Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and equipment for secure content access

A content and security technology, applied in the field of secure content access, can solve problems such as unreliability and infeasibility, and achieve the effect of improving security and simplifying the system

Active Publication Date: 2013-07-03
ALCATEL LUCENT SHANGHAI BELL CO LTD
View PDF17 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For the latter case, in the current mobile network, the IP address in different sessions always changes, so it is unreliable to identify the user by IP address, and this method is also infeasible

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and equipment for secure content access
  • Method and equipment for secure content access
  • Method and equipment for secure content access

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] Embodiments of the present invention will now be described more fully with reference to the accompanying drawings, in which some, but not all embodiments of the invention are shown. Of course, the invention may be embodied in many different forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are provided so that this invention will satisfy applicable legal requirements. Wherein, similar reference numerals refer to similar elements.

[0035] It should also be noted that in some alternative implementations, the functions / acts noted may occur out of the order noted in the figures. For example, two figures shown in succession may, in fact, be executed substantially concurrently, or may sometimes be executed in the reverse order, depending upon the functionality / acts involved.

[0036] Unless defined to the contrary, all terms (including technical and scientific terms) used herein have the same meaning as understood by...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method and equipment for transmission of secure content. The method for the transmission of the secure content comprises the following steps: receiving a request of a user for the transmission of the content to be accessed, wherein the request bears a user token, and the user token uniquely identifies the identity of the user and a used secret key; at least conducting verification on the user based on the user token, wherein the verification comprises the verification of the user identity; and transmitting the content to be accessed to the user passing the verification based on the success of the verification, wherein the user token is associated with the user, and at least based on transaction identifiers which are associated with a user secret key. Therefore, the method and the equipment for the secure content access can conduct universal authentication aiming at different applications, simplifies the operation of a system, and improves the security.

Description

technical field [0001] The present invention relates to content access, and more particularly, to secure content access. Background technique [0002] Secure content access is very important for Packet Switched Streaming Services (PSS). While the content should be accessible by the intended user, any attempts from other unauthorized users to access the same content should be denied. To this end, the mobile user should be authorized in service interactions, while the URL of the content should be securely generated before being sent to the mobile user, and it should be authenticated when used by the user to obtain the content. [0003] In the prior art, there are different methods for different applications in the security authentication of packet-switched streaming services. [0004] figure 1 A block diagram of a system for securely transmitting content in the prior art is shown. Such as figure 1 As shown, the mobile terminal 1 can execute HTTP applications and RTSP appl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08
Inventor 盖永明蒋兆辉熊锡强王煜坚张志吉金珊
Owner ALCATEL LUCENT SHANGHAI BELL CO LTD