Streamcipher information redundant in next packet of encrypted frame

A stream encryption, encryption key technology, applied in secure communication, synchronous send/receive encryption equipment, encryption device with shift register/memory, etc., can solve problems such as reducing content quality

Inactive Publication Date: 2004-08-25
KONINKLIJKE PHILIPS ELECTRONICS NV
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since in many cases a content decoder should be able to decode all or almost all information outs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Streamcipher information redundant in next packet of encrypted frame
  • Streamcipher information redundant in next packet of encrypted frame
  • Streamcipher information redundant in next packet of encrypted frame

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0013] figure 1 The encryption format used in the present invention is explained. The top row relates to user information such as audio or video, and consists of a frame 20, which includes a frame header FH and a frame payload FP. This frame sequence does not need to have a consistent amount of payload data, but its size will depend on the degree of information compression applied. In addition, for the displayed frame structure, the format may include an application-related sub-frame format. The sub-frame format is not further shown in the figure, but there is no noteworthy division in the further encryption / decryption process considered below. In this case, a further frame division (dividing of the frame) can be formed from various sub-frames. These subframes may involve another information structure related to the application related to the transmitted payload.

[0014] In the second row, the frame 20 is mapped onto a sequence 22 of three transport packets, and this number is ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Frame-based information is transmitted through a transmission medium, whilst assigning payload information of a particular frame to one or more transmission packets and encrypting the payload information of such frame through a frame encryption key. Each transmission packet is provided with individual streamcipher-based synchronization information for in combination with the frame decryption key enabling decrypting of an associated encrypted transmission packet. In particular, the streamcipher-based synchronization information is transmitted as being redundantly included in a second transmission packet that is next to the first transmission packet that originates the individual streamcipher-based synchronization information in question. Thereby, the streamcipher-based synchronization information can operate as seed information for decrypting the second transmission packet.

Description

technical field [0001] The invention relates to a method as stated in the preamble of claim 1 . Although the invention is in principle applicable to various transmission media, the particular application considered by the inventors is the Internet. Currently, the quality of information content transmitted over the Internet is rapidly improving due to the development of bandwidth-conserving coding techniques, but also due to the increase in bandwidth itself. Content providers want to sell very high-value content to users, and there arises a need to provide a solution for so-called conditional access or digital rights management. All such systems encrypt the content item, or a portion thereof, and then manage the decryption key in such a way that only authorized end users can decrypt it. Background technique [0002] Currently, such user information usually adopts a frame structure. Especially in the case of video content, such frames are often large, requiring the frame's ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/36H04L9/12H04L9/18H04L12/56
CPCH04L9/12H04L9/065H04K1/00
Inventor B·J·范里恩舍弗C·L·M·范普尔
Owner KONINKLIJKE PHILIPS ELECTRONICS NV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products