Key anti-theft method and apparatus
A key and consistent technology, applied in the field of network data transmission, can solve the problem of ineffective anti-theft
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0048] refer to figure 1 , figure 1 It is a schematic flowchart of the key anti-theft method provided in this embodiment.
[0049] Embodiment 1 is applied to an authentication server. In this embodiment, the method may include the following steps:
[0050] S101: The authentication server receives a first access request sent by a client.
[0051] In this embodiment, when a user triggers a service to access a certain network resource, the client can send a first access request, and the authentication server can open a port through socket communication to wait for the client to connect, and accept the first access request sent by the client. Of course, other communication methods can also be used to establish a connection between the authentication server and the client, and the purpose of the present invention can also be achieved.
[0052] Clients can be communication devices such as set-top boxes, smart phones, tablet computers, and PCs. The system of the authentication se...
Embodiment 2
[0068] refer to figure 2 , figure 2 It is a schematic flowchart of the key anti-theft method provided by Embodiment 2 of the present invention.
[0069] The method in Embodiment 2 is applied to a multimedia server. In this embodiment, the method may include the following steps:
[0070] S201: Receive a second access request sent by a client; the second access request includes a key containing identity information of the client.
[0071] The multimedia server and the client can be connected through socket communication, and accept the second access request sent by the client. Of course, other communication methods can also be used to establish a connection between the multimedia server and the client, and the purpose of the present invention can also be achieved.
[0072] Clients can be communication devices such as set-top boxes, smart phones, tablet computers, and PCs. The system of the multimedia server can be a Linux system, a Windows system, an IOS system, and the li...
Embodiment 3
[0088] refer to image 3 , image 3 It is a schematic flowchart of the key anti-theft method provided by Embodiment 3 of the present invention.
[0089] In Embodiment 3, the key anti-theft method may include, for example:
[0090] S301: The client sends a first access request to the authentication server.
[0091] When a user triggers a service to access a certain network resource, the client may send a first access request. Clients can be communication devices such as set-top boxes, smart phones, tablet computers, and PCs. The first access request may include information about the resource to be accessed by the user.
[0092] S302: After receiving the first access request sent by the client, the authentication server parses the first access request to obtain the identity information of the corresponding player, and generates a key corresponding to the first access request. The key includes identity information of the client.
[0093] The connection between the authentic...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


