Unlock instant, AI-driven research and patent intelligence for your innovation.
Security authentication method for intelligent set-top box
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
An intelligent set-top box, security authentication technology, applied in image communication, selective content distribution, electrical components, etc., can solve the problems of password leakage, forgotten password, inconvenience, etc., to achieve the effect of quick verification and convenient management
Inactive Publication Date: 2016-02-03
SHENZHEN SOWELL TECH
View PDF10 Cites 4 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
Through the use of these more and more functions, the security authentication problem of the set-top box gradually emerges. Many functions involve user information and require the user's password verification to be used. The traditional method is to set a digital password first, and then use it every time. Need to enter a password, but the password is leaked, the password is forgotten, etc., which is neither safe nor convenient enough
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
Embodiment 1
[0040] Example 1, set fingerprint password:
[0041] 1) Open the mobile APP for the first time, and the mobile APP displays the page that is scanning the set-top box connected to the Internet, such as image 3 shown.
[0042] 2) Display the list of scanned set-top boxes after scanning, such as Figure 4 shown.
[0043] 3) Select "99999999" set-top box to set the fingerprint, such as Figure 5 shown.
[0044] 4) at Figure 5 If you choose "No" in the interface shown, the page will jump to Figure 4 Select the set-top box; if you select "Yes", then jump to the fingerprint part of the mobile phone system settings, such as Figure 6 shown.
[0045] 5) After the fingerprint entry is completed, the mobile phone system will prompt the completion after it is stored, and select "OK", as follows Figure 7 shown.
[0046] 6) Then jump to the mobile APP page, and the mobile APP prompts whether to continue to enter fingerprints, such as Figure 8 shown.
[0047] 7) At the same tim...
Embodiment 2
[0049] Embodiment 2, fingerprint decryption:
[0050] When using the set-top box 99999999, when a password is required, the set-top box will prompt to enter the fingerprint for decryption, such as Figure 11 shown.
[0051] At this time, the user opens the mobile APP, and the mobile APP automatically scans the set-top boxes connected to the network, such as Figure 12 shown.
[0052] After scanning, the list of scanned set-top boxes will be displayed, such as Figure 13 shown.
[0053] After the user selects the set-top box "99999999", the decryption operation can be performed, such as Figure 14 shown.
[0054] If the user selects "Set password", the mobile APP will jump to the fingerprint setting section. Figure 6 Perform the fingerprint setting operation. If you select "Decrypt", the mobile APP will prompt the user to enter the fingerprint, such as Figure 15 shown.
[0055] If the information of fingerprint 2 is entered, because the information of fingerprint 2 h...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
PUM
Login to View More
Abstract
The invention discloses a security authentication method for an intelligent set-top box. The security authentication method comprises the following steps: a mobile phone interacts with the intelligent set-top box through a local area network; a user inputs fingerprint on a mobile phonefingerprint sensor, and the mobile phone combines an IMEI code of the mobile phone and the user fingerprint information into a user identifier and sends the user identifier to the set-top box through the local area network; the set-top box stores the received user identifier; the user needing to decrypt the set-top box inputs the fingerprint on the mobile phone fingerprint sensor, the mobile phone combines the IMEI code of the mobile phone and the user fingerprint information into a user verification identifier and sends the user verification identifier to the set-top box through the local area network; and after receiving the user verification identifier, the set-top box verifies whether a user identifier record matched with the user verification identifier exists in a local storage list, and if so, the decryption is successful. By adopting the security authentication method disclosed by the invention, the user does not need to input a digital password, and the user can easily and safely use his own fingerprint password on the intelligent set-top box to enjoy services.
Description
[technical field] [0001] The invention relates to an intelligent set-top box, in particular to a security authentication method for an intelligent set-top box. [Background technique] [0002] With the continuous development of set-top box technology, now, the set-top box business has stepped into the network world, the content received by the set-top box is not only the image and sound that can be provided by analog TV, but also digital content, including electronic program guide, Internet pages, subtitles, etc. Wait. It enables users to watch digital TV programs on existing TV sets, and conduct interactive digital entertainment, education and commercial activities through the network. Through the use of these more and more functions, the security authentication problem of the set-top box gradually emerged. Many functions involve user information and require the user's passwordverification to be used. The traditional method is to set a digital password first, and then use ...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.