Authentication method and authentication system for page visiting

An authentication method and page technology, applied in the field of communication, can solve the problems of high cost, shortening the validity of tokens, and the system has no time to handle other affairs, and achieve the effect of enhancing page security authentication

Inactive Publication Date: 2013-06-26
中国广电河南网络有限公司
View PDF6 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Because user information and tokens are transmitted in the transmission network, they are easy to be intercepted and counterfeited, causing some unauthorized users to pretend to be authorized users to access the homepage interface, which leads to confusion in the video-on-demand system
In order to prevent the token from being

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method and authentication system for page visiting
  • Authentication method and authentication system for page visiting
  • Authentication method and authentication system for page visiting

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0062] like figure 1 As shown, the first embodiment of the page authentication method provided by the present invention, the method includes:

[0063] Step S101: After verifying the validity of the token, receive the first parameter sent by the top box and the first time stamp obtained through the one-way system, the one-way system is a clock system shared by the authorized set-top box and the front-end system;

[0064] The storage unit of the front-end system contains the validity information of the set-top box token. When the set-top box sends a request for accessing the home page interface, it sends the token to the front-end control system. The front-end system checks in its own storage unit according to the token sent by the set-top box. Whether it contains the token information, if it contains the token information, and the token information is within the valid time limit, it means that the token is valid.

[0065] The first parameter sent by the receiver top box, said ...

no. 2 example

[0082] like image 3 As shown, it is the second embodiment of the page authentication method provided by the present invention, the method includes:

[0083] Step S301: After verifying the validity of the token, the first encrypted user password and the first time stamp obtained through the one-way system sent by the receiver set-top box are the authorized set-top box and the front-end system Shared clock system;

[0084] After verifying the validity of the token, the set-top box sends the encrypted first user password and the first time stamp obtained in the one-way system to the front-end system through the transmission network.

[0085] Step S302: when the preset condition is met, obtain the current second time stamp via the one-way system;

[0086] The preset conditions include:

[0087] there is no timestamp in the storage unit consistent with said first timestamp; or

[0088] empty condition.

[0089] When the preset condition is an empty condition, the front-end sy...

no. 3 example

[0102] Such as Figure 5 As shown, it is a third embodiment of a page verification method of the present invention, including:

[0103] Step S501: After verifying the validity of the token, receive the first encrypted first data sent by the set-top box, the start-up time of the set-top box, and the first time stamp obtained through the one-way system, the one-way system is A clock system shared by the authorized set-top box and the front-end system;

[0104] After verifying the validity of the token, the set-top box sends the encrypted first data to the front-end system through the transmission network. The first data includes the first user password, the start-up time of the set-top box and the first time stamp, and The first timestamp obtained in .

[0105] Step S502: when the preset condition is met, obtain the current second time stamp via the one-way system;

[0106] The preset conditions include:

[0107] there is no timestamp in the storage unit consistent with said...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an authentication method and an authentication system for page visiting. A synchronous clock source is sought in a set top box and a front end system to be regarded as a parameter, and the front end system rejects users in abnormal states through timestamps. Since issuing frequency of tokens is not increased, system pressure is not increased. By the authentication method and the authentication system, page safety authentication can be enhanced, so that counterfeit users cannot disguise as authorized users to visit homepage interfaces, normal order of video-on-demand systems can be guaranteed, and system pressure can be released.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a page access authentication method and system. Background technique [0002] With the continuous advancement of communication technology and the continuous promotion of TV set-top boxes, Video On Demand (VOD) technology is gradually emerging. Video On Demand technology is a product of the development of computer technology, network technology, and multimedia technology. It is a brand new information service. Technology, which mainly uses the cable TV network to integrate sound, image, graphics, text, data, etc. by using multimedia technology, and plays the audio-visual program designated by the user to a specific set-top box. [0003] The video-on-demand service is realized through the video-on-demand system, which mainly consists of three parts: the front-end system, the transmission network and the set-top box. The front-end system provides a homepage interface for aut...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/08H04L29/06H04L9/32H04N21/254H04N21/266
Inventor 王道谊贾鹏薄斐翔王海涛李伟鹏袁子林
Owner 中国广电河南网络有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products