Method for implementing reinforced authentication by binding access account number and business account number

A technology of account binding and access mode, applied in the field of user authentication and authentication technology, it can solve the problems of one-number access, multi-machine sharing, easy account theft, etc., and achieve the effect of enhancing security and reducing operating costs.

Inactive Publication Date: 2008-01-23
NANJING ZHONGXING XIN SOFTWARE CO LTD
View PDF0 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] The technical problem to be solved by the present invention is to provide a method for strengthening authentication by binding the access account and service account, and solve the p

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for implementing reinforced authentication by binding access account number and business account number
  • Method for implementing reinforced authentication by binding access account number and business account number

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The specific implementation of the technical solution of the present invention will be described in further detail below in conjunction with the accompanying drawings and specific embodiments.

[0043] In order to prevent IPTV service accounts from being stolen; in order to prevent one service account from being shared by multiple addresses and set-top boxes; in order to avoid that service accounts marked as special users still need to be compared. It is proposed to increase the binding comparison process, and realize the solution of security authentication and authentication according to the comparison of the binding account when the user accesses the authentication.

[0044] When the user logs in and authenticates, the user's broadband user is compared with the business account, and only the same name or match is sent to the background or a third-party system for business authentication, and the uniqueness of the business account login is guaranteed. At the same time,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses a method to realize enhanced authentication by binding an access account with a service account. In detail, a set-top box reports login parameters to a senior level. An IPTV system judges whether it is necessary to verify by matching the access account with the service account based on access type of the set-top box. If necessary, it needs to further judge access user type, special user or common user. As for common user that has ever successfully logged in, the access account and the service account are authenticated to confirm whether they match each other. In case of conformance, special account or first login of common users, a third system is informed to conduct authentication. Upon completion of authentication by the third system, authentication prompts are fed back to the set-top box through the IPTV system. The present invention enhances user account security by binding a broadband account with a service account, thus prevent service account theft and avoiding losses of operators and users.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Owner NANJING ZHONGXING XIN SOFTWARE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products