Group broadcast cipher key managing method based on physical layer

A technology of multicast key and management method, applied in the field of Internet security multicast, can solve the problems of high overhead and affecting the quality of multicast service, etc.

Inactive Publication Date: 2006-01-04
UNIV OF SCI & TECH OF CHINA
View PDF0 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the existing multicast key management method, the key update is carried out simultaneously for all users in the current multicast g

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Group broadcast cipher key managing method based on physical layer
  • Group broadcast cipher key managing method based on physical layer
  • Group broadcast cipher key managing method based on physical layer

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] Below in conjunction with accompanying drawing and embodiment, content of the present invention and the background technology on which it is based are described in detail:

[0031] (1) Simple Key Distribution Center (SKDC)

[0032] In the existing multicast model, any host is allowed to join the multicast group without verification, and there is no access control for the multicast participants. Any host can send a join request message to an adjacent multicast router, and the router sends a join request to the upper multicast tree. Once the join request is successful, the multicast tree will be extended to the subnet, and the host that sent the join request can receive multicast data.

[0033]For a communication service, the most practical and feasible security measure is to perform symmetric encryption on the service data (for example, using encryption algorithms such as DES). The characteristic of symmetric encryption is that the key for encrypting data and the key f...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses a kind of managing method for group transmission key secret code based on the physical levels of group transmission network. It relates to internet safety group transmission field, which is used as a means for graduating subgroup, group transmission key secret code administration and group transmission communication in the group transmission service, thus reducing the expenses for the renewal of the group key secret code. The source of group transmission uses the local subgroup communication key secret code with the SEK data, transmit it to the physical subgroup; and after the local physical subgroup of the group safety agent has received, deciphered it, then it uses the communication key secret code with enciphered data of the logical subgroup to transmit it to other physical subgroups, and the other physical subgroups of the group safety agents, having received it, use the logical subgroup communication key secret code with encryption group to transmit it to the group transmitting receivers of the physical subgroup. The group transmitting receivers use the local transmission key secret code to obtain data through decryption. The invention can effectively divide the subgroups and resolve the problem of the key secret code administration of the safety group transmission, thus reducing the expenses for the renewal of the group transmission key secret code without limitation to scope and with favorable expansion.

Description

Technical field: [0001] The invention relates to the field of Internet security multicast, and is used for subgroup division, multicast key management and multicast communication methods in multicast service. Background technique: [0002] Multicast technology can save network resources and is convenient to use in one-to-many and many-to-many situations. Multicast technology is increasingly applied to various broadband services, such as news on demand, video conferencing, and so on. [0003] Figure 1 shows a network topology diagram of a multicast service. The multicast sending source (sender, Sender) accesses the network through a multicast router (Multicast Router, MR), and sends multicast data to the multicast address (such as 192.168.2.9 in Figure 1); The network sends a joining request message (IGMP), joins the multicast group as a multicast member (Receiver / Member), and receives multicast data (such as 192.168.3.11 and 192.168.6.141 in Figure 1); the subnet does not ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/16H04L12/56H04L12/18
Inventor 洪佩琳朱文涛刘利王贵竹熊继平
Owner UNIV OF SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products