CN112784071B - IPTV data sharing system and method - Google Patents

IPTV data sharing system and method Download PDF

Info

Publication number
CN112784071B
CN112784071B CN202011623575.0A CN202011623575A CN112784071B CN 112784071 B CN112784071 B CN 112784071B CN 202011623575 A CN202011623575 A CN 202011623575A CN 112784071 B CN112784071 B CN 112784071B
Authority
CN
China
Prior art keywords
unit
user
login
token
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011623575.0A
Other languages
Chinese (zh)
Other versions
CN112784071A (en
Inventor
王晶
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Space Shichuang Chongqing Technology Co ltd
Original Assignee
Chongqing Space Visual Creation Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing Space Visual Creation Technology Co ltd filed Critical Chongqing Space Visual Creation Technology Co ltd
Priority to CN202011623575.0A priority Critical patent/CN112784071B/en
Publication of CN112784071A publication Critical patent/CN112784071A/en
Application granted granted Critical
Publication of CN112784071B publication Critical patent/CN112784071B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/41User authentication where a single sign-on provides access to a plurality of computers
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/40Information retrieval; Database structures therefor; File system structures therefor of multimedia data, e.g. slideshows comprising image and additional audio data
    • G06F16/43Querying
    • G06F16/435Filtering based on additional data, e.g. user or group profiles
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/953Querying, e.g. by the use of web search engines
    • G06F16/9535Search customisation based on user profiles and personalisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Abstract

The application belongs to the technical field of network televisions, and particularly relates to an IPTV data sharing system and method. The system comprises an access unit, a verification unit, a login unit and a local storage unit; the access unit is used for sending a verification signal to the verification unit after receiving the single sign-on request; the verification unit is used for judging whether a token exists in the local storage unit after receiving the verification signal, and if the token does not exist in the local storage unit, sending a login signal to the login unit; the verification unit is also used for judging whether the token is valid or not when the token exists in the local storage unit as a judgment result, if so, finishing login, and if not, sending a login signal to the login unit; the login unit is used for jumping the login interface after receiving the login signal, and is also used for verifying after receiving the logged-in user information, generating a token if the user information passes the verification, storing the token in the local storage unit and sending a passing signal; the verification unit is also used for finishing login after receiving the passing signal. The system can realize information sharing of multiple host users.

Description

IPTV data sharing system and method
Technical Field
The application belongs to the technical field of network televisions, and particularly relates to an IPTV data sharing system and method.
Background
The IPTV data sharing system solves the problem that a plurality of systems share user information, namely single sign-on. Single sign-on refers to that a user only needs to log in once in a plurality of application systems to access all application systems which are mutually trusted.
The general idea is that the client uses an ID (login account password) as a credential, and the server uses session to verify the validity of the ID (the ID may expire, the corresponding information may not be found at all, the corresponding client under the ID has not been login verified, etc.). But the session is unique to each server at first, for example, the bean cotyledon FM has its own session, the bean reading also has its own session, and the cookie recording the ID cannot cross the domain. Therefore, in order to realize one login and one logout, the client needs to share one session information of each server, so that the client can hold the ID under each domain name.
On the other hand, with the development of the internet, the distributed type has been widely used, so that a host cannot meet the request of a large user in many cases. In order to alleviate the host pressure in the above situation, many times, a project is deployed with multiple hosts, and then, the user's request amount is distributed by using nginx for load balancing.
However, in this way, after the information of the user is stored in the session, the user interface repeatedly prompts to log in, that is, a session is always created, so that information sharing of multiple host users cannot be realized.
Therefore, there is a need for an IPTV data sharing system and method that can realize information sharing among multiple host users.
Disclosure of Invention
The application aims to provide an IPTV data sharing system and method, which can realize information sharing of multiple host users.
The basic scheme provided by the application is as follows:
the IPTV data sharing system comprises an access unit, a verification unit, a login unit and a local storage unit;
the local storage unit is used for storing the token;
the access unit is used for sending a verification signal to the verification unit after receiving the single sign-on request;
the verification unit is used for judging whether a token exists in the local storage unit after receiving the verification signal, and if the token does not exist in the local storage unit, sending a login signal to the login unit; the verification unit is also used for judging whether the token is valid or not when the token exists in the local storage unit as a judgment result, if so, finishing login, and if not, sending a login signal to the login unit;
the login unit is used for jumping the login interface after receiving the login signal, and is also used for verifying after receiving the logged-in user information, if the user information passes the verification, generating a token, storing the token in the local storage unit and sending a passing signal to the verification unit;
the verification unit is also used for finishing login after receiving the passing signal.
Basic scheme theory of operation and beneficial effect:
when a user performs single sign-on, a single sign-on request is sent to an access unit.
After receiving the single sign-on request, the access unit sends a verification signal to the verification unit; after receiving the verification signal, the verification unit judges whether a token exists in the local storage unit, and if the token does not exist, the verification unit sends a login signal to the login unit; the login unit jumps to the login interface after receiving the login signal, a user can input login user information through the login interface, the login unit verifies after receiving the login user information, if the login user information passes the verification, a token is generated, the token is stored in the local storage unit and is transmitted to the verification unit, and the verification unit completes login after receiving the pass signal.
When the verification unit judges that the token exists in the local storage unit, judging whether the token is valid or not, if so, finishing login, and if not, sending a login signal to the login unit, and repeating the process.
If the validation unit validates the token, the login is completed. Thus, the login can be automatically completed when the single sign-on is performed as long as the valid token is stored in the local storage unit.
Compared with the prior art that the information of the user is stored in the session, the session invalidation problem can be effectively solved, the problem that the front end and the rear end separate data cannot be stored can be solved, and the user experience can be greatly improved. Besides, the application is simple and effective, can ensure the service deployment problem of a plurality of machines, can ensure the data security to the greatest extent, can effectively reduce the operation complexity of multi-system login, and can smoothly and rapidly finish login even if used for the first time; and after one login, other subsystems are accessed without secondary login, so that the operation complexity is reduced.
In conclusion, the system can realize information sharing of multiple host users.
Further, when the login unit generates a token, the user object information is converted into json format data.
Compared with XML, json has faster reading and writing speed, no reserved word, simple structure and more convenient generation and analysis.
Further, the login unit refreshes the login interface when the authentication fails.
And the login page is automatically refreshed, so that the user can conveniently input user information again to log in.
Furthermore, the login unit is also used for prompting to re-login when the login interface is refreshed after verification failure.
The user is informed of the operation to be performed with the re-login prompt.
Further, the prompting mode is graph and voice.
The user can know the situation conveniently.
Further, a database is included; after the login unit generates the token, the token is also stored in the database.
Further, the database is NoSQL.
Compared with other databases, noSQL has better normalization and data integrity, stronger functions, perfection as a persistence layer and higher security.
Further, noSQL is redis.
Redis has extremely high performance, high reading speed, supports rich data types, and supports backup of data.
Further, the local storage unit is a cookie.
Cookies have very good extensibility and usability.
The application provides a basic scheme II: the IPTV data sharing method uses the IPTV data sharing system.
Drawings
Fig. 1 is a logic block diagram of a first embodiment of the present application.
Detailed Description
The following is a further detailed description of the embodiments:
example 1
As shown in fig. 1, the IPTV data sharing system includes an access unit, an authentication unit, a login unit, a local storage unit, and a database.
In this embodiment, the database is NoSQL, and compared with other databases, noSQL has better standardization and data integrity, has stronger functions, is more perfect as a persistence layer, and has higher security. Specifically, noSQL is redis. Redis has extremely high performance, high reading speed, supports rich data types, and supports backup of data. The local storage unit is a cookie. Cookies have very good extensibility and usability.
The local storage unit is used for storing the token.
The access unit is used for sending a verification signal to the verification unit after receiving the single sign-on request.
The verification unit is used for judging whether a token exists in the local storage unit after receiving the verification signal, and if the token does not exist in the local storage unit, sending a login signal to the login unit; the verification unit is also used for judging whether the token is valid or not when the token exists in the local storage unit as a judgment result, finishing login if the token is valid, and sending a login signal to the login unit if the token is invalid.
The login unit is used for jumping the login interface after receiving the login signal, and is also used for verifying after receiving the logged-in user information, if the user information passes the verification, a token is generated, the token is stored in the local storage unit and the database, and a passing signal is sent to the verification unit. When the login unit generates a token, user object information is converted into json format data, and compared with XML, the json has the advantages of higher reading and writing speed, no reserved word, simple structure and more convenient generation and analysis.
The verification unit is also used for finishing login after receiving the passing signal.
The login unit also refreshes the login interface when authentication fails. And the login interface is also used for prompting to log in again when the login interface is refreshed after verification fails. In this embodiment, the prompting mode is graphics plus voice.
The specific implementation process is as follows:
when a user performs single sign-on, a single sign-on request is sent to an access unit.
After receiving the single sign-on request, the access unit sends a verification signal to the verification unit; after receiving the verification signal, the verification unit judges whether a token exists in the local storage unit, and if the token does not exist, the verification unit sends a login signal to the login unit; the login unit jumps to the login interface after receiving the login signal, a user can input logged-in user information through the login interface, the login unit verifies after receiving the logged-in user information, if the user information passes the verification, a token is generated, the token is stored in the local storage unit and the database, and a passing signal is sent to the verification unit; the verification unit completes login after receiving the pass signal.
And when the login unit fails to verify, refreshing the login interface and sending out a re-login prompt. Thus, the user can conveniently input the user information again for login.
When the verification unit judges that the token exists in the local storage unit, judging whether the token is valid or not, if so, finishing login, and if not, sending a login signal to the login unit, and repeating the process.
If the validation unit validates the token, the login is completed. Thus, the login can be automatically completed when the single sign-on is performed as long as the valid token is stored in the local storage unit.
Compared with the prior art that the information of the user is stored in the session, the session invalidation problem can be effectively solved, the problem that the front end and the rear end separate data cannot be stored can be solved, and the user experience can be greatly improved. Besides, the application is simple and effective, can ensure the service deployment problem of a plurality of machines, can ensure the data security to the greatest extent, can effectively reduce the operation complexity of multi-system login, and can smoothly and rapidly finish login even if used for the first time; and after one login, other subsystems are accessed without secondary login, so that the operation complexity is reduced.
By using the system, information sharing of multiple host users can be realized.
Another object of the present application is to provide an IPTV data sharing method, using the IPTV data sharing system.
Example two
Unlike the first embodiment, the present embodiment further includes an acquisition unit, a storage unit, a user analysis unit, and a content pushing unit.
The user acquisition unit is used for acquiring user interaction data and also used for acquiring user voice. Wherein the interaction data comprises a program being viewed. When gathering user's pronunciation, accessible installs the adapter on intelligent remote controller and gathers, this is prior art, and is not repeated here.
The user analysis unit is used for carrying out user portrait according to the interaction data of the user and storing the user portrait in the storage unit; the user analysis unit is also used for carrying out user identity recognition and emotion recognition according to the voice; when the identification result is that the user is a single person and is not a new user, the content pushing unit calls the user portrait of the user and generates recommended content by combining the identified emotion and media asset data;
when the identification result is that the user is a plurality of people and no new user exists, the user analysis unit analyzes whether the emotion abnormal user exists or not; if the user is not in emotion abnormality, the user analysis unit judges whether the priority ordering of the corresponding user is stored in the storage unit, if the priority ordering of the corresponding user is not stored in the storage unit, the content recommendation unit calls user portraits of all users and generates recommended content according to the principle of average distribution by combining media data, the user analysis unit performs priority ordering on the users according to the interactive data and the user images, and the storage unit is also used for storing the priorities of the users; if the user is abnormal without emotion, and the priority order of the corresponding user is stored in the storage unit, the content recommending unit calls the user portrait of the user with the highest priority order, and outputs the corresponding recommended content by combining with the media data;
if the users do not have abnormal emotion, and the priority ranks of the corresponding users are stored in the storage unit, but the programs watched in the interactive data are inconsistent with the recommended content, the user analysis unit records the current time, calls user portraits of all users, analyzes the current leading user, and updates the priority ranks of the users by combining the current time and the programs, and when the corresponding programs exist in the media data at the time point, the leading user has the highest priority;
if the emotion abnormal user exists, the content recommendation unit calls the user portrait of the emotion abnormal user and generates recommended content by combining the identified emotion and the media data.
The specific implementation process is as follows:
when only one user is present and the user is not a new user, the content pushing unit calls the user portrait of the user, and generates recommended content by combining the identified emotion and media data, so that the user can have good use experience.
When a plurality of users watch at the same time and have no abnormal emotion users, the priority order of the corresponding users is stored in the storage unit, the content recommending unit calls the user portrait of the user with the highest priority order, and the corresponding recommending content is output by combining media data. Because a plurality of people who live together usually have priority to the viewing right of IPTV, usually, the person with the highest priority who is present can have the decision right, through this setting, directly carry out content push for the user with the highest priority, can save the time of blindly searching for the program, simultaneously because do not push for content according to other users 'user portraits, in the process of selecting the program, other users can also reduce the misery that can't see by oneself wanting to watch the program.
When a plurality of users watch at the same time and no abnormal emotion user exists, and the priority ordering of the corresponding users is not stored in the storage unit, the content recommending unit calls the portraits of all the users, generates recommended content according to the principle of average distribution by combining media resource data, and the user analyzing unit performs priority ordering on the users according to the interactive data and the user images, and the storage unit is also used for storing the priorities of the users. In such a way, the priority is gradually generated, so that the overall experience of the following multiple people in watching can be improved.
When a plurality of users watch at the same time, the users do not have abnormal emotions, and the priority orders of the corresponding users are stored in the storage unit, but the programs watched in the interactive data do not accord with the recommended content. It is stated that a user of which a certain priority is not highest has a highest right to need or be able to watch the program in the current period, for example, a young person can watch a football game on friday and evening. Therefore, the user analysis unit records the current time, calls user portraits of all users, analyzes the current dominant user, and updates the priority order of the users by combining the current time and programs, and the dominant user is the highest priority when the corresponding program exists in the media data at the time point. Therefore, when the corresponding program exists in the media data at the next time point, the content recommendation unit can directly push the program, and the user experience can be improved.
When multiple users are watching at the same time, and there is an abnormal emotion user, in order to take care of the emotion of the user, it is common for a person to see some favorite programs of the user. At this time, the content recommendation unit calls the user portrait of the user with abnormal emotion, and generates recommended content in combination with the identified emotion and media data. Therefore, the program preferred by the abnormal user can be accurately pushed, and the purpose of taking care of the emotion of the user is achieved.
The foregoing is merely an embodiment of the present application, and a specific structure and characteristics of common knowledge in the art, which are well known in the scheme, are not described herein, so that a person of ordinary skill in the art knows all the prior art in the application date or before the priority date, can know all the prior art in the field, and has the capability of applying the conventional experimental means before the date, and a person of ordinary skill in the art can complete and implement the present embodiment in combination with his own capability in the light of the present application, and some typical known structures or known methods should not be an obstacle for a person of ordinary skill in the art to implement the present application. It should be noted that modifications and improvements can be made by those skilled in the art without departing from the structure of the present application, and these should also be considered as the scope of the present application, which does not affect the effect of the implementation of the present application and the utility of the patent. The protection scope of the present application is subject to the content of the claims, and the description of the specific embodiments and the like in the specification can be used for explaining the content of the claims.

Claims (10)

1. An IPTV data sharing system, characterized in that: the system comprises an access unit, a verification unit, a login unit, a local storage unit, a user analysis unit and a content pushing unit;
the local storage unit is used for storing the token;
the access unit is used for sending a verification signal to the verification unit after receiving the single sign-on request;
the verification unit is used for judging whether a token exists in the local storage unit after receiving the verification signal, and if the token does not exist in the local storage unit, sending a login signal to the login unit; the verification unit is also used for judging whether the token is valid or not when the token exists in the local storage unit as a judgment result, if so, finishing login, and if not, sending a login signal to the login unit;
the login unit is used for jumping the login interface after receiving the login signal, and is also used for verifying after receiving the logged-in user information, if the user information passes the verification, generating a token, storing the token in the local storage unit and sending a passing signal to the verification unit;
the user analysis unit is used for carrying out user identity recognition and emotion recognition according to the voice;
when the user is identified as a single person non-new user, the content pushing unit calls the user portrait of the user and combines the identified emotion and media data to generate recommended content;
analyzing whether an emotional abnormal user exists when the user is identified as a plurality of people and no new user exists;
if the emotion abnormal user exists, the content pushing unit calls a user portrait of the emotion abnormal user, and generates recommended content by combining the identified emotion and media data;
if no abnormal emotion clients exist, judging whether the priority ordering of the corresponding users is stored in the local storage unit, if no abnormal emotion clients exist, the content pushing unit calls user portraits of all users, generates recommended content according to the principle of average distribution by combining media data, and the user analysis unit performs priority ordering on the users according to the interactive data and the user images;
if the user is abnormal without emotion, and the priority order of the corresponding user is stored in the storage unit, the content recommending unit calls the user portrait of the user with the highest priority order, and outputs the corresponding recommended content by combining with the media data; if the program watched in the interactive data is inconsistent with the recommended content at the moment, the user analysis unit records the current time, calls user portraits of all users, analyzes the current dominant user, combines the current time and the program to update the priority ranking of the users, and when the corresponding program exists in the media asset data at the time point, the dominant user is the highest priority;
the verification unit is also used for finishing login after receiving the passing signal.
2. The IPTV data sharing system according to claim 1, wherein: when the login unit generates a token, the user object information is converted into json format data.
3. The IPTV data sharing system according to claim 1, wherein: the login unit also refreshes the login interface when authentication fails.
4. An IPTV data sharing system according to claim 3, characterized in that: the login unit is also used for prompting to re-login when the login interface is refreshed after verification failure.
5. The IPTV data sharing system according to claim 4, wherein: the prompting mode is graph and voice.
6. The IPTV data sharing system according to claim 1, wherein: also includes a database; after the login unit generates the token, the token is also stored in the database.
7. The IPTV data sharing system according to claim 6, wherein: the database is NoSQL.
8. The IPTV data sharing system according to claim 7, wherein: noSQL is redis.
9. The IPTV data sharing system according to claim 1, wherein: the local storage unit is a cookie.
10. The IPTV data sharing method is characterized in that: an IPTV data sharing system using any of the above claims 1-9.
CN202011623575.0A 2020-12-31 2020-12-31 IPTV data sharing system and method Active CN112784071B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011623575.0A CN112784071B (en) 2020-12-31 2020-12-31 IPTV data sharing system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011623575.0A CN112784071B (en) 2020-12-31 2020-12-31 IPTV data sharing system and method

Publications (2)

Publication Number Publication Date
CN112784071A CN112784071A (en) 2021-05-11
CN112784071B true CN112784071B (en) 2023-08-15

Family

ID=75754393

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011623575.0A Active CN112784071B (en) 2020-12-31 2020-12-31 IPTV data sharing system and method

Country Status (1)

Country Link
CN (1) CN112784071B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106131675A (en) * 2016-07-19 2016-11-16 乐视控股(北京)有限公司 A kind of Method of Commodity Recommendation, Apparatus and system
CN107948167A (en) * 2017-11-29 2018-04-20 浙江数链科技有限公司 A kind of method and apparatus of single-sign-on
CN109309683A (en) * 2018-10-30 2019-02-05 泰华智慧产业集团股份有限公司 The method and system of client identity verifying based on token
CN110135257A (en) * 2019-04-12 2019-08-16 深圳壹账通智能科技有限公司 Business recommended data generation, device, computer equipment and storage medium
CN111797304A (en) * 2019-04-09 2020-10-20 华为技术有限公司 Content pushing method, device and equipment

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP5910316B2 (en) * 2012-05-28 2016-04-27 ソニー株式会社 Information processing apparatus, information processing method, and program
US11631039B2 (en) * 2019-02-11 2023-04-18 SupportLogic, Inc. Generating priorities for support tickets

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106131675A (en) * 2016-07-19 2016-11-16 乐视控股(北京)有限公司 A kind of Method of Commodity Recommendation, Apparatus and system
CN107948167A (en) * 2017-11-29 2018-04-20 浙江数链科技有限公司 A kind of method and apparatus of single-sign-on
CN109309683A (en) * 2018-10-30 2019-02-05 泰华智慧产业集团股份有限公司 The method and system of client identity verifying based on token
CN111797304A (en) * 2019-04-09 2020-10-20 华为技术有限公司 Content pushing method, device and equipment
CN110135257A (en) * 2019-04-12 2019-08-16 深圳壹账通智能科技有限公司 Business recommended data generation, device, computer equipment and storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
情绪识别技术在电力智能客服系统中的应用研究;张晓慧等;《电子器件》;第43卷(第5期);1061-1065 *

Also Published As

Publication number Publication date
CN112784071A (en) 2021-05-11

Similar Documents

Publication Publication Date Title
US11190527B2 (en) Identity verification and login methods, apparatuses, and computer devices
CN109309683B (en) Token-based client identity authentication method and system
US11329981B2 (en) Issuing, storing and verifying a rich credential
US20220237273A1 (en) Authentication of audio-based input signals
US9576135B1 (en) Profiling user behavior through biometric identifiers
US9203975B2 (en) System and method for user lifecycle management in traditional telecom/cable operator technology environments
JP2006523900A (en) Internet system for authenticating member profile information
US8650405B1 (en) Authentication using dynamic, client information based PIN
US9916308B2 (en) Information processing system, document managing server, document managing method, and storage medium
US20110126266A1 (en) Method and system for authenticating subaccount users
CN112784071B (en) IPTV data sharing system and method
US9674177B1 (en) Dynamic knowledge-based user authentication without need for presentation of predetermined credential
US20040181416A1 (en) Apparatus and method for granting/denying user requests for features of an application program
US20230156254A1 (en) Systems and methods to temporarily grant access to a digital gateway
US11379932B2 (en) Social watchlist
US10735399B2 (en) System, service providing apparatus, control method for system, and storage medium
JP2003044437A (en) Just-in-time authentication of user of digital home network
CN116414042A (en) Automatic control method and device for intelligent equipment
WO2016115923A1 (en) Set top box in iptv system and method for controlling same
KR102221673B1 (en) Self-authenication service using abstaction image based on user experience and operating method thereof
CN106559305A (en) By the method and device of Information Sharing to third party's social networkies
CN107517177B (en) Interface authorization method and device
US20190319958A1 (en) Systems and methods for authorizing access to computing resources
CN112152977A (en) Heterogeneous cloud platform authentication and authorization integration system
KR102199288B1 (en) Apparatus and method for suggesting service

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP03 Change of name, title or address

Address after: 401120 room 701, room 1, 7 / F, building 11, No. 106, west section of Jinkai Avenue, Yubei District, Chongqing

Patentee after: Space Shichuang (Chongqing) Technology Co.,Ltd.

Address before: 401121 17-4, building 2, No. 70, middle section of Huangshan Avenue, Yubei District, Chongqing

Patentee before: Chongqing Space Visual Creation Technology Co.,Ltd.

CP03 Change of name, title or address