CN109788348A - A kind of anti-intrusion method based on Intelligent set top box - Google Patents
A kind of anti-intrusion method based on Intelligent set top box Download PDFInfo
- Publication number
- CN109788348A CN109788348A CN201811482613.8A CN201811482613A CN109788348A CN 109788348 A CN109788348 A CN 109788348A CN 201811482613 A CN201811482613 A CN 201811482613A CN 109788348 A CN109788348 A CN 109788348A
- Authority
- CN
- China
- Prior art keywords
- user
- information
- top box
- human body
- region
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Telephonic Communication Services (AREA)
Abstract
The invention discloses a kind of anti-intrusion methods based on Intelligent set top box, comprising: when user registers set-top box for the first time, set-top box distributes a monomer region chain automatically, and automatically generates User ID and distribute access right to User ID;Region catenary system collects subscriber phone number information, contact name information, human body biological characteristics verification information, User ID and access right since first monomer region chain, and generates permission tree by root node of User ID;When the landing request information for obtaining User ID and the User ID, human body biological characteristics verification information is filtered out from the region catenary system of the User ID, is compared with user's current human's signature verification information.The time of User ID and registration that the present invention is generated using registration automatically generates monomer region chain, it is that root node generates permission tree using User ID, so that each User ID encryption is high, avoid set-top box by malicious intrusions, authority information is also avoided to be used by malice distribution.
Description
Technical field
The present invention relates to field of set-top, especially a kind of anti-intrusion method based on Intelligent set top box.
Background technique
Currently, cable digital TV set-top box is all the demand customized development according to each operator, enterprise during this
Need to put into a large amount of manpower and material resources.But when set-top box shipment to locality after, but have illegal businessman by hardware shovelling plate, copy it is soft
The mode of part comes bootlegging, sale set-top box, brings heavy losses to regular enterprise in this way, also gives the user of radio and TV operator
Management work brings difficulty.
The start-up course of existing set-top box are as follows: set-top-box opening, start-up loading software;Load software check set-top box principal series
Whether data of uniting are complete, normal to start if completely, loading set-top-box system;If data are imperfect, system is hung up,
Etc. to be repaired.From the Booting sequence it is found that whether set-top box during startup, can only examine main system data by accident now
Damage, and for entire software systems whether be duplication version there is no distinguishing ability, therefore can not prevent set-top box software without
Method duplication.Current risk prevention instruments can only be forbidden and hit by legal channe, but remain incessant after repeated prohibition.
Summary of the invention
It is an object of the invention to overcome the deficiencies of the prior art and provide a kind of anti-intrusion sides based on Intelligent set top box
The time of method, User ID and registration that the application is generated using user's registration automatically generates monomer region chain, utilizes User ID
Permission tree is generated for root node to avoid set-top box by malicious intrusions so that each User ID encryption is high, also avoid authority information
It is used by malice distribution.
The purpose of the present invention is achieved through the following technical solutions:
A kind of anti-intrusion method based on Intelligent set top box, comprising the following steps:
When user registers set-top box for the first time, set-top box distributes a monomer region chain automatically, and monomer region chain association user is filled in
Phone number information, name of contact person information and human body biological characteristics verification information, and automatically generate User ID and to
Family ID distributes access right;
Region catenary system is since first monomer region chain, according to the order traversal whole region chain of region chain arrangement, and according to
Traversing result collects subscriber phone number information, contact name information, human body biological characteristics verification information, User ID and use
Permission, and permission tree is generated by root node of User ID;
When the landing request information for obtaining User ID and the User ID, human body is filtered out from the region catenary system of the User ID
Biological characteristic validation information is compared, if comparing successfully, after enabling user with user's current human's signature verification information
Continuous operation, if authentication failed, exits user's login interface.
Preferably, when user registers set-top box for the first time, set-top box distributes a monomer region chain automatically, and monomer region chain closes
Phone number information, name of contact person information and the human body biological characteristics verification information that combination family is filled in, comprising:
When user registers for the first time, fill in phone number information, name of contact person, user's pet name, using duration and typing human body
Biological characteristic validation information, the human body biological characteristics verification information include that human body face information, somatic fingerprint information, human body are quiet
Arteries and veins information and iris information;
Dynamic password is obtained by association mobile phone, and secondary test is carried out by typing human body biological characteristics verification information again
Card.
Preferably, region catenary system is successively linked according to the monomer region chain generation time, and each region chain includes producing
Raw time, current region root cryptographic Hash, the cryptographic Hash in previous region and user search for content and user watches content information.
Preferably, when the landing request information for obtaining User ID and the User ID, from the region catenary system of the User ID
In filter out in human body biological characteristics verification information, further includes:
When the landing request information for obtaining User ID and the User ID, user is filtered out from the region catenary system of the User ID
Phone number information, to the association mobile phone of user send dynamic verification code, carry out dynamic verification code verifying compare.
Preferably, when the landing request information for obtaining User ID and the User ID, from the region catenary system of the User ID
In filter out human body biological characteristics verification information, further includes:
Voice print verification information is associated in monomer region chain, when the landing request information for obtaining User ID and the User ID, from
The voiceprint that human body is filtered out in the region catenary system of the User ID, obtain the voiceprint of current voiceprint and storage into
Row compares, and compares successfully, then allows to log in, interface of otherwise logging off.
The beneficial effects of the present invention are: the time of User ID and registration that the present invention is generated using user's registration gives birth to automatically
At monomer region chain, permission tree is generated for root node using User ID and avoids set-top box quilt so that each User ID encryption is high
Malicious intrusions also avoid authority information from being used by malice distribution.
Detailed description of the invention
Fig. 1 is flow chart of the method for the present invention.
Specific embodiment
Technical solution of the present invention is described in further detail with reference to the accompanying drawing, but protection scope of the present invention is not limited to
It is as described below.
A kind of anti-intrusion method based on Intelligent set top box please refers to shown in attached drawing 1, comprising the following steps:
When S101, user register set-top box for the first time, set-top box distributes a monomer region chain, monomer region chain association user automatically
Phone number information, name of contact person information and the human body biological characteristics verification information filled in, and automatically generate User ID and
Access right is distributed to User ID;
S102, region catenary system traverse whole region chain since first monomer region chain, according to the order of region chain arrangement, and
According to traversing result, collect subscriber phone number information, contact name information, human body biological characteristics verification information, User ID and
Access right, and permission tree is generated by root node of User ID;
S103, when the landing request information for obtaining User ID and the User ID, screened from the region catenary system of the User ID
Human body biological characteristics verification information out is compared with user's current human's signature verification information, if comparing successfully, enables use
The subsequent operation at family exits user's login interface if authentication failed.
Preferably, when user registers set-top box for the first time, set-top box distributes a monomer region chain automatically, and monomer region chain closes
Phone number information, name of contact person information and the human body biological characteristics verification information that combination family is filled in, comprising:
When user registers for the first time, fill in phone number information, name of contact person, user's pet name, using duration and typing human body
Biological characteristic validation information, the human body biological characteristics verification information include that human body face information, somatic fingerprint information, human body are quiet
Arteries and veins information and iris information;
Dynamic password is obtained by association mobile phone, and secondary test is carried out by typing human body biological characteristics verification information again
Card.
Preferably, region catenary system is successively linked according to the monomer region chain generation time, and each region chain includes producing
Raw time, current region root cryptographic Hash, the cryptographic Hash in previous region and user search for content and user watches content information.
Preferably, when the landing request information for obtaining User ID and the User ID, from the region catenary system of the User ID
In filter out in human body biological characteristics verification information, further includes:
When the landing request information for obtaining User ID and the User ID, user is filtered out from the region catenary system of the User ID
Phone number information, to the association mobile phone of user send dynamic verification code, carry out dynamic verification code verifying compare.
Preferably, when the landing request information for obtaining User ID and the User ID, from the region catenary system of the User ID
In filter out human body biological characteristics verification information, further includes:
Voice print verification information is associated in monomer region chain, when the landing request information for obtaining User ID and the User ID, from
The voiceprint that human body is filtered out in the region catenary system of the User ID, obtain the voiceprint of current voiceprint and storage into
Row compares, and compares successfully, then allows to log in, interface of otherwise logging off.
It should be noted that the time of User ID and registration that the present invention is generated using user's registration automatically generates monomer
Region chain generates permission tree using User ID for root node and avoids set-top box from maliciously being entered so that each User ID encryption is high
It invades, authority information is also avoided to be used by malice distribution.
A specific embodiment of the invention above described embodiment only expresses, the description thereof is more specific and detailed, but simultaneously
Limitations on the scope of the patent of the present invention therefore cannot be interpreted as.It should be pointed out that for those of ordinary skill in the art
For, without departing from the inventive concept of the premise, various modifications and improvements can be made, these belong to guarantor of the invention
Protect range.
Claims (5)
1. a kind of anti-intrusion method based on Intelligent set top box, which comprises the following steps:
When user registers set-top box for the first time, set-top box distributes a monomer region chain automatically, and monomer region chain association user is filled in
Phone number information, name of contact person information and human body biological characteristics verification information, and automatically generate User ID and to
Family ID distributes access right;
Region catenary system is since first monomer region chain, according to the order traversal whole region chain of region chain arrangement, and according to
Traversing result collects subscriber phone number information, contact name information, human body biological characteristics verification information, User ID and use
Permission, and permission tree is generated by root node of User ID;
When the landing request information for obtaining User ID and the User ID, human body is filtered out from the region catenary system of the User ID
Biological characteristic validation information is compared, if comparing successfully, after enabling user with user's current human's signature verification information
Continuous operation, if authentication failed, exits user's login interface.
2. a kind of anti-intrusion method based on Intelligent set top box according to claim 1, which is characterized in that user registers for the first time
When set-top box, set-top box distributes a monomer region chain automatically, phone number information that monomer region chain association user is filled in, connection
It is people's name information and human body biological characteristics verification information, comprising:
When user registers for the first time, fill in phone number information, name of contact person, user's pet name, using duration and typing human body
Biological characteristic validation information, the human body biological characteristics verification information include that human body face information, somatic fingerprint information, human body are quiet
Arteries and veins information and iris information;
Dynamic password is obtained by association mobile phone, and secondary test is carried out by typing human body biological characteristics verification information again
Card.
3. a kind of anti-intrusion method based on Intelligent set top box according to claim 1, which is characterized in that region catenary system root
It generates the time according to monomer region chain successively to link, each region chain includes generation time, current region root cryptographic Hash, previous
The cryptographic Hash in region and user search for content and user watches content information.
4. a kind of anti-intrusion method based on Intelligent set top box according to claim 1, which is characterized in that when acquisition User ID
And the landing request information of the User ID, human body biological characteristics verification information is filtered out from the region catenary system of the User ID
In, further includes:
When the landing request information for obtaining User ID and the User ID, user is filtered out from the region catenary system of the User ID
Phone number information, to the association mobile phone of user send dynamic verification code, carry out dynamic verification code verifying compare.
5. a kind of anti-intrusion method based on Intelligent set top box according to claim 1, which is characterized in that when acquisition User ID
And the landing request information of the User ID, human body biological characteristics verifying letter is filtered out from the region catenary system of the User ID
Breath, further includes:
Voice print verification information is associated in monomer region chain, when the landing request information for obtaining User ID and the User ID, from
The voiceprint that human body is filtered out in the region catenary system of the User ID, obtain the voiceprint of current voiceprint and storage into
Row compares, and compares successfully, then allows to log in, interface of otherwise logging off.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811482613.8A CN109788348A (en) | 2018-12-05 | 2018-12-05 | A kind of anti-intrusion method based on Intelligent set top box |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811482613.8A CN109788348A (en) | 2018-12-05 | 2018-12-05 | A kind of anti-intrusion method based on Intelligent set top box |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109788348A true CN109788348A (en) | 2019-05-21 |
Family
ID=66496744
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811482613.8A Pending CN109788348A (en) | 2018-12-05 | 2018-12-05 | A kind of anti-intrusion method based on Intelligent set top box |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109788348A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110830831A (en) * | 2019-11-08 | 2020-02-21 | 江苏号百信息服务有限公司 | Method and device for effectively protecting safety of prepaid account of IPTV set top box |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104331652A (en) * | 2014-10-08 | 2015-02-04 | 无锡指网生物识别科技有限公司 | Dynamic cipher generation method for electronic equipment for fingerprint and voice recognition |
WO2018026883A1 (en) * | 2016-08-05 | 2018-02-08 | Chicago Mercantile Exchange Inc. | Systems and methods for blockchain rule synchronization |
CN107786547A (en) * | 2017-09-30 | 2018-03-09 | 厦门快商通信息技术有限公司 | A kind of auth method based on block chain, device and computer-readable recording medium |
CN108521418A (en) * | 2018-04-04 | 2018-09-11 | 广州广电运通金融电子股份有限公司 | A kind of identity identifying method and system merging block chain and living things feature recognition |
CN108616514A (en) * | 2018-04-09 | 2018-10-02 | 吉林工程技术师范学院 | A kind of region chain realizes the management method of financial transaction |
-
2018
- 2018-12-05 CN CN201811482613.8A patent/CN109788348A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104331652A (en) * | 2014-10-08 | 2015-02-04 | 无锡指网生物识别科技有限公司 | Dynamic cipher generation method for electronic equipment for fingerprint and voice recognition |
WO2018026883A1 (en) * | 2016-08-05 | 2018-02-08 | Chicago Mercantile Exchange Inc. | Systems and methods for blockchain rule synchronization |
CN107786547A (en) * | 2017-09-30 | 2018-03-09 | 厦门快商通信息技术有限公司 | A kind of auth method based on block chain, device and computer-readable recording medium |
CN108521418A (en) * | 2018-04-04 | 2018-09-11 | 广州广电运通金融电子股份有限公司 | A kind of identity identifying method and system merging block chain and living things feature recognition |
CN108616514A (en) * | 2018-04-09 | 2018-10-02 | 吉林工程技术师范学院 | A kind of region chain realizes the management method of financial transaction |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110830831A (en) * | 2019-11-08 | 2020-02-21 | 江苏号百信息服务有限公司 | Method and device for effectively protecting safety of prepaid account of IPTV set top box |
CN110830831B (en) * | 2019-11-08 | 2022-03-01 | 江苏号百信息服务有限公司 | Method for effectively protecting safety of prepaid account of IPTV set top box |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110213246B (en) | Wide-area multi-factor identity authentication system | |
US20170118205A1 (en) | User biological feature authentication method and system | |
CN111931144B (en) | Unified safe login authentication method and device for operating system and service application | |
US8572686B2 (en) | Method and apparatus for object transaction session validation | |
US20130047202A1 (en) | Apparatus and Method for Handling Transaction Tokens | |
CN104320389B (en) | A kind of fusion identity protection system and method based on cloud computing | |
CA2632590A1 (en) | Method to verify the integrity of components on a trusted platform using integrity database services | |
CN101051908A (en) | Dynamic cipher certifying system and method | |
CN110569658A (en) | User information processing method and device based on block chain network, electronic equipment and storage medium | |
CN106446638A (en) | Cloud computing operation system security access method and device | |
CN101588352B (en) | Method and system for ensuring security of operating environment | |
CN106488452A (en) | A kind of mobile terminal safety access authentication method of combination fingerprint | |
US10841315B2 (en) | Enhanced security using wearable device with authentication system | |
CN109711126A (en) | A kind of computer information safe management system and method | |
CN110740140A (en) | network information security supervision system based on cloud platform | |
CN107733636A (en) | Authentication method and Verification System | |
US20130047203A1 (en) | Method and Apparatus for Third Party Session Validation | |
CN102868702A (en) | System login device and system login method | |
CN109246133A (en) | A kind of network access verifying method based on bio-identification | |
CN110322889A (en) | A kind of personal identification method of high reliablity | |
CN107995227A (en) | The authentication method and device of movable storage device | |
CN110855664A (en) | Network certificate system | |
CN111600701B (en) | Private key storage method, device and storage medium based on blockchain | |
CN109788348A (en) | A kind of anti-intrusion method based on Intelligent set top box | |
CN110516427B (en) | Terminal user identity authentication method and device, storage medium and computer equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20190521 |
|
WD01 | Invention patent application deemed withdrawn after publication |