Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for implementing authentication

An authentication system and portal system technology, applied in the field of authentication, can solve problems such as inability to integrate filters, increase the difficulty of development and testing, and achieve the effect of solving security risks

Inactive Publication Date: 2009-05-13
天柏宽带网络技术(北京)有限公司
View PDF0 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] 5. Authentication and billing may occur with one party's billing system during integration
[0015] The existing technical solutions have the following problems: filters cannot be integrated between heterogeneous systems, and products will integrate more and more different security components due to the increase in application scenarios. If the SSO filter is integrated, the user has no authentication at all when accessing, because the integration will cause secondary development, which increases the difficulty of development and testing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for implementing authentication
  • Method and system for implementing authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] The technical solutions of the present invention will be further described below in conjunction with the drawings and specific implementations.

[0054] The main idea of ​​the technical scheme of the present invention is to use Proxy Integrated Component (Proxy Integrated Component, PIC) to realize the security integration between systems in the field, which can act as a proxy for a business system to be integrated into the existing security system to complete security authentication, business authentication and Data exchange.

[0055] figure 1 It is a schematic diagram of the structure of an authentication system in the digital television field in the specific embodiment of the present invention. Such as figure 1 As shown, the authentication system includes a user terminal 101, a portal system 102, an authentication system 103, a billing system 104, an agent integration component 105, and a third-party service system 106.

[0056] The user sends user information to the p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a system for realizing authentication which can act an operation system into a prior safety system for realizing safety integration among systems in the field by using an acting integrated package, and completes safety authentication, operation authentication and data interchange. The technical scheme provided by the invention can reduce integration cost, prevent the existing product line from being destroyed, reduce integrated time of both sides, ensure safety among systems efficiently, complete charging authentication conveniently, and make the integration on the operation logic and the business model.

Description

Technical field [0001] The present invention relates to the technical field of digital television, in particular to a method and system for realizing authentication. Background technique [0002] In the field of digital TV, there are huge system architectures and numerous physical systems. These systems support different business systems in various forms and are finally shown to users in the digital TV portal. In this architecture, security becomes one of the important components. Since the many systems that make up the domain architecture may be developed by multiple companies, and there is no uniform security standard in the domain, each system has a completely different security architecture. At the same time, the systems developed by each company use different development languages, different system environments, and different business strategies, making security integration more difficult. There are mainly the following situations: [0003] 1. The integrated parties use diff...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04N7/16H04L9/32
Inventor 高卿辛宇王道谊
Owner 天柏宽带网络技术(北京)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products