CN115297346B - EPG system-based multi-application authentication method and device - Google Patents

EPG system-based multi-application authentication method and device Download PDF

Info

Publication number
CN115297346B
CN115297346B CN202210758488.9A CN202210758488A CN115297346B CN 115297346 B CN115297346 B CN 115297346B CN 202210758488 A CN202210758488 A CN 202210758488A CN 115297346 B CN115297346 B CN 115297346B
Authority
CN
China
Prior art keywords
application
top box
set top
authentication
page
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210758488.9A
Other languages
Chinese (zh)
Other versions
CN115297346A (en
Inventor
张德时
田维忠
任嘉奋
国兴旺
付清文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guiyang Longma Video Technology Co ltd
Original Assignee
Guiyang Longma Video Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guiyang Longma Video Technology Co ltd filed Critical Guiyang Longma Video Technology Co ltd
Priority to CN202210758488.9A priority Critical patent/CN115297346B/en
Publication of CN115297346A publication Critical patent/CN115297346A/en
Application granted granted Critical
Publication of CN115297346B publication Critical patent/CN115297346B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/41Structure of client; Structure of client peripherals
    • H04N21/4104Peripherals receiving signals from specially adapted client devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/45Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
    • H04N21/462Content or additional data management, e.g. creating a master electronic program guide from data received from the Internet and a Head-end, controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
    • H04N21/4627Rights management associated to the content
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Databases & Information Systems (AREA)
  • Multimedia (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer And Data Communications (AREA)
  • Storage Device Security (AREA)

Abstract

The application discloses a multi-application authentication method and device based on an EPG system, comprising the following steps: responding to the request of the set top box from the first application to the second application, and executing parameter splicing to obtain a splicing result; entering a second application page according to the splicing result as the second application calling request parameter; responding to the second application to return the first application request, analyzing request parameters, judging that the authentication is effective if the analysis is successful, and acquiring the splicing result; executing a first application page according to the splicing result; and positioning the control position, and executing the display of the set top box sent by the first application page. The application provides a method for caching the first authentication information of the set top box by using the server side and using the return parameter mode for the subsequent authentication, thereby solving the problem of high concurrent access and response delay to the authentication server of the EPG system when the second application returns.

Description

EPG system-based multi-application authentication method and device
Technical Field
The application relates to the field of computers and IPTV, in particular to a multi-application authentication method and device based on an EPG system.
Background
In an EPG system, a plurality of applications are mutually jumped, a set top box enters an application internal page, jumps to a second application page from a sub-page, returns to the application sub-page after the second application page is accessed, returns to the original application sub-page from the second application, cannot be directly entered in the EPG system due to safety consideration, and needs to initiate application access authority authentication to an EPG authentication server from a set top box end at a head page of the application, and authentication information acquired by the set top box from the EPG system can enter the application internal page after authentication is completed. Every time when the user returns a response from a third party, the user needs to access the EPG authentication server, so that the resource consumption of the authentication server of the EPG system is large, and the access is delayed. To solve the problem of repeated authentication each time a return is made from the second application. The application provides a method for caching the first authentication information of the set top box by using the server side and using the return parameter mode for the subsequent authentication, thereby solving the problem of high concurrent access and response delay to the authentication server of the EPG system when the second application returns.
Disclosure of Invention
In order to solve the problem of response delay of the page jump repeated access authentication server among multiple applications in the EPG system.
The application provides a multi-application authentication method based on an EPG system, which comprises the following steps:
responding to the request of the set top box from the first application to the second application, and executing parameter splicing to obtain a splicing result;
according to the splicing result, taking the splicing result as a second application calling request parameter, and entering a second application page;
responding to a first application request returned from the second application, analyzing request parameters, judging that the authentication is effective if the analysis is successful, and acquiring a splicing result;
executing a first application page according to the splicing result;
and positioning the control position, and executing the display of the set top box sent by the first application page.
Further, before the set top box jumps from the first application to the second application, the set top box acquires the set top box authentication data from the EPG authentication server and caches the set top box authentication data in a Session variable of the application server.
Further, in response to the set top box jumping from the application page to the second application request, wherein the second application mode is jumped, the application server returns a redirection instruction to perform second application jumping operation.
Further, entering a second application page according to a splicing result serving as a second application parameter, wherein the splicing result is calculated by AES encryption and a secret text string is generated as the second application parameter, and the encryption operation uses a set top box Session identifier as a key of an AES algorithm.
Further, the AES encrypts the calculation operation and generates a secret word string, and the secret word string further performs a Base64 encoding operation.
Further, the request parameters are analyzed in response to the first application request returned from the second application, if the analysis is successful, the authentication is judged to be effective, the splicing result is obtained, the request parameters are included to execute Base64 decoding, and AES decryption calculation is further executed.
Further, the AES decryption computation, wherein the AES decryption computation uses a key to identify for the set-top box Session.
The application also provides a multi-application skip device based on the EPG system, which comprises:
the jump instruction receiving module is used for receiving a first application page jump second application request initiated by the set top box;
the jump parameter splicing module is used for splicing parameters before the jump instruction is executed;
the AES encryption module is used for encrypting and generating a secret word string through an AES algorithm after the splicing parameters are completed;
the second application response receiving module is used for responding to the first application request returned by the second application;
the AES decryption module is used for analyzing ciphertext parameters when the second application returns to the first application request;
and the page restoration module is used for responding to page restoration when the second application returns to the first application.
The AES encryption module and the AES decryption module use keys to be Session identifications of the set top box when the AES encryption and the AES decryption execute operation.
The splicing parameters and the resolving ciphertext parameters comprise Base64 encoding and Base64 decoding.
The technical scheme of the application aims to solve the problem of repeated verification when returning from the second application each time. The application provides the set top box which encrypts and codes the authentication information AES of the set top box as the parameter to enter the second application when the set top box initiates the second application jump request, and the encrypted and coded parameter is returned by the second application to decode and decrypt when the set top box returns from the second application, thereby solving the problems of high concurrent access to the authentication server of the EPG system and response delay when the second application returns.
Drawings
Fig. 1 is a step diagram of a multi-application authentication method based on an EPG system according to an embodiment of the present application;
fig. 2 is a parameter splicing step diagram of an EPG system-based multi-application authentication method according to an embodiment of the present application;
fig. 3 is a device structure diagram of a multi-application jump device based on an EPG system according to an embodiment of the present application;
fig. 4 is a schematic diagram of a set top box jump URL of a multi-application authentication method based on an EPG system according to an embodiment of the present application:
fig. 5 is a set-top box jump sequence diagram of a multi-application authentication method based on an EPG system according to an embodiment of the present application;
Detailed Description
The following describes in detail the specific implementation of the present application with reference to the drawings accompanying the specification.
The application provides a multi-application skip method and device based on an EPG system. In an EPG system, a set top box enters a first application page, jumps to a second application page from the page, returns to the first application page after the second application page is accessed, returns to the first application page from the second application, cannot enter the EPG system directly due to safety consideration, and the set top box initiates access authentication to the first application to an EPG authentication server from a set top box terminal when the first application is in a first page, and can enter the first application according to authentication information acquired from the EPG system after the authentication is successful. Because the second application needs to access the EPG authentication server when returning to the first application every time, the problems of large resource consumption and access delay of the authentication server of the EPG system and poor user experience result often occur. To solve the problem of repeated authentication each time a return is made from the second application. The application provides the set top box which encrypts and codes the authentication information AES of the set top box as the parameter to enter the second application when the set top box initiates the second application jump request, and the encrypted and coded parameter is returned by the second application to decode and decrypt when the set top box returns from the second application, thereby solving the problems of high concurrent access to the authentication server of the EPG system and response delay when the second application returns.
As shown in fig. 1, the method for authenticating multiple applications based on an EPG system according to the present application includes the following steps:
step S1100: and responding to the request of the set top box for jumping from the first application to the second application, and executing parameter splicing to obtain a splicing result. In an EPG system, initiating an access request to a second application by a set-top box refers to a jump from a first application page to a second application page of the EPG system.
Before responding to a request for jumping from a first application page to a second application, performing an authentication information acquisition operation of the set top box, wherein the operation is acquired from an EPG system server by the set top box. The set top box acquires a set top box identification code from the box terminal, initiates an authentication request to the EPG authentication server, acquires authentication data and sends the authentication data to the first application server. The first application server caches the authentication data of the set top box in a Session variable of the server side. The cached data comprises a set top box region code, a set top box login token, a set top box identification code and an EPG hall address.
The first application server responds to the set top box to initiate second application skip, and the first application server performs return parameter splicing. And obtaining the jump second application URL address after the splicing is completed. The embodiment adopts the method that the server initiates the jump instruction. The application server returns the set-top box instruction code 301 (the instruction code is defined by the Http protocol), and the Location field of the return parameter is filled with the second application URL to execute the redirection jump action. Referring to fig. 2, the splicing parameters are as follows:
s2100: the first application server gathers the control information of the set top box page, the set top box firstly obtains the control of the current starting jump of the browser terminal page and uses the control as a request parameter to start a jump request to the first application server, the control identification of the starting jump is obtained as a parameter to be submitted to the first application server, the control identification refers to the browser page control of the set top box, and the control identification is a button control or DIV control identification, and the method is not particularly limited. Step S2200 is entered.
S2200: the first application server responds to the set top box jump second application request, takes out the authentication data corresponding to the current set top box Session, including the set top box region code, the set top box login token, the set top box identification code and the EPG hall address, and enters step S2300.
S2300: the set top box control identification and authentication information performs string concatenation. And acquiring a first application access address, performing word string connection operation with the control identifier, the set top box region code, the set top box login token, the set top box identification code and the EPG hall address, connecting each parameter by using an identifier "&", and entering step S2400.
S2400: the encryption of the spliced word strings by using an AES encryption library is carried out to obtain a secret word string, and the authentication information of the set top box is secret information which is obtained by the set top box from an EPG authentication server and accesses to the first application in order to prevent illegal activities from being obtained by the second application. In this embodiment, the function opensssl_encrypt built in the PHP is used to encrypt the word string, and the incoming parameter of the opensssl_encrypt is the Session value corresponding to the set-top box. It should be noted that the Session value corresponding to the set-top box is a unique identifier allocated by the first application server according to the source address of the set-top box when the set-top box first enters the first application home page. And (3) carrying out encryption calculation on the opensl_encryption according to the Session value corresponding to the set top box to obtain a secret text string, and taking the text string obtained after the secret text string is subjected to Base64 coding as a skip second application parameter, and entering step S1200.
Step S1200: and taking the splicing result as a second application calling request parameter to enter a second application page. In this embodiment, the second application jump request is initiated by the first application server returning instruction code 301 to execute the second application jump, and the jump parameter sets the jump URL in the Location field of the return parameter. Jumping to the second application URL illustration is shown in fig. 4-a, entering the second application page. Step S1300 is entered.
Step S1300: and responding to the second application, returning a first application request, analyzing the request parameters, judging that the authentication is effective if the analysis is successful, and acquiring a splicing result.
In this embodiment, when the second application returns to the first application page, the first application server responds to the set top box to initiate a request from the second application to return the application. And obtaining the ciphertext word string in the step S2400 from the return address, returning an application URL from the second application, see FIG. 4-B, and obtaining the ciphertext word string by using the Get method of PHP. Firstly, decoding by using Base64, decrypting by using an AES algorithm, judging that the first application authentication is effective after the decryption is successful, and obtaining a splicing result. The AES decryption function uses an opensl_decrypt function of the PHP language. The decryption incoming parameter is a Session value corresponding to the set-top box before the jump. It should be noted that the Session value corresponding to the set-top box before the jump is cached in the Session variable. The PHP script setSession function realizes the caching, and the getSession is used for obtaining when the PHP script setSession is taken out. Step S1400 is entered.
Step S1400: according to the concatenation result, the parameter is a string encrypted by AES and encoded by Base64 when the execution enters the first application page and returns from the second application, so that the parameter cannot be directly obtained by using the address resolution method of PHP, and according to the expression in step S2300, the string after Base64 decoding and AES decrypting operation is a parameter separated by using the identifier "&", and in this embodiment, the parameter list is resolved by using the PHP built-in function expode function. Go to step S1500.
Step S1500: and positioning the control position, and executing the display of the set top box sent by the first application page. And returning the set top box to the first application page and positioning the control position of the first application. The control position locating mode is that a control identifier of a return packet of an application server is received in the onload of a page initialization function of the set top box, and the embodiment uses an identifier "$" of a JQuery library to obtain a control attribute. And positioning the position of the control before jump is realized through the autofocus attribute of the setting function setAttribute function setting control of the JS language at the front end. And meanwhile, the set top box region code, the set top box login token, the set top box identification code and the EPG hall address information are analyzed through the return packet. And entering a first application page according to the analysis information.
The embodiment also provides a jump sequence diagram of the multi-application authentication method based on the EPG system, as shown in fig. 5, the set top box initiates a second application jump request to the first application server, and the first application server splices the return parameters and uses AES encryption to ensure the safety of data transmission to the second application. And obtaining the first application page parameters before the jump through AES decryption after the second application page access return is completed. And the first application page recovery before the jump is completed.
The corresponding embodiment also provides a multi-application jump device based on the EPG system, as shown in figure 3. Comprising the following steps:
p3100: the jump instruction receiving module is used for receiving a first application page jump second application request initiated by the set top box, and the jump instruction receiving module also comprises an application server for receiving the authentication information of the set top box and caching the authentication information in a Session variable of the server side before receiving the instruction.
P3200: and the jump parameter splicing module is used for splicing parameters before the jump instruction is executed. And the authentication information of the set top box pre-stored on the application server in the P3100 and the control mark initiating the jump in the jump are connected in a character string mode to obtain a new character string, and the mark "&" is used for separating each parameter.
P3210: and the AES encryption module is used for encrypting the spliced parameters through an AES algorithm and generating a secret text string. The ciphertext word string is used as a parameter for jumping the URL address of the second application, and the application server can normally respond to the jumping operation after the Base64 coding is needed before the jumping is carried out on the URL address parameter.
P3400: and the second application response receiving module is used for responding to the first application request returned by the second application, decoding by using the Base64 of the PHP script, and performing AES decryption to obtain a pre-jump parameter list.
P3410: and the AES decryption module is used for analyzing the ciphertext parameters when the second application returns to the first application request, and decoding the ciphertext parameters by using Base64 before the ciphertext parameters are analyzed. And after decoding is finished, performing AES decryption and obtaining a parameter list before jump by using a PHP built-in function expode.
P3500: the page restoration module is used for responding to the page restoration when the second application returns to the first application, the application server sends a control identification instruction before the jump to the set top box, and the set top box receives the control identification and then realizes focusing operation on the page control in the onload function of the browser and presents the state of the page control before the jump.
The technical scheme of the application aims to solve the problem of repeated verification when returning from the second application each time. The application provides the set top box which encrypts and codes the authentication information AES of the set top box as the parameter to enter the second application when the set top box initiates the second application jump request, and the encrypted and coded parameter is returned by the second application to decode and decrypt when the set top box returns from the second application, thereby solving the problems of high concurrent access to the authentication server of the EPG system and response delay when the second application returns.
The above disclosure is merely illustrative of specific embodiments of the present application, but the present application is not limited thereto, and any variations that can be considered by those skilled in the art should fall within the scope of the present application.

Claims (10)

1. An EPG system-based multi-application authentication method, the method comprising:
in response to a request from a set top box to jump from a first application to a second application, performing parameter splicing, obtaining a splicing result, wherein the parameter splicing, obtaining the splicing result comprises,
the first application responds to the request of the set top box to acquire page control information;
completing word string connection of each data according to the page control information and the authentication data and obtaining a second parameter, wherein the authentication data is obtained from an EPG system server by a set top box, and comprises a set top box region code, a set top box login token, a set top box identification code and an EPG hall address;
executing an encryption step according to the second parameter, wherein the encryption step comprises executing encryption calculation and further Base64 coding to obtain a secret text string, and the encryption calculation comprises AES calculation;
entering a second application page according to the splicing result as the second application calling request parameter;
responding to the second application to return the first application request, analyzing request parameters, judging that the authentication is effective if the analysis is successful, and acquiring the splicing result, wherein the method comprises the steps of;
acquiring the ciphertext word string according to a second application return parameter;
executing a decryption step according to the ciphertext word string, wherein the decryption step comprises Base64 decoding, further executing decryption calculation, and if decryption is successful, judging that the first application authentication is effective and acquiring the control information, wherein the decryption calculation comprises AES calculation;
executing a first application page according to the splicing result, wherein the splicing result comprises the control information, and the control information comprises a set top box login token and a set top box identification code;
positioning the control position, executing the first application page to send the set top box display, wherein the positioning the control position comprises,
the first application sends the control information to the set top box;
and the set top box positions the control according to the control information, wherein the control information comprises a control autofocus attribute, and the control autofocus attribute setting is executed to complete control positioning.
2. The EPG system-based multi-application authentication method of claim 1, wherein the set-top box obtains the set-top box authentication data from the EPG authentication server and buffers the set-top box authentication data in a Session variable of the application server before the response set-top box jumps from the first application to the second application.
3. The method for authenticating multiple applications based on an EPG system of claim 1, wherein the response set-top box jumps to a second application request from an application page, wherein the jump to the second application mode is performed by the application server returning a redirect command.
4. The method for authenticating multiple applications based on the EPG system according to claim 1, wherein the second application page is entered according to the concatenation result as a second application parameter, wherein the concatenation result is calculated by AES encryption and a secret word string is generated as the second application parameter, and the encryption uses a set-top box Session identifier as a key of the AES algorithm.
5. The EPG system-based multi-application authentication method of claim 4, wherein the AES encryption calculation operation and generates a ciphertext word string further comprises the ciphertext word string performing a Base64 encoding operation.
6. The method for authenticating multiple applications based on an EPG system of claim 1, wherein the responding to the second application returns the first application request, parses a request parameter, if the parsing is successful, determines that the authentication is valid, and obtains the concatenation result, including the request parameter performing Base64 decoding, further performing AES decryption calculation.
7. The EPG system-based multi-application authentication method of claim 6, wherein the AES decryption computation uses a key to identify the set-top box Session.
8. An EPG system-based multi-application skip apparatus, comprising:
the jump instruction receiving module is used for receiving a first application page jump second application request initiated by the set top box;
the jump parameter splicing module is used for splicing parameters before the jump instruction is executed, wherein the splicing parameters comprise the page control information and authentication data which are connected in a word string, and are divided by character identifiers to be used for distinguishing data, and the authentication data are acquired from an EPG system server by a set top box and comprise a set top box region code, a set top box login token, a set top box identification code and an EPG hall address;
the AES encryption module is used for encrypting the splicing parameters through an AES algorithm after the splicing parameters are finished and generating a secret text string;
the second application response receiving module is used for responding to the first application request returned by the second application;
the AES decryption module is used for analyzing ciphertext parameters when the second application returns to the first application request;
a page restoration module for responding to page restoration when the second application returns to the first application, wherein the page restoration comprises positioning of the control position of the set top box, the positioning of the control position of the set top box comprises,
the first application sends the control information to the set top box;
and the set top box positions the control according to the control information, and executes control autofocus attribute setting to complete control positioning.
9. The EPG system-based multi-application jump apparatus of claim 8, wherein the AES encryption module and AES decryption module, wherein the use of the key in performing the operations of AES encryption and AES decryption is a Session identification of the set-top box.
10. The EPG system-based multi-application jump apparatus of claim 8, wherein the splicing parameters and the parsing ciphertext parameters include Base64 encoding and Base64 decoding.
CN202210758488.9A 2022-06-30 2022-06-30 EPG system-based multi-application authentication method and device Active CN115297346B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210758488.9A CN115297346B (en) 2022-06-30 2022-06-30 EPG system-based multi-application authentication method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210758488.9A CN115297346B (en) 2022-06-30 2022-06-30 EPG system-based multi-application authentication method and device

Publications (2)

Publication Number Publication Date
CN115297346A CN115297346A (en) 2022-11-04
CN115297346B true CN115297346B (en) 2023-08-25

Family

ID=83821500

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210758488.9A Active CN115297346B (en) 2022-06-30 2022-06-30 EPG system-based multi-application authentication method and device

Country Status (1)

Country Link
CN (1) CN115297346B (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102572605A (en) * 2012-02-09 2012-07-11 成都三零凯天通信实业有限公司 System and method for integrating third-party informatization of IPTV system
WO2013056622A1 (en) * 2011-10-18 2013-04-25 华为终端有限公司 Method for verifying access identity of set top box and authentication server
WO2016206475A1 (en) * 2015-06-25 2016-12-29 中兴通讯股份有限公司 Set-top box service adaptation method, device, and system
CN109740324A (en) * 2018-11-21 2019-05-10 顺丰科技有限公司 Multi-platform method for authenticating, device and computer readable storage medium
CN110011950A (en) * 2018-01-04 2019-07-12 武汉斗鱼网络科技有限公司 A kind of method for authenticating and device of video flowing address
CN112039889A (en) * 2020-08-31 2020-12-04 康键信息技术(深圳)有限公司 Password-free login method, device, equipment and storage medium
CN112199622A (en) * 2020-09-29 2021-01-08 平安普惠企业管理有限公司 Page jump method, system and storage medium
CN113568542A (en) * 2021-06-16 2021-10-29 荣耀终端有限公司 Interface display method and electronic equipment
CN114301634A (en) * 2021-12-09 2022-04-08 江苏网进科技股份有限公司 Oauth protocol-based portal system user sharing method
CN114329387A (en) * 2021-12-29 2022-04-12 建信金融科技有限责任公司 Single sign-on control method, system, electronic equipment and computer readable medium

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013056622A1 (en) * 2011-10-18 2013-04-25 华为终端有限公司 Method for verifying access identity of set top box and authentication server
CN102572605A (en) * 2012-02-09 2012-07-11 成都三零凯天通信实业有限公司 System and method for integrating third-party informatization of IPTV system
WO2016206475A1 (en) * 2015-06-25 2016-12-29 中兴通讯股份有限公司 Set-top box service adaptation method, device, and system
CN110011950A (en) * 2018-01-04 2019-07-12 武汉斗鱼网络科技有限公司 A kind of method for authenticating and device of video flowing address
CN109740324A (en) * 2018-11-21 2019-05-10 顺丰科技有限公司 Multi-platform method for authenticating, device and computer readable storage medium
CN112039889A (en) * 2020-08-31 2020-12-04 康键信息技术(深圳)有限公司 Password-free login method, device, equipment and storage medium
CN112199622A (en) * 2020-09-29 2021-01-08 平安普惠企业管理有限公司 Page jump method, system and storage medium
CN113568542A (en) * 2021-06-16 2021-10-29 荣耀终端有限公司 Interface display method and electronic equipment
CN114301634A (en) * 2021-12-09 2022-04-08 江苏网进科技股份有限公司 Oauth protocol-based portal system user sharing method
CN114329387A (en) * 2021-12-29 2022-04-12 建信金融科技有限责任公司 Single sign-on control method, system, electronic equipment and computer readable medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
跃文.《iOS 应用跳转、参数传递 - 简书》.2018,全文. *

Also Published As

Publication number Publication date
CN115297346A (en) 2022-11-04

Similar Documents

Publication Publication Date Title
US10818291B2 (en) Method and apparatus for interacting information
US20150341356A1 (en) Login method and apparatus
US9686344B2 (en) Method for implementing cross-domain jump, browser, and domain name server
CN112822518A (en) Video playing method, device, system, electronic equipment and storage medium
CN109214196B (en) Data interaction method, device and equipment
KR20220031095A (en) Authentication method, apparatus, apparatus and computer-readable storage medium
CN104735066A (en) Single sign-on method, device and system oriented to web page applications
CN111865882B (en) Micro-service authentication method and system
CN104113552A (en) Platform authorization method, platform server side, application client side and system
CN109362074B (en) Method for h5 and server side safety communication in mixed mode APP
CN103067174B (en) Digital signature method and system completed in mobile operating system
CN108600268B (en) Encryption and decryption method applied to non-credit authentication and non-credit authentication system
CN110011950B (en) Authentication method and device for video stream address
US10162944B2 (en) Library style media DRM APIs in a hosted architecture
CN105491073B (en) Data downloading method, device and system
US20220141208A1 (en) Passing authentication information via parameters
CN105100913B (en) Video access method and system, set top box, proxy server and media server
KR20130072790A (en) User authentication system and method thereof
CN111683370B (en) Access authentication method, device and system of wireless network equipment
CN110351304B (en) One-key switching login implementation method and device among different systems
WO2015032281A1 (en) Method and system for generating and processing challenge-response tests
CN106156598A (en) A kind of Quick Response Code privacy logs in protection system and method
CN104579657A (en) Method and device for identity authentication
CN105337940A (en) Page verification method, client, server and system
CN114157434A (en) Login verification method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20221104

Assignee: GUIYANG LONGMASTER INFORMATION & TECHNOLOGY Co.,Ltd.

Assignor: Guiyang Longma Video Technology Co.,Ltd.

Contract record no.: X2024980003586

Denomination of invention: A multi application authentication method and device based on EPG system

Granted publication date: 20230825

License type: Common License

Record date: 20240329