Key management method for multicast

A management method and multicast key technology, applied in the field of computer network applications, can solve problems such as difficult implementation and expansion, and achieve the effects of easy implementation and deployment, good communication overhead and security, and good storage overhead

Inactive Publication Date: 2010-04-07
SOUTHEAST UNIV
View PDF0 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This solution provides an infrastructure for secure multicast applications, makes feasible key management possible, has the advantages of controllability, manageability, high security, and strong versatility, and solves the difficulties in traditional solutions. and extended questions

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key management method for multicast
  • Key management method for multicast
  • Key management method for multicast

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] The present invention provides a complete set of multicast key management schemes, including multicast authentication, Layer 2 access control list ACL configuration, group key generation, key distribution triggered by group member initialization, group membership changes (users obtain / Loss of access to the group) triggers rekeying and rekeying when a timer expires. The invention proposes a multicast authentication method based on the session initialization protocol SIP to authenticate the user's multicast authority; through the simple network management protocol SNMP or the secure socket layer SSL interface, the access switch is configured with a two-layer ACL to realize The message filtering function of the multicast listener discovery protocol MLD has finely controlled the group members from the access switch port. On this basis, the present invention proposes a set of key distribution and update schemes, combined with the multicast listener discovery protocol of the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a key management method for multicast, which is the first to introduce bi-layer equipment control technology for assisting the key management for multicast. The technical scheme comprises a complete set of key management mechanisms for multicast, consisting of multicast authentication, bi-layer access control list ACL deployment and group key distribution and updating. The invention provides a multicast authentication method based on Session Initialization Protocol (SIP) for authenticating multicast rights of users, performs bi-layer ACL deployment on an access switch (AS) by Simple Network Management Protocol (SNMP) or Secure Sockets Layer (SSL) interface, thus realizing message filtering function of Multicast Listener Discovery (MLD) protocol. On the basis, the invention provides a key distributing and updating scheme and solves the problem of key updating in the traditional key management scheme when a member leaves by a bi-layer control mode, thus ensuring safety and efficiency in the process of the group key distribution and updating and having remarkable superiority in the aspects such as computational overhead, storage overhead, communication overhead and the like.

Description

technical field [0001] The invention is a set of novel multicast key management schemes used in the IPv6 network environment. It is mainly used to solve the key management problem of user-oriented massively scalable multicast services. The invention belongs to the technical field of computer network application. Background technique [0002] As a group communication model for multi-point transmission and multi-party cooperative applications, multicast has broad application prospects in multimedia conferences, video-on-demand, multi-party online games, and computer collaborative work. The multicast sender only needs to transmit one copy of the data, and the network elements (such as routers and switches) copy and forward it for the receiver, which can not only reduce the processing overhead of the sender, but also reduce the transmission overhead on the network, making efficient large-scale Content distribution at scale becomes possible. The good scalability of multicast b...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06
Inventor 曹争殷鹏鹏陆正军
Owner SOUTHEAST UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products