Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method, device and system for identity verification in DLNA (digital living network alliance) network

An identity verification and network technology, applied in the field of home network, can solve the problems of unsolved identity verification, endangering multimedia data security and user privacy security, etc., and achieve the effect of ensuring security and privacy security and avoiding transmission.

Inactive Publication Date: 2013-08-14
ZTE CORP
View PDF5 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In a digital home network, network coverage not only involves a user's own multimedia device, but also covers other users' devices. Due to the lack of a unified identity verification method, other users can easily access a user's own DLNA network , thereby endangering the user's multimedia data security and user privacy security
Although DLNA provides a digital transmission content protection (DTCP, Digital Transmission Content Protection) content protection scheme, it does not address how to authenticate various device types of DLNA

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and system for identity verification in DLNA (digital living network alliance) network
  • Method, device and system for identity verification in DLNA (digital living network alliance) network
  • Method, device and system for identity verification in DLNA (digital living network alliance) network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0065] Such as figure 2 As shown, the specific implementation process of identity verification in the DLNA network of this embodiment may include the following steps:

[0066] Step 201: When the first DLNA device (eg, DLMA device with DMC / DMR) in the DLNA network needs to access certain resources on the second DLNA device (eg, DLMA device with DMR / DMS) or requests certain services , the first DLNA device initiates an HTTP GET / POST request to the second DLNA device;

[0067] Step 202: The second DLNA device receives the HTTP GET / POST request, enables the identity verification function, encodes the EAP identity request (Request Identity) message with BASE64, and encapsulates it into the WWW of the HTTP 401 Unauthenticated (HTTP 401 Unauthorized) message - in the Authenticate header field (a standard message header defined by HTTP (RFC2613), and sending the HTTP401 Unauthorized message to the first DLNA device, requesting to obtain the identity information of the first DLNA dev...

Embodiment 2

[0082] Taking the process of the DMC browsing the media content of the DMS and playing the media content on the DMR as an example, the application of the identity verification method in the DLNA network of the present invention will be described in detail below. In this embodiment, regardless of the aggregation of DLNA devices, DLNA includes DLNA device 1 with DMC, DLNA device 2 with DMS, and DLNA device 3 with DMR. DMP is used as a special DMC, that is, MSCP. Therefore, DLNA device 1 Also has DMP.

[0083] Such as image 3 As shown, the DMC browses the media content of the DMS and plays the process of the media content on the DMR, which may specifically include:

[0084] Step 301: In the device discovery phase, DLNA device 1 with DMS and DLNA device 3 with DMR in the DLNA network communicate through SSDP protocol, using IP multicast and broadcast mechanism, and DLNA device 1 sends M-SEARCH of SSDP protocol in DLNA Multicast message, actively search for DLNA devices with DMS...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for identity verification in DLNA network. The method comprises the steps as follows: receiving an access request initiated by DLNA equipment to be verified; and adopting an HTTP-EAP (hypertext transport protocol-extensible authentication protocol) manner to verify the identity of the DLNA equipment to be verified for an identity verification server RADIUS. Correspondingly, the invention further discloses a device and a system for identity verification in the DLNA network, so that the DLNA equipment in the DLNA network can perform identity verification for other DLNA equipment before other DLNA equipment accesses the DLNA network, and accordingly, the multimedia data safety and privacy safety of users can be guaranteed.

Description

technical field [0001] The present invention relates to the technical field of home networks, in particular to a method, device and system for identity verification in Digital Living Network Alliance (DLNA, Digital Living Network Alliance). Background technique [0002] In the DLNA network, there are various device types: digital media server (DMS, Digital Media Server) that provides digital media content sharing, digital media renderer (DMR, Digital Media Render) that passively plays DMS content, active playback A digital media player (DMP, Digital Media Player) for DMS content and a digital media controller (DMC, Digital Media Controller) for controlling DMS and DMR. These device types are widely used in consumer electronic devices, personal computers (PCs), mobile phones, TV sets, set-top boxes, MIFI gateways, UFI devices, etc. in daily life. [0003] Various types of devices in a DLNA network come from different manufacturers, and there is no unified authentication meth...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04L29/06
CPCH04L12/2803H04L29/12245H04L63/0892H04L29/06
Inventor 梁洁辉李建勇施元庆
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products