User resource authorization method

A technology of user resources and resources, which is applied in the field of user resource authorization, and can solve the problem that there is no corresponding technical solution for user resource authorization

Active Publication Date: 2013-01-16
SHENZHEN NAT ENG LAB OF DIGITAL TELEVISION
View PDF3 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, with the development of IPTV and Internet TV, higher requirements are placed on the interactive capabilities between digital TV users, and the shar

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User resource authorization method
  • User resource authorization method
  • User resource authorization method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0026] Please refer to figure 1 with figure 2 , the embodiment of the present invention provides a user resource authorization method. The equipment involved in the method includes a server S and at least two user terminals. In the following, two clients A and B are taken as an example.

[0027] Among them, the server S is a public operating platform, including an authentication server; both client A and B are connected to the server S, and are legal users of the server S, and the resources owned by the client A and B are provided by the server provision and management. Server S can authenticate client A or B, but direct authentication between client A and client B is not supported. Client A and Client B respectively apply for a section of storage space on server S, namely Space A and Space B, which store their respective resources. In the prior art, client B cannot access the resources of Space A applied by client A, and client A cannot access the resources of Space B a...

Embodiment 2

[0062] Please refer to image 3 , an embodiment of the present invention provides a user resource authorization device, including:

[0063] The first sending module 310 is configured to carry the authorization identifier in the challenge message and send it to the authorized client;

[0064] A receiving module 320, configured to receive a response message carrying authorization information returned by the authorized client;

[0065] Creating module 330, configured to create an authorization credential that includes the authorization ID, authorization information, random number seed, and authorization state information;

[0066] The second sending module 340 is configured to send the authorization credential to the authorized user end, the random number seed and authorization state information in the authorization credential are used for the authorized user end to generate a ticket, and the authorized user end can The identity, authorization information, and generated ticket ...

Embodiment 3

[0076] Please refer to figure 2 , an embodiment of the present invention provides a user resource authorization system, including:

[0077] Server S, authorized client A and authorized client B;

[0078] The server S is configured to carry the authorization identifier in the challenge message and send it to the authorized client, and after receiving the response message carrying the authorization information returned by the authorized client, create an and the authorization credential of the authorization status information, sending the authorization credential to the authorized client, and providing the authorized resource to the authorized client;

[0079] The authorized client A is configured to receive a challenge message carrying an authorization identifier sent by the server, and carry the authorization information in a response message and send it to the server;

[0080] The authorized client B is used to receive the authorization certificate sent by the server, gene...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a user resource authorization method which includes that a server transmits authorization identification carried in challenge message to an authorized client, builds authorization evidence containing authorization identification, authorization information, random seed and authorization state information after receiving response message carrying the authorization information and returned by the authorization client, and transmits the authorization evidence to the authorized client, the random seed and authorization information in the authorization evidence are used for generating notes by the authorized client, and the authorized client can acquire authorized resources from the server according to the authorization identification, the authorization information and the generated notes. A corresponding device and a corresponding method are further provided. The user resource authorization method achieves high accuracy resource authorization between clients.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a user resource authorization method. Background technique [0002] China Telecom's IPTV specification "Technical Specification for Interface between Set-Top Box and IPTV Service Operation Platform" V2 provides an authentication scheme based on Challenge Handshake Authentication Protocol (CHAP). The scheme uses a one-way authentication mechanism, including the following steps: [0003] After the client initiates an authentication request to the server, the server sends a challenge (Challenge) message to the client, which contains a random number; the client uses the random number as the initial value and uses a one-way hash function to calculate a The hash value is used as the authentication code to respond; the server checks the authentication code according to the hash value calculated by itself, and if the value matches, the authentication passes. [0004] As above, t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
Inventor 余小龙李新国孙卓黄华松
Owner SHENZHEN NAT ENG LAB OF DIGITAL TELEVISION
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products