Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Decryption engine and decryption method

An engine and decryption technology, applied in the decryption engine and related decryption fields, which can solve the problems of synchronization failure, bad user experience, and users unable to watch images.

Active Publication Date: 2018-11-06
REALTEK SEMICON CORP
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, during the decryption process, if the wrong control signal is sent by the transmitting end, or the wrong key is calculated due to noise interference at the receiving end, the synchronization may fail.
Once the synchronization fails, the user will not be able to watch normal images, and the receiving end will submit a re-authentication request to the transmitting end after the receiving end formally discovers and confirms the synchronization failure. And go through a lengthy authentication process to recover from the wrong state, seriously causing bad user experience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Decryption engine and decryption method
  • Decryption engine and decryption method
  • Decryption engine and decryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] Therefore, one of the objectives of the present invention is to disclose a decryption engine and a decryption method to solve the problems in the prior art. figure 1 As the well-known advanced encryption standard counter (Advanced Encryption Standard Counter, AES-CTR), in general, a receiving end can obtain a first constant Constant1 and a second constant Constant2 after going through an authentication process with a transmitting end, which are two fixed values ​​respectively. After starting to transmit data (such as frames or packets), the Advanced Encryption Standard counter needs to calculate the key Key according to the first constant Constant1, the second constant Constant2, the frame number FrameNumber and the data number DataNumber. The frame number FrameNumber is used to indicate the number of frames that have been decrypted; the data number DataNumber is used to indicate the number of keys that have been generated. Normally, the transmitting end will transmit ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a decryption engine, comprising an updating circuit, a key generating circuit, a decryption circuit and a detection circuit. The updating circuit generates a piece of first update information on the premise that a current received picture frame is encrypted, and generates a piece of second update information on the premise that the current received picture frame is not encrypted. The key generating circuit generates a first key according to the first update information, and generates a second key according to the second update information. The decryption circuit generates a first decrypted picture frame according to the first key and the current received picture frame, and generates a second decrypted picture frame according to the second key and the current received picture frame. The detection circuit detects whether the current received picture frame is encrypted or not according to the first decrypted picture frame and the second decrypted picture frame, and generates an encryption detection result.

Description

technical field [0001] The embodiments disclosed in the present invention relate to encryption / decryption, especially to a decryption engine and a related decryption method. Background technique [0002] In an encryption and decryption system, such as High-Bandwidth Digital Content Protection (HDCP) 2.2, the decryption process at the receiving end can be roughly divided into two steps. The first step is to complete the authentication process with the transmitter, and the second step is to start the Advanced Encryption Standard Counter (AES-CTR) engine to calculate the key (key), and then use the calculated The obtained key is used for the decryption process. However, during the decryption process, if the wrong control signal is sent from the transmitting end, or the wrong key is calculated due to noise interference at the receiving end, the synchronization may fail. Once the synchronization fails, the user will not be able to watch normal images, and the receiving end will...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/06
Inventor 郑景升黄冠嘉
Owner REALTEK SEMICON CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products