CN1819649A - Method for realizing distributing asymmetric video conference safety system - Google Patents

Method for realizing distributing asymmetric video conference safety system Download PDF

Info

Publication number
CN1819649A
CN1819649A CN 200610033703 CN200610033703A CN1819649A CN 1819649 A CN1819649 A CN 1819649A CN 200610033703 CN200610033703 CN 200610033703 CN 200610033703 A CN200610033703 A CN 200610033703A CN 1819649 A CN1819649 A CN 1819649A
Authority
CN
China
Prior art keywords
user
node
data source
public key
secret key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN 200610033703
Other languages
Chinese (zh)
Other versions
CN100438614C (en
Inventor
刘晓冬
郭兴锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Graduate School Tsinghua University
Original Assignee
Shenzhen Graduate School Tsinghua University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Graduate School Tsinghua University filed Critical Shenzhen Graduate School Tsinghua University
Priority to CNB200610033703XA priority Critical patent/CN100438614C/en
Publication of CN1819649A publication Critical patent/CN1819649A/en
Application granted granted Critical
Publication of CN100438614C publication Critical patent/CN100438614C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

A realizing method of the publicized asymmetrical video meeting safety system, including: a. creates the smallest spanning tree of the application layer multicast between the source end and the user end, the source end machine broadcast to the user's machine that the public key information publicize and memory in every user's machine, memory the public key of its direct sub-node, create the data encrypted secret key (DSK); b. the source end machine encrypt the DSK and send to every direct sub-node machine by the saving public key, every sub-node use its private key to riddle secret, use the public key of its sub-node encrypt and send to its sub-node after get the DSK, so analogy, until all the nodes get its DSK; c. encrypt and send data. Using the publicized secret key managing mode, publicize and memory the public key information, avoid the server capability bottle-neck and simple node trouble of the centralized secret key managing project, solve the safety hidden trouble.

Description

The implementation method of publicized asymmetrical video meeting safety system
Technical field
The invention belongs to technical field of computer multimedia, particularly a kind of implementation method of publicized asymmetrical video meeting safety system.
Background technology
Face-to-face talk is the mankind's the abundantest a kind of modes that express thoughts, and people can give full play to eyes, expression and action and play up language.For business, the be beyond expression thing of the convincing and appeal of chart, file, data form and so on of telephone talk.When enterprise or group need hold a meeting, often run into the situation (even being distributed in all over the world) that its each department or personnel can't concentrate.To this, people have proposed to utilize communication medium to open the demand of video conference.So-called video conference utilizes communication line that two or more meeting rooms are coupled together exactly, a kind of means of communication of holding a meeting with TV mode.The principal character of video conference is to transmit the image etc. of participant's image, sound and meeting material chart and correlate in real time, makes the participant who holds the different location can see shadow on hearing the news, as being sitting in meeting in same the meeting room.
Present video conferencing system mostly adopts the program architecture of server-client, with simulated mode transmission tone video data.Under the bigger situation of parliamentary dimension, server end there is higher hardware requirement, makes whole system not possess good expandability.Simultaneously because the analog data transmissions occupied bandwidth, apparatus expensive (needing a lot of proprietary hardware devices), upgrading inconvenience so running cost is very high, is difficult to popularize.
The progress of digital video and Audiotechnica has caused the revolution of computer and network, and has opened up new design space for the application of computer system.The progress of express network technology, distributed proccessing, multimedia messages treatment technology, multimedia workstation technology etc. is that the development of distributed digital video conferencing system is laid a good foundation.Countries in the world are all in the research of carrying out the digital video meeting energetically, as the Picture Tel company of the U.S., Cornell university at present, SunMicrosystems, VCON company, the Sony of Japan, the INRIA SophiaAntipolis of the TANDBERG of Norway and France etc.American I n-Stat/MDR has announced the investigation result about video conferencing system: till 2006, the world market of video conferencing system will be 2,200,000,000 dollars scale from 7.72 hundred million dollars of growths of calendar year 2001.
The initial research of digital video conference system mainly concentrates on LAN and ATM net, but considers popularizing of Internet, needs the digital video conference system of a kind of suitable Internet of exploitation.It utilizes the PC computer that signals such as file, image, Voice ﹠ Video are combined together, and can pass to all over the world by the Internet network.Because the raising of jamming in computer CPU speed, needed the process of the video data encoding that special equipment carries out in the past, can transfer to computer now and finish, on effect, there is not too big difference.Less investment on hardware device, maintenance is little, becomes the most cheap and good-quality solution.
Internet is the applied environment of a complexity, when the means of communication of open, convenience is provided, has also brought a lot of uncertain potential safety hazards.Video conference carry out can relate to the secret information that some are related to country, company, organize interests inevitably in the process.In order to guarantee that these secret informations are not stolen easily, revised and destroy in the process of transmission, we need provide certain safety precautions for video conferencing system.The safety precautions of video conference can be encrypted by giving the transmission data usually, and a series of means such as the participant member authenticates are realized.
At the research initial stage in video conference, meet H.320, H.323 the centralized product of agreement (being server-client mode) accounts for dominant position on market; Along with distributed computing technology, the proposition of new ideas such as grid will occupy main status based on the video conferencing system of application layer multicast in the overall market, also become one of present main direction of studying.
At present, be based Internet with the ICP/IP protocol, be network size or number of users all present exponential increase.Many units have all constructed the in-house network (Intranet) of oneself, exchange to realize internal with external data.Based on the distributed security digital video conference system of IP network, put forward in order to satisfy this demand of people just.Low-cost and the simplicity that is connected Internet made it become in the enterprise with enterprise between the very tempting media of communicating by letter.Simultaneously, being extensive use of also of wireless network further strengthened the risk that communication data is eavesdropped.Encryption technology is used for providing protection at eavesdropping.It reads by the personnel that make information can only be had the required key of data decryption, and security information is provided.Whether it and third party have nothing to do by Internet data intercept bag, and data still can't read.
Encryption is to guarantee one of information in the computer system and important means of the information security in the network.Encryption comprises uses key that data are encoded, thereby makes the earwig can't read these data easily.Be called ciphertext through ciphered data, original data become expressly.Be called deciphering from ciphertext to transfer process expressly.Encryption is divided into two kinds of symmetric cryptography and asymmetric encryption.
Symmetric cryptography refers to the cryptographic algorithm that the encryption and decryption algorithm all uses same key.Specific as follows:
Cryptographic algorithm (expressly, encryption key k)=ciphertext; Decipherment algorithm (ciphertext, encryption key k)=expressly;
Owing to when the encryption and decryption data, used same key, so this key must be maintained secrecy.Such encryption is also referred to as secret key encryption, or conventional the encryption.Obviously, one of difficult point of this type systematic is to transmit the key problem, and key is easily illegally stolen in transmitting by network.
Asymmetric encryption comprises two keys: a PKI and a private key are also referred to as public key encryption.Encrypt if information uses public-key, by using corresponding private key can decipher these information, process is as follows so:
Cryptographic algorithm (expressly, PKI)=ciphertext; Decipherment algorithm (ciphertext, private key)=expressly;
If information uses private key to encrypt, by using its corresponding PKI can decipher these information, process is as follows so:
Cryptographic algorithm (expressly, private key)=ciphertext; Decipherment algorithm (ciphertext, PKI)=expressly;
As seen, adopt asymmetric encryption mode people can not use the used key of encryption to decipher a message, and, go out another key from a cipher key calculation and say so very difficult from mathematics.Private key has only the user to know, PKI is not maintained secrecy, and can obtain by the common list service.Adopt the video conference safety system of distributed asymmetric encryption techniques not see that relevant document discloses at present.
Summary of the invention
In view of in traditional centralized security management pattern, central server can become performance bottleneck and produce Single Point of Faliure, can't satisfy the needs of extensive video conference, do not possess good technical problems such as extensibility, the invention provides a kind of scheme that adopts distributed asymmetric encryption techniques to make up video conference safety system, to satisfy the demand that increases day by day based on the video conferencing system of internet.
The present invention adopts distributed asymmetric encryption techniques to make up the video conference safety system scheme, be different from traditional server-client mode from general frame, it is all keys of storage system on central server not, but are distributed on each subscriber computer of system.Its mode of transmitting by asymmetric secret key distributed storage at first with the public key information distributed store in each subscriber computer of system, and then send the secret key of data encryption (DSK) to all user side nodes step by step, carry out encryption, the transmission of audio frequency and video and shared data information then.
The implementation method of publicized asymmetrical video meeting safety system of the present invention comprises the steps:
A, data source terminal generate an application layer multicast minimum spanning tree between data source end and each user side of participating in a conference, this tree structure is broadcasted to each user's node computer, make each user's node computer all obtain the public key information table of its each child node of subordinate, the data source terminal is preserved the PKI in its asymmetric secret key of each direct descendent; On the other hand, the data source terminal generates the secret key of data encryption (DSK), and is updated periodically it;
B, data source terminal use behind the secret key of being preserved of public key encryption data encryption with its by network security be transferred to corresponding each direct descendent machine, each direct descendent machine is deciphered with the private key of oneself preserving, obtain behind the secret key of data encryption (DSK) again to divide supplementary biography toward these subordinate's child nodes with the secret key of public key encryption data encryption of each child node of subordinate of its storage and by network, so analogize, all obtain the secret key of data encryption up to all nodes;
C, then, data source sends audio frequency and video and other shared data of encrypting with the secret key of data encryption.
The public key information of system of the present invention be distributed store in each user's node computer of described tree structure, the data source terminal is only stored the PKI in its asymmetric secret key of each direct descendent.
When new user added and/or find to have the user to withdraw from, the inventive method also can comprise the steps:
Add fashionable as new user, the data source terminal regenerates new application layer multicast minimum spanning tree, make each user's node computer all obtain the public key information table of its each child node of subordinate to each user's node computer broadcasting this tree structure, preserve the PKI of its each direct descendent; Upgrade the secret key of data encryption (DSK), and the operation of execution in step b passes to each user side node with the secret key of new data encryption, data source is followed encryption, the transmission of follow-up data information then.
When the user withdraws from, the data source terminal upgrades the secret key of data encryption (DSK) immediately, and the corresponding node at user place is withdrawed from deletion from the multicast overlay network, regenerate minimum spanning tree, make each user's node computer all obtain the public key information table of its each child node of subordinate to each user's node computer broadcasting this tree structure, preserve the PKI of its each direct descendent; And the operation of execution in step b passes to each user side node with the secret key of new data encryption (DSK), and data source is followed encryption, the transmission of subsequent sound video and shared data information then.
The present invention adopts distributed secret key way to manage, at first with the public key information distributed store in each subscriber computer of system, and then sending the secret key of data encryption (DSK) to all user side nodes step by step, data source is carried out encryption, the transmission of audio frequency and video and shared data information then.Its public key information distributed store is in each subscriber computer of network, rather than centralized stores is in a certain central server or source terminal, the server performance bottleneck and the Single Point of Faliure of centralized secret key Managed Solution have been avoided, the extensibility and the reliability of system have been increased, the requirement of security of system and upgradability aspect can be fully satisfied, large-scale the Internet application environment can be applicable to.The present invention has simultaneously also solved the potential safety hazard that the user frequently adds and the dynamic that withdraws from is brought preferably, guarantee system forward and fail safe backward.
The present invention is with a wide range of applications, and can be used for the pursuing and capturing an escaped prisoner etc. of teleconference, remote monitoring, network visual telephone, emergency relief, operational commanding, banking, long-distance education and public security system based on the internet on the net.
Description of drawings:
Fig. 1 is a main flow chart of the present invention;
The application layer multicast minimum spanning tree structural representation of Fig. 2 for generating between the data source machine that participates in video conference and each subscriber computer;
Fig. 3 is a child node public key information distributed storage table;
Fig. 4 encrypts secret key DSK process schematic diagram for utilizing asymmetric public key system Data transmission;
Fig. 5 is the application layer multicast minimum spanning tree structural representation after new node adds.
Embodiment
The present invention is further described below in conjunction with accompanying drawing.
With reference to Fig. 1,2, system at first generates an application layer multicast minimum spanning tree structure between data source terminal and each user's terminal of participating in a conference, make each user's node computer all obtain the public key information table of its each child node of subordinate to the broadcasting of each user's node computer this tree structure, and preserve the PKI in its asymmetric secret key of each direct descendent; The data source end also is responsible for generating the secret key of data encryption (DSK), and is updated periodically it, and the cycle of the renewal of the secret key of data encryption is 1 hour~3 hours usually.
And then the data source terminal is transferred to each direct descendent machine safely with it after using the public key encryption DSK that is preserved, each direct descendent machine is deciphered with the private key of oneself preserving, obtain behind the DSK again to divide supplementary biography toward these child nodes with the public key encryption DSK of each child node of subordinate of its storage and by network, so analogize, all obtain DSK up to all nodes.Then, data source begins encryption, the transmission of data.
Wherein, the data source terminal is after generating an application layer multicast minimum spanning tree structure between data source end and each user side of participating in a conference, this tree structure is broadcast in each user's node computer of participating in video conference, each user's node computer obtains the tabulation of the user of the subordinate child node of oneself according to this tree structure, each user's node computer also obtains the higher level's father node of oneself and to its PKI that sends oneself, has just preserved the public key information table of its each child node of subordinate like this in each user's node computer simultaneously.The IP address that also comprises its each child node of subordinate in the public key information table of its each child node of subordinate of preserving in each user's node computer.
For example, Fig. 3 is the child node j1-jn public key information distributed storage table in user's node j machine, wherein, showing PKI Pu (the j1)-Pu (jn) and the IP address of the child node j1-jn of subordinate correspondence, is that 219.223.172.38, PKI are Pu (j1) as the IP address of child node j1.
The public key information of system of the present invention be distributed store in each user's node computer of described tree structure, the data source terminal is only stored the PKI in its asymmetric secret key of each direct descendent.
Add fashionablely as new user, system wishes and can maintain secrecy to original communication information, prevents from can obtain original information after new user's adding system, promptly guarantees system's forward security.Therefore, system need regenerate new application layer multicast minimum spanning tree on the one hand, on the other hand, the data source end need upgrade DSK, and adopt the mode of above-mentioned asymmetric secret key distributed storage management, in each subscriber computer of network, and then data DSK sent the public key information distributed store to all user side nodes step by step, data source is followed encryption, the transmission of subsequent sound video and shared data information then.
Wherein, after the data source terminal regenerates new application layer multicast minimum spanning tree structure, this tree structure is broadcast in each user's node computer of participating in video conference, each user's node computer obtain according to this tree structure oneself the user of subordinate child node tabulation, each subscriber computer also obtains the higher level's father node of oneself and to its PKI that sends oneself, has just preserved the public key information table of its each direct descendent like this in each user's node computer simultaneously.
When the user withdrawed from, system must adjust, and made the user that withdraws from can't be with the information of original cipher key access system, the fail safe backward of assurance system.If the user's that withdraws from situation is not handled, user's the fail safe of withdrawing from the system that greatly to influence, the system that makes divulges a secret, may be fatal, therefore in case there is the user to withdraw from, the data source terminal must upgrade the secret key of data encryption (DSK) immediately, and the corresponding node at user place is withdrawed from deletion from the multicast overlay network, regenerate minimum spanning tree, and adopt the mode of above-mentioned asymmetric secret key distributed storage management, in each subscriber computer of network, and then DSK sent the public key information distributed store to all user side nodes step by step, data source is followed the encryption of subsequent sound video and shared data information then, transmission.
Wherein, the data source terminal is deleted the corresponding node that withdraws from the user place from the multicast overlay network, and after regenerating the minimum spanning tree structure, this tree structure is broadcast in each user's node computer of participating in video conference, each user's node computer obtains the tabulation of the user of the subordinate child node of oneself according to this tree structure, each user's node computer also obtains the higher level's father node of oneself and to its PKI that sends oneself, has just preserved the public key information table of its each direct descendent like this in each user's node computer simultaneously.
Below use an embodiment, further specify with reference to Fig. 1-5.
The configuration of data source terminal:
CPU:Intel?P42.8GHz
Internal memory: 512M
Network interface card: 10/100M self adaptation
Camera: BOSER
Capture card: OSPREY 200
Mike: LABTEC
Operating system: Windows XP Professional
Each subscriber computer configuration:
CPU:Intel?P42.8GHz
Internal memory: 512M
Network interface card: 10/100M self adaptation
Camera: BOSER
Capture card: OSPREY 200
Mike: LABTEC
Operating system: Windows XP Professional
The specific implementation process is as follows:
Each subscriber computer of data source terminal, participation video conference all is connected to the internet.
1., after the session startup, generate an application layer multicast minimum spanning tree in logic according to the distribution situation of the user's terminal that participates in a conference, see Fig. 2 by the source terminal that sends audio frequency and video and other shared data.
2., the data source terminal generates the secret key of data encryption (DSK), it is 56 secret keys, key can be 56 a number arbitrarily, and can change arbitrarily the time.Wherein the number of minute quantity is considered to weak key, but can easily avoid them.All confidentiality depend on key.
3., each user's node computer obtains the public key information table of its each child node of subordinate, the data source terminal is broadcast to Fig. 2 tree structure in each subscriber computer of participating in video conference, each subscriber computer obtains the tabulation of the user of the subordinate child node of oneself according to this tree structure, each subscriber computer also obtains the higher level's father node of oneself and to its PKI that sends oneself, has just preserved the public key information table of its each child node of subordinate like this in each user's node computer simultaneously; The source terminal is also preserved the PKI in its asymmetric secret key of each direct descendent.
In the exemplary embodiments, PKI adopts RSA Algorithm, the difficulty that the safety of RSA is decomposed based on big number.In order to produce two keys of PKI and private key, choose two big prime number p and q, the length of two numbers is the same, calculate product n=pq, picked at random key e then, make e and (p-1) (q-1) coprime, use euclidean expansion algorithm computation key d at last, to satisfy ed ≡ 1mod (p-1) (q-1), d=e then -1Mod ((p-1) (q-1)).E and n are PKIs so, and d is a private key.
4., the public key encryption DSK of data source terminal each direct descendent of preserving with it, and the DSK after will encrypting mails to each direct descendent respectively, after each direct descendent obtains this enciphered message, private key with oneself is decrypted and obtains DSK, obtain behind the DSK again to divide supplementary biography toward these child nodes with the public key encryption DSK of each child node of subordinate of its storage and by network, each child node repeats said process again, Fig. 4 for example divides the subordinate child node 4,5,6 of supplementary biography toward it behind the public key encryption DSK of its node 4,5,6 of being preserved of child node 1 usefulness.After subordinate's child node 4,5,6 obtains this enciphered message, down propagate again behind the private key deciphering acquisition DSK with oneself, by that analogy, all obtained secret key DSK up to all subscriber computers that participates in a conference.When encrypting DSK, at first DSK is divided into the packet littler, each packet m than n iApplication encipher formula c i=m i e(mod n) obtains ciphertext block c i, all c iForm the ciphertext c after encrypting at last.Deciphering is during DSK, gets each grouping c after encrypting iAnd calculating m i=c i d(mod n), all m iForm expressly DSK at last.
5., then, the data source end just begins real audio frequency and video or other shared data of encrypting with DSK that send.
Key DSK passes to DES (Data Encryption Standard, data encryption standard) block encryption algorithm data is encrypted, and 64 plaintext is from the end input of algorithm, and 64 ciphertext is exported from the other end.DES is divided into left-half and right half part by initial permutation with clear packets, and each 32 long.Carry out 16 then and take turns identical computing (these computings are called function f), data combine with key DSK in calculating process.After taking turns through 16, about half part lump together through an end displacement, just produced ciphertext.In each is taken turns, secret key bits displacement, and then from 56 of key, select 48.The right half part of replacing data by an expansion is extended to 48, and combines with 48 keys by an xor operation, is replaced into 32 new bit data by 8 S-boxes with these 48, again with its displacement once.This four step computing has constituted function f.Then, by another XOR, the output of function f combines with left-half, and its result promptly becomes new right half part, and right half part originally becomes new left-half.Should operate and repeat 16 times, realize just that computing was taken turns in 16 of DES.
When new user added video conference, the data source terminal need regenerate a logic application layer multicast minimum spanning tree, and upgraded DSK, repeated 3. above-mentioned~5. operation then.The overhead of this maintenance is minimum, for example, if minimum spanning tree structure originally is Fig. 4, initiate node becomes the child node of node 5 in newly-generated minimum spanning tree, and other structures are constant, see Fig. 5, we only need the public key information table of modification node 5 to get final product so, also promptly only need to revise the public key information table of initiate subscriber computer father node of place node in new minimum spanning tree, the storage organization of other node is all constant, and this helps large-scale the Internet application environment.
After finding that the user withdraws from video conference, the data source terminal need regenerate a logic application layer multicast minimum spanning tree, and upgrades DSK, repeats 3. above-mentioned~5. operation then, the situation the when overhead of its generation adds video conference with new user.

Claims (10)

1, a kind of implementation method of publicized asymmetrical video meeting safety system is characterized in that comprising the steps:
A, data source terminal generate an application layer multicast minimum spanning tree between data source end and each user side of participating in a conference, make each user's node computer all obtain the public key information table of its each child node of subordinate to the broadcasting of each user's node computer this tree structure, the data source terminal is preserved the PKI in its asymmetric secret key of each direct descendent; On the other hand, the data source terminal generates the secret key of data encryption and is updated periodically it;
B, data source terminal use behind the secret key of being preserved of public key encryption data encryption with its by network security be transferred to corresponding each direct descendent machine, each direct descendent machine is deciphered with the private key of oneself preserving, obtain behind the secret key of data encryption again to divide supplementary biography toward these subordinate's child nodes with the secret key of public key encryption data encryption of each child node of subordinate of its storage and by network, so analogize, all obtain the secret key of data encryption up to all nodes;
C, then, data source sends audio frequency and video and other shared data of encrypting with the secret key of data encryption.
2, method according to claim 1, it is characterized in that: among the step a, the data source terminal is after generating an application layer multicast minimum spanning tree structure between data source end and each user side of participating in a conference, this tree structure is broadcast in each user's node computer of participating in video conference, each user's node computer obtains the tabulation of the user of the subordinate child node of oneself according to this tree structure, each user's node computer also obtains the higher level's father node of oneself and to its PKI that sends oneself, has just preserved the public key information table of its each child node of subordinate like this in each user's node computer simultaneously.
3, method according to claim 2 is characterized in that: also comprise in the public key information table of its each child node of subordinate of preserving in each user's node computer its each child node of subordinate the IP address.
4, method according to claim 1, it is characterized in that: add fashionable as new user, the data source terminal regenerates new application layer multicast minimum spanning tree, make each user's node computer all obtain the public key information table of its each child node of subordinate to each user's node computer broadcasting this tree structure, the data source terminal is preserved the PKI of its each direct descendent; And upgrade the secret key of data encryption, the operation of execution in step b is passed to each user side node with the secret key of new data encryption.
5, method according to claim 4, it is characterized in that: after the data source terminal regenerates new application layer multicast minimum spanning tree structure, this tree structure is broadcast in each user's node computer of participating in video conference, each user's node computer obtain according to this tree structure oneself the user of subordinate child node tabulation, each subscriber computer also obtains the higher level's father node of oneself and to its PKI that sends oneself, has just preserved the public key information table of its each direct descendent like this in each user's node computer simultaneously.
6, according to claim 1 or 4 described methods, it is characterized in that: the public key information of system be distributed store in each user's node computer of described tree structure, the data source terminal is only stored the PKI in its asymmetric secret key of each direct descendent.
7, according to claim 1 or 4 described methods, it is characterized in that: when finding to have the user to withdraw from, the data source terminal upgrades the secret key of data encryption immediately, and the corresponding node at user place is withdrawed from deletion from the multicast overlay network, regenerate minimum spanning tree, make each user's node computer all obtain the public key information table of its each child node of subordinate to each user's node computer broadcasting this tree structure, the data source terminal is preserved the PKI of its each direct descendent; And the operation of execution in step b is passed to each user side node with the secret key of new data encryption.
8, method according to claim 7, it is characterized in that: the data source terminal is deleted the corresponding node that withdraws from the user place from the multicast overlay network, and after regenerating the minimum spanning tree structure, this tree structure is broadcast in each user's node computer of participating in video conference, each user's node computer obtains the tabulation of the user of the subordinate child node of oneself according to this tree structure, each user's node computer also obtains the higher level's father node of oneself and to its PKI that sends oneself, has just preserved the public key information table of its each direct descendent like this in each user's node computer simultaneously.
9, method according to claim 7 is characterized in that: the public key information of system be distributed store in each user's node computer of described tree structure, the data source terminal is only stored the PKI in its asymmetric secret key of each direct descendent.
10, method according to claim 1 is characterized in that: the cycle that the data source terminal upgrades the secret key of data encryption (DSK) is 1 hour~3 hours.
CNB200610033703XA 2006-02-16 2006-02-16 Method for realizing distributing asymmetric video conference safety system Expired - Fee Related CN100438614C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB200610033703XA CN100438614C (en) 2006-02-16 2006-02-16 Method for realizing distributing asymmetric video conference safety system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB200610033703XA CN100438614C (en) 2006-02-16 2006-02-16 Method for realizing distributing asymmetric video conference safety system

Publications (2)

Publication Number Publication Date
CN1819649A true CN1819649A (en) 2006-08-16
CN100438614C CN100438614C (en) 2008-11-26

Family

ID=36919304

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB200610033703XA Expired - Fee Related CN100438614C (en) 2006-02-16 2006-02-16 Method for realizing distributing asymmetric video conference safety system

Country Status (1)

Country Link
CN (1) CN100438614C (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
RU2460235C2 (en) * 2008-11-10 2012-08-27 Закрытое акционерное общество "Научно-производственное предприятие "Системные технологии защиты иформации" (ЗАО "НПП "СТЗИ") Facility to control sessions of secure video conferencing in coded communication network
CN104754571A (en) * 2013-12-25 2015-07-01 深圳中兴力维技术有限公司 User authentication realizing method, device and system thereof for multimedia data transmission
CN105302822A (en) * 2014-06-27 2016-02-03 中兴通讯股份有限公司 Method for reading and writing data in database and application response apparatus
CN110414245A (en) * 2018-04-28 2019-11-05 伊姆西Ip控股有限责任公司 Method, apparatus and computer program product for managing encrypted key within the storage system
CN110446108A (en) * 2019-06-28 2019-11-12 中国传媒大学 A kind of media cloud system and video-encryption, decryption method

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH11187013A (en) * 1997-12-24 1999-07-09 Ibm Japan Ltd Cryptographic key distribution system
US6240188B1 (en) * 1999-07-06 2001-05-29 Matsushita Electric Industrial Co., Ltd. Distributed group key management scheme for secure many-to-many communication
CN100490369C (en) * 2000-06-15 2009-05-20 索尼公司 System and mehtod for processing information using encryption key block
US20040103086A1 (en) * 2002-11-26 2004-05-27 Bapiraju Vinnakota Data structure traversal instructions for packet processing

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
RU2460235C2 (en) * 2008-11-10 2012-08-27 Закрытое акционерное общество "Научно-производственное предприятие "Системные технологии защиты иформации" (ЗАО "НПП "СТЗИ") Facility to control sessions of secure video conferencing in coded communication network
CN104754571A (en) * 2013-12-25 2015-07-01 深圳中兴力维技术有限公司 User authentication realizing method, device and system thereof for multimedia data transmission
CN105302822A (en) * 2014-06-27 2016-02-03 中兴通讯股份有限公司 Method for reading and writing data in database and application response apparatus
CN110414245A (en) * 2018-04-28 2019-11-05 伊姆西Ip控股有限责任公司 Method, apparatus and computer program product for managing encrypted key within the storage system
CN110414245B (en) * 2018-04-28 2023-09-22 伊姆西Ip控股有限责任公司 Method, apparatus and computer program product for managing encryption keys in a storage system
CN110446108A (en) * 2019-06-28 2019-11-12 中国传媒大学 A kind of media cloud system and video-encryption, decryption method

Also Published As

Publication number Publication date
CN100438614C (en) 2008-11-26

Similar Documents

Publication Publication Date Title
US6038322A (en) Group key distribution
Snoeyink et al. A lower bound for multicast key distribution
CN203912078U (en) Quantum safety video conference system
CN1157021C (en) Multi-node encryption and key delivery
Chan et al. Key management approaches to offer data confidentiality for secure multicast
Parameshachari et al. Secure partial image encryption scheme using scan based algorithm
CN106452741A (en) Communication system for realizing information encryption/decryption transmission based on quantum network and communication method
US20070162750A1 (en) Method for changing a group key in a group of network elements in a network system
Xu et al. Multi-authority proxy re-encryption based on CPABE for cloud storage systems
JPH11187013A (en) Cryptographic key distribution system
CN108847928B (en) Communication system and communication method for realizing information encryption and decryption transmission based on group type quantum key card
CN1419760A (en) Method and system to uniquely associate multicast content with each of multiple recipients
CN106059752B (en) A kind of whitepack password encipher-decipher method based on expansion ciphertext
CN203859823U (en) Quantum encrypted video conference terminal and system
Abusukhon et al. A novel network security algorithm based on private key encryption
CN102088352B (en) Data encryption transmission method and system for message-oriented middleware
CN100438614C (en) Method for realizing distributing asymmetric video conference safety system
WO2001084766A2 (en) System and method for encryption using transparent keys
JP5400395B2 (en) Data distribution system, key management apparatus, and key management method
CN111049738B (en) E-mail data security protection method based on hybrid encryption
CN101677271A (en) Method, device and system for multicast key management
Pal et al. Efficient and secure key management for conditional access systems
FU et al. Secure personal data sharing in cloud computing using attribute-based broadcast encryption
CN112953940A (en) Safe publishing and subscribing system and method based on hybrid encryption algorithm and key attribute filtering
CN1820449A (en) Method for encoded data transmission via a communication network

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20081126

Termination date: 20120216