Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method and system for realizing DSN content service access security

A technology for content access and business access, applied in the field of communications, can solve problems such as the inability to prevent a large number of illegal accesses, denial of service, and low service efficiency of business systems, and achieve the effect of ensuring access security.

Inactive Publication Date: 2017-07-14
ZTE CORP
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0012] From the above process, it can be seen that in the P2P network environment of DSN, when the user accesses the content, although the user terminal has been authenticated by the content service application server, this cannot prevent some attackers from forging the user terminal to access the DSN content service. A large number of illegal accesses to services lead to inefficiency or even denial of service in business systems
At present, there is no solution to ensure the access security of DSN content services in DSN.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for realizing DSN content service access security
  • A method and system for realizing DSN content service access security
  • A method and system for realizing DSN content service access security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] In practical applications, the content service application server may authorize the content server list query token (token) and the content access token for the user terminal, or the resource location server may authorize the content access token for the user terminal. For the convenience of description, the content server list query token is referred to as query token for short below.

[0053] When the user terminal queries the content server list, the resource location server verifies the query token of the user terminal, and allows the user terminal to obtain content from the content server after the verification is passed. When the user terminal obtains the content resource of the content server, the content server verifies the content access token of the user terminal, and provides the content resource to the user terminal after passing the verification, thereby ensuring the access security of the content service.

[0054] It can be seen that it is necessary to car...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a system for realizing DSN content service access security, which can both authorize a content server list query token token and a content access token for a user terminal, and when a user terminal queries a content server, query the content server list The token is verified, and after the verification is passed, the user terminal is allowed to access the resources on the content server; when the user terminal obtains the content from the content server, the content access token is verified, and the user terminal is allowed to obtain the content resources after the verification is passed. The method and system of the present invention can perform two-level verification (including the previous query token verification and the subsequent content access token verification) for the user terminal, and provide content resources to the user terminal after the second-level verification is finally passed, so it can Ensure access security of content services.

Description

technical field [0001] The present invention relates to the communication field, in particular to a method and a system for realizing DSN (Distributed Service Network, distributed service network) content service access security. Background technique [0002] DSN (Distributed Service Network, Distributed Service Network, DSN) is a new generation of operable and manageable distributed core network system and functional architecture based on distributed technology based on peer topeer. Expanded service environment provides users with various services, such as content services such as streaming media and voice services such as multimedia calls. [0003] DSN content service system DSN provides users with content resource delivery services (such as video on demand and live broadcast, etc.), and is also responsible for uploading and distributing user content resources. [0004] figure 1 It is the basic process for users to obtain content resources in the DSN content service syst...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/08H04L29/06
Inventor 金伟毅王炜陶全军
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products