Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Key management messages for secure broadcast

By introducing top-level key encryption and authentication signatures into the group key distribution protocol, the group key management message is optimized, the problem of excessive message size and computational consumption in group key distribution is solved, and high fault tolerance and security are achieved, which is applicable for broadcast and multicast systems.

Inactive Publication Date: 2007-04-25
TELEFON AB LM ERICSSON (PUBL)
View PDF2 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Frequent multicasting or broadcasting of such messages over a cellular network is usually extremely resource-intensive
There is also the question of which party will pay for the expensive radio link resources required to deliver the message
Therefore, such systems are immune to optimizations by entities that do not hold keys or other confidential information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key management messages for secure broadcast
  • Key management messages for secure broadcast
  • Key management messages for secure broadcast

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] Throughout the drawings, the same reference numerals will be used for corresponding or similar elements.

[0055] As schematically shown in Figure 4, a first aspect of the invention involves the introduction of a new abstraction layer containing top-level keys that are commonly used as MDP keys. The new abstraction layers are represented on top of the exemplary base protocols LKH and SD, respectively.

[0056] Figure 5 is a schematic flow diagram of a preferred basic embodiment of this aspect of the invention. In step S1 a new top-level key is established (eg for media protection) and in step S2 the top-level key is preferably encrypted according to the output key of the particular group key distribution protocol used. Then, at step S3, the authentication signature is applied to at least the encrypted top-level key. In step S4, the group key management message is modified by eg adding the encrypted top-level key and the authentication signature in the same message ele...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention involves establishing a top-level key and optionally also a verification tag. The top-level key is used as the MDP key for encrypting a broadcast medium. Only the part of the key message that contains the encrypted top-level key is authenticated, e.g. using a signature or a Message Access Code (MAC). Any known group-key distribution protocol can be used that is based on the creation of a hierarchy of keys. Examples of such methods are the LKH and SD methods. The group-key distribution protocol output key H, traditionally used as the MDP key, or a derivative thereof is used to encrypt the top-level MDP-key. The invention, further, includes optimization of a group-key message by eliminating unnecessary message components relative a specified group or sub-group of users. The optimization can be made in dependence of contextual data such as user profile, network status, or operator policies.

Description

technical field [0001] In general, the present invention relates to the distribution of key messages for the derivation of media keys for decoding and authenticating secure broadcasts, and in particular to the authentication and optimization of such messages. Background technique [0002] For wireless applications as well as standard data communications, broadcast and multicast enable efficient distribution of content to large groups of receivers, as schematically illustrated in FIG. 1 . In the following, the term "broadcast" will be used to denote broadcast as well as multicast. Recent efforts have focused on broadcasting over wireless networks, and key topics will utilize the wireless link as efficiently as possible, eg in order to reduce the time for medium access. Another theme of keys of interest is to provide secure broadcasts. Therefore, encryption of content is an important enabler for commercial broadcasting services. From the user's point of view, authentication...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04L9/08
CPCH04L9/0836H04L9/3247H04L9/3234H04L2209/601H04L9/007
Inventor M·约翰逊F·林德霍姆
Owner TELEFON AB LM ERICSSON (PUBL)
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products