CN109803159A - A kind of verification method and system of terminal - Google Patents
A kind of verification method and system of terminal Download PDFInfo
- Publication number
- CN109803159A CN109803159A CN201811544271.8A CN201811544271A CN109803159A CN 109803159 A CN109803159 A CN 109803159A CN 201811544271 A CN201811544271 A CN 201811544271A CN 109803159 A CN109803159 A CN 109803159A
- Authority
- CN
- China
- Prior art keywords
- verification
- terminal
- node server
- information
- verifying
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000012795 verification Methods 0.000 title claims abstract description 261
- 238000000034 method Methods 0.000 title claims abstract description 57
- 230000006855 networking Effects 0.000 claims abstract description 95
- 238000010200 validation analysis Methods 0.000 claims description 9
- 230000008569 process Effects 0.000 abstract description 16
- 238000004891 communication Methods 0.000 description 27
- 238000005516 engineering process Methods 0.000 description 19
- 238000010586 diagram Methods 0.000 description 12
- 230000005540 biological transmission Effects 0.000 description 8
- 230000006870 function Effects 0.000 description 7
- 238000012545 processing Methods 0.000 description 7
- 238000004422 calculation algorithm Methods 0.000 description 6
- 238000004590 computer program Methods 0.000 description 6
- 238000001514 detection method Methods 0.000 description 6
- 238000009826 distribution Methods 0.000 description 5
- RTZKZFJDLAIYFH-UHFFFAOYSA-N Diethyl ether Chemical compound CCOCC RTZKZFJDLAIYFH-UHFFFAOYSA-N 0.000 description 4
- 238000003860 storage Methods 0.000 description 4
- 238000012360 testing method Methods 0.000 description 4
- 241001269238 Data Species 0.000 description 3
- 230000009471 action Effects 0.000 description 3
- 238000013478 data encryption standard Methods 0.000 description 3
- 230000008859 change Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012544 monitoring process Methods 0.000 description 2
- 238000011144 upstream manufacturing Methods 0.000 description 2
- 241000700605 Viruses Species 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- 230000002155 anti-virotic effect Effects 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 230000006835 compression Effects 0.000 description 1
- 238000007906 compression Methods 0.000 description 1
- 125000004122 cyclic group Chemical group 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 239000000284 extract Substances 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
- 239000011159 matrix material Substances 0.000 description 1
- 239000000203 mixture Substances 0.000 description 1
- 238000003032 molecular docking Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000000750 progressive effect Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 230000011664 signaling Effects 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Landscapes
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The embodiment of the invention provides a kind of verification method of terminal and systems, wherein, the described method includes: receiving the verify data for carrying out self terminal depending on networked node server, verify data includes the first verification information and the second verification information, first verification information includes subscriber identity information, and the second verification information includes the hardware information of the terminal by encryption;Verification operation is carried out to the first verification information depending on networked node server;Depending on networked node server in the case where the first verification information passes through verification operation, verification operation is carried out to the second verification information;Depending on networked node server in the case where the second verification information passes through verification operation, the network connection between terminal is established.The embodiment of the present invention increases the verification process to the second verification information, that is, increases the verification process of the hardware information to terminal itself when verifying to terminal, strengthens the management of view networking access terminal, improves the safety of view networking.
Description
Technical field
The present invention relates to view networking technology field, verification method and a kind of verifying of terminal more particularly to a kind of terminal
System.
Background technique
It is a kind of dedicated network for being used for high-speed transfer HD video and specialized protocol based on ethernet hardware depending on networking,
It is the more advanced form of internet depending on networking, is a real-time network.
As the application scenarios of view networking are more and more, the type and quantity of the terminal of access view networking are also more and more,
Depending on the safety problem Challenge networked.Therefore, it needs to carry out safety verification to the terminal of access depending on networking, to ensure view connection
The safety of net.
The existing proof scheme that view networking is accessed to terminal, usually verifies the user account of terminal, if with
Family account is verified, and indicates that terminal authentication passes through, then terminal can access view networking, with other terminals in view networking, clothes
Business device is communicated.But same user account can log in over multiple terminals, be easy to appear multiple terminals and utilize same use
Family account is linked into the case where view networking, can be more and more depending on the terminal quantity in networking, is not only not easy to carry out pipe to terminal
Reason also reduces the safety of view networking.
Summary of the invention
In view of the above problems, it proposes the embodiment of the present invention and overcomes the above problem or at least partly in order to provide one kind
A kind of verification method of the terminal to solve the above problems and a kind of corresponding verifying system of terminal.
To solve the above-mentioned problems, the embodiment of the invention discloses a kind of verification method of terminal, the method is applied to
Depending in networking, the view networking includes view networked node server, described to be communicated depending on networked node server with terminal, institute
State terminal be located in the view networking or in the internet that is communicated of the view networking, which comprises the view joins
Net node server receives the verify data from the terminal, and the verify data includes the first verification information and the second verifying
Information, first verification information includes subscriber identity information, and second verification information includes the terminal by encryption
Hardware information;The view networked node server carries out verification operation to first verification information;The view networked node
Server carries out verification operation in the case where first verification information passes through verification operation, to second verification information;
The view networked node server is established between the terminal in the case where second verification information passes through verification operation
Network connection.
Optionally, the method also includes: described do not pass through depending on networked node server in second verification information is tested
In the case where card operation, first is sent to equipment corresponding with first verification information and temporarily verifies mark.
Optionally, the method also includes: it is interim that the view networked node server receives second from the terminal
Verifying mark;The view networked node server carries out verification operation to the described second interim verifying mark;The view networking section
In the case where the described second interim verifying mark is by verification operation, the network established between the terminal connects point server
It connects.
Optionally, the view networked node server carries out verification operation to the described second interim verifying mark, comprising: institute
It states and the described first interim verifying mark is compared with the described second interim verifying mark depending on networked node server;If described
First interim verifying mark is identical as the described second interim verifying mark, then described to determine described second depending on networked node server
Interim verifying mark passes through verification operation;If the described first interim verifying mark and the described second interim verifying mark be not identical,
It is then described to determine that the described second interim verifying identifies unverified operation depending on networked node server.
Optionally, the method also includes: it is described to pass through depending on networked node server in the described second interim verifying mark
In the case where verification operation, second verification information is saved into preset validation database, is deposited in the validation database
Contain the data for carrying out verification operation to first verification information and/or second verification information.
The embodiment of the invention also discloses a kind of verifying system of terminal, the system is applied in view networking, the view
Networking includes view networked node server, and described to be communicated depending on networked node server with terminal, the terminal is located at described
Depending in networking or with the internet that is communicated of the view networking, described depending on networked node server includes: receiving module, use
In receiving the verify data from the terminal, the verify data includes the first verification information and the second verification information, described
First verification information includes subscriber identity information, and second verification information includes the hardware letter of the terminal by encryption
Breath;Authentication module, for carrying out verification operation to first verification information;The authentication module is also used to described first
In the case that verification information passes through verification operation, verification operation is carried out to second verification information;Link block, in institute
The second verification information is stated by establishing the network connection between the terminal in the case where verification operation.
Optionally, the view networked node server further include: sending module, for not leading in second verification information
In the case where crossing verification operation, the first temporarily verifying is sent to equipment corresponding with first verification information and is identified.
Optionally, the receiving module is also used to receive the second interim verifying mark from the terminal;The verifying
Module is also used to carry out verification operation to the described second interim verifying mark;The link block is also used to face described second
When verifying mark by establishing the network connection between the terminal in the case where verification operation.
Optionally, the authentication module, for identifying the described first interim verifying mark with the described second interim verifying
It is compared, if the described first interim verifying mark is identical as the described second interim verifying mark, it is determined that described second is interim
Verifying mark passes through verification operation;If the described first interim verifying mark and the described second interim verifying mark be not identical, really
Fixed described second interim verifying identifies unverified operation.
Optionally, the view networked node server further include: preserving module, in the described second interim verifying mark
In the case where verification operation, second verification information is saved into preset validation database, the validation database
In be stored with data for carrying out verification operation to first verification information and/or second verification information.
The embodiment of the present invention includes following advantages:
The embodiment of the present invention is applied in view networking, may include view networked node server depending on networking, depending on networked node
Server can be communicated with terminal, which can be located in view networking, can also be located at the interconnection with view connected network communication
In net.
In the embodiment of the present invention, verify data is can be generated in terminal to be verified, and sends verify data to view networking section
Point server.After receiving verify data depending on networked node server, verification operation is carried out to verify data.It specifically can be first right
The first verification information in verify data carries out verification operation and continues if the first verification information is verified to verify data
In the second verification information carry out verification operation, when the second verification information is verified, indicate that terminal authentication to be verified is logical
It crosses, then can establish the network connection between terminal to be verified depending on networked node server.
The characteristic of application view networking of the embodiment of the present invention, depending on networked node server successively to the first verification information of terminal
Verified with the second verification information, in the case where the first verification information and the second verification information pass through verifying, establish with
Network connection between terminal.The embodiment of the present invention increases the verifying to the second verification information when verifying to terminal
Process increases the verification process of the hardware information to terminal itself, strengthen the management of view networking access terminal, improve
Depending on the safety networked.
Detailed description of the invention
Fig. 1 is a kind of networking schematic diagram of view networking of the invention;
Fig. 2 is a kind of hardware structural diagram of node server of the invention;
Fig. 3 is a kind of hardware structural diagram of access switch of the invention;
Fig. 4 is the hardware structural diagram that a kind of Ethernet association of the invention turns gateway;
Fig. 5 is a kind of step flow chart of the verification method embodiment of terminal of the invention;
Fig. 6 is a kind of operation chart of authentication method based on view networked terminals of the invention;
Fig. 7 is a kind of structural block diagram of the verifying system embodiment Union of Central Vision net node server of terminal of the invention.
Specific embodiment
In order to make the foregoing objectives, features and advantages of the present invention clearer and more comprehensible, with reference to the accompanying drawing and specific real
Applying mode, the present invention is described in further detail.
It is the important milestone of network Development depending on networking, is a real-time network, can be realized HD video real-time Transmission,
Push numerous Internet applications to HD video, high definition is face-to-face.
Real-time high-definition video switching technology is used depending on networking, it can be such as high in a network platform by required service
Clear video conference, Intellectualized monitoring analysis, emergency command, digital broadcast television, delay TV, the Web-based instruction, shows video monitoring
Field live streaming, VOD program request, TV Mail, individual character records (PVR), Intranet (manages) channel by oneself, intelligent video Broadcast Control, information publication
All be incorporated into a system platform etc. services such as tens of kinds of videos, voice, picture, text, communication, data, by TV or
Computer realizes that high-definition quality video plays.
Embodiment in order to enable those skilled in the art to better understand the present invention is introduced to depending on networking below:
Depending on networking, applied portion of techniques is as described below:
Network technology (Network Technology)
Traditional ethernet (Ethernet) is improved depending on the network technology innovation networked, with potential huge on network
Video flow.(Circuit is exchanged different from simple network packet exchange (Packet Switching) or lattice network
Switching), meet Streaming using network packet exchange depending on networking technology (to be translated into stream, stream, streaming, be one
Kind data transferring technique, becomes the data received the stream of one steady and continuous, continuously sends out, the sound for hearing user
Sound or the image seen are very steady, and user can start to carry out on the screen before entire data transmission is complete it is clear
Look at) demand.Have flexible, the simple and low price of packet switch depending on networking technology, is provided simultaneously with the quality and safety of circuit switching
Guarantee, realizes the seamless connection of the whole network switched virtual circuit and data format.
Switching technology (Switching Technology)
Two advantages of asynchronous and packet switch that Ethernet is used depending on networking eliminate Ethernet under the premise of complete compatible and lack
It falls into, has the end-to-end seamless connection of the whole network, direct user terminal, directly carrying IP data packet.User data is in network-wide basis
It is not required to any format conversion.It is the more advanced form of Ethernet depending on networking, is a real-time exchange platform, can be realized at present mutually
The whole network large-scale high-definition realtime video transmission that networking cannot achieve pushes numerous network video applications to high Qinghua, unitizes.
Server technology (Server Technology)
It is different from traditional server, its Streaming Media depending on the server technology in networking and unified video platform
Transmission be built upon it is connection-oriented on the basis of, data-handling capacity is unrelated with flow, communication time, single network layer energy
Enough transmitted comprising signaling and data.For voice and video business, handled depending on networking and unified video platform Streaming Media
Complexity many simpler than data processing, efficiency substantially increase hundred times or more than traditional server.
Reservoir technology (Storage Technology)
The ultrahigh speed reservoir technology of unified video platform in order to adapt to the media content of vast capacity and super-flow and
Using state-of-the-art real time operating system, the programme information in server instruction is mapped to specific hard drive space, media
Content is no longer pass through server, and moment is directly delivered to user terminal, and user waits typical time less than 0.2 second.It optimizes
Sector distribution greatly reduces the mechanical movement of hard disc magnetic head tracking, and resource consumption only accounts for the 20% of the internet ad eundem IP, but
The concurrent flow greater than 3 times of traditional disk array is generated, overall efficiency promotes 10 times or more.
Network security technology (Network Security Technology)
Depending on the structural design networked by servicing independent licence system, equipment and the modes such as user data is completely isolated every time
The network security problem that puzzlement internet has thoroughly been eradicated from structure, does not need antivirus applet, firewall generally, has prevented black
The attack of visitor and virus, structural carefree secure network is provided for user.
It services innovative technology (Service Innovation Technology)
Business and transmission are fused together by unified video platform, whether single user, private user or a net
The sum total of network is all only primary automatic connection.User terminal, set-top box or PC are attached directly to unified video platform, obtain rich
The multimedia video service of rich colorful various forms.Unified video platform is traditional to substitute with table schema using " menu type "
Complicated applications programming, considerably less code, which can be used, can be realized complicated application, realize the new business innovation of " endless ".
Networking depending on networking is as described below:
It is a kind of central controlled network structure depending on networking, which can be Tree Network, Star network, ring network etc. class
Type, but centralized control node is needed to control whole network in network on this basis.
As shown in Figure 1, being divided into access net and Metropolitan Area Network (MAN) two parts depending on networking.
The equipment of access mesh portions can be mainly divided into 3 classes: node server, access switch, terminal (including various machines
Top box, encoding board, memory etc.).Node server is connected with access switch, and access switch can be with multiple terminal phases
Even, and it can connect Ethernet.
Wherein, node server is the node that centralized control functions are played in access net, can control access switch and terminal.
Node server can directly be connected with access switch, can also directly be connected with terminal.
Similar, the equipment of metropolitan area mesh portions can also be divided into 3 classes: metropolitan area server, node switch, node serve
Device.Metropolitan area server is connected with node switch, and node switch can be connected with multiple node servers.
Wherein, node server is the node server for accessing mesh portions, i.e. node server had both belonged to access wet end
Point, and belong to metropolitan area mesh portions.
Metropolitan area server is the node that centralized control functions are played in Metropolitan Area Network (MAN), can control node switch and node serve
Device.Metropolitan area server can be directly connected to node switch, can also be directly connected to node server.
It can be seen that be entirely a kind of central controlled network structure of layering depending on networking network, and node server and metropolitan area
The network controlled under server can be the various structures such as tree-shaped, star-like, cyclic annular.
Visually claim, access mesh portions can form unified video platform (part in circle), and multiple unified video platforms can
To form view networking;Each unified video platform can be interconnected by metropolitan area and wide area depending on networking.
Classify depending on networked devices
1.1 embodiment of the present invention can be mainly divided into 3 classes: server depending on the equipment in networking, interchanger (including ether
Net gateway), terminal (including various set-top boxes, encoding board, memory etc.).Depending on networking can be divided on the whole Metropolitan Area Network (MAN) (or
National net, World Wide Web etc.) and access net.
1.2 equipment for wherein accessing mesh portions can be mainly divided into 3 classes: node server, access switch (including ether
Net gateway), terminal (including various set-top boxes, encoding board, memory etc.).
The specific hardware structure of each access network equipment are as follows:
Node server:
As shown in Fig. 2, mainly including Network Interface Module 201, switching engine module 202, CPU module 203, disk array
Module 204.
Wherein, Network Interface Module 201, the Bao Jun that CPU module 203, disk array module 204 are come in enter switching engine
Module 202;Switching engine module 202 look into the operation of address table 205 to the packet come in, to obtain the navigation information of packet;
And the packet is stored according to the navigation information of packet the queue of corresponding pack buffer 206;If the queue of pack buffer 206 is close
It is full, then it abandons;All pack buffer queues of 202 poll of switching engine mould, are forwarded: 1) port if meeting the following conditions
It is less than to send caching;2) the queue package counting facility is greater than zero.Disk array module 204 mainly realizes the control to hard disk, including
The operation such as initialization, read-write to hard disk;CPU module 203 is mainly responsible between access switch, terminal (not shown)
Protocol processes, to address table 205 (including descending protocol packet address table, uplink protocol package address table, data packet addressed table)
Configuration, and, the configuration to disk array module 204.
Access switch:
As shown in figure 3, mainly including Network Interface Module (downstream network interface module 301, uplink network interface module
302), switching engine module 303 and CPU module 304.
Wherein, the packet (upstream data) that downstream network interface module 301 is come in enters packet detection module 305;Packet detection mould
Whether destination address (DA), source address (SA), type of data packet and the packet length of the detection packet of block 305 meet the requirements, if met,
It then distributes corresponding flow identifier (stream-id), and enters switching engine module 303, otherwise abandon;Uplink network interface mould
The packet (downlink data) that block 302 is come in enters switching engine module 303;The data packet that CPU module 204 is come in enters switching engine
Module 303;Switching engine module 303 look into the operation of address table 306 to the packet come in, to obtain the navigation information of packet;
If the packet into switching engine module 303 is that downstream network interface is gone toward uplink network interface, in conjunction with flow identifier
(stream-id) packet is stored in the queue of corresponding pack buffer 307;If the queue of the pack buffer 307 is close full,
It abandons;If the packet into switching engine module 303 is not that downstream network interface is gone toward uplink network interface, according to packet
Navigation information is stored in the data packet queue of corresponding pack buffer 307;If the queue of the pack buffer 307 is close full,
Then abandon.
All pack buffer queues of 303 poll of switching engine module, are divided to two kinds of situations in embodiments of the present invention:
If the queue is that downstream network interface is gone toward uplink network interface, meets the following conditions and be forwarded: 1)
It is less than that the port sends caching;2) the queue package counting facility is greater than zero;3) token that rate control module generates is obtained.
If the queue is not that downstream network interface is gone toward uplink network interface, meets the following conditions and is forwarded:
1) it is less than to send caching for the port;2) the queue package counting facility is greater than zero.
Rate control module 208 is configured by CPU module 204, to all downlink networks in programmable interval
Interface generates token toward the pack buffer queue that uplink network interface is gone, to control the code rate of forwarded upstream.
CPU module 304 is mainly responsible for the protocol processes between node server, the configuration to address table 306, and,
Configuration to rate control module 308.
Ethernet association turns gateway:
As shown in figure 4, mainly including Network Interface Module (downstream network interface module 401, uplink network interface module
402), switching engine module 403, CPU module 404, packet detection module 405, rate control module 408, address table 406, Bao Huan
Storage 407 and MAC adding module 409, MAC removing module 410.
Wherein, the data packet that downstream network interface module 401 is come in enters packet detection module 405;Packet detection module 405 is examined
Ethernet mac DA, ethernet mac SA, Ethernet length or frame type, the view networking destination address of measured data packet
DA, whether meet the requirements depending on networking source address SA, depending on networking data Packet type and packet length, corresponding stream is distributed if meeting
Identifier (stream-id);Then, MAC DA, MAC SA, length or frame type are subtracted by MAC removing module 410
(2byte), and enter corresponding receive and cache, otherwise abandon;
Downstream network interface module 401 detects the transmission caching of the port, if there is Bao Ze is according to the view of packet networking purpose
Address D A knows the ethernet mac DA of corresponding terminal, adds the ethernet mac DA of terminal, Ethernet assists the MAC for turning gateway
SA, Ethernet length or frame type, and send.
The function that Ethernet association turns other modules in gateway is similar with access switch.
Terminal:
It mainly include Network Interface Module, Service Processing Module and CPU module;For example, set-top box mainly connects including network
Mouth mold block, video/audio encoding and decoding engine modules, CPU module;Encoding board mainly includes Network Interface Module, video encoding engine
Module, CPU module;Memory mainly includes Network Interface Module, CPU module and disk array module.
The equipment of 1.3 metropolitan area mesh portions can be mainly divided into 3 classes: node server, node switch, metropolitan area server.
Wherein, node switch mainly includes Network Interface Module, switching engine module and CPU module;Metropolitan area server mainly includes
Network Interface Module, switching engine module and CPU module are constituted.
2, networking data package definition is regarded
2.1 access network data package definitions
Access net data packet mainly include following sections: destination address (DA), source address (SA), reserve bytes,
payload(PDU)、CRC。
As shown in the table, the data packet for accessing net mainly includes following sections:
| DA | SA | Reserved | Payload | CRC |
Destination address (DA) is made of 8 bytes (byte), and first character section indicates type (such as the various associations of data packet
Discuss packet, multicast packet, unicast packet etc.), be up to 256 kinds of possibility, the second byte to the 6th byte is metropolitan area net address,
Seven, the 8th bytes are access net address.
Source address (SA) is also to be made of 8 bytes (byte), is defined identical as destination address (DA).
Reserve bytes are made of 2 bytes.
The part payload has different length according to the type of different datagrams, if the type of datagram is various
Protocol package, then the length of the part payload is 64 bytes, if the type of datagram is single group unicast packets, payload
Partial length is 32+1024=1056 byte, is not restricted to above 2 kinds certainly.
CRC is made of 4 bytes, and calculation method follows the Ethernet CRC algorithm of standard.
2.2 Metropolitan Area Network (MAN) packet definitions
The topology of Metropolitan Area Network (MAN) is pattern, may there is 2 kinds, connection even of more than two kinds, i.e. node switching between two equipment
It can all can exceed that 2 kinds between machine and node server, node switch and node switch, node switch and node server
Connection.But the metropolitan area net address of metropolitan area network equipment is uniquely, to close to accurately describe the connection between metropolitan area network equipment
System, introduces parameter in embodiments of the present invention: label, uniquely to describe a metropolitan area network equipment.
In this specification label definition and multiprotocol label switching (Multi-Protocol Label Switch,
MPLS the definition of label) is similar, it is assumed that there are two connections between equipment A and equipment B, then data packet is from equipment A to equipment B
Just there are 2 labels, data packet also there are 2 labels from equipment B to equipment A.Label is divided into label, outgoing label, it is assumed that data packet into
The label (entering label) for entering equipment A is 0x0000, and the label (outgoing label) when this data packet leaves equipment A may reform into
0x0001.The networking process of Metropolitan Area Network (MAN) is to enter network process under centralized control, also means that address distribution, the label of Metropolitan Area Network (MAN)
Distribution be all to be dominated by metropolitan area server, node switch, node server be all passively execute, this point with
The label distribution of MPLS is different, and the distribution of the label of MPLS is the result that interchanger, server are negotiated mutually.
As shown in the table, the data packet of Metropolitan Area Network (MAN) mainly includes following sections:
| DA | SA | Reserved | Label | Payload | CRC |
That is destination address (DA), source address (SA), reserve bytes (Reserved), label, payload (PDU), CRC.Its
In, the format of label, which can refer to, such as gives a definition: label is 32bit, wherein high 16bit retains, only with low 16bit, its position
Set is between the reserve bytes and payload of data packet.
Based on the above-mentioned characteristic of view networking, one of the core concepts of the embodiments of the present invention is proposed, it then follows regard the association of networking
View successively carries out verification operation to the first verification information of terminal and the second verification information depending on networked node server, first
Verification information and the second verification information establish the network connection between terminal in the case where passing through verifying.
Referring to Fig. 5, a kind of step flow chart of the verification method embodiment of terminal of the invention is shown, this method can be with
Applied in view networking, it may include view networked node server depending on networking, communicated depending on networked node server with terminal,
The terminal can be located at depending in networking or in the internet communicated with depending on networking, this method can specifically include as follows
Step:
Step 501, the verify data from the terminal is received depending on networked node server.
In the embodiment of the present invention, it is used to verify the terminal to be accessed depending on networking depending on networked node server, specifically
Ground can receive the verify data for carrying out self terminal depending on networked node server, and be received using the docking of pre-stored verification data
The verify data arrived carries out verification operation.Wherein, verification data can be stored in advance in view networked node server local, can also
To be stored in advance in the database regarded in networking, the embodiment of the present invention does not limit the storage location etc. of verification data specifically
System.
The verify data of terminal at least may include the first verification information and the second verification information, wherein the first verifying letter
Breath can be the subscriber identity information of typing at the terminal, as username and password, finger print information, face information, voiceprint,
Iris information etc., the embodiment of the present invention are not specifically limited the type of the first verification information and form etc..Second verification information
It can be the hardware information of the terminal by encryption, specific hardware information can be processor model, Processor Number Feature, interior
Model, memory sequence number, memory size, hard disk model, hard disk serial number, hard-disk capacity etc. are deposited, the embodiment of the present invention is to hard
The type etc. of part information is not specifically limited.The cipher mode of hardware information can use unsymmetrical tridiagonal matrix algorithm, as RSA,
Knapsack algorithm etc. can also use symmetry encryption algorithm, such as data encryption standards (Data Encryption
Standard, DES), Advanced Encryption Standard (Advanced Encryption Standard, AES), international data encryption algorithm
(International Data Encryption Algorithm, IDEA) etc..The embodiment of the present invention adds hardware information
Close mode etc. is not specifically limited.Terminal can carry out cryptographic operation to its hardware information in local and obtain the second verification information.
In one preferred embodiment of the invention, terminal can send out the first verification information and the second verification information simultaneously
It send to view networked node server, terminal can also first send the first verification information to view networked node server, send the afterwards
Two verification informations to view networked node server, the embodiment of the present invention sends the first verification information and the second verification information to terminal
Opportunity and sequence etc. be not specifically limited.
In practical applications, terminal can be smart phone, tablet computer, personal computer set-top box etc., wherein machine
The equipment that top box can be connection a television set and outside source, can change into television content for the digital signal of compression,
And it shows on a television set.In general, set-top box can connect camera and microphone, for acquire video data and
The multi-medium datas such as audio data, also can connect television set, for multi-medium datas such as playing video data and audio datas.
Step 502, verification operation is carried out to the first verification information in verify data depending on networked node server.
In the embodiment of the present invention, depending on networked node server when carrying out verification operation to the first verification information, it can incite somebody to action
First verification information is compared with verification data, if there are the first verification informations in verification data, then it represents that the first verifying letter
Breath passes through verification operation;The first verification information is not present in data if verifying, then it represents that the unverified behaviour of the first verification information
Make.For example, the first verification information is user name " user1 " and password " 123456 ", depending on networked node server in verification data
Middle search whether there is user name " user1 ", if user name " user1 " is not present in verification data, depending on networked node service
Device terminates the verification operation to the first verification information, and no longer search whether there is password " 123456 " in verification data;If school
It tests in data there are user name " user1 ", then regards networked node server and continue in verification data search with the presence or absence of password
" 123456 ", if there are password " 123456 " in verification data, then it represents that the first verification information exists in verification data, and first
Verification information passes through verification operation;If verifying in data and password " 123456 " being not present, then it represents that the first verification information does not pass through
Verification operation.
In the case where the first verification information passes through verification operation, step 503 is executed;Do not pass through in the first verification information and tests
It in the case where card operation, is returned depending on networked node server to terminal and verifies unsanctioned prompt information, process terminates.
Step 503, verification operation is carried out to the second verification information depending on networked node server.
In the embodiment of the present invention, depending on networked node server when carrying out verification operation to the second verification information, Ke Yizhi
It connects and is compared the second verification information with verification data, first will can also obtain the hardware of terminal after the decryption of the second verification information
Information, then hardware information is compared with verification data.Wherein, for directly carrying out the second verification information and verification data
The scheme compared needs to verify the feature that data meet the second verification information, i.e. verification data include multiple numbers by encryption
According to for example, verification data include multiple unique character strings.For first the hardware of terminal will be obtained after the decryption of the second verification information
Information, then the scheme that hardware information is compared with verification data, need to verify the feature that data meet hardware information, i.e. school
The hardware information that data include multiple hardware is tested, for example, verification data include the sequence number of multiple hardware.
When being directly compared the second verification information with verification data, if there are the second verifying letters in verification data
Breath, then it represents that the second verification information passes through verification operation;The second verification information is not present in data if verifying, then it represents that second tests
Demonstrate,prove the unverified operation of information.Formerly the hardware information of terminal will be obtained after the decryption of the second verification information, then by hardware information
When being compared with verification data, if there are whole hardware informations that decryption obtains in verification data, then it represents that the second verifying letter
Breath passes through verification operation;If there is no there is only portions in any hardware information that decryption obtains, or verification data in verification data
Decompose close obtained hardware information, then it represents that the unverified operation of the second verification information.
In the case where the second verification information passes through verification operation, step 504 is executed;Do not pass through in the second verification information and tests
In the case where card operation, is returned depending on networked node server to terminal and verify unsanctioned prompt information, and execute step 505.
Step 504, the network connection between terminal is established depending on networked node server.
In the embodiment of the present invention, it can be built according to being issued to the downstream communications link that terminal configures depending on networked node server
The data packet of vertical network connection after terminal receives data packet, is established according to data packet and is connected to the network, and can return to terminal
It returns network connection and establishes the response message finished extremely view networked node server.
In practical applications, networking is regarded as the network with centralized control functions, including main control server and undernet
Equipment, which includes terminal, and one of the core idea depending on networking is, by notifying to exchange by main control server
Equipment is directed to when time downstream communications link of service matches table, and the table for being then based on the configuration carries out the transmission of data packet.
That is, including: depending on the communication means in networking
Main control server configuration is when time downstream communications link of service;
Work as time data packet of service for what source terminal was sent, is sent to target terminal (such as view connection according to downstream communications link
Network termination).
In embodiments of the present invention, it includes: notice when the downlink of secondary service is logical that time downstream communications link of service is worked as in configuration
Believe that switching equipment involved in link matches table.
It furthermore, include: the configured table of inquiry according to downstream communications link transmission, switching equipment is received to institute
Data packet is transmitted by corresponding port.
In the concrete realization, service includes unicast communication service and Multicast Communication Service.I.e. either cast communication is still
Unicast communication can realize the communication in view networking using the above-mentioned core idea with table-table.
As previously mentioned, view networking includes access mesh portions, in access net, which is node server, under
The grade network equipment includes access switch and terminal.
For the unicast communication service in access net, main control server configuration is when time downstream communications link of service
Step may comprise steps of:
Sub-step S11, the service request protocol package that main control server is initiated according to source terminal are obtained when time downlink of service
Communication link information, downstream communications link information include participating in when time downlink of the main control server of service and access switch
Communication port information.
Sub-step S12, main control server are arranged according to downstream communication ports information in data packet addressed table inside it
When the downlink port that the data packet of secondary service is oriented to;And the downstream communication ports information according to access switch, to corresponding
Access switch sending port configuration order.
Sub-step S13, access switch according in port configuration command data packet addressed table inside it, setting when time
The downlink port that the data packet of service is oriented to.
For the Multicast Communication Service (such as video conference) in access net, main control server is obtained when under time service
The step of row communication link information may include following sub-step:
Sub-step S21, main control server obtain the service request agreement for the application Multicast Communication Service that target terminal is initiated
It wraps, includes the access net address of service type information, service content information and target terminal in service request protocol package;Wherein,
It include service number in service content information.
Sub-step S22, main control server in preset content-address mapping table, extract source terminal according to service number
Access net address.
Sub-step S23, main control server obtains the corresponding multicast address of source terminal, and distributes to target terminal;And according to
According to the access net address of service type information, source terminal and target terminal, the communication link information when time multicast services is obtained.
Step 505, the first temporarily verifying is sent to terminal corresponding with the first verification information depending on networked node server to mark
Know.
In one preferred embodiment of the invention, equipment corresponding with the first verification information can be located in internet,
It can also be located in view networking.For example, the corresponding equipment can be the cell-phone number of the user name binding in the first verification information
The mobile phone etc. logged in.
It sends the first temporarily verifying to the corresponding equipment depending on networked node server to identify, i.e. view networked node server
The cell-phone number logged in the corresponding equipment sends the first temporarily verifying and identifies.Therefore, elder generation is needed depending on networked node server
It determines the cell-phone number that the corresponding equipment is logged in, i.e., needs first to determine the use in the first verification information depending on networked node server
The cell-phone number of name in an account book binding.In practical applications, which can send verifying number to view networked node server in terminal
According to when, carry in the first verification information, can also verification data in be stored in advance, the embodiment of the present invention to view networked node
Server obtains technological means used by the cell-phone number of user name binding etc. and is not specifically limited.
In one preferred embodiment of the invention, the first interim verifying mark can be by the groups such as number, letter, symbol
At, or a Duan Yuyin, a picture, a two dimensional code etc., the embodiment of the present invention is to the first interim verifying mark
Type and content etc. are not specifically limited.
Step 506, the second interim verifying mark for carrying out self terminal is received depending on networked node server, and is temporarily tested second
Card mark carries out verification operation.
It should be noted that the terminal and above-mentioned equipment corresponding with the first verification information can identical or not phases
Together.
In one preferred embodiment of the invention, which, which can read or identify from corresponding equipment, obtains second
Interim verifying mark, the second interim verifying mark can also be manually entered by user, which can be by
The composition such as number, letter, symbol a, or Duan Yuyin, a picture, a two dimensional code etc., the embodiment of the present invention pair
Type and content of second interim verifying mark etc. are not specifically limited.
When being verified depending on networked node server to the second interim verifying mark, can by the first interim verifying mark with
Second interim verifying mark is compared, if the first interim verifying mark is identical as the second interim verifying mark, saves depending on networking
Point server determines that the second interim verifying mark passes through verification operation;If the first interim verifying mark is identified with the second interim verifying
It is not identical, then determine that the second interim verifying identifies unverified operation depending on networked node server.In the second interim verifying mark
Know by executing step 504 in the case where verification operation.In the case where the second interim verifying identifies unverified operation,
It is returned depending on networked node server to terminal and verifies unsanctioned prompt information, process terminates.
In one preferred embodiment of the invention, in the case where the second interim verifying mark is by verification operation, depending on
Networked node server can save the second verification information into verification data, alternatively, will decrypt to the second verification information
To hardware information save to verification data in, when being verified so as to next time to the terminal, can directly according to first verifying
Information and the second verification information are verified, without retransmiting the first interim verifying mark.
Based on a kind of related description of the above-mentioned verification method embodiment about terminal, it is described below a kind of based on view networking
The authentication method of terminal, as shown in fig. 6, first sending account letter to depending on networked node server depending on networked terminals in this method
Breath, which includes username and password.Verification operation is carried out to account information depending on networked node server, if the account
The unverified operation of information then forbids access view networked terminals into view networking depending on networked node server;If the account is believed
Breath then regards networked node server and obtains the hardware sequence number of view networked terminals by verification operation, and judges hardware sequence number
Whether belong to the hardware sequence number of trust, if the hardware sequence number is not belonging to the hardware sequence number trusted, is taken depending on networked node
Business device forbids access view networked terminals into view networking;If the hardware sequence number belongs to the hardware sequence number of trust, depending on networking
Node server allows to access view networked terminals into view networking.
The embodiment of the present invention is applied in view networking, may include view networked node server depending on networking, depending on networked node
Server can be communicated with terminal, which can be located in view networking, can also be located at the interconnection with view connected network communication
In net.
In the embodiment of the present invention, verify data is can be generated in terminal to be verified, and sends verify data to view networking section
Point server.After receiving verify data depending on networked node server, verification operation is carried out to verify data.It specifically can be first right
The first verification information in verify data carries out verification operation and continues if the first verification information is verified to verify data
In the second verification information carry out verification operation, when the second verification information is verified, indicate that terminal authentication to be verified is logical
It crosses, then can establish the network connection between terminal to be verified depending on networked node server.
The characteristic of application view networking of the embodiment of the present invention, depending on networked node server successively to the first verification information of terminal
Verified with the second verification information, in the case where the first verification information and the second verification information pass through verifying, establish with
Network connection between terminal.The embodiment of the present invention increases the verifying to the second verification information when verifying to terminal
Process increases the verification process of the hardware information to terminal itself, strengthen the management of view networking access terminal, improve
Depending on the safety networked.
It should be noted that for simple description, therefore, it is stated as a series of action groups for embodiment of the method
It closes, but those skilled in the art should understand that, embodiment of that present invention are not limited by the describe sequence of actions, because according to
According to the embodiment of the present invention, some steps may be performed in other sequences or simultaneously.Secondly, those skilled in the art also should
Know, the embodiments described in the specification are all preferred embodiments, and the related movement not necessarily present invention is implemented
Necessary to example.
Referring to Fig. 7, a kind of knot of the verifying system embodiment Union of Central Vision net node server of terminal of the invention is shown
Structure block diagram, the system can be applied in view networking, may include view networked node server depending on networking, depending on networked node service
Device is communicated with terminal, which can be located at depending in networking or in the internet communicated with depending on networking, this is
It can specifically include following module depending on networked node server in system:
Receiving module 701, for receiving the verify data from the terminal, the verify data includes the first verifying letter
Breath and the second verification information, first verification information includes subscriber identity information, and second verification information includes by adding
The hardware information of the close terminal.
Authentication module 702, for carrying out verification operation to first verification information.
The authentication module 702 is also used in the case where first verification information is by verification operation, to described the
Two verification informations carry out verification operation.
Link block 703, for establishing and the terminal in the case where second verification information passes through verification operation
Between network connection.
In one preferred embodiment of the invention, the view networked node server further include: sending module 704 is used
In in the case where second verification information unverified operation, sent to equipment corresponding with first verification information
First interim verifying mark.
In one preferred embodiment of the invention, the receiving module 701 is also used to receive from the terminal
Two interim verifying marks;The authentication module 702 is also used to carry out verification operation to the described second interim verifying mark;It is described
Link block 703 is also used in the case where the described second interim verifying mark is by verification operation, establish with the terminal it
Between network connection.
In one preferred embodiment of the invention, the authentication module 702, for identifying the described first interim verifying
It is compared with the described second interim verifying mark, if the described first interim verifying mark and the described second interim verifying mark phase
Together, it is determined that the described second interim verifying mark passes through verification operation;If the described first interim verifying mark is faced with described second
When verifying mark it is not identical, it is determined that the described second interim verifying identifies unverified operation.
In one preferred embodiment of the invention, the view networked node server further include: preserving module 705 is used
In in the case where the described second interim verifying mark is by verification operation, second verification information is saved to preset verifying
In database, be stored in the validation database for first verification information and/or second verification information into
The data of row verification operation.
For system embodiments, since it is basically similar to the method embodiment, related so being described relatively simple
Place illustrates referring to the part of embodiment of the method.
All the embodiments in this specification are described in a progressive manner, the highlights of each of the examples are with
The difference of other embodiments, the same or similar parts between the embodiments can be referred to each other.
It should be understood by those skilled in the art that, the embodiment of the embodiment of the present invention can provide as method, apparatus or calculate
Machine program product.Therefore, the embodiment of the present invention can be used complete hardware embodiment, complete software embodiment or combine software and
The form of the embodiment of hardware aspect.Moreover, the embodiment of the present invention can be used one or more wherein include computer can
With in the computer-usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) of program code
The form of the computer program product of implementation.
The embodiment of the present invention be referring to according to the method for the embodiment of the present invention, terminal device (system) and computer program
The flowchart and/or the block diagram of product describes.It should be understood that flowchart and/or the block diagram can be realized by computer program instructions
In each flow and/or block and flowchart and/or the block diagram in process and/or box combination.It can provide these
Computer program instructions are set to general purpose computer, special purpose computer, Embedded Processor or other programmable data processing terminals
Standby processor is to generate a machine, so that being held by the processor of computer or other programmable data processing terminal devices
Capable instruction generates for realizing in one or more flows of the flowchart and/or one or more blocks of the block diagram
The device of specified function.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing terminal devices
In computer-readable memory operate in a specific manner, so that instruction stored in the computer readable memory generates packet
The manufacture of command device is included, which realizes in one side of one or more flows of the flowchart and/or block diagram
The function of being specified in frame or multiple boxes.
These computer program instructions can also be loaded into computer or other programmable data processing terminal devices, so that
Series of operation steps are executed on computer or other programmable terminal equipments to generate computer implemented processing, thus
The instruction executed on computer or other programmable terminal equipments is provided for realizing in one or more flows of the flowchart
And/or in one or more blocks of the block diagram specify function the step of.
Although the preferred embodiment of the embodiment of the present invention has been described, once a person skilled in the art knows bases
This creative concept, then additional changes and modifications can be made to these embodiments.So the following claims are intended to be interpreted as
Including preferred embodiment and fall into all change and modification of range of embodiment of the invention.
Finally, it is to be noted that, herein, relational terms such as first and second and the like be used merely to by
One entity or operation are distinguished with another entity or operation, without necessarily requiring or implying these entities or operation
Between there are any actual relationship or orders.Moreover, the terms "include", "comprise" or its any other variant meaning
Covering non-exclusive inclusion, so that process, method, article or terminal device including a series of elements not only wrap
Those elements are included, but also including other elements that are not explicitly listed, or further includes for this process, method, article
Or the element that terminal device is intrinsic.In the absence of more restrictions, being wanted by what sentence "including a ..." limited
Element, it is not excluded that there is also other identical elements in process, method, article or the terminal device for including the element.
The verifying system of verification method to a kind of terminal provided by the present invention and a kind of terminal above has carried out in detail
It introduces, used herein a specific example illustrates the principle and implementation of the invention, the explanation of above embodiments
It is merely used to help understand method and its core concept of the invention;At the same time, for those skilled in the art, according to this
The thought of invention, there will be changes in the specific implementation manner and application range, in conclusion the content of the present specification is not answered
It is interpreted as limitation of the present invention.
Claims (10)
1. a kind of verification method of terminal, which is characterized in that the method is applied in view networking, and the view networking includes view connection
Net node server, it is described to be communicated depending on networked node server with terminal, the terminal be located at the view networking in or with
In the internet communicated depending on networking, which comprises
The view networked node server receives the verify data from the terminal, and the verify data includes the first verifying letter
Breath and the second verification information, first verification information includes subscriber identity information, and second verification information includes by adding
The hardware information of the close terminal;
The view networked node server carries out verification operation to first verification information;
The view networked node server is in the case where first verification information passes through verification operation, to second verifying
Information carries out verification operation;
The view networked node server is established and the terminal in the case where second verification information passes through verification operation
Between network connection.
2. the verification method of terminal according to claim 1, which is characterized in that the method also includes:
The view networked node server is in the case where second verification information unverified operation, to described first
The corresponding equipment of verification information sends the first temporarily verifying and identifies.
3. the verification method of terminal according to claim 2, which is characterized in that the method also includes:
The view networked node server receives the second interim verifying mark from the terminal;
The view networked node server carries out verification operation to the described second interim verifying mark;
The view networked node server in the case where the described second interim verifying mark is by verification operation, establish with it is described
Network connection between terminal.
4. the verification method of terminal according to claim 3, which is characterized in that the view networked node server is to described
Second interim verifying mark carries out verification operation, comprising:
It is described that the described first interim verifying mark is compared with the described second interim verifying mark depending on networked node server;
If the described first interim verifying mark is identical as the described second interim verifying mark, the view networked node server is true
Fixed described second interim verifying mark passes through verification operation;
If the described first interim verifying mark identifies not identical, the view networked node server with the described second interim verifying
Determine that the described second interim verifying identifies unverified operation.
5. the verification method of terminal according to claim 3 or 4, which is characterized in that the method also includes:
The view networked node server saves described the in the case where the described second interim verifying mark is by verification operation
Two verification informations are stored in the validation database into preset validation database for first verification information
And/or second verification information carries out the data of verification operation.
6. a kind of verifying system of terminal, which is characterized in that the system is applied in view networking, and the view networking includes view connection
Net node server, it is described to be communicated depending on networked node server with terminal, the terminal be located at the view networking in or with
It is described to include: depending on networked node server in the internet communicated depending on networking
Receiving module, for receiving the verify data from the terminal, the verify data includes the first verification information and the
Two verification informations, first verification information includes subscriber identity information, and second verification information includes the institute by encryption
State the hardware information of terminal;
Authentication module, for carrying out verification operation to first verification information;
The authentication module is also used in the case where first verification information is by verification operation, to second verifying
Information carries out verification operation;
Link block, for establishing between the terminal in the case where second verification information passes through verification operation
Network connection.
7. the verifying system of terminal according to claim 6, which is characterized in that described also to be wrapped depending on networked node server
It includes:
Sending module, for being believed in the case where second verification information unverified operation to first verifying
It ceases corresponding equipment and sends the first interim verifying mark.
8. the verifying system of terminal according to claim 7, which is characterized in that the receiving module is also used to receive and
Mark is temporarily verified from the second of the terminal;
The authentication module is also used to carry out verification operation to the described second interim verifying mark;
The link block is also used in the case where the described second interim verifying mark is by verification operation, establish with it is described
Network connection between terminal.
9. the verifying system of terminal according to claim 8, which is characterized in that the authentication module, for by described the
One interim verifying mark is compared with the described second interim verifying mark, if the described first interim verifying mark and described second
Interim verifying mark is identical, it is determined that the described second interim verifying mark passes through verification operation;If the described first interim verifying mark
Know not identical as the described second interim verifying mark, it is determined that the described second interim verifying identifies unverified operation.
10. the verifying system of terminal according to claim 8 or claim 9, which is characterized in that the view networked node server is also
Include:
Preserving module, for saving second verifying in the case where the described second interim verifying mark is by verification operation
Information is stored in the validation database into preset validation database for first verification information and/or institute
State the data that the second verification information carries out verification operation.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201811544271.8A CN109803159A (en) | 2018-12-17 | 2018-12-17 | A kind of verification method and system of terminal |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201811544271.8A CN109803159A (en) | 2018-12-17 | 2018-12-17 | A kind of verification method and system of terminal |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN109803159A true CN109803159A (en) | 2019-05-24 |
Family
ID=66556919
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201811544271.8A Pending CN109803159A (en) | 2018-12-17 | 2018-12-17 | A kind of verification method and system of terminal |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN109803159A (en) |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN112087427A (en) * | 2020-08-03 | 2020-12-15 | 飞诺门阵(北京)科技有限公司 | Communication verification method, electronic device, and storage medium |
| CN115802080A (en) * | 2022-11-23 | 2023-03-14 | 四川长虹网络科技有限责任公司 | A set-top box control method, device, computer equipment and storage medium |
Citations (9)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN104394531A (en) * | 2014-10-08 | 2015-03-04 | 无锡指网生物识别科技有限公司 | Wireless network connecting method of a terminal device |
| CN105306202A (en) * | 2014-06-24 | 2016-02-03 | 腾讯科技(深圳)有限公司 | Identity verification method and device, server |
| CN105530224A (en) * | 2014-09-30 | 2016-04-27 | 中国电信股份有限公司 | Method and device for terminal authentication |
| CN107248995A (en) * | 2017-06-28 | 2017-10-13 | 北京五八信息技术有限公司 | Account verification method and device |
| CN107294900A (en) * | 2016-03-30 | 2017-10-24 | 阿里巴巴集团控股有限公司 | Biometric-based identity registration method and device |
| CN107888592A (en) * | 2017-11-13 | 2018-04-06 | 杭州迪普科技股份有限公司 | A kind of VPN login authentication methods and device |
| US20180124044A1 (en) * | 2014-04-15 | 2018-05-03 | Level 3 Communications, Llc | Device registration, authentication, and authorization system and method |
| CN108023910A (en) * | 2016-11-01 | 2018-05-11 | 北京视联动力国际信息技术有限公司 | A kind of terminal monitoring method and system based on regarding networking |
| CN108965227A (en) * | 2017-12-27 | 2018-12-07 | 北京视联动力国际信息技术有限公司 | A kind of data processing method and view networking Conference server |
-
2018
- 2018-12-17 CN CN201811544271.8A patent/CN109803159A/en active Pending
Patent Citations (9)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20180124044A1 (en) * | 2014-04-15 | 2018-05-03 | Level 3 Communications, Llc | Device registration, authentication, and authorization system and method |
| CN105306202A (en) * | 2014-06-24 | 2016-02-03 | 腾讯科技(深圳)有限公司 | Identity verification method and device, server |
| CN105530224A (en) * | 2014-09-30 | 2016-04-27 | 中国电信股份有限公司 | Method and device for terminal authentication |
| CN104394531A (en) * | 2014-10-08 | 2015-03-04 | 无锡指网生物识别科技有限公司 | Wireless network connecting method of a terminal device |
| CN107294900A (en) * | 2016-03-30 | 2017-10-24 | 阿里巴巴集团控股有限公司 | Biometric-based identity registration method and device |
| CN108023910A (en) * | 2016-11-01 | 2018-05-11 | 北京视联动力国际信息技术有限公司 | A kind of terminal monitoring method and system based on regarding networking |
| CN107248995A (en) * | 2017-06-28 | 2017-10-13 | 北京五八信息技术有限公司 | Account verification method and device |
| CN107888592A (en) * | 2017-11-13 | 2018-04-06 | 杭州迪普科技股份有限公司 | A kind of VPN login authentication methods and device |
| CN108965227A (en) * | 2017-12-27 | 2018-12-07 | 北京视联动力国际信息技术有限公司 | A kind of data processing method and view networking Conference server |
Cited By (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN112087427A (en) * | 2020-08-03 | 2020-12-15 | 飞诺门阵(北京)科技有限公司 | Communication verification method, electronic device, and storage medium |
| CN112087427B (en) * | 2020-08-03 | 2022-09-30 | 飞诺门阵(北京)科技有限公司 | Communication verification method, electronic device, and storage medium |
| CN115802080A (en) * | 2022-11-23 | 2023-03-14 | 四川长虹网络科技有限责任公司 | A set-top box control method, device, computer equipment and storage medium |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN108632398B (en) | A kind of conference access method and system, association turn server and conference management terminal | |
| CN108023910B (en) | A kind of terminal monitoring method and system based on view networking | |
| CN108173804B (en) | A kind of networked by view accesses the method and view connection cat client of internet | |
| CN108418778A (en) | A kind of internet and method, apparatus and interactive system regarding connected network communication | |
| CN109120962A (en) | The method and apparatus of software terminal connection view networking | |
| CN108881798A (en) | It is a kind of to be carried out using bridge service device across view networking conference method and system | |
| CN108462678A (en) | A kind of method and apparatus of checking monitoring video recording | |
| CN109672664A (en) | A kind of authentication method and system regarding networked terminals | |
| CN108632558A (en) | A kind of method and apparatus of video calling | |
| CN108632238A (en) | A kind of method and apparatus of permission control | |
| CN109963109A (en) | A kind of processing method and system of video conference | |
| CN109462594A (en) | A kind of data processing method and system based on view networking | |
| CN108616487A (en) | Based on the sound mixing method and device regarding networking | |
| CN109379254A (en) | A kind of detection method and system of the network connection based on video conference | |
| CN109347844B (en) | Method and device for accessing equipment to Internet | |
| CN110062195A (en) | A kind of video conference cut-in method and system | |
| CN109743265A (en) | A kind of method and apparatus obtaining certificate information | |
| CN110266638A (en) | Information processing method, device and storage medium | |
| CN110113305A (en) | A kind of processing method and system regarding networking service | |
| CN109347856A (en) | A kind of login method and system regarding networked terminals | |
| CN110012063A (en) | A kind of processing method and system of data packet | |
| CN109451001A (en) | A kind of means of communication and system | |
| CN109889761A (en) | A kind of processing method and system of video conference | |
| CN109729184A (en) | A kind of method and apparatus of view networking service processing | |
| CN109905627A (en) | A kind of method and apparatus of audio/video flow data recording |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190524 |
|
| RJ01 | Rejection of invention patent application after publication |