发明名称 METHOD AND SYSTEM FOR AUTHENTICATING A DATA STREAM
摘要 A method for authenticating a data stream includes selecting a number of data fragments of the data stream, defining at least two granularity levels for the selected data fragments, dividing each of the selected data fragments according to the granularity levels, generating a hierarchical authentication structure including elements representing hash values of the divided selected data fragments on the different granularity levels, selecting at least a portion of the hash values of the hierarchical authentication structure for transmission to a receiver, reconstructing the granularity value on the top level of the hierarchical authentication structure based on the transmitted hash values, and performing authentication of the data fragments of the data stream based on comparing the reconstructed value on the top granularity level of the hierarchical authentication structure with the signed value on the top granularity level of the generated hierarchical authentication structure,
申请公布号 US2016204942(A1) 申请公布日期 2016.07.14
申请号 US201314913387 申请日期 2013.08.23
申请人 NEC EUROPE LTD. 发明人 Bohli Jens-Matthias;Li Wenting
分类号 H04L9/32;G06F21/64 主分类号 H04L9/32
代理机构 代理人
主权项 1. A method for authenticating a data stream. the method comprising: a) selectins a number of data fragments of the data stream; b) defining at least two granularity levels for the selected data fragments; c) dividing each of the selected data fragments according to the granularity levels; d) generating a hierarchical authentication structure, including elements, representing hash values of the divided selected data fragments on the different granularity levels, wherein a hash value, for a data fragment on a higher granularity level is based on hash values of data fragments on a lower granularity level, e) selecting at least a portion of the hash values of the hierarchical authentication structure for transmission to a receiver, f) reconstructing the granularity value on the top level of the hierarchical authentication structure, based on the transmitted hash values and that g) performing authentication of the data fragments of the data stream based on comparing the reconstructed value on the top granularity level of the hierarchical authentication structure, with the signed value on the top granularity level of the generated hierarchical authentication structure.
地址 Heidelberg DE