One-way security authentication method and system in digital content protection system
A technology for protecting systems and digital content, applied in the field of information security, can solve the problems of inability to quickly authenticate the master key, the large list of transfers, and the time-consuming increase of authentication, so as to reduce invalid authentication, improve efficiency, and improve authentication efficiency.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0054] See figure 1 , figure 1 It is a schematic diagram of a safe authentication method of a digital content protection system in accordance with an embodiment of the present invention, including:
[0055] Step 1: Perform algorithm parameter configuration based on the algorithm requirements to generate the first full authentication message and send a first full authentication message to the response party.
[0056] In the present embodiment, a architecture of a digital content protection system includes a Source end, a Router and a content receiving end (SINK), where Source can directly establish a connection transmission with SINK The protected digital content, or Source is connected to SINK through Router, forward protected digital content to SINK.
[0057] In this embodiment, in the case where the Source end does not hold a certificate, complete the Source and the unidirectional authentication of the directly connected router or SINK and establish a shared key to deliver hiera...
Embodiment 2
[0126] See figure 2 , figure 2 It is a schematic diagram of a secure authentication method of responding to a digital content protection system according to an embodiment of the present invention, including:
[0127] Step 1: Receive the first fully authentication message and authenticate, when the responder does not exist that the primary key corresponding to the first identity, calculate the first master key while generating a second full authentication message;
[0128] Among them, the first master key corresponds to the first identity in the first full authentication message; the second full authentication message includes a second full authentication message identification, a second certificate list, a second CA certificate list, a second parameter list , Second signature and second message authentication code.
[0129] Specifically, the response party B receives the unidirectional authentication message transmitted by the initiator A, first needs to perform algorithm determin...
Embodiment 3
[0163] For a more clear explanation of the one-way authentication method provided by the present invention, the integrated initiator and the response party provide the fully certified procedures and rapid authentication processes provided by the present invention on the above embodiments.
[0164] See image 3 , image 3 It is a one-way full-certification basic flowchart provided by the embodiment of the present invention; the specific process includes the following steps:
[0165] S11: The initiator A is based on the algid calculation of DH negotiation parameters, determines whether or not to initiate authentication according to LD, and send Muniauth1.
[0166] S12: Response party B receives Muniauth1 and performs the following:
[0167] S12-1: Determine the LD and determine the algorithm according to the algflg, and store the LD, ALGID;
[0168] S12-2: Find the corresponding km does not exist, calculate the second signature S B (M), calculate the first master key, calculate the se...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


