CN101710964A - Method for enciphering and deciphering MPEG2 transport stream packets - Google Patents

Method for enciphering and deciphering MPEG2 transport stream packets Download PDF

Info

Publication number
CN101710964A
CN101710964A CN200910109747A CN200910109747A CN101710964A CN 101710964 A CN101710964 A CN 101710964A CN 200910109747 A CN200910109747 A CN 200910109747A CN 200910109747 A CN200910109747 A CN 200910109747A CN 101710964 A CN101710964 A CN 101710964A
Authority
CN
China
Prior art keywords
transport stream
bit
grouping
length
data packet
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN200910109747A
Other languages
Chinese (zh)
Other versions
CN101710964B (en
Inventor
李新国
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guowei Group Shenzhen Co ltd
Original Assignee
Shenzhen State Micro Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen State Micro Technology Co Ltd filed Critical Shenzhen State Micro Technology Co Ltd
Priority to CN 200910109747 priority Critical patent/CN101710964B/en
Publication of CN101710964A publication Critical patent/CN101710964A/en
Application granted granted Critical
Publication of CN101710964B publication Critical patent/CN101710964B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
  • Compression Or Coding Systems Of Tv Signals (AREA)

Abstract

The invention provides a method for enciphering and deciphering MPEG2 transport stream packets. The method comprises the following steps of: based on the length of L bits, dividing the payload of transport stream packets into n subgroups of P1, P2, P3 till Pn; enciphering the ith subgroup Pi of the payload of the transport stream packets, and outputting the cipher subgroup Ci which is the enciphered result of the bit-by-bit XOR value of Pi and IVi-1 by using a secret key K, wherein n is less than n and not less than 1; if the length of the subgroup Pn is equal to L bits, the cipher subgroup Cn output after enciphering the subgroup Pn is the enciphered result of the bit-by-bit XOR value of Pn and IVn-1 by using the secret key K; and if the length t of the subgroup Pn is less than L bits, adding L-t zeros at the right of Pn, then XORing the result with added zeros and the enciphered result of IVn-1, and finally outputting the first t bits of the XOR result as the cipher of Pn (Cn). The invention has the advantages of high safety performance and easy implementation.

Description

The encryption and decryption method of MPEG2 transport stream data packet
Technical field
The present invention relates to the digital content protection technology, relate in particular to the encipher-decipher method that adopts the transport stream data packet of MPEG2 standard compression in a kind of digital interface content protective system.
Background technology
MPEG2 transport stream in the digital television broadcasting system is transferred to user side by radio network (wired, satellite or ground) after the front end scrambling.Typical ustomer premises access equipment adopts the separation between machine and card technology to receive transport stream: the transport stream of scrambling descrambling in smart card, transport stream behind the descrambling through the digital interface between smart card and the main frame (for example, PCMCIA, USB) arrive main frame, transport stream is finished demultiplexing, source coding and output in main frame.
As shown in Figure 1, transport stream is made of continuous packet.Packet has the form of standard, and its total length is 188 bytes, and wherein preceding 4 bytes are packet packet header, next is optional elongated adaptation field, is the payload of some bytes at last.
In order to guarantee the fail safe of MPEG2 transport stream the time, need in card, the payload to transport stream encrypt again, and data packet head, adaptation field and total length of data packets remain unchanged by the digital interface between card and the main frame.Existing at present three standards define the encryption method here.
1, " CableCARD Copy Protection 2.0 Specification " adopt ECB (Electric Code Book, the electronic code book) pattern of TDES algorithm that the payload of transport stream data packet is encrypted in (2009-05-08); If the length of payload is not the integral multiple of 64 bits, need to use Cipher-Text Stealing technology (specifically seeing the U.S. Patent application of US005684876A) to keep fixing data packet length.
2, adopt CBC (Cipher Block Chaining, the link of the encrypted word group) pattern of aes algorithm that data packet payload is encrypted in " CI Plus Specification:Content Security Extensions to the Common Interface.V1.2.2009-4-16 "; If the length of payload is not the integral multiple of 128 bits, adopt the method for transparent transmission tail data to keep fixing data packet length.
3, " Digital Video Broadcasting Content Protection ﹠amp; Copy Management.Rev.1.2007-7 " in adopt the CBC pattern of aes algorithm that data packet payload is encrypted; If the length of payload is not the integral multiple of 128 bits, need to adopt another Cipher-Text Stealing technology (specifically seeing the U.S. Patent application of US20080137851A1) to keep fixing data packet length.
Said method all adopts the block cipher with fixing input length and fixing output length that the payload of packet is carried out encryption and decryption.The block length of supposing block cipher is the L bit, at first payload is divided into the grouping of some L bits when then encrypting, and then each grouping is encrypted.If the length of payload is not the integral multiple of block length L, then need special means to handle.In addition, the CBC pattern of employing block cipher has higher fail safe to the payload encryption of transport stream data packet than the employing ecb mode, adopts the Cipher-Text Stealing technology can effectively solve the problem that loaded length is not a block cipher block length integral multiple.
Summary of the invention
The present invention proposes a kind of encryption and decryption method of MPEG2 transport stream data packet, the present invention is based on block cipher, can support two kinds of conventional cryptography patterns of CBC and PCBC, also support the higher FFM pattern of a kind of fail safe to encrypt, have the security performance height, realize simple advantage.
The present invention adopts following technical scheme to realize: a kind of encryption method of MPEG2 transport stream data packet, and it comprises:
Steps A: the payload of transport stream data packet is divided into n grouping: P 1, P 2, P 3..., P nThe length of wherein preceding n-1 grouping is the L bit, last P that divides into groups nLength be less than or equal to the L bit, n is more than or equal to 1;
Step B: to i grouping P of payload in the transport stream data packet iCarry out encryption, output ciphertext block C i, this ciphertext block C iFor using key K to P iWith IV I-1Carry out the result of enciphering transformation by bit XOR value, wherein, n>i 〉=1;
Step C: if grouping P nLength equal the L bit, then to the grouping P nEncryption after the ciphertext block C that exports nFor using key K to P nWith IV N-1Carry out the result of enciphering transformation by bit XOR value; If grouping P nLength t less than the L bit, at P nThe right mend L-t " 0 ", then with result after the zero padding and IV N-1The encrypted result XOR, at last with XOR result's preceding t bit as P nCiphertext C nOutput;
Wherein, IV iBe conversion F (Mode, P i, C i, IV I-1) intermediate variable of output, and IV iLength be L, and one of them input parameter Mode of conversion F value respectively when selecting CBC pattern, PCBC pattern and FFM pattern for use: 0,1 and 2.
Wherein, if the payload of transport stream data packet only constitutes a grouping P 1, then adopt the CFB pattern to P 1Encrypt, suppose P 1Length be t, t≤L is at first at P 1The right mend L-t " 0 ", then with result after the zero padding and IV 0The encrypted result XOR, at last with XOR result's preceding t bit as P 1Ciphertext C 1Output.
Wherein, when i=1, first grouping of encryption transport stream data packet P 1Input parameter IV 0, and parameter Mode and key K all are shared parameters known between encryption side and the deciphering side.
In addition, the present invention discloses a kind of decryption method of MPEG2 transport stream data packet, and it comprises:
Steps A: the payload of the MPEG2 transport stream data packet of encrypting is divided into n grouping (n>1): C 1, C 2, C 3..., C n, wherein the length of preceding n-1 grouping is the L bit, last P that divides into groups nLength be less than or equal to the L bit, n is more than or equal to 1;
Step B: to i grouping C of payload in the transport stream data packet iBe decrypted processing, the grouping P of i payload in the output transport stream packet i, this P that divides into groups iFor to ciphertext block C iDecipher conversion earlier, again with IV I-1Obtain by the bit XOR, wherein, n>i 〉=1;
Step C: if last ciphertext block C nLength equal the L bit, then to the grouping C nDecryption processing after the payload grouping P that exports nFor to ciphertext block C nDecipher conversion earlier, and and IV N-1Obtain by the bit XOR; If ciphertext block C nLength t less than the L bit, at C nThe right mend L-t " 0 ", then with result after the zero padding and IV N-1The encrypted result XOR, at last with XOR result's preceding t bit as the payload P that divides into groups nOutput;
Wherein, IV iBe conversion F (Mode, P i, C i, IV I-1) intermediate variable of output, and IV iLength be L, and one of them input parameter Mode of conversion F value respectively when selecting CBC pattern, PCBC pattern and FFM pattern for use: 0,1 and 2.
Wherein, if the payload of the transport stream data packet of encrypting only constitutes a grouping C 1, then adopt the CFB pattern to C 1C is supposed in deciphering 1Length be t, t≤L is earlier at C 1The right mend L-t " 0 ", then with result after the zero padding and IV 0The encrypted result XOR, at last with XOR result's preceding t bit payload P as deciphering back transport stream data packet 1Output.
Wherein, when i=1, first grouping of decryption processing transport stream data packet C 1Input parameter IV 0, and parameter Mode and key K all are shared parameters known between encryption side and the deciphering side.
Compared with prior art, the present invention has following beneficial effect:
The present invention is based on grouping and encrypt or decryption processing, and support multiple encrypted work pattern, have the strong advantage of applicability.In addition, when the length of effective load is not the integral multiple of password block length, the present invention uses the method that is similar to the CFB pattern that the nubbin data are handled, and simply a lot of than the Cipher-Text Stealing technology to the nubbin data processing method, and fail safe is equivalent to the CFB pattern.
Description of drawings
Fig. 1 is the composition structural representation of the transport stream of reference format;
Fig. 2 is the payload encryption method among the present invention;
Payload nubbin encryption method among Fig. 3 the present invention;
Payload decryption method among Fig. 4 the present invention;
Payload nubbin decryption method among Fig. 5 the present invention.
Embodiment
The invention provides a kind of encryption and decryption method of MPEG2 transport stream data packet payload.This method can provide 3 kinds of different encryption modes as required, be respectively: CBC (Cipher Block Chaining, cipher block chaining) pattern, PCBC (Propagating Cipher Block Chaining, the expansion cipher block chaining) pattern, than CBC and the higher a kind of encryption mode of PCBC fail safe, this case abbreviates the FFM pattern as.When the length of effective load is not the integral multiple of password block length, this method uses the method that is similar to the CFB pattern that the nubbin data are handled, and simply a lot of than the Cipher-Text Stealing technology to the nubbin data processing method, fail safe is equivalent to the CFB pattern.
For ease of describing, each parameter to this case embodiment is described below earlier:
In this case embodiment, input parameter comprises: IV 0, mode parameter Mode, key K, P 1, P 2, P 3..., P nWherein, IV 0, mode parameter Mode and key K be the shared parameter between encryption side and the deciphering side; P 1, P 2, P 3..., P nBe the grouping situation of payload in the transport stream data packet, the length of the n-1 of front grouping all is the block length L of block cipher, last P that divides into groups nLength smaller or equal to L.Encryption method of the present invention is output as ciphertext block: C 1, C 2, C 3..., C nWherein, the length of preceding n-1 grouping all is the block length L of block cipher, and the length of last grouping equals corresponding clear packets P nLength.E KIt is the enciphering transformation that key K limits.
In addition, the conversion F that relates in this case subsequent descriptions is defined as follows: the input parameter of conversion F has 4, is respectively: IV I-1, P i, C iAnd Mode, i 〉=1 here; The output of conversion F is intermediate variable IV i(i 〉=1), IV iLength be L.The value of mode parameter Mode has three: 0,1 and 2, represent CBC pattern, PCBC pattern and the FFM pattern of encryption method respectively.Among the figure "
Figure G200910109747XD0000031
" represent by the bit XOR.When the Mode value is 0, and F (0, P i, C i, IV I-1)=C i, (i 〉=1); When the Mode value is 1,
Figure G200910109747XD0000032
(i 〉=1); When the Mode value is 2,
Figure G200910109747XD0000034
Encryption method of the present invention is when encrypting a MPEG2 transport stream data packet, and at first the payload with packet is divided into n grouping (n>1): P 1, P 2, P 3..., P nThe length of wherein preceding n-1 grouping is the L bit, last P that divides into groups nLength smaller or equal to the L bit.
As shown in Figure 2, if last grouping P nLength equal the L bit, then the cipher mode of n clear packets is consistent, promptly to i of payload in MPEG2 transport stream data packet grouping P iThe ciphertext block C that exports after the encryption carries out (n 〉=i 〉=1) iFor using key K to P iWith IV I-1Carry out the result of enciphering transformation by bit XOR value, can represent with following formula:
Figure G200910109747XD0000035
Wherein, IV i=F (Mode, P i, C i, IV I-1), n 〉=i 〉=1.
As shown in Figure 3, if last grouping P nLength less than the L bit, then before the cipher mode of n-1 clear packets be consistent, P but last divides into groups nAdopt the cipher mode of similar CFB pattern.Suppose grouping P nLength be t, t<L is at first at P nThe right mend L-t " 0 ", then with result after the zero padding and IV N-1The encrypted result XOR, at last with XOR result's preceding t bit C n *As P nCiphertext C nOutput.Can represent with following formula:
Figure G200910109747XD0000041
Wherein, IV i=F (Mode, P i, C i, IV I-1), n-1 〉=i 〉=1;
C n * | | C n * * = E K ( IV n - 1 ) ⊕ P n | | 00 , C n=C n *
Certainly, if the payload of transport stream data packet only constitutes a grouping, promptly n=1 then adopts the CFB pattern to P 1Encrypt.Suppose P 1Length be t, t≤L is at first at P 1The right mend L-t " 0 ", then with result after the zero padding and IV 0The encrypted result XOR, at last with XOR result's preceding t bit C 1 *As P 1Ciphertext C 1Output.Can represent with following formula:
C 1 * | | C 1 * * = E K ( IV 0 ) ⊕ P 1 | | 0 , C 1=C 1 *
As shown in Figure 4, decryption method of the present invention has following input parameter: IV 0, mode parameter Mode, key K, C 1, C 2, C 3..., C nWherein, IV 0, Mode and K be the parameter that share encryption side and deciphering side; C 1, C 2, C 3..., C nBe the grouping of payload in the transport stream data packet of an encryption, the length of the n-1 of front grouping all is the block length L of block cipher, last C that divides into groups nLength smaller or equal to L.Encryption method of the present invention is output as clear packets: P 1, P 2, P 3..., P nWherein, the length of preceding n-1 grouping all is the block length L of block cipher, and the length of last grouping equals corresponding ciphertext block C nLength.D KIt is the deciphering conversion that key K limits.The input parameter of conversion F has 4, is respectively: IV I-1, P i, C iAnd Mode, i 〉=1 here; The output of conversion F is intermediate variable IV i(i 〉=1), IV iLength be L.The value of parameter Mode has three: 0,1 and 2, represent CBC pattern, PCBC pattern and the FFM pattern of encryption method respectively.
Figure G200910109747XD0000044
Be by the bit XOR.
Decryption method of the present invention is when the MPEG2 transport stream data packet of an encryption of deciphering, and at first the payload with packet is divided into n grouping (n>1): C 1, C 2, C 3..., C nThe length of wherein preceding n-1 grouping is the L bit, last P that divides into groups nLength smaller or equal to the L bit.
The C if last divides into groups nLength equal the L bit, then the manner of decryption of n ciphertext block is consistent, promptly to ciphertext block C iDecipher conversion earlier, and and IV I-1Grouping Pi by i payload in the bit XOR acquisition MPEG2 transport stream data packet, can represent with following formula:
Wherein, IV i=F (Mode, P i, C i, IV I-1), n 〉=i 〉=1.
As shown in Figure 5, if last ciphertext block C nLength less than the L bit, then before the manner of decryption of n-1 ciphertext block be consistent, C but last divides into groups nAdopt the manner of decryption of similar CFB pattern.Suppose grouping C nLength be t, t<L is at first at C nThe right mend L-t " 0 ", then with result after the zero padding and IV N-1The encrypted result XOR, at last with XOR result's preceding t bit P n *As C nPlaintext P nOutput.Can represent with following formula:
Figure G200910109747XD0000046
Wherein, IV i=F (Mode, P i, C i, IV I-1), n-1 〉=i 〉=1;
P n * | | P n * * = E K ( IV n - 1 ) ⊕ C n | | 00 , P n=P n *
Certainly, if the payload of the transport stream data packet of encrypting only constitutes a grouping, promptly n=1 then adopts the CFB pattern to C 1Deciphering.Suppose C 1Length be t, t≤L is at first at C 1The right mend L-t " 0 ", then with result after the zero padding and IV 0The encrypted result XOR, at last with XOR result's preceding t bit P 1 *As C 1Plaintext P 1Output.Can represent with following formula:
P 1 * | | P 1 * * = E K ( IV 0 ) ⊕ C 1 | | 00 , P 1=P 1 *

Claims (6)

1. the encryption method of a MPEG2 transport stream data packet is characterized in that, comprising:
Steps A: the payload of transport stream data packet is divided into n grouping: P 1, P 2, P 3..., P nThe length of wherein preceding n-1 grouping is the L bit, last P that divides into groups nLength be less than or equal to the L bit, n is more than or equal to 1;
Step B: to i grouping P of payload in the transport stream data packet iCarry out encryption, output ciphertext block C i, this ciphertext block C iFor using key K to P iWith IV I-1Carry out the result of enciphering transformation by bit XOR value, wherein, n>i 〉=1;
Step C: if grouping P nLength equal the L bit, then to the grouping P nThe ciphertext block C that exports after the encryption nFor using key K to P nWith IV N-1Carry out the result of enciphering transformation by bit XOR value; If grouping P nLength t less than the L bit, at P nThe right mend L-t " 0 ", then with result after the zero padding and IV N-1The encrypted result XOR, at last with XOR result's preceding t bit as P nCiphertext C nOutput;
Wherein, IV iBe conversion F (Mode, P i, C i, IV I-1) intermediate variable of output, and IV iLength be L, and one of them input parameter Mode of conversion F value respectively when selecting " CBC pattern ", " PCBC pattern " and " FFM pattern " for use: 0,1 and 2.
2. according to the encryption method of the described MPEG2 transport stream data packet of claim 1, it is characterized in that, if the payload of transport stream data packet only constitutes a grouping P 1, then adopt the CFB pattern to P 1Encrypt, suppose P 1Length be t, t≤L is at first at P 1The right mend L-t " 0 ", then with result after the zero padding and IV 0The encrypted result XOR, at last with XOR result's preceding t bit as P 1Ciphertext C 1Output.
3. according to the encryption method of claim 1 or 2 described MPEG2 transport stream data packet, it is characterized in that, when i=1, first grouping of encryption transport stream data packet P 1Input parameter IV 0, and parameter Mode and key K all are shared parameters known between encryption side and the deciphering side.
4. the decryption method of a MPEG2 transport stream data packet is characterized in that, comprising:
Steps A: the payload of the MPEG2 transport stream data packet of encrypting is divided into n grouping (n>1): C 1, C 2, C 3..., C n, wherein the length of preceding n-1 grouping is the L bit, last P that divides into groups nLength be less than or equal to the L bit, n is more than or equal to 1;
Step B: to i grouping C of payload in the transport stream data packet iBe decrypted processing, i of payload grouping P in the output transport stream packet i, this P that divides into groups iFor to ciphertext block C iDecipher conversion earlier, again with IV I-1Obtain by the bit XOR, wherein, n>i 〉=1;
Step C: if last ciphertext block C nLength equal the L bit, then to the grouping C nDecryption processing after the payload grouping P that exports nFor to ciphertext block C nDecipher conversion earlier, again with IV N-1Obtain by the bit XOR; If ciphertext block C nLength t less than the L bit, at C nThe right mend L-t " 0 ", then with result after the zero padding and IV N-1The encrypted result XOR, at last with XOR result's preceding t bit as the payload P that divides into groups nOutput;
Wherein, IV iBe conversion F (Mode, P i, C i, IV I-1) intermediate variable of output, and IV iLength be L, and one of them input parameter Mode of conversion F value respectively when selecting " CBC pattern ", " PCBC pattern " and " FFM pattern " for use: 0,1 and 2.
5. according to the decryption method of the described MPEG2 transport stream data packet of claim 4, it is characterized in that, if the payload of the transport stream data packet of encrypting only constitutes a grouping C 1, then adopt the CFB pattern to C 1C is supposed in deciphering 1Length be t, t≤L is earlier at C 1The right mend L-t " 0 ", then with result after the zero padding and IV 0The encrypted result XOR, at last with XOR result's preceding t bit payload P as deciphering back transport stream data packet 1Output.
6. according to the decryption method of claim 4 or 5 described MPEG2 transport stream data packet, it is characterized in that, when i=1, first grouping of decryption processing transport stream data packet C 1Input parameter IV 0, and parameter Mode and key K all are shared parameters known between encryption side and the deciphering side.
CN 200910109747 2009-11-17 2009-11-17 Method for enciphering and deciphering MPEG2 transport stream packets Expired - Fee Related CN101710964B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 200910109747 CN101710964B (en) 2009-11-17 2009-11-17 Method for enciphering and deciphering MPEG2 transport stream packets

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 200910109747 CN101710964B (en) 2009-11-17 2009-11-17 Method for enciphering and deciphering MPEG2 transport stream packets

Publications (2)

Publication Number Publication Date
CN101710964A true CN101710964A (en) 2010-05-19
CN101710964B CN101710964B (en) 2012-09-05

Family

ID=42403722

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 200910109747 Expired - Fee Related CN101710964B (en) 2009-11-17 2009-11-17 Method for enciphering and deciphering MPEG2 transport stream packets

Country Status (1)

Country Link
CN (1) CN101710964B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102437910A (en) * 2011-10-18 2012-05-02 国家超级计算深圳中心(深圳云计算中心) Data encryption/decryption checking method and system
CN102917250A (en) * 2012-11-08 2013-02-06 四川虹微技术有限公司 Audio and video transmission method for digital media interface
CN108063760A (en) * 2017-12-11 2018-05-22 苏州科达科技股份有限公司 Method and its system, the method for packet deciphering of a kind of block encryption
CN112769875A (en) * 2021-04-08 2021-05-07 中国测绘科学研究院 GNSS reference station data transmission and deformation monitoring and early warning method and system
CN115801321A (en) * 2022-10-20 2023-03-14 北京海泰方圆科技股份有限公司 Data combination encryption method and device

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FI95756C (en) * 1994-03-21 1996-03-11 Nokia Technology Gmbh A method for encrypting and decrypting a bitstream containing digital information
JP3925218B2 (en) * 2002-01-30 2007-06-06 ソニー株式会社 Streaming system and streaming method, streaming server and data distribution method, client terminal and data decoding method, program and recording medium
US7103184B2 (en) * 2002-05-09 2006-09-05 Intel Corporation System and method for sign mask encryption and decryption
JP4235174B2 (en) * 2002-08-08 2009-03-11 パナソニック株式会社 Encryption / decryption device, encryption device, decryption device, and transmission / reception device
FR2857811A1 (en) * 2003-07-16 2005-01-21 St Microelectronics Sa Compressed audio/video data flow encrypting method for wireless transmission system, involves encrypting part of packet bits of audio or video data that are defined by two consecutive timing marks, by random pseudo flow
JP4734906B2 (en) * 2004-12-07 2011-07-27 ソニー株式会社 Information processing apparatus, information recording medium, information processing method, and computer program

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102437910A (en) * 2011-10-18 2012-05-02 国家超级计算深圳中心(深圳云计算中心) Data encryption/decryption checking method and system
CN102917250A (en) * 2012-11-08 2013-02-06 四川虹微技术有限公司 Audio and video transmission method for digital media interface
CN102917250B (en) * 2012-11-08 2015-07-01 四川虹微技术有限公司 Audio and video transmission method for digital media interface
CN108063760A (en) * 2017-12-11 2018-05-22 苏州科达科技股份有限公司 Method and its system, the method for packet deciphering of a kind of block encryption
CN108063760B (en) * 2017-12-11 2020-06-16 苏州科达科技股份有限公司 Method and system for block encryption and method for block decryption
CN112769875A (en) * 2021-04-08 2021-05-07 中国测绘科学研究院 GNSS reference station data transmission and deformation monitoring and early warning method and system
CN112769875B (en) * 2021-04-08 2022-08-12 中国测绘科学研究院 GNSS reference station data transmission and deformation monitoring and early warning method and system
CN115801321A (en) * 2022-10-20 2023-03-14 北京海泰方圆科技股份有限公司 Data combination encryption method and device
CN115801321B (en) * 2022-10-20 2023-11-14 北京海泰方圆科技股份有限公司 Data combination encryption method and device

Also Published As

Publication number Publication date
CN101710964B (en) 2012-09-05

Similar Documents

Publication Publication Date Title
RU2439668C2 (en) Methods to scramble and to unscramble data units
CN101753292B (en) Methods and devices for a chained encryption mode
US6504930B2 (en) Encryption and decryption method and apparatus using a work key which is generated by executing a decryption algorithm
US20150172053A1 (en) Method for converting a conditional access content and receiver for the implementation for said method
KR101737299B1 (en) Encoder, decoder and methods
CN102664740B (en) Remote-authorization-based bidding document encryption and decryption method
CN101645773A (en) Signcryption scheme based on elliptic curve cryptography
CN101247520B (en) Video data enciphering/deciphering method
CN101710964B (en) Method for enciphering and deciphering MPEG2 transport stream packets
Amorado et al. Enhanced data encryption standard (DES) algorithm based on filtering and striding techniques
EP2904731B1 (en) Method and device for digital data blocks encryption and decryption
CN111556004A (en) Hybrid dual network encryption system
CN112532384B (en) Method for quickly encrypting and decrypting transmission key based on packet key mode
US11057193B2 (en) Enhanced randomness for digital systems
US7773753B2 (en) Efficient remotely-keyed symmetric cryptography for digital rights management
CN110730366B (en) Bit operation-based lightweight video stream encryption and decryption method and encryption and decryption method
CN102546152B (en) Method for achieving multi-stage encryption and decryption of data
CN101500146A (en) Digital television receiving control method and apparatus based on bi-directional network
CN101500147B (en) Digital television receiving control method and apparatus based on bi-directional network
CN111556003A (en) Dual network encryption system
CN101119170A (en) Frequency modulated subcarrier based user management method
Verma et al. Analysis of comparison between Single Encryption(Advance Encryption Scheme (AES)) and Multicrypt Encryption Scheme
CN103338105A (en) Method for AES-encryption-based airport noise prediction data network transmission
Li et al. Further Improvements of Fast Encryption Algoirthm for Multimedia.
THWE Secure Information Exchange System for Criminal Cases

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CP03 Change of name, title or address
CP03 Change of name, title or address

Address after: 22A, Guoshi building, 1801 Shahe West Road, high tech Zone, Yuehai street, Nanshan District, Shenzhen City, Guangdong Province

Patentee after: GUOWEI GROUP (SHENZHEN) Co.,Ltd.

Address before: 518057 Guangdong city of Shenzhen province Nanshan District high tech Industrial Park South high SSMEC building two floor

Patentee before: SHENZHEN STATE MICRO TECHNOLOGY Co.,Ltd.

CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20120905