Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A new safety group safety certificate generating method, communication method, and network system

A security credential and generation method technology, which is applied to security communication devices and key distribution, can solve the problems of heavy load and large amount of computation

Inactive Publication Date: 2007-10-24
PANASONIC CORP
View PDF3 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The problem in this case is: due to the hierarchical tree structure, when a new security group is to be formed, it is necessary to generate a new set of group keys for the key tree structure. Therefore, for the production group As far as the central server of the group key is concerned, not only the amount of calculation is relatively large, but also the relative load is relatively large
The limitation of this application is also the same as the previous application, because it is a hierarchical tree structure, so when several groups want to form a new security group, it is necessary to generate a new group for the key tree structure The group key, for the central server that makes the group key, not only has a large amount of calculation, but also causes a relatively large load

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A new safety group safety certificate generating method, communication method, and network system
  • A new safety group safety certificate generating method, communication method, and network system
  • A new safety group safety certificate generating method, communication method, and network system

Examples

Experimental program
Comparison scheme
Effect test

no. 3 example

[0052] In the third preferred embodiment of the present invention, the architecture of the secure group network system 1 is the same as that of FIG. 3 , and the internal frame architecture of the communication device 30 included in the KDC 11 and each member is the same as that of the first preferred embodiment, Members A and B are originally included in one security group, members C and D are included in another security group, and members A, B, C, and D are included in one security group as a whole. The situation described in this embodiment lies in the process steps performed when a member who is not the group initiator (member B is taken as an example in this embodiment) wants to leave the original security group.

[0053] Referring to Fig. 9, in this preferred embodiment, members A, B, C and D have become a security group at this moment, when member B wants to leave, at first member B can send out request (LeaveRequest) to member A earlier (Step 601 ), when member A recei...

no. 4 example

[0058] In the fourth preferred embodiment of the present invention, the architecture of the security group network system 1 is the same as that of FIG. A and member B are originally included in one security group, members C and D are included in another security group, and members A, B, C, and D are included in a security group as a whole. The situation described in this embodiment is the group change process steps performed when a group initiator (member A is taken as an example in this embodiment) wants to leave the original security group.

[0059] Referring to Figure 10, when member A wants to leave the original security group, it will first send a leave request (Leave Request) to KDC11 in step 701 to notify KDC11 that it will leave the original security group and designate a new group initiator . In addition to the command to request to generate a new security group key, the leave request also includes information specifying the initiator of the new group. As far as thi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The disclosed security receipt generation method for new group comprises: when original group changes, such as new one adds or leaves, the central service center is notified to find out the minimal key in new group, generates relative security receipt with the key of the new group, and enciphers the receipt to send all members in new group. This invention reduces system loading.

Description

technical field [0001] The present invention relates to a group communication (Group Communication) method, in particular to a method and device for making a security credential in a dynamic group communication (Dynamic Group Communication). Background technique [0002] Due to the advancement of communication services and its boundless convenience, the services built in group communication are also increasing day by day, such as: video conference (Video Conference), Internet phone (IPtelephone) or chat room (Chat room) and so on. In group communication, ensuring the privacy of communication is a key point to be considered. In order to establish group communication security, a secure group key (secure group key) is usually used to protect information transmitted between groups. The secure group key is generated by a key distribution center (KDC) and transmitted to group members. [0003] A typical secure group communication system is shown in FIG. 1 . The system 1 includes...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L29/06H04L12/18
CPCH04L63/065H04L9/0833
Inventor 邱川峰
Owner PANASONIC CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products