Supercharge Your Innovation With Domain-Expert AI Agents!

Management of group secrets by group members

A group key and key technology, applied in the field of group secret management, can solve the problem that the broadcaster does not use it

Active Publication Date: 2014-05-14
KONINKLJIJKE PHILIPS NV
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] If a broadcaster outside the device group needs to broadcast the message to all devices in the device group, then it has the problem of the simple scheme described above, since there are no non-addressable devices, and thus the broadcaster has no key to use

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Management of group secrets by group members
  • Management of group secrets by group members
  • Management of group secrets by group members

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The following description of an embodiment of the present invention is directed to the 1 elastic solution.

[0031] 1. Establishment of device key and device group key when adding a device to a device group

[0032] refer to figure 2 , the old device group 210 includes member devices: device_1 211 , device_2 212 , device_3 213 , . . . , device_N 21N. When a new device Device_N+1 221 joins the device group, a new device group 220 is formed. For clarity, the original group of N devices is labeled as old device group 210 and the expanded group is labeled as new device group 220 . It should be understood that each device in the group of devices includes at least a network interface for communicating with other devices and a processing unit with hardware and software components for performing encryption, decryption and deal with.

[0033] Such as figure 2As shown in , there are multiple devices Device_1 211, Device_2 212, Device_3 213, ..., Device_N 21N in the old d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method of adding a new device (221) to a device group (210), the device group (210, 220) including a plurality of devices, wherein each device in the device group possesses a device group key and device keys of all other devices in the device group for encryption of messages, except its own device key. The method includes: establishing a secure connection between the new device (221) and a first device (211) in the device group (210); sending, by the first device (211) in the device group (210), the device group key and device keys of all other devices (212, 213, ..., 21N) in the device group (210) to the new device (221); distributing, by one of the other devices (212, 213, ..., 21N) in the device group (210), the device key of the first device (211) in the device group (210) to the new device (221); generating and distributing, by one of the devices (211, 212, 213, ..., 21N) in the device group (210), a device key of the new device (221) to all other devices (211, 212, 213, ..., 21N) in the device group (210). This approach is also generalized to k-resilient schemes.

Description

technical field [0001] The present invention relates to the management of group secrets, and more particularly, to a method and system for group members to manage group secrets. [0002] Certain embodiments herein are directed to key management of device groups, including initiating groups, expanding group membership, and reducing group membership without the need for a central authority to manage keys and distribute keys to group members. Certain embodiments further allow a device of a device group to send a secure message to any subgroup of devices among the group members, such that non-addressed devices cannot decrypt the message. Background technique [0003] Known message encryption schemes may be based on e.g. "Zero Message Broadcast" (ZMB) or "Broadcast Encryption"; see e.g. Amos Fiat and Moni Naor, Broadcast Encryption , 1993 (hereafter called Fiat & Naor). Fiat & Naor discuss broadcast encryption. In general, the term "broadcast encryption" can simply mean broadc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08
CPCH04L9/0838H04L63/065H04L9/0816H04L41/12H04L2209/24
Inventor J.A.C.伯恩森
Owner KONINKLJIJKE PHILIPS NV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More