CN110536152A - A kind of set-top box users authentication caching method, device, medium and terminal device - Google Patents

A kind of set-top box users authentication caching method, device, medium and terminal device Download PDF

Info

Publication number
CN110536152A
CN110536152A CN201910718073.7A CN201910718073A CN110536152A CN 110536152 A CN110536152 A CN 110536152A CN 201910718073 A CN201910718073 A CN 201910718073A CN 110536152 A CN110536152 A CN 110536152A
Authority
CN
China
Prior art keywords
top box
interim token
token
time
buffer zone
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910718073.7A
Other languages
Chinese (zh)
Inventor
徐力恒
吴定宇
朱世明
孙桂发
何琪深
张天乐
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Zhujiang Digital Group Ltd By Share Ltd
Original Assignee
Guangzhou Zhujiang Digital Group Ltd By Share Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Zhujiang Digital Group Ltd By Share Ltd filed Critical Guangzhou Zhujiang Digital Group Ltd By Share Ltd
Priority to CN201910718073.7A priority Critical patent/CN110536152A/en
Publication of CN110536152A publication Critical patent/CN110536152A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3228One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/231Content storage operation, e.g. caching movies for short term storage, replicating data over plural servers, prioritizing data for deletion
    • H04N21/23106Content storage operation, e.g. caching movies for short term storage, replicating data over plural servers, prioritizing data for deletion involving caching operations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/254Management at additional data server, e.g. shopping server, rights management server
    • H04N21/2541Rights Management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/258Client or end-user data management, e.g. managing client capabilities, user preferences or demographics, processing of multiple end-users preferences to derive collaborative data
    • H04N21/25808Management of client data
    • H04N21/25816Management of client data involving client authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/258Client or end-user data management, e.g. managing client capabilities, user preferences or demographics, processing of multiple end-users preferences to derive collaborative data
    • H04N21/25866Management of end-user data
    • H04N21/25875Management of end-user data involving end-user authentication

Abstract

The invention discloses a kind of set-top box users to authenticate caching method, comprising: obtains the authentication services request instruction issued by set-top box;By the order relations of the globally unique identifier of set-top box and user's current system permission, after calculating by program encryption algorithm, the interim token of set-top box at this time is generated;Buffer zone is established, and the interim token is stored in the buffer zone;Corresponding interim token is read out of described buffer zone according to the authentication services request instruction carries out search access right;The invention also discloses a kind of set-top box users to authenticate buffer storage;The present invention passes through setting buffer zone, interim token is generated according to user right and is buffered in buffer zone, interim token, which is read, according to authentication services request instruction carries out search access right, the technical issues of to solve front end authentication server load too high in the prior art, to effectively reduce server load, improves the stability of front-end platform system server and equipment is avoided to waste.

Description

A kind of set-top box users authentication caching method, device, medium and terminal device
Technical field
The present invention relates to field of communication technology more particularly to a kind of set-top box users authentication caching method, device, medium and Terminal device.
Background technique
When the program that terminal set top box user needs to pay in watching set-top-box system, it is necessary first to remove access user's mirror Operation system is weighed, checks whether user has the authorization of the program, if there is authorization, then playable information is returned to, if do not had Authorization, then return to ordering information.
Since terminal set top box user is Real time request subscription authentication operation system every time, can be produced in the peak traffic period Raw a large amount of concurrent requests, cause front end authentication server load too high, in order to ensure that business is normal, front end must just be provided more Server meets concurrent demand, at non-traffic peak period, causes the waste of equipment.
Summary of the invention
The present invention provides a kind of set-top box users to authenticate caching method, by the way that buffer zone is arranged, according to user right It generates interim token and is buffered in buffer zone, interim token is read according to authentication services request instruction and carries out search access right, It the technical issues of to solve front end authentication server load too high in the prior art, to effectively reduce server load, mentions The stability of high front-end platform system server simultaneously avoids equipment from wasting.
In order to solve the above-mentioned technical problem, the embodiment of the invention provides a kind of set-top box users to authenticate caching method, packet It includes:
Obtain the authentication services request instruction issued by set-top box;
By the order relations of the globally unique identifier of set-top box and user's current system permission, pass through program encryption algorithm After calculating, the interim token of set-top box at this time is generated;
Buffer zone is established, and the interim token is stored in the buffer zone;
Corresponding interim token is read out of described buffer zone according to the authentication services request instruction carries out inquiry power Limit.
Preferably, after the generation set-top box interim token at this time, further includes: the setting interim order The cache-time of board directly reads this to the authentication services request instruction initiated again and faces in the cache-time of setting When token carry out search access right.
Preferably, at the end of the cache-time, worked as according to the globally unique identifier of set-top box and user The order relations of preceding system permission regenerate interim token, and the interim token regenerated is stored in the buffer area Simultaneously cache-time is arranged in domain.
Preferably, the set-top box users authenticate caching method further include: the authorization conditions of real-time detection user, New interim token is generated when authorization variation occurs, and the new interim token is stored in the buffer zone, is replaced Change corresponding interim token.
The embodiment of the invention also provides a kind of set-top box users to authenticate buffer storage, comprising:
Request instruction module, for obtaining the authentication services request instruction issued by set-top box;
Token generation module, for closing the order of the globally unique identifier of set-top box and user's current system permission System after calculating by program encryption algorithm, generates the interim token of set-top box at this time;
Data cache module is stored in the buffer zone for establishing buffer zone, and by the interim token;
Data authentication module, for reading corresponding face out of described buffer zone according to the authentication services request instruction When token carry out search access right.
Preferably, after the generation set-top box interim token at this time, further includes: the setting interim order The cache-time of board directly reads this to the authentication services request instruction initiated again and faces in the cache-time of setting When token carry out search access right.
Preferably, at the end of the cache-time, worked as according to the globally unique identifier of set-top box and user The order relations of preceding system permission regenerate interim token, and the interim token regenerated is stored in the buffer area Simultaneously cache-time is arranged in domain.
Preferably, the set-top box users authenticate buffer storage further include: token update module, for examining in real time The authorization conditions for surveying user generate new interim token when authorization variation occurs, and the new interim token are stored in In the buffer zone, corresponding interim token is replaced.
The embodiment of the invention also provides a kind of computer readable storage medium, the computer readable storage medium includes The computer program of storage;Wherein, where the computer program controls the computer readable storage medium at runtime Equipment executes set-top box users as described in any one of the above embodiments and authenticates caching method.
The embodiment of the invention also provides a kind of terminal device, including processor, memory and it is stored in the storage In device and it is configured as the computer program executed by the processor, the processor is real when executing the computer program Existing set-top box users as described in any one of the above embodiments authenticate caching method.
Compared with the prior art, the embodiment of the present invention has the following beneficial effects:
The present invention is generated interim token according to user right and is buffered in buffer zone, root by setting buffer zone Interim token is read according to authentication services request instruction and carries out search access right, is loaded with solving front end authentication server in the prior art Excessively high technical problem, to effectively reduce server load, improve the stability of front-end platform system server and avoid Equipment waste.
Detailed description of the invention
Fig. 1: the technical principle schematic diagram of caching method is authenticated for the set-top box users of the embodiment of the present invention one;
Fig. 2: the technical principle schematic diagram of caching method is authenticated for the set-top box users of the embodiment of the present invention two.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
Fig. 1, embodiment one are please referred to, the preferred embodiment of the present invention provides a kind of set-top box users authentication caching method, Include:
S1 obtains the authentication services request instruction issued by set-top box;
The order relations of the globally unique identifier of set-top box and user's current system permission are passed through program encryption by S2 After algorithm calculates, the interim token of set-top box at this time is generated;In the present embodiment, the interim order in the generation set-top box at this time After board, further includes: the cache-time of the setting interim token, in the cache-time of setting, to what is initiated again Authentication services request instruction directly reads the interim token and carries out search access right.In the present embodiment, in the cache-time knot Shu Shi regenerates interim token according to the order relations of the globally unique identifier of set-top box and user's current system permission, The interim token regenerated is stored in the buffer zone and cache-time is set.
S3 establishes buffer zone, and the interim token is stored in the buffer zone;
S4 reads corresponding interim token according to the authentication services request instruction out of described buffer zone and is inquired Permission.
Referring to figure 2., embodiment two, on the basis of example 1, the set-top box users authentication caching method also increase Add: S5, the authorization conditions of real-time detection user generate new interim token when authorization variation occurs, and will be described new Interim token is stored in the buffer zone, replaces corresponding interim token.
Correspondingly, the embodiment of the invention provides a kind of set-top box users to authenticate buffer storage, comprising:
Request instruction module, for obtaining the authentication services request instruction issued by set-top box;
Token generation module, for closing the order of the globally unique identifier of set-top box and user's current system permission System after calculating by program encryption algorithm, generates the interim token of set-top box at this time;In the present embodiment, in the generation machine After the interim token of top box at this time, further includes: the cache-time of the setting interim token, in the cache-time of setting It is interior, which is directly read to the authentication services request instruction initiated again and carries out search access right.In the present embodiment, In At the end of the cache-time, again according to the order relations of the globally unique identifier of set-top box and user's current system permission Interim token is generated, the interim token regenerated is stored in the buffer zone and cache-time is set.
Data cache module is stored in the buffer zone for establishing buffer zone, and by the interim token;
Data authentication module, for reading corresponding face out of described buffer zone according to the authentication services request instruction When token carry out search access right.
In the present embodiment, the set-top box users authenticate buffer storage further include: token update module, for examining in real time The authorization conditions for surveying user generate new interim token when authorization variation occurs, and the new interim token are stored in In the buffer zone, corresponding interim token is replaced.
This patent is a whole set of subscription authentication caching system, initiates authentication request for solving terminal set top box, obtains machine When the currently associated permission of top box, user right data are cached, when set-top box carries out authority request again, are directly passed through Permission cache server obtains, and eliminates or reduces request of the set-top box repetition to authentication server, reduce the negative of authentication server It carries.Reach in the case where authentication server equipment is constant, the authentication request of more set-top boxes can be serviced.
Combined with specific embodiments below, the present invention is described in detail.
1. user authentication server.It is responsible for the permission modification and query service to STB terminal, STB terminal is used The feedback of the inquiry request at family.
2. user authorization data library.For storing the authorization data of user, when user's authorization changes, data-base recording The new pertinent authorization information of user, the inquiry request of the special response user authentication server of database.
3. interim token generation mechanism.The order of the globally unique identifier of set-top box and user's current system permission is closed System after calculating by program encryption algorithm, generates the interim token of set-top box at this time.
4. user right buffer memory device.Special caching STB terminal user initiates interim order generated when service authentication Board generates the interim token of set-top box, by interim token-caching to buffer service when STB terminal user initiates service authentication In device redis database, and the settable caching holding time, in the time range in setting, such as then machine top in 1 hour When box initiates authentication request, the data in the redis database in buffer memory device are just directly read, are no longer sent out to authentication server Request is played, to reduce the load of authentication server.
5. the update mechanism of the interim token of set-top box.When time range or set-top box of the redis buffer memory device beyond setting When user's authorization changes (user's active order business or service authorization expire), STB terminal user initiates again When service authentication, authentication server program can generate the interim token of new set-top box, carry out service authentication returning to set-top box While by the redis database of new interim token-caching to cache server, looked into for the service authentication of set-top box next time It askes and uses.
The present invention authenticates caching system by the set-top box customer, solves set-top box users in a large amount of set-top box hairs in peak period The high problem of server load when service authentication is played, to effectively reduce server load, improves front-end platform system clothes The stability of business device.
The embodiment of the invention also provides a kind of computer readable storage medium, the computer readable storage medium includes The computer program of storage;Wherein, where the computer program controls the computer readable storage medium at runtime Equipment executes the authentication caching method of set-top box users described in any of the above-described embodiment.
The embodiment of the invention also provides a kind of terminal device, the terminal device includes processor, memory and deposits The computer program executed by the processor is stored up in the memory and is configured as, the processor is executing the meter Realize that set-top box users described in any of the above-described embodiment authenticate caching method when calculation machine program.
Preferably, the computer program can be divided into one or more module/units (such as computer program, meter Calculation machine program), one or more of module/units are stored in the memory, and are executed by the processor, with Complete the present invention.One or more of module/units can be and can complete the series of computation machine program of specific function and refer to Section is enabled, the instruction segment is for describing implementation procedure of the computer program in the terminal device.
The processor can be central processing unit (Central Processing Unit, CPU), can also be it His general processor, digital signal processor (Digital Signal Processor, DSP), specific integrated circuit (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field- Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic, Discrete hardware components etc., general processor can be microprocessor or the processor is also possible to any conventional processing Device, the processor are the control centres of the terminal device, utilize each of terminal device described in various interfaces and connection A part.
The memory mainly includes program storage area and data storage area, wherein program storage area can store operation system Application program needed for system, at least one function etc., data storage area can store related data etc..In addition, the memory can To be high-speed random access memory, nonvolatile memory, such as plug-in type hard disk, intelligent memory card (Smart can also be Media Card, SMC), secure digital (Secure Digital, SD) card and flash card (Flash Card) etc. or described deposit Reservoir is also possible to other volatile solid-state parts.
It should be noted that above-mentioned terminal device may include, but it is not limited only to, processor, memory, those skilled in the art Member is appreciated that above-mentioned terminal device is only example, does not constitute the restriction to terminal device, may include more or less Component, perhaps combine certain components or different components.
Particular embodiments described above has carried out further the purpose of the present invention, technical scheme and beneficial effects It is described in detail, it should be understood that the above is only a specific embodiment of the present invention, the protection being not intended to limit the present invention Range.It particularly points out, to those skilled in the art, all within the spirits and principles of the present invention, that is done any repairs Change, equivalent replacement, improvement etc., should all be included in the protection scope of the present invention.

Claims (10)

1. a kind of set-top box users authenticate caching method characterized by comprising
Obtain the authentication services request instruction issued by set-top box;
By the order relations of the globally unique identifier of set-top box and user's current system permission, calculated by program encryption algorithm Afterwards, the interim token of set-top box at this time is generated;
Buffer zone is established, and the interim token is stored in the buffer zone;
Corresponding interim token is read out of described buffer zone according to the authentication services request instruction carries out search access right.
2. set-top box users as described in claim 1 authenticate caching method, which is characterized in that the generation set-top box at this time Interim token after, further includes: the cache-time of the setting interim token, in the cache-time of setting, to again The authentication services request instruction of secondary initiation directly reads the interim token and carries out search access right.
3. set-top box users as claimed in claim 2 authenticate caching method, which is characterized in that terminate in the cache-time When, interim token is regenerated according to the order relations of the globally unique identifier of set-top box and user's current system permission, it will The interim token regenerated is stored in the buffer zone and cache-time is arranged.
4. set-top box users as described in claim 1 authenticate caching method, which is characterized in that further include: real-time detection user Authorization conditions, new interim token is generated when authorization variation occurs, and the new interim token is stored in described slow It deposits in region, replaces corresponding interim token.
5. a kind of set-top box users authenticate buffer storage characterized by comprising
Request instruction module, for obtaining the authentication services request instruction issued by set-top box;
Token generation module, for leading to the order relations of the globally unique identifier of set-top box and user's current system permission After crossing the calculating of program Encryption Algorithm, the interim token of set-top box at this time is generated;
Data cache module is stored in the buffer zone for establishing buffer zone, and by the interim token;
Data authentication module, for reading corresponding interim order out of described buffer zone according to the authentication services request instruction Board carries out search access right.
6. set-top box users as claimed in claim 5 authenticate buffer storage, which is characterized in that the generation set-top box at this time Interim token after, further includes: the cache-time of the setting interim token, in the cache-time of setting, to again The authentication services request instruction of secondary initiation directly reads the interim token and carries out search access right.
7. set-top box users as claimed in claim 6 authenticate buffer storage, which is characterized in that terminate in the cache-time When, interim token is regenerated according to the order relations of the globally unique identifier of set-top box and user's current system permission, it will The interim token regenerated is stored in the buffer zone and cache-time is arranged.
8. set-top box users as claimed in claim 5 authenticate buffer storage, which is characterized in that further include: token update module, For the authorization conditions of real-time detection user, new interim token is generated when authorization variation occurs, and will be described new interim Token is stored in the buffer zone, replaces corresponding interim token.
9. a kind of computer readable storage medium, which is characterized in that the computer readable storage medium includes the calculating of storage Machine program;Wherein, the equipment where the computer program controls the computer readable storage medium at runtime executes such as The described in any item set-top box users of Claims 1 to 4 authenticate caching method.
10. a kind of terminal device, which is characterized in that including processor, memory and store in the memory and matched It is set to the computer program executed by the processor, the processor is realized when executing the computer program as right is wanted Seek 1~4 described in any item set-top box users authentication caching methods.
CN201910718073.7A 2019-08-05 2019-08-05 A kind of set-top box users authentication caching method, device, medium and terminal device Pending CN110536152A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910718073.7A CN110536152A (en) 2019-08-05 2019-08-05 A kind of set-top box users authentication caching method, device, medium and terminal device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910718073.7A CN110536152A (en) 2019-08-05 2019-08-05 A kind of set-top box users authentication caching method, device, medium and terminal device

Publications (1)

Publication Number Publication Date
CN110536152A true CN110536152A (en) 2019-12-03

Family

ID=68661755

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910718073.7A Pending CN110536152A (en) 2019-08-05 2019-08-05 A kind of set-top box users authentication caching method, device, medium and terminal device

Country Status (1)

Country Link
CN (1) CN110536152A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103051628A (en) * 2012-12-21 2013-04-17 微梦创科网络科技(中国)有限公司 Method and system for obtaining authentication token based on servers
CN103167497A (en) * 2011-12-19 2013-06-19 卓望数码技术(深圳)有限公司 Authentication processing method and authentication processing system
CN106789848A (en) * 2015-11-23 2017-05-31 阿里巴巴集团控股有限公司 A kind of user key storage method and server
CN108512784A (en) * 2018-06-21 2018-09-07 珠海宏桥高科技有限公司 Authentication method based on gateway routing forwarding
US20180309746A1 (en) * 2016-05-24 2018-10-25 Vantiv, Llc Technologies for token-based authentication and authorization of distributed computing resources

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103167497A (en) * 2011-12-19 2013-06-19 卓望数码技术(深圳)有限公司 Authentication processing method and authentication processing system
CN103051628A (en) * 2012-12-21 2013-04-17 微梦创科网络科技(中国)有限公司 Method and system for obtaining authentication token based on servers
CN106789848A (en) * 2015-11-23 2017-05-31 阿里巴巴集团控股有限公司 A kind of user key storage method and server
US20180309746A1 (en) * 2016-05-24 2018-10-25 Vantiv, Llc Technologies for token-based authentication and authorization of distributed computing resources
CN108512784A (en) * 2018-06-21 2018-09-07 珠海宏桥高科技有限公司 Authentication method based on gateway routing forwarding

Similar Documents

Publication Publication Date Title
CN108764870B (en) Transaction processing method and device based on block chain and electronic equipment
KR100845480B1 (en) Method for controlling access to digital content and streaming media
US8918908B2 (en) Systems and methods for accessing digital content using electronic tickets and ticket tokens
CN110381078A (en) Determination method, apparatus, electronic equipment and the storage medium that token renews
US9402000B2 (en) Metering traffic for a mobile device
US20180012317A1 (en) Systems and methods for connecting disparate computing devices via standard interfaces
US20030131349A1 (en) Methods and systems for managing and collecting impulse pay-per-view data in smart card enabled television terminals
WO2015116998A2 (en) Electronic transfer and obligation enforcement system
AU2007340964A1 (en) System and method for extending sessions
CN104639650B (en) A kind of fine granularity distributed interface access control method and device
CN106326389A (en) Data-caching-based service request processing method and system
CN111683039B (en) Authentication method, device and medium
US20170063708A1 (en) Resource exchange service transaction for cloud computing
US8666793B2 (en) Distributing reauthorization time in the event of tariff time change
KR20200112236A (en) Method and apparatus for managing decentralized identifier
CN108108597A (en) Authentication method and device based on NGTP architecture
CN109543365A (en) A kind of authorization method and device
EP3484096B1 (en) Authority revoking method and device
CN106878030A (en) A kind of charging method and device
CN110536152A (en) A kind of set-top box users authentication caching method, device, medium and terminal device
WO2020102727A1 (en) Secure and accountable data access
KR100902739B1 (en) Contents middleware system and its operating method for offering on-line contents using the set-top box, on-line contents service system and method using its
CN114782175A (en) Bank loan data request method and device and electronic equipment
KR102563944B1 (en) Method and apparatus for providing used cell phone rental service
KR20090123419A (en) System and server for managing card and apparatus for providing approval card

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20191203

RJ01 Rejection of invention patent application after publication