Security authentication method for intelligent set-top box

An intelligent set-top box, security authentication technology, applied in image communication, selective content distribution, electrical components, etc., can solve the problems of password leakage, forgotten password, inconvenience, etc., to achieve the effect of quick verification and convenient management

Inactive Publication Date: 2016-02-03
SHENZHEN SOWELL TECH
View PDF10 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Through the use of these more and more functions, the security authentication problem of the set-top box gradually emerges. Many functions involve user information and require the user's password verification to be used. The traditional method is to set a digital password first, and then use it every time. Need to enter a password, but the password is leaked, the password is forgotten, etc., which is neither safe nor convenient enough

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security authentication method for intelligent set-top box
  • Security authentication method for intelligent set-top box
  • Security authentication method for intelligent set-top box

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0040] Example 1, set fingerprint password:

[0041] 1) Open the mobile APP for the first time, and the mobile APP displays the page that is scanning the set-top box connected to the Internet, such as image 3 shown.

[0042] 2) Display the list of scanned set-top boxes after scanning, such as Figure 4 shown.

[0043] 3) Select "99999999" set-top box to set the fingerprint, such as Figure 5 shown.

[0044] 4) at Figure 5 If you choose "No" in the interface shown, the page will jump to Figure 4 Select the set-top box; if you select "Yes", then jump to the fingerprint part of the mobile phone system settings, such as Figure 6 shown.

[0045] 5) After the fingerprint entry is completed, the mobile phone system will prompt the completion after it is stored, and select "OK", as follows Figure 7 shown.

[0046] 6) Then jump to the mobile APP page, and the mobile APP prompts whether to continue to enter fingerprints, such as Figure 8 shown.

[0047] 7) At the same tim...

Embodiment 2

[0049] Embodiment 2, fingerprint decryption:

[0050] When using the set-top box 99999999, when a password is required, the set-top box will prompt to enter the fingerprint for decryption, such as Figure 11 shown.

[0051] At this time, the user opens the mobile APP, and the mobile APP automatically scans the set-top boxes connected to the network, such as Figure 12 shown.

[0052] After scanning, the list of scanned set-top boxes will be displayed, such as Figure 13 shown.

[0053] After the user selects the set-top box "99999999", the decryption operation can be performed, such as Figure 14 shown.

[0054] If the user selects "Set password", the mobile APP will jump to the fingerprint setting section. Figure 6 Perform the fingerprint setting operation. If you select "Decrypt", the mobile APP will prompt the user to enter the fingerprint, such as Figure 15 shown.

[0055] If the information of fingerprint 2 is entered, because the information of fingerprint 2 h...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a security authentication method for an intelligent set-top box. The security authentication method comprises the following steps: a mobile phone interacts with the intelligent set-top box through a local area network; a user inputs fingerprint on a mobile phone fingerprint sensor, and the mobile phone combines an IMEI code of the mobile phone and the user fingerprint information into a user identifier and sends the user identifier to the set-top box through the local area network; the set-top box stores the received user identifier; the user needing to decrypt the set-top box inputs the fingerprint on the mobile phone fingerprint sensor, the mobile phone combines the IMEI code of the mobile phone and the user fingerprint information into a user verification identifier and sends the user verification identifier to the set-top box through the local area network; and after receiving the user verification identifier, the set-top box verifies whether a user identifier record matched with the user verification identifier exists in a local storage list, and if so, the decryption is successful. By adopting the security authentication method disclosed by the invention, the user does not need to input a digital password, and the user can easily and safely use his own fingerprint password on the intelligent set-top box to enjoy services.

Description

[technical field] [0001] The invention relates to an intelligent set-top box, in particular to a security authentication method for an intelligent set-top box. [Background technique] [0002] With the continuous development of set-top box technology, now, the set-top box business has stepped into the network world, the content received by the set-top box is not only the image and sound that can be provided by analog TV, but also digital content, including electronic program guide, Internet pages, subtitles, etc. Wait. It enables users to watch digital TV programs on existing TV sets, and conduct interactive digital entertainment, education and commercial activities through the network. Through the use of these more and more functions, the security authentication problem of the set-top box gradually emerged. Many functions involve user information and require the user's password verification to be used. The traditional method is to set a digital password first, and then use ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04N21/4415H04N21/436
CPCH04N21/4415H04N21/43615
Inventor 江彩霞
Owner SHENZHEN SOWELL TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products