Set top box application authorization application method and system

A set-top box, top-box technology, applied in image communication, selective content distribution, electrical components, etc., can solve problems such as security issues

Active Publication Date: 2018-10-12
SHENZHEN JIUZHOU ELECTRIC
View PDF10 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, it is necessary to adopt an Internet user authentication mechanism for the above-mentioned application authorization, which has security problems, and provide a set-top box application authorization method and system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Set top box application authorization application method and system
  • Set top box application authorization application method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0028] figure 1 is a flow chart of a set-top box application authorization method in an embodiment, such as figure 1 As shown, the method includes the following steps:

[0029] Step S10: setting an application authorization configuration file and storing it in the set-top box, the application authorization configuration file stores a list of authorized applications allowed in different regions.

[0030] The applications on the set-top box have different authorize...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a set top box application authorization application method and system. According to the method, a function of a set top box supporting a USB plug-in device of a mobile networkis used for obtaining location information of a connected mobile network base station when the set top box accesses the mobile network, and determining an area where the set top box is located, thereby, according to the application authorization profile stored in the set top box, querying the application in the area allowed for authorization. The set top box application authorization applicationmethod and system in the invention do not require a user to verify the account password on the Internet again, thereby solving the problem that the user account password is leaked and the user information is not safe, and effectively protecting the user information.

Description

technical field [0001] The invention relates to the field of digital television, in particular to a set-top box application authorization use method and system. Background technique [0002] With the application of the set-top box intelligent system, other applications other than high-definition and standard-definition playback on the set-top box system are also becoming more and more abundant. [0003] At present, most set-top boxes support 3G / 4G / 5G and other mobile network USB plug-in devices (for example, if the Internet is not activated or cannot be connected to the Internet), they are used for the set-top box to connect to the mobile network. When the set-top box cannot be directly connected to the Internet, the applications on the set-top box must be connected to the Internet server through mobile networks such as 3G / 4G / 5G for user authentication and authorization before they can be used. Since the server for authenticating users and authorization is deployed on the I...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04N21/254H04N21/262H04N21/266H04N21/4623
CPCH04N21/2541H04N21/26291H04N21/26606H04N21/4623
Inventor 王祥红
Owner SHENZHEN JIUZHOU ELECTRIC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products