Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Security level authentication method and system

A technology of security level and security verification, applied in transmission system, image communication, selective content distribution, etc., can solve problems such as inability to uniformly manage third-party systems, business systems without unified definition, and domain security, etc., to achieve system Unified management, reduced workload, and easy integration

Inactive Publication Date: 2013-02-13
天柏宽带网络技术(北京)有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] 1. There is no uniform definition for business systems, and all third-party systems cannot be managed uniformly
[0014] 2. Most of the third-party business systems are mature products, and the security models used are different, so it is not possible to uniformly use one method for security verification; while the existing single sign-on system only performs two types of verification and non-verification for security. The security mode does not consider domain security issues under the business strategy, and the verification mode is relatively single
[0015] 3. A single verification mode will greatly reduce the performance of the system to a certain extent (for example, all systems need to pass safety certification every time)
[0016] 4. Under the large-scale integrated system architecture that integrates the security system, the problem reflected is no longer as simple as entering the third-party system after simple security certification, but instead is the integration of security processes, billing processes, and work processes. This will appear in the absence of a unified process control function after different security level certifications

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security level authentication method and system
  • Security level authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] The technical solutions of the present invention will be further described below in conjunction with the accompanying drawings and through specific implementation methods.

[0050] figure 1 It is a system structure diagram of security level authentication in the specific embodiment of the present invention. like figure 1 As shown, the security level authentication system includes a user terminal 101, a business operation and support system 102, a multi-service engine system 103, a single sign-on system 104, a single sign-on front-end processor 105, a portal system 106, a business system 107 and an application system 108.

[0051]The user terminal accesses the business system or application system through the portal system, the business operation and support system defines the business system information, formulates the billing policy for the services defined by the business system, and synchronizes the business system information to the multi-service engine system, an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a security level authentication method and system. The method comprises the following steps: a third-party system is divided into a business system and an application system, BOSS is used to define the business system information, formulate billing strategy and update the information to SASE, SASE completes the registration of the business system; SASE defines the application system information, and defines and manages the security level strategy of each system; SASE classifies the systems according to business models and distributes corresponding security level strategies for different kinds of systems; and a user accesses the third-party system through a portal system, a single sign-on system distinguishes the system accessed by the user and performs corresponding safety verification flows according to the security level strategies corresponding to different kinds of systems and the corresponding security level strategies of the systems. By adopting the technical scheme of the invention, the extensible security level strategies can be provided and the security strategies can be classified so that the systems can flexibly integrated to the current architecture and the safety of each system can be ensured.

Description

technical field [0001] The invention relates to the technical field of digital television, in particular to a method and system for security level authentication. Background technique [0002] In the field of digital TV, there is a huge system structure and many physical systems. These systems support different service systems in various forms, and are finally displayed to users in the digital TV portal. In this architecture, security becomes one of the important components. Since the many systems that make up the system architecture may be developed by multiple companies, and there is no unified security standard in the system architecture, the systems of each company have completely different security architectures. At the same time, due to the different technical levels and business models of each company, there will be different levels of understanding of security requirements, making the security environment need to handle different security levels of verification when...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04N21/258
Inventor 高卿辛宇
Owner 天柏宽带网络技术(北京)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products