Data broadcasting distribution protection method based on proxy re-encryption and security chips

A proxy re-encryption and security chip technology, which is applied in the fields of data distribution protection and data broadcast distribution protection, can solve the problems of high implementation cost and insufficient protection, and achieve the effect of strong protection

Inactive Publication Date: 2013-05-08
INST OF SOFTWARE - CHINESE ACAD OF SCI
View PDF2 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The purpose of the present invention is to propose an agent-based ...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data broadcasting distribution protection method based on proxy re-encryption and security chips

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The present invention will be described in detail below through specific embodiments and in conjunction with the accompanying drawings.

[0034] figure 1 It is a schematic diagram of the participants and the implementation flow of the data broadcast distribution protection method based on proxy re-encryption and security chip of this embodiment. The sequence of each step is not marked in the figure, mainly because the sequence of some steps is not strictly limited. For example, a data user may download data first and then register, or may first register and then download data.

[0035] The data broadcast distribution protection method of this embodiment includes the following specific steps:

[0036] 1) The premise is that the data owner wants to distribute his own data d, and requires that only the platform configured to meet the specific integrity PI can get d, where PI represents the specific configuration that the data owner believes can supervise and restrict the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a data broadcasting distribution protection method based on proxy re-encryption and security chips. The method includes that a data user adopts a general-purpose computer system provided with the security chips as computing equipment, before data is distributed, a data owner and the data user agree upon public security parameters and cryptology algorithms of both sides and the security chips acquire encryption keys, the data owner generates a data encryption packet, binds configuration requirements for hardware to the data encryption packet and then broadcasts the data encryption packet to a public channel, and the data user acquires the data encryption packet from the public channel, the security chips checks the configuration of the computer system, if the configuration requirements are met, the data encryption packet is re-encrypted and then the data user decrypts the re-encrypted data, and if the configuration requirements are not met, the decryption is rejected. The data broadcasting distribution protection method based on the proxy re-encryption and the security chips can ensure that a computing platform of the data user can obtain and use the distributed data only when specific configuration is met, the protection strength is strong, and the implementation cost is low.

Description

technical field [0001] The invention relates to a data distribution protection method, in particular to a data broadcast distribution protection method based on a proxy re-encryption method and a security chip, and belongs to the cross field of trusted computing and digital rights management technology in the field of information security. Background technique [0002] With the vigorous development of my country's information industry and the establishment and improvement of relevant laws and regulations, digital copyright protection technology has received more and more attention. One of the core issues in the field of digital rights management is to ensure that data can only be distributed and used in a secure manner. Security here contains at least two meanings: first, data can only be used by authorized users; second, data can only be used by users in a predictable and pre-agreed manner. [0003] In many cases, the correct hardware configuration of a data consumer's com...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L12/18
Inventor 冯登国初晓博秦宇奚瓅王维谨
Owner INST OF SOFTWARE - CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products