CN115297346B - EPG system-based multi-application authentication method and device - Google Patents
EPG system-based multi-application authentication method and device Download PDFInfo
- Publication number
- CN115297346B CN115297346B CN202210758488.9A CN202210758488A CN115297346B CN 115297346 B CN115297346 B CN 115297346B CN 202210758488 A CN202210758488 A CN 202210758488A CN 115297346 B CN115297346 B CN 115297346B
- Authority
- CN
- China
- Prior art keywords
- application
- top box
- set top
- authentication
- page
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 27
- 238000004364 calculation method Methods 0.000 claims description 11
- 238000004422 calculation algorithm Methods 0.000 claims description 6
- 239000000872 buffer Substances 0.000 claims 1
- 230000006870 function Effects 0.000 description 11
- 230000009191 jumping Effects 0.000 description 8
- 238000010586 diagram Methods 0.000 description 6
- 230000000977 initiatory effect Effects 0.000 description 2
- 238000012795 verification Methods 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 1
- 230000003111 delayed effect Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000011084 recovery Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/41—Structure of client; Structure of client peripherals
- H04N21/4104—Peripherals receiving signals from specially adapted client devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0631—Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/45—Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
- H04N21/462—Content or additional data management, e.g. creating a master electronic program guide from data received from the Internet and a Head-end, controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
- H04N21/4627—Rights management associated to the content
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Databases & Information Systems (AREA)
- Multimedia (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer And Data Communications (AREA)
- Storage Device Security (AREA)
Abstract
The application discloses a multi-application authentication method and device based on an EPG system, comprising the following steps: responding to the request of the set top box from the first application to the second application, and executing parameter splicing to obtain a splicing result; entering a second application page according to the splicing result as the second application calling request parameter; responding to the second application to return the first application request, analyzing request parameters, judging that the authentication is effective if the analysis is successful, and acquiring the splicing result; executing a first application page according to the splicing result; and positioning the control position, and executing the display of the set top box sent by the first application page. The application provides a method for caching the first authentication information of the set top box by using the server side and using the return parameter mode for the subsequent authentication, thereby solving the problem of high concurrent access and response delay to the authentication server of the EPG system when the second application returns.
Description
Technical Field
The application relates to the field of computers and IPTV, in particular to a multi-application authentication method and device based on an EPG system.
Background
In an EPG system, a plurality of applications are mutually jumped, a set top box enters an application internal page, jumps to a second application page from a sub-page, returns to the application sub-page after the second application page is accessed, returns to the original application sub-page from the second application, cannot be directly entered in the EPG system due to safety consideration, and needs to initiate application access authority authentication to an EPG authentication server from a set top box end at a head page of the application, and authentication information acquired by the set top box from the EPG system can enter the application internal page after authentication is completed. Every time when the user returns a response from a third party, the user needs to access the EPG authentication server, so that the resource consumption of the authentication server of the EPG system is large, and the access is delayed. To solve the problem of repeated authentication each time a return is made from the second application. The application provides a method for caching the first authentication information of the set top box by using the server side and using the return parameter mode for the subsequent authentication, thereby solving the problem of high concurrent access and response delay to the authentication server of the EPG system when the second application returns.
Disclosure of Invention
In order to solve the problem of response delay of the page jump repeated access authentication server among multiple applications in the EPG system.
The application provides a multi-application authentication method based on an EPG system, which comprises the following steps:
responding to the request of the set top box from the first application to the second application, and executing parameter splicing to obtain a splicing result;
according to the splicing result, taking the splicing result as a second application calling request parameter, and entering a second application page;
responding to a first application request returned from the second application, analyzing request parameters, judging that the authentication is effective if the analysis is successful, and acquiring a splicing result;
executing a first application page according to the splicing result;
and positioning the control position, and executing the display of the set top box sent by the first application page.
Further, before the set top box jumps from the first application to the second application, the set top box acquires the set top box authentication data from the EPG authentication server and caches the set top box authentication data in a Session variable of the application server.
Further, in response to the set top box jumping from the application page to the second application request, wherein the second application mode is jumped, the application server returns a redirection instruction to perform second application jumping operation.
Further, entering a second application page according to a splicing result serving as a second application parameter, wherein the splicing result is calculated by AES encryption and a secret text string is generated as the second application parameter, and the encryption operation uses a set top box Session identifier as a key of an AES algorithm.
Further, the AES encrypts the calculation operation and generates a secret word string, and the secret word string further performs a Base64 encoding operation.
Further, the request parameters are analyzed in response to the first application request returned from the second application, if the analysis is successful, the authentication is judged to be effective, the splicing result is obtained, the request parameters are included to execute Base64 decoding, and AES decryption calculation is further executed.
Further, the AES decryption computation, wherein the AES decryption computation uses a key to identify for the set-top box Session.
The application also provides a multi-application skip device based on the EPG system, which comprises:
the jump instruction receiving module is used for receiving a first application page jump second application request initiated by the set top box;
the jump parameter splicing module is used for splicing parameters before the jump instruction is executed;
the AES encryption module is used for encrypting and generating a secret word string through an AES algorithm after the splicing parameters are completed;
the second application response receiving module is used for responding to the first application request returned by the second application;
the AES decryption module is used for analyzing ciphertext parameters when the second application returns to the first application request;
and the page restoration module is used for responding to page restoration when the second application returns to the first application.
The AES encryption module and the AES decryption module use keys to be Session identifications of the set top box when the AES encryption and the AES decryption execute operation.
The splicing parameters and the resolving ciphertext parameters comprise Base64 encoding and Base64 decoding.
The technical scheme of the application aims to solve the problem of repeated verification when returning from the second application each time. The application provides the set top box which encrypts and codes the authentication information AES of the set top box as the parameter to enter the second application when the set top box initiates the second application jump request, and the encrypted and coded parameter is returned by the second application to decode and decrypt when the set top box returns from the second application, thereby solving the problems of high concurrent access to the authentication server of the EPG system and response delay when the second application returns.
Drawings
Fig. 1 is a step diagram of a multi-application authentication method based on an EPG system according to an embodiment of the present application;
fig. 2 is a parameter splicing step diagram of an EPG system-based multi-application authentication method according to an embodiment of the present application;
fig. 3 is a device structure diagram of a multi-application jump device based on an EPG system according to an embodiment of the present application;
fig. 4 is a schematic diagram of a set top box jump URL of a multi-application authentication method based on an EPG system according to an embodiment of the present application:
fig. 5 is a set-top box jump sequence diagram of a multi-application authentication method based on an EPG system according to an embodiment of the present application;
Detailed Description
The following describes in detail the specific implementation of the present application with reference to the drawings accompanying the specification.
The application provides a multi-application skip method and device based on an EPG system. In an EPG system, a set top box enters a first application page, jumps to a second application page from the page, returns to the first application page after the second application page is accessed, returns to the first application page from the second application, cannot enter the EPG system directly due to safety consideration, and the set top box initiates access authentication to the first application to an EPG authentication server from a set top box terminal when the first application is in a first page, and can enter the first application according to authentication information acquired from the EPG system after the authentication is successful. Because the second application needs to access the EPG authentication server when returning to the first application every time, the problems of large resource consumption and access delay of the authentication server of the EPG system and poor user experience result often occur. To solve the problem of repeated authentication each time a return is made from the second application. The application provides the set top box which encrypts and codes the authentication information AES of the set top box as the parameter to enter the second application when the set top box initiates the second application jump request, and the encrypted and coded parameter is returned by the second application to decode and decrypt when the set top box returns from the second application, thereby solving the problems of high concurrent access to the authentication server of the EPG system and response delay when the second application returns.
As shown in fig. 1, the method for authenticating multiple applications based on an EPG system according to the present application includes the following steps:
step S1100: and responding to the request of the set top box for jumping from the first application to the second application, and executing parameter splicing to obtain a splicing result. In an EPG system, initiating an access request to a second application by a set-top box refers to a jump from a first application page to a second application page of the EPG system.
Before responding to a request for jumping from a first application page to a second application, performing an authentication information acquisition operation of the set top box, wherein the operation is acquired from an EPG system server by the set top box. The set top box acquires a set top box identification code from the box terminal, initiates an authentication request to the EPG authentication server, acquires authentication data and sends the authentication data to the first application server. The first application server caches the authentication data of the set top box in a Session variable of the server side. The cached data comprises a set top box region code, a set top box login token, a set top box identification code and an EPG hall address.
The first application server responds to the set top box to initiate second application skip, and the first application server performs return parameter splicing. And obtaining the jump second application URL address after the splicing is completed. The embodiment adopts the method that the server initiates the jump instruction. The application server returns the set-top box instruction code 301 (the instruction code is defined by the Http protocol), and the Location field of the return parameter is filled with the second application URL to execute the redirection jump action. Referring to fig. 2, the splicing parameters are as follows:
s2100: the first application server gathers the control information of the set top box page, the set top box firstly obtains the control of the current starting jump of the browser terminal page and uses the control as a request parameter to start a jump request to the first application server, the control identification of the starting jump is obtained as a parameter to be submitted to the first application server, the control identification refers to the browser page control of the set top box, and the control identification is a button control or DIV control identification, and the method is not particularly limited. Step S2200 is entered.
S2200: the first application server responds to the set top box jump second application request, takes out the authentication data corresponding to the current set top box Session, including the set top box region code, the set top box login token, the set top box identification code and the EPG hall address, and enters step S2300.
S2300: the set top box control identification and authentication information performs string concatenation. And acquiring a first application access address, performing word string connection operation with the control identifier, the set top box region code, the set top box login token, the set top box identification code and the EPG hall address, connecting each parameter by using an identifier "&", and entering step S2400.
S2400: the encryption of the spliced word strings by using an AES encryption library is carried out to obtain a secret word string, and the authentication information of the set top box is secret information which is obtained by the set top box from an EPG authentication server and accesses to the first application in order to prevent illegal activities from being obtained by the second application. In this embodiment, the function opensssl_encrypt built in the PHP is used to encrypt the word string, and the incoming parameter of the opensssl_encrypt is the Session value corresponding to the set-top box. It should be noted that the Session value corresponding to the set-top box is a unique identifier allocated by the first application server according to the source address of the set-top box when the set-top box first enters the first application home page. And (3) carrying out encryption calculation on the opensl_encryption according to the Session value corresponding to the set top box to obtain a secret text string, and taking the text string obtained after the secret text string is subjected to Base64 coding as a skip second application parameter, and entering step S1200.
Step S1200: and taking the splicing result as a second application calling request parameter to enter a second application page. In this embodiment, the second application jump request is initiated by the first application server returning instruction code 301 to execute the second application jump, and the jump parameter sets the jump URL in the Location field of the return parameter. Jumping to the second application URL illustration is shown in fig. 4-a, entering the second application page. Step S1300 is entered.
Step S1300: and responding to the second application, returning a first application request, analyzing the request parameters, judging that the authentication is effective if the analysis is successful, and acquiring a splicing result.
In this embodiment, when the second application returns to the first application page, the first application server responds to the set top box to initiate a request from the second application to return the application. And obtaining the ciphertext word string in the step S2400 from the return address, returning an application URL from the second application, see FIG. 4-B, and obtaining the ciphertext word string by using the Get method of PHP. Firstly, decoding by using Base64, decrypting by using an AES algorithm, judging that the first application authentication is effective after the decryption is successful, and obtaining a splicing result. The AES decryption function uses an opensl_decrypt function of the PHP language. The decryption incoming parameter is a Session value corresponding to the set-top box before the jump. It should be noted that the Session value corresponding to the set-top box before the jump is cached in the Session variable. The PHP script setSession function realizes the caching, and the getSession is used for obtaining when the PHP script setSession is taken out. Step S1400 is entered.
Step S1400: according to the concatenation result, the parameter is a string encrypted by AES and encoded by Base64 when the execution enters the first application page and returns from the second application, so that the parameter cannot be directly obtained by using the address resolution method of PHP, and according to the expression in step S2300, the string after Base64 decoding and AES decrypting operation is a parameter separated by using the identifier "&", and in this embodiment, the parameter list is resolved by using the PHP built-in function expode function. Go to step S1500.
Step S1500: and positioning the control position, and executing the display of the set top box sent by the first application page. And returning the set top box to the first application page and positioning the control position of the first application. The control position locating mode is that a control identifier of a return packet of an application server is received in the onload of a page initialization function of the set top box, and the embodiment uses an identifier "$" of a JQuery library to obtain a control attribute. And positioning the position of the control before jump is realized through the autofocus attribute of the setting function setAttribute function setting control of the JS language at the front end. And meanwhile, the set top box region code, the set top box login token, the set top box identification code and the EPG hall address information are analyzed through the return packet. And entering a first application page according to the analysis information.
The embodiment also provides a jump sequence diagram of the multi-application authentication method based on the EPG system, as shown in fig. 5, the set top box initiates a second application jump request to the first application server, and the first application server splices the return parameters and uses AES encryption to ensure the safety of data transmission to the second application. And obtaining the first application page parameters before the jump through AES decryption after the second application page access return is completed. And the first application page recovery before the jump is completed.
The corresponding embodiment also provides a multi-application jump device based on the EPG system, as shown in figure 3. Comprising the following steps:
p3100: the jump instruction receiving module is used for receiving a first application page jump second application request initiated by the set top box, and the jump instruction receiving module also comprises an application server for receiving the authentication information of the set top box and caching the authentication information in a Session variable of the server side before receiving the instruction.
P3200: and the jump parameter splicing module is used for splicing parameters before the jump instruction is executed. And the authentication information of the set top box pre-stored on the application server in the P3100 and the control mark initiating the jump in the jump are connected in a character string mode to obtain a new character string, and the mark "&" is used for separating each parameter.
P3210: and the AES encryption module is used for encrypting the spliced parameters through an AES algorithm and generating a secret text string. The ciphertext word string is used as a parameter for jumping the URL address of the second application, and the application server can normally respond to the jumping operation after the Base64 coding is needed before the jumping is carried out on the URL address parameter.
P3400: and the second application response receiving module is used for responding to the first application request returned by the second application, decoding by using the Base64 of the PHP script, and performing AES decryption to obtain a pre-jump parameter list.
P3410: and the AES decryption module is used for analyzing the ciphertext parameters when the second application returns to the first application request, and decoding the ciphertext parameters by using Base64 before the ciphertext parameters are analyzed. And after decoding is finished, performing AES decryption and obtaining a parameter list before jump by using a PHP built-in function expode.
P3500: the page restoration module is used for responding to the page restoration when the second application returns to the first application, the application server sends a control identification instruction before the jump to the set top box, and the set top box receives the control identification and then realizes focusing operation on the page control in the onload function of the browser and presents the state of the page control before the jump.
The technical scheme of the application aims to solve the problem of repeated verification when returning from the second application each time. The application provides the set top box which encrypts and codes the authentication information AES of the set top box as the parameter to enter the second application when the set top box initiates the second application jump request, and the encrypted and coded parameter is returned by the second application to decode and decrypt when the set top box returns from the second application, thereby solving the problems of high concurrent access to the authentication server of the EPG system and response delay when the second application returns.
The above disclosure is merely illustrative of specific embodiments of the present application, but the present application is not limited thereto, and any variations that can be considered by those skilled in the art should fall within the scope of the present application.
Claims (10)
1. An EPG system-based multi-application authentication method, the method comprising:
in response to a request from a set top box to jump from a first application to a second application, performing parameter splicing, obtaining a splicing result, wherein the parameter splicing, obtaining the splicing result comprises,
the first application responds to the request of the set top box to acquire page control information;
completing word string connection of each data according to the page control information and the authentication data and obtaining a second parameter, wherein the authentication data is obtained from an EPG system server by a set top box, and comprises a set top box region code, a set top box login token, a set top box identification code and an EPG hall address;
executing an encryption step according to the second parameter, wherein the encryption step comprises executing encryption calculation and further Base64 coding to obtain a secret text string, and the encryption calculation comprises AES calculation;
entering a second application page according to the splicing result as the second application calling request parameter;
responding to the second application to return the first application request, analyzing request parameters, judging that the authentication is effective if the analysis is successful, and acquiring the splicing result, wherein the method comprises the steps of;
acquiring the ciphertext word string according to a second application return parameter;
executing a decryption step according to the ciphertext word string, wherein the decryption step comprises Base64 decoding, further executing decryption calculation, and if decryption is successful, judging that the first application authentication is effective and acquiring the control information, wherein the decryption calculation comprises AES calculation;
executing a first application page according to the splicing result, wherein the splicing result comprises the control information, and the control information comprises a set top box login token and a set top box identification code;
positioning the control position, executing the first application page to send the set top box display, wherein the positioning the control position comprises,
the first application sends the control information to the set top box;
and the set top box positions the control according to the control information, wherein the control information comprises a control autofocus attribute, and the control autofocus attribute setting is executed to complete control positioning.
2. The EPG system-based multi-application authentication method of claim 1, wherein the set-top box obtains the set-top box authentication data from the EPG authentication server and buffers the set-top box authentication data in a Session variable of the application server before the response set-top box jumps from the first application to the second application.
3. The method for authenticating multiple applications based on an EPG system of claim 1, wherein the response set-top box jumps to a second application request from an application page, wherein the jump to the second application mode is performed by the application server returning a redirect command.
4. The method for authenticating multiple applications based on the EPG system according to claim 1, wherein the second application page is entered according to the concatenation result as a second application parameter, wherein the concatenation result is calculated by AES encryption and a secret word string is generated as the second application parameter, and the encryption uses a set-top box Session identifier as a key of the AES algorithm.
5. The EPG system-based multi-application authentication method of claim 4, wherein the AES encryption calculation operation and generates a ciphertext word string further comprises the ciphertext word string performing a Base64 encoding operation.
6. The method for authenticating multiple applications based on an EPG system of claim 1, wherein the responding to the second application returns the first application request, parses a request parameter, if the parsing is successful, determines that the authentication is valid, and obtains the concatenation result, including the request parameter performing Base64 decoding, further performing AES decryption calculation.
7. The EPG system-based multi-application authentication method of claim 6, wherein the AES decryption computation uses a key to identify the set-top box Session.
8. An EPG system-based multi-application skip apparatus, comprising:
the jump instruction receiving module is used for receiving a first application page jump second application request initiated by the set top box;
the jump parameter splicing module is used for splicing parameters before the jump instruction is executed, wherein the splicing parameters comprise the page control information and authentication data which are connected in a word string, and are divided by character identifiers to be used for distinguishing data, and the authentication data are acquired from an EPG system server by a set top box and comprise a set top box region code, a set top box login token, a set top box identification code and an EPG hall address;
the AES encryption module is used for encrypting the splicing parameters through an AES algorithm after the splicing parameters are finished and generating a secret text string;
the second application response receiving module is used for responding to the first application request returned by the second application;
the AES decryption module is used for analyzing ciphertext parameters when the second application returns to the first application request;
a page restoration module for responding to page restoration when the second application returns to the first application, wherein the page restoration comprises positioning of the control position of the set top box, the positioning of the control position of the set top box comprises,
the first application sends the control information to the set top box;
and the set top box positions the control according to the control information, and executes control autofocus attribute setting to complete control positioning.
9. The EPG system-based multi-application jump apparatus of claim 8, wherein the AES encryption module and AES decryption module, wherein the use of the key in performing the operations of AES encryption and AES decryption is a Session identification of the set-top box.
10. The EPG system-based multi-application jump apparatus of claim 8, wherein the splicing parameters and the parsing ciphertext parameters include Base64 encoding and Base64 decoding.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210758488.9A CN115297346B (en) | 2022-06-30 | 2022-06-30 | EPG system-based multi-application authentication method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210758488.9A CN115297346B (en) | 2022-06-30 | 2022-06-30 | EPG system-based multi-application authentication method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN115297346A CN115297346A (en) | 2022-11-04 |
CN115297346B true CN115297346B (en) | 2023-08-25 |
Family
ID=83821500
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210758488.9A Active CN115297346B (en) | 2022-06-30 | 2022-06-30 | EPG system-based multi-application authentication method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115297346B (en) |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102572605A (en) * | 2012-02-09 | 2012-07-11 | 成都三零凯天通信实业有限公司 | System and method for integrating third-party informatization of IPTV system |
WO2013056622A1 (en) * | 2011-10-18 | 2013-04-25 | 华为终端有限公司 | Method for verifying access identity of set top box and authentication server |
WO2016206475A1 (en) * | 2015-06-25 | 2016-12-29 | 中兴通讯股份有限公司 | Set-top box service adaptation method, device, and system |
CN109740324A (en) * | 2018-11-21 | 2019-05-10 | 顺丰科技有限公司 | Multi-platform method for authenticating, device and computer readable storage medium |
CN110011950A (en) * | 2018-01-04 | 2019-07-12 | 武汉斗鱼网络科技有限公司 | A kind of method for authenticating and device of video flowing address |
CN112039889A (en) * | 2020-08-31 | 2020-12-04 | 康键信息技术(深圳)有限公司 | Password-free login method, device, equipment and storage medium |
CN112199622A (en) * | 2020-09-29 | 2021-01-08 | 平安普惠企业管理有限公司 | Page jump method, system and storage medium |
CN113568542A (en) * | 2021-06-16 | 2021-10-29 | 荣耀终端有限公司 | Interface display method and electronic equipment |
CN114301634A (en) * | 2021-12-09 | 2022-04-08 | 江苏网进科技股份有限公司 | Oauth protocol-based portal system user sharing method |
CN114329387A (en) * | 2021-12-29 | 2022-04-12 | 建信金融科技有限责任公司 | Single sign-on control method, system, electronic equipment and computer readable medium |
-
2022
- 2022-06-30 CN CN202210758488.9A patent/CN115297346B/en active Active
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2013056622A1 (en) * | 2011-10-18 | 2013-04-25 | 华为终端有限公司 | Method for verifying access identity of set top box and authentication server |
CN102572605A (en) * | 2012-02-09 | 2012-07-11 | 成都三零凯天通信实业有限公司 | System and method for integrating third-party informatization of IPTV system |
WO2016206475A1 (en) * | 2015-06-25 | 2016-12-29 | 中兴通讯股份有限公司 | Set-top box service adaptation method, device, and system |
CN110011950A (en) * | 2018-01-04 | 2019-07-12 | 武汉斗鱼网络科技有限公司 | A kind of method for authenticating and device of video flowing address |
CN109740324A (en) * | 2018-11-21 | 2019-05-10 | 顺丰科技有限公司 | Multi-platform method for authenticating, device and computer readable storage medium |
CN112039889A (en) * | 2020-08-31 | 2020-12-04 | 康键信息技术(深圳)有限公司 | Password-free login method, device, equipment and storage medium |
CN112199622A (en) * | 2020-09-29 | 2021-01-08 | 平安普惠企业管理有限公司 | Page jump method, system and storage medium |
CN113568542A (en) * | 2021-06-16 | 2021-10-29 | 荣耀终端有限公司 | Interface display method and electronic equipment |
CN114301634A (en) * | 2021-12-09 | 2022-04-08 | 江苏网进科技股份有限公司 | Oauth protocol-based portal system user sharing method |
CN114329387A (en) * | 2021-12-29 | 2022-04-12 | 建信金融科技有限责任公司 | Single sign-on control method, system, electronic equipment and computer readable medium |
Non-Patent Citations (1)
Title |
---|
跃文.《iOS 应用跳转、参数传递 - 简书》.2018,全文. * |
Also Published As
Publication number | Publication date |
---|---|
CN115297346A (en) | 2022-11-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10818291B2 (en) | Method and apparatus for interacting information | |
US20150341356A1 (en) | Login method and apparatus | |
US9686344B2 (en) | Method for implementing cross-domain jump, browser, and domain name server | |
CN112822518A (en) | Video playing method, device, system, electronic equipment and storage medium | |
CN109214196B (en) | Data interaction method, device and equipment | |
KR20220031095A (en) | Authentication method, apparatus, apparatus and computer-readable storage medium | |
CN104735066A (en) | Single sign-on method, device and system oriented to web page applications | |
CN111865882B (en) | Micro-service authentication method and system | |
CN104113552A (en) | Platform authorization method, platform server side, application client side and system | |
CN109362074B (en) | Method for h5 and server side safety communication in mixed mode APP | |
CN103067174B (en) | Digital signature method and system completed in mobile operating system | |
CN108600268B (en) | Encryption and decryption method applied to non-credit authentication and non-credit authentication system | |
CN110011950B (en) | Authentication method and device for video stream address | |
US10162944B2 (en) | Library style media DRM APIs in a hosted architecture | |
CN105491073B (en) | Data downloading method, device and system | |
US20220141208A1 (en) | Passing authentication information via parameters | |
CN105100913B (en) | Video access method and system, set top box, proxy server and media server | |
KR20130072790A (en) | User authentication system and method thereof | |
CN111683370B (en) | Access authentication method, device and system of wireless network equipment | |
CN110351304B (en) | One-key switching login implementation method and device among different systems | |
WO2015032281A1 (en) | Method and system for generating and processing challenge-response tests | |
CN106156598A (en) | A kind of Quick Response Code privacy logs in protection system and method | |
CN104579657A (en) | Method and device for identity authentication | |
CN105337940A (en) | Page verification method, client, server and system | |
CN114157434A (en) | Login verification method and device, electronic equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
EE01 | Entry into force of recordation of patent licensing contract | ||
EE01 | Entry into force of recordation of patent licensing contract |
Application publication date: 20221104 Assignee: GUIYANG LONGMASTER INFORMATION & TECHNOLOGY Co.,Ltd. Assignor: Guiyang Longma Video Technology Co.,Ltd. Contract record no.: X2024980003586 Denomination of invention: A multi application authentication method and device based on EPG system Granted publication date: 20230825 License type: Common License Record date: 20240329 |