Unlock instant, AI-driven research and patent intelligence for your innovation.

System and method for authenticating content user

A user and content technology, applied in the field of verifying users who use various content on the network, can solve problems such as inability to guarantee security

Inactive Publication Date: 2005-02-02
SAMSUNG ELECTRONICS CO LTD
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although some techniques try to achieve this goal, they have the limitation that they cannot guarantee security due to encryption and data modification provided to the outside world.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for authenticating content user
  • System and method for authenticating content user
  • System and method for authenticating content user

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] Example implementations embodying aspects of the disclosed inventions will be described in detail below with reference to the accompanying drawings.

[0022] image 3 is a block diagram illustrating the constituent elements of an exemplary authentication system embodying parts of the disclosed invention. Such as image 3 As shown, the exemplary verification system is implemented with interactions among trusted organizations 400, content users 500, and content providers 600. The trusted organization 400 provides functionality to create a group public key to be used by a group of content users 500 . And it also generates, initializes and exposes system parameters to the public. These parameters will be used throughout the system. It also stores user ID (personal information) in a database, and searches for the user's ID based on information extracted from content under agreement with the content provider 600 . User information is necessary for purposes of tracking un...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A system for authenticating a content user, comprising a group common key that authenticates a user, a private key owned by the user, a trusted organization adapted to create and distribute the group common key, and to store personal information on the authenticated user and a temporary registration certificate issued to the authenticated user. A user apparatus converts the temporary registration certificate by means of a predetermined conversion method using the private key, and further provides the converted temporary registration certificate to a content provider prior to executing content provided by the content provider. The content provider adapted to check whether the user has been authenticated by the trusted organization, using the group common key prior to providing the content.

Description

technical field [0001] The present invention relates to a technique for authenticating users who use various contents on a network. More particularly, it relates to an authentication system and technique capable of allowing a legitimate user to securely receive content without revealing his / her own identity, and preventing unauthorized users from exploiting the disclosed content. Background technique [0002] Users who obtain various contents through various types of networks, including the Internet, utilize various encryption methods to maintain the confidentiality of information distributed over communication networks. But in most cases they need to provide information related to their own identity for legitimate business. In many situations, however, maintaining the confidentiality of the identities of the individuals participating in the communication is more important than protecting the data in the communication. Similarly, in local networks, users often attempt to c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F12/14G06F21/00G06F21/10G06F21/60G06F21/62G09C1/00H04L9/08H04L9/32
CPCH04L9/0833H04L9/3252H04L2209/60H04L2209/42H04L9/3263G06F17/00G06F21/00
Inventor 金明宣崔良林南秀铉刘容国张容珍
Owner SAMSUNG ELECTRONICS CO LTD