Distributed key management system and key management method for streaming media in cloud environment
A key management system and key management technology, applied in the field of distributed key management systems and key management, can solve problems such as time delay, reduce key storage and transmission security, and affect user experience, so as to improve security Sexuality and cost reduction effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0030] figure 1 It is a schematic structural diagram of a distributed key management system for streaming media in a cloud environment according to Embodiment 1 of the present invention, as shown in figure 1 As shown, the distributed key management system for streaming media in the entire cloud environment is set in the first cloud security boundary 1, and the user groups who request streaming media services and provide The streaming provider of the streaming service.
[0031] In the embodiment of the present invention, the cloud security boundary refers to the dividing line between multiple different networks, which builds security protection between the inside and outside of the network. If it is necessary to clarify which network boundaries need to be protected, it can be determined through cloud security partition design, that is, define security assets according to business and information sensitivity, and then define security policies and security levels for security as...
Embodiment 2
[0083] When the number of users requesting services increases, in order to further alleviate the working pressure of the key management module 13, the performance of the key management system is improved by expanding some functions of the key generation and control server 131, such as Figure 4 shown.
[0084] Figure 4 It is a schematic structural diagram of a distributed key management system for streaming media in a cloud environment according to yet another embodiment of the present invention. figure 1 On the basis of , the key output control module 134 is added to help the key generation and control server 131 distribute the service key encrypted with the session key.
[0085] Specifically, the key output control module 134 includes a server group composed of several key output control servers, which are set in the fourth cloud security boundary 4, and the fourth boundary controller of the fourth cloud security boundary is set to only allow encryption The data informati...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


