CN109788348A - A kind of anti-intrusion method based on Intelligent set top box - Google Patents

A kind of anti-intrusion method based on Intelligent set top box Download PDF

Info

Publication number
CN109788348A
CN109788348A CN201811482613.8A CN201811482613A CN109788348A CN 109788348 A CN109788348 A CN 109788348A CN 201811482613 A CN201811482613 A CN 201811482613A CN 109788348 A CN109788348 A CN 109788348A
Authority
CN
China
Prior art keywords
user
information
top box
human body
region
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811482613.8A
Other languages
Chinese (zh)
Inventor
汪文清
陈浩
张立生
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Anhui Zhanqian Technology Co Ltd
Original Assignee
Anhui Zhanqian Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Anhui Zhanqian Technology Co Ltd filed Critical Anhui Zhanqian Technology Co Ltd
Priority to CN201811482613.8A priority Critical patent/CN109788348A/en
Publication of CN109788348A publication Critical patent/CN109788348A/en
Pending legal-status Critical Current

Links

Landscapes

  • Telephonic Communication Services (AREA)

Abstract

The invention discloses a kind of anti-intrusion methods based on Intelligent set top box, comprising: when user registers set-top box for the first time, set-top box distributes a monomer region chain automatically, and automatically generates User ID and distribute access right to User ID;Region catenary system collects subscriber phone number information, contact name information, human body biological characteristics verification information, User ID and access right since first monomer region chain, and generates permission tree by root node of User ID;When the landing request information for obtaining User ID and the User ID, human body biological characteristics verification information is filtered out from the region catenary system of the User ID, is compared with user's current human's signature verification information.The time of User ID and registration that the present invention is generated using registration automatically generates monomer region chain, it is that root node generates permission tree using User ID, so that each User ID encryption is high, avoid set-top box by malicious intrusions, authority information is also avoided to be used by malice distribution.

Description

A kind of anti-intrusion method based on Intelligent set top box
Technical field
The present invention relates to field of set-top, especially a kind of anti-intrusion method based on Intelligent set top box.
Background technique
Currently, cable digital TV set-top box is all the demand customized development according to each operator, enterprise during this Need to put into a large amount of manpower and material resources.But when set-top box shipment to locality after, but have illegal businessman by hardware shovelling plate, copy it is soft The mode of part comes bootlegging, sale set-top box, brings heavy losses to regular enterprise in this way, also gives the user of radio and TV operator Management work brings difficulty.
The start-up course of existing set-top box are as follows: set-top-box opening, start-up loading software;Load software check set-top box principal series Whether data of uniting are complete, normal to start if completely, loading set-top-box system;If data are imperfect, system is hung up, Etc. to be repaired.From the Booting sequence it is found that whether set-top box during startup, can only examine main system data by accident now Damage, and for entire software systems whether be duplication version there is no distinguishing ability, therefore can not prevent set-top box software without Method duplication.Current risk prevention instruments can only be forbidden and hit by legal channe, but remain incessant after repeated prohibition.
Summary of the invention
It is an object of the invention to overcome the deficiencies of the prior art and provide a kind of anti-intrusion sides based on Intelligent set top box The time of method, User ID and registration that the application is generated using user's registration automatically generates monomer region chain, utilizes User ID Permission tree is generated for root node to avoid set-top box by malicious intrusions so that each User ID encryption is high, also avoid authority information It is used by malice distribution.
The purpose of the present invention is achieved through the following technical solutions:
A kind of anti-intrusion method based on Intelligent set top box, comprising the following steps:
When user registers set-top box for the first time, set-top box distributes a monomer region chain automatically, and monomer region chain association user is filled in Phone number information, name of contact person information and human body biological characteristics verification information, and automatically generate User ID and to Family ID distributes access right;
Region catenary system is since first monomer region chain, according to the order traversal whole region chain of region chain arrangement, and according to Traversing result collects subscriber phone number information, contact name information, human body biological characteristics verification information, User ID and use Permission, and permission tree is generated by root node of User ID;
When the landing request information for obtaining User ID and the User ID, human body is filtered out from the region catenary system of the User ID Biological characteristic validation information is compared, if comparing successfully, after enabling user with user's current human's signature verification information Continuous operation, if authentication failed, exits user's login interface.
Preferably, when user registers set-top box for the first time, set-top box distributes a monomer region chain automatically, and monomer region chain closes Phone number information, name of contact person information and the human body biological characteristics verification information that combination family is filled in, comprising:
When user registers for the first time, fill in phone number information, name of contact person, user's pet name, using duration and typing human body Biological characteristic validation information, the human body biological characteristics verification information include that human body face information, somatic fingerprint information, human body are quiet Arteries and veins information and iris information;
Dynamic password is obtained by association mobile phone, and secondary test is carried out by typing human body biological characteristics verification information again Card.
Preferably, region catenary system is successively linked according to the monomer region chain generation time, and each region chain includes producing Raw time, current region root cryptographic Hash, the cryptographic Hash in previous region and user search for content and user watches content information.
Preferably, when the landing request information for obtaining User ID and the User ID, from the region catenary system of the User ID In filter out in human body biological characteristics verification information, further includes:
When the landing request information for obtaining User ID and the User ID, user is filtered out from the region catenary system of the User ID Phone number information, to the association mobile phone of user send dynamic verification code, carry out dynamic verification code verifying compare.
Preferably, when the landing request information for obtaining User ID and the User ID, from the region catenary system of the User ID In filter out human body biological characteristics verification information, further includes:
Voice print verification information is associated in monomer region chain, when the landing request information for obtaining User ID and the User ID, from The voiceprint that human body is filtered out in the region catenary system of the User ID, obtain the voiceprint of current voiceprint and storage into Row compares, and compares successfully, then allows to log in, interface of otherwise logging off.
The beneficial effects of the present invention are: the time of User ID and registration that the present invention is generated using user's registration gives birth to automatically At monomer region chain, permission tree is generated for root node using User ID and avoids set-top box quilt so that each User ID encryption is high Malicious intrusions also avoid authority information from being used by malice distribution.
Detailed description of the invention
Fig. 1 is flow chart of the method for the present invention.
Specific embodiment
Technical solution of the present invention is described in further detail with reference to the accompanying drawing, but protection scope of the present invention is not limited to It is as described below.
A kind of anti-intrusion method based on Intelligent set top box please refers to shown in attached drawing 1, comprising the following steps:
When S101, user register set-top box for the first time, set-top box distributes a monomer region chain, monomer region chain association user automatically Phone number information, name of contact person information and the human body biological characteristics verification information filled in, and automatically generate User ID and Access right is distributed to User ID;
S102, region catenary system traverse whole region chain since first monomer region chain, according to the order of region chain arrangement, and According to traversing result, collect subscriber phone number information, contact name information, human body biological characteristics verification information, User ID and Access right, and permission tree is generated by root node of User ID;
S103, when the landing request information for obtaining User ID and the User ID, screened from the region catenary system of the User ID Human body biological characteristics verification information out is compared with user's current human's signature verification information, if comparing successfully, enables use The subsequent operation at family exits user's login interface if authentication failed.
Preferably, when user registers set-top box for the first time, set-top box distributes a monomer region chain automatically, and monomer region chain closes Phone number information, name of contact person information and the human body biological characteristics verification information that combination family is filled in, comprising:
When user registers for the first time, fill in phone number information, name of contact person, user's pet name, using duration and typing human body Biological characteristic validation information, the human body biological characteristics verification information include that human body face information, somatic fingerprint information, human body are quiet Arteries and veins information and iris information;
Dynamic password is obtained by association mobile phone, and secondary test is carried out by typing human body biological characteristics verification information again Card.
Preferably, region catenary system is successively linked according to the monomer region chain generation time, and each region chain includes producing Raw time, current region root cryptographic Hash, the cryptographic Hash in previous region and user search for content and user watches content information.
Preferably, when the landing request information for obtaining User ID and the User ID, from the region catenary system of the User ID In filter out in human body biological characteristics verification information, further includes:
When the landing request information for obtaining User ID and the User ID, user is filtered out from the region catenary system of the User ID Phone number information, to the association mobile phone of user send dynamic verification code, carry out dynamic verification code verifying compare.
Preferably, when the landing request information for obtaining User ID and the User ID, from the region catenary system of the User ID In filter out human body biological characteristics verification information, further includes:
Voice print verification information is associated in monomer region chain, when the landing request information for obtaining User ID and the User ID, from The voiceprint that human body is filtered out in the region catenary system of the User ID, obtain the voiceprint of current voiceprint and storage into Row compares, and compares successfully, then allows to log in, interface of otherwise logging off.
It should be noted that the time of User ID and registration that the present invention is generated using user's registration automatically generates monomer Region chain generates permission tree using User ID for root node and avoids set-top box from maliciously being entered so that each User ID encryption is high It invades, authority information is also avoided to be used by malice distribution.
A specific embodiment of the invention above described embodiment only expresses, the description thereof is more specific and detailed, but simultaneously Limitations on the scope of the patent of the present invention therefore cannot be interpreted as.It should be pointed out that for those of ordinary skill in the art For, without departing from the inventive concept of the premise, various modifications and improvements can be made, these belong to guarantor of the invention Protect range.

Claims (5)

1. a kind of anti-intrusion method based on Intelligent set top box, which comprises the following steps:
When user registers set-top box for the first time, set-top box distributes a monomer region chain automatically, and monomer region chain association user is filled in Phone number information, name of contact person information and human body biological characteristics verification information, and automatically generate User ID and to Family ID distributes access right;
Region catenary system is since first monomer region chain, according to the order traversal whole region chain of region chain arrangement, and according to Traversing result collects subscriber phone number information, contact name information, human body biological characteristics verification information, User ID and use Permission, and permission tree is generated by root node of User ID;
When the landing request information for obtaining User ID and the User ID, human body is filtered out from the region catenary system of the User ID Biological characteristic validation information is compared, if comparing successfully, after enabling user with user's current human's signature verification information Continuous operation, if authentication failed, exits user's login interface.
2. a kind of anti-intrusion method based on Intelligent set top box according to claim 1, which is characterized in that user registers for the first time When set-top box, set-top box distributes a monomer region chain automatically, phone number information that monomer region chain association user is filled in, connection It is people's name information and human body biological characteristics verification information, comprising:
When user registers for the first time, fill in phone number information, name of contact person, user's pet name, using duration and typing human body Biological characteristic validation information, the human body biological characteristics verification information include that human body face information, somatic fingerprint information, human body are quiet Arteries and veins information and iris information;
Dynamic password is obtained by association mobile phone, and secondary test is carried out by typing human body biological characteristics verification information again Card.
3. a kind of anti-intrusion method based on Intelligent set top box according to claim 1, which is characterized in that region catenary system root It generates the time according to monomer region chain successively to link, each region chain includes generation time, current region root cryptographic Hash, previous The cryptographic Hash in region and user search for content and user watches content information.
4. a kind of anti-intrusion method based on Intelligent set top box according to claim 1, which is characterized in that when acquisition User ID And the landing request information of the User ID, human body biological characteristics verification information is filtered out from the region catenary system of the User ID In, further includes:
When the landing request information for obtaining User ID and the User ID, user is filtered out from the region catenary system of the User ID Phone number information, to the association mobile phone of user send dynamic verification code, carry out dynamic verification code verifying compare.
5. a kind of anti-intrusion method based on Intelligent set top box according to claim 1, which is characterized in that when acquisition User ID And the landing request information of the User ID, human body biological characteristics verifying letter is filtered out from the region catenary system of the User ID Breath, further includes:
Voice print verification information is associated in monomer region chain, when the landing request information for obtaining User ID and the User ID, from The voiceprint that human body is filtered out in the region catenary system of the User ID, obtain the voiceprint of current voiceprint and storage into Row compares, and compares successfully, then allows to log in, interface of otherwise logging off.
CN201811482613.8A 2018-12-05 2018-12-05 A kind of anti-intrusion method based on Intelligent set top box Pending CN109788348A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811482613.8A CN109788348A (en) 2018-12-05 2018-12-05 A kind of anti-intrusion method based on Intelligent set top box

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811482613.8A CN109788348A (en) 2018-12-05 2018-12-05 A kind of anti-intrusion method based on Intelligent set top box

Publications (1)

Publication Number Publication Date
CN109788348A true CN109788348A (en) 2019-05-21

Family

ID=66496744

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811482613.8A Pending CN109788348A (en) 2018-12-05 2018-12-05 A kind of anti-intrusion method based on Intelligent set top box

Country Status (1)

Country Link
CN (1) CN109788348A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110830831A (en) * 2019-11-08 2020-02-21 江苏号百信息服务有限公司 Method and device for effectively protecting safety of prepaid account of IPTV set top box

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104331652A (en) * 2014-10-08 2015-02-04 无锡指网生物识别科技有限公司 Dynamic cipher generation method for electronic equipment for fingerprint and voice recognition
WO2018026883A1 (en) * 2016-08-05 2018-02-08 Chicago Mercantile Exchange Inc. Systems and methods for blockchain rule synchronization
CN107786547A (en) * 2017-09-30 2018-03-09 厦门快商通信息技术有限公司 A kind of auth method based on block chain, device and computer-readable recording medium
CN108521418A (en) * 2018-04-04 2018-09-11 广州广电运通金融电子股份有限公司 A kind of identity identifying method and system merging block chain and living things feature recognition
CN108616514A (en) * 2018-04-09 2018-10-02 吉林工程技术师范学院 A kind of region chain realizes the management method of financial transaction

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104331652A (en) * 2014-10-08 2015-02-04 无锡指网生物识别科技有限公司 Dynamic cipher generation method for electronic equipment for fingerprint and voice recognition
WO2018026883A1 (en) * 2016-08-05 2018-02-08 Chicago Mercantile Exchange Inc. Systems and methods for blockchain rule synchronization
CN107786547A (en) * 2017-09-30 2018-03-09 厦门快商通信息技术有限公司 A kind of auth method based on block chain, device and computer-readable recording medium
CN108521418A (en) * 2018-04-04 2018-09-11 广州广电运通金融电子股份有限公司 A kind of identity identifying method and system merging block chain and living things feature recognition
CN108616514A (en) * 2018-04-09 2018-10-02 吉林工程技术师范学院 A kind of region chain realizes the management method of financial transaction

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110830831A (en) * 2019-11-08 2020-02-21 江苏号百信息服务有限公司 Method and device for effectively protecting safety of prepaid account of IPTV set top box
CN110830831B (en) * 2019-11-08 2022-03-01 江苏号百信息服务有限公司 Method for effectively protecting safety of prepaid account of IPTV set top box

Similar Documents

Publication Publication Date Title
CN110213246B (en) Wide-area multi-factor identity authentication system
US20170118205A1 (en) User biological feature authentication method and system
CN111931144B (en) Unified safe login authentication method and device for operating system and service application
US8572686B2 (en) Method and apparatus for object transaction session validation
US20130047202A1 (en) Apparatus and Method for Handling Transaction Tokens
CN104320389B (en) A kind of fusion identity protection system and method based on cloud computing
CA2632590A1 (en) Method to verify the integrity of components on a trusted platform using integrity database services
CN101051908A (en) Dynamic cipher certifying system and method
CN110569658A (en) User information processing method and device based on block chain network, electronic equipment and storage medium
CN106446638A (en) Cloud computing operation system security access method and device
CN101588352B (en) Method and system for ensuring security of operating environment
CN106488452A (en) A kind of mobile terminal safety access authentication method of combination fingerprint
US10841315B2 (en) Enhanced security using wearable device with authentication system
CN109711126A (en) A kind of computer information safe management system and method
CN110740140A (en) network information security supervision system based on cloud platform
CN107733636A (en) Authentication method and Verification System
US20130047203A1 (en) Method and Apparatus for Third Party Session Validation
CN102868702A (en) System login device and system login method
CN109246133A (en) A kind of network access verifying method based on bio-identification
CN110322889A (en) A kind of personal identification method of high reliablity
CN107995227A (en) The authentication method and device of movable storage device
CN110855664A (en) Network certificate system
CN111600701B (en) Private key storage method, device and storage medium based on blockchain
CN109788348A (en) A kind of anti-intrusion method based on Intelligent set top box
CN110516427B (en) Terminal user identity authentication method and device, storage medium and computer equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20190521

WD01 Invention patent application deemed withdrawn after publication