Multicast security agent assembly and multicast encryption management method

A security proxy and multicast technology, applied in the field of key management, can solve the problems that users cannot access current and future communication content, users cannot access communication content, etc.

Inactive Publication Date: 2012-09-19
HENAN UNIV OF SCI & TECH
View PDF3 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In the existing secure multicast technology, whether using symmetric (private key) encryption algorithm or asymmetric (public key) encryption algorithm , when a user joins or quits

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multicast security agent assembly and multicast encryption management method
  • Multicast security agent assembly and multicast encryption management method
  • Multicast security agent assembly and multicast encryption management method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] one, Multicast Security Agent Component

[0031] In general, agents are characterized by autonomy, adaptability, and cooperation [3] , can decide what to do next according to its state, without human or other external intervention. The multicast security agent (Security Agent) component is mainly composed of four modules: security module, communication module, multicast module and knowledge base module.

[0032] (1) Security module

[0033] The security module provides services related to intranet security in the area where the agent is located, and the valuable information it collects is stored in the knowledge base. The security module is composed of sub-modules such as anti-virus, intrusion detection, vulnerability scanning, access control, disaster recovery and patch upgrade.

[0034] (2) Communication module

[0035] The communication module is mainly used for exchanging information between agents, intranet hosts and agents. The sent request information inclu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a multicast security agent assembly and a multicast encryption management method. File encryption and decryption submodules in a multicast module serve as specific execution modules for multicast users to encrypt/decrypt messages or files, an RSA (Rivest-Shamir-Adleman) algorithm is adopted as a multicast encryption/decryption algorithm, and private keys of the users are taken as decryption keys. After system authentication, if some users in an intranet need intra-group communication, a group key formed by a product of the private keys of all the members can ensure multicast security; and when new users participate in the intranet or the old users exit the intranet, the new users can not access communication contents before accessing and the exited users can not access the communication contents after exiting through updating the group key, therefore, the functions of encryption with one key and decryption with multiple keys in a multicast group are realized. When group members change, the keys (namely the private keys) of the other users in the group do not need to be updated, thereby realizing the encryption on the multicast information, and achieving important forward secrecy, backward secrecy, inner attack resistance and the like in security multicast.

Description

technical field [0001] The invention belongs to the technical field of key management, and relates to a multicast security agent component and a multicast encryption management method. Background technique [0002] When the same message must be delivered to multiple receivers, multicast is a better communication model. Multicast communication reduces the overhead of the sender and the network medium. The application of encryption algorithms is a practical method for secure multicast communication over an unreliable network medium. Encryption algorithms are divided into symmetric (private key) encryption algorithms and asymmetric (public key) encryption algorithms. Symmetric encryption algorithm has fast encryption and decryption speed, high encryption strength, and difficult key distribution and management; asymmetric encryption algorithm has slow encryption and decryption speed and simple key management. [0003] For example, a session encryption key SEK (a key of a symme...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L9/08H04L29/06H04L12/18
Inventor 张平商建东王辉胡柯赵旭辉阴晶魏泽国高晓锋
Owner HENAN UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products