Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authentication method, server and television

An authentication method and TV technology, applied in the information field, can solve problems such as increasing costs, deceiving servers, and non-universal solutions

Active Publication Date: 2014-04-30
HISENSE VISUAL TECH CO LTD
View PDF9 Cites 40 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method also has security loopholes. First of all, adding trusted computing hardware modules to the TV will increase the cost, and in the process of communicating with the server, the key and method of data encryption must be the same as those on the server. In this way, if the server is attacked and compromised, Then the key on the TV side and the entire root-of-trust system can be cracked. Even if the server side is secure, the communication process cannot resist replay attacks, that is, the attacker can easily obtain the data flow in a certain authentication process, and then use these ciphertexts to The data is resent, which can easily fool the server
Secondly, only TVs with trusted computing modules can support this solution, and currently there are not many TVs with trusted computing modules on the market, which also means that this solution is not universal and its application is very limited
[0005] The above two traditional authentication schemes can only achieve one-way authentication, that is, only the server can authenticate the TV, but the TV cannot authenticate the server.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method, server and television
  • Authentication method, server and television
  • Authentication method, server and television

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] In order to understand the above-mentioned purpose, features and advantages of the present invention more clearly, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0025]In the following description, many specific details are set forth in order to fully understand the present invention. However, the present invention can also be implemented in other ways different from those described here. Therefore, the protection scope of the present invention is not limited by the specific details disclosed below. EXAMPLE LIMITATIONS.

[0026] The present invention will be further described below in conjunction with the accompanying drawings and embodiments. It should be noted that, in the case of no conflict, the embodiments of the present application and the features in the embodiments can be combined with each other.

[0027] Since both parties are involved in the authentication process, the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an authentication method, a server and a television. The authentication method comprises the steps that when an authentication request from the television is received, a random number is sent to the television; first encrypted data and television identification from the television are received and a pre-stored television side public key corresponding to the television identification is used for conducting decryption on the first encrypted data, wherein the first encrypted data are data generated through the method that encryption is conducted on the random number by a television side private key used by the television and the television side public key and the television side private key are a pair of matched keys; whether a decrypted random number is identical to the random number fed back to the television is judged; if the judged result shows that the two random numbers are identical, a successful authentication result is sent to the television. According to the technical scheme, bidirectional authentication of the server and the television is achieved, an external device is not needed, the authentication process is simple, the random numbers are involved in the authentication process, and the safety of the authentication system is improved.

Description

technical field [0001] The present invention relates to the field of information technology, in particular to an authentication method, a server and a television. Background technique [0002] Smart Internet TV is a new generation of functional TV. This product breaks through the old mode of traditional TV that can only watch TV programs and cannot interact. Users can conveniently experience online online games, online photo albums, online shopping and Internet services such as instant messaging, but while users enjoy the convenience brought by the Internet, the security protection of user information, especially the security and reliability of user access to the network, is also facing huge challenges. [0003] In view of this problem, the traditional solution is that the user enters account password and other information for authentication when logging in to the server. This method is the easiest to be attacked and the least secure. In the prior art, some use the dynamic ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04N21/6334H04N21/4627
Inventor 房鸿利
Owner HISENSE VISUAL TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products