Method, device and system for checking integrality of standby information

A technology for verifying information and messages, applied in transmission systems, digital transmission systems, user identity/authority verification, etc.

Active Publication Date: 2008-01-02
HUAWEI TECH CO LTD
View PDF0 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0036] In view of this, the main purpose of the present invention is to provide a method for generating and transmitting multiple groups of hash values, which not only solves the compatibility problem and cost problem, but also improves the integrity protection of the transmission of the message to be transmitted. security
[0037] The present invention also provides a device for generating and transmitting multiple groups of hash values, which not only s

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and system for checking integrality of standby information
  • Method, device and system for checking integrality of standby information
  • Method, device and system for checking integrality of standby information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0101] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail by giving specific embodiments and referring to the accompanying drawings.

[0102] The method of the present invention adopts multiple hash operations on the message to be transmitted, especially performs multiple hash operations with the participation of the random number sequence, to ensure the security of the integrity transmission of the message to be transmitted, thereby ensuring the integrity of the message to be transmitted Verify security. In the present invention, the to-be-transmitted message can carry authority control information and digital media content in the DRM system, and the authority control information can be a authority object, and can also carry other data that needs to be transmitted in the network to ensure its integrity.

[0103] Fig. 3 is the flow chart of the method for verifying ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for checking the integrity of object transmitted message, a relative device and a system, wherein the method comprises that A, a receiver receives an object transmitted message, and a plurality of discrete groups transmitted safely, according to the discrete values, obtaining check information, the receiver uses preset sequence rule generates a plurality of sequences via received the object message, and obtaining a plurality of discrete values according to discrete calculation method on the sequences, to obtain check information, B, the receiver judges if the two check information are same, when they are same, the received message is not modified, or else, the message is changed. The invention can protect the transmission integrity of object message, resolve compatibility and cost problems, and improve safety.

Description

technical field [0001] The present invention relates to a technology for integrity protection of message transmission to be transmitted, in particular to a method, device and system for verifying the integrity of message to be transmitted. Background technique [0002] At present, in order to ensure the safe transmission of the message to be transmitted in the network, the sender usually performs hash value calculation on the message to be transmitted, and transmits the obtained hash value together with the message to the receiver, and the receiver then uses the obtained The hash value verifies that the incoming message received is complete and has not been tampered with. The whole process is as follows: firstly, the sender obtains the hash value after performing a hash operation method on the message to be transmitted, and then transmits the obtained hash value and the message to be transmitted to the receiver; after the receiver receives the message to be transmitted, Use...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L12/58H04L29/06
Inventor 周晨张仁宙李益民刘生俊冯雯洁周志鹏党沛周皓隽
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products