Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and apparatus for authenticating multicast messages

A message and multicast technology, used in digital data authentication, user identity/authority verification, information technology support systems, etc.

Inactive Publication Date: 2016-08-10
SIEMENS AG
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, this approach has significant disadvantages: there is a significant computational overhead for creating the digital signature and for verifying said data signature by all receiving field devices, and the relative The corresponding field device must have the corresponding resources for performing this calculation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for authenticating multicast messages
  • Method and apparatus for authenticating multicast messages
  • Method and apparatus for authenticating multicast messages

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] As can be seen from FIG. 1, the authentication method for authenticating multicast messages according to the invention can be used, for example, in a peer-to-peer system 1 with a plurality of field devices 2-1, 2- 2, 2-3, ..., 2-m. The field devices 2-i can communicate with each other via wireless or wired message connections by exchanging messages with each other. The field device 2-i can be a permanently installed field device, but also a mobile field device. Field device 2-i can send messages as a sending device and can receive messages as a receiving device. If an event is recognized by a field device (e.g. field device 2-i shown in Fig. 1), field device 2-i can act as a sending device to send the multicast message MC-N to the remaining field devices of point-to-point system 1 , as shown in Figure 1. Field devices 2-i can be, for example, measuring devices, monitoring devices or other control devices.

[0051] FIG. 2 shows a block diagram of a possible embodimen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The method for authenticating a multicast message has the following steps: Computing (S1) an initialization hash chain by a sending device based on an anchor value of the sending device and taking the last link of the initialization hash chain as an initialization phase (IP) as initialization The function value is assigned to at least one receiving device, receives (S2) the multicast message (MC‑N) by storing the received multicast message (MC‑N), receives (S3) the authentication key release message from the sending device by the receiving device (KRM), where the Authentication Key Release Message (KRM) contains the encrypted authentication key (K) released by the sending device for authentication of the stored multicast message (MC‑N), by means of a predetermined encrypted The function (H) calculates (S4) for the encrypted function value h(K) of the encrypted authentication key (K) contained in the authentication key release message (KRM), the value of the authentication key (K) obtained by the receiving device The calculated encryption function value h(K) is compared (S5) with the initialization function value (hn) previously assigned to the receiving device by the sending device in the initialization phase (IP) for checking the value contained in the authentication key release message ( the validity of the encrypted authentication key (K) in the KRM); and the multicast message (MC‑ N) Perform authentication (S6).

Description

technical field [0001] The present invention relates to a method and a device for authenticating multicast messages, especially for field devices exchanged between peer-to-peer systems and containing GOOSE (Generic Object Oriented Substation Events: Generic Object Oriented Substation Events: Generic Object Oriented Substation Events) respectively as valid data Event) message or multicast message of SMV (Sampled Measured Values: sampled measured value) message and a method and device for authentication. Background technique [0002] After detecting the event, the field device transmits the multicast message to other registered field devices, which receive the multicast message. These multicast messages are transmitted from the field device which has detected the event to the remaining field devices via a wireless or wired message connection. Such a field device can be, for example, a protective device such as an intelligent circuit breaker, which is located in a substation o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32
CPCH04L9/3242H04L9/3247H04L12/18H04L63/061G06F21/44H04L63/06Y04S40/20H04L9/50
Inventor R.法尔克S.弗里斯
Owner SIEMENS AG
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More