Design of large-scale dynamic multicasting security system framework

A security system and large-scale technology, applied to key distribution, can solve the problems of high security processing cost, group members are not sure which member the data comes from, and increase the cost of multicast group deployment, so as to reduce the overall cost and expand flexibly Mechanism, the effect of improving efficiency

Inactive Publication Date: 2008-10-15
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF1 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] (2) Multicast provides an open group mode, so that group members are not sure which member the data comes from;
However, the cost of security processing due to the change of group members in the IETF structure is relatively high. Although the impact can be reduced by adding distributed multicast groups, the cost of multicast group deployment is correspondingly increased; when managing multiple multicast groups When , there is additional communication overhead for peer entities to communicate to ensure security services between multicast groups

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Design of large-scale dynamic multicasting security system framework
  • Design of large-scale dynamic multicasting security system framework
  • Design of large-scale dynamic multicasting security system framework

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The technical scheme of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0029] Figure 4 A schematic diagram of dynamic multicast operation under this framework is shown:

[0030] After the group owner or creator (GO) interacts with the policy server (PS) (through steps 1 and 2) to obtain the policy token (PT), it applies to a certain group of controllers and key servers (GCKS) on the backbone domain for creation A multicast group instance (step 3). The GCKS is called an initial GCKS (I-GCKS), and the I-GCKS publishes secure multicast content with the group key in the backbone domain in the backbone domain.

[0031] The group member (GM) who needs to join the multicast group sends a join request (RTJ) message to the GCKS that manages the leaf domain (steps 7 and 8), or submits a join application to the GCKS through the S-GCKS that manages the subgroup (steps 5 and 8). 6, 9, 10).

[0032] The GM that exits the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a dynamic secure multicast system architecture in large-scale network environment, which is characterized in that a new set of dynamic secure multicast system architecture is designed; the dynamic secure multicast system architecture divides whole multicast into different areas, only updates the encryption key of a group after the members of each group are changed, avoids system expense brought by the update of the encryption key of whole group caused by frequent changes of group members, realizes the flexible extension mechanism with respect to the encryption key management and data distribution of each subarea, realizes the safe certification mechanism based on Kerberos, so as to carry out management of multicast from the viewpoints of controlling safety and data safety. According to the characteristics and requirements of IPv6 protocol, a set of relatively complete group encryption key management mechanism is realized to be applicable to the requirement for safety and practicability of most multicasts in China Education and Research NET of second generation (CERNET2) and similar network environments.

Description

technical field [0001] The invention relates to a large-scale dynamic security multicast system framework under a large-scale network environment. According to the characteristics and requirements of the IPv6 protocol, a relatively complete set of group key management mechanism is implemented, which is suitable for the security and practicality of most multicast applications in the second generation China Education Research Network (CERNET2) and similar network environments. sexual demands. Background technique [0002] The rapid development and popularization of the Internet has provided a strong market force for the development of multicast services, and multicast is becoming increasingly popular. [0003] Multicast is a multi-receiver-oriented communication method based on UDP / IP protocol. Compared with unicast, it can effectively save server resources and network bandwidth. The Internet Group Management Protocol (IGMP) is used to manage multicast. IGMP does not provid...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L12/18H04L29/06
Inventor 秦志光何兴高靳京叶李
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products