System and Processing Method for Electronic Authentication Client, and System and Method for Electronic Authenication

ABSTRACT

A system for an electronic authentication client and a processing method thereof, and a system for electronic authentication and a method thereof are disclosed. The system for the electronic authentication client includes an intelligence remote controller and a television controller, wherein the television controller is configured to receive data of an authentication code from an authentication server, send the data of the authentication code to the intelligence remote controller, receive an operation result of an authentication code from the intelligence remote controller, and send the operation result of the authentication code to the authentication server; and the intelligence remote controller is configured to receive the data of the authentication code from the television controller, operate on the data of the authentication code based on a built-in authentication algorithm to obtain the operation result of the authentication code, and send the operation result of the authentication code to the television controller.

CROSS REFERENCE TO RELATED APPLICATIONS

This application is a continuation application of InternationalApplication No. PCT/CN2013/076818, filed Jun. 5, 2013, which claimspriority of Chinese patent application No. CN201210182960.5, filed Jun.5, 2012, the contents of which are incorporated herein by reference intheir entirety.

FIELD

The present disclosure relates generally to the technology field ofelectronic authentication, and more particularly, to a system for anelectronic authentication client, a processing method for the electronicauthentication client, a system for electronic authentication and amethod for electronic authentication.

BACKGROUND

With the development of network technology, there are a growing numberof applications to be subject to electronic authentication, such aslogging into private accounts, electronic payment or the like. Becausethe application to be subject to electronic authentication ofteninvolves information relating to personal privacy or individualinterest, security is most important to the electronic authenticationand the accuracy of the electronic authentication should be ensured byvarious means. A frequently used approach in the prior electronicauthentication technology is sending an authentication code from aserver, performing a client operation on the authentication code basedon a conventional authentication algorithm, and the operation result ofthe authentication code can be achieved and returned to theauthentication server to allow the server to determine whether theauthentication is valid, according to the operation result of theauthentication code.

A USB key is used to execute the operation on the authentication codesent from the authentication server to obtain the operation result ofthe authentication code in the current electronic authentication client.Generally, a pre-programmed authentication algorithm is stored in theUSB key, which is programmed in a hardware chip of the USB key and notreadable from outside. The operation on the authentication code can onlybe achieved by using a program to access a USB interface of the USB keyfor data interaction. The USB key used in an e-bank online payment is apopular electronic authentication method for instance, which can improvethe security of e-commerce. In this case, an electronic authenticationclient consists of the USB key and the processing apparatus fitted withan access program, such as computer.

However, with the advent of smart televisions or smart set-top boxes,web browsing can be achieved via a television, and thus there is thepotential for achieving electronic authentication via televisionequipment. For instance, when implementing electronic business withtelevision equipment, an authentication for electronic identities of thedeal is also needed.

However the data processing of the electronic authentication clientcannot be implemented reasonably in this case. If the authenticationcode from the authentication server is calculated by using a USB key inthe client to obtain the operation result of the authentication code,then the USB key needs to be inserted into and removed from the smarttelevision or the smart set-top box on the client side every time, andthe smart television or the smart set-top box is required to be providedwith a USB interface for the USB key, so it is not convenient to use.

SUMMARY OF THE INVENTION

According to one aspect of the disclosure, in order to solve the problemthat the USB key is not convenient to process data in the client whenperforming electronic authentication in the television equipment, thepresent disclosure provides a system for an electronic authenticationclient without plugging a USB key or requiring a USB interface forclient data transmission, and a processing method for the electronicauthentication client thereof.

Described herein is a system for an electronic authentication client,including an intelligence remote controller and a television controller,wherein:

the television controller is configured to receive data of anauthentication code from an authentication server, send the data of theauthentication code to the intelligence remote controller, receive anoperation result of an authentication code from the intelligence remotecontroller, and send the operation result of the authentication code tothe authentication server; and

the intelligence remote controller is configured to receive the data ofthe authentication code from the television controller, operate on thedata of the authentication code based on a built-in authenticationalgorithm to obtain the operation result of the authentication code, andsend the operation result of the authentication code to the televisioncontroller.

Also described herein is a processing method for electronicauthentication client, including:

receiving, by a television controller, data of an authentication codefrom an authentication server, and sending the data to an intelligenceremote controller;

receiving, by the intelligence remote controller, the data of theauthentication code from the television controller, operating on thedata of the authentication code based on a built-in authenticationalgorithm to obtain the operation result of the authentication code, andsending the operation result of the authentication code to theauthentication server; and

receiving, by the television controller, the operation result of theauthentication code from the intelligence remote controller, and sendingthe operation result of the authentication code to the authenticationserver.

The system for the electronic authentication client and the processingmethod for the electronic authentication client of the presentdisclosure interact with the data by using of an intelligence remotecontroller and a television controller, such as a set-top box or thelike, to implement electronic authentication, and it does not requireset up of a data transmission interface, such as USB or the like, anddoes not require plug-in of a USB key, due to implementing theauthentication algorithm in the intelligence remote controller, whichprovides convenience. The television controller sends the data of theauthentication code from the authentication server, the intelligenceremote controller operates on the data of the authentication code usinga built-in unreadable authentication algorithm, and the operation resultof the authentication code is sent to the authentication server via thedata interaction between the intelligence remote controller and thetelevision controller, thus ensuring the authentication algorithm isunreadable and the electronic authentication is secure.

According to another aspect of the disclosure, in order to solve theproblem that the USB key is not convenient to process data in the clientwhen making electronic authentication in the television equipment in thebackground art, the present disclosure also provides a system forelectronic authentication without plugging a USB key or requiring a USBinterface for client data interaction, and a method for electronicauthentication thereof.

Described herein is a system for electronic authentication, including aauthentication server, an intelligence remote controller and atelevision controller, wherein:

the authentication server is operable to send data of an authenticationcode based on an authentication request, receive an operation result ofan authentication code, and determine whether the authentication isvalid based on the operation result of the authentication code;

the television controller is operable to receive the data of theauthentication code from the authentication server, send the data of theauthentication code to the intelligence remote controller, receive theoperation result of the authentication code from the intelligence remotecontroller, and send the operation result of the authentication code tothe authentication server; and

the intelligence remote controller is configured to receive the data ofthe authentication code from the television controller, operate on thedata of the authentication code based on a built-in authenticationalgorithm to obtain the operation result of the authentication code, andsend the operation result of the authentication code to the televisioncontroller.

Also described herein is a method for electronic authentication,including:

generating, by an authentication server, data of an authentication codeaccording to an authentication request, and passing the data of theauthentication code to a television controller;

receiving, by a television controller, the data of an authenticationcode from the authentication server, and sending the data to anintelligence remote controller;

receiving, by the intelligence remote controller, the data of theauthentication code from the television controller, operating on thedata of the authentication code based on a built-in authenticationalgorithm to obtain the operation result of the authentication code, andsending the operation result of the authentication code to theauthentication server;

receiving, by the television controller, the operation result of theauthentication code from the intelligence remote controller, and sendingthe operation result of the authentication code to the authenticationserver; and

receiving, by the authentication server the operation result of theauthentication code from the television controller, and determiningwhether the authentication is valid based on the operation result of theauthentication code.

The system for electronic authentication and the method for electronicauthentication of the present disclosure interact with the data by usingof an intelligence remote controller and a television controller, suchas a set-top box or the like, to implement electronic authentication,and it does not require set up of a data transmission interface, such asUSB or the like, and does not require plug-in of a USB key, due toimplementing the authentication algorithm in the intelligence remotecontroller, which provides convenience. The television controller sendsthe data of the authentication code from the authentication server, theintelligence remote controller operates on the data of theauthentication code using a built-in unreadable authenticationalgorithm, the operation result of the authentication code is sent tothe authentication server via the data interaction between theintelligence remote controller and the television controller, and theauthentication server determines whether the authentication is validbased on the operation result of the authentication code, thus ensuringthe authentication algorithm is unreadable and the electronicauthentication is secure.

DESCRIPTION OF THE DRAWINGS

The accompanying drawings, which are incorporated into and constitute apart of this specification, illustrate one or more examples ofembodiments and, together with the description of example embodiments,serve to explain the principles and implementations of the embodiments.Wherever possible, the same reference numbers are used throughout thedrawings to refer to the same or like elements of an embodiment.

FIG. 1 is a schematic diagram illustrating a system for an electronicauthentication client in accordance with certain embodiments of thepresent disclosure.

FIG. 2 is a schematic diagram illustrating a programmable microprocessorchip used in an exemplary embodiment of the system for the electronicauthentication client.

FIG. 3 is a flow diagram illustrating a process of electronicauthentication executed by the system for electronic authentication inaccordance with one embodiment of the present disclosure.

FIG. 4 is a flow diagram illustrating a method for the electronicauthentication client in accordance with certain embodiments of thepresent disclosure.

DETAILED DESCRIPTION

In the following description of embodiments, reference is made to theaccompanying drawings which form a part hereof, and in which it is shownby way of illustration specific embodiments of the disclosure that canbe practiced. It is to be understood that other embodiments can be usedand structural changes can be made without departing from the scope ofthe disclosed embodiments.

Reference is made to FIG. 1, which is a schematic diagram illustrating asystem for an electronic authentication client in accordance withcertain embodiments of the present disclosure.

In accordance with this disclosure, the system for the electronicauthentication client may include a television controller 11 and anintelligence remote controller 12.

The television controller 11 may be configured to receive data of anauthentication code from an authentication server 13, send the data ofthe authentication code to the intelligence remote controller 12,receive an operation result of an authentication code from theintelligence remote controller 12, and send the operation result of theauthentication code to the authentication server 13.

The intelligence remote controller 12 may be configured to receive thedata of the authentication code from the television controller 11,operate on the data of the authentication code based on a built-inauthentication algorithm to obtain the operation result of theauthentication code, and send the operation result of the authenticationcode to the television controller 11.

In certain embodiments, the television controller 11 may be anintelligent set-top box or an intelligent controller of other televisionequipment. The television controller 11 has an internet connectionfunction for communicating with an authentication server 13 online. Thetelevision controller 11 may exchange data with the intelligence remotecontroller 12, receive data of an authentication code from theauthentication server 13 and send the data to the intelligence remotecontroller 12. The television controller 11 also may receive theoperation result of the authentication code from the intelligence remotecontroller 12 and send the result to the authentication server 13. Thedata of the authentication code is generated by the authenticationserver 13 based on a convention, suitable for the authenticationalgorithm built in the intelligence remote controller 12. The data ofthe authentication code may be a random number generated by theauthentication server 13 based on an authentication request forinstance, which improves the security of electronic certification.

A special authentication algorithm may be built in the intelligenceremote controller 12, the computational logic of which is secret and maybe recorded in machine code.

In order to ensure the security of the authentication algorithm, thealgorithm may be designed into the hardware of the intelligence remotecontroller 12 by a programmable microprocessor, and the industry controlfor hardware reading will be cut off after the algorithm code has beenprogrammed, so as to ensure the algorithm is unreadable and unwritable.

A special programmable microprocessor chip may be built in theintelligence remote controller 12 for recording the authenticationalgorithm. Take a programmable microprocessor chip AT90USBKey forexample, which is integrated with a SPI communication module, a 16 kFlash and a 4 k RAM. Its circuit design is shown in FIG. 2.

Beyond the chip itself, the system also needs an external crystaloscillator to provide a clock needed for communication. In theembodiment, a crystal oscillator with an oscillation frequency of 48M isused. In addition, only a few simple electrolytic capacitors arerequired to ensure the stability of the circuit.

The algorithm compiled may be programmed into the chip by a SPIinterface of the chip, while the industry control of the Flash of thechip can be blown, in order to ensure that the chip is unreadable andunwritable after production and the chip is accessible only by the SPIinterface for communication. The data of the authentication code isoperated on by the authentication algorithm in the chip to obtain theoperation result of the authentication code. Because the Flash in thechip cannot be read directly by removing the encapsulation of the chipin the prior art, it makes sure that the authentication algorithm isinvisible to users, and the security of the whole authentication clientsystem can be guaranteed.

The present disclosure does not limit the type of the programmablemicroprocessor and those of ordinary skill in the art can choose anappropriate programmable microprocessor.

The system for the electronic authentication client interacts with thedata by using of an intelligence remote controller 12 and a televisioncontroller 11, such as a set-top box or the like, to implementelectronic authentication, and it does not require set up of a datatransmission interface, such as USB or the like, and does not requireplug-in of a USB key, due to implementing the authentication algorithmin the intelligence remote controller, which provides convenience. Thetelevision controller 11 sends the data of the authentication code fromthe authentication server 13, the intelligence remote controller 12operates on the data of the authentication code using a built-inunreadable authentication algorithm, and the operation result of theauthentication code is sent to the authentication server 13 via the datainteraction between the intelligence remote controller 12 and thetelevision controller 11, thus ensuring the authentication algorithm isunreadable and the electronic authentication is secure.

The system for electronic authentication client may be constituted as asystem for electronic authentication with an authentication server 13.The authentication server 13 is configured to send data of anauthentication code based on an authentication request, receive anoperation result of an authentication code, and determine whether theauthentication is valid based on the operation result of theauthentication code.

For example, the authentication server 13 operates on the data of theauthentication code based on a corresponding authentication algorithm toobtain a second operation result of the authentication code, receives afirst operation result of the authentication code from the televisioncontroller 11, and determines whether the authentication is valid basedon the first operation result and the second operation result of theauthentication code.

In certain embodiments, the authentication server 13 may be a server forelectronic payment, or a server for other systems requiringauthentication. The authentication server 13 may further returninformation of an authentication result after completing theauthentication. The television controller 11 may further be used toreceive the information of the authentication result from theauthentication server 13 and send the information of the authenticationresult to the intelligence remote controller 12.

In one embodiment, the intelligence remote controller 12 sends anauthentication request to the television controller 11. The televisioncontroller 11 sends the authentication request to the authenticationserver 13, and receives the data of authentication code sent from theauthentication server 13 based on the authentication request.

That is, users may send authentication requests by the intelligenceremote controller 12 of the present disclosure, with convenience. Forexample, when a user would like to confirm an electronic payment usingthe intelligence remote controller 12, the user may trigger thecontrolling keyboard of the intelligence remote controller 12 to send anauthentication request.

In another embodiment, the television controller 11 may be further usedto receive a private key for the client from the authentication server13 and send the private key for the client to the intelligence remotecontroller 12. The intelligence remote controller 12 may be further usedto receive and store the private key for the client, encrypt the data tobe sent to the television controller 11 and decrypt the data from thetelevision controller 11 based on the private key for the client, toimprove the security of the information transmission during the processof authentication. The data of the private key for the client may bewritten into the memory chip of the intelligence remote controller 12.

When the user uses the intelligence remote controller 12 for the firsttime, the account name and password input by the user may beauthenticated preliminarily. The intelligence remote controller 12receives the input account name and password, and sends the account nameand password to the authentication server 13 through the televisioncontroller 11. The authentication server 13 performs preliminaryauthentication based on the account name and password. On successfulauthentication, the authentication server 13 will pass a digitalcertificate containing a private key to the client that the client mayencrypt and decrypt the data exchanged with the authentication server 13by using of the private key, while the authentication server 13 encryptsthe data to be sent to the client and decrypts the data received fromthe client based on a public key corresponding to the private key, toimprove the confidentiality and security of the data interaction duringthe process of authentication.

Reference is now made to FIG. 3, which is a flow diagram illustrating aprocess of electronic authentication executed by the system forelectronic authentication in accordance with one embodiment of thepresent disclosure.

At step 101, the intelligence remote controller sends an authenticationrequest depending on the actions taken by the user, where datatransmission is realized by a special wireless communication channelbetween the intelligence remote controller and the televisioncontroller, the data sent by the intelligence remote controller isencrypted by a private key for the client and the corresponding receiveddata is decrypted by the private key for the client, so as to ensure theconfidentiality and security of the data interaction.

At step 102, the television controller receives the authenticationrequest and sends the authentication request to the authenticationserver, where data transmission is realized by 128-bit TSL transmissionencryption between the television controller and the authenticationserver, to guarantee the security of communication.

At step 103, the authentication server passes data of an authenticationcode to the television controller, where the data of the authenticationcode is a random number generated by the authentication server based onthe authentication request. The authentication server receives theauthentication request sent by the television controller, automaticallygenerates the random number based on a convention, and passes the randomnumber to the television controller. The authentication server decryptsthe received data from the television controller using a correspondingpublic key, and encrypts the data to be sent to the televisioncontroller using the public key.

At step 104, the authentication server calculates an operation result ofthe authentication code referred as “response A1”, based on the data ofthe authentication code and an internal authentication algorithm.

At step 105, the television controller receives the data of theauthentication code, and sends the data to the intelligence remotecontroller.

At step 106, the intelligence remote controller calculates an operationresult of the authentication code referred as “response A”, based on thedata of the authentication code and a built-in authentication algorithm,wherein the built-in authentication algorithm is designed into thehardware of the intelligence remote controller and is unreadable andunwritable to prevent the divulgence of the algorithm.

At step 107, the intelligence remote controller sends the “response A”to the television controller.

At step 108, the television controller receives the “response A” andsends the “response A” to the authentication server.

At step 109, the authentication server receives the “response A”, andverifies the “response A” with “response A1” for authentication.

At step 110, the authentication server passes a result of theauthentication to the television controller, wherein the result of theauthentication is “authentication succeeded” or “authentication failed”in general.

At step 111, the television controller receives the result of theauthentication, and sends the result of the authentication to theintelligence remote controller, to provide the user with the result ofthe authentication.

In accordance with this disclosure, the system for electronicauthentication interacts with the data by using of an intelligenceremote controller and a television controller to implement electronicauthentication, and it does not require set up of a data transmissioninterface, such as USB or the like, and does not require plug-in of aUSB key, due to implementing the authentication algorithm in theintelligence remote controller, which provides convenience.

Reference is now made to FIG. 4, which is a flow diagram illustrating amethod for an electronic authentication client in accordance withcertain embodiments of the present disclosure.

The processing method for the electronic authentication client includes:

S201, receiving, by a television controller, data of an authenticationcode from an authentication server, and sending the data to anintelligence remote controller;

In certain embodiments, the television controller may be an intelligentset-top box or an intelligent controller of other television equipment.The intelligence remote controller preferably communicates with thetelevision controller by a special wireless transmission channel.

The television controller has an internet connection function forcommunicating with an authentication server online. The televisioncontroller may exchange data with the intelligence remote controller,receive data of an authentication code from the authentication serverand send the data to the intelligence remote controller. The data of theauthentication code is generated by the authentication server based on aconvention, suitable for the authentication algorithm built in theintelligence remote controller. The data of the authentication code maybe a random number generated by the authentication server based on anauthentication request for instance, which improves the security ofelectronic certification.

In the embodiment, the intelligence remote controller sends anauthentication request to the television controller; and

the television controller sends the authentication request to theauthentication server, and receives the data of the authentication codesent by the authentication server based on the authentication request.

That is, users may send authentication requests via the intelligenceremote controller of the present disclosure, with convenience. Forexample, when a user would like to confirm an electronic payment usingthe intelligence remote controller, the user may trigger a controllingkeyboard of the intelligence remote controller to send an authenticationrequest.

S202, receiving, by the intelligence remote controller, the data of theauthentication code from the television controller, operating on thedata of the authentication code based on a built-in authenticationalgorithm to obtain the operation result of the authentication code, andsending the operation result of the authentication code to theauthentication server; and

The computational logic of the authentication algorithm built in theintelligence remote controller is secret and may be recorded in machinecode. In order to ensure the security of the authentication algorithm,the algorithm may be designed into the hardware of the intelligenceremote controller by a programmable microprocessor, and the industrycontrol for hardware reading will be cut off after the algorithm codehas been programmed, so as to ensure the algorithm is unreadable andunwritable.

S203, receiving, by the television controller, the operation result ofthe authentication code from the intelligence remote controller, andsending the operation result of the authentication code to theauthentication server.

The above process is the processing method for the electronicauthentication client performed on the client. The processing method forthe electronic authentication client of the present disclosure interactswith the data by using of an intelligence remote controller and atelevision controller, such as a set-top box or the like, to implementelectronic authentication, and it does not require set up of a datatransmission interface, such as USB or the like, and does not requireplug-in of a USB key, due to implementing the authentication algorithmin the intelligence remote controller, which provides convenience. Thetelevision controller sends the data of the authentication code from theauthentication server, the intelligence remote controller operates onthe data of the authentication code using a built-in unreadableauthentication algorithm, and the operation result of the authenticationcode is sent to the authentication server via the data interactionbetween the intelligence remote controller and the televisioncontroller, thus ensuring the authentication algorithm is unreadable andthe electronic authentication is secure.

In the method for electronic authentication, the electronicauthentication server generates the data of the authentication codebased on the authentication request, and passes the data of theauthentication code to the television controller, on the server side. Inaddition, the electronic authentication server receives the operationresult of the authentication code sent from the television controller,and determines whether the authentication is valid based on theoperation result of the authentication code.

For example, the authentication server operates on the data of theauthentication code based on a corresponding authentication algorithm toobtain a second operation result of the authentication code, receives afirst operation result of the authentication code from the televisioncontroller, determines whether the authentication is valid based on thefirst operation result and the second operation result of theauthentication code, and obtains a result of the authentication. Thenthe authentication server sends the result of the authentication to thetelevision controller.

In certain embodiments, the authentication server may be a server forelectronic payment, or a server for other systems requiringauthentication.

In a preferable embodiment, the television controller may further beused to receive the information of the authentication result from theauthentication server and send the information of the authenticationresult to the intelligence remote controller.

The authentication server will pass the result of the authentication tothe television controller after the validity of the authentication hasbeen determined. The television controller sends the result of theauthentication to the intelligence remote controller to provide the userwith the result of the authentication via the intelligence remotecontroller.

In another preferable embodiment, the method may further include thefollowing steps:

receiving, by the television controller, a private key for a client fromthe authentication server, and sending the private key for the client tothe intelligence remote controller; and

receiving and storing, by the intelligence remote controller, theprivate key for the client, and encrypting the data to be sent to thetelevision controller and decrypting the data from the televisioncontroller based on the private key for the client.

When the user uses the intelligence remote controller for the firsttime, the account name and password input by the user may beauthenticated preliminarily. The intelligence remote controller receivesthe input account name and password, and sends the account name andpassword to the authentication server through the television controller.The authentication server performs preliminary authentication based onthe account name and password. On successful authentication, theauthentication server will pass a digital certificate containing aprivate key to the client that the client may encrypt and decrypt thedata exchanged with the authentication server by using the private key,while the authentication server encrypts the data to be sent to theclient and decrypts the data received from the client based on a publickey corresponding to the private key, to improve the confidentiality andsecurity of the data interaction during the process of authentication.

The embodiments are chosen and described in order to explain theprinciples of the disclosure and their practical application so as toactivate those skilled in the art to utilize the disclosure and variousembodiments and with various modifications as are suited to theparticular use contemplated. Alternative embodiments will becomeapparent to those skilled in the art to which the present disclosurepertains without departing from its spirit and scope. Accordingly, thescope of the present disclosure is defined by the appended claims ratherthan the foregoing description and the exemplary embodiments describedtherein.

What is claimed is:
 1. A system for an electronic authentication client,comprising: a television controller configured to receive data of anauthentication code from an authentication server; and an intelligenceremote controller configured to: receive the data of the authenticationcode from the television controller; operate on the data of theauthentication code based on a built-in authentication algorithm toobtain an operation result of the authentication code; and and send theoperation result of the authentication code to the televisioncontroller; and the television controller further configured to: receivethe operation result of the authentication code from the intelligenceremote controller; and send the operation result of the authenticationcode to the authentication server.
 2. The system of claim 1, wherein theintelligence remote controller is further configured to send anauthentication request to the television controller; and the televisioncontroller is further configured to send the authentication request tothe authentication server, and receive the data of the authenticationcode sent by the authentication server based on the authenticationrequest.
 3. The system of claim 1, wherein the television controller isfurther configured to receive a private key from the authenticationserver and send the private key to the intelligence remote controller;and the intelligence remote controller is further configured to receiveand store the private key, encrypt the data to be sent to the televisioncontroller and decrypt the data from the television controller based onthe private key.
 4. The system of claim 1, wherein the intelligenceremote controller comprises a programmable microprocessor, and theauthentication algorithm is unreadable and unwritable.
 5. The system ofclaim 1, wherein the intelligence remote controller communicates withthe television controller using a wireless transmission channel.
 6. Anelectronic authentication system, comprising: an authentication serverconfigured to send data of an authentication code based on anauthentication request; a television controller configured to receivethe data of the authentication code from the authentication server; andan intelligence remote controller configured to: receive the data of theauthentication code from the television controller; operate on the dataof the authentication code based on a built-in authentication algorithmto obtain an operation result of the authentication code; and send theoperation result of the authentication code to the televisioncontroller, the television controller further configured to: receive theoperation result of the authentication code from the intelligence remotecontroller; and send the operation result of the authentication code tothe authentication server; and the authentication server furtherconfigured to: receive the operation result of the authentication code;and determine whether the authentication is valid based on the operationresult of the authentication code.
 7. The system of claim 6, wherein thetelevision controller is further configured to receive a private keyfrom the authentication server and send the private key to theintelligence remote controller; and the intelligence remote controlleris further configured to receive and store the private key, encrypt thedata to be sent to the television controller and decrypt the data fromthe television controller based on the private key.
 8. A method forelectronic authentication, comprising: generating, by an authenticationserver, data of an authentication code according to an authenticationrequest; passing, by the authentication server, the data of theauthentication code to a television controller; receiving, by thetelevision controller, the data of an authentication code from theauthentication server; sending, by the television controller, the datato an intelligence remote controller; receiving, by the intelligenceremote controller, the data of the authentication code from thetelevision controller; operating, by the intelligence remote controller,on the data of the authentication code based on a built-inauthentication algorithm to obtain an operation result of theauthentication code; sending, by the intelligence remote controller, theoperation result of the authentication code to the televisioncontroller; receiving, by the television controller, the operationresult of the authentication code from the intelligence remotecontroller; sending, by the television controller, the operation resultof the authentication code to the authentication server; receiving, bythe authentication server, the operation result of the authenticationcode from the television controller; and determining, by theauthentication server, whether the authentication is valid based on theoperation result of the authentication code.
 9. The method of claim 8,further comprising: sending, by the intelligence remote controller, anauthentication request to the television controller; sending, by thetelevision controller, the authentication request to the authenticationserver; and receiving, by the television controller, the data of theauthentication code sent by the authentication server based on theauthentication request.
 10. The method of claim 8, wherein theauthentication algorithm is designed into a programmable microprocessorof the intelligence remote controller and is unreadable and unwritable.11. The method of claim 8, further comprising: receiving, by thetelevision controller, a private key from the authentication server;sending, by the television controller, the private key to theintelligence remote controller; receiving and storing, by theintelligence remote controller, the private key; and encrypting the datato be sent to the television controller and decrypting the data from thetelevision controller based on the private key.