Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Fragmentation-based content authentication method

An authentication method and content technology, applied in user identity/authority verification, electrical components, transmission systems, etc., can solve problems such as low authentication efficiency, not supporting media content fragmentation authentication, etc., to reduce authentication overhead and improve response speed. Effect

Active Publication Date: 2012-05-23
ZHENGZHOU SEANET TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to overcome the problem that the content authentication method of the existing content service system does not support the fragmentation authentication of the media content, and the authentication efficiency is low based on the balanced tree MHT construction strategy, thereby proposing a method based on fragmentation method of authentication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Fragmentation-based content authentication method
  • Fragmentation-based content authentication method
  • Fragmentation-based content authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The present invention will be further described below in conjunction with accompanying drawing:

[0033] figure 1 It is the content authentication entity model diagram of the content service system, including the following three entities:

[0034] Content management system CMS 101: source of media content, CMS pushes media content to distribution server, and provides content authentication information at the same time. The CMS is trusted to the terminal.

[0035] Distribution server 102: an untrusted storage server, distributed and deployed at the edge of the network, to store media content from the CMS. In response to the media content request from the terminal, the distribution server provides the media content and the corresponding "Proof", which is used for the terminal to authenticate the media content.

[0036] Terminal 103: the consumer of the media content, applies for the media content from the distribution server, and after obtaining the media content and "...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a fragmentation-based content authentication method. The method comprises the following steps: fragmenting media content; equally dividing time into time slots; counting heat degree of each fragmentation in the historical time slots; estimating the heat degree of each fragmentation in a next time slot; and calculating the estimation of the accessed probability of each fragmentation in the next time slot; according to the obtained estimation of the probability, constructing an Optimal Binary Search Tree (OBST); constructing a Merkle Hash Tree (MHT) according to the structure of the OBST so as to obtain an authentication chain of the fragmentation; signing the value of a root node of the MHT with a time stamp by a content management system (CMS); distributing a content request of a receiving terminal of a server; transmitting the fragmentation corresponding to content, the authentication chain of the fragmentation, the time stamp, and a signed value of the CMS toa terminal; authenticating the fragmentation by adopting the authentication chain, the time stamp and the signed value of the CMS by the terminal after receiving the fragmentation; and playing the fragmentation which is authenticated successfully.

Description

technical field [0001] The invention relates to the technical field of content authentication, in particular to a fragment-based content authentication method. Background technique [0002] In the content service system, in order to ensure that the terminal can obtain the required media content nearby to reduce the access delay, the content management system (CMS) usually pushes the media file to the distribution server deployed on the edge of the network in advance, and the distribution server is responsible for receiving the content request of the terminal And provide content access service to the terminal. Since the content distribution server is vulnerable to attack and provides illegal or expired content to the terminal, the CMS needs to regularly sign the media content on the distribution server to ensure that the terminal can authenticate the media content. In order to reduce the overhead of CMS signatures, a Merkle Hash Tree (MHT) is generally used to generate a uni...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32
Inventor 王劲林李良斌牛尔力刘学
Owner ZHENGZHOU SEANET TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products