Method and system for hierarchical authentication of applications

A partner and business technology, which is applied in the field of triple play and can solve the problems of inability to realize partner management, inability to implement billing on behalf of others, and cracking.

Active Publication Date: 2015-06-10
CHINA TELECOM CORP LTD
View PDF3 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If authentication is not carried out, the billing function cannot be realized on the one hand, and the management of partners cannot be realized on the other hand
[0004] In the past business authentication, key information such as business account numbers and passwords are directly transmitted in the interface for business authentication, and there is a risk of being cracked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for hierarchical authentication of applications
  • Method and system for hierarchical authentication of applications
  • Method and system for hierarchical authentication of applications

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] Various exemplary embodiments of the present invention will now be described in detail with reference to the accompanying drawings. It should be noted that the relative arrangements and numerical values ​​of components and steps set forth in these embodiments do not limit the scope of the present invention unless specifically stated otherwise.

[0031] At the same time, it should be understood that, for the convenience of description, the sizes of the various parts shown in the drawings are not drawn according to the actual proportional relationship.

[0032] The following description of at least one exemplary embodiment is merely illustrative in nature and in no way taken as limiting the invention, its application or uses.

[0033] Techniques, methods and devices known to those of ordinary skill in the relevant art may not be discussed in detail, but where appropriate, such techniques, methods and devices should be considered part of the Authorized Specification.

[0...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a system for hierarchical authentication of applications. The method comprises the following steps: a management platform receives a request of a terminal, carries out hierarchical authentication according to the request, and returning a service identity token; a partner service platform receives a service using request of the terminal, wherein the service using request carries the service identity token of the terminal; the partner service platform initiates authentication of the service identity token to the management platform; and the partner service platform responds to the service using request of the terminal when the service identity token passes authentication. Safety authentication of a newly introduced partner service is realized under the condition that the existing service using process of an operator is unchanged.

Description

technical field [0001] The invention relates to the field of triple network integration, in particular to a method and system for applying hierarchical authentication. Background technique [0002] Linux set-top boxes using closed operating systems and proprietary solutions are increasingly unable to meet people's increasingly diverse entertainment needs. In the environment of terminal intelligence, system openness, and application software, new business models, business models, and cooperation models have put forward higher requirements for operators in terms of terminal management and security. [0003] When introducing a non-trusted partner application to an operator's IPTV set-top box, for example, providing a channel for billing on behalf of the partner application, the security of service use must be guaranteed. For the operator, only the application that cooperates with it will be responsible for the billing of the application, so the application of the partner must ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
Inventor 朱良杰沈昕施唯佳
Owner CHINA TELECOM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products