US20020025045A1 - Encryption processing for streaming media - Google Patents

Encryption processing for streaming media Download PDF

Info

Publication number
US20020025045A1
US20020025045A1 US09/912,403 US91240301A US2002025045A1 US 20020025045 A1 US20020025045 A1 US 20020025045A1 US 91240301 A US91240301 A US 91240301A US 2002025045 A1 US2002025045 A1 US 2002025045A1
Authority
US
United States
Prior art keywords
packet
key
recipient
stream
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US09/912,403
Inventor
William Raike
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Arris Technology Inc
Google Technology Holdings LLC
Original Assignee
RPK New Zealand Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from NZ506002A external-priority patent/NZ506002A/en
Application filed by RPK New Zealand Ltd filed Critical RPK New Zealand Ltd
Priority to US09/912,403 priority Critical patent/US20020025045A1/en
Assigned to RPK NEW ZEALAND LIMITED reassignment RPK NEW ZEALAND LIMITED ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: RAIKE, WILLIAM MICHAEL
Publication of US20020025045A1 publication Critical patent/US20020025045A1/en
Priority to US12/024,614 priority patent/US8332633B2/en
Assigned to GENERAL INSTRUMENT CORPORATION reassignment GENERAL INSTRUMENT CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: RPK NEW ZEALAND, LTD.
Assigned to Google Technology Holdings LLC reassignment Google Technology Holdings LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: MOTOROLA MOBILITY LLC
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0457Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply dynamic encryption, e.g. stream encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/065Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
    • H04L9/0656Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates

Definitions

  • This invention relates to encryption techniques for streaming media.
  • Digital content such as video, audio and multimedia digital files are usually quite large and there may be a long transmission delay before a recipient is able to see or hear the content of such files when transmitted to him, particularly over the internet where bandwidth at some point in the transmission channel may be limited.
  • the technique of streaming media files addresses this problem and allows the recipient to commence viewing video or listening to audio long before the media file has been completely received by him. A video may be displayed and audio played as soon as there is sufficient data in the buffer of the recipient station.
  • the invention consists in a method for securely transmitting streamed media consisting of a stream header and a series of data packets between a sender and a recipient comprising the steps of:
  • FIG. 1 is a block diagram showing the essential encryption and decryption process steps of the present invention.
  • a “stream” is assumed to be composed of a stream header, containing information about the stream itself, followed by a series of packets,
  • each “packet” is assumed to consist of a packet header plus the actual data payload of the packet
  • the generated random key used to create and deconstruct packet keys is called a “base key” but could also be termed a “session key”, a “base stream key” or a “closed key”,
  • both the packet header and data payload are assumed to consist of some number of entire bytes (octets), which numbers may vary from packet to packet, and
  • each packet header is assumed to include at least one item of information that uniquely identifies that packet, called here a “tag”.
  • An example could be a time position value indicating the packet's relative time offset from the stream start, or a serial number, or (x, y) co-ordinates pertaining to the intended destination or location of the packet data.
  • the tag information, along with the rest of the packet header, must accompany a packet “in the clear”, that is, not encrypted.
  • FIG. 1 shows diagrammatically the steps of the present encryption system as applied by a sender of streaming media and the steps of decryption as applied by a recipient of the streaming media. This may be implemented in various preferred manners as described below.
  • the encryption process essentially involves encrypting ( 6 ) the data in each streaming media packet with a packet key which is generated by computing a secure hash ( 5 ) of the packet tag value with a base key.
  • a packet key which is generated by computing a secure hash ( 5 ) of the packet tag value with a base key.
  • the base key generated ( 1 ) randomly by the sender is passed to the recipient after being asymmetrically encrypted ( 3 ) with the recipient's public key ( 2 ).
  • the encrypted base key (open key) is transmitted to the recipient. It is convenient, although not necessary, to pass the open key to the recipient in the stream header as indicated in FIG. 1 by the dotted lines.
  • the packet encryption process commences with the extraction of tag data from incoming streaming media packets (or the creation of such tags if the packets do not contain tag data) and creating a packet key by computing a secure hash of the base key and the tag value.
  • a base or session key ( 1 ) is randomly generated and is hashed ( 5 ) with the tag value of each streaming media packet to produce a packet key which is used to encrypt ( 6 ) (preferably symmetrically) the data carried in the corresponding packet.
  • Hash functions such as SHA-1 or MD5 are suitable for the hash computation. While in the preferred embodiment packet data is encrypted using a symmetric algorithm, other types of encryption algorithms could be used so long as the required minimum computation time is not exceeded.
  • the encrypted packet data or ciphertext is then combined ( 7 ) with the unencrypted or open tag value for that packet. The process described is applied to each data packet in the stream to produce an encrypted packet stream which is transmitted to the recipient.
  • the stream header is first received and the open key extracted from it unless the open key has already been received earlier by other means.
  • the open key is then asymmetrically decrypted ( 12 ) using the recipient's private key 11 .
  • the decrypted open key that is the base key, is ten available to the hash algorithm ( 14 ) to allow the packet key to be derived.
  • each stream data packet is extracted ( 13 ) and then hashed ( 14 ) with the base key to produce the packet key for each packet.
  • the stream packets with tag values removed (stream data) are then symmetrically decrypted ( 15 ) using the corresponding packet key.
  • the plaintext stream packets, with or without tag values depending on the transmission protocol being used, are then stored or outputted in a form suitable for use by a streaming media player.
  • the present encryption processing may insert specific information into designated field(s) within the stream header, and also replaces the data payload of each packet with encrypted data. All of the packets in the stream are encrypted, but only the data payload is encrypted and not the packet header information. This remains unchanged by the encryption processing. The size in bytes of the encrypted data in a packet need not be larger than the size of the original (unencrypted) data payload.
  • the encryption algorithm used to protect the base key prior to its transfer from sender to recipient preferably is a public-key (asymmetric) algorithm in which the recipient's public key is used by the sender to encrypt the packet key and the corresponding private key is used by the recipient to decrypt it.
  • the private keys used by the public key algorithm may contain protocol or formatting information in addition to key data bits.
  • the number of key data bits (the key size) is scalable for different applications, based on security requirements, but at least 607 bit keys must be allowable. A specific application may permit only a single key size to be used, or may handle multiple key sizes.
  • a valid private key preferably consists of any specified (arbitrary or application-defined, or randomly generated) pattern of key data bits, although a limited number of data patterns may be excluded (for example, all zeros or all ones).
  • Public keys should have the same number of key data bits as private keys, and a fast asymmetric algorithm is used to rapidly generate a public key from any valid private key, while at the same time it is computationally infeasible to ascertain the private key from which a particular public key has been generated.
  • the encryption algorithm ( 3 ) may insert data comprising the open key into an appropriate-designated place within the stream header as shown by the dotted lines in FIG. 1, or alternatively the open key can be transmitted to the recipient at an earlier time as shown by the solid lines between encryption Stage 3 and decryption Stage 12 .
  • a recipient who possesses the correct private key is able, using the decryption algorithm, to use the open key to establish or calculate information (a “closed key”) known only to the sender and to the recipient(s).
  • the process of encrypting each packet's data depends upon (ie. utilises in an essential way) the closed key and the packet's tag information. It is computationally infeasible, without knowing the private key, to calculate or determine the closed key based upon knowledge of publicly accessible information such as the public key, open key, encrypted stream data, packet tags, etc.
  • the encryption processing should use true random data to ensure that the closed key created for encrypting any stream varies randomly even if the same stream is encrypted on multiple occasions.
  • the encryption algorithm ensures that even if two packets of data in the original stream contain identical data bits, the encrypted data for the packets is different.
  • the encryption processing also ensures that if a stream is encrypted on multiple occasions, the encrypted packet data and the open key are different on each occasion.
  • the decryption processing is such that each intact packet that is received can be correctly decrypted, even if some packets are not received, or if some or all packets are received in a different order from the order in which they were sent.
  • a content owner of the streamed audio visual works will be provided with software which performs the encryption process as and when content is distributed.
  • the software input will take the form of a packetised, compressed and encoded file. For example if the stream was to be played by a recipient using a Real player the file would use Real coding. Standard compression algorithms such as MPEG2 or MPEG4 would be used.
  • MPEG2 or MPEG4 Standard compression algorithms
  • the tag value which is an essential part of the present encryption system, would be the Real timeline value. This is a measure of time from when the stream starts.

Abstract

A method for securing transmission of streaming media by encrypting each packet in the stream with a packet key using a fast encryption algorithm. The packet key is a hash of the packet tag value and a closed key which is unique for each stream. The closed key is itself encrypted by the sender and passed to the recipient using a public key encryption system. The encrypted closed key (open key) may conveniently be inserted into the stream header. All of the packets in the stream are encrypted, but only the data pay load of each packet is encrypted.
It is computationally infeasible, without knowing the recipient's private key to calculate the closed key based upon knowledge of publicly accessible information such as the recipient's public key, the open key, the encrypted stream data or the packet tag values.

Description

    FIELD
  • This invention relates to encryption techniques for streaming media. [0001]
  • PRIOR ART
  • Digital content such as video, audio and multimedia digital files are usually quite large and there may be a long transmission delay before a recipient is able to see or hear the content of such files when transmitted to him, particularly over the internet where bandwidth at some point in the transmission channel may be limited. The technique of streaming media files addresses this problem and allows the recipient to commence viewing video or listening to audio long before the media file has been completely received by him. A video may be displayed and audio played as soon as there is sufficient data in the buffer of the recipient station. [0002]
  • As with other digital files there are a number of applications where it is highly desirable for a streaming media file to be encrypted. Usually the content will be subject to copyright and encryption will be desired to supplement the legal protection. The encryption of streaming media poses additional problems to those encountered when a complete file is encrypted, transmitted and decrypted before use by the recipient. In practice most digital data transmission over a distance is conducted using packet technology. Therefore the encryption of streaming media requires packet by packet encryption and decryption if the advantages of streaming are to be preserved. [0003]
  • SUMMARY OF THE INVENTION
  • It is an object of the present invention to provide fast and secure encryption for streaming media. [0004]
  • Accordingly the invention consists in a method for securely transmitting streamed media consisting of a stream header and a series of data packets between a sender and a recipient comprising the steps of: [0005]
  • generating a random base key, [0006]
  • encrypting said base key to create an open key, [0007]
  • transmitting said open key to said recipient, encrypting each packet of the data in the stream by: [0008]
  • (a) assigning a tag value to each packet if no tag value already exists, [0009]
  • (b) creating a packet key by computing a secure hash of said base key and the tag value or the assigned tag value of the packet, [0010]
  • (c) encrypting the data in the packet using said packet key, and [0011]
  • (d) adding said tag value to the corresponding encrypted packet data and [0012]
  • inserting the packet so processed into the packet stream, [0013]
  • transmitting the encrypted packet stream to said recipient, [0014]
  • at the recipient's station receiving said open key and the encrypted packet stream, [0015]
  • decrypting said open key to derive the base key, [0016]
  • decrypting each received encrypted packet in the stream by: [0017]
  • (a) extracting the tag value from each packet, [0018]
  • (b) recreating said packet key by computing a secure hash of the base key and the packet's tag value, [0019]
  • (c) decrypting the packet data using said packet key, [0020]
  • (d) and storing or outputting the decrypted packet data in a form suitable for playing the streamed media. [0021]
  • The invention consists in the foregoing and also envisages constructions of which the following gives examples.[0022]
  • BRIEF DESCRIPTION OF DRAWINGS
  • FIG. 1 is a block diagram showing the essential encryption and decryption process steps of the present invention.[0023]
  • DESCRIPTION OF THE PREFERRED EMBODIMENT
  • In this patent specification: [0024]
  • (1) a “stream” is assumed to be composed of a stream header, containing information about the stream itself, followed by a series of packets, [0025]
  • (2) each “packet” is assumed to consist of a packet header plus the actual data payload of the packet, [0026]
  • (3) the generated random key used to create and deconstruct packet keys is called a “base key” but could also be termed a “session key”, a “base stream key” or a “closed key”, [0027]
  • (4) both the packet header and data payload are assumed to consist of some number of entire bytes (octets), which numbers may vary from packet to packet, and [0028]
  • (5) each packet header is assumed to include at least one item of information that uniquely identifies that packet, called here a “tag”. An example could be a time position value indicating the packet's relative time offset from the stream start, or a serial number, or (x, y) co-ordinates pertaining to the intended destination or location of the packet data. The tag information, along with the rest of the packet header, must accompany a packet “in the clear”, that is, not encrypted. [0029]
  • FIG. 1 shows diagrammatically the steps of the present encryption system as applied by a sender of streaming media and the steps of decryption as applied by a recipient of the streaming media. This may be implemented in various preferred manners as described below. [0030]
  • The encryption process essentially involves encrypting ([0031] 6) the data in each streaming media packet with a packet key which is generated by computing a secure hash (5) of the packet tag value with a base key. To decrypt the encrypted packet data it is necessary for the recipient to be able to generate the packet key and in order to do this the recipient must be in possession of the base key. The base key generated (1) randomly by the sender is passed to the recipient after being asymmetrically encrypted (3) with the recipient's public key (2). The encrypted base key (open key) is transmitted to the recipient. It is convenient, although not necessary, to pass the open key to the recipient in the stream header as indicated in FIG. 1 by the dotted lines.
  • The packet encryption process commences with the extraction of tag data from incoming streaming media packets (or the creation of such tags if the packets do not contain tag data) and creating a packet key by computing a secure hash of the base key and the tag value. For each streamed media transmission or session, a base or session key ([0032] 1) is randomly generated and is hashed (5) with the tag value of each streaming media packet to produce a packet key which is used to encrypt (6) (preferably symmetrically) the data carried in the corresponding packet. Hash functions such as SHA-1 or MD5 are suitable for the hash computation. While in the preferred embodiment packet data is encrypted using a symmetric algorithm, other types of encryption algorithms could be used so long as the required minimum computation time is not exceeded. The encrypted packet data or ciphertext is then combined (7) with the unencrypted or open tag value for that packet. The process described is applied to each data packet in the stream to produce an encrypted packet stream which is transmitted to the recipient.
  • At the recipient's station the stream header is first received and the open key extracted from it unless the open key has already been received earlier by other means. The open key is then asymmetrically decrypted ([0033] 12) using the recipient's private key 11. The decrypted open key, that is the base key, is ten available to the hash algorithm (14) to allow the packet key to be derived.
  • The tag values of each stream data packet are extracted ([0034] 13) and then hashed (14) with the base key to produce the packet key for each packet. The stream packets with tag values removed (stream data) are then symmetrically decrypted (15) using the corresponding packet key. The plaintext stream packets, with or without tag values depending on the transmission protocol being used, are then stored or outputted in a form suitable for use by a streaming media player.
  • The present encryption processing may insert specific information into designated field(s) within the stream header, and also replaces the data payload of each packet with encrypted data. All of the packets in the stream are encrypted, but only the data payload is encrypted and not the packet header information. This remains unchanged by the encryption processing. The size in bytes of the encrypted data in a packet need not be larger than the size of the original (unencrypted) data payload. [0035]
  • The encryption algorithm used to protect the base key prior to its transfer from sender to recipient preferably is a public-key (asymmetric) algorithm in which the recipient's public key is used by the sender to encrypt the packet key and the corresponding private key is used by the recipient to decrypt it. The private keys used by the public key algorithm may contain protocol or formatting information in addition to key data bits. The number of key data bits (the key size) is scalable for different applications, based on security requirements, but at least 607 bit keys must be allowable. A specific application may permit only a single key size to be used, or may handle multiple key sizes. [0036]
  • A valid private key preferably consists of any specified (arbitrary or application-defined, or randomly generated) pattern of key data bits, although a limited number of data patterns may be excluded (for example, all zeros or all ones). Public keys should have the same number of key data bits as private keys, and a fast asymmetric algorithm is used to rapidly generate a public key from any valid private key, while at the same time it is computationally infeasible to ascertain the private key from which a particular public key has been generated. [0037]
  • When encrypting a stream using a particular public key, the encryption algorithm ([0038] 3) may insert data comprising the open key into an appropriate-designated place within the stream header as shown by the dotted lines in FIG. 1, or alternatively the open key can be transmitted to the recipient at an earlier time as shown by the solid lines between encryption Stage 3 and decryption Stage 12. Upon receipt of the open key, a recipient who possesses the correct private key is able, using the decryption algorithm, to use the open key to establish or calculate information (a “closed key”) known only to the sender and to the recipient(s).
  • The process of encrypting each packet's data depends upon (ie. utilises in an essential way) the closed key and the packet's tag information. It is computationally infeasible, without knowing the private key, to calculate or determine the closed key based upon knowledge of publicly accessible information such as the public key, open key, encrypted stream data, packet tags, etc. [0039]
  • The encryption processing should use true random data to ensure that the closed key created for encrypting any stream varies randomly even if the same stream is encrypted on multiple occasions. The encryption algorithm ensures that even if two packets of data in the original stream contain identical data bits, the encrypted data for the packets is different. The encryption processing also ensures that if a stream is encrypted on multiple occasions, the encrypted packet data and the open key are different on each occasion. [0040]
  • The decryption processing is such that each intact packet that is received can be correctly decrypted, even if some packets are not received, or if some or all packets are received in a different order from the order in which they were sent. [0041]
  • In use a content owner of the streamed audio visual works will be provided with software which performs the encryption process as and when content is distributed. The software input will take the form of a packetised, compressed and encoded file. For example if the stream was to be played by a recipient using a Real player the file would use Real coding. Standard compression algorithms such as MPEG2 or MPEG4 would be used. In the case of a Real encoded file the tag value, which is an essential part of the present encryption system, would be the Real timeline value. This is a measure of time from when the stream starts. [0042]
  • Users will have received decryption software in advance from the content provider direct, by downloading from a website or bundled with the streaming player software. A typical business model for deployment of the present encryption software would be for content providers to be licensed for value with users being provided with the decryption software component free of charge. Users would pay the content provider for only the content itself. On payment (or equivalent) for the content the user would be provided with the open key corresponding to the requested content. [0043]
  • A system of media key management and distribution suitable for use in conjunction with the present encryption system is disclosed in applicant's New Zealand patent application 509037. [0044]

Claims (8)

I claim:
1. A method for securely transmitting streamed media consisting of a stream header and a series of data packets between a sender and a recipient comprising the steps of:
generating a random base key,
encrypting said base key to create an open key,
transmitting said open key to said recipient,
encrypting each packet of the data in the stream by:
(a) assigning a tag value to each packet if no tag value already exists,
(b) creating a packet key by computing a secure hash of said base key and the tag value or the assigned tag value of the packet,
(c) encrypting the data in the packet using said packet key, and
(d) adding said tag value to the corresponding encrypted packet data and
inserting the packet so processed into the packet stream,
transmitting the encrypted packet stream to said recipient,
at the recipient's station receiving said open key and the encrypted packet stream,
decrypting said open key to derive the base key,
decrypting each received encrypted packet in the stream by:
(a) extracting the tag value from each packet,
(b) recreating said packet key by computing a secure hash of the base key and the packet's tag value,
(c) decrypting the packet data using said packet key,
(d) and storing or outputting the decrypted packet data in a form suitable for playing the streamed media.
2. A method according to claim 1 wherein said open key is transmitted to the recipient by adding it to the stream header and then extracted from the stream header at the recipient's station for decryption.
3. A method according to claim 1 wherein said base key is encrypted using a public key encryption algorithm in conjunction with the recipient's public key and wherein said open key is decrypted using said public key encryption algorithm in conjunction with the recipient's private key.
4. A method according to claim 1 wherein said packet data is encrypted using a symmetric encryption algorithm in conjunction with said packet key and said encrypted data is decrypted at the recipient's station using said symmetric encryption algorithm in conjunction with said recreated packet key.
5. A method according to claim 1 wherein the hash function used to create and re-establish said packet key is SHA-1 or MD5.
6. A method for securely transmitting streamed media consisting of a stream header and a series of data packets between a sender having the recipient's public key and a recipient having a private key, comprising the steps of:
generating a random base key,
asymmetrically encrypting said base key using the recipient's public key to create an open key,
transmitting said open key to said recipient,
encrypting each packet of the data in the stream by:
(a) assigning a tag value to each packet if no tag value already exists,
(b) creating a packet key by computing a secure hash of said base key and the tag value or the assigned tag value of the packet,
(c) encrypting the data in the packet using said packet key and a symmetric encryption algorithm, and
(d) adding said tag value to the corresponding encrypted packet data and
inserting the packet so processed into the packet stream,
transmitting the encrypted packet stream to said recipient,
at the recipient's station receiving said open key and the encrypted packet stream,
decrypting said open key using the recipient's private key to derive the base key,
decrypting each received encrypted packet in the stream by:
(a) extracting the tag value from each packet,
(b) recreating said packet key by computing a secure hash of the base key and the packet's tag value,
(c) decrypting the packet data using said packet key and said symmetric encryption algorithm,
(d) and storing or outputting the decrypted packet data in a form suitable for playing the streamed media.
7. A method according to claim 6 wherein said open key is transmitted to the recipient by adding it to the stream header and then extracted from the stream header at the recipient's station for decryption.
8. A method according to claim 6 wherein the hash function used to create and re-establish said packet key is SHA-1 or MD5.
US09/912,403 2000-07-26 2001-07-26 Encryption processing for streaming media Abandoned US20020025045A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US09/912,403 US20020025045A1 (en) 2000-07-26 2001-07-26 Encryption processing for streaming media
US12/024,614 US8332633B2 (en) 2000-07-26 2008-02-01 Encryption processing for streaming media

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
NZ506002A NZ506002A (en) 2000-07-26 2000-07-26 Encryption processing for streaming media by assigning tag value, creating packet key, encrypting data and adding tag value
NZ506002 2000-07-26
US22294500P 2000-08-04 2000-08-04
US09/912,403 US20020025045A1 (en) 2000-07-26 2001-07-26 Encryption processing for streaming media

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US12/024,614 Continuation US8332633B2 (en) 2000-07-26 2008-02-01 Encryption processing for streaming media

Publications (1)

Publication Number Publication Date
US20020025045A1 true US20020025045A1 (en) 2002-02-28

Family

ID=27353929

Family Applications (2)

Application Number Title Priority Date Filing Date
US09/912,403 Abandoned US20020025045A1 (en) 2000-07-26 2001-07-26 Encryption processing for streaming media
US12/024,614 Expired - Fee Related US8332633B2 (en) 2000-07-26 2008-02-01 Encryption processing for streaming media

Family Applications After (1)

Application Number Title Priority Date Filing Date
US12/024,614 Expired - Fee Related US8332633B2 (en) 2000-07-26 2008-02-01 Encryption processing for streaming media

Country Status (1)

Country Link
US (2) US20020025045A1 (en)

Cited By (39)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020172358A1 (en) * 2001-03-02 2002-11-21 Martin Hurich Method and device for data encryption in programming of control units
US20020198848A1 (en) * 2001-06-26 2002-12-26 Michener John R. Transaction verification system and method
GB2381700A (en) * 2001-11-01 2003-05-07 Vodafone Plc Verifying the authenticity and integrity of information transmitted over the air to a receiving station at the receiver using hash functions
US20030188180A1 (en) * 2002-03-28 2003-10-02 Overney Gregor T. Secure file verification station for ensuring data integrity
WO2004049205A2 (en) * 2002-11-26 2004-06-10 International Business Machines Corporation Method and a device for making a media file accessible via a web page
US20040128351A1 (en) * 2002-12-27 2004-07-01 Intel Corporation Mechanism to broadcast transactions to multiple agents in a multi-node system
US20050010786A1 (en) * 2001-03-30 2005-01-13 Michener John R. Trusted authorization device
GB2417652A (en) * 2004-08-25 2006-03-01 Gen Instrument Corp Generating a content decryption key using a nonce and channel key data in an endpoint device
US20070206636A1 (en) * 2006-03-02 2007-09-06 Im Broadcasting Networks Ltd. Method and system for low latency secure data communications
US20070277035A1 (en) * 2006-05-26 2007-11-29 Sarvar Patel Encryption method for secure packet transmission
US20070294186A1 (en) * 2005-01-07 2007-12-20 Huawei Technologies Co., Ltd. Method for ensuring media stream security in ip multimedia sub-system
US7320069B1 (en) * 2003-02-14 2008-01-15 Novell, Inc. Selective encryption of media data
US20080226067A1 (en) * 2004-02-23 2008-09-18 Koninklijke Philips Electronics, N.V. Method and Circuit for Encrypting a Data Stream
US20090063856A1 (en) * 2007-08-31 2009-03-05 Zaheer Aziz System and Method for Identifying Encrypted Conference Media Traffic
US20090104892A1 (en) * 2001-09-28 2009-04-23 Bridgewater Systems Corp. Efficient Network Resource Management in a Wireless Network
US20090169001A1 (en) * 2007-12-28 2009-07-02 Cisco Technology, Inc. System and Method for Encryption and Secure Transmission of Compressed Media
US20090168892A1 (en) * 2007-12-28 2009-07-02 Cisco Technology, Inc. System and Method for Securely Transmitting Video Over a Network
US20100313015A1 (en) * 2007-08-30 2010-12-09 Siegfried Hartmann Method for analyzing coded data streams simultaneously transmitted in ip networks
US20110116635A1 (en) * 2009-11-16 2011-05-19 Hagai Bar-El Methods circuits devices and systems for provisioning of cryptographic data to one or more electronic devices
WO2011067876A1 (en) * 2009-12-04 2011-06-09 Panasonic Corporation Decrypting apparatus, encrypting apparatus, decrypting method, encrypting method, and communication system
US20110179286A1 (en) * 2009-12-18 2011-07-21 CompuGroup Medical AG Computer implemented method for performing cloud computing on data being stored pseudonymously in a database
US20110225114A1 (en) * 2010-03-11 2011-09-15 CompuGroup Medical AG Data structure, method, and system for predicting medical conditions
EP2461564A1 (en) * 2010-12-01 2012-06-06 Irdeto B.V. Key transport protocol
US8205076B1 (en) 2008-10-15 2012-06-19 Adobe Systems Incorporated Imparting real-time priority-based network communications in an encrypted communication session
US8284932B2 (en) 2007-10-15 2012-10-09 Adobe Systems Incorporated Imparting cryptographic information in network communications
US8626942B2 (en) 2003-02-13 2014-01-07 Adobe Systems Incorporated Real-time priority-based media communication
US8677146B2 (en) 2009-12-18 2014-03-18 CompuGroup Medical AG Computer implemented method for sending a message to a recipient user, receiving a message by a recipient user, a computer readable storage medium and a computer system
US8699705B2 (en) 2009-12-18 2014-04-15 CompuGroup Medical AG Computer implemented method for generating a set of identifiers from a private key, computer implemented method and computing device
US20140237246A1 (en) * 2005-04-04 2014-08-21 Blackberry Limited Generating a Symmetric Key to Secure a Communication Link
US20140270161A1 (en) * 2013-03-15 2014-09-18 General Instrument Corporation Method and apparatus for secure storage and retrieval of live off disk media programs
US20150010151A1 (en) * 2011-06-21 2015-01-08 Peter Roelse Receiver software protection
US9143323B2 (en) 2005-04-04 2015-09-22 Blackberry Limited Securing a link between two devices
US9189638B1 (en) 2013-08-25 2015-11-17 Google Inc. Systems and methods for multi-function and multi-purpose cryptography
US9231758B2 (en) * 2009-11-16 2016-01-05 Arm Technologies Israel Ltd. System, device, and method of provisioning cryptographic data to electronic devices
US9729594B2 (en) 2000-09-12 2017-08-08 Wag Acquisition, L.L.C. Streaming media delivery system
US10454674B1 (en) * 2009-11-16 2019-10-22 Arm Limited System, method, and device of authenticated encryption of messages
US10951591B1 (en) * 2016-12-20 2021-03-16 Wells Fargo Bank, N.A. SSL encryption with reduced bandwidth
US11171932B2 (en) 2017-08-09 2021-11-09 Omron Healthcare Co., Ltd. Data transmitting apparatus, data receiving apparatus, method and program
US20230049021A1 (en) * 2013-04-01 2023-02-16 Secturion Systems, Inc. Multi-level independent security architecture

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7822017B2 (en) * 2004-11-18 2010-10-26 Alcatel Lucent Secure voice signaling gateway
US7584507B1 (en) * 2005-07-29 2009-09-01 Narus, Inc. Architecture, systems and methods to detect efficiently DoS and DDoS attacks for large scale internet
US8204217B2 (en) * 2009-01-28 2012-06-19 Telefonaktiebolaget Lm Ericsson (Publ) Lightweight streaming protection by sequence number scrambling
US9438415B2 (en) 2011-02-23 2016-09-06 Broadcom Corporation Method and system for securing communication on a home gateway in an IP content streaming system
US9232268B2 (en) * 2011-02-23 2016-01-05 Broadcom Corporation Unified video delivery system for supporting IP video streaming service
CN102629899A (en) * 2012-04-12 2012-08-08 中国科学院西安光学精密机械研究所 Encryption and decryption method based on self-synchronizing chaotic stream ciphers of 1D-ICMIC (One Dimensional-Iterative Chaotic Maps with Infinite Collapses)
CN102624523A (en) * 2012-04-12 2012-08-01 中国科学院西安光学精密机械研究所 1D-ICMIC-based encryption and decryption method by utilizing synchronous chaotic stream cipher
CN104636663A (en) * 2014-12-29 2015-05-20 国家电网公司 Security threat analyzing method based on service data stream model
US20170034214A1 (en) * 2015-07-30 2017-02-02 Northrop Grumman Systems Corporation Apparatus and method for cross enclave information control
WO2018085640A1 (en) * 2016-11-03 2018-05-11 Aon Benfield Global, Inc. Impact data manager for dynamic data delivery
US10552585B2 (en) 2016-12-14 2020-02-04 Microsoft Technology Licensing, Llc Encoding optimization for obfuscated media

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5029207A (en) * 1990-02-01 1991-07-02 Scientific-Atlanta, Inc. External security module for a television signal decoder
US5237610A (en) * 1990-02-01 1993-08-17 Scientific-Atlanta, Inc. Independent external security module for a digitally upgradeable television signal decoder
US5420866A (en) * 1994-03-29 1995-05-30 Scientific-Atlanta, Inc. Methods for providing conditional access information to decoders in a packet-based multiplexed communications system
US5515437A (en) * 1993-08-23 1996-05-07 Matsushita Electric Industrial Co., Ltd. Scramble transmission apparatus and signal processing apparatus
US5768381A (en) * 1993-09-14 1998-06-16 Chantilley Corporation Limited Apparatus for key distribution in an encryption system
US5963909A (en) * 1995-12-06 1999-10-05 Solana Technology Development Corporation Multi-media copy management system
US6212633B1 (en) * 1998-06-26 2001-04-03 Vlsi Technology, Inc. Secure data communication over a memory-mapped serial communications interface utilizing a distributed firewall
US6288739B1 (en) * 1997-09-05 2001-09-11 Intelect Systems Corporation Distributed video communications system
US20020083319A1 (en) * 1997-04-23 2002-06-27 Ryuji Ishiguro Information processing apparatus, information processing method, information processing system and recording medium
US6591250B1 (en) * 1998-02-23 2003-07-08 Genetic Anomalies, Inc. System and method for managing virtual property
US6735313B1 (en) * 1999-05-07 2004-05-11 Lucent Technologies Inc. Cryptographic method and apparatus for restricting access to transmitted programming content using hash functions and program identifiers

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2149067A1 (en) 1994-06-22 1995-12-23 Joseph Anton Bednar Jr. User-identification and verification of data integrity in a wireless communication system
JPH1032567A (en) 1996-07-18 1998-02-03 Mitsubishi Electric Corp Ciphering equipment, de-ciphering equipment and data transmission system using them
JPH10126406A (en) 1996-10-23 1998-05-15 Toyo Commun Equip Co Ltd Data cipher system in network
US6289451B1 (en) 1997-04-18 2001-09-11 Sun Microsystems, Inc. System and method for efficiently implementing an authenticated communications channel that facilitates tamper detection
US6084877A (en) * 1997-12-18 2000-07-04 Advanced Micro Devices, Inc. Network switch port configured for generating an index key for a network switch routing table using a programmable hash function
JPH11327437A (en) 1998-05-13 1999-11-26 Digital Vision Laboratories:Kk Information provision system
JP4391610B2 (en) 1998-12-25 2009-12-24 パナソニック株式会社 Transport stream processing device
EP1026898A1 (en) * 1999-02-04 2000-08-09 CANAL+ Société Anonyme Method and apparatus for encrypted transmission
US6760441B1 (en) * 2000-03-31 2004-07-06 Intel Corporation Generating a key hieararchy for use in an isolated execution environment
US6636966B1 (en) * 2000-04-03 2003-10-21 Dphi Acquisitions, Inc. Digital rights management within an embedded storage device
US7457414B1 (en) * 2000-07-21 2008-11-25 The Directv Group, Inc. Super encrypted storage and retrieval of media programs with smartcard generated keys

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5029207A (en) * 1990-02-01 1991-07-02 Scientific-Atlanta, Inc. External security module for a television signal decoder
US5237610A (en) * 1990-02-01 1993-08-17 Scientific-Atlanta, Inc. Independent external security module for a digitally upgradeable television signal decoder
US5515437A (en) * 1993-08-23 1996-05-07 Matsushita Electric Industrial Co., Ltd. Scramble transmission apparatus and signal processing apparatus
US5768381A (en) * 1993-09-14 1998-06-16 Chantilley Corporation Limited Apparatus for key distribution in an encryption system
US5420866A (en) * 1994-03-29 1995-05-30 Scientific-Atlanta, Inc. Methods for providing conditional access information to decoders in a packet-based multiplexed communications system
US5963909A (en) * 1995-12-06 1999-10-05 Solana Technology Development Corporation Multi-media copy management system
US20020083319A1 (en) * 1997-04-23 2002-06-27 Ryuji Ishiguro Information processing apparatus, information processing method, information processing system and recording medium
US6288739B1 (en) * 1997-09-05 2001-09-11 Intelect Systems Corporation Distributed video communications system
US6591250B1 (en) * 1998-02-23 2003-07-08 Genetic Anomalies, Inc. System and method for managing virtual property
US6212633B1 (en) * 1998-06-26 2001-04-03 Vlsi Technology, Inc. Secure data communication over a memory-mapped serial communications interface utilizing a distributed firewall
US6735313B1 (en) * 1999-05-07 2004-05-11 Lucent Technologies Inc. Cryptographic method and apparatus for restricting access to transmitted programming content using hash functions and program identifiers

Cited By (83)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9762636B2 (en) 2000-09-12 2017-09-12 Wag Acquisition, L.L.C. Streaming media delivery system
US10298638B2 (en) 2000-09-12 2019-05-21 Wag Acquisition, L.L.C. Streaming media delivery system
US10567453B2 (en) 2000-09-12 2020-02-18 Wag Acquisition, L.L.C. Streaming media delivery system
US9742824B2 (en) 2000-09-12 2017-08-22 Wag Acquisition, L.L.C. Streaming media delivery system
US9729594B2 (en) 2000-09-12 2017-08-08 Wag Acquisition, L.L.C. Streaming media delivery system
US10298639B2 (en) 2000-09-12 2019-05-21 Wag Acquisition, L.L.C. Streaming media delivery system
US20020172358A1 (en) * 2001-03-02 2002-11-21 Martin Hurich Method and device for data encryption in programming of control units
US7028191B2 (en) 2001-03-30 2006-04-11 Michener John R Trusted authorization device
US20050010786A1 (en) * 2001-03-30 2005-01-13 Michener John R. Trusted authorization device
US20020198848A1 (en) * 2001-06-26 2002-12-26 Michener John R. Transaction verification system and method
US20090104892A1 (en) * 2001-09-28 2009-04-23 Bridgewater Systems Corp. Efficient Network Resource Management in a Wireless Network
US8204482B2 (en) * 2001-09-28 2012-06-19 Bridgewater Systems Corp. Efficient network resource management in a wireless network
GB2381700A (en) * 2001-11-01 2003-05-07 Vodafone Plc Verifying the authenticity and integrity of information transmitted over the air to a receiving station at the receiver using hash functions
GB2381700B (en) * 2001-11-01 2005-08-24 Vodafone Plc Telecommunication security arrangements and methods
US20030188180A1 (en) * 2002-03-28 2003-10-02 Overney Gregor T. Secure file verification station for ensuring data integrity
WO2004049205A3 (en) * 2002-11-26 2004-10-28 Ibm Method and a device for making a media file accessible via a web page
WO2004049205A2 (en) * 2002-11-26 2004-06-10 International Business Machines Corporation Method and a device for making a media file accessible via a web page
US7711843B2 (en) 2002-11-26 2010-05-04 International Business Machines Corporation Method and a device for making a media file accessible via a web page
US20060015581A1 (en) * 2002-11-26 2006-01-19 International Business Machines Corporation Method and a device for making a media file accessible via a web page
US20040128351A1 (en) * 2002-12-27 2004-07-01 Intel Corporation Mechanism to broadcast transactions to multiple agents in a multi-node system
US9083773B2 (en) 2003-02-13 2015-07-14 Adobe Systems Incorporated Real-time priority-based media communication
US8626942B2 (en) 2003-02-13 2014-01-07 Adobe Systems Incorporated Real-time priority-based media communication
US7320069B1 (en) * 2003-02-14 2008-01-15 Novell, Inc. Selective encryption of media data
US20080226067A1 (en) * 2004-02-23 2008-09-18 Koninklijke Philips Electronics, N.V. Method and Circuit for Encrypting a Data Stream
GB2417652A (en) * 2004-08-25 2006-03-01 Gen Instrument Corp Generating a content decryption key using a nonce and channel key data in an endpoint device
US20060047976A1 (en) * 2004-08-25 2006-03-02 General Instrument Corporation Method and apparatus for generating a decrpytion content key
US8582766B2 (en) 2005-01-07 2013-11-12 Inventergy, Inc. Method for ensuring media stream security in IP multimedia sub-system
US20070294186A1 (en) * 2005-01-07 2007-12-20 Huawei Technologies Co., Ltd. Method for ensuring media stream security in ip multimedia sub-system
US9537837B2 (en) 2005-01-07 2017-01-03 Inventergy, Inc. Method for ensuring media stream security in IP multimedia sub-system
US9167422B2 (en) 2005-01-07 2015-10-20 Inventergy, Inc. Method for ensuring media stream security in IP multimedia sub-system
US9071426B2 (en) * 2005-04-04 2015-06-30 Blackberry Limited Generating a symmetric key to secure a communication link
US20140237246A1 (en) * 2005-04-04 2014-08-21 Blackberry Limited Generating a Symmetric Key to Secure a Communication Link
US9143323B2 (en) 2005-04-04 2015-09-22 Blackberry Limited Securing a link between two devices
US20070206636A1 (en) * 2006-03-02 2007-09-06 Im Broadcasting Networks Ltd. Method and system for low latency secure data communications
US20070277035A1 (en) * 2006-05-26 2007-11-29 Sarvar Patel Encryption method for secure packet transmission
US8583929B2 (en) * 2006-05-26 2013-11-12 Alcatel Lucent Encryption method for secure packet transmission
US20100313015A1 (en) * 2007-08-30 2010-12-09 Siegfried Hartmann Method for analyzing coded data streams simultaneously transmitted in ip networks
US8478994B2 (en) * 2007-08-30 2013-07-02 Siemens Enterprise Communications Gmbh & Co. Kg Method for analyzing coded data streams simultaneously transmitted in IP networks
US20130185554A1 (en) * 2007-08-30 2013-07-18 Siemens Enterprise Communications Gmbh & Co. Kg Method for analyzing coded data streams simultaneously transmitted in ip networks
US20090063856A1 (en) * 2007-08-31 2009-03-05 Zaheer Aziz System and Method for Identifying Encrypted Conference Media Traffic
US8417942B2 (en) 2007-08-31 2013-04-09 Cisco Technology, Inc. System and method for identifying encrypted conference media traffic
US8542825B2 (en) 2007-10-15 2013-09-24 Adobe Systems Incorporated Imparting cryptographic information in network communications
US9055051B2 (en) 2007-10-15 2015-06-09 Adobe Systems Incorporated Imparting cryptographic information in network communications
US8284932B2 (en) 2007-10-15 2012-10-09 Adobe Systems Incorporated Imparting cryptographic information in network communications
US20090168892A1 (en) * 2007-12-28 2009-07-02 Cisco Technology, Inc. System and Method for Securely Transmitting Video Over a Network
US20090169001A1 (en) * 2007-12-28 2009-07-02 Cisco Technology, Inc. System and Method for Encryption and Secure Transmission of Compressed Media
US8837598B2 (en) 2007-12-28 2014-09-16 Cisco Technology, Inc. System and method for securely transmitting video over a network
US8245033B1 (en) 2008-10-15 2012-08-14 Adobe Systems Incorporated Imparting real-time priority-based network communications in an encrypted communication session
US8205076B1 (en) 2008-10-15 2012-06-19 Adobe Systems Incorporated Imparting real-time priority-based network communications in an encrypted communication session
US8918644B2 (en) 2008-10-15 2014-12-23 Adobe Systems Corporation Imparting real-time priority-based network communications in an encrypted communication session
US10454674B1 (en) * 2009-11-16 2019-10-22 Arm Limited System, method, and device of authenticated encryption of messages
US8687813B2 (en) * 2009-11-16 2014-04-01 Discretix Technologies Ltd. Methods circuits devices and systems for provisioning of cryptographic data to one or more electronic devices
US9231758B2 (en) * 2009-11-16 2016-01-05 Arm Technologies Israel Ltd. System, device, and method of provisioning cryptographic data to electronic devices
US20110116635A1 (en) * 2009-11-16 2011-05-19 Hagai Bar-El Methods circuits devices and systems for provisioning of cryptographic data to one or more electronic devices
US9866376B2 (en) * 2009-11-16 2018-01-09 Arm Limited Method, system, and device of provisioning cryptographic data to electronic devices
US9705673B2 (en) 2009-11-16 2017-07-11 Arm Technologies Israel Ltd. Method, device, and system of provisioning cryptographic data to electronic devices
US8731196B2 (en) * 2009-12-04 2014-05-20 Panasonic Corporation Decrypting apparatus, encrypting apparatus, decrypting method, encrypting method, and communication system
WO2011067876A1 (en) * 2009-12-04 2011-06-09 Panasonic Corporation Decrypting apparatus, encrypting apparatus, decrypting method, encrypting method, and communication system
US20120201383A1 (en) * 2009-12-04 2012-08-09 Masakatsu Matsuo Decrypting apparatus, encrypting apparatus, decrypting method, encrypting method, and communication system
US20110179286A1 (en) * 2009-12-18 2011-07-21 CompuGroup Medical AG Computer implemented method for performing cloud computing on data being stored pseudonymously in a database
US9418242B2 (en) * 2009-12-18 2016-08-16 CompuGroup Medical AG Computer implemented method for analyzing data of a user with the data being stored pseudonymously in a database
US8661247B2 (en) 2009-12-18 2014-02-25 CompuGroup Medical AG Computer implemented method for performing cloud computing on data being stored pseudonymously in a database
US8677146B2 (en) 2009-12-18 2014-03-18 CompuGroup Medical AG Computer implemented method for sending a message to a recipient user, receiving a message by a recipient user, a computer readable storage medium and a computer system
US8695106B2 (en) * 2009-12-18 2014-04-08 CompuGroup Medical AG Computer implemented method for analyzing data of a user with the data being stored pseudonymously in a database
US8699705B2 (en) 2009-12-18 2014-04-15 CompuGroup Medical AG Computer implemented method for generating a set of identifiers from a private key, computer implemented method and computing device
US8887254B2 (en) 2009-12-18 2014-11-11 CompuGroup Medical AG Database system, computer system, and computer-readable storage medium for decrypting a data record
US20140189372A1 (en) * 2009-12-18 2014-07-03 CompuGroup Medical AG Computer implemented method for analyzing data of a user with the data being stored pseudonymously in a database
US20110185188A1 (en) * 2009-12-18 2011-07-28 CompuGroup Medical AG Computer implemented method for analyzing data of a user with the data being stored pseudonymously in a database
US8868436B2 (en) 2010-03-11 2014-10-21 CompuGroup Medical AG Data structure, method, and system for predicting medical conditions
US20110225114A1 (en) * 2010-03-11 2011-09-15 CompuGroup Medical AG Data structure, method, and system for predicting medical conditions
EP2461534A1 (en) * 2010-12-01 2012-06-06 Irdeto B.V. Control word protection
US20130262869A1 (en) * 2010-12-01 2013-10-03 Irdeto B.V. Control word protection
US9270465B2 (en) 2010-12-01 2016-02-23 Irdeto B.V. Control word protection
EP2461564A1 (en) * 2010-12-01 2012-06-06 Irdeto B.V. Key transport protocol
WO2012072704A1 (en) * 2010-12-01 2012-06-07 Irdeto B.V. Key transport protocol
US9402108B2 (en) * 2011-06-21 2016-07-26 Irdeto B.V. Receiver software protection
US20150010151A1 (en) * 2011-06-21 2015-01-08 Peter Roelse Receiver software protection
US20140270161A1 (en) * 2013-03-15 2014-09-18 General Instrument Corporation Method and apparatus for secure storage and retrieval of live off disk media programs
US10015542B2 (en) * 2013-03-15 2018-07-03 Arris Enterprises Llc Method and apparatus for secure storage and retrieval of live off disk media programs
US20230049021A1 (en) * 2013-04-01 2023-02-16 Secturion Systems, Inc. Multi-level independent security architecture
US9189638B1 (en) 2013-08-25 2015-11-17 Google Inc. Systems and methods for multi-function and multi-purpose cryptography
US10951591B1 (en) * 2016-12-20 2021-03-16 Wells Fargo Bank, N.A. SSL encryption with reduced bandwidth
US11171932B2 (en) 2017-08-09 2021-11-09 Omron Healthcare Co., Ltd. Data transmitting apparatus, data receiving apparatus, method and program

Also Published As

Publication number Publication date
US8332633B2 (en) 2012-12-11
US20080267409A1 (en) 2008-10-30

Similar Documents

Publication Publication Date Title
US8332633B2 (en) Encryption processing for streaming media
US11102553B2 (en) Systems and methods for secure playback of encrypted elementary bitstreams
US9300465B2 (en) Method, system and program product for attaching a title key to encrypted content for synchronized transmission to a recipient
US7693278B2 (en) Data distribution apparatus and data communications system
CA2522046C (en) Methods and apparatus for secure and adaptive delivery of multimedia content
KR101312910B1 (en) Protecting digital media of various content types
EP1678586B1 (en) A method and apparatus for ensuring the integrity of data
US8548164B2 (en) Method and device for the encryption and decryption of data
US7447313B2 (en) Pointers to encrypted data in RTP header
JP2002500388A (en) System and method for deriving an initialization vector suitable for secure communication
EP2244416A1 (en) Encryption processing method and encryption processing device
EP1195968B1 (en) Encryption processing for streaming media
KR19990014887A (en) Data transmitting apparatus, data transmitting method, data receiving apparatus, data receiving method, data transmitting apparatus, and data transmitting method
EP2071801B1 (en) Method and apparatus for securing content using client and session specific encryption with embedded key in content
EP1499061A1 (en) Individual video encryption system and method
CN108243198A (en) A kind of data distribution, retransmission method and device
EP1499062B1 (en) Individual video encryption system and method
CN115567226A (en) Binary end-to-end encryption method based on session communication
KR20070026980A (en) System and method for digital contents protection system using rtp protocol cryptograph scheme

Legal Events

Date Code Title Description
AS Assignment

Owner name: RPK NEW ZEALAND LIMITED, NEW ZEALAND

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:RAIKE, WILLIAM MICHAEL;REEL/FRAME:012292/0574

Effective date: 20010618

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION

AS Assignment

Owner name: GENERAL INSTRUMENT CORPORATION,PENNSYLVANIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:RPK NEW ZEALAND, LTD.;REEL/FRAME:024092/0016

Effective date: 20100121

Owner name: GENERAL INSTRUMENT CORPORATION, PENNSYLVANIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:RPK NEW ZEALAND, LTD.;REEL/FRAME:024092/0016

Effective date: 20100121

AS Assignment

Owner name: GOOGLE TECHNOLOGY HOLDINGS LLC, CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MOTOROLA MOBILITY LLC;REEL/FRAME:035465/0001

Effective date: 20141028