Unlock instant, AI-driven research and patent intelligence for your innovation.

Method of constructing domain based on public key and implementing the domain through universal plug and play (UPnP)

By using public keys to create certificates and domain keys in the home network, combined with the UPnP protocol, an independent security domain is constructed, which solves the problem of content protection compatibility and security in the home network, and achieves safe use of content and wireless devices. seam compatibility.

Inactive Publication Date: 2005-04-06
SAMSUNG ELECTRONICS CO LTD
View PDF1 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, since a method of performing domain management through UPnP is still unknown, there is a need for a method of efficiently performing domain management using UPnP

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] Hereinafter, embodiments of the present invention will be described with reference to the drawings.

[0044] image 3 Represents the method of creating domains in a public key based architecture according to the present invention.

[0045] For the convenience of describing the present invention, it is assumed that each device to which the master device requesting to provide the content transmits the content has a set of unique secret key and public key or public key creation function when it is produced. At this point, the set of secret keys is used to extract secret values ​​from a secret information block (hereinafter referred to as "SIB") provided in broadcast encryption. The SIB is information for checking revocation of a device. A revoked device cannot extract the desired secret value from the SIB, while a legitimate device can extract the public secret value.

[0046] In a single domain, there is a master device 320 involved in building the domain. The master ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method of constructing a unique domain for preventing content from being illegally used by an unauthorized third person in a public key-based architecture and applying the constructed domain to a home network using universal plug and play (UpnP). The method of the present invention includes selecting one of controlled devices that are operable as a master device and determining the selected device as the master device; performing device authentication in such a manner that other controlled devices receive a secret information block from the determined master device and create certificates; and determining slave devices by selecting one or more devices among the authenticated controlled devices.

Description

[0001] This application claims the benefit of Korean Patent Application No. 10-2003-0068837 filed on October 2, 2003 in the Korean Intellectual Property Office, the disclosure of which is incorporated herein by reference in its entirety. Technical Field [0002] The present invention relates to authentication of devices existing in a domain, and more particularly, to a method of constructing a unique domain in a public key-based architecture for preventing content from being illegally used by unauthorized third parties and applying the constructed domain to a home network using Universal Plug and Play (UPnP). Background Art [0003] With the increasing development of digital and communication technology, a variety of content such as audio or video materials have become popular. A variety of technologies for preventing content from being illegally copied and unauthorized dissemination have been proposed. Specifically, technologies have been developed by which it is used to encr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G09C1/00G06F15/00H04L9/32H04L12/28H04L29/06
CPCH04L12/2803H04L63/0823H04L12/2807H04L63/0435G06F15/00
Owner SAMSUNG ELECTRONICS CO LTD