A L4 encryption method of double group of encrypted authorization management system

A technology of authorization management and encryption method, which is applied in key distribution, can solve the problem of serious communication burden, achieve the effect of reducing communication burden and communication overhead, reducing the amount of information, and ensuring security

Inactive Publication Date: 2008-03-26
INST OF ACOUSTICS CHINESE ACAD OF SCI +1
View PDF0 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These schemes reduce the amount of information that needs to be transmitted when a large number of users are authorized and the key is updated, but for large-scale users, the communication burden is still very serious

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A L4 encryption method of double group of encrypted authorization management system
  • A L4 encryption method of double group of encrypted authorization management system
  • A L4 encryption method of double group of encrypted authorization management system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] Below in conjunction with accompanying drawing and specific embodiment the present invention is described in further detail:

[0021] Before the method of the present invention is described in detail, a broadcast encryption (broadcast encryption) technology and a subset difference / hierarchical subset difference mechanism are briefly described first. Broadcast encryption technology refers to a key management mechanism that uses only one-way channels and can authorize and deauthorize any subset of large-scale users without two-way handshake communication. In 2001, D.Naor, M.Naor and Lotspiech jointly proposed a new broadcast encryption mechanism: Subset Difference (Subset Difference) method, referred to as NNL mechanism or SD mechanism. The subset differential mechanism establishes a key tree with all clients as leaf nodes. In this key tree, node v i and v j (where v i is v j The difference subset of ancestor nodes) is set by S i,j said, S i,j ={u|u∈S i , uS j}. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention discloses a four-layer encryption method for double grouping an encrypted authorization management system including the following steps: setting up a user ciphered key tree according to a subset difference / hierarchical subset difference unit when settin up the encrypted authorization management system to distribute pre-distributed key of users, the ciphered authorization and management system applies a four-layer of ciphered structure of double grouping to service and users to encrypt digit content in real time when distributing digit content to set up broadcasting authorization information and authorization management information to all users to be analyzed and de-ciphered by the receiving end to compute content key to decipher the digit content.

Description

technical field [0001] The invention relates to an encryption authorization management system, in particular to an encryption authorization management system for authorizing and canceling authorization for large-scale users on broadcast and multicast channels. Background technique [0002] In order to ensure the normal development of digital services, protect the copyright of digital content, and protect the interests of operators, an encryption authorization management system must be established. Through the authorization control and management of users, only the end users who have paid the receiving fee and are authorized are guaranteed. Users who have not paid the reception fee or have no authorization cannot receive the business or service booked in advance. With the vigorous development of digital broadcasting and multicasting services, encryption authorization management systems are faced with the difficult problem of dynamically authorizing and deauthorizing large-sca...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L12/18
Inventor 武蓓王劲林陈君倪宏曾学文宁振江单明辉牛尔力贡佳炜
Owner INST OF ACOUSTICS CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products