CN112202725A - Service verification method and device - Google Patents

Service verification method and device Download PDF

Info

Publication number
CN112202725A
CN112202725A CN202010946362.5A CN202010946362A CN112202725A CN 112202725 A CN112202725 A CN 112202725A CN 202010946362 A CN202010946362 A CN 202010946362A CN 112202725 A CN112202725 A CN 112202725A
Authority
CN
China
Prior art keywords
service
identifier
terminal
service identifier
preset
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010946362.5A
Other languages
Chinese (zh)
Other versions
CN112202725B (en
Inventor
张伯伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN202010946362.5A priority Critical patent/CN112202725B/en
Publication of CN112202725A publication Critical patent/CN112202725A/en
Application granted granted Critical
Publication of CN112202725B publication Critical patent/CN112202725B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC

Abstract

The application provides a service checking method and device, relates to the technical field of communication, and is used for checking the validity of a service. The method comprises the following steps: the checking device determines a service identifier of the first service, and determines a checking result according to the service identifier of the first service and a preset service identifier. Then, the verification device sends the verification result to the terminal. The method and the device are applied to the service verification process.

Description

Service verification method and device
Technical Field
The present application relates to the field of communications, and in particular, to a method and an apparatus for verifying a service.
Background
Currently, Internet Protocol Television (IPTV) service data may be transmitted through a fixed network (e.g., a telecommunication broadband network, a fixed telephone network), or may be transmitted through a mobile Internet. In the process of transmitting the IPTV service data through the mobile internet, there may be a risk that the IPTV service data is tampered, and the security of the service data cannot be effectively ensured.
Disclosure of Invention
The application provides a service verification method and a service verification device, which are used for guaranteeing the safety of service data.
In order to achieve the purpose, the technical scheme is as follows:
in a first aspect, the present application provides a service checking method.
A service checking device (hereinafter, simply referred to as a checking device) determines a service identifier of a first service (the first service is a service received by a terminal), and determines a checking result (the checking result is used for indicating whether a service identifier identical to the service identifier of the first service exists in the preset service identifier) according to the service identifier of the first service and preset service identifiers (the preset service identifiers are service identifiers of all legal services); then, the verification device sends the verification result to the terminal.
Based on the technical scheme, the checking device determines the service identifier of the first service and has a preset service identifier, so that the checking device can determine a checking result according to the service identifier of the first service and the preset service identifier and send the checking result to the terminal, thereby informing the terminal whether the service identifier which is the same as the service identifier of the first service exists in the preset service identifier. Therefore, the terminal can determine whether the first service is legal or not according to the verification result, and the IPTV service data is prevented from being tampered, so that the safety of the service data is guaranteed.
In a possible design, the method for determining the service identifier of the first service includes: the checking device receives service information from a terminal; and determining the service identifier of the first service according to the service information.
In one possible design, the traffic information includes: the content metadata of the second service and the service characteristics of the first service; the service characteristics are determined by the terminal according to the service data of the first service, the second service is a service requested by the terminal, and the second service is any one of all legal services.
In one possible design, the service checking method further includes: if the preset service identifier has a service identifier which is the same as the service identifier of the first service, the verification result is used for indicating that the first service is a legal service; and if each service identifier in the preset service identifiers is different from the service identifier of the first service, the check result is used for indicating that the first service is an illegal service.
In one possible design, the service checking method further includes: the checking device receives all legal services sent by the integrated broadcast control platform, and determines the service identification of each service in all the legal services according to the service information of each service in all the legal services.
In a second aspect, the present application provides a service verification apparatus, including: a determining unit and a transmitting unit.
The determining unit is configured to determine a service identifier of a first service, where the first service is a service received by a terminal; and the system is further used for determining a check result according to the service identifier of the first service and the preset service identifier, wherein the check result is used for indicating whether the service identifier which is the same as the service identifier of the first service exists in the preset service identifier, and the preset service identifier is the service identifier of all legal services.
The sending unit is configured to send the verification result to the terminal.
In one possible design, the verification apparatus further includes: and a receiving unit.
The receiving unit is configured to receive service information from a terminal. The determining unit is specifically configured to determine the service identifier of the first service according to the service information.
In one possible design, the traffic information includes: the content metadata of the second service and the service characteristics of the first service; the service characteristics are determined by the terminal according to the service data of the first service, the second service is a service requested by the terminal, and the second service is any one of all legal services.
In one possible design, the determining unit is further configured to: if the preset service identifier has a service identifier which is the same as the service identifier of the first service, the verification result is used for indicating that the first service is a legal service; and if each service identifier in the preset service identifiers is different from the service identifier of the first service, the check result is used for indicating that the first service is an illegal service.
In a possible design, the receiving unit is further configured to receive all legal services sent by the integrated broadcast control platform. The determining unit is further configured to determine a service identifier of each service in all the legitimate services according to the service information of each service in all the legitimate services.
In a third aspect, the present application provides an apparatus for verifying a service, where the apparatus includes: a processor and a communication interface; the communication interface is coupled to a processor for executing a computer program or instructions for implementing the method for verifying a service as described in the first aspect and any possible implementation form of the first aspect.
In a fourth aspect, the present application provides a computer-readable storage medium, in which instructions are stored, and when the instructions are executed on a computer, the instructions cause the computer to execute the method for checking a service described in the first aspect and any possible implementation manner of the first aspect.
In a fifth aspect, the present application provides a computer program product containing instructions that, when run on a computer, cause the computer to perform the method for verifying a service described in the first aspect and any one of the possible implementations of the first aspect.
In a sixth aspect, the present application provides a chip, where the chip includes a processor and a communication interface, where the communication interface is coupled to the processor, and the processor is configured to execute a computer program or instructions to implement the method for checking a service as described in the first aspect and any possible implementation manner of the first aspect.
In the foregoing solution, the technical problems that can be solved by the service checking apparatus, the computer device, the computer storage medium, the computer program product, or the chip, and the technical effects that can be achieved may refer to the technical problems and technical effects that are solved by the first aspect, and are not described herein again.
Drawings
Fig. 1 is a system architecture diagram of a communication system according to an embodiment of the present application;
fig. 2 is a schematic flowchart of a service verification method according to an embodiment of the present application;
fig. 3 is a schematic flowchart of another service identifier generation method according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of a service verification apparatus according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of another service verification apparatus according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The character "/" herein generally indicates that the former and latter associated objects are in an "or" relationship. For example, A/B may be understood as A or B.
The terms "first" and "second" in the description and claims of the present application are used for distinguishing between different objects and not for describing a particular order of the objects.
Furthermore, the terms "including" and "having," and any variations thereof, as referred to in the description of the present application, are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or modules is not limited to the listed steps or modules but may alternatively include other steps or modules not listed or inherent to such process, method, article, or apparatus.
In addition, in the embodiments of the present application, words such as "exemplary" or "for example" are used to mean serving as examples, illustrations or explanations. Any embodiment or design described herein as "exemplary" or "e.g.," is not necessarily to be construed as preferred or advantageous over other embodiments or designs. Rather, use of the word "exemplary" or "e.g.," is intended to present concepts in a concrete fashion.
In the process of transmitting the IPTV service data through the mobile internet, there may be a risk that the IPTV service data is tampered. For example, the terminal requests the second service to the IPTV platform. And after receiving the request of the terminal, the IPTV platform issues the data of the second service to the terminal. However, in the process of data transmission of the second service, the data of the second service is tampered with as the data of the first service, and the terminal finally receives the first service.
Therefore, the embodiment of the application provides a service checking method and device. Specifically, the checking device determines a service identifier of a first service (the first service is a service received by the terminal), and determines a checking result (the checking result is used for indicating whether a service identifier identical to the service identifier of the first service exists in the preset service identifier) according to the service identifier of the first service and the preset service identifier (the preset service identifier is a service identifier of all legal services); then, the verification device sends the verification result to the terminal.
In order to facilitate understanding of the technical solution of the present application, before the detailed description of the service verification method in the embodiment of the present application, an implementation environment and an application scenario in the embodiment of the present application are described first.
Fig. 1 is a system architecture diagram of a communication system according to an embodiment of the present application. The communication system includes: the system comprises an integrated broadcast control platform, an IPTV platform, at least one computing node, a base station and a terminal.
The integrated broadcast control platform comprises the functions of content management, authentication management, charging, user management and the like. The program source of the integrated broadcast control platform is provided by the IPTV platform.
The IPTV platform uses a home television as a main terminal appliance, and provides various digital media services including video programs by using a fixed network or a mobile internet. Specifically, after receiving a service request transmitted by a terminal, the IPTV platform can issue a corresponding service to the terminal according to the service request.
The computing node is used for storing the service identification of the legal service and judging the validity of the service.
The terminal can be: user Equipment (UE), access terminal, terminal unit, terminal station, mobile station, remote terminal, mobile device, wireless communication device, vehicular user equipment, terminal agent, or terminal device, etc. Optionally, the terminal may be various handheld devices, vehicle-mounted devices, wearable devices, and computers with communication functions, which is not limited in this embodiment of the present application. For example, the handheld device may be a smartphone. The in-vehicle device may be an in-vehicle navigation system. The wearable device may be a smart bracelet. The computer may be a Personal Digital Assistant (PDA) computer, a tablet computer, and a laptop computer. The terminal supports an IPTV service.
The technical scheme provided by the embodiment of the application can be applied to the communication system. The network architecture and the service scenario described in the embodiment of the present application are for more clearly illustrating the technical solution of the embodiment of the present application, and do not form a limitation on the technical solution provided in the embodiment of the present application, and as a person of ordinary skill in the art knows that along with the evolution of the network architecture and the appearance of a new service scenario, the technical solution provided in the embodiment of the present application is also applicable to similar technical problems.
As shown in fig. 2, a method for verifying a service provided in the embodiment of the present application includes the following steps:
s101, the checking device receives service information from a terminal.
The service information comprises: content metadata of the second service, service characteristics of the first service.
In this embodiment, the second service is a service requested by the terminal, and the second service is any one of all legitimate services. The content metadata of the second service is data stored in the terminal itself.
The content metadata of the second service is used to describe attribute information of the second service. The content metadata of the second service includes: a service name, a service type, a service provider, a service creation timestamp, and the like, which are not limited in this embodiment.
Illustratively, the second service is a video service a, and the content metadata of the second service includes: the name of video a, the director of video a, the duration of video a, the profile of video a, etc.
In this embodiment, the first service is a service actually received by the terminal. The service characteristics of the first service are determined by the terminal according to the service data of the first service. The service data of the first service is service data actually received by the terminal through the mobile internet.
Optionally, the service feature of the first service is determined by the terminal according to the service data of the first service and a first preset algorithm. The first preset algorithm may be a Hash algorithm, a symmetric encryption algorithm, and the like, which is not limited in the embodiment of the present application.
It can be understood that, after encrypting the service data to generate the service characteristics, the terminal sends the service characteristics of the service to the verification device, which can avoid the leakage of the service data in the transmission process and improve the security.
It should be noted that, if the service data is not tampered in the process of being transmitted through the mobile internet, it indicates that the service requested by the terminal is the same as the service actually received by the terminal, and the first service is a legal service and the first service is the same as the second service. If the service data is tampered in the process of transmitting the service data through the mobile internet, the service requested by the terminal is different from the service actually received by the terminal, the first service is an illegal service, and the first service is different from the second service.
S102, the checking device determines the service identification of the first service.
In a possible implementation manner, the checking device determines the service identifier of the first service according to the service information.
Optionally, the checking device determines the service identifier of the first service according to the service information and a second preset algorithm.
It should be noted that the second preset algorithm is preset by an engineer, and the second preset algorithm may be a Hash algorithm, which is not limited in the embodiment of the present application.
S103, the checking device determines a checking result according to the service identifier of the first service and a preset service identifier.
The check result is used for indicating whether a service identifier which is the same as the service identifier of the first service exists in the preset service identifier, and the preset service identifier is the service identifier of all legal services.
In a possible implementation manner, the checking device compares each service identifier in the preset service identifiers with the service identifier of the first service, determines whether the preset service identifier has a service identifier identical to the service identifier of the first service, and determines a checking result.
In one possible design, if a service identifier identical to the service identifier of the first service exists in the preset service identifiers, the check result is used to indicate that the first service is a legal service.
In another possible design, if each service identifier in the preset service identifiers is different from the service identifier of the first service, the check result is used to indicate that the first service is an illegal service.
It should be noted that the preset service identifier is determined by the checking device according to the service information of the legitimate service. For example, the service identifier of the legal service a is determined by the verification device according to the content metadata of the legal service a and the service characteristics of the legal service a. The generation process of the preset service identifier may specifically refer to steps S201 to S202, which are not described herein again.
It can be understood that, since the preset service identifier is determined by the verification device according to the content metadata and the service characteristics of the legal service. Therefore, if the service information (content metadata or service characteristics) of any service is changed, each service identifier in the preset service identifiers is different from the service identifier of the service.
And S104, the checking device sends the checking result to the terminal.
Based on the technical scheme, the checking device determines the service identifier of the first service and has a preset service identifier, so that the checking device can determine a checking result according to the service identifier of the first service and the preset service identifier and send the checking result to the terminal, thereby informing the terminal whether the service identifier which is the same as the service identifier of the first service exists in the preset service identifier. Therefore, the terminal can determine whether the first service is legal or not according to the verification result, and the IPTV service data is prevented from being tampered, so that the safety of the service data is guaranteed.
The following describes a specific process for generating a preset service identifier. As shown in fig. 3, a method for generating a service identifier provided in the embodiment of the present application includes the following steps:
s201, the checking device receives all legal services sent by the integrated broadcast control platform.
It should be noted that the integrated broadcast control platform checks all services and issues the legal services to the verification device.
Optionally, the checking device analyzes the legal service to determine the service information of the legal service.
In one possible implementation manner, after the verification device receives the legal service, the content metadata and the service data of the legal service are extracted. The checking device determines the service characteristics of the legal service according to the first preset algorithm and the service data of the legal service.
It should be noted that the first preset algorithm is preset by the staff. The first preset algorithm used by the checking device is the same as the first preset algorithm used by the terminal.
S202, the checking device determines the service identification of each service in all the legal services according to the service information of each service in all the legal services.
In a possible implementation manner, the verifying device determines the service identifier of the legal service from the content metadata and the service characteristics of the legal service by using a second preset algorithm.
Optionally, after determining the service identifier of each service in all the legitimate services, the verification apparatus stores the service identifier of each service respectively.
Based on the technical scheme, the checking device can determine the service identification of the legal service, so that the service is judged after the service information from the terminal is received.
In addition, the service checking method provided by the embodiment of the application can be realized based on a block chain technology.
The blockchain technology is to use a set of mathematical algorithms based on a consensus mechanism to establish a trust network between machines, so as to create new credit through technical endorsements rather than centralized credit agencies. The 'consensus mechanism' is that a plurality of representative computing nodes are selected from a plurality of computing nodes, and the transaction is verified and confirmed within a short time through voting of the plurality of representative computing nodes; when the opinions are inconsistent, under the condition of no central control, a plurality of representative nodes participate in decision making to reach consensus, namely how to establish trust relationship among individuals without trust bases.
When the service verification method provided by the embodiment of the application is implemented based on the block chain technology, the step of selecting the representative computing node is as follows:
the terminal broadcasts the service characteristics and the bill identification of the first service to a plurality of computing nodes through the base station, and the bill identification is determined by the terminal according to the service characteristics of the first service and a Media Access Control (MAC) address of the terminal. Each of the plurality of compute nodes receives the account identifier. Each computing node then calculates the billing identification based on the service characteristics of the first service.
It should be noted that, since the computing node only receives the service characteristics of the first service, the MAC address of the terminal cannot be determined. Therefore, the computing node cannot directly calculate the bill identification. Therefore, the computing node needs to calculate the bill identification by using the computing resource.
After the calculation node calculates the bill identification, the calculation node stores the bill identification; thereafter, the compute node broadcasts an operation complete message to other compute nodes. After receiving the calculation completion message, the other computing nodes vote. The plurality of computing nodes vote by a share authorization certification mechanism, and representative computing nodes are selected from the plurality of computing nodes.
It should be noted that, the calculation node of the bill identifier is calculated first, which indicates that the calculation resource is more, and the performance of the calculation node is higher, and the calculation node is suitable for being used as a representative calculation node.
Optionally, the representative compute node is updated periodically.
In one possible implementation, a plurality of representative compute nodes are randomly ordered. And each representative computing node sequentially generates blocks within preset time according to the arrangement sequence. And if the ith representative computing node cannot generate the block within the preset time, arranging the ith representative computing node to the last bit.
After the representative computing nodes are selected, each representative computing node determines the service identifier of the first service, determines a verification result according to the service identifier of the first service and the preset service identifier, and sends the verification result to the terminal. For the verification process of the service by the computing node, reference may be made to S101-S104, which is not described herein again.
After the terminal receives the check results of the plurality of representative calculation nodes, the terminal determines the total number of the check results, the number of the check results indicating that the first service is a legitimate service (hereinafter, simply referred to as "first check result"), and the number of the check results indicating that the first service is an illegitimate service (hereinafter, simply referred to as "second check result").
It is understood that the total number of check results is the sum of the number of first check results and the number of second check results.
In one possible design, the terminal determines whether to display the first service according to the number of the first verification results and the total number of the verification results.
As a possible implementation manner, the terminal calculates a proportion of the number of the first verification results to the total number of the verification results. If the specific gravity is larger than or equal to the threshold specific gravity, the terminal displays a first service; and if the specific gravity is smaller than the threshold specific gravity, the terminal does not display the first service.
It should be noted that the terminal may determine whether to display the first service according to a ratio of the number of the first verification results to the total number of the verification results; whether to display the first service may also be determined according to the number of the first check results. The embodiments of the present application do not limit this.
It can be appreciated that, since the blockchain utilizes encryption techniques to verify and store data, and utilizes a distributed consensus algorithm to add and update data, the blockchain requires each node to participate in the verification transaction and block out; and all subsequent records need to be changed when any data is modified, and the difficulty in modifying the data of a single node is great. The data stability and reliability of the blockchain is extremely high. Therefore, when the service verification method is implemented based on the block chain technology, the IPTV service data can be prevented from being tampered, and the safety of the service data is guaranteed.
The foregoing describes the solution provided by an embodiment of the present application, primarily from the perspective of a computer device. It will be appreciated that the computer device, in order to implement the above-described functions, comprises corresponding hardware structures and/or software modules for performing the respective functions. Those skilled in the art will readily appreciate that the exemplary business verification method steps described in connection with the embodiments disclosed herein may be implemented in hardware or a combination of hardware and computer software. Whether a function is performed as hardware or computer software drives hardware depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
The embodiment of the application also provides a service checking device. The service checking device may be a computer device, a CPU in the computer device, a processing module in the computer device for checking the validity of the service, or a client in the computer device for checking the validity of the service.
In the embodiment of the present application, the functional modules or the functional units may be divided according to the method example, for example, each functional module or functional unit may be divided corresponding to each function, or two or more functions may be integrated into one processing module. The integrated module may be implemented in a form of hardware, or may be implemented in a form of a software functional module or a functional unit. The division of the modules or units in the embodiment of the present application is schematic, and is only a logic function division, and there may be another division manner in actual implementation.
Fig. 4 is a schematic structural diagram of a service verification apparatus provided in this embodiment of the present application. The service verifying apparatus is configured to perform the service verifying method shown in fig. 2. The means for verifying the service may comprise a determining unit 101 and a sending unit 102.
A determining unit 101, configured to determine a service identifier of a first service, where the first service is a service received by a terminal; and the system is further used for determining a check result according to the service identifier of the first service and the preset service identifier, wherein the check result is used for indicating whether the service identifier which is the same as the service identifier of the first service exists in the preset service identifier, and the preset service identifier is the service identifier of all legal services. For example, in connection with fig. 2, the determining unit 101 may be configured to execute S102. A sending unit 102, configured to send the verification result to the terminal. For example, in connection with fig. 2, the determining unit 101 may be configured to perform S104.
Optionally, the service verifying apparatus further includes a receiving unit 103. The receiving unit 103 is configured to receive service information from a terminal. For example, in conjunction with fig. 2, the receiving unit 103 may be configured to perform S101. The determining unit 101 is specifically configured to determine a service identifier of the first service according to the service information.
Optionally, the service information includes: the content metadata of the second service and the service characteristics of the first service; the service characteristics are determined by the terminal according to the service data of the first service, the second service is a service requested by the terminal, and the second service is any one of all legal services.
Optionally, the determining unit 101 is further configured to, if a service identifier that is the same as the service identifier of the first service exists in the preset service identifier, use the verification result to indicate that the first service is a legal service; and if each service identifier in the preset service identifiers is different from the service identifier of the first service, the check result is used for indicating that the first service is an illegal service.
Optionally, the receiving unit 103 is further configured to receive all legal services sent by the integrated broadcast control platform. For example, in conjunction with fig. 3, the receiving unit 103 may be configured to perform S201. The determining unit 101 is further configured to determine a service identifier of each service in all the legitimate services according to the service information of each service in all the legitimate services. For example, in connection with fig. 3, the determining unit 101 may be configured to perform S202.
Fig. 5 shows yet another possible structure of the service checking apparatus involved in the above-described embodiment. The service verifying device comprises: a processor 201 and a communication interface 202. The processor 201 is used to control and manage the actions of the device, for example, to perform the various steps in the method flows shown in the above-described method embodiments, and/or to perform other processes for the techniques described herein. The communication interface 202 is used to support communication of the checking means of the service with other network entities. The verification means of the service may further comprise a memory 203 and a bus 204, the memory 203 being used for storing program codes and data of the device.
The processor 201 may implement or execute various exemplary logical blocks, units and circuits described in connection with the present disclosure. The processor may be a central processing unit, general purpose processor, digital signal processor, application specific integrated circuit, field programmable gate array or other programmable logic device, transistor logic device, hardware component, or any combination thereof. Which may implement or perform the various illustrative logical blocks, units, and circuits described in connection with the present disclosure. A processor may also be a combination of computing functions, e.g., comprising one or more microprocessors, a DSP and a microprocessor, or the like.
Memory 203 may include volatile memory, such as random access memory; the memory may also include non-volatile memory, such as read-only memory, flash memory, a hard disk, or a solid state disk; the memory may also comprise a combination of memories of the kind described above.
The bus 204 may be an Extended Industry Standard Architecture (EISA) bus or the like. The bus 204 may be divided into an address bus, a data bus, a control bus, and the like. For ease of illustration, only one thick line is shown in FIG. 5, but this is not intended to represent only one bus or type of bus.
In practical implementation, the sending unit 102 and the receiving unit 103 may be implemented by the communication interface 202 shown in fig. 5, and the determining unit 101 may be implemented by the processor 201 shown in fig. 5 calling the program code in the memory 203. The specific implementation process may refer to the description of the service verification method portion shown in fig. 2 or fig. 3, which is not described herein again.
Through the above description of the embodiments, it is clear to those skilled in the art that, for convenience and simplicity of description, the foregoing division of the functional modules is merely used as an example, and in practical applications, the above function distribution may be completed by different functional modules according to needs, that is, the internal structure of the device may be divided into different functional modules to complete all or part of the above described functions. For the specific working processes of the system, the apparatus and the unit described above, reference may be made to the corresponding processes in the foregoing method embodiments, and details are not described here again.
The present application provides a computer program product containing instructions, which when run on a computer, causes the computer to execute the method for verifying a service in the above method embodiments.
The embodiment of the present application further provides a computer-readable storage medium, where instructions are stored in the computer-readable storage medium, and when the instructions are run on a computer, the computer is enabled to execute the method for verifying the service in the method flow shown in the foregoing method embodiment.
The computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination thereof. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a Read-Only Memory (ROM), an Erasable Programmable Read-Only Memory (EPROM), a register, a hard disk, an optical fiber, a portable Compact Disc Read-Only Memory (CD-ROM), an optical storage device, a magnetic storage device, any suitable combination of the above, or any other form of computer readable storage medium known in the art. An exemplary storage medium is coupled to the processor such the processor can read information from, and write information to, the storage medium. Of course, the storage medium may also be integral to the processor. The processor and the storage medium may reside in an Application Specific Integrated Circuit (ASIC). In embodiments of the present application, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
Since the service verification apparatus, the computer-readable storage medium, and the computer program product in the embodiments of the present invention may be applied to the method described above, reference may also be made to the method embodiments for obtaining technical effects, and details of the embodiments of the present invention are not described herein again.
The above is only an embodiment of the present application, but the scope of the present application is not limited thereto, and any changes or substitutions within the technical scope of the present disclosure should be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (12)

1. A method for verifying a service, the method comprising:
determining a service identifier of a first service, wherein the first service is a service received by a terminal;
determining a check result according to the service identifier of the first service and a preset service identifier, wherein the check result is used for indicating whether a service identifier which is the same as the service identifier of the first service exists in the preset service identifier, and the preset service identifier is the service identifier of all legal services;
and sending the verification result to the terminal.
2. The method for checking according to claim 1, wherein said determining the service identifier of the first service comprises:
receiving service information from the terminal;
and determining the service identifier of the first service according to the service information.
3. The verification method according to claim 2, wherein the service information comprises: content metadata of a second service, service characteristics of the first service; the service characteristics are determined by the terminal according to the service data of the first service, the second service is the service requested by the terminal, and the second service is any one of all legal services.
4. A verification method according to any of claims 1-3, characterized in that the method further comprises:
if the preset service identifier has a service identifier which is the same as the service identifier of the first service, the checking result is used for indicating that the first service is a legal service;
and if each service identifier in the preset service identifiers is different from the service identifier of the first service, the check result is used for indicating that the first service is an illegal service.
5. The verification method of claim 4, further comprising:
receiving all legal services sent by the integrated broadcast control platform;
and determining the service identification of each service in all the legal services according to the service information of each service in all the legal services.
6. An apparatus for verifying a service, the apparatus comprising:
a determining unit, configured to determine a service identifier of a first service, where the first service is a service received by a terminal;
the determining unit is further configured to determine a check result according to the service identifier of the first service and a preset service identifier, where the check result is used to indicate whether a service identifier identical to the service identifier of the first service exists in the preset service identifier, and the preset service identifier is a service identifier of all legal services;
and the sending unit is used for sending the verification result to the terminal.
7. The verification apparatus of claim 6, further comprising:
a receiving unit, configured to receive service information from the terminal;
and a determining unit, configured to determine, according to the service information, a service identifier of the first service.
8. The verification apparatus according to claim 7, wherein the service information includes: content metadata of a second service, service characteristics of the first service; the service characteristics are determined by the terminal according to the service data of the first service, the second service is the service requested by the terminal, and the second service is any one of all legal services.
9. Verification device according to any of claims 6-8, characterized in that the determination unit is adapted to:
if the preset service identifier has a service identifier which is the same as the service identifier of the first service, the checking result is used for indicating that the first service is a legal service;
and if each service identifier in the preset service identifiers is different from the service identifier of the first service, the check result is used for indicating that the first service is an illegal service.
10. The verification apparatus of claim 9,
the receiving unit is further configured to receive all legal services sent by the integrated broadcast control platform;
the determining unit is further configured to determine a service identifier of each service in all the legitimate services according to the service information of each service in all the legitimate services.
11. A device for verifying a service, comprising: a processor, a memory, and a communication interface; the communication interface is used for communication between the service checking device and other equipment or networks; the memory is used for storing one or more programs, the one or more programs comprising computer-executable instructions, which when executed by the service verification device, are executed by the processor to cause the service verification device to perform the service verification method of any one of claims 1-5.
12. A computer-readable storage medium having instructions stored thereon, wherein the instructions, when executed by a computer, cause the computer to perform a method of verifying a service as claimed in any one of claims 1 to 5.
CN202010946362.5A 2020-09-10 2020-09-10 Service verification method and device Active CN112202725B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010946362.5A CN112202725B (en) 2020-09-10 2020-09-10 Service verification method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010946362.5A CN112202725B (en) 2020-09-10 2020-09-10 Service verification method and device

Publications (2)

Publication Number Publication Date
CN112202725A true CN112202725A (en) 2021-01-08
CN112202725B CN112202725B (en) 2023-04-07

Family

ID=74015516

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010946362.5A Active CN112202725B (en) 2020-09-10 2020-09-10 Service verification method and device

Country Status (1)

Country Link
CN (1) CN112202725B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102855449A (en) * 2012-09-18 2013-01-02 上海高越文化传媒股份有限公司 Playing control safety control system
WO2017041716A1 (en) * 2015-09-07 2017-03-16 天地融科技股份有限公司 Remote account opening method and system, and identity authentication method and system thereof
CN106850724A (en) * 2015-12-07 2017-06-13 中兴通讯股份有限公司 Data push method and device
CN109218752A (en) * 2017-06-30 2019-01-15 中国电信股份有限公司 Video playing, offer and detection method and set-top box, media server and system
CN110868641A (en) * 2018-08-28 2020-03-06 中国电信股份有限公司 Method and system for detecting validity of live broadcast source

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102855449A (en) * 2012-09-18 2013-01-02 上海高越文化传媒股份有限公司 Playing control safety control system
WO2017041716A1 (en) * 2015-09-07 2017-03-16 天地融科技股份有限公司 Remote account opening method and system, and identity authentication method and system thereof
CN106850724A (en) * 2015-12-07 2017-06-13 中兴通讯股份有限公司 Data push method and device
CN109218752A (en) * 2017-06-30 2019-01-15 中国电信股份有限公司 Video playing, offer and detection method and set-top box, media server and system
CN110868641A (en) * 2018-08-28 2020-03-06 中国电信股份有限公司 Method and system for detecting validity of live broadcast source

Also Published As

Publication number Publication date
CN112202725B (en) 2023-04-07

Similar Documents

Publication Publication Date Title
CN109327314B (en) Service data access method, device, electronic equipment and system
CN110958118B (en) Certificate authentication management method, device, equipment and computer readable storage medium
CN108769230B (en) Transaction data storage method, device, server and storage medium
CN110266642A (en) Identity identifying method and server, electronic equipment
US20100077446A1 (en) Center apparatus, terminal apparatus, and authentication system
CN112055019A (en) Method for establishing communication channel and user terminal
CN111199037A (en) Login method, system and device
CN113486122A (en) Data sharing method and electronic equipment
WO2020025056A1 (en) Method, device, system, and mobile terminal for security authorization
WO2019175427A1 (en) Method, device and medium for protecting work based on blockchain
US8504832B2 (en) Mobile terminal for sharing resources, method of sharing resources within mobile terminal and method of sharing resources between web server and terminal
CN111182527B (en) OTA (over the air) firmware upgrading method and device, terminal equipment and storage medium thereof
CN101048971B (en) Method and system for managing authentication and payment for use of broadcast material
CN115409511B (en) Personal information protection system based on block chain
CN105743651A (en) Method and apparatus for utilizing card application in chip security domain, and application terminal
CN112202725B (en) Service verification method and device
CN113434824B (en) Software service authorization management method, device, equipment and storage medium
CN113868713A (en) Data verification method and device, electronic equipment and storage medium
CN111885510B (en) Attendance checking method, attendance checking client and attendance checking system
CN112995098B (en) Authentication method, electronic device and storage medium
CN109429226B (en) Temporary user certificate generation method, user card, terminal and network equipment
CN114024692A (en) Signing method, device and system
CN112214751A (en) Verification code generation method and device
CN115828309B (en) Service calling method and system
CN116095671B (en) Resource sharing method based on meta universe and related equipment thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant