Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

79 results about "Group key management" patented technology

Legal neighbor authentication method and device in group key management

The invention discloses a method for authenticating legal neighbor in group key management, which is characterized in that a member on local network requiring automatic group-key management service stores group-sharing keys and group-sharing algorithm. The method comprises the following steps: an authenticating member receives a first authentication value transmitted by an authenticated member and self authentication information of the authenticated member; the first authentication value can be acquired according to the group-sharing algorithm in a way that the authenticated member uses the group-sharing keys and the self authentication information of the authenticated member; the authenticating member uses the self authentication information of the authenticated member and combines the group-sharing keys to calculate a second authentication value according to the group-sharing algorithm; the authenticating member authenticates the authenticated member as a legal neighbor, while the first authentication value and the second authentication value is the same after comparison. The invention also discloses a device for authenticating the legal neighbor in the group key management. By applying the method and the device, entity authentication is not restricted on execution modes, and has better flexibility by adopting various execution modes.
Owner:HUAWEI TECH CO LTD

A method, system and device for securing multi-party communication

The utility model discloses a method that can realize multiparty communication security. The method is an improvement to the transport layer security protocol or the datagram transport layer security protocol, which aims to solve the disadvantages of bad portability and low deployment of the present multicast security protocol family and avoid the disadvantages of high input and big risk brought by developing a new technical proposal. The method comprises that: step a: identity authentication is performed to a group control key management server and a member equipment by running the transport layer security protocol or the datagram transport layer security protocol, and an initial session is created by negotiation; step b: the group control key management server and the member equipment distribute a group session and a key updating session to other group member equipments by running a group key management sub-protocol; step c: when the group control key management server detected a key updating event, the group control key management server and the member equipment update the key by running the group key management sub-protocol. The utility model also discloses a multiparty communication security system and equipment.
Owner:HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products