Application authentication method, device and system

An authentication and in-application technology, applied in the field of information security, can solve problems such as stealing communication content and source code, and not being able to provide security guarantees for H5 applications and smart home appliances.

Inactive Publication Date: 2016-11-09
TCL CORPORATION
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If the URL address of H5 is obtained, it is easy to steal communication content and source code through a browser or some professional tools
[0007] The security method provided by the above prior art to ensure the interaction between H5 applications and smart home appliances is mainly to protect data from being illegally stolen and used during network transmission, but it cannot provide security for the interaction between H5 applications and smart home appliances from the source. Assure

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application authentication method, device and system
  • Application authentication method, device and system
  • Application authentication method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] In order to make the object, technical solution and beneficial effects of the present invention more clear, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0028] An embodiment of the present invention provides an application authentication method. An application refers to an application embedded with a browser. The method includes: when the browser initiates a webpage access, the authentication request module sends the authentication identification information to the authentication Authorization server, so that the authentication server authenticates the browser's access to the webpage; the authentication monitoring module receives the authentication result of the authentication server's authentication of the browser's access to the webpage...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an application authentication method, device and system, and aims at improving the safety of interaction between an application and an intelligent household electrical appliance. The application is embedded with a browser; and the method comprises that when the browser initiates webpage access, an authentication request module sends authentication identification information to an authentication server, so that the authentication server authenticates webpage access by the browser; an authentication monitoring module receives an authentication result; and if the authentication result shows that authentication passes, the authentication monitoring module loads resources of the application and transmits the authentication result to an authentication plug-in module of the browser, so that the browser accesses the webpage. Compared with the prior art in which data is only encrypted in the data transmission process after that the browser accesses the webpage, according to the method of the invention, authentication is carried out at the very beginning and the browser cannot access the webpage unless authentication passes, and thus, interaction between the application and the intelligent household electrical appliance is safer in the Internet of things.

Description

technical field [0001] The invention belongs to the field of information security, and in particular relates to an application authentication method, device and system. Background technique [0002] The maturity of cloud services, Internet of Things, and mobile Internet technologies, as well as the improvement of the performance of network chips and home appliance hardware, have made smart home appliances gradually enter the home life of ordinary people. Among them, applications, especially H5 applications, interact with smart home appliances very frequently. The so-called H5 application refers to a webpage program based on the Hyper Text Markup Language (Hyper Text Markup Language, HTML) 5.0 standard, that is, HTML5. In order to ensure the security of the interaction between H5 applications and smart home appliances in the Internet of Things, the solutions provided by the existing technology are roughly as follows: [0003] 1) Use https to encrypt hypertext transfer protoc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04W12/06
CPCH04L63/08H04W12/06
Inventor 金慧
Owner TCL CORPORATION
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products