Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Decryption-key distribution method and authentication apparatus

a decryption key and distribution method technology, applied in the field of decryption key distribution methods and authentication apparatuses, can solve the problems of the inability to obtain the decryption key, and the length of time required therefor, so as to increase the number of sessions, the effect of safe distribution of the decryption key and not increasing the amount of communication dedicated

Inactive Publication Date: 2006-12-28
HITACHI LTD
View PDF8 Cites 39 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

The present invention provides a method for safely distributing a decryption key to a mobile terminal without increasing the amount of communication dedicated to decryption-key distribution. The decryption key can be updated without interruption while data is being received through a broadcast channel. The method also allows for the distribution of multiple decryption keys at different timings to prevent communication from converging at a certain period. Additionally, the method reduces the time required for a terminal to generate a decryption key and reduces the period from when a terminal starts a session to when the terminal starts receiving broadcast data.

Problems solved by technology

The patent text describes a method for securely transmitting data through a broadcast channel to mobile terminals by encrypting the data and using a decryption key to prevent unauthorized distribution. The method also includes steps for establishing a connection between the mobile terminal and a packet data network (PDN) for communication. However, the conventional methods require a long time to obtain the decryption key and perform many steps to establish a unicast radio resource for communication. The technical problem is to improve the speed and efficiency of the method by reducing the processing load on the PDN and BCMCS controllers and eliminating the need for a large-scale facility.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Decryption-key distribution method and authentication apparatus
  • Decryption-key distribution method and authentication apparatus
  • Decryption-key distribution method and authentication apparatus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

Hardware Configuration and Data Format

[0058]FIG. 1 is a view showing the structure of a 1×EV-DO network system according to an embodiment of the present invention.

[0059] The 1×EV-DO network system shown in FIG. 1 is used as an example in the following description. The present invention can also be applied to systems having a mobile-terminal authentication function and a broadcast channel through which encrypted data can be transmitted.

[0060] The network system includes, for example, a base station (access node: AN) 103, a packet control unit (packet control function: PCF) 104, an authentication unit (access network for authentication, authorization and accounting: AN-AAA) 105, a BCMCS service unit (broadcast serving node: BSN) 106, a packet-data service unit (packet-data serving node: PDSN) 107, a contents server 108, a BCMCS controller 109, and an authentication, authorization, and accounting unit (AAA) 110. To distribute a decryption key used for decrypting broadcast data to a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A decryption key for decrypting data from an access node is distributed to an access terminal intending to receive the data. An authentication unit receives a message for terminal authentication including a terminal identifier from the terminal and authenticates the terminal. The authentication unit refers to a content registration table having stored in advance the content type of a content which the terminal can receive, in association with the terminal identifier, according to the received terminal identifier to obtain a corresponding content type. The authentication unit refers to a decryption data base having stored in advance a decryption key and its valid period in association with a content type, according to the obtained content type to obtain a corresponding decryption key and valid period. The authentication unit sends an authentication result and the decryption key and valid period to the terminal or to a packet control unit.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Owner HITACHI LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products