives the first public key, user's signature is encrypted using the public key, from
And realize the ciphering process in rivest, shamir, adelman.
The step S80, " the on-demand assets address to be signed is written in the user's signature by the terminal;Generate a needle
It is sent to the resource on-demand request of the target video stream, and by the resource on-demand request to program request platform end "
Include:
Step S81, the terminal will be written the program request by the user's signature after first public key encryption and provide
Source address to be signed, generate one be directed to the target video stream the resource on-demand request, and by the resource on-demand request to
Program request platform end is sent;
In turn, it in the authentication address for the blank that terminal provides encrypted user's signature write-in platform, is received in platform
When to the data, the safety of data interaction ensure that.
The step the S20, " temporal cache of program request platform end terminal according to the resource program request request
Session record, and obtain the user of the user in on-demand assets corresponding with target video stream address to be signed
After signature ", further includes:
Step S100, program request platform end are solved using the user's signature after first private key pair encryption
It is close;
Step S110, if successful decryption, the user's signature after being decrypted, in order to according to the temporal cache
Session record and the user's signature, authenticate the terminal.
Above-mentioned, platform after signing address, is carried out for wherein in the on-demand assets after receiving terminal and carrying out write-in information
The extraction of user's signature, that is, the user's signature after passing through the first private key pair encryption corresponding with the first public key saved are solved
It is close, to obtain user's signature after successful decryption.
The decrypting process is also simultaneously the authentication process of the identity for terminal, because the first public key and the first private key are one
To the code key with incidence relation, if do not corresponded to, can not decrypt.When decrypting failure, then determine that terminal authentication fails, i.e.,
Identity uniqueness authentication error can control terminal display to return to the login interface of user, and prompt failed authentication.
The step S30, " program request platform end is recorded according to the temporal cache session and the user's signature,
The terminal is authenticated " include:
Step S31, program request platform end confirm whether the application duration of the user's signature meets preset time rule;
Above-mentioned, each user's signature has a timeliness, which is limited by preset time rule, for example,
Preset time rule is defined as 10 minutes, the no longer effective property of the overtime then user's signature, so needing to first confirm that user's signature
Timeliness confirmed.
Step S32 obtains the terminal if the application duration of the user's signature meets the preset time rule
Current session, and confirm whether the current session is the current session corresponding with the user's signature;
Step S33 judges if the current session is the current session corresponding with the user's signature
Whether the current session is consistent with temporal cache session record;
Step S34 determines the terminal if the current session and temporal cache session record is consistent
Pass through authentication.
Step S35 determines the end if the current session and temporal cache session records inconsistent
End does not pass through authentication.
In addition, being updated if the current session is not the current session corresponding with the user's signature
The temporal cache session record.
Session is the connection with terminal and platform end and the time domain caching record generated, when playing or the end of connection
End changes, then Session can change in real time, so the uniqueness between Session characterization terminal.The present embodiment
In, a side of the platform end as video-on-demand platform service, to prevent the terminal in addition to specified terminal from carrying out stealing chain broadcasting,
Define the Session caching of the terminal connected for the first time be it is legal, other pass through the link or address or other modes access
Terminal causes Session to change, and will be determined as illegal.
After confirmation user's signature has timeliness, needs to confirm Session, that is, judge current Session
Whether with the user's signature there is corresponding relationship, if having corresponding relationship, can enter and further determine.That is, into one
Step judges whether current Session is to record unanimously with temporal cache session, judges to connect if inconsistent
Connect variation, it is possible to occur to steal chain phenomenon.In the present embodiment, by the way that " whether current Session and the user's signature of terminal are opposite
Answer ", and " whether current Session records consistent with temporal cache session " two judgements, to confirm terminal
Permission is connected, the correctness of the confirmation for terminal identity uniqueness is substantially increased, improves safety.
In addition, " program request platform end confirms whether the application duration of the user's signature meets preset time described
After rule ", further includes:
If the application duration of the user's signature does not meet the preset time rule, determine that the terminal does not pass through mirror
Power;
The step S31, " if the application duration of the user's signature meets preset time rule, obtain described in
The current session of terminal, and confirm whether the current session is corresponding with the user's signature described current
After session ", further includes:
Step S36, the current session are not the current sessions corresponding with the user's signature, then described
Program request platform end updates the corresponding temporal cache session record of the terminal, and the temporal cache session is recorded and is made
For current session, also, after confirming that current session is consistent with the temporal cache session record, described in judgement
Terminal passes through authentication.
After determining that terminal does not pass through authentication, then determines that terminal authentication fails, i.e. identity uniqueness authentication error, can control
Terminal display returns to the login interface of user, and prompts failed authentication.
Embodiment 3:
Referring to Fig. 6, third embodiment of the invention provides a kind of authentication order method based on program request platform end, based on above-mentioned
First embodiment shown in Fig. 2, the step S40 " program request platform end will target corresponding with the resource on-demand request
Video flowing is played out by the front end player of the terminal " include:
Step S41, program request platform end record the corresponding temporal cache session of the terminal to the end
End is sent, and obtains the second public key that the terminal generates after through authentication;
Step S42, program request platform end encrypt target video stream by second public key, also, will add
The front end player that the target video after close flows to the terminal is sent;Wherein, the terminal utilizes and second public affairs
Corresponding second private key of key decrypts the encrypted target video stream, and by the front end player to decryption after
The target video stream play out.
The user's signature includes user's id information, timestamp and login age information.
Above-mentioned, session record in temporal cache has terminal unforgeable, the uniqueness of provable terminal, in this reality
It applies in example, to ensure the safety in data stream transmission process, target data stream is encrypted by rivest, shamir, adelman
And decryption, substantially increase the safety of data flow.
Above-mentioned, temporal cache session is recorded as the information that platform end is sent to terminal, in turn, according to the unique information,
Terminal generates a pair of of code key, as the second public key and the second private key, the two after receiving temporal cache session record
It is corresponding, wherein the second public key is Encryption Tool, and the second private key is decoding tool.After program request platform termination receives the second public key,
The video flowing for treating sending is encrypted, and is sent to terminal, and terminal passes through the second of reservation after receiving target video stream
Private key carries out the decryption to target video stream, thus the target video stream after being decrypted, so as to further be passed through
The broadcasting of leading portion player.In the present embodiment, by rivest, shamir, adelman, encryption and decryption are realized to target video stream,
To in the high data interaction scene of security requirement, substantially increase the privacy of data transmission, data is prevented and have leaked
Caused by influence for safety.
Embodiment 4:
In addition, method provided by order to better illustrate the present invention, provides in the present embodiment a kind of based on program request platform
The authentication order method at end includes the following:
Application scenarios in the present embodiment are, under the scene that SaaS platform uses, reach by authorization terminal, program request program request
The purpose of platform end resource.
Firstly, terminal user passes through terminal traffic system, during the SasS service using program request platform end, in program request
Order program data is generated on the platform at platform end.Then, the blank that program request platform end provides on-demand assets authenticates list to terminal, by end
The user's signature of end using terminal submits to program request platform end after filling in.After program request platform end receives, the label of decryption verification user
Name information distributes interim secret key pair, for encrypting program request video flowing if correctly, terminal obtains the Session of user.
In the present embodiment, program request platform end does not need the user account information of storage terminal, it is only necessary to and cache user ID is right
In the case that user information is sensitive, do not have to worry that user information is obtained by program request platform end, collected.
Since user Session has terminal unforgeable, after user's signature and Session are bound, terminal according to
The current Session that platform end issues generates interim secret key pair (the second public key and the second private key), and the second public key is sent to platform
Encrypted video stream is held, the second private key is returned to front end player and retained, carried out by player based on private key video flowing solution by terminal
It is close.
It is terminal traffic process figure refering to Fig. 7.By following steps, user's signature is written to program request and provided by the terminal
In the blank authentication address in source, program request platform end operation system is submitted in waiting.Specifically comprise the following steps:
Step 1, user log in terminal system;
Step 2, after logining successfully, terminal background system structuring user's signature;It (obtains program request platform end to be generated according to terminal
The first public key)
Step 3 uses the first public key encryption user's signature;
Step 4 obtains on-demand assets address;
Step 5 fills in the signature after user encryption to program request address;
It is program request platform end business process map refering to Fig. 8.By following steps, after program request platform end receives request, decryption
It verifies user's signature and using terminal and the second public key and the second private key in interim secret key pair is produced according to Session, encrypt,
Decrypt the process of order video.It specifically includes as follows:
Step 1, program request platform end backstage receive on-demand assets request;
Step 2 is signed with the first private key decrypted user of preservation;
If step 3, decryption failure, return to terminal login page;The timeliness of user is verified if successful decryption;
If step 4, signature timeliness are out of date, terminal login page is returned;If timeliness is not out of date, check current
Whether Session's is corresponding with user's signature, verifies legitimacy;
If step 6, current Session are not corresponded to, temporal cache session record is updated;If in correspondence with each other, sentenced
Whether the current Session that breaks records consistent with temporal cache Session;
Step 7, if it is inconsistent, return terminal login page;If consistent, pass through authentication;
Step 8, by the way that current Session is sent to terminal after authentication, wherein terminal is generated according to current Session
Interim secret key pair (the second public key and the second private key), and the second public key is sent to program request platform end;
Step 9, with the second public key encryption order video stream;
Encrypted video flowing is passed to front end player by step 10;
Step 11, terminal front end player using the second private key decryption video flowing after play;
Refering to Fig. 9, for the functional frame composition based on the corresponding device of the present embodiment method, the module of main composition includes:
Code key management service: issuing, verifying for code key is provided;
Terminal system: end user logs business;
Program request platform end system: the program request authentication for providing blank is single, verifies program request permission;
Recording order service: encryption program request video flowing;
Video recording storage: video file storage;
Video recording is recorded: the Video data that cloud video recording terminal generates;
Web terminal: web player;
1. generating the signature of terminal user, and the address of signature write-in on-demand assets according to Fig. 7 terminal traffic process
In.The program request platform end operation flow of Fig. 2 adds the program request address decryption verification after signature using signing messages after being verified
Close order video stream.Change method to be suitble to use in SaaS platform scene, terminal accesses SaaS platform, in program request platform end platform
Generate data, resource.
2. for on-demand assets by being the first step after verifying, second is to Session according to the business process map of Fig. 8
Maintenance and update distribute interim secret key pair, and third portion is to be encrypted using interim secret key pair to video flowing, and the 4th step is Web
Video flowing is decrypted and is played in front end.Because of the characteristic that there is Session terminal can not forge, therefore " user's signature-can be made
The interim secret key pair of Session- " combination achievees the purpose that on-demand assets authentication, encryption, decryption viewing
In addition, the present invention also provides a kind of authentication on-demand devices based on program request platform end with reference to Figure 10, comprising:
Receiving module 10, for after user's registration terminal, program request platform end to obtain the terminal and is directed to target video stream
Resource on-demand request;
Module 20 is obtained, for the interim slow of program request platform end terminal according to the resource program request request
Session record is deposited, and obtains the use of the user in on-demand assets corresponding with target video stream address to be signed
Family signature;
Authentication module 30 is signed for program request platform end according to temporal cache session record and the user
Name, authenticates the terminal;
Playing module 40, for when the terminal passes through authentication, then program request platform end will be with the resource program request
Corresponding target video stream is requested to play out by the front end player of the terminal.
In addition, the computer equipment includes terminal and program request platform end the present invention also provides a kind of computer equipment;Its
In, the terminal includes first memory and first processor;Program request platform end includes second memory and second
Processor;
The first memory and the second memory are used to store the authentication program request program based on program request platform end,
The first processor and the second memory run the authentication program request program based on program request platform end so that described
Computer equipment executes the authentication order method as described above based on program request platform end.
In addition, being stored on the computer readable storage medium the present invention also provides a kind of computer readable storage medium
There is the authentication program request program based on program request platform end, when the authentication program request program based on program request platform end is executed by processor
Realize the authentication order method as described above based on program request platform end.
The serial number of the above embodiments of the invention is only for description, does not represent the advantages or disadvantages of the embodiments.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases
The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art
The part contributed out can be embodied in the form of software products, which is stored in one as described above
In storage medium (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that terminal device (it can be mobile phone,
Computer, server or network equipment etc.) execute method described in each embodiment of the present invention.The above is only of the invention
Preferred embodiment is not intended to limit the scope of the invention, all using made by description of the invention and accompanying drawing content
Equivalent structure or equivalent flow shift is applied directly or indirectly in other relevant technical fields, and is similarly included in this hair
In bright scope of patent protection.
Claims (10)
1. a kind of authentication order method based on program request platform end is applied between terminal and program request platform end, which is characterized in that
Include:
After user logs in the terminal, program request platform end receives the terminal and asks for the resource program request of target video stream
It asks;
The temporal cache session of program request platform end terminal according to the resource program request request is recorded, and
Obtain the user's signature of the user in on-demand assets corresponding with target video stream address to be signed;
Program request platform end reflects to the terminal according to temporal cache session record and the user's signature
Power;
If the terminal, by authentication, program request platform end will target video circulation corresponding with the resource on-demand request
The front end player for crossing the terminal plays out.
2. the authentication order method as described in claim 1 based on program request platform end, which is characterized in that described " to be logged in user
After the terminal, program request platform end receives the resource on-demand request that the terminal is directed to target video stream " before, also wrap
It includes:
The terminal receives the logging request of user;
After being verified to the user information in the logging request, the terminal constructs user according to the user information and signs
Name;
The terminal obtains the program request platform end group in the on-demand assets address to be signed of the target video stream;
The on-demand assets address to be signed is written in the user's signature by the terminal;One is generated for the target video stream
The resource on-demand request, and the resource on-demand request is sent to program request platform end.
3. the authentication order method as claimed in claim 2 based on program request platform end, which is characterized in that described " to be stepped on to described
After user information in record request is verified, the terminal constructs user's signature according to the user information " after, also wrap
It includes:
Program request platform end generates the first public key and the first private key;Also, first public key is sent to the terminal;Its
In, the terminal encrypts the user's signature by first public key after receiving first public key;
It is described that " the on-demand assets address to be signed is written in the user's signature by the terminal;One is generated to regard for the target
The resource on-demand request of frequency stream, and the resource on-demand request is sent to program request platform end " include:
The on-demand assets address to be signed will be written by the user's signature after first public key encryption in the terminal, raw
The resource on-demand request for being directed to the target video stream at one, and by the resource on-demand request to program request platform end
It sends;
Described " the temporal cache session of program request platform end terminal according to the resource program request request is recorded,
And obtain the user's signature of the user in on-demand assets corresponding with target video stream address to be signed " after, also
Include:
Program request platform end is decrypted using the user's signature after first private key pair encryption;
If successful decryption, the user's signature after being decrypted, in order to according to temporal cache session record and
The user's signature authenticates the terminal.
4. the authentication order method as claimed in claim 3 based on program request platform end, which is characterized in that described " program request is flat
End authenticates the terminal according to temporal cache session record and the user's signature " include:
Program request platform end confirms whether the application duration of the user's signature meets preset time rule;
If the application duration of the user's signature meets the preset time rule, the current session of the terminal is obtained,
And confirm whether the current session is the current session corresponding with the user's signature;
If the current session is the current session corresponding with the user's signature, judge described current
Whether session is consistent with temporal cache session record;
If the current session and temporal cache session record is consistent, determine that the terminal passes through authentication;
If the current session and temporal cache session records inconsistent, determine that the terminal does not pass through mirror
Power.
5. the authentication order method as claimed in claim 4 based on program request platform end, which is characterized in that described " program request is flat
End confirms whether the application duration of the user's signature meets preset time rule " after, further includes:
If the application duration of the user's signature does not meet the preset time rule, determine that the terminal does not pass through authentication;
It is described " if the application duration of the user's signature meets the preset time rule, to obtain the current of the terminal
Session, and after confirming whether the current session is the current session " corresponding with the user's signature,
Further include:
The current session is not the current session corresponding with the user's signature, then program request platform end is more
The newly corresponding temporal cache session record of the terminal, and by temporal cache session record as current
Session, also, after confirming that current session is consistent with the temporal cache session record, determine that the terminal is logical
Cross authentication.
6. the authentication order method as described in claim 1 based on program request platform end, which is characterized in that described " program request is flat
End plays out target video stream corresponding with the resource on-demand request by the front end player of the terminal " packet
It includes:
The corresponding temporal cache session of the terminal is recorded to the terminal and is sent by program request platform end, and
Obtain the second public key that the terminal generates after through authentication;
Program request platform end encrypts target video stream by second public key, also, by the encrypted mesh
The front end player that mark video flows to the terminal is sent;Wherein, the terminal utilizes and second public key corresponding second
Private key decrypts the encrypted target video stream, and is regarded by the front end player to the target after decryption
Frequency stream plays out.
7. the authentication order method based on program request platform end as described in claim any one of 1-6, which is characterized in that the user
Signature includes User ID information, timestamp and login age information.
8. a kind of authentication on-demand device based on program request platform end characterized by comprising
Receiving module, for after user's registration terminal, program request platform end to obtain the resource that the terminal is directed to target video stream
On-demand request;
Obtain module, the temporal cache for program request platform end terminal according to the resource program request request
Session record, and obtain the user of the user in on-demand assets corresponding with target video stream address to be signed
Signature;
Authentication module, for program request platform end according to temporal cache session record and the user's signature, to institute
Terminal is stated to be authenticated;
Playing module, for when the terminal passes through authentication, then program request platform end will be with the resource on-demand request pair
The target video stream answered is played out by the front end player of the terminal.
9. a kind of computer equipment, which is characterized in that the computer equipment includes terminal and program request platform end;Wherein, described
Terminal includes first memory and first processor;Program request platform end includes second memory and second processor;
The first memory and the second memory are used to store the authentication program request program based on program request platform end, described
First processor and the second memory run the authentication program request program based on program request platform end so that the calculating
Machine equipment executes the authentication order method based on program request platform end as described in any one of claim 1-7.
10. a kind of computer readable storage medium, which is characterized in that be stored on the computer readable storage medium based on point
The authentication program request program at platform end is broadcast, is realized when the authentication program request program based on program request platform end is executed by processor as weighed
Benefit requires the authentication order method based on program request platform end described in any one of 1-7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811503575.XA CN109618194B (en) | 2018-12-10 | 2018-12-10 | Authentication on-demand method and device based on-demand platform end |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811503575.XA CN109618194B (en) | 2018-12-10 | 2018-12-10 | Authentication on-demand method and device based on-demand platform end |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109618194A true CN109618194A (en) | 2019-04-12 |
CN109618194B CN109618194B (en) | 2021-05-11 |
Family
ID=66008778
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811503575.XA Active CN109618194B (en) | 2018-12-10 | 2018-12-10 | Authentication on-demand method and device based on-demand platform end |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109618194B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110769287A (en) * | 2019-11-07 | 2020-02-07 | 中影环球(北京)科技有限公司 | Counting method based on cinema on-demand system |
CN113973116A (en) * | 2020-07-22 | 2022-01-25 | 拉扎斯网络科技(上海)有限公司 | Resource management method, resource propagation method, device, system, equipment and medium |
Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101005364A (en) * | 2006-01-16 | 2007-07-25 | 中兴通讯股份有限公司 | Medium service system |
CN101202893A (en) * | 2007-06-27 | 2008-06-18 | 深圳市同洲电子股份有限公司 | Method, system for preventing non-authorization user from obtaining service and video server |
CN101668016A (en) * | 2009-09-30 | 2010-03-10 | 华为技术有限公司 | Authentication method and device |
CN101754215A (en) * | 2008-12-01 | 2010-06-23 | 华为技术有限公司 | Authentication method and system |
CN101860521A (en) * | 2009-04-13 | 2010-10-13 | 中国联合网络通信集团有限公司 | Authentication treatment method and system |
US20120117639A1 (en) * | 2010-11-09 | 2012-05-10 | International Business Machines Corporation | Remote authentication based on challenge-response using digital certificates |
CN103023638A (en) * | 2011-09-22 | 2013-04-03 | 阿里巴巴集团控股有限公司 | Identity verification method and device based on mobile terminal |
CN103634265A (en) * | 2012-08-20 | 2014-03-12 | 腾讯科技(深圳)有限公司 | Method, device and system for security authentication |
US20160019536A1 (en) * | 2012-10-17 | 2016-01-21 | Royal Bank Of Canada | Secure processing of data |
US20160224799A1 (en) * | 2015-02-03 | 2016-08-04 | Palo Alto Research Center Incorporated | Access control framework for information centric networking |
CN106487812A (en) * | 2016-12-02 | 2017-03-08 | 努比亚技术有限公司 | A kind of method for authenticating and device |
CN107079038A (en) * | 2013-12-31 | 2017-08-18 | 谷歌公司 | For providing method, system and medium to the access control of computing device |
WO2018053456A1 (en) * | 2016-09-19 | 2018-03-22 | Ebay Inc. | Multi-session authentication |
US20180124049A1 (en) * | 2015-10-08 | 2018-05-03 | Feitian Technologies Co., Ltd. | Method and device for authenticating based on authenticating device |
CN108809988A (en) * | 2018-06-14 | 2018-11-13 | 北京中电普华信息技术有限公司 | A kind of authentication method and system of request |
-
2018
- 2018-12-10 CN CN201811503575.XA patent/CN109618194B/en active Active
Patent Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101005364A (en) * | 2006-01-16 | 2007-07-25 | 中兴通讯股份有限公司 | Medium service system |
CN101202893A (en) * | 2007-06-27 | 2008-06-18 | 深圳市同洲电子股份有限公司 | Method, system for preventing non-authorization user from obtaining service and video server |
CN101754215A (en) * | 2008-12-01 | 2010-06-23 | 华为技术有限公司 | Authentication method and system |
CN101860521A (en) * | 2009-04-13 | 2010-10-13 | 中国联合网络通信集团有限公司 | Authentication treatment method and system |
CN101668016A (en) * | 2009-09-30 | 2010-03-10 | 华为技术有限公司 | Authentication method and device |
US20120117639A1 (en) * | 2010-11-09 | 2012-05-10 | International Business Machines Corporation | Remote authentication based on challenge-response using digital certificates |
CN103023638A (en) * | 2011-09-22 | 2013-04-03 | 阿里巴巴集团控股有限公司 | Identity verification method and device based on mobile terminal |
CN103634265A (en) * | 2012-08-20 | 2014-03-12 | 腾讯科技(深圳)有限公司 | Method, device and system for security authentication |
US20160019536A1 (en) * | 2012-10-17 | 2016-01-21 | Royal Bank Of Canada | Secure processing of data |
CN107079038A (en) * | 2013-12-31 | 2017-08-18 | 谷歌公司 | For providing method, system and medium to the access control of computing device |
US20160224799A1 (en) * | 2015-02-03 | 2016-08-04 | Palo Alto Research Center Incorporated | Access control framework for information centric networking |
US20180124049A1 (en) * | 2015-10-08 | 2018-05-03 | Feitian Technologies Co., Ltd. | Method and device for authenticating based on authenticating device |
WO2018053456A1 (en) * | 2016-09-19 | 2018-03-22 | Ebay Inc. | Multi-session authentication |
CN106487812A (en) * | 2016-12-02 | 2017-03-08 | 努比亚技术有限公司 | A kind of method for authenticating and device |
CN108809988A (en) * | 2018-06-14 | 2018-11-13 | 北京中电普华信息技术有限公司 | A kind of authentication method and system of request |
Non-Patent Citations (1)
Title |
---|
杨小东 等: "基于无证书签名的云端跨域身份认证方案", 《计算机工程》 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110769287A (en) * | 2019-11-07 | 2020-02-07 | 中影环球(北京)科技有限公司 | Counting method based on cinema on-demand system |
CN113973116A (en) * | 2020-07-22 | 2022-01-25 | 拉扎斯网络科技(上海)有限公司 | Resource management method, resource propagation method, device, system, equipment and medium |
Also Published As
Publication number | Publication date |
---|---|
CN109618194B (en) | 2021-05-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106850699B (en) | A kind of mobile terminal login authentication method and system | |
CN110324276B (en) | Method, system, terminal and electronic device for logging in application | |
CN108965230B (en) | Secure communication method, system and terminal equipment | |
CN104980477B (en) | Data access control method and system under cloud storage environment | |
CN107347068A (en) | Single-point logging method and system, electronic equipment | |
CN107508796A (en) | A kind of data communications method and device | |
CN107948736A (en) | A kind of audio and video preservation of evidence method and system | |
CN106790183A (en) | Logging on authentication method of calibration, device | |
CN106789897B (en) | Digital certificate authentication method and system for application program for mobile terminal | |
CN101262342A (en) | Distributed authorization and validation method, device and system | |
KR20130109322A (en) | Apparatus and method to enable a user authentication in a communication system | |
CN110365486A (en) | A kind of certificate request method, device and equipment | |
CN114553441B (en) | Electronic contract signing method and system | |
CN109618194A (en) | A kind of authentication order method and its device based on program request platform end | |
CN112039878A (en) | Equipment registration method and device, computer equipment and storage medium | |
CN109618313A (en) | A kind of vehicle-mounted Bluetooth equipment and attaching method thereof, system | |
CN108462671A (en) | A kind of authentication protection method and system based on reverse proxy | |
CN110166471A (en) | A kind of portal authentication method and device | |
CN109495458A (en) | A kind of method, system and the associated component of data transmission | |
CN109802927B (en) | Security service providing method and device | |
CN109460993A (en) | Information processing method, device and storage medium | |
CN108123917B (en) | Method and equipment for updating authentication voucher of terminal of Internet of things | |
CN110113339A (en) | Elevator information display terminal letter of identity acquisition methods and device | |
CN115604862A (en) | Video streaming transmission method and system | |
CN107682380A (en) | A kind of method and device of cross-certification |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20200804 Address after: Room 903, South Block, Yuanxing science and technology building, Xili street, Nanshan District, Shenzhen City, Guangdong Province Applicant after: Bell hekong (Shenzhen) Technology Co., Ltd Address before: 518000 Guangdong city of Shenzhen province Nanshan District Xili Street Song Ping mountain road 1 Lite Technology Building South 902 Applicant before: SHENZHEN BELL CREATIVE SCIENCE AND EDUCATION Co.,Ltd. |
|
GR01 | Patent grant | ||
GR01 | Patent grant |