Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and apparatus for authenticating multicast messages

A message and multicast technology, applied in digital data authentication, user identity/authority verification, information technology support system, etc.

Inactive Publication Date: 2013-05-08
SIEMENS AG
View PDF3 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, this approach has significant disadvantages: there is a significant computational overhead for creating the digital signature and for verifying said data signature by all receiving field devices, and the relative The corresponding field device must have the corresponding resources for performing this calculation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for authenticating multicast messages
  • Method and apparatus for authenticating multicast messages
  • Method and apparatus for authenticating multicast messages

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] as from figure 1 As can be seen in , the authentication method for authenticating multicast messages according to the invention can be used, for example, in a peer-to-peer system 1 with a plurality of field devices 2-1, 2-2, 2- 3, ..., 2-m. The field devices 2 - i can communicate with each other via wireless or wired message connections by exchanging messages with each other. The field devices 2-i can be permanently installed field devices, but also mobile field devices. The field device 2-i can send messages as a sending device and can receive messages as a receiving device. If passed through a field device (such as figure 1 The field device 2-i) shown in the event recognizes the event, then the field device 2-i can act as a sending device and send the multicast message MC-N to the remaining field devices of the point-to-point system 1, as in figure 1 shown in . Field devices 2 - i can be, for example, measuring devices, monitoring devices or other control ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Method for authenticating a multicast message having the following steps: An initialization hash chain is calculated (S1) by a transmitter on the basis of an anchor value for the transmitter, and the last chain link in the initialization hash chain is distributed as an initialization function value to at least one receiver in an initialization phase (IP), a multicast message (MC-N) is received (S2) by a receiver, which stores the received multicast message (MC-N), an authentication key release message (KRM) is received (S3) from the transmitter by the receiver, wherein the authentication key release message (KRM) contains a cryptographic authentication key (K) released by the transmitter for the purpose of authenticating the stored multicast message (MC-N), a cryptographic function value h (K) is calculated (S4) for the cryptographic authentication key (K) contained in the authentication key release message (KRM) by the receiver using a prescribed cryptographic function (H), the cryptographic function value h (K) - calculated by the receiver - of the authentication key (K) is compared (S5) with the initialization function value (hn) distributed to receivers by the transmitter in advance in the initialization phase (IP) for the purpose of checking the validity of the cryptographic authentication key (K) contained in the authentication key release message (KRM); and the multicast message (MC-N) which comes from the transmitter and which is stored in the receiver is authenticated (S6) by the receiver using the cryptographic authentication key (K) which has been recognized as valid.

Description

technical field [0001] The present invention relates to a method and a device for authenticating multicast messages, especially for field devices exchanged between peer-to-peer systems and containing GOOSE (Generic Object Oriented Substation Events: Generic Object Oriented Substation Events: Generic Object Oriented Substation Events) as valid data respectively. Event) message or a multicast message of an SMV (Sampled Measured Values) message and a method and device for authenticating. Background technique [0002] After detecting the event, the field device transmits the multicast message to other registered field devices, which receive the multicast message. These multicast messages are transmitted from the field device which has detected the event to the remaining field devices via a wireless or wired message connection. Such a field device can be, for example, a protective device such as an intelligent circuit breaker, which is located in a substation of the power supply...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
CPCH04L2209/38H04L9/3247H04L63/06H04L12/18H04L9/3242H04L63/061G06F21/44Y04S40/20H04L9/50
Inventor R.法尔克S.弗里斯
Owner SIEMENS AG
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More