Authentication method for multicast communication source
An authentication method and communication technology, applied in the field of network communication, can solve the problems of increasing message calculation overhead, increasing message length, performance constraints, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0029] Such as figure 1 In the schematic diagram of the multicast communication security mechanism shown, the group administrator is the security center of the entire system, a network entity trusted by both the sender and the receiver, and is responsible for the management and distribution of multicast security materials.
[0030] The multicast communication problem can be defined as follows: a multicast group is created by a group administrator, its members include senders and receivers, and a network entity can register as a sender or receiver. To implement this method, all senders and receivers have established security associations with the group administrator before joining the group, and the multicast communication process is divided into different stages. Therefore, the multicast communication signature mechanism can be defined as follows:
[0031] (1) Let S j is the sender authorized by the group administrator during phase j. When the receiver receives a message fr...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com
