CN100438614C - Method for realizing distributing asymmetric video conference safety system - Google Patents

Method for realizing distributing asymmetric video conference safety system Download PDF

Info

Publication number
CN100438614C
CN100438614C CNB200610033703XA CN200610033703A CN100438614C CN 100438614 C CN100438614 C CN 100438614C CN B200610033703X A CNB200610033703X A CN B200610033703XA CN 200610033703 A CN200610033703 A CN 200610033703A CN 100438614 C CN100438614 C CN 100438614C
Authority
CN
China
Prior art keywords
user
source terminal
node
data source
tree structure
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB200610033703XA
Other languages
Chinese (zh)
Other versions
CN1819649A (en
Inventor
刘晓冬
郭兴锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Graduate School Tsinghua University
Original Assignee
Shenzhen Graduate School Tsinghua University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Graduate School Tsinghua University filed Critical Shenzhen Graduate School Tsinghua University
Priority to CNB200610033703XA priority Critical patent/CN100438614C/en
Publication of CN1819649A publication Critical patent/CN1819649A/en
Application granted granted Critical
Publication of CN100438614C publication Critical patent/CN100438614C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The present invention provides a method for realizing a distributed asymmetric safety system for video conferences, which comprises: a. a minimum spanning tree of application layer multicast is generated between a source terminal and each user terminal, a computer on the source terminal broadcasts a tree structure toward user computers to distribute and store public key information in the user computers, and the computer on the source terminal stores a public key of a direct sub node of the tree structure for generating a data encryption secret key (DSK); b. the computer on the source terminal encrypts DSK by using the stored public key and sends DSK to the computer on each direct sub node which uses a private key for decrypting, and the direct sub node uses a public key of the sub nodes of the direct sub node for encrypting after obtaining DSK and sends DSK to the sub nodes, by parity of reasoning until all of the nodes obtains DSK; c. encryption and transmission of data can be carried on. By using a management style of distributed secret keys, the public key information is distributed and stored in each user computer; performance bottlenecks and single point failures of a server in a concentrated management proposal of the secret keys can be avoided; the expandability and the reliability of the system can be improved greatly; potential safety hazards caused by entering and quitting dynamics of users can be solved.

Description

The implementation method of publicized asymmetrical video meeting safety system
Technical field
The invention belongs to technical field of computer multimedia, particularly a kind of implementation method of publicized asymmetrical video meeting safety system.
Background technology
Face-to-face talk is the mankind's the abundantest a kind of modes that express thoughts, and people can give full play to eyes, expression and action and play up language.For business, the be beyond expression thing of the convincing and appeal of chart, file, data form and so on of telephone talk.When enterprise or group need hold a meeting, often run into the situation (even being distributed in all over the world) that its each department or personnel can't concentrate.To this, people have proposed to utilize communication medium to open the demand of video conference.So-called video conference utilizes communication line that two or more meeting rooms are coupled together exactly, a kind of means of communication of holding a meeting with TV mode.The principal character of video conference is to transmit the image etc. of participant's image, sound and meeting material chart and correlate in real time, makes the participant who holds the different location can see shadow on hearing the news, as being sitting in meeting in same the meeting room.
Present video conferencing system mostly adopts the program architecture of client-server, with simulated mode transmission tone video data.Under the bigger situation of parliamentary dimension, server end there is higher hardware requirement, makes whole system not possess good expandability.Simultaneously because the analog data transmissions occupied bandwidth, apparatus expensive (needing a lot of proprietary hardware devices), upgrading inconvenience so running cost is very high, is difficult to popularize.
The progress of digital video and Audiotechnica has caused the revolution of computer and network, and has opened up new design space for the application of computer system.The progress of express network technology, distributed proccessing, multimedia messages treatment technology, multimedia workstation technology etc. is that the development of distributed digital video conferencing system is laid a good foundation.Countries in the world are all in the research of carrying out the digital video meeting energetically, as the Picture Tel company of the U.S., Cornell university at present, SunMicrosystems, VCON company, the Sony of Japan, the INRIA SophiaAntipolis of the TANDBERG of Norway and France etc.American I n-Stat/MDR has announced the investigation result about video conferencing system: till 2006, the world market of video conferencing system will be 2,200,000,000 dollars scale from 7.72 hundred million dollars of growths of calendar year 2001.
The initial research of digital video conference system mainly concentrates on LAN and ATM net, but considers popularizing of Internet, needs the digital video conference system of a kind of suitable Internet of exploitation.It utilizes the PC computer that signals such as file, image, Voice ﹠ Video are combined together, and can pass to all over the world by the Internet network.Because the raising of jamming in computer CPU speed, needed the process of the video data encoding that special equipment carries out in the past, can transfer to computer now and finish, on effect, there is not too big difference.Less investment on hardware device, maintenance is little, becomes the most cheap and good-quality solution.
Internet is the applied environment of a complexity, when the means of communication of open, convenience is provided, has also brought a lot of uncertain potential safety hazards.Video conference carry out can relate to the secret information that some are related to country, company, organize interests inevitably in the process.In order to guarantee that these secret informations are not stolen easily, revised and destroy in the process of transmission, we need provide certain safety precautions for video conferencing system.The safety precautions of video conference can be encrypted by giving the transmission data usually, and a series of means such as the participant member authenticates are realized.
At the research initial stage in video conference, meet H.320, H.323 the centralized product of agreement (being the client-server pattern) accounts for dominant position on market; Along with distributed computing technology, the proposition of new ideas such as grid will occupy main status based on the video conferencing system of application layer multicast in the overall market, also become one of present main direction of studying.
At present, be based Internet with the ICP/IP protocol, be network size or number of users all present exponential increase.Many units have all constructed the in-house network (Intranet) of oneself, exchange to realize internal with external data.Based on the distributed security digital video conference system of IP network, put forward in order to satisfy this demand of people just.Low-cost and the simplicity that is connected Internet made it become in the enterprise with enterprise between the very tempting media of communicating by letter.Simultaneously, being extensive use of also of wireless network further strengthened the risk that communication data is eavesdropped.Encryption technology is used for providing protection at eavesdropping.It reads by the personnel that make information can only be had the required key of data decryption, and security information is provided.Whether it and third party have nothing to do by Internet data intercept bag, and data still can't read.
Encryption is to guarantee one of information in the computer system and important means of the information security in the network.Encryption comprises uses key that data are encoded, thereby makes the earwig can't read these data easily.Be called ciphertext through ciphered data, original data become expressly.Be called deciphering from ciphertext to transfer process expressly.Encryption is divided into two kinds of symmetric cryptography and asymmetric encryption.
Symmetric cryptography refers to the cryptographic algorithm that the encryption and decryption algorithm all uses same key.Specific as follows:
Cryptographic algorithm (expressly, encryption key k)=ciphertext; Decipherment algorithm (ciphertext, encryption key k)=expressly;
Owing to when the encryption and decryption data, used same key, so this key must be maintained secrecy.Such encryption is also referred to as secret key encryption, or conventional the encryption.Obviously, one of difficult point of this type systematic is to transmit the key problem,
Key is easily illegally stolen in transmitting by network.
Asymmetric encryption comprises two keys: a PKI and a private key are also referred to as public key encryption.Encrypt if information uses public-key, by using corresponding private key can decipher these information, process is as follows so:
Cryptographic algorithm (expressly, PKI)=ciphertext; Decipherment algorithm (ciphertext, private key)=expressly;
If information uses private key to encrypt, by using its corresponding PKI can decipher these information, process is as follows so:
Cryptographic algorithm (expressly, private key)=ciphertext; Decipherment algorithm (ciphertext, PKI)=expressly;
As seen, adopt asymmetric encryption mode people can not use the used key of encryption to decipher a message, and, go out another key from a cipher key calculation and say so very difficult from mathematics.Private key has only the user to know, PKI is not maintained secrecy, and can obtain by the common list service.Adopt the video conference safety system of distributed asymmetric encryption techniques not see that relevant document discloses at present.
Summary of the invention
In view of in traditional centralized security management pattern, central server can become performance bottleneck and produce Single Point of Faliure, can't satisfy the needs of extensive video conference, do not possess good technical problems such as extensibility, the invention provides a kind of scheme that adopts distributed asymmetric encryption techniques to make up video conference safety system, to satisfy the demand that increases day by day based on the video conferencing system of internet.
The present invention adopts distributed asymmetric encryption techniques to make up the video conference safety system scheme, be different from traditional client-server pattern from general frame, it is all keys of storage system on central server not, but are distributed on each subscriber computer of system.Its mode of transmitting by the unsymmetrical key distributed storage at first with the public key information distributed store in each subscriber computer of system, and then send data encryption key (DSK) to all user endpoints step by step, carry out encryption, the transmission of audio frequency and video and shared data information then.
The implementation method of publicized asymmetrical video meeting safety system of the present invention comprises the steps:
A, data source terminal generate an application layer multicast minimum spanning tree between data source end and each user side of participating in a conference, this tree structure is broadcasted to each user node machine, make each user node machine all obtain the public key information table of its each child node of subordinate, the data source terminal is preserved the PKI in its unsymmetrical key of each direct child node; On the other hand, the data source terminal generates data encryption key (DSK), and is updated periodically it;
B, data source terminal use behind the public key encryption data encryption key of being preserved with its by network security be transferred to corresponding each direct child node machine, each direct child node machine is deciphered with the private key of oneself preserving, obtain behind the data encryption key (DSK) again to divide supplementary biography toward these subordinate's child nodes with the public key encryption data encryption key of each child node of subordinate of its storage and by network, so analogize, all obtain data encryption key up to all nodes;
C, then, the data source terminal sends audio frequency and video and other shared data of encrypting with data encryption key.
The public key information of system of the present invention be distributed store in each user node machine of described tree structure, the data source terminal is only stored the PKI in its unsymmetrical key of each direct child node.
When new user added and/or find to have the user to withdraw from, the inventive method also can comprise the steps:
Add fashionable as new user, the data source terminal regenerates new application layer multicast minimum spanning tree, make each user node machine all obtain the public key information table of its each child node of subordinate to each user node machine broadcasting this tree structure, preserve the PKI of its each direct child node; Upgrade data encryption key (DSK), and the operation of execution in step b passes to each user endpoints with new data encryption key, data source is followed encryption, the transmission of follow-up data information then.
When the user withdraws from, the data source terminal upgrades data encryption key (DSK) immediately, and the corresponding node at user place is withdrawed from deletion from the multicast overlay network, regenerate minimum spanning tree, make each user node machine all obtain the public key information table of its each child node of subordinate to each user node machine broadcasting this tree structure, preserve the PKI of its each direct child node; And the operation of execution in step b passes to each user endpoints with new data encryption key (DSK), and data source is followed encryption, the transmission of subsequent sound video and shared data information then.
The present invention adopts distributed key management mode, at first with the public key information distributed store in each subscriber computer of system, and then sending data encryption key (DSK) to all user endpoints step by step, data source is carried out encryption, the transmission of audio frequency and video and shared data information then.Its public key information distributed store is in each subscriber computer of network, rather than centralized stores is in a certain central server or source terminal, the server performance bottleneck and the Single Point of Faliure of centralized key Managed Solution have been avoided, the extensibility and the reliability of system have been increased, the requirement of security of system and upgradability aspect can be fully satisfied, large-scale the Internet application environment can be applicable to.The present invention has simultaneously also solved the potential safety hazard that the user frequently adds and the dynamic that withdraws from is brought preferably, guarantee system forward and fail safe backward.
The present invention is with a wide range of applications, and can be used for the pursuing and capturing an escaped prisoner etc. of teleconference, remote monitoring, network visual telephone, emergency relief, operational commanding, banking, long-distance education and public security system based on the internet on the net.
Description of drawings:
Fig. 1 is a main flow chart of the present invention;
The application layer multicast minimum spanning tree structural representation of Fig. 2 for generating between the data source machine that participates in video conference and each subscriber computer;
Fig. 3 is a child node public key information distributed storage table;
Fig. 4 is for utilizing asymmetric public key system Data transmission encryption key DSK process schematic diagram;
Fig. 5 is the application layer multicast minimum spanning tree structural representation of new node after adding.
Embodiment
The present invention is further described below in conjunction with accompanying drawing.
With reference to Fig. 1,2, system at first generates an application layer multicast minimum spanning tree structure between data source terminal and each user's terminal of participating in a conference, make each user node machine all obtain the public key information table of its each child node of subordinate to the broadcasting of each user node machine this tree structure, and preserve the PKI in its unsymmetrical key of each direct child node; The data source end also is responsible for generating data encryption key (DSK), and is updated periodically it, and the cycle of the renewal of data encryption key is 1 hour~3 hours usually.
And then the data source terminal is transferred to each direct child node machine safely with it after using the public key encryption DSK that is preserved, each direct child node machine is deciphered with the private key of oneself preserving, obtain behind the DSK again to divide supplementary biography toward these child nodes with the public key encryption DSK of each child node of subordinate of its storage and by network, so analogize, all obtain DSK up to all nodes.Then, data source begins encryption, the transmission of data.
Wherein, the data source terminal is after generating an application layer multicast minimum spanning tree structure between data source end and each user side of participating in a conference, this tree structure is broadcast in each user node machine of participating in video conference, each user node machine obtains the tabulation of the user of the subordinate child node of oneself according to this tree structure, each user node machine also obtains the higher level's father node of oneself and to its PKI that sends oneself, has just preserved the public key information table of its each child node of subordinate like this in each user node machine simultaneously.The IP address that also comprises its each child node of subordinate in the public key information table of its each child node of subordinate of preserving in each user node machine.
For example, Fig. 3 is the child node j1-jn public key information distributed storage table in the user node j machine, wherein, showing PKI Pu (the j1)-Pu (jn) and the IP address of the child node j1-jn of subordinate correspondence, is that 219.223.172.38, PKI are Pu (j1) as the IP address of child node j1.
The public key information of system of the present invention be distributed store in each user node machine of described tree structure, the data source terminal is only stored the PKI in its unsymmetrical key of each direct child node.
Add fashionablely as new user, system wishes and can maintain secrecy to original communication information, prevents from can obtain original information after new user's adding system, promptly guarantees system's forward security.Therefore, system need regenerate new application layer multicast minimum spanning tree on the one hand, on the other hand, the data source end need upgrade DSK, and adopt the mode of above-mentioned unsymmetrical key distributed storage management, in each subscriber computer of network, and then data DSK sent the public key information distributed store to all user endpoints step by step, data source is followed encryption, the transmission of subsequent sound video and shared data information then.
Wherein, after the data source terminal regenerates new application layer multicast minimum spanning tree structure, this tree structure is broadcast in each user node machine of participating in video conference, each user node machine obtain according to this tree structure oneself the user of subordinate child node tabulation, each subscriber computer also obtains the higher level's father node of oneself and to its PKI that sends oneself, has just preserved the public key information table of its each direct child node like this in each user node machine simultaneously.
When the user withdrawed from, system must adjust, and made the user that withdraws from can't be with the information of original cipher key access system, the fail safe backward of assurance system.If the user's that withdraws from situation is not handled, user's the fail safe of withdrawing from the system that greatly to influence, the system that makes divulges a secret, may be fatal, therefore in case there is the user to withdraw from, the data source terminal must upgrade data encryption key (DSK) immediately, and the corresponding node at user place is withdrawed from deletion from the multicast overlay network, regenerate minimum spanning tree, and adopt the mode of above-mentioned unsymmetrical key distributed storage management, in each subscriber computer of network, and then DSK sent the public key information distributed store to all user endpoints step by step, data source is followed the encryption of subsequent sound video and shared data information then, transmission.
Wherein, the data source terminal is deleted the corresponding node that withdraws from the user place from the multicast overlay network, and after regenerating the minimum spanning tree structure, this tree structure is broadcast in each user node machine of participating in video conference, each user node machine obtains the tabulation of the user of the subordinate child node of oneself according to this tree structure, each user node machine also obtains the higher level's father node of oneself and to its PKI that sends oneself, has just preserved the public key information table of its each direct child node like this in each user node machine simultaneously.
Below use an embodiment, further specify with reference to Fig. 1-5.
The configuration of data source terminal:
CPU:Intel?P4?2.8GHz
Internal memory: 512M
Network interface card: 10/100M self adaptation
Camera: BOSER
Capture card: OSPREY 200
Mike: LABTEC
Operating system: Windows XP Professional
Each subscriber computer configuration:
CPU:Intel?P42.8GHz
Internal memory: 512M
Network interface card: 10/100M self adaptation
Camera: BOSER
Capture card: OSPREY 200
Mike: LABTEC
Operating system: Windows XP Professional
The specific implementation process is as follows:
Each subscriber computer of data source terminal, participation video conference all is connected to the internet.
1., after the session startup, generate an application layer multicast minimum spanning tree in logic according to the distribution situation of the user's terminal that participates in a conference, see Fig. 2 by the source terminal that sends audio frequency and video and other shared data.
2., the data source terminal generates data encryption key (DSK), it is 56 keys, key can be 56 a number arbitrarily, and can change arbitrarily the time.Wherein the number of minute quantity is considered to weak key, but can easily avoid them.All confidentiality depend on key.
3., each user node machine obtains the public key information table of its each child node of subordinate, the data source terminal is broadcast to Fig. 2 tree structure in each subscriber computer of participating in video conference, each subscriber computer obtains the tabulation of the user of the subordinate child node of oneself according to this tree structure, each subscriber computer also obtains the higher level's father node of oneself and to its PKI that sends oneself, has just preserved the public key information table of its each child node of subordinate like this in each user node machine simultaneously; The source terminal is also preserved the PKI in its unsymmetrical key of each direct child node.
In the exemplary embodiments, PKI adopts RSA Algorithm, the difficulty that the safety of RSA is decomposed based on big number.In order to produce two keys of PKI and private key, choose two big prime number p and q, the length of two numbers is the same, calculate product n=pq, picked at random key e then, make e and (p-1) (q-1) coprime, use euclidean expansion algorithm computation key d at last, to satisfy ed ≡ 1mod (p-1) (q-1), d=e then -1Mod ((p-1) (q-1)).E and n are PKIs so, and d is a private key.
4., the public key encryption DSK of data source terminal each direct child node of preserving with it, and the DSK after will encrypting mails to each direct child node respectively, after each direct child node obtains this enciphered message, private key with oneself is decrypted and obtains DSK, obtain behind the DSK again to divide supplementary biography toward these child nodes with the public key encryption DSK of each child node of subordinate of its storage and by network, each child node repeats said process again, Fig. 4 for example divides the subordinate child node 4,5,6 of supplementary biography toward it behind the public key encryption DSK of its node 4,5,6 of being preserved of child node 1 usefulness.After subordinate's child node 4,5,6 obtains this enciphered message, down propagate again behind the private key deciphering acquisition DSK with oneself, by that analogy, all obtained key DSK up to all subscriber computers that participates in a conference.When encrypting DSK, at first DSK is divided into the packet littler, each packet m than n iApplication encipher formula c i=m i e(mod n) obtains ciphertext block c i, all c iForm the ciphertext c after encrypting at last.Deciphering is during DSK, gets each grouping c after encrypting iAnd calculating m i=c i d(mod n), all m iForm expressly DSK at last.
5., then, the data source end just begins real audio frequency and video or other shared data of encrypting with DSK that send.
Key DSK passes to DES (Data Encryption Standard, data encryption standard) block encryption algorithm data is encrypted, and 64 plaintext is from the end input of algorithm, and 64 ciphertext is exported from the other end.DES is divided into left-half and right half part by initial permutation with clear packets, and each 32 long.Carry out 16 then and take turns identical computing (these computings are called function f), data combine with key DSK in calculating process.After taking turns through 16, about half part lump together through an end displacement, just produced ciphertext.In each is taken turns, secret key bits displacement, and then from 56 of key, select 48.The right half part of replacing data by an expansion is extended to 48, and combines with 48 keys by an xor operation, is replaced into 32 new bit data by 8 S-boxes with these 48, again with its displacement once.This four step computing has constituted function f.Then, by another XOR, the output of function f combines with left-half, and its result promptly becomes new right half part, and right half part originally becomes new left-half.Should operate and repeat 16 times, realize just that computing was taken turns in 16 of DES.
When new user added video conference, the data source terminal need regenerate a logic application layer multicast minimum spanning tree, and upgraded DSK, repeated 3. above-mentioned~5. operation then.The overhead of this maintenance is minimum, for example, if minimum spanning tree structure originally is Fig. 4, initiate node becomes the child node of node 5 in newly-generated minimum spanning tree, and other structures are constant, see Fig. 5, we only need the public key information table of modification node 5 to get final product so, also promptly only need to revise the public key information table of initiate subscriber computer father node of place node in new minimum spanning tree, the storage organization of other node is all constant, and this helps large-scale the Internet application environment.
After finding that the user withdraws from video conference, the data source terminal need regenerate a logic application layer multicast minimum spanning tree, and upgrades DSK, repeats 3. above-mentioned~5. operation then, the situation the when overhead of its generation adds video conference with new user.

Claims (10)

1, a kind of implementation method of publicized asymmetrical video meeting safety system is characterized in that comprising the steps:
A, data source terminal generate an application layer multicast minimum spanning tree between data source end and each user side of participating in a conference, with this tree structure to the broadcasting of each user node machine make each user node machine all obtain it each child node of subordinate the public key information table and make each user node machine send oneself PKI, the PKI in the unsymmetrical key of its each direct child node of data source terminal preservation to own higher level's father node according to this tree structure; On the other hand, the data source terminal generates data encryption key and is updated periodically it;
B, data source terminal use behind the public key encryption data encryption key of being preserved with its by network security be transferred to corresponding each direct child node machine, each direct child node machine is deciphered with the private key of oneself preserving, obtain behind the data encryption key again to divide supplementary biography toward these subordinate's child nodes with the public key encryption data encryption key of each child node of subordinate of its storage and by network, so analogize, all obtain data encryption key up to all nodes;
C, then, the data source terminal sends audio frequency and video and other shared data of encrypting with data encryption key.
2, method according to claim 1, it is characterized in that: among the step a, the data source terminal is after generating an application layer multicast minimum spanning tree structure between data source end and each user side of participating in a conference, this tree structure is broadcast in each user node machine of participating in video conference, each user node machine obtains the tabulation of the user of the subordinate child node of oneself according to this tree structure, each user node machine also obtains the higher level's father node of oneself and to its PKI that sends oneself, has just preserved the public key information table of its each child node of subordinate like this in each user node machine simultaneously.
3, method according to claim 2 is characterized in that: also comprise in the public key information table of its each child node of subordinate of preserving in each user node machine its each child node of subordinate the IP address.
4, method according to claim 1, it is characterized in that: add fashionable as new user, the data source terminal regenerates new application layer multicast minimum spanning tree, make each user node machine all obtain the public key information table of its each child node of subordinate to each user node machine broadcasting this tree structure, the data source terminal is preserved the PKI of its each direct child node; And the renewal data encryption key, the operation of execution in step b is passed to each user endpoints with new data encryption key.
5, method according to claim 4, it is characterized in that: after the data source terminal regenerates new application layer multicast minimum spanning tree structure, this tree structure is broadcast in each user node machine of participating in video conference, each user node machine obtain according to this tree structure oneself the user of subordinate child node tabulation, each subscriber computer also obtains the higher level's father node of oneself and to its PKI that sends oneself, has just preserved the public key information table of its each direct child node like this in each user node machine simultaneously.
6, according to claim 1 or 4 described methods, it is characterized in that: the public key information of system be distributed store in each user node machine of described tree structure, the data source terminal is only stored the PKI in its unsymmetrical key of each direct child node.
7, according to claim 1 or 4 described methods, it is characterized in that: when finding to have the user to withdraw from, the data source terminal upgrades data encryption key immediately, and the corresponding node at user place is withdrawed from deletion from the multicast overlay network, regenerate minimum spanning tree, make each user node machine all obtain the public key information table of its each child node of subordinate to each user node machine broadcasting this tree structure, the data source terminal is preserved the PKI of its each direct child node; And the operation of execution in step b is passed to each user endpoints with new data encryption key.
8, method according to claim 7, it is characterized in that: the data source terminal is deleted the corresponding node that withdraws from the user place from the multicast overlay network, and after regenerating the minimum spanning tree structure, this tree structure is broadcast in each user node machine of participating in video conference, each user node machine obtains the tabulation of the user of the subordinate child node of oneself according to this tree structure, each user node machine also obtains the higher level's father node of oneself and to its PKI that sends oneself, has just preserved the public key information table of its each direct child node like this in each user node machine simultaneously.
9, method according to claim 7 is characterized in that: the public key information of system be distributed store in each user node machine of described tree structure, the data source terminal is only stored the PKI in its unsymmetrical key of each direct child node.
10, method according to claim 1 is characterized in that: the cycle that the data source terminal upgrades data encryption key (DSK) is 1 hour~3 hours.
CNB200610033703XA 2006-02-16 2006-02-16 Method for realizing distributing asymmetric video conference safety system Expired - Fee Related CN100438614C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB200610033703XA CN100438614C (en) 2006-02-16 2006-02-16 Method for realizing distributing asymmetric video conference safety system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB200610033703XA CN100438614C (en) 2006-02-16 2006-02-16 Method for realizing distributing asymmetric video conference safety system

Publications (2)

Publication Number Publication Date
CN1819649A CN1819649A (en) 2006-08-16
CN100438614C true CN100438614C (en) 2008-11-26

Family

ID=36919304

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB200610033703XA Expired - Fee Related CN100438614C (en) 2006-02-16 2006-02-16 Method for realizing distributing asymmetric video conference safety system

Country Status (1)

Country Link
CN (1) CN100438614C (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
RU2460235C2 (en) * 2008-11-10 2012-08-27 Закрытое акционерное общество "Научно-производственное предприятие "Системные технологии защиты иформации" (ЗАО "НПП "СТЗИ") Facility to control sessions of secure video conferencing in coded communication network
CN104754571A (en) * 2013-12-25 2015-07-01 深圳中兴力维技术有限公司 User authentication realizing method, device and system thereof for multimedia data transmission
CN105302822B (en) * 2014-06-27 2020-07-31 中兴通讯股份有限公司 Method for reading and writing data of database and application response device
CN110414245B (en) * 2018-04-28 2023-09-22 伊姆西Ip控股有限责任公司 Method, apparatus and computer program product for managing encryption keys in a storage system
CN110446108B (en) * 2019-06-28 2022-04-22 中国传媒大学 Media cloud system and video encryption and decryption method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1224962A (en) * 1997-12-24 1999-08-04 国际商业机器公司 Cryptograph key distribution system
CN1363160A (en) * 1999-07-06 2002-08-07 松下电器产业株式会社 Distributed group key management scheme for secure many-to-many communication
CN1389042A (en) * 2000-06-15 2003-01-01 索尼公司 System and mehtod for processing information using encryption key block
US20040103086A1 (en) * 2002-11-26 2004-05-27 Bapiraju Vinnakota Data structure traversal instructions for packet processing

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1224962A (en) * 1997-12-24 1999-08-04 国际商业机器公司 Cryptograph key distribution system
CN1363160A (en) * 1999-07-06 2002-08-07 松下电器产业株式会社 Distributed group key management scheme for secure many-to-many communication
CN1389042A (en) * 2000-06-15 2003-01-01 索尼公司 System and mehtod for processing information using encryption key block
US20040103086A1 (en) * 2002-11-26 2004-05-27 Bapiraju Vinnakota Data structure traversal instructions for packet processing

Also Published As

Publication number Publication date
CN1819649A (en) 2006-08-16

Similar Documents

Publication Publication Date Title
CN109587132B (en) Data transmission method and device based on alliance chain
US6038322A (en) Group key distribution
Almaiah et al. A new hybrid text encryption approach over mobile ad hoc network
CN101197674B (en) Encrypted communication method, server and encrypted communication system
CN203912078U (en) Quantum safety video conference system
Choi et al. Efficient secure group communications for SCADA
Chan et al. Key management approaches to offer data confidentiality for secure multicast
US20070162750A1 (en) Method for changing a group key in a group of network elements in a network system
CN108540436B (en) Communication system and communication method for realizing information encryption and decryption transmission based on quantum network
GB2491896A (en) Secret key generation
CN108847928B (en) Communication system and communication method for realizing information encryption and decryption transmission based on group type quantum key card
CN203859823U (en) Quantum encrypted video conference terminal and system
CN102088352B (en) Data encryption transmission method and system for message-oriented middleware
CN100438614C (en) Method for realizing distributing asymmetric video conference safety system
CN106790259A (en) A kind of asymmetric across cryptographic system re-encryption, decryption method and system
JP2003521197A (en) Communication method by key encryption escrow and recovery system
CN111049738B (en) E-mail data security protection method based on hybrid encryption
JP5400395B2 (en) Data distribution system, key management apparatus, and key management method
Reshma et al. Pairing-free CP-ABE based cryptography combined with steganography for multimedia applications
Pal et al. Efficient and secure key management for conditional access systems
JP2001211154A (en) Secret key generating method, ciphering method, and cipher communication method
JPH10107832A (en) Cipher multi-address mail system
CN110321722B (en) DNA sequence similarity safe calculation method and system
Kester A public-key exchange cryptographic technique using matrix
US20110255695A1 (en) Key management method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20081126

Termination date: 20120216