Multicast security agent component and multicast encryption management method

A technology of multicast encryption and security proxy, applied in the field of key management, which can solve the problems that users cannot access current and future communication content, users cannot access communication content, etc.

Inactive Publication Date: 2015-12-16
HENAN UNIV OF SCI & TECH
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In the existing secure multicast technology, regardless of the use of symmetric (private key) encryption algorithms and asymmetric (public key) encryption algorithms, when a user joins or quits the group, the key in the group must be updated, so that the newly joined Users who log out do not have access to past communications, and users who log out do not have access to current and future communications

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multicast security agent component and multicast encryption management method
  • Multicast security agent component and multicast encryption management method
  • Multicast security agent component and multicast encryption management method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] one, Multicast Security Agent Component

[0031] In general, agents are characterized by autonomy, adaptability, and cooperation [3] , can decide what to do next according to its state, without human or other external intervention. The multicast security agent (SecurityAgent) component is mainly composed of four modules: security module, communication module, multicast module and knowledge base module.

[0032] (1) Security module

[0033] The security module provides services related to intranet security in the area where the agent is located, and the valuable information it collects is stored in the knowledge base. The security module is composed of sub-modules such as anti-virus, intrusion detection, vulnerability scanning, access control, disaster recovery and patch upgrade.

[0034] (2) Communication module

[0035] The communication module is mainly used for exchanging information between agents, intranet hosts and agents. The sent request information includ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a multicast security agent component and a multicast encryption management method. The file encryption and decryption sub-module in the multicast module is a specific execution module for multicast users to perform message or file encryption / decryption, and adopts the RSA algorithm as the multicast encryption / decryption algorithm, the user's private key is used as the decryption key. After the system is authenticated, if some users on the intranet need to communicate in the group, the group key composed of the product of all members' private keys can guarantee the security of the multicast. When a user joins or an old user exits, by updating the group key, the newly joined user cannot access the communication content before joining and the exiting user cannot access the communication content after exiting, realizing one-key encryption in the multicast group. With the function of decrypting the key, when the group members change, there is no need to update the keys (private keys) of other users in the group. Forward secrecy, backward secrecy, and collusion resistance.

Description

technical field [0001] The invention belongs to the technical field of key management, and relates to a multicast security agent component and a multicast encryption management method. Background technique [0002] When the same message must be delivered to multiple receivers, multicast is a better communication model. Multicast communication reduces the overhead of the sender and the network medium. The application of encryption algorithms is a practical method for secure multicast communication over an unreliable network medium. Encryption algorithms are divided into symmetric (private key) encryption algorithms and asymmetric (public key) encryption algorithms. Symmetric encryption algorithm has fast encryption and decryption speed, high encryption strength, and difficult key distribution and management; asymmetric encryption algorithm has slow encryption and decryption speed and simple key management. [0003] For example, a session encryption key SEK (key of a symmetr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/08H04L29/06H04L12/18
Inventor 张平商建东王辉胡柯赵旭辉阴晶魏泽国高晓锋
Owner HENAN UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products