CN115297346A - Multi-application authentication method and device based on EPG system - Google Patents

Multi-application authentication method and device based on EPG system Download PDF

Info

Publication number
CN115297346A
CN115297346A CN202210758488.9A CN202210758488A CN115297346A CN 115297346 A CN115297346 A CN 115297346A CN 202210758488 A CN202210758488 A CN 202210758488A CN 115297346 A CN115297346 A CN 115297346A
Authority
CN
China
Prior art keywords
application
top box
set top
request
parameter
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210758488.9A
Other languages
Chinese (zh)
Other versions
CN115297346B (en
Inventor
张德时
田维忠
任嘉奋
国兴旺
付清文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guiyang Longma Video Technology Co ltd
Original Assignee
Guiyang Longma Video Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guiyang Longma Video Technology Co ltd filed Critical Guiyang Longma Video Technology Co ltd
Priority to CN202210758488.9A priority Critical patent/CN115297346B/en
Publication of CN115297346A publication Critical patent/CN115297346A/en
Application granted granted Critical
Publication of CN115297346B publication Critical patent/CN115297346B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/41Structure of client; Structure of client peripherals
    • H04N21/4104Peripherals receiving signals from specially adapted client devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/45Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
    • H04N21/462Content or additional data management, e.g. creating a master electronic program guide from data received from the Internet and a Head-end, controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
    • H04N21/4627Rights management associated to the content
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Databases & Information Systems (AREA)
  • Multimedia (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer And Data Communications (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a multi-application authentication method and a device based on an EPG system, comprising the following steps: responding to a second application request of the set top box from the first application, executing parameter splicing, and acquiring a splicing result; taking the splicing result as the second application call request parameter, and entering a second application page; responding to the first application request returned from the second application, analyzing request parameters, judging that the authentication is effective if the analysis is successful, and acquiring the splicing result; entering a first application page according to the splicing result; and positioning the control position, and executing the first application page to send the set top box for display. The invention provides a mode of caching the first authentication information of the set top box by using the server side and using the returned parameter for subsequent authentication, and solves the problems of high concurrent access and response delay to the EPG system authentication server when the second application is returned.

Description

EPG system-based multi-application authentication method and device
Technical Field
The invention relates to the field of computers and IPTV, in particular to an EPG system-based multi-application authentication method and device.
Background
In the EPG system, under the condition that a plurality of applications jump mutually, the set top box enters an in-application page, jumps to a second application page from a sub-page, returns to the sub-page of the application after accessing the second application page, returns to the original application sub-page from the second application, cannot directly enter the EPG system due to safety consideration, needs to initiate application access authority authentication to an EPG authentication server from a set top box end on the first page of the application, and can only enter the in-application page from authentication information acquired by the set top box from the EPG system after authentication is completed. The EPG authentication server needs to be accessed every time when the application is returned from the third party, so that the resource consumption of the authentication server of the EPG system is large, and the access is delayed. To solve the problem of repeatedly performing authentication each time a return is made from a second application. The invention provides a mode of caching the first authentication information of the set top box by using the server side and using the returned parameter for subsequent authentication, thereby solving the problems of high concurrent access and response delay to the authentication server of the EPG system when the second application is returned.
Disclosure of Invention
The problem of response delay caused by repeated access of page jump among multiple applications to an authentication server in an EPG system is solved.
The invention provides an EPG system-based multi-application authentication method, which comprises the following steps:
responding to a second application request for skipping from the first application by the set top box, executing parameter splicing, and acquiring a splicing result;
taking the splicing result as a second application call request parameter, and entering a second application page;
responding to a first application request returned from the second application, analyzing the request parameters, judging that the authentication is effective if the analysis is successful, and acquiring a splicing result;
entering a first application page according to the splicing result;
and positioning the control, and executing the first application page to send the set top box for display.
Further, before responding to the request that the set top box skips the second application from the first application, the set top box acquires the set top box authentication data from the EPG authentication server and caches the set top box authentication data in a Session variable of the application server.
And further responding to a second application request of the set top box from the application page, wherein the second application mode is jumped, and the application server returns a redirection instruction to carry out second application jump operation.
And further, entering a second application page according to a splicing result serving as a second application parameter, wherein the splicing result is obtained by performing AES encryption calculation operation and generating a ciphertext string serving as the second application parameter, and the set top box Session identifier is used as a key of the AES algorithm in the encryption operation.
Further, AES encryption calculation operation generates a ciphertext string, and the ciphertext string is included to further perform Base64 encoding operation.
Further, responding to the first application request returned from the second application, analyzing the request parameters, if the analysis is successful, judging that the authentication is effective, and acquiring a splicing result, wherein the splicing result comprises the steps of requesting the parameters to execute Base64 decoding and further executing AES decryption calculation.
And further, performing AES decryption calculation, wherein the AES decryption calculation uses the key to identify the Session of the set top box.
The invention also provides a multi-application skip device based on the EPG system, which comprises:
the jump instruction receiving module is used for receiving a first application page jump second application request initiated by the set top box;
the jump parameter splicing module is used for splicing parameters before the jump instruction is executed;
the AES encryption module is used for encrypting through an AES algorithm after the splicing parameters are completed and generating a ciphertext string;
a second application response receiving module, configured to respond to the first application request returned by the second application;
the AES decryption module is used for analyzing the ciphertext parameter when the second application returns the first application request;
and the page recovery module is used for responding to the page recovery when the second application returns to the first application.
The key used during the operation of AES encryption and AES decryption is the Session identification of the set-top box.
The splicing parameters and the ciphertext analysis parameters comprise Base64 encoding and Base64 decoding.
The technical scheme of the application aims to solve the problem that verification is repeatedly performed when the second application returns each time. The invention provides a method for realizing the high concurrency access and response delay of the EPG system authentication server when the set top box initiates a second application skip request, wherein the set top box authentication information AES is encrypted and coded as a parameter to enter the second application, and the encrypted and coded parameter is returned by the second application to be decoded and decrypted when the second application returns.
Drawings
Fig. 1 is a diagram illustrating steps of an EPG-system-based inter-application authentication method according to an embodiment of the present invention;
fig. 2 is a diagram of a parameter concatenation step of an EPG-system-based inter-multi-application authentication method according to an embodiment of the present invention;
fig. 3 is a device configuration diagram of an inter-application jumping device based on an EPG system according to an embodiment of the present invention;
fig. 4 is an exemplary diagram of a set-top box hopping URL of an EPG-system-based inter-application authentication method according to an embodiment of the present invention:
fig. 5 is a set-top box hopping sequence chart of an EPG-system-based inter-application authentication method according to an embodiment of the present invention;
Detailed Description
The following detailed description of specific embodiments of the present invention is provided in conjunction with the accompanying drawings.
The invention provides a method and a device for jumping among multiple applications based on an EPG system. In the EPG system, a set top box enters a first application page, jumps to a second application page from the page, returns to the first application page after accessing the second application page is finished, returns to the first application page from the second application, cannot directly enter the EPG system due to safety considerations, needs to initiate access authentication on the first application from a set top box terminal to an EPG authentication server on a first application home page, and can enter the first application according to authentication information obtained from the EPG system after the authentication is successful. Because the EPG authentication server needs to be accessed every time the second application returns to the first application, the problems of large resource consumption, access delay and poor user experience effect of the authentication server of the EPG system often occur. To solve the problem of repeatedly performing authentication each time a return is made from a second application. The invention provides a method for realizing the high concurrency access and response delay of the EPG system authentication server when the set top box initiates a second application skip request, wherein the set top box authentication information AES is encrypted and coded as a parameter to enter the second application, and the encrypted and coded parameter is returned by the second application to be decoded and decrypted when the second application returns.
As shown in fig. 1, the method for authenticating multiple applications based on the EPG system according to the present invention includes the following steps:
step S1100: and responding to a request that the set top box skips the second application from the first application, executing parameter splicing and acquiring a splicing result. In the EPG system, initiating a request to access the second application by the set-top box refers to jumping from a first application page of the EPG system to a page of the second application.
And before responding to the request of jumping the second application from the first application page, carrying out the operation of acquiring the authentication information of the set top box, wherein the operation is acquired by the set top box from the EPG system server. The set-top box acquires the set-top box identification code from the box terminal, initiates an authentication request to the EPG authentication server, acquires authentication data, and sends the authentication data to the first application server. The first application server caches the authentication data of the set top box in a Session variable at the server side. The cache data comprises a set-top box region code, a set-top box login token, a set-top box identification code and an EPG hall address.
And the first application server responds to the set top box to initiate the second application jump, and the first application server carries out the splicing of the return parameters. And obtaining a jump second application URL address after splicing. The embodiment adopts the method that the server terminal initiates the jump instruction. The application server returns the instruction code 301 of the set-top box (the instruction code is defined by the Http protocol), and fills in the above-mentioned second application URL in the Location field of the return parameter to execute the redirect jump action. Referring to fig. 2, the splicing parameter steps are as follows:
s2100: the first application server collects the page control information of the set top box, the set top box acquires a control which initiates a jump at the current browser terminal page and initiates a jump request to the first application server as a request parameter, the embodiment acquires a control identifier which initiates the jump as a parameter and submits the control identifier to the first application server, wherein the control identifier refers to a browser page control of the set top box, generally a button control, or a DIV control identifier, and the specific limitation is not required. The process advances to step S2200.
S2200: the first application server responds to the request for the set top box to skip the second application, takes out authentication data corresponding to the Session of the current set top box, including a set top box area code, a set top box login token, a set top box identification code and an EPG hall address, and enters step S2300.
S2300: and performing string splicing on the control identification and the authentication information of the set top box. And acquiring a first application access address, performing string connection operation on the first application access address, the control identification, the set-top box area code, the set-top box login token, the set-top box identification code and the EPG hall address, connecting each parameter by using the identification "&", and entering the step S2400.
S2400: the AES encryption library is used for encrypting the spliced strings to obtain ciphertext strings, and it should be noted that in the EPG system, the authentication information of the set top box is secret-related information of the set top box, which is obtained by the set top box from the EPG authentication server and used for accessing the first application, so as to prevent the second application from obtaining illegal activities. In this embodiment, a function openssl _ encrypt built in the PHP is used to encrypt the string, and an incoming parameter of openssl _ encrypt is a Session value corresponding to the set-top box. It should be noted that the Session value corresponding to the set-top box is a unique identifier assigned by the first application server according to the source address of the set-top box when the set-top box first enters the first application home page. Encrypting and calculating the encrypted text string according to the Session value corresponding to the set top box by using openssl _ encrypt, using the text string obtained after the encrypted text string is subjected to Base64 encoding as a skip second application parameter, and entering step S1200.
Step S1200: and taking the splicing result as a second application call request parameter, and entering a second application page. In this embodiment, the second application jump request is initiated by the first application server returning to the instruction code 301 to execute the second application jump, and the jump parameter sets a jump URL in the Location field of the return parameter. Jump to the second application URL example as shown in fig. 4-a, into the second application page. The process advances to step S1300.
Step S1300: and responding to the first application request returned from the second application, analyzing the request parameters, judging that the authentication is effective if the analysis is successful, and acquiring a splicing result.
In this embodiment, when the second application returns to the first application page, the first application server responds to the set-top box to initiate a request for returning the application from the second application. And obtaining the ciphertext string of the step S2400 from the return address, returning the application URL from the second application as shown in fig. 4-B, and obtaining the ciphertext string by using the Get method of the PHP. Firstly, decoding by using Base64 and decrypting by using an AES algorithm, judging that the authentication of the first application is effective after the decryption is successful, and obtaining a splicing result. The AES decryption function uses the opennssl _ decrypt function of the PHP language. And the decryption incoming parameter is a Session value corresponding to the set top box before skipping. It should be noted that the Session value corresponding to the set-top box before the jump is cached in the Session variable. And realizing caching by a PHP script setSession function, and obtaining by using getSession when the PHP script setSession function is taken out. The process advances to step S1400.
Step S1400: according to the splicing result, when the execution enters the first application page and returns from the second application, the parameters are the word string which is encrypted through the AES and coded by the Base64, so that the parameters cannot be directly obtained by using the address resolution mode of the PHP, according to the expression in the step S2300, the word string which is decoded by the Base64 and subjected to the AES decryption operation is the parameter which is separated by the identifier of &', and in the embodiment, the PHP built-in function exploid function is used for resolving the parameter list. Go to step S1500.
Step S1500: and positioning the control, and executing the first application page to send the set top box for display. And the set top box returns to the first application page and positions the control position of the first application. The control location mode is to receive the control identifier of the return packet of the application server in onload of the page initialization function of the set top box, and in this embodiment, the control attribute is obtained by using the identifier "$" of the JQuery library. And the positioning of the position of the control before the jump is realized through the autofocus attribute of the setbutton function setting control of the JS language at the front end. And simultaneously, the set top box area code, the set top box login token, the set top box identification code and the EPG hall address information are analyzed through the return packet. And entering a first application page according to the analysis information.
The embodiment further provides a jump sequence diagram of the multi-application authentication method based on the EPG system, as shown in fig. 5, a set top box initiates a second application jump request to a first application server, and a first application server splices return parameters and uses AES encryption, thereby ensuring that data is transferred to a second application safely. And after the access return of the second application page is completed, the first application page parameter before the jump is obtained through AES decryption. And completing the recovery of the first application page before the jump.
The corresponding embodiment also provides a multi-application skip device based on the EPG system, which is shown in figure 3. The method comprises the following steps:
p3100: the skip instruction receiving module is used for receiving a first application page skip second application request initiated by the set top box, and before receiving the instruction, the skip instruction receiving module also comprises an application server for receiving set top box authentication information and caching the information in a Session variable at a server side.
P3200: and the jump parameter splicing module is used for splicing parameters before the jump instruction is executed. And the set-top box authentication information prestored in the application server in the P3100 and the control identification which initiates the skip when the skip is carried out are used for connecting in a character string mode to obtain a new character string, and the identification "&" is used for separating each parameter.
P3210: and the AES encryption module is used for encrypting through an AES algorithm after the parameters are spliced and generating a ciphertext string. And using the ciphertext word string as a parameter of the URL address of the second skip application, wherein the application server can normally respond to the skip operation only after the URL address parameter needs to be subjected to Base64 encoding before skipping.
P3400: and the second application response receiving module is used for responding to the first application request returned by the second application, decoding the first application request by using the Base64 of the PHP script and then carrying out AES decryption to obtain the parameter list before the jump.
P3410: and the AES decryption module is used for analyzing the ciphertext parameters when the second application returns the request of the first application, and decoding the ciphertext parameters by using the Base64 before the ciphertext parameter analysis is carried out. And after the decoding is finished, AES decryption is carried out, and a parameter list before the jump is obtained by using a PHP built-in function explore.
P3500: and the page recovery module is used for responding to page recovery when the second application returns to the first application, the page recovery in the embodiment is realized by that the application server sends a control identification instruction before the jump to the set top box, and the set top box realizes focusing operation on the page control in an onload function of the browser after receiving the control identification and presents the state of the page control before the user displays the jump.
The technical scheme of the application aims to solve the problem that verification is repeatedly performed when the second application returns each time. The invention provides a method for realizing the high concurrency access and response delay of an EPG system authentication server by using the set top box, which comprises the steps that when the set top box initiates a second application jump request, the set top box authentication information AES is encrypted and encoded to be used as a parameter to enter a second application, and when the set top box returns from the second application, the second application returns the encrypted and encoded parameter to be decoded and decrypted, so that the problems of high concurrency access and response delay of the EPG system authentication server when the second application returns are solved.
The above disclosure is only for the specific embodiment of the present invention, but the present invention is not limited thereto, and any variations that can be considered by those skilled in the art should fall within the scope of the present invention.

Claims (10)

1. An EPG system-based multi-application authentication method is characterized by comprising the following steps:
responding to a second application request for skipping from the first application by the set top box, executing parameter splicing, and acquiring a splicing result;
entering a second application page according to the splicing result as the second application call request parameter;
responding to the first application request returned from the second application, analyzing request parameters, judging that the authentication is effective if the analysis is successful, and acquiring the splicing result;
entering a first application page according to the splicing result;
and positioning the control, and executing the first application page to send the set top box for display.
2. The EPG system based inter-application authentication method as recited in claim 1, wherein the set top box obtains set top box authentication data from the EPG authentication server and buffers the set top box authentication data in a Session variable of the application server before the set top box responds to a request to jump from the first application to the second application.
3. The EPG system based inter-application authentication method as recited in claim 1, wherein the response set top box jumps from the application page to a second application request, wherein the second application jump is performed by returning a redirection instruction from the application server in the second application jump manner.
4. The EPG system based multi-application authentication method as claimed in claim 1, wherein the second application page is entered according to the splicing result as a second application parameter, wherein the splicing result is generated by an AES encryption calculation operation and a ciphertext string as the second application parameter, and the encryption operation uses a set-top box Session identification as a key of the AES algorithm.
5. The EPG system based inter-application authentication method as claimed in claim 4, wherein the AES encryption calculation operation generates a ciphertext string, further comprising the ciphertext string further performing Base64 encoding operation.
6. The EPG system based multi-application authentication method as claimed in claim 1, wherein the response returns the first application request from the second application, analyzes the request parameter, if the analysis is successful, determines that the authentication is valid, and obtains the splicing result, including the request parameter performing Base64 decoding and further performing AES decryption calculation.
7. The EPG system based inter-application authentication method as recited in claim 7, wherein the AES decryption calculation uses a key for set top box Session identification.
8. An inter-application jumping apparatus based on an EPG system, comprising:
the jump instruction receiving module is used for receiving a first application page jump second application request initiated by the set top box;
the jump parameter splicing module is used for splicing parameters before the jump instruction is executed;
the AES encryption module is used for encrypting through an AES algorithm after the splicing parameters are completed and generating a ciphertext string;
a second application response receiving module, configured to respond to the first application request returned by the second application;
the AES decryption module is used for analyzing the ciphertext parameter when the second application returns the first application request;
and the page recovery module is used for responding to the page recovery when the second application returns to the first application.
9. The EPG-system-based multi-application skip device as recited in claim 8, wherein the AES encryption module and AES decryption module, wherein the key used in AES encryption and AES decryption to perform the operation is a Session identifier of the set-top box.
10. The EPG system-based inter-application hopping apparatus as defined in claim 8, wherein the stitching parameters and the parsed-ciphertext parameters comprise Base64 encoding and Base64 decoding.
CN202210758488.9A 2022-06-30 2022-06-30 EPG system-based multi-application authentication method and device Active CN115297346B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210758488.9A CN115297346B (en) 2022-06-30 2022-06-30 EPG system-based multi-application authentication method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210758488.9A CN115297346B (en) 2022-06-30 2022-06-30 EPG system-based multi-application authentication method and device

Publications (2)

Publication Number Publication Date
CN115297346A true CN115297346A (en) 2022-11-04
CN115297346B CN115297346B (en) 2023-08-25

Family

ID=83821500

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210758488.9A Active CN115297346B (en) 2022-06-30 2022-06-30 EPG system-based multi-application authentication method and device

Country Status (1)

Country Link
CN (1) CN115297346B (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102572605A (en) * 2012-02-09 2012-07-11 成都三零凯天通信实业有限公司 System and method for integrating third-party informatization of IPTV system
WO2013056622A1 (en) * 2011-10-18 2013-04-25 华为终端有限公司 Method for verifying access identity of set top box and authentication server
WO2016206475A1 (en) * 2015-06-25 2016-12-29 中兴通讯股份有限公司 Set-top box service adaptation method, device, and system
CN109740324A (en) * 2018-11-21 2019-05-10 顺丰科技有限公司 Multi-platform method for authenticating, device and computer readable storage medium
CN110011950A (en) * 2018-01-04 2019-07-12 武汉斗鱼网络科技有限公司 A kind of method for authenticating and device of video flowing address
CN112039889A (en) * 2020-08-31 2020-12-04 康键信息技术(深圳)有限公司 Password-free login method, device, equipment and storage medium
CN112199622A (en) * 2020-09-29 2021-01-08 平安普惠企业管理有限公司 Page jump method, system and storage medium
CN113568542A (en) * 2021-06-16 2021-10-29 荣耀终端有限公司 Interface display method and electronic equipment
CN114301634A (en) * 2021-12-09 2022-04-08 江苏网进科技股份有限公司 Oauth protocol-based portal system user sharing method
CN114329387A (en) * 2021-12-29 2022-04-12 建信金融科技有限责任公司 Single sign-on control method, system, electronic equipment and computer readable medium

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013056622A1 (en) * 2011-10-18 2013-04-25 华为终端有限公司 Method for verifying access identity of set top box and authentication server
CN102572605A (en) * 2012-02-09 2012-07-11 成都三零凯天通信实业有限公司 System and method for integrating third-party informatization of IPTV system
WO2016206475A1 (en) * 2015-06-25 2016-12-29 中兴通讯股份有限公司 Set-top box service adaptation method, device, and system
CN110011950A (en) * 2018-01-04 2019-07-12 武汉斗鱼网络科技有限公司 A kind of method for authenticating and device of video flowing address
CN109740324A (en) * 2018-11-21 2019-05-10 顺丰科技有限公司 Multi-platform method for authenticating, device and computer readable storage medium
CN112039889A (en) * 2020-08-31 2020-12-04 康键信息技术(深圳)有限公司 Password-free login method, device, equipment and storage medium
CN112199622A (en) * 2020-09-29 2021-01-08 平安普惠企业管理有限公司 Page jump method, system and storage medium
CN113568542A (en) * 2021-06-16 2021-10-29 荣耀终端有限公司 Interface display method and electronic equipment
CN114301634A (en) * 2021-12-09 2022-04-08 江苏网进科技股份有限公司 Oauth protocol-based portal system user sharing method
CN114329387A (en) * 2021-12-29 2022-04-12 建信金融科技有限责任公司 Single sign-on control method, system, electronic equipment and computer readable medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
大飞哥666: "《iOS 应用跳转、参数传递 - 简书》" *

Also Published As

Publication number Publication date
CN115297346B (en) 2023-08-25

Similar Documents

Publication Publication Date Title
US10818291B2 (en) Method and apparatus for interacting information
US9686344B2 (en) Method for implementing cross-domain jump, browser, and domain name server
CN112822518A (en) Video playing method, device, system, electronic equipment and storage medium
US9979725B1 (en) Two-way authentication using two-dimensional codes
CN111865882B (en) Micro-service authentication method and system
CN105100913B (en) Video access method and system, set top box, proxy server and media server
CN108322416B (en) Security authentication implementation method, device and system
CN110011950B (en) Authentication method and device for video stream address
US10162944B2 (en) Library style media DRM APIs in a hosted architecture
CN105491073B (en) Data downloading method, device and system
KR20130072790A (en) User authentication system and method thereof
CN111683370B (en) Access authentication method, device and system of wireless network equipment
CN103067174A (en) Digital signature method and system completed in mobile operating system
Bihis Mastering OAuth 2.0
US20220141208A1 (en) Passing authentication information via parameters
WO2015032281A1 (en) Method and system for generating and processing challenge-response tests
JP2007058487A (en) Log-in information management device and method
CN113204772A (en) Data processing method, device, system, terminal, server and storage medium
CN110753018A (en) Login authentication method and system
CN108235067B (en) Authentication method and device for video stream address
CN110290097B (en) Data processing method and device, storage medium and electronic device
CN112560003A (en) User authority management method and device
CN112632585B (en) Webpage data transmission system, method, device, medium and equipment
CN113329242A (en) Resource management method and device
CN113127850A (en) Browser password filling interaction control method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20221104

Assignee: GUIYANG LONGMASTER INFORMATION & TECHNOLOGY Co.,Ltd.

Assignor: Guiyang Longma Video Technology Co.,Ltd.

Contract record no.: X2024980003586

Denomination of invention: A multi application authentication method and device based on EPG system

Granted publication date: 20230825

License type: Common License

Record date: 20240329

EE01 Entry into force of recordation of patent licensing contract