Check patentability & draft patents in minutes with Patsnap Eureka AI!

Method for implementing reinforced authentication by binding access account number and business account number

A technology of account binding and access mode, applied in the field of user authentication and authentication technology, it can solve the problems of one-number access, multi-machine sharing, easy account theft, etc., and achieve the effect of enhancing security and reducing operating costs.

Inactive Publication Date: 2008-01-23
NANJING ZHONGXING XIN SOFTWARE CO LTD
View PDF0 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] The technical problem to be solved by the present invention is to provide a method for strengthening authentication by binding the access account and service account, and solve the problem of one-number multiple access and multi-machine sharing in the prior art caused by only using user service account information to log in. , and the account is easy to be stolen, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for implementing reinforced authentication by binding access account number and business account number
  • Method for implementing reinforced authentication by binding access account number and business account number

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The specific implementation of the technical solution of the present invention will be described in further detail below in conjunction with the accompanying drawings and specific embodiments.

[0043] In order to prevent IPTV service accounts from being stolen; in order to prevent one service account from being shared by multiple addresses and set-top boxes; in order to avoid that service accounts marked as special users still need to be compared. It is proposed to increase the binding comparison process, and realize the solution of security authentication and authentication according to the comparison of the binding account when the user accesses the authentication.

[0044] When the user logs in and authenticates, the user's broadband user is compared with the business account, and only the same name or match is sent to the background or a third-party system for business authentication, and the uniqueness of the business account login is guaranteed. At the same time,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses a method to realize enhanced authentication by binding an access account with a service account. In detail, a set-top box reports login parameters to a senior level. An IPTV system judges whether it is necessary to verify by matching the access account with the service account based on access type of the set-top box. If necessary, it needs to further judge access user type, special user or common user. As for common user that has ever successfully logged in, the access account and the service account are authenticated to confirm whether they match each other. In case of conformance, special account or first login of common users, a third system is informed to conduct authentication. Upon completion of authentication by the third system, authentication prompts are fed back to the set-top box through the IPTV system. The present invention enhances user account security by binding a broadband account with a service account, thus prevent service account theft and avoiding losses of operators and users.

Description

technical field [0001] The invention relates to the application fields of broadband access network and interactive Internet TV (IPTV) business, in particular to user authentication technology in IPTV business. Background technique [0002] With the continuous enrichment and popularization of IPTV services and the continuous increase of user groups, operators need to enhance the security of user account management, so as to provide a basis for better promotion of IPTV services. [0003] In the existing application, the two input boxes of the user name and the password on the login interface require the user to input correct IPTV service account information. When the user enters the account information (business account name, password), the IPTV business background performs authentication, or the third-party system (97 / Customer Relationship Management CRM / Voice Network VNET, wherein 97 refers to the 97 system, a The operation support system adopted by the operator) to authent...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04N7/16
Inventor 黄睿
Owner NANJING ZHONGXING XIN SOFTWARE CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More