Closed loop-type security authentication method for business system portals and system adopting same

A technology for business system and security authentication, which is applied in the field of closed-loop security authentication of business system portals, and can solve the problems of potential safety hazards in single-chain jumps

Active Publication Date: 2012-08-01
SHENZHEN COSHIP ELECTRONICS CO LTD +1
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to provide a method and system for closed-loop security authentication of business system portals, aiming to solve the technical problem of potential safety hazards in existing single-chain jumps

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Closed loop-type security authentication method for business system portals and system adopting same
  • Closed loop-type security authentication method for business system portals and system adopting same
  • Closed loop-type security authentication method for business system portals and system adopting same

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] In order to make the objectives, technical solutions and advantages of the present invention clearer, the following further describes the present invention in detail with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are only used to explain the present invention, but not to limit the present invention.

[0019] figure 1 It is a flowchart of a closed-loop security authentication method for a business system portal provided by an embodiment of the present invention, such as figure 1 As shown, the method 100 for closed-loop security authentication of a business system portal includes the following steps:

[0020] Step S101: The digital television terminal receives the selection control signal sent by the user, selects a service menu on the main portal, and triggers a jump request to enter the service system portal.

[0021] Step S103: The platform management portal (Portal Manage System, hereinafter...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention is applicable to the technical field of digital television security authentication and provides a closed loop-type security authentication method for business system portals and a system adopting the same. The method comprises the following steps: generating a first user logging-in certificate by an AAA according to a user ID and a business ID and sending the certificate to a PORTAL; jumping the PORTAL carrying the first user logging-in certificate and the user ID to a business system portal according to the business portal address; generating a second user logging-in certificate by the business system according to the previously agreed rule, comparing the second user logging-in certificate with the first user logging-in certificate, and determining that the user is jumped from the master portal if the two certificates are identical; and extracting the first user logging-in certificate by the AAA according to the business system ID and comparing the first user logging-in certificate with the second user logging-in certificate, and succeeding the authentication when the two certificates are identical. The closed loop-type security authentication method for the business system portals and the system adopting the same, provided by the invention, can solve the technical problem of potential safety hazards in the existing single link-type jumping.

Description

Technical field [0001] The invention belongs to the technical field of digital television security certification, and in particular relates to a closed-loop security certification method and system for a business system portal. Background technique [0002] At present, the way to jump to the digital TV business system portal is single-chain jump, that is to say, jump directly according to the Uniform Resource Locator (URL), and there is no closed loop after jumping to the business system portal. In this way, once an illegal user grabs this URL, he can simulate a portal jump to attack. Therefore, this method has security risks. [0003] The above single-chain jump means that the user first logs in to the main portal, and then jumps to the business system portal from the secondary menu directly according to the URL address of the business system, and then can directly operate the business system portal. Such a single-chain portal jump has serious security risks. When the main portal...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04N21/254H04N21/2543H04N21/258H04L9/32
Inventor 丁永峰
Owner SHENZHEN COSHIP ELECTRONICS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products