Unlock instant, AI-driven research and patent intelligence for your innovation.

Service chain key management methods and devices

A key management and service chain technology, applied in the field of service chain key management methods and devices, can solve problems such as secure transmission

Inactive Publication Date: 2019-04-19
BEIJING ELECTRONICS SCI & TECH INST
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present invention provides a service chain key management method and device, aiming to solve the problem of how to securely transmit between VNF instances

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Service chain key management methods and devices
  • Service chain key management methods and devices
  • Service chain key management methods and devices

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0065] The following description and drawings illustrate specific embodiments of the invention sufficiently to enable those skilled in the art to practice them. The examples merely represent possible variations. Individual components and functions are optional unless explicitly required, and the order of operations may vary. Portions and features of some embodiments may be included in or substituted for those of other embodiments. The scope of embodiments of the present invention includes the full scope of the claims, and all available equivalents of the claims. Herein, various embodiments may be referred to individually or collectively by the term "invention", which is for convenience only and is not intended to automatically limit the scope of this application if in fact more than one invention is disclosed. A single invention or inventive concept. Herein, relational terms such as first and second etc. are used only to distinguish one entity or operation from another with...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses service chain key management methods and devices. The method comprises the following steps: acquiring system parameters P, Q, H1, H2, H3 and H4, a system private key componentdi and a private key Di of a serving node i, determining a private parameter ri, receiving Tj and Pj sent by an adjacent servicing node j, and when Tj and Pj meet a preset condition, determining a group communication key K. In the embodiment of the invention, a threshold group key management scheme based on an identity cryptosystem is disclosed, so that the forward safety and the backward safety of a service chain are ensured, and identity authentication is carried out on the adjacent VNFs (Virtual Network Functions).

Description

technical field [0001] The present invention relates to the field of computer technology, in particular to a service chain key management method and device. Background technique [0002] At present, operators need to use dedicated hardware devices when deploying network functions. In the existing network infrastructure, the definition of service chain is static, and service chain depends on the topology of the network. When adding or deleting network functions, the operation Vendors need to redeploy hardware devices, resulting in increased operating costs and expenditure costs. With the development of large-scale network virtualization, traditional methods are gradually replaced by Network Function Virtualization (Network Function Virtualization, NFV). The concept of NFV was proposed by the European Telecommunications Standards Institute (ETSI) in 2012, and related specifications have been formulated, such as basic framework, facility overview, and use cases. NFV redefines...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06
CPCH04L9/0833H04L63/06H04L63/065H04L63/083
Inventor 蒋华姚莹鞠磊张昕然侯梦茹
Owner BEIJING ELECTRONICS SCI & TECH INST