System and method for authenticating content user
A user and content technology, applied in the field of verifying users who use various content on the network, can solve problems such as inability to guarantee security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0021] Example implementations embodying aspects of the disclosed inventions will be described in detail below with reference to the accompanying drawings.
[0022] image 3 is a block diagram illustrating the constituent elements of an exemplary authentication system embodying parts of the disclosed invention. Such as image 3 As shown, the exemplary verification system is implemented with interactions among trusted organizations 400, content users 500, and content providers 600. The trusted organization 400 provides functionality to create a group public key to be used by a group of content users 500 . And it also generates, initializes and exposes system parameters to the public. These parameters will be used throughout the system. It also stores user ID (personal information) in a database, and searches for the user's ID based on information extracted from content under agreement with the content provider 600 . User information is necessary for purposes of tracking un...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 