Unlock instant, AI-driven research and patent intelligence for your innovation.

Key anti-theft method and apparatus

A key and consistent technology, applied in the field of network data transmission, can solve the problem of ineffective anti-theft

Inactive Publication Date: 2018-01-12
ZHUHAI GOTECH INTELLIGENT TECH
View PDF6 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, in the prior art, when authorized users provide the key to unauthorized users or illegally obtain the resource providers key, the unauthorized user can also use the key to obtain resources. This is not effective as a deterrent to theft

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key anti-theft method and apparatus
  • Key anti-theft method and apparatus
  • Key anti-theft method and apparatus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0048] refer to figure 1 , figure 1 It is a schematic flowchart of the key anti-theft method provided in this embodiment.

[0049] Embodiment 1 is applied to an authentication server. In this embodiment, the method may include the following steps:

[0050] S101: The authentication server receives a first access request sent by a client.

[0051] In this embodiment, when a user triggers a service to access a certain network resource, the client can send a first access request, and the authentication server can open a port through socket communication to wait for the client to connect, and accept the first access request sent by the client. Of course, other communication methods can also be used to establish a connection between the authentication server and the client, and the purpose of the present invention can also be achieved.

[0052] Clients can be communication devices such as set-top boxes, smart phones, tablet computers, and PCs. The system of the authentication se...

Embodiment 2

[0068] refer to figure 2 , figure 2 It is a schematic flowchart of the key anti-theft method provided by Embodiment 2 of the present invention.

[0069] The method in Embodiment 2 is applied to a multimedia server. In this embodiment, the method may include the following steps:

[0070] S201: Receive a second access request sent by a client; the second access request includes a key containing identity information of the client.

[0071] The multimedia server and the client can be connected through socket communication, and accept the second access request sent by the client. Of course, other communication methods can also be used to establish a connection between the multimedia server and the client, and the purpose of the present invention can also be achieved.

[0072] Clients can be communication devices such as set-top boxes, smart phones, tablet computers, and PCs. The system of the multimedia server can be a Linux system, a Windows system, an IOS system, and the li...

Embodiment 3

[0088] refer to image 3 , image 3 It is a schematic flowchart of the key anti-theft method provided by Embodiment 3 of the present invention.

[0089] In Embodiment 3, the key anti-theft method may include, for example:

[0090] S301: The client sends a first access request to the authentication server.

[0091] When a user triggers a service to access a certain network resource, the client may send a first access request. Clients can be communication devices such as set-top boxes, smart phones, tablet computers, and PCs. The first access request may include information about the resource to be accessed by the user.

[0092] S302: After receiving the first access request sent by the client, the authentication server parses the first access request to obtain the identity information of the corresponding player, and generates a key corresponding to the first access request. The key includes identity information of the client.

[0093] The connection between the authentic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a key anti-theft method. The key anti-theft method comprises the following steps: a client sends a first access request to an authentication server, and the authentication server generates a key comprising client identity information according to the first access request, and sends the key to the client; the client sends a second access request to a multimedia server, the multimedia server decrypts the key in the second access request, and compares whether the identity information of the current client is consistent with the identity information carried in the key and determines whether to send media streams according to a comparison result. Therefore, the identity information of the client requesting to access the multimedia server must be consistent with the identity information carried in the key to obtain resources, and thus the situation that the resources are obtained by using the keys of other clients is avoided. The invention further discloses an apparatus using the key anti-theft method, and the apparatus can effectively prevent the keys of the other clients from illegally obtaining the resources.

Description

technical field [0001] The invention relates to the field of network data transmission, in particular to a key anti-theft method and device. Background technique [0002] With the development of Internet technology, there are more and more resource supply companies, and the network resources they provide greatly facilitate users. For some of the resource suppliers, users can obtain resources from their resource links only if they are allowed by the user, and users who are not allowed have no permission to obtain the supplier's resources. Based on this, a large number of hotlinking methods that illegally use resource links of other companies emerge in endlessly. For example: when a customer purchases a set-top box program broadcast service from the company, the authorized set-top box has the right to receive the connection of the final program. During this process, some users will capture and analyze the link, so that unauthorized users can bypass the authentication Get the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/08H04L9/32
Inventor 赵忠涛
Owner ZHUHAI GOTECH INTELLIGENT TECH