Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Streamcipher information redundant in next packet of encrypted frame

A stream encryption, encryption key technology, applied in secure communication, synchronous send/receive encryption equipment, encryption device with shift register/memory, etc., can solve problems such as reducing content quality

Inactive Publication Date: 2004-08-25
KONINKLIJKE PHILIPS ELECTRONICS NV
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since in many cases a content decoder should be able to decode all or almost all information outside of error transport packets, this can lead to severe degradation of the quality of the content

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Streamcipher information redundant in next packet of encrypted frame
  • Streamcipher information redundant in next packet of encrypted frame
  • Streamcipher information redundant in next packet of encrypted frame

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0013] figure 1 The encryption format used by the present invention is described. The top row relates to user information such as audio or video, and consists of a frame 20 comprising a frame header FH and a frame payload FP. This sequence of frames does not need to have a consistent amount of payload data, but its size will depend on the degree of information compression applied. In addition, for the frame structure shown, the format may include an application-dependent subframe format, which is not further shown in the subframe format diagram, but there is no notable division in the further encryption / decryption process considered below. In some cases, further frame division (dividing of the frame) can be formed on various subframes. These subframes may refer to another information structure related to the application to which the transmitted payload refers.

[0014] In the second line, the frame 20 is mapped onto a sequence 22 of three transport packets, this number bei...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Frame-based information is transmitted through a transmission medium, whilst assigning payload information of a particular frame to one or more transmission packets and encrypting the payload information of such frame through a frame encryption key. Each transmission packet is provided with individual streamcipher-based synchronization information for in combination with the frame decryption key enabling decrypting of an associated encrypted transmission packet. In particular, the streamcipher-based synchronization information is transmitted as being redundantly included in a second transmission packet that is next to the first transmission packet that originates the individual streamcipher-based synchronization information in question. Thereby, the streamcipher-based synchronization information can operate as seed information for decrypting the second transmission packet.

Description

technical field [0001] The invention relates to a method as stated in the preamble of claim 1 . Although the invention is in principle applicable to various transmission media, the particular application considered by the inventors is the Internet. Currently, the quality of information content transmitted over the Internet is rapidly improving due to the development of bandwidth-conserving coding techniques, but also due to the increase in bandwidth itself. Content providers want to sell very high-value content to users, and there arises a need to provide a solution for so-called conditional access or digital rights management. All such systems encrypt the content item, or a portion thereof, and then manage the decryption key in such a way that only authorized end users can decrypt it. Background technique [0002] Currently, such user information usually adopts a frame structure. Especially in the case of video content, such frames are often large, requiring the frame's ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/36H04L9/12H04L9/18H04L12/56
CPCH04L9/12H04L9/065H04K1/00
Inventor B·J·范里恩舍弗C·L·M·范普尔
Owner KONINKLIJKE PHILIPS ELECTRONICS NV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products