A command encryption method applied in broadcast communication

An encryption method and communication technology, which is applied to secure communication devices and key distribution, can solve problems such as the inability to decrypt ciphertext, and achieve the effects of improving security, preventing decryption, and increasing the difficulty of deciphering

Active Publication Date: 2019-04-23
HANGZHOU TUNERS ELECTRONICS
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

A broadcast encryption scheme satisfies fully collision resistance, that is, all revoked user cooperation cannot decrypt the ciphertext

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A command encryption method applied in broadcast communication
  • A command encryption method applied in broadcast communication
  • A command encryption method applied in broadcast communication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0032] This embodiment is an instruction encryption method applied in broadcast communication, comprising the following steps:

[0033] 1) The key serial number SSN and the system master key SKEY are set in the front-end equipment system, and the key serial number update command is obtained through operation A, and sent to the terminal equipment system, wherein the front-end equipment system is provided with a timer, The timer updates the key serial number SSN every one minute, and recycles steps 1)-4) after each update of the key serial number SSN, and the system master key SKEY is unique and fixed;

[0034] 2) The terminal equipment system receives the key serial number update instruction, and obtains the key serial number SSN through the inverse operation of operation A, and the terminal equipment system calculates the received key serial number SSN and the system master key SKEY preset in the terminal equipment B obtains the system dynamic subkey SSKEY;

[0035] 3) The fr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an instruction encryption method applied to broadcast communication, and the method is high in safety level and not likely to crack. When control operation is carried out on a terminal, a system dynamic sub key SSKEY is used to encrypt a control instruction message, and the terminal uses the SSKEY for decryption when receiving a broadcast message. A secret key serial number SSN is updated in real time, the SSKEY is updated in real time, and the encrypted message is not repeated within sufficiently long time. Communication in different times use different SSKEYs when the control message is sent, an SSKEY which is obtained after the terminal decrypts the message and is the same with the SSKEY in the last time is determine to be an invalid signal, no response is made to communication, safety measures are executed, and an aim of safe play is achieved.

Description

technical field [0001] The invention belongs to the technical field of encryption, and relates to the implementation of instruction transmission, encryption and decryption, and related specific control actions. More specifically, it relates to an instruction encryption method applied in broadcast communication. Background technique [0002] Broadcast encryption is a cryptographic system that transmits encrypted information to a group of users on an insecure channel. It allows the sender to select any set of users for broadcast encryption, and only authorized users can decrypt the ciphertext. Broadcast encryption has a wide range of practical application backgrounds, such as digital rights management, pay TV, satellite broadcast communication, etc. A broadcast encryption scheme is fully collision resistant, that is, all revoked user cooperation cannot decrypt the ciphertext. For a public key broadcast encryption scheme, the length of the user's private key, the length of the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/08
CPCH04L9/0891H04L63/0846
Inventor 章惠来赵震陈龙斌
Owner HANGZHOU TUNERS ELECTRONICS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products