Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Safety multicast method based on protocol of conversation initialization

An initialization protocol and secure multicast technology, applied in the field of secure multicast, can solve problems such as inability to adapt to complex network environments and scalability requirements

Inactive Publication Date: 2006-12-06
SOUTHEAST UNIV
View PDF0 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, most of the security multicast systems proposed are researched on a certain security problem in multicast and given solutions, which cannot solve all the security requirements required to provide multicast services as a whole
Moreover, none of these solutions can adapt to the complex network environment and scalability requirements in a large-scale network environment.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety multicast method based on protocol of conversation initialization
  • Safety multicast method based on protocol of conversation initialization
  • Safety multicast method based on protocol of conversation initialization

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0071] The solution of the present invention consists of three parts: multicast source and receiver access control and group key management, Internet Group Management Protocol / Multicast Receiver Discovery Protocol (IGMP / MLD) adapter, and regional MCS deployment, specifically as follows:

[0072] 1. Multicast source and receiver access control and group key management

[0073] MSSIP source authentication adopts a two-stage scheme according to the hierarchical characteristics of the network. Since the core network is usually a WAN, with large traffic and a wide geographical area, although the link bandwidth of the recently constructed core network has reached 10G, there are still a large number of packet losses on the network, and the impact of packet loss is even greater. Therefore, MSSIP adopts the HMAC authentication method in the core network; while the user access network has the characteristics of high speed and low packet loss rate, and can use multicast source authentica...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The safe multicast method is a first method of using the protocol of conversation initialization to implement operation of safe multicast. The method presents a set of scheme for solving issue of safe multicast including access control of multicast source, access control for receiver, management of group key, authentication of multicast source, service statistics, and charging capability. The method includes procedures: using route in network to encrypt data of multicast to guarantee access control of service, and safe comm.; method for authenticating multicast source in two stages is adopted; when IGMP / MLD adapter layer implements the method, working mode of traditional multicast route system does not need to be changed; three expansion techniques including cluster of regional multicast control server, regional physical and logical segmentations. The expansibility is suitable to large-scale network environment, and concurrent use. The invention does not change core network.

Description

technical field [0001] The present invention is a method for performing secure multicast (MSSIP) in a large-scale network environment. It is mainly used to solve the security problem of large-scale multicast network, and belongs to the technical field of computer network technology application. Background technique [0002] Session Initiation Protocol (Session Initiation Protocol, SIP) is proposed by IETF in 1999 in an IP-based network, especially in a network environment with a structure such as the Internet, a signaling protocol for real-time communication applications . The so-called session refers to the data exchange between users. In an application based on the SIP protocol, each session can be a variety of data, such as ordinary text data, digitally processed audio and video data, or application data such as games. Great flexibility. As a standard proposed by the IETF, the SIP protocol largely borrows from other widely existing Internet protocols, such as HTTP and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06
Inventor 曹争王剑
Owner SOUTHEAST UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products