The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the continuous development of information construction, the application of digital campus system is increasing, the network scale expanding gradually, access control, and information security problem increasingly prominent. The original decentralized independent certification, the independent authorization, the independent account management model has been unable to meet the current and future...
Nowadays, the problem of mobile digital copyright protection becomes more and more serious, the number of mobile client and small-sized system is growing. In such a situation, this paper proposed an authentication and authorization solution which based on Kerberos for tens of thousands users. This paper introduced every links of permission describe method and authentication protocol which composed...
To solve the issues occurring on current submarine cable production line, such as instability and disturbances during the process of data collection and transmission, a concentrator based on embedded Ethernet communication is designed. The concentrator is designed with TM4C123 as the main control chip, equipped with ENC28J60 Ethernet controller, APC250 wireless data transmission module, TFTLCD liquid...
A cross-terminal web system refers to a web system which can be accessed through various terminal platforms, including the web browsers on personal computers, the mobile applications on smart phones and so on. Traditional design of such a system usually uses XML data format and RPCful web services. There are some issues lying in this design such as the low efficiency of data exchange, the complex...
In this study, build interactive location database intelligent video car recorder system. Video automotive logger system was established in the iOS intelligent mobile devices (iPhone). The video car recorder system can be record the current driving conditions, display the current location on the map, and upload it to the location database. Location database is constructed by a network server, MySQL,...
Seamless Video Service is a new service mode, providing video services to users at any time and any place. In seamless content delivery system, the authentication & authorization protocol is an essential problem to be solved. In this paper, an authentication & authorization protocol suitable for seamless video services with light weight certificate, namely SVSAAP is proposed. Through the analysis...
In the Pay-TV system, the Key Management System (KMS) is one of the essential basis. The KMS is used to prevent the unauthorized access to the audio/video data and ensure the benefit of the service providers. The security of the KMS is primarily affected by the key distribution process. In this paper, a distributed key management scheme based on the notion of the rekey path method is proposed. Through...
For interactive TV (ITV) services in converged network, the DVB-based DTV and the IP-based IPTV coexist in a single dual mode set-top box (STB) and the traditional one-way DVB-CA cannot be adapted to the variation. In this paper, a simplified and secure conditional access scheme based on the simplified double layer is proposed to realize authentication and access control between servers and STBs....
In this paper, we propose a novel three party authentication scheme which could realize the mutual authentication among the involved parities (service provider, terminal and smart-card), and our scheme can be used for more fair-use oriented DRM scheme framework design. The scheme is highly efficient and secure, and it's immune to many existing attacks.
Mobile multimedia broadcast is a result of the development of the digital TV under the trend of network convergence. In this paper, according to the requirement of authentication and authorization, the particularities of mobile multimedia broadcast are analyzed. The problems of traditional conditional access and digital right management in mobile multimedia broadcast are shown. A new scheme of authentication...
In this paper, an approach with extended cocoons to detect and resolve the feature interaction induced by the centralized multi-party service is proposed, hereinafter referred to as the ECOMPS. The ECOMPS is built based on the approach presented in (Kolberg and Magill, 2007) which manages the feature interaction between call control services within a single session; therefore, the good characters...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.