CN103178969A - Service authentication method and system - Google Patents

Service authentication method and system Download PDF

Info

Publication number
CN103178969A
CN103178969A CN2013101325398A CN201310132539A CN103178969A CN 103178969 A CN103178969 A CN 103178969A CN 2013101325398 A CN2013101325398 A CN 2013101325398A CN 201310132539 A CN201310132539 A CN 201310132539A CN 103178969 A CN103178969 A CN 103178969A
Authority
CN
China
Prior art keywords
voucher
agent
terminal
operation server
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2013101325398A
Other languages
Chinese (zh)
Other versions
CN103178969B (en
Inventor
王道谊
贾鹏
薄斐翔
陈欣
卜瑞锋
王海涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
HENAN CABLE TV NETWORK GROUP CO Ltd
Original Assignee
HENAN CABLE TV NETWORK GROUP CO Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by HENAN CABLE TV NETWORK GROUP CO Ltd filed Critical HENAN CABLE TV NETWORK GROUP CO Ltd
Priority to CN201310132539.8A priority Critical patent/CN103178969B/en
Publication of CN103178969A publication Critical patent/CN103178969A/en
Application granted granted Critical
Publication of CN103178969B publication Critical patent/CN103178969B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

This invention provides a service authentication method. The method comprises the steps that an operating server receives service access request carrying first agent certificates and service identification sent by a terminal based on the operating server, wherein the first agent certificates are distributed when the operating server performs authentication to the terminal and are different from one another when the operating server performs authentication to the terminal every time; the operating server sends response message to the terminal; the terminal fixes second agent certificates according to the response message and sends agent service access request carrying the second agent certificates to a proxy server; the proxy server sends the second agent certificates to the operating server; the operating server verifies the validity of the second agent certificates and sends verification results to the proxy server; and the proxy server processes the agent service access request according to the verification results, so that the method reduces risks that terminal information is intercepted and illegally used, and improves the security of the terminal for accessing the operating server and the proxy server.

Description

A kind of service authentication method and system
Technical field
The application relates to authentication field, particularly a kind of service authentication method and system.
Background technology
At present, Operation Server need to authenticate the terminal based on Operation Server, and after terminal closedown or standby, Operation Server can authenticate terminal again.And every pair of terminal authentication of Operation Server once, is all the identical terminal iidentification of terminal distribution, and this terminal iidentification records the real information of terminal.terminal sends all carried terminal signs of Operational Visit request to Operation Server each time, when Operation Server receives the Operational Visit request of terminal, legitimacy according to terminal iidentification judgement terminal, after the judgement terminal is legal, if it is business in acting server that Operation Server is judged business corresponding to Operational Visit request that terminal sends, Operation Server makes terminal carried terminal identification access acting server, acting server judges according to terminal iidentification whether terminal is the legal terminal of acting server, if, acting server provides service to terminal.
Can find out from said process, terminal carried terminal sign always is real information access Operation Server and acting server.The real information of terminal keeps equal state to transmit for a long time, causes the risk that the real information of terminal is intercepted and captured and falsely used to increase, and reduces the fail safe of terminal access Operation Server and acting server.
Summary of the invention
For solving the problems of the technologies described above, the application provides a kind of service authentication method, reduces to reach the risk that end message is intercepted and captured and falsely used, and improves the fail safe purpose of terminal access Operation Server and acting server, and technical scheme is as follows:
A kind of service authentication method is characterized in that, the method comprises:
Operation Server receives the Operational Visit request based on the terminal transmission of described Operation Server, first agent's voucher and the service identification of described terminal carried in described Operational Visit request, described first agent's voucher is that described Operation Server distributes when described terminal is authenticated, and first agent's voucher that described Operation Server distributes when this terminal being authenticated at every turn is different;
In the situation that described Operation Server determines that according to described first agent's voucher described terminal is that legal terminal and described Operation Server determine that according to described service identification described terminal has business corresponding to described service identification to the acting server order, described Operation Server sends response message to described terminal, comprises at least the reference address of the business that described service identification is corresponding in described response message;
Described terminal is determined second agent's voucher according to described response message, and send the agent service access request according to the reference address of business corresponding to described service identification to described acting server, described agent service access request carries second agent's voucher of described terminal, and effective duration of described second agent's voucher is not more than effective duration of described first agent's voucher;
Second agent's voucher in the described agent service access request that described acting server will receive is sent to described Operation Server;
The legitimacy of second agent's voucher that the described acting server of described Operation Server checking sends, and the result that will verify is sent to described acting server;
Described acting server is processed described agent service access request according to the result of described checking.
Preferably, described first agent's voucher is comprising of distributing when described terminal is authenticated of described Operation Server:
Described first agent's voucher is that described Operation Server is converted to operating state in described terminal by non operating state or distributes when described terminal being authenticated during every Preset Time.
Preferably, described Operation Server receives the Operational Visit request based on the terminal transmission of described Operation Server, and described Operational Visit request carries corresponding first agent's voucher and the service identification of terminal that sends the Operational Visit request and also comprises before:
The storage of described Operation Server is based on the corresponding relation of the terminal iidentification of first agent's voucher of the terminal of Operation Server and terminal corresponding to this first agent's voucher and effective duration of this first agent's voucher.
Preferably, described terminal determines that according to described response message second agent's voucher comprises:
Whether comprise provisional voucher in the described response message of described terminal judges;
Wherein, to be described Operation Server distributing before sending response message to described terminal described provisional voucher, and described Operation Server stores effective duration of the provisional voucher of the corresponding relation of terminal iidentification of the provisional voucher of described terminal and described terminal and described terminal;
If determine that described provisional voucher is second agent's voucher;
If not, determine that described first agent's voucher is second agent's voucher.
Preferably, the second agent's voucher in the described acting server described agent service access request that will receive is sent to described Operation Server and comprises:
Described acting server is sent to described Operation Server by VPN (virtual private network) VPN with the second agent's voucher that receives.
Preferably, the legitimacy of second agent's voucher of the described acting server transmission of described Operation Server checking comprises:
Described Operation Server is determined effective deadline of described first agent's voucher according to effective duration of described first agent's voucher;
Described Operation Server judges whether the time of described acting server transmission first agent voucher exceeds effective deadline of described first agent's voucher;
If whether first agent's voucher that the more described acting server of described Operation Server sends is consistent with first agent's voucher of the terminal that sends described agent service access request;
In the situation that comparative result is consistent, determine that first agent's voucher of described acting server transmission is legal;
In the inconsistent situation of comparative result, determine that first agent's voucher of described acting server transmission is illegal;
If not, first agent's voucher of described acting server transmission lost efficacy.
Preferably, the legitimacy of second agent's voucher of the described acting server transmission of described Operation Server checking comprises:
Described Operation Server is determined effective deadline of described provisional voucher according to effective duration of described provisional voucher;
Described Operation Server judges whether the time of the provisional voucher of described acting server transmission exceeds effective deadline of described provisional voucher;
If whether the provisional voucher that the more described acting server of described Operation Server sends is consistent with the provisional voucher of the terminal that sends described agent service access request;
In the situation that comparative result is consistent, determine that the provisional voucher of described acting server transmission is legal;
In the inconsistent situation of comparative result, determine that the provisional voucher of described acting server transmission is illegal;
If not, the provisional voucher of described acting server transmission lost efficacy.
Preferably, described terminal comprises set-top box;
Described first agent's voucher is the agent authorization voucher.
A kind of service authentication system comprises Operation Server, terminal and acting server, wherein:
described Operation Server is used for, reception is based on the Operational Visit request of the terminal transmission of described Operation Server, first agent's voucher and the service identification of described terminal carried in described Operational Visit request, in the situation that determine that according to described first agent's voucher described terminal is legal terminal and determines that according to described service identification described terminal has business corresponding to described service identification to the acting server order, send response message to described terminal, at least comprise the reference address of the business that described service identification is corresponding in described response message, and verify the legitimacy of second agent's voucher that described acting server sends, and the result that will verify is sent to described acting server, described first agent's voucher is that described Operation Server distributes when described terminal is authenticated, and the first agent's voucher that distributes when described Operation Server authenticates this terminal at every turn is different,
Described terminal is used for, send the Operational Visit request to described Operation Server, determine second agent's voucher according to the response message that described Operation Server sends, and send the agent service access request according to the reference address of business corresponding to described service identification to described acting server, described agent service access request carries second agent's voucher of described terminal, and effective duration of described second agent's voucher is not more than effective duration of described first agent's voucher;
Described acting server is used for, second agent's voucher in the agent service access request that the described terminal that receives is sent is sent to described Operation Server and carries out legitimate verification, and according to the result that described Operation Server sends, process the agent service access request that described terminal sends.
Preferably, described terminal comprises set-top box;
Described first agent's voucher is the agent authorization voucher.
Compared with prior art, the application's beneficial effect is:
In this application, Operation Server receives the Operational Visit request based on the terminal transmission of described Operation Server, first agent's voucher and the service identification of described terminal carried in described Operational Visit request, described first agent's voucher is that described Operation Server distributes when described terminal is authenticated, and first agent's voucher that described Operation Server distributes when this terminal being authenticated at every turn is different; In the situation that described Operation Server determines that according to described first agent's voucher described terminal is that legal terminal and described Operation Server determine that according to described service identification described terminal has business corresponding to described service identification to the acting server order, described Operation Server sends response message to described terminal, comprises at least the reference address of the business that described service identification is corresponding in described response message; Described terminal is determined second agent's voucher according to described response message, and sending the agent service access request according to the reference address of business corresponding to described service identification to described acting server, described agent service access request carries second agent's voucher of described terminal; Second agent's voucher in the described agent service access request that described acting server will receive is sent to described Operation Server; The legitimacy of second agent's voucher that the described acting server of described Operation Server checking sends, and the result that will verify is sent to described acting server; Described acting server is processed described agent service access request according to the result of described checking.
because using first agent's voucher, the application replaces the real information of terminal, in order to realize Operation Server and mutual based between the terminal of Operation Server, and the first agent's voucher that distributes when described Operation Server authenticates this terminal at every turn is different, second agent's voucher replaces the real information of terminal, in order to realize mutual between described terminal and acting server, and effective duration of described second agent's voucher equals effective duration of described first agent's voucher at the most, different when replacing as can be known the information of first agent's voucher of terminal real information and second agent's voucher to transmit within a certain period of time, make intercepting and capturing end message person be difficult to determine changeless first agent's voucher and second agent's voucher according to the first agent's voucher and the second agent's voucher that constantly change, thereby can not intercept first agent's voucher and second agent's voucher of terminal, and then can not falsely use described terminal, reduce the risk that end message is intercepted and captured and falsely used, improve the fail safe of terminal access Operation Server and acting server.
Intercept first agent's voucher and second agent's voucher even intercept and capture the end message person, because first agent's voucher and second agent's voucher can change after a period of time, first agent's voucher and second agent's voucher that intercepting and capturing end message person intercepts also can lose efficacy, thereby terminal can not be falsely used, further reduced the risk that terminal falsely used and improved fail safe.
The legitimacy of first agent's voucher of Operation Server verification terminal in the application, after Operation Server determines that described terminal is legal terminal, described terminal is carried second agent's voucher access proxies, acting server sends described second agent's voucher to Operation Server, the described second agent's voucher of Operation Server checking forms Operation Server, terminal and acting server tripartite faith mechanism.
Description of drawings
In order to be illustrated more clearly in the technical scheme in the embodiment of the present application, during the below will describe embodiment, the accompanying drawing of required use is done to introduce simply, apparently, accompanying drawing in the following describes is only some embodiment of the application, for those of ordinary skills, under the prerequisite of not paying creative work, can also obtain according to these accompanying drawings other accompanying drawing.
Fig. 1 is a kind of flow chart of a kind of service authentication method of providing of the application;
Fig. 2 is a kind of schematic diagram of the interworking flow process between Operation Server, terminal and acting server;
Fig. 3 is that Operation Server determines whether described terminal is a kind of flow chart of the detailed process of legal terminal;
Fig. 4 is terminal is determined the detailed process of second agent's voucher according to described response message a kind of flow chart;
Fig. 5 is a kind of flow chart of detailed process of the legitimacy of first agent's voucher of sending of Operation Server checking acting server;
Fig. 6 is a kind of flow chart of detailed process of the legitimacy of the provisional voucher that sends of Operation Server checking acting server;
Fig. 7 is a kind of structural representation of a kind of service authentication system that provides of the application.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present application, the technical scheme in the embodiment of the present application is clearly and completely described, obviously, described embodiment is only the application's part embodiment, rather than whole embodiment.Based on the embodiment in the application, those of ordinary skills are not making the every other embodiment that obtains under the creative work prerequisite, all belong to the scope of the application's protection.
The application's Operation Server receives the Operational Visit request based on the terminal transmission of described Operation Server, first agent's voucher and the service identification of described terminal carried in described Operational Visit request, described first agent's voucher is that described Operation Server distributes when described terminal is authenticated, and first agent's voucher that described Operation Server distributes when this terminal being authenticated at every turn is different; In the situation that described Operation Server determines that according to described first agent's voucher described terminal is that legal terminal and described Operation Server determine that according to described service identification described terminal has business corresponding to described service identification to the acting server order, described Operation Server sends response message to described terminal, comprises at least the reference address of the business that described service identification is corresponding in described response message; Described terminal is determined second agent's voucher according to described response message, and send the agent service access request according to the reference address of business corresponding to described service identification to described acting server, described agent service access request carries second agent's voucher of described terminal, and effective duration of described second agent's voucher is not more than effective duration of described first agent's voucher; Second agent's voucher in the described agent service access request that described acting server will receive is sent to described Operation Server; The legitimacy of second agent's voucher that the described acting server of described Operation Server checking sends, and the result that will verify is sent to described acting server; Described acting server is processed described agent service access request according to the result of described checking.Below in conjunction with flow chart, the service authentication method that the application provides is described.
An embodiment
See also Fig. 1, a kind of flow chart that it shows a kind of service authentication method that the application provides can comprise the following steps:
Step S11: Operation Server receives the Operational Visit request based on the terminal transmission of described Operation Server, first agent's voucher and the service identification of described terminal carried in described Operational Visit request, described first agent's voucher is that described Operation Server distributes when described terminal is authenticated, and first agent's voucher that described Operation Server distributes when this terminal being authenticated at every turn is different.
In the present embodiment, at first Operation Server authenticates the terminal based on Operation Server, and the terminal of process authentication is the validated user in Operation Server.
Operation Server is when authenticating the terminal based on Operation Server, be described terminal distribution first agent's voucher, and record effective duration of described first agent's voucher, wherein, by described effective duration as can be known, when described first agent's voucher is by the end of to be effectively effective deadline of described first agent's voucher.
In the present embodiment, be converted to operating state whenever described terminal by non operating state or during every Preset Time, Operation Server will once authenticate described terminal, and the first agent's voucher that distributes when at every turn authenticating is all different.Wherein, described terminal is converted to operating state by non operating state and is specifically as follows: described terminal is converted to opening by closed condition or described terminal is converted to running status by holding state.Described terminal every Preset Time can but be not limited to and be set as 24 hours.
Operation Server is after authenticating the terminal based on Operation Server, described terminal just can send the Operational Visit request to Operation Server, Operation Server receives the Operational Visit request that described terminal sends, and first agent's voucher and the service identification of described terminal are carried in described Operational Visit request, wherein, which kind of business described service identification is in order to what identify described Operational Visit request access.
Operation Server is after being terminal distribution first agent's voucher based on Operation Server, be before Operation Server receives the Operational Visit request that described terminal sends, Operation Server is stored the corresponding relation of terminal iidentification of this first agent's voucher and terminal corresponding to this first agent's voucher and effective duration of this first agent's voucher.
In the present embodiment, described terminal can be set-top box, when described terminal is set-top box, described first agent's voucher can be agent authorization voucher (Proxy Granting Ticket, Pgt), wherein, the agent authorization voucher can but be not limited to 62 character strings.
Step S12: in the situation that described Operation Server determines that according to described first agent's voucher described terminal is that legal terminal and described Operation Server determine that according to described service identification described terminal has business corresponding to described service identification to the acting server order, described Operation Server sends response message to described terminal, comprises at least the reference address of the business that described service identification is corresponding in described response message.
Operation Server determines according to the first agent's voucher based on the terminal of Operation Server that receives whether described terminal is legal terminal, and after definite described terminal was legal terminal, described terminal was with regard to the business in the Internet access Operation Server.
In the present embodiment, after the business of Operation Server in determining described terminal Internet access Operation Server, judge according to the service identification in the Operational Visit request of described terminal transmission whether described terminal has business corresponding to described service identification to the acting server order, in the situation that judgment result is that described terminal has business corresponding to described service identification to the acting server order, described Operation Server sends response message to described terminal, and described terminal is according to the described acting server of described response message access.
Wherein, described response message is in the situation that different, and the content that comprises is different, but no matter when, described response message comprises the reference address of the business that described service identification is corresponding at least.
In the present embodiment, after Operation Server is ordered to acting server in definite described terminal business corresponding to described service identification is arranged, if being described terminal, Operation Server redistributes the Proxy Credential that is different from described first agent's voucher, response message comprises the reference address of new Proxy Credential and business corresponding to described service identification, if Operation Server is not redistributed the Proxy Credential that is different from described first agent's voucher, response message only comprises the reference address of the business that described service identification is corresponding.
Step S13: described terminal is determined second agent's voucher according to described response message, and send the agent service access request according to the reference address of business corresponding to described service identification to described acting server, described agent service access request carries second agent's voucher of described terminal, and effective duration of described second agent's voucher is not more than effective duration of described first agent's voucher.
In the present embodiment, second agent's voucher can be described first agent's voucher, can be also the Proxy Credential that is different from first agent's voucher that terminal is redistributed for Operation Server, wherein, Operation Server be the Proxy Credential that is different from first agent's voucher redistributed of terminal can but be not limited to provisional voucher, effective duration of described provisional voucher is not more than effective duration of first agent's voucher, and described provisional voucher just lost efficacy after business of access.
In the present embodiment, provisional voucher can but be not limited to 29 character strings.
Operation Server is for after described terminal redistributes provisional voucher, record described terminal provisional voucher effective duration and store the provisional voucher of described terminal and the corresponding relation of the terminal iidentification of described terminal.By effective duration of the provisional voucher of described terminal as can be known described provisional voucher be to be effectively effective deadline of described provisional voucher by the end of when.
In the situation that second agent's voucher is determined, described terminal sends the agent service access request according to the reference address of business corresponding to described service identification to described acting server, and the agent service access request of telling carries second agent's voucher of described terminal.
If determine that first agent's voucher be second agent's voucher, second agent's voucher of carrying to the agent service access request of acting server transmission of described terminal is first agent's voucher.
If determine that provisional voucher be second agent's voucher, second agent's voucher of carrying to the agent service access request of acting server transmission of described terminal is provisional voucher.
Step S14: the second agent's voucher in the described agent service access request that described acting server will receive is sent to described Operation Server.
In the present embodiment, described acting server is sent to described Operation Server by VPN (virtual private network) VPN with the second agent's voucher that receives.The purpose of using VPN is the safety index when improving communication.
Step S15: the legitimacy of second agent's voucher that the described acting server of described Operation Server checking sends, and the result that will verify is sent to described acting server.
In the present embodiment, when second agent's voucher of described acting server transmission was described first agent's voucher, the legitimacy of second agent's voucher that the described acting server of described Operation Server checking sends was the legitimacy of first agent's voucher of the described acting server transmission of described Operation Server checking.
In the present embodiment, when second agent's voucher of described acting server transmission was described provisional voucher, the legitimacy of second agent's voucher that the described acting server of described Operation Server checking sends was the legitimacy of the provisional voucher of the described acting server transmission of described Operation Server checking.
Step S16: described acting server is processed described agent service access request according to the result of described checking.
In the present embodiment, in the situation that second agent's voucher that the result is described acting server to be sent is legal, the described agent service access request of described acting server response; Be that in the illegal situation of second agent's voucher of described acting server transmission, described acting server does not respond described agent service access request at the result.
the application uses first agent's voucher to replace the real information of terminal, in order to realize Operation Server and mutual based between the terminal of Operation Server, and the first agent's voucher that distributes when described Operation Server authenticates this terminal at every turn is different, second agent's voucher replaces the real information of terminal, in order to realize mutual between described terminal and acting server, and effective duration of described second agent's voucher equals effective duration of described first agent's voucher at the most, different when replacing as can be known the information of first agent's voucher of terminal real information and second agent's voucher to transmit within a certain period of time, make intercepting and capturing end message person be difficult to determine changeless first agent's voucher and second agent's voucher according to the first agent's voucher and the second agent's voucher that constantly change, thereby can not intercept first agent's voucher and second agent's voucher of terminal, and then can not falsely use described terminal, reduced the risk that end message is intercepted and captured and falsely used, improved the fail safe of terminal access Operation Server and acting server.
Intercept first agent's voucher and second agent's voucher even intercept and capture the end message person, because first agent's voucher and second agent's voucher can change after a period of time, first agent's voucher and second agent's voucher that intercepting and capturing end message person intercepts also can lose efficacy, thereby terminal can not be falsely used, further reduced the risk that terminal falsely used and improved fail safe.
The legitimacy of first agent's voucher of Operation Server verification terminal, after Operation Server determines that described terminal is legal terminal, described terminal is carried second agent's voucher access proxies, acting server sends described second agent's voucher to Operation Server, the described second agent's voucher of Operation Server checking forms Operation Server, terminal and acting server tripartite faith mechanism.
In the said method step, when described terminal was set-top box, the terminal iidentification of described terminal was the TVN(TV Number of set-top box, television signal), TVN is the unique identification of set-top box.In the said method step, interworking flow process between Operation Server, terminal and the acting server corresponding with a kind of flow chart of a kind of service authentication method shown in Figure 1 can be referring to Fig. 2, and wherein Fig. 2 is a kind of schematic diagram of the interworking flow process between Operation Server, terminal and acting server.
Another embodiment
See also Fig. 3, shown in the present embodiment is that Operation Server determines whether described terminal is a kind of flow chart of the detailed process of legal terminal, wherein, whether the described terminal of checking that described terminal sends to described Operation Server is terminal iidentification and the described first agent's voucher that the request of legal terminal carries described terminal, can comprise the following steps:
Step S31: Operation Server is determined effective deadline of described first agent's voucher according to effective duration of described first agent's voucher.
Operation Server has recorded the time that described first agent's voucher generates when distributing described first agent's voucher, and Operation Server adds the above first agent's voucher on the basis that described first agent's voucher generates effective duration namely obtains effective deadline of described first agent's voucher.
Step S32: whether the time when the Operation Server judgement receives described first agent's voucher exceeds effective deadline of described first agent's voucher, if not, and execution in step S33, if not, execution in step S34.
Step S33: described first agent's voucher lost efficacy.
Step S34: first agent's voucher of determining the described terminal of described Operation Server storage according to the terminal iidentification of described terminal.
Store the corresponding relation of the terminal iidentification of first agent's voucher of described terminal and described terminal in Operation Server, can determine first agent's voucher of described terminal according to the corresponding relation of the terminal iidentification of first agent's voucher of the described terminal of the terminal iidentification of described terminal and Operation Server storage and described terminal.After first agent's voucher of determining described terminal, execution in step S34.
Step S35: whether first agent's voucher of more described first agent's voucher and described terminal is consistent, if, execution in step S36, if not, execution in step S37.
If described first agent's voucher is intercepted and captured, can obtain the inconsistent result of first agent's voucher of described first agent's voucher and described terminal, execution in step S36 when comparative result is inconsistent, if described first agent's voucher is not is not intercepted and captured, can obtain the consistent result of first agent's voucher of described first agent's voucher and described terminal, execution in step S35 when comparative result is consistent.
for example: described first agent's voucher is a1, the terminal iidentification of the terminal that described first agent's voucher a1 is corresponding is A, the corresponding relation of Operation Server storage is first agent's voucher a1 and terminal iidentification A, if described first agent's voucher a1 is intercepted and captured by the terminal that terminal iidentification is B, the terminal iidentification of described terminal is B, Operation Server is when receiving described first agent's voucher a1 and terminal iidentification B, at first find the corresponding relation of first agent's voucher b1 corresponding to terminal iidentification B and terminal iidentification B, thereby determine first agent's voucher b1 corresponding to terminal iidentification B, then compare first agent's voucher a1 and first agent's voucher b1 corresponding to terminal iidentification B, obviously a1 and b1 are inconsistent.If described first agent's voucher a1 is not is not intercepted and captured, the terminal iidentification of described terminal is A, Operation Server is when receiving described first agent's voucher a1 and terminal iidentification A, at first according to the corresponding relation of terminal iidentification A and first agent's voucher a1 corresponding to terminal iidentification A, thereby determine that first agent's voucher corresponding to terminal iidentification A is a1, first agent's voucher of obvious described first agent's voucher a1 and described terminal is consistent.
Step S36: determine that described terminal is legal.
Step S37: determine that described terminal is illegal.
Another embodiment
See also Fig. 4, shown in the present embodiment is terminal is determined the detailed process of second agent's voucher according to described response message a kind of flow chart, can comprise the following steps:
Step S41: whether comprise provisional voucher in the described response message of described terminal judges.
If, execution in step S42, if not, execution in step S43.
If being described terminal, described Operation Server redistributed the provisional voucher that is different from described first agent's voucher, the response message of described Operation Server transmission comprises provisional voucher, otherwise does not comprise provisional voucher in the response message that described Operation Server sends.
Step S42: determine that described provisional voucher is second agent's voucher.
Step S43: determine that described first agent's voucher is second agent's voucher.
Another embodiment
See also Fig. 5, shown in the present embodiment is a kind of flow chart of detailed process of the legitimacy of first agent's voucher of sending of Operation Server checking acting server, wherein, described acting server carries the terminal iidentification of the terminal of first agent's voucher and the described agent service access request of transmission to the legitimacy request of the checking first agent voucher of described Operation Server transmission, can comprise the following steps:
Step S51: Operation Server is determined effective deadline of described first agent's voucher according to effective duration of described first agent's voucher.
Step S51 and the Operation Server shown in Fig. 3 determine that whether described terminal is that step S31 in the detailed process of legal terminal is identical, does not repeat them here.
Step S52: described Operation Server judges whether the time of described acting server transmission first agent voucher exceeds effective deadline of described first agent's voucher.
If judgment result is that time that described acting server sends first agent's voucher exceeded effective deadline of described first agent's voucher, illustrate that first agent's voucher of described acting server transmission is still effective, execution in step S53, otherwise, execution in step S54.
Step S53: first agent's voucher that described acting server sends lost efficacy.
Step S54: whether first agent's voucher that the more described acting server of described Operation Server sends is consistent with first agent's voucher of the terminal that sends described agent service access request.
In the situation that comparative result is consistent, illustrate that first agent's voucher that described acting server sends is not is not intercepted and captured, the terminal that sends described agent service access request is true terminal corresponding to first agent's voucher that described acting server sends, execution in step S55, in the inconsistent situation of comparative result, illustrate that first agent's voucher that described acting server sends is intercepted and captured, the terminal that sends described agent service access request is no longer true terminal corresponding to first agent's voucher that described acting server sends, execution in step S56.
for example: first agent's voucher that described acting server sends is a, the terminal that first agent's voucher a is corresponding is A, if first agent's voucher a is not is not intercepted and captured, the terminal that sends described agent service request is A, if first agent's voucher a is intercepted and captured, the terminal of the described agent service access request of explanation transmission is no longer A, but terminal B, first agent's voucher b of terminal B and first agent's voucher a must be not identical, therefore can judge that first agent's voucher a that described acting server sends is intercepted and captured, first agent's voucher a that can determine described acting server transmission is illegal.
Step S55: first agent's voucher of determining described acting server transmission is legal.
Step S56: first agent's voucher of determining described acting server transmission is illegal.
Another embodiment
See also Fig. 6, shown in the present embodiment is a kind of flow chart of detailed process of the legitimacy of the provisional voucher that sends of Operation Server checking acting server, wherein, described acting server carries the terminal iidentification of the terminal of provisional voucher and the described agent service access request of transmission to the legitimacy request of the provisional voucher of checking of described Operation Server transmission, can comprise the following steps:
Step S61: Operation Server is determined effective deadline of described provisional voucher according to effective duration of described provisional voucher.
Operation Server has recorded the time that described provisional voucher generates when distributing described provisional voucher, Operation Server adds the above provisional voucher on the basis that described provisional voucher generates effective duration namely obtains effective deadline of described provisional voucher.
Step S62: described Operation Server judges whether the time of the provisional voucher of described acting server transmission exceeds effective deadline of described provisional voucher.
If judgment result is that time that described acting server sends provisional voucher exceeded for described the provisional effective deadline, illustrate that the provisional voucher of described acting server transmission is still effective, execution in step S63, otherwise, execution in step S64.
Step S63: the provisional voucher that described acting server sends lost efficacy.
Step S64: whether the provisional voucher that the more described acting server of described Operation Server sends is consistent with the provisional voucher of the terminal that sends described agent service access request.
In the present embodiment, Operation Server is determined the provisional voucher of the terminal of the described agent service access request of transmission according to the terminal iidentification of the terminal that sends described agent service access request.After the provisional voucher of the terminal of determining the described agent service access request of transmission, whether the provisional voucher that more described acting server sends is consistent with the provisional voucher of the terminal that sends described agent service access request.
In the situation that comparative result is consistent, illustrate that the provisional voucher that described acting server sends is not is not intercepted and captured, the terminal that sends described agent service access request is true terminal corresponding to provisional voucher that described acting server sends, execution in step S65, in the inconsistent situation of comparative result, illustrate that the provisional voucher that described acting server sends is intercepted and captured, the terminal that sends described agent service access request is no longer true terminal corresponding to provisional voucher that described acting server sends, execution in step S66.
for example: first agent's voucher that described acting server sends is c, the terminal that first agent's voucher c is corresponding is C, if first agent's voucher c is not is not intercepted and captured, the terminal that sends described agent service request is C, if first agent's voucher c is intercepted and captured, the terminal of the described agent service access request of explanation transmission is no longer C, but terminal D, first agent's voucher d of terminal D and first agent's voucher c must be not identical, therefore can judge that first agent's voucher c that described acting server sends is intercepted and captured, first agent's voucher c that can determine described acting server transmission is illegal.
Step S65: the provisional voucher of determining described acting server transmission is legal.
Step S66: the provisional voucher of determining described acting server transmission is illegal.
For aforesaid each embodiment of the method, for simple description, therefore it all is expressed as a series of combination of actions, but those skilled in the art should know, the application is not subjected to the restriction of described sequence of movement, because according to the application, some step can adopt other orders or carry out simultaneously.Secondly, those skilled in the art also should know, the embodiment described in specification all belongs to preferred embodiment, and related action and module might not be that the application is necessary.
Corresponding with the embodiment of a kind of service authentication method shown in Figure 1, the application also provides a kind of structure chart of a kind of service authentication system, see also Fig. 7, the service authentication system comprises Operation Server 701, terminal 702 and acting server 703, and wherein Operation Server 701
Described Operation Server 701 is used for, and receives the Operational Visit request based on terminal 702 transmissions of described Operation Server, and first agent's voucher and the service identification of described terminal carried in described Operational Visit request,
in the situation that described Operation Server 701 determines that according to described first agent's voucher described terminal 702 is that legal terminal and described Operation Server determine that according to described service identification described terminal has business corresponding to described service identification to the acting server order, send response message to described terminal 702, at least comprise the reference address of the business that described service identification is corresponding in described response message, and verify the legitimacy of second agent's voucher that described acting server 703 sends, and the result that will verify is sent to described acting server 703, described first agent's voucher is that described Operation Server distributes when described terminal is authenticated, and the first agent's voucher that distributes when described Operation Server authenticates this terminal at every turn is different.
Wherein in the present embodiment, second agent's voucher of acting server transmission is first agent's voucher or provisional voucher.
When described second agent's voucher was first agent's voucher, whether the concrete time for judging first agent's voucher that described terminal 702 sends of Operation Server 701 exceeded effective deadline of described first agent's voucher;
If whether first agent's voucher of the terminal 702 that first agent's voucher that the described terminal 702 of first agent's voucher of more described terminal 702 transmissions and described Operation Server 701 storages sends is corresponding is consistent;
In the situation that comparative result is consistent, determine that first agent's voucher of described acting server 703 transmissions is legal;
In the inconsistent situation of comparative result, determine that first agent's voucher of described acting server 703 transmissions is illegal;
If not, first agent's voucher of described acting server 703 transmissions lost efficacy.
When second agent's voucher of described terminal 702 transmissions was provisional voucher, whether the concrete time for judging the provisional voucher that described terminal 702 sends of described Operation Server 701 exceeded effective deadline of described provisional voucher;
If whether first agent's voucher of the terminal 702 that the provisional voucher that the described terminal 702 of the provisional voucher of more described terminal 702 transmissions and described Operation Server 701 storages sends is corresponding is consistent;
In the situation that comparative result is consistent, determine that the provisional voucher of described acting server 703 transmissions is legal;
In the inconsistent situation of comparative result, determine that the provisional voucher of described acting server 703 transmissions is illegal;
If not, the provisional voucher of described acting server 703 transmissions lost efficacy.
Described Operation Server 701 also is used for storage based on the corresponding relation of the terminal iidentification of first agent's voucher of the terminal 702 of Operation Server and terminal corresponding to this first agent's voucher and effective duration of this first agent's voucher.
Described Operation Server 701 distributed provisional voucher before sending response messages to described terminal 702, and stored effective duration of the provisional voucher of the corresponding relation of terminal iidentification of the provisional voucher of described terminal 702 and described terminal 702 and described terminal 302.
Described terminal 702 is used for, send the Operational Visit request to described Operation Server, determine second agent's voucher according to the response message that described Operation Server 701 sends, and send the agent service access request according to the reference address of business corresponding to described service identification to described acting server 703, described agent service access request carries second agent's voucher of described terminal, and effective duration of described second agent's voucher is not more than effective duration of described first agent's voucher.
In the present embodiment, terminal 702 according to described response message determine second agent's voucher detailed process can for:
Terminal 702 judges whether comprise provisional voucher in described response message; If determine that described provisional voucher is second agent's voucher; If not, determine that described first agent's voucher is second agent's voucher.
Acting server 703 is used for, second agent's voucher in the described agent service access request that receives is sent to described Operation Server 701 carries out legitimate verification, and according to the result that described Operation Server 701 sends, process the agent service access request that described terminal 702 sends.
In the present embodiment, the second agent's voucher in the acting server 703 described agent service access request that specifically will receive by VPN (virtual private network) VPN is sent to described Operation Server 701.
In the present embodiment, second agent's voucher of acting server 703 transmissions is first agent's voucher or provisional voucher.
In said system, terminal 702 can be set-top box, and when terminal 702 was set-top box, first agent's voucher of processing in described system was the agent authorization voucher.
Need to prove, each embodiment in this specification all adopts the mode of going forward one by one to describe, and what each embodiment stressed is and the difference of other embodiment that between each embodiment, identical similar part is mutually referring to getting final product.For device class embodiment, because it is substantially similar to embodiment of the method, so description is fairly simple, relevant part gets final product referring to the part explanation of embodiment of the method.
At last, also need to prove, in this article, relational terms such as the first and second grades only is used for an entity or operation are separated with another entity or operating space, and not necessarily requires or hint and have the relation of any this reality or sequentially between these entities or operation.And, term " comprises ", " comprising " or its any other variant are intended to contain comprising of nonexcludability, thereby make the process, method, article or the equipment that comprise a series of key elements not only comprise those key elements, but also comprise other key elements of clearly not listing, or also be included as the intrinsic key element of this process, method, article or equipment.In the situation that not more restrictions, the key element that is limited by statement " comprising ... ", and be not precluded within process, method, article or the equipment that comprises described key element and also have other identical element.
Above a kind of service authentication method and the system that the application is provided is described in detail, used specific case herein the application's principle and execution mode are set forth, the explanation of above embodiment just is used for helping to understand the application's method and core concept thereof; Simultaneously, for one of ordinary skill in the art, the thought according to the application all will change in specific embodiments and applications, and in sum, this description should not be construed as the restriction to the application.

Claims (10)

1. a service authentication method, is characterized in that, the method comprises:
Operation Server receives the Operational Visit request based on the terminal transmission of described Operation Server, first agent's voucher and the service identification of described terminal carried in described Operational Visit request, described first agent's voucher is that described Operation Server distributes when described terminal is authenticated, and first agent's voucher that described Operation Server distributes when this terminal being authenticated at every turn is different;
In the situation that described Operation Server determines that according to described first agent's voucher described terminal is that legal terminal and described Operation Server determine that according to described service identification described terminal has business corresponding to described service identification to the acting server order, described Operation Server sends response message to described terminal, comprises at least the reference address of the business that described service identification is corresponding in described response message;
Described terminal is determined second agent's voucher according to described response message, and send the agent service access request according to the reference address of business corresponding to described service identification to described acting server, described agent service access request carries second agent's voucher of described terminal, and effective duration of described second agent's voucher is not more than effective duration of described first agent's voucher;
Second agent's voucher in the described agent service access request that described acting server will receive is sent to described Operation Server;
The legitimacy of second agent's voucher that the described acting server of described Operation Server checking sends, and the result that will verify is sent to described acting server;
Described acting server is processed described agent service access request according to the result of described checking.
2. method according to claim 1, is characterized in that, described first agent's voucher is comprising of distributing when described terminal is authenticated of described Operation Server:
Described first agent's voucher is that described Operation Server is converted to operating state in described terminal by non operating state or distributes when described terminal being authenticated during every Preset Time.
3. method according to claim 1, it is characterized in that, described Operation Server receives the Operational Visit request based on the terminal transmission of described Operation Server, and described Operational Visit request carries corresponding first agent's voucher and the service identification of terminal that sends the Operational Visit request and also comprises before:
The storage of described Operation Server is based on the corresponding relation of the terminal iidentification of first agent's voucher of the terminal of Operation Server and terminal corresponding to this first agent's voucher and effective duration of this first agent's voucher.
4. method according to claim 1, is characterized in that, described terminal determines that according to described response message second agent's voucher comprises:
Whether comprise provisional voucher in the described response message of described terminal judges;
Wherein, to be described Operation Server distributing before sending response message to described terminal described provisional voucher, and described Operation Server stores effective duration of the provisional voucher of the corresponding relation of terminal iidentification of the provisional voucher of described terminal and described terminal and described terminal;
If determine that described provisional voucher is second agent's voucher;
If not, determine that described first agent's voucher is second agent's voucher.
5. method according to claim 1, is characterized in that, the second agent's voucher in the described agent service access request that described acting server will receive is sent to described Operation Server and comprises:
Described acting server is sent to described Operation Server by VPN (virtual private network) VPN with the second agent's voucher that receives.
6. method according to claim 4, is characterized in that, the legitimacy of second agent's voucher that the described acting server of described Operation Server checking sends comprises:
Described Operation Server is determined effective deadline of described first agent's voucher according to effective duration of described first agent's voucher;
Described Operation Server judges whether the time of described acting server transmission first agent voucher exceeds effective deadline of described first agent's voucher;
If whether first agent's voucher that the more described acting server of described Operation Server sends is consistent with first agent's voucher of the terminal that sends described agent service access request;
In the situation that comparative result is consistent, determine that first agent's voucher of described acting server transmission is legal;
In the inconsistent situation of comparative result, determine that first agent's voucher of described acting server transmission is illegal;
If not, first agent's voucher of described acting server transmission lost efficacy.
7. method according to claim 4, is characterized in that, the legitimacy of second agent's voucher that the described acting server of described Operation Server checking sends comprises:
Described Operation Server is determined effective deadline of described provisional voucher according to effective duration of described provisional voucher;
Described Operation Server judges whether the time of the provisional voucher of described acting server transmission exceeds effective deadline of described provisional voucher;
If whether the provisional voucher that the more described acting server of described Operation Server sends is consistent with the provisional voucher of the terminal that sends described agent service access request;
In the situation that comparative result is consistent, determine that the provisional voucher of described acting server transmission is legal;
In the inconsistent situation of comparative result, determine that the provisional voucher of described acting server transmission is illegal;
If not, the provisional voucher of described acting server transmission lost efficacy.
8. according to claim 1-7 described methods of any one, is characterized in that, described terminal comprises set-top box;
Described first agent's voucher is the agent authorization voucher.
9. a service authentication system, is characterized in that, comprises Operation Server, terminal and acting server, wherein:
described Operation Server is used for, reception is based on the Operational Visit request of the terminal transmission of described Operation Server, first agent's voucher and the service identification of described terminal carried in described Operational Visit request, in the situation that determine that according to described first agent's voucher described terminal is legal terminal and determines that according to described service identification described terminal has business corresponding to described service identification to the acting server order, send response message to described terminal, at least comprise the reference address of the business that described service identification is corresponding in described response message, and verify the legitimacy of second agent's voucher that described acting server sends, and the result that will verify is sent to described acting server, described first agent's voucher is that described Operation Server distributes when described terminal is authenticated, and the first agent's voucher that distributes when described Operation Server authenticates this terminal at every turn is different,
Described terminal is used for, send the Operational Visit request to described Operation Server, determine second agent's voucher according to the response message that described Operation Server sends, and send the agent service access request according to the reference address of business corresponding to described service identification to described acting server, described agent service access request carries second agent's voucher of described terminal, and effective duration of described second agent's voucher is not more than effective duration of described first agent's voucher;
Described acting server is used for, second agent's voucher in the agent service access request that the described terminal that receives is sent is sent to described Operation Server and carries out legitimate verification, and according to the result that described Operation Server sends, process the agent service access request that described terminal sends.
10. system according to claim 1, is characterized in that, described terminal comprises set-top box;
Described first agent's voucher is the agent authorization voucher.
CN201310132539.8A 2013-04-16 2013-04-16 A kind of service authentication method and system Expired - Fee Related CN103178969B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310132539.8A CN103178969B (en) 2013-04-16 2013-04-16 A kind of service authentication method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310132539.8A CN103178969B (en) 2013-04-16 2013-04-16 A kind of service authentication method and system

Publications (2)

Publication Number Publication Date
CN103178969A true CN103178969A (en) 2013-06-26
CN103178969B CN103178969B (en) 2016-06-29

Family

ID=48638601

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310132539.8A Expired - Fee Related CN103178969B (en) 2013-04-16 2013-04-16 A kind of service authentication method and system

Country Status (1)

Country Link
CN (1) CN103178969B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104717192A (en) * 2013-12-16 2015-06-17 腾讯科技(深圳)有限公司 Validity verification method and intermediate server
CN106161359A (en) * 2015-04-02 2016-11-23 阿里巴巴集团控股有限公司 The method and device of certification user, the method and device of registration wearable device
WO2017128286A1 (en) * 2016-01-29 2017-08-03 华为技术有限公司 Method for downloading subscription file, related device, and system
CN107231335A (en) * 2016-03-24 2017-10-03 阿里巴巴集团控股有限公司 A kind of method for processing business and device
CN108462671A (en) * 2017-02-20 2018-08-28 沪江教育科技(上海)股份有限公司 A kind of authentication protection method and system based on reverse proxy
CN112559994A (en) * 2020-12-25 2021-03-26 北京百度网讯科技有限公司 Access control method, device, equipment and storage medium
CN115242469A (en) * 2022-07-07 2022-10-25 安天科技集团股份有限公司 Secure access API, secure communication method, electronic device and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1610319A (en) * 2003-10-22 2005-04-27 华为技术有限公司 Analytic switch-in processing method for selecting business in radio local area network
CN1812421A (en) * 2006-03-06 2006-08-02 ***通信集团公司 Data business right discriminating method
CN101431654A (en) * 2008-12-12 2009-05-13 天柏宽带网络科技(北京)有限公司 Method and system for implementing authentication
US20120278873A1 (en) * 2011-04-29 2012-11-01 William Calero Techniques for resource operation based on usage, sharing, and recommendations with modular authentication

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1610319A (en) * 2003-10-22 2005-04-27 华为技术有限公司 Analytic switch-in processing method for selecting business in radio local area network
CN1812421A (en) * 2006-03-06 2006-08-02 ***通信集团公司 Data business right discriminating method
CN101431654A (en) * 2008-12-12 2009-05-13 天柏宽带网络科技(北京)有限公司 Method and system for implementing authentication
US20120278873A1 (en) * 2011-04-29 2012-11-01 William Calero Techniques for resource operation based on usage, sharing, and recommendations with modular authentication

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104717192A (en) * 2013-12-16 2015-06-17 腾讯科技(深圳)有限公司 Validity verification method and intermediate server
CN104717192B (en) * 2013-12-16 2018-05-18 腾讯科技(深圳)有限公司 Legality identification method and intermediate server
CN106161359A (en) * 2015-04-02 2016-11-23 阿里巴巴集团控股有限公司 The method and device of certification user, the method and device of registration wearable device
US10873573B2 (en) 2015-04-02 2020-12-22 Advanced New Technologies Co., Ltd. Authenticating a user and registering a wearable device
CN106161359B (en) * 2015-04-02 2019-09-17 阿里巴巴集团控股有限公司 It authenticates the method and device of user, register the method and device of wearable device
US10587418B2 (en) 2015-04-02 2020-03-10 Alibaba Group Holding Limited Authenticating a user and registering a wearable device
CN107113320B (en) * 2016-01-29 2020-09-29 华为技术有限公司 Method, related equipment and system for downloading signed file
WO2017128286A1 (en) * 2016-01-29 2017-08-03 华为技术有限公司 Method for downloading subscription file, related device, and system
CN107113320A (en) * 2016-01-29 2017-08-29 华为技术有限公司 A kind of method, relevant device and system for downloading signed instrument
CN107231335A (en) * 2016-03-24 2017-10-03 阿里巴巴集团控股有限公司 A kind of method for processing business and device
CN107231335B (en) * 2016-03-24 2021-05-25 创新先进技术有限公司 Service processing method and device
CN108462671A (en) * 2017-02-20 2018-08-28 沪江教育科技(上海)股份有限公司 A kind of authentication protection method and system based on reverse proxy
CN112559994A (en) * 2020-12-25 2021-03-26 北京百度网讯科技有限公司 Access control method, device, equipment and storage medium
CN112559994B (en) * 2020-12-25 2023-12-01 北京百度网讯科技有限公司 Access control method, device, equipment and storage medium
CN115242469A (en) * 2022-07-07 2022-10-25 安天科技集团股份有限公司 Secure access API, secure communication method, electronic device and storage medium
CN115242469B (en) * 2022-07-07 2024-05-24 安天科技集团股份有限公司 Secure access API, secure communication method, electronic device, and storage medium

Also Published As

Publication number Publication date
CN103178969B (en) 2016-06-29

Similar Documents

Publication Publication Date Title
CN103178969A (en) Service authentication method and system
US11876807B2 (en) Secure online access control to prevent identification information misuse
CN101183932B (en) Security identification system of wireless application service and login and entry method thereof
CN109413000B (en) Anti-stealing-link method and anti-stealing-link network relation system
CN104104652B (en) A kind of man-machine recognition methods, network service cut-in method and corresponding equipment
CN107231346A (en) A kind of method of cloud platform identification
CN105430014B (en) A kind of single-point logging method and its system
CN109257391A (en) A kind of access authority opening method, device, server and storage medium
CN103179106A (en) Network security using false positive responses to unauthorized access requests
CN104767731A (en) Identity authentication protection method of Restful mobile transaction system
CN106161348A (en) A kind of method of single-sign-on, system and terminal
CN101540757A (en) Method and system for identifying network and identification equipment
CN106899561A (en) A kind of TNC authority control methods and system based on ACL
CN107040520A (en) A kind of cloud computing data-sharing systems and method
CN108701308A (en) System for issuing public certificate based on block chain and the method for issuing public certificate based on block chain using the system
CN105024813A (en) Server, user equipment and interactive method of the user equipment and the server
CN103716316B (en) A kind of authenticating user identification system
CN102571874A (en) On-line audit method and device in distributed system
CN109495458A (en) A kind of method, system and the associated component of data transmission
CN109145543B (en) Identity authentication method
CN108989334A (en) A kind of SSO single-point logging method based on JAVA
CN114024682A (en) Cross-domain single sign-on method, service equipment and authentication equipment
CN109802927A (en) A kind of security service providing method and device
JP2015158881A5 (en) Accessibility management system, WebSocket server, information processing method, and program
KR101619928B1 (en) Remote control system of mobile

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20160629

Termination date: 20210416