Unlock instant, AI-driven research and patent intelligence for your innovation.

One-way security authentication method and system in digital content protection system

A technology for protecting systems and digital content, applied in the field of information security, can solve the problems of inability to quickly authenticate the master key, the large list of transfers, and the time-consuming increase of authentication, so as to reduce invalid authentication, improve efficiency, and improve authentication efficiency.

Active Publication Date: 2021-12-21
SHENZHEN NAT ENG LAB OF DIGITAL TELEVISION
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, in the HDCP standard, HDCP Reapter needs to rely on HDCP Reaper to report the IDs and levels of all connected devices layer by layer to perform revocation checks and layer restrictions on connected devices after authentication. This reporting process needs to pass ID lists between each interface along the way. , hierarchical information and integrity verification, when the number of devices is large, the transfer list will be relatively large, and when the device connection topology changes frequently, this process will be carried out frequently, which will bring a certain communication and computing burden and reduce efficiency
However, the full authentication method in the DTCP standard cannot perform fast authentication based on the master key established in the past. Each authentication needs to perform asymmetric key negotiation, signature, and signature verification operations, which will increase the time-consuming authentication.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • One-way security authentication method and system in digital content protection system
  • One-way security authentication method and system in digital content protection system
  • One-way security authentication method and system in digital content protection system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0054] See figure 1 , figure 1 It is a schematic diagram of a safe authentication method of a digital content protection system in accordance with an embodiment of the present invention, including:

[0055] Step 1: Perform algorithm parameter configuration based on the algorithm requirements to generate the first full authentication message and send a first full authentication message to the response party.

[0056] In the present embodiment, a architecture of a digital content protection system includes a Source end, a Router and a content receiving end (SINK), where Source can directly establish a connection transmission with SINK The protected digital content, or Source is connected to SINK through Router, forward protected digital content to SINK.

[0057] In this embodiment, in the case where the Source end does not hold a certificate, complete the Source and the unidirectional authentication of the directly connected router or SINK and establish a shared key to deliver hiera...

Embodiment 2

[0126] See figure 2 , figure 2 It is a schematic diagram of a secure authentication method of responding to a digital content protection system according to an embodiment of the present invention, including:

[0127] Step 1: Receive the first fully authentication message and authenticate, when the responder does not exist that the primary key corresponding to the first identity, calculate the first master key while generating a second full authentication message;

[0128] Among them, the first master key corresponds to the first identity in the first full authentication message; the second full authentication message includes a second full authentication message identification, a second certificate list, a second CA certificate list, a second parameter list , Second signature and second message authentication code.

[0129] Specifically, the response party B receives the unidirectional authentication message transmitted by the initiator A, first needs to perform algorithm determin...

Embodiment 3

[0163] For a more clear explanation of the one-way authentication method provided by the present invention, the integrated initiator and the response party provide the fully certified procedures and rapid authentication processes provided by the present invention on the above embodiments.

[0164] See image 3 , image 3 It is a one-way full-certification basic flowchart provided by the embodiment of the present invention; the specific process includes the following steps:

[0165] S11: The initiator A is based on the algid calculation of DH negotiation parameters, determines whether or not to initiate authentication according to LD, and send Muniauth1.

[0166] S12: Response party B receives Muniauth1 and performs the following:

[0167] S12-1: Determine the LD and determine the algorithm according to the algflg, and store the LD, ALGID;

[0168] S12-2: Find the corresponding km does not exist, calculate the second signature S B (M), calculate the first master key, calculate the se...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a one-way security authentication method and system in a digital content protection system, wherein, the security authentication method of the initiator includes: performing algorithm parameter configuration according to the algorithm requirement identifier to generate a first complete authentication message, and sending a message to the responder Sending the first full authentication message; receiving the second full authentication message; authenticating the second full authentication message, saving the second master key after the authentication is passed, and generating a third full authentication message to facilitate the response The party authenticates the third full authentication message, thereby completing one-way security authentication. The present invention provides a one-way authentication scheme between entities with more comprehensive functions and stronger adaptability for the digital content protection system, and can perform full authentication or fast authentication according to the situation, thereby improving efficiency; at the same time, it supports multiple algorithm selections, and can be used in authentication The protocol implements connection-level control, making the algorithm application scenarios more extensive and flexible.

Description

Technical field [0001] The present invention belongs to the field of information security, and in particular, the present invention relates to a single-to-order secure authentication method and system in a digital content protection system. Background technique [0002] The digitization of multimedia content and the spread of the consumer digital electronic terminal make it easy to obtain copy of digital multimedia content and propagate, which makes high-definition digital media content easily occurred when transmitting between entities. The interests of copyright owners of digital content have caused great damage. In order to prevent digital content from being illegally copied, intercept and tampear, there is a HDCP (High-BandwidthDigital Content Protection System, High-Bandwidth Digital Content Protection System), DTCP (DigitalTransmission Content Protection, Digital Transfer Content Protection) and DICP ( Electronic Industry Standard SJT11407.1-2009 Digital Interface Content P...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/083H04L63/0876H04L63/16H04L63/0823
Inventor 高明杨浩然石颖赵海阔葛建华岳安军张沉思
Owner SHENZHEN NAT ENG LAB OF DIGITAL TELEVISION