Unlock instant, AI-driven research and patent intelligence for your innovation.

Distributed key management system and key management method for streaming media in cloud environment

A key management system and key management technology, applied in the field of distributed key management systems and key management, can solve problems such as time delay, reduce key storage and transmission security, and affect user experience, so as to improve security Sexuality and cost reduction effect

Active Publication Date: 2019-10-29
COMMUNICATION UNIVERSITY OF CHINA
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

It can be seen that the key management system in the current standard relies more on the hardware in the client terminal or the certificate provided by a third party, which will increase the cost for the operator
[0005] On the other hand, in the current key management mode, the client needs to directly access multiple servers that store key shares to obtain the key. Because the client can directly access the servers that store the key shares, it reduces the number of keys. Security during storage and transmission
At the same time, in the process of the client directly accessing multiple servers to obtain the key, the user experience is greatly affected due to the insufficient computing power of the client and the time delay on the information transmission path

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Distributed key management system and key management method for streaming media in cloud environment
  • Distributed key management system and key management method for streaming media in cloud environment
  • Distributed key management system and key management method for streaming media in cloud environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0030] figure 1 It is a schematic structural diagram of a distributed key management system for streaming media in a cloud environment according to Embodiment 1 of the present invention, as shown in figure 1 As shown, the distributed key management system for streaming media in the entire cloud environment is set in the first cloud security boundary 1, and the user groups who request streaming media services and provide The streaming provider of the streaming service.

[0031] In the embodiment of the present invention, the cloud security boundary refers to the dividing line between multiple different networks, which builds security protection between the inside and outside of the network. If it is necessary to clarify which network boundaries need to be protected, it can be determined through cloud security partition design, that is, define security assets according to business and information sensitivity, and then define security policies and security levels for security as...

Embodiment 2

[0083] When the number of users requesting services increases, in order to further alleviate the working pressure of the key management module 13, the performance of the key management system is improved by expanding some functions of the key generation and control server 131, such as Figure 4 shown.

[0084] Figure 4 It is a schematic structural diagram of a distributed key management system for streaming media in a cloud environment according to yet another embodiment of the present invention. figure 1 On the basis of , the key output control module 134 is added to help the key generation and control server 131 distribute the service key encrypted with the session key.

[0085] Specifically, the key output control module 134 includes a server group composed of several key output control servers, which are set in the fourth cloud security boundary 4, and the fourth boundary controller of the fourth cloud security boundary is set to only allow encryption The data informati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a distributed secret key management system and secret key management method for streaming media in a cloud environment. The secret key management system is arranged in a first cloud security boundary and includes an authentication authorization module, a streaming media encryption module and a secret key management module set in a second cloud security boundary. In the secret key management module is further provided with a secret key storage and recovery server group with a third cloud security cloud security boundary. The system can realize the indirect access of the server to the storage secret key, and greatly improves the security of the secret key management and greatly improves the capability of responding complex digital copyright protection environments with large user quantity, large streaming media business volume and more streaming media service types; and moreover, the system does not depend on hardware devices such as smart cards and third-party certificates and also reduces the cost of streaming media service providers.

Description

technical field [0001] The invention relates to the technical field of network communication security, in particular to a distributed key management system and key management method for streaming media in a cloud environment. Background technique [0002] With the development of Internet technology, the content of digital media is becoming more and more abundant, and the scope of its dissemination is also becoming wider and wider. In people's daily life, works of digital media are ubiquitous. Whether it is a simple cartoon, an interesting novel or a good-looking movie, these works embody the painstaking efforts of the creators. In order to protect the creator's copyright, Digital Rights Management (DRM, Digital Right Management) technology emerges as the times require. But at the same time, the development of piracy technology has also brought threats to DRM technology. [0003] The basic idea of ​​the existing DRM technology is to encrypt or confuse the content to be prot...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04N21/254H04N21/266
CPCH04N21/2541H04N21/26606H04N21/26613
Inventor 杨成沈萦华程颖烨李皓
Owner COMMUNICATION UNIVERSITY OF CHINA