Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Secret key management system and method of media stream based on IP multi-media sub-system

A multimedia subsystem and key management technology, which is applied in the field of IP multimedia subsystem, can solve the problems of increasing computing overhead and storage requirements of streaming media servers, reducing the efficiency of streaming media servers, etc., to reduce key management overhead and simplify functions , the effect of improving efficiency

Active Publication Date: 2010-12-08
HUAWEI TECH CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For this type of application, if different users are encrypted separately, the computing overhead and storage requirements of the streaming media server will be greatly increased, and the efficiency of the streaming media server will be reduced.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secret key management system and method of media stream based on IP multi-media sub-system
  • Secret key management system and method of media stream based on IP multi-media sub-system
  • Secret key management system and method of media stream based on IP multi-media sub-system

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0037] Embodiment 1: After receiving the service request from the terminal, the application server obtains a key in one of several ways to obtain a key, and sends the key as a TEK to the terminal and the streaming media server. The terminal and the streaming media server use the TEK to encrypt / decrypt the streaming media content transmitted between them.

no. 2 example

[0038] Embodiment 2: After receiving the service request sent by the terminal, the application server obtains a key in one of several ways to obtain a key, and sends the key as a KEK to the terminal and the streaming media server. The streaming media server obtains a key in one of several ways to obtain a key, uses the key as a TEK, and sends the TEK to the terminal through the protection of the KEK, and the terminal and the streaming media server use the TEK to encrypt / decrypt two The streaming media content transmitted between the parties; or after the application server sends the KEK to the terminal and the streaming media server, the terminal and the streaming media server use the KEK to negotiate the TEK. The advantage of using delivery instead of negotiation is that the streaming media server can be controlled to use the same TEK for different users using the same service, thereby reducing the encryption load of the streaming media server.

no. 3 example

[0039] Embodiment 3: After receiving the service request from the terminal, the application server obtains two keys in one of several key acquisition ways, one as KEK and the other as TEK. The application server sends the KEK to the terminal, and through the protection of the KEK, sends the TEK to the terminal. At the same time, the application server sends the TEK to the streaming media server. The terminal and the streaming media server use the TEK to encrypt / decrypt the streaming media content transmitted between them.

[0040] In the second embodiment and the third embodiment above, the application server and the terminal can also obtain the key shared by the two through GBA (General Bootstrapping Architecture, general bootstrapping architecture) or other methods and use it as a KEK.

[0041] In the above-mentioned second and third embodiments, the network side entity can save the KEK within the validity period of the service, so that when the terminal requests the service...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a key management method for the media flow based on the IP multimedia subsystem, the key acquisition and the distribution control are operated by the application server and stream media sever uniformly, the application server can distribute the TEK to the terminal and the stream media sever, the TEK can be used in the content of encrypted stream media sever and the terminal; the application server can adopt the layered key management method, and it can send the key encrypted key KEK to the terminal and stream media sever, and it can develop the TEK by the KEK. The invention also relates to a key management system for the media flow based on the IP multimedia subsystem. The system and method of key management can make the function of key management more simplified and legible, additionally, the stream media sever can't need to save the key information of terminal, and the key can be obtained interactively between the application sever to reduce the cost of key management of stream media sever, and improve the efficiency of stream media sever.

Description

technical field [0001] The present invention relates to an IP Multimedia Subsystem (IP Multimedia Subsystem, IMS), in particular to an IMS-based media stream key management system and method. Background technique [0002] The streaming media service is a new service that has developed rapidly in recent years. The streaming media service uses the streaming transmission technology to transmit multimedia files, including video, audio and other file content, on the packet switching network. These multimedia files play instantly when accessed without a full download. The key technology for the realization of streaming media business is streaming transmission technology, and streaming transmission technology is to put continuous video and audio information on the website server after processing, so that users can watch and listen while downloading, without waiting for the entire file to download. The network transmission technology that can only be watched after reaching your own...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/00
CPCH04L29/06217H04L65/4076H04L63/062H04L29/06455H04L65/1016H04L65/611
Inventor 严军李金成吴向阳
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products