CN101710964A - Method for enciphering and deciphering MPEG2 transport stream packets - Google Patents
Method for enciphering and deciphering MPEG2 transport stream packets Download PDFInfo
- Publication number
- CN101710964A CN101710964A CN200910109747A CN200910109747A CN101710964A CN 101710964 A CN101710964 A CN 101710964A CN 200910109747 A CN200910109747 A CN 200910109747A CN 200910109747 A CN200910109747 A CN 200910109747A CN 101710964 A CN101710964 A CN 101710964A
- Authority
- CN
- China
- Prior art keywords
- transport stream
- bit
- grouping
- length
- data packet
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 33
- 238000006243 chemical reaction Methods 0.000 claims description 17
- 230000009466 transformation Effects 0.000 claims description 4
- 230000006978 adaptation Effects 0.000 description 2
- 238000003672 processing method Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000006835 compression Effects 0.000 description 1
- 238000007906 compression Methods 0.000 description 1
- 230000001902 propagating effect Effects 0.000 description 1
- 230000001681 protective effect Effects 0.000 description 1
- 238000000926 separation method Methods 0.000 description 1
Images
Landscapes
- Data Exchanges In Wide-Area Networks (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
- Compression Or Coding Systems Of Tv Signals (AREA)
Abstract
The invention provides a method for enciphering and deciphering MPEG2 transport stream packets. The method comprises the following steps of: based on the length of L bits, dividing the payload of transport stream packets into n subgroups of P1, P2, P3 till Pn; enciphering the ith subgroup Pi of the payload of the transport stream packets, and outputting the cipher subgroup Ci which is the enciphered result of the bit-by-bit XOR value of Pi and IVi-1 by using a secret key K, wherein n is less than n and not less than 1; if the length of the subgroup Pn is equal to L bits, the cipher subgroup Cn output after enciphering the subgroup Pn is the enciphered result of the bit-by-bit XOR value of Pn and IVn-1 by using the secret key K; and if the length t of the subgroup Pn is less than L bits, adding L-t zeros at the right of Pn, then XORing the result with added zeros and the enciphered result of IVn-1, and finally outputting the first t bits of the XOR result as the cipher of Pn (Cn). The invention has the advantages of high safety performance and easy implementation.
Description
Technical field
The present invention relates to the digital content protection technology, relate in particular to the encipher-decipher method that adopts the transport stream data packet of MPEG2 standard compression in a kind of digital interface content protective system.
Background technology
MPEG2 transport stream in the digital television broadcasting system is transferred to user side by radio network (wired, satellite or ground) after the front end scrambling.Typical ustomer premises access equipment adopts the separation between machine and card technology to receive transport stream: the transport stream of scrambling descrambling in smart card, transport stream behind the descrambling through the digital interface between smart card and the main frame (for example, PCMCIA, USB) arrive main frame, transport stream is finished demultiplexing, source coding and output in main frame.
As shown in Figure 1, transport stream is made of continuous packet.Packet has the form of standard, and its total length is 188 bytes, and wherein preceding 4 bytes are packet packet header, next is optional elongated adaptation field, is the payload of some bytes at last.
In order to guarantee the fail safe of MPEG2 transport stream the time, need in card, the payload to transport stream encrypt again, and data packet head, adaptation field and total length of data packets remain unchanged by the digital interface between card and the main frame.Existing at present three standards define the encryption method here.
1, " CableCARD Copy Protection 2.0 Specification " adopt ECB (Electric Code Book, the electronic code book) pattern of TDES algorithm that the payload of transport stream data packet is encrypted in (2009-05-08); If the length of payload is not the integral multiple of 64 bits, need to use Cipher-Text Stealing technology (specifically seeing the U.S. Patent application of US005684876A) to keep fixing data packet length.
2, adopt CBC (Cipher Block Chaining, the link of the encrypted word group) pattern of aes algorithm that data packet payload is encrypted in " CI Plus Specification:Content Security Extensions to the Common Interface.V1.2.2009-4-16 "; If the length of payload is not the integral multiple of 128 bits, adopt the method for transparent transmission tail data to keep fixing data packet length.
3, " Digital Video Broadcasting Content Protection ﹠amp; Copy Management.Rev.1.2007-7 " in adopt the CBC pattern of aes algorithm that data packet payload is encrypted; If the length of payload is not the integral multiple of 128 bits, need to adopt another Cipher-Text Stealing technology (specifically seeing the U.S. Patent application of US20080137851A1) to keep fixing data packet length.
Said method all adopts the block cipher with fixing input length and fixing output length that the payload of packet is carried out encryption and decryption.The block length of supposing block cipher is the L bit, at first payload is divided into the grouping of some L bits when then encrypting, and then each grouping is encrypted.If the length of payload is not the integral multiple of block length L, then need special means to handle.In addition, the CBC pattern of employing block cipher has higher fail safe to the payload encryption of transport stream data packet than the employing ecb mode, adopts the Cipher-Text Stealing technology can effectively solve the problem that loaded length is not a block cipher block length integral multiple.
Summary of the invention
The present invention proposes a kind of encryption and decryption method of MPEG2 transport stream data packet, the present invention is based on block cipher, can support two kinds of conventional cryptography patterns of CBC and PCBC, also support the higher FFM pattern of a kind of fail safe to encrypt, have the security performance height, realize simple advantage.
The present invention adopts following technical scheme to realize: a kind of encryption method of MPEG2 transport stream data packet, and it comprises:
Steps A: the payload of transport stream data packet is divided into n grouping: P
1, P
2, P
3..., P
nThe length of wherein preceding n-1 grouping is the L bit, last P that divides into groups
nLength be less than or equal to the L bit, n is more than or equal to 1;
Step B: to i grouping P of payload in the transport stream data packet
iCarry out encryption, output ciphertext block C
i, this ciphertext block C
iFor using key K to P
iWith IV
I-1Carry out the result of enciphering transformation by bit XOR value, wherein, n>i 〉=1;
Step C: if grouping P
nLength equal the L bit, then to the grouping P
nEncryption after the ciphertext block C that exports
nFor using key K to P
nWith IV
N-1Carry out the result of enciphering transformation by bit XOR value; If grouping P
nLength t less than the L bit, at P
nThe right mend L-t " 0 ", then with result after the zero padding and IV
N-1The encrypted result XOR, at last with XOR result's preceding t bit as P
nCiphertext C
nOutput;
Wherein, IV
iBe conversion F (Mode, P
i, C
i, IV
I-1) intermediate variable of output, and IV
iLength be L, and one of them input parameter Mode of conversion F value respectively when selecting CBC pattern, PCBC pattern and FFM pattern for use: 0,1 and 2.
Wherein, if the payload of transport stream data packet only constitutes a grouping P
1, then adopt the CFB pattern to P
1Encrypt, suppose P
1Length be t, t≤L is at first at P
1The right mend L-t " 0 ", then with result after the zero padding and IV
0The encrypted result XOR, at last with XOR result's preceding t bit as P
1Ciphertext C
1Output.
Wherein, when i=1, first grouping of encryption transport stream data packet P
1Input parameter IV
0, and parameter Mode and key K all are shared parameters known between encryption side and the deciphering side.
In addition, the present invention discloses a kind of decryption method of MPEG2 transport stream data packet, and it comprises:
Steps A: the payload of the MPEG2 transport stream data packet of encrypting is divided into n grouping (n>1): C
1, C
2, C
3..., C
n, wherein the length of preceding n-1 grouping is the L bit, last P that divides into groups
nLength be less than or equal to the L bit, n is more than or equal to 1;
Step B: to i grouping C of payload in the transport stream data packet
iBe decrypted processing, the grouping P of i payload in the output transport stream packet
i, this P that divides into groups
iFor to ciphertext block C
iDecipher conversion earlier, again with IV
I-1Obtain by the bit XOR, wherein, n>i 〉=1;
Step C: if last ciphertext block C
nLength equal the L bit, then to the grouping C
nDecryption processing after the payload grouping P that exports
nFor to ciphertext block C
nDecipher conversion earlier, and and IV
N-1Obtain by the bit XOR; If ciphertext block C
nLength t less than the L bit, at C
nThe right mend L-t " 0 ", then with result after the zero padding and IV
N-1The encrypted result XOR, at last with XOR result's preceding t bit as the payload P that divides into groups
nOutput;
Wherein, IV
iBe conversion F (Mode, P
i, C
i, IV
I-1) intermediate variable of output, and IV
iLength be L, and one of them input parameter Mode of conversion F value respectively when selecting CBC pattern, PCBC pattern and FFM pattern for use: 0,1 and 2.
Wherein, if the payload of the transport stream data packet of encrypting only constitutes a grouping C
1, then adopt the CFB pattern to C
1C is supposed in deciphering
1Length be t, t≤L is earlier at C
1The right mend L-t " 0 ", then with result after the zero padding and IV
0The encrypted result XOR, at last with XOR result's preceding t bit payload P as deciphering back transport stream data packet
1Output.
Wherein, when i=1, first grouping of decryption processing transport stream data packet C
1Input parameter IV
0, and parameter Mode and key K all are shared parameters known between encryption side and the deciphering side.
Compared with prior art, the present invention has following beneficial effect:
The present invention is based on grouping and encrypt or decryption processing, and support multiple encrypted work pattern, have the strong advantage of applicability.In addition, when the length of effective load is not the integral multiple of password block length, the present invention uses the method that is similar to the CFB pattern that the nubbin data are handled, and simply a lot of than the Cipher-Text Stealing technology to the nubbin data processing method, and fail safe is equivalent to the CFB pattern.
Description of drawings
Fig. 1 is the composition structural representation of the transport stream of reference format;
Fig. 2 is the payload encryption method among the present invention;
Payload nubbin encryption method among Fig. 3 the present invention;
Payload decryption method among Fig. 4 the present invention;
Payload nubbin decryption method among Fig. 5 the present invention.
Embodiment
The invention provides a kind of encryption and decryption method of MPEG2 transport stream data packet payload.This method can provide 3 kinds of different encryption modes as required, be respectively: CBC (Cipher Block Chaining, cipher block chaining) pattern, PCBC (Propagating Cipher Block Chaining, the expansion cipher block chaining) pattern, than CBC and the higher a kind of encryption mode of PCBC fail safe, this case abbreviates the FFM pattern as.When the length of effective load is not the integral multiple of password block length, this method uses the method that is similar to the CFB pattern that the nubbin data are handled, and simply a lot of than the Cipher-Text Stealing technology to the nubbin data processing method, fail safe is equivalent to the CFB pattern.
For ease of describing, each parameter to this case embodiment is described below earlier:
In this case embodiment, input parameter comprises: IV
0, mode parameter Mode, key K, P
1, P
2, P
3..., P
nWherein, IV
0, mode parameter Mode and key K be the shared parameter between encryption side and the deciphering side; P
1, P
2, P
3..., P
nBe the grouping situation of payload in the transport stream data packet, the length of the n-1 of front grouping all is the block length L of block cipher, last P that divides into groups
nLength smaller or equal to L.Encryption method of the present invention is output as ciphertext block: C
1, C
2, C
3..., C
nWherein, the length of preceding n-1 grouping all is the block length L of block cipher, and the length of last grouping equals corresponding clear packets P
nLength.E
KIt is the enciphering transformation that key K limits.
In addition, the conversion F that relates in this case subsequent descriptions is defined as follows: the input parameter of conversion F has 4, is respectively: IV
I-1, P
i, C
iAnd Mode, i 〉=1 here; The output of conversion F is intermediate variable IV
i(i 〉=1), IV
iLength be L.The value of mode parameter Mode has three: 0,1 and 2, represent CBC pattern, PCBC pattern and the FFM pattern of encryption method respectively.Among the figure "
" represent by the bit XOR.When the Mode value is 0, and F (0, P
i, C
i, IV
I-1)=C
i, (i 〉=1); When the Mode value is 1,
(i 〉=1); When the Mode value is 2,
Encryption method of the present invention is when encrypting a MPEG2 transport stream data packet, and at first the payload with packet is divided into n grouping (n>1): P
1, P
2, P
3..., P
nThe length of wherein preceding n-1 grouping is the L bit, last P that divides into groups
nLength smaller or equal to the L bit.
As shown in Figure 2, if last grouping P
nLength equal the L bit, then the cipher mode of n clear packets is consistent, promptly to i of payload in MPEG2 transport stream data packet grouping P
iThe ciphertext block C that exports after the encryption carries out (n 〉=i 〉=1)
iFor using key K to P
iWith IV
I-1Carry out the result of enciphering transformation by bit XOR value, can represent with following formula:
As shown in Figure 3, if last grouping P
nLength less than the L bit, then before the cipher mode of n-1 clear packets be consistent, P but last divides into groups
nAdopt the cipher mode of similar CFB pattern.Suppose grouping P
nLength be t, t<L is at first at P
nThe right mend L-t " 0 ", then with result after the zero padding and IV
N-1The encrypted result XOR, at last with XOR result's preceding t bit C
n *As P
nCiphertext C
nOutput.Can represent with following formula:
Certainly, if the payload of transport stream data packet only constitutes a grouping, promptly n=1 then adopts the CFB pattern to P
1Encrypt.Suppose P
1Length be t, t≤L is at first at P
1The right mend L-t " 0 ", then with result after the zero padding and IV
0The encrypted result XOR, at last with XOR result's preceding t bit C
1 *As P
1Ciphertext C
1Output.Can represent with following formula:
As shown in Figure 4, decryption method of the present invention has following input parameter: IV
0, mode parameter Mode, key K, C
1, C
2, C
3..., C
nWherein, IV
0, Mode and K be the parameter that share encryption side and deciphering side; C
1, C
2, C
3..., C
nBe the grouping of payload in the transport stream data packet of an encryption, the length of the n-1 of front grouping all is the block length L of block cipher, last C that divides into groups
nLength smaller or equal to L.Encryption method of the present invention is output as clear packets: P
1, P
2, P
3..., P
nWherein, the length of preceding n-1 grouping all is the block length L of block cipher, and the length of last grouping equals corresponding ciphertext block C
nLength.D
KIt is the deciphering conversion that key K limits.The input parameter of conversion F has 4, is respectively: IV
I-1, P
i, C
iAnd Mode, i 〉=1 here; The output of conversion F is intermediate variable IV
i(i 〉=1), IV
iLength be L.The value of parameter Mode has three: 0,1 and 2, represent CBC pattern, PCBC pattern and the FFM pattern of encryption method respectively.
Be by the bit XOR.
Decryption method of the present invention is when the MPEG2 transport stream data packet of an encryption of deciphering, and at first the payload with packet is divided into n grouping (n>1): C
1, C
2, C
3..., C
nThe length of wherein preceding n-1 grouping is the L bit, last P that divides into groups
nLength smaller or equal to the L bit.
The C if last divides into groups
nLength equal the L bit, then the manner of decryption of n ciphertext block is consistent, promptly to ciphertext block C
iDecipher conversion earlier, and and IV
I-1Grouping Pi by i payload in the bit XOR acquisition MPEG2 transport stream data packet, can represent with following formula:
Wherein, IV
i=F (Mode, P
i, C
i, IV
I-1), n 〉=i 〉=1.
As shown in Figure 5, if last ciphertext block C
nLength less than the L bit, then before the manner of decryption of n-1 ciphertext block be consistent, C but last divides into groups
nAdopt the manner of decryption of similar CFB pattern.Suppose grouping C
nLength be t, t<L is at first at C
nThe right mend L-t " 0 ", then with result after the zero padding and IV
N-1The encrypted result XOR, at last with XOR result's preceding t bit P
n *As C
nPlaintext P
nOutput.Can represent with following formula:
Certainly, if the payload of the transport stream data packet of encrypting only constitutes a grouping, promptly n=1 then adopts the CFB pattern to C
1Deciphering.Suppose C
1Length be t, t≤L is at first at C
1The right mend L-t " 0 ", then with result after the zero padding and IV
0The encrypted result XOR, at last with XOR result's preceding t bit P
1 *As C
1Plaintext P
1Output.Can represent with following formula:
Claims (6)
1. the encryption method of a MPEG2 transport stream data packet is characterized in that, comprising:
Steps A: the payload of transport stream data packet is divided into n grouping: P
1, P
2, P
3..., P
nThe length of wherein preceding n-1 grouping is the L bit, last P that divides into groups
nLength be less than or equal to the L bit, n is more than or equal to 1;
Step B: to i grouping P of payload in the transport stream data packet
iCarry out encryption, output ciphertext block C
i, this ciphertext block C
iFor using key K to P
iWith IV
I-1Carry out the result of enciphering transformation by bit XOR value, wherein, n>i 〉=1;
Step C: if grouping P
nLength equal the L bit, then to the grouping P
nThe ciphertext block C that exports after the encryption
nFor using key K to P
nWith IV
N-1Carry out the result of enciphering transformation by bit XOR value; If grouping P
nLength t less than the L bit, at P
nThe right mend L-t " 0 ", then with result after the zero padding and IV
N-1The encrypted result XOR, at last with XOR result's preceding t bit as P
nCiphertext C
nOutput;
Wherein, IV
iBe conversion F (Mode, P
i, C
i, IV
I-1) intermediate variable of output, and IV
iLength be L, and one of them input parameter Mode of conversion F value respectively when selecting " CBC pattern ", " PCBC pattern " and " FFM pattern " for use: 0,1 and 2.
2. according to the encryption method of the described MPEG2 transport stream data packet of claim 1, it is characterized in that, if the payload of transport stream data packet only constitutes a grouping P
1, then adopt the CFB pattern to P
1Encrypt, suppose P
1Length be t, t≤L is at first at P
1The right mend L-t " 0 ", then with result after the zero padding and IV
0The encrypted result XOR, at last with XOR result's preceding t bit as P
1Ciphertext C
1Output.
3. according to the encryption method of claim 1 or 2 described MPEG2 transport stream data packet, it is characterized in that, when i=1, first grouping of encryption transport stream data packet P
1Input parameter IV
0, and parameter Mode and key K all are shared parameters known between encryption side and the deciphering side.
4. the decryption method of a MPEG2 transport stream data packet is characterized in that, comprising:
Steps A: the payload of the MPEG2 transport stream data packet of encrypting is divided into n grouping (n>1): C
1, C
2, C
3..., C
n, wherein the length of preceding n-1 grouping is the L bit, last P that divides into groups
nLength be less than or equal to the L bit, n is more than or equal to 1;
Step B: to i grouping C of payload in the transport stream data packet
iBe decrypted processing, i of payload grouping P in the output transport stream packet
i, this P that divides into groups
iFor to ciphertext block C
iDecipher conversion earlier, again with IV
I-1Obtain by the bit XOR, wherein, n>i 〉=1;
Step C: if last ciphertext block C
nLength equal the L bit, then to the grouping C
nDecryption processing after the payload grouping P that exports
nFor to ciphertext block C
nDecipher conversion earlier, again with IV
N-1Obtain by the bit XOR; If ciphertext block C
nLength t less than the L bit, at C
nThe right mend L-t " 0 ", then with result after the zero padding and IV
N-1The encrypted result XOR, at last with XOR result's preceding t bit as the payload P that divides into groups
nOutput;
Wherein, IV
iBe conversion F (Mode, P
i, C
i, IV
I-1) intermediate variable of output, and IV
iLength be L, and one of them input parameter Mode of conversion F value respectively when selecting " CBC pattern ", " PCBC pattern " and " FFM pattern " for use: 0,1 and 2.
5. according to the decryption method of the described MPEG2 transport stream data packet of claim 4, it is characterized in that, if the payload of the transport stream data packet of encrypting only constitutes a grouping C
1, then adopt the CFB pattern to C
1C is supposed in deciphering
1Length be t, t≤L is earlier at C
1The right mend L-t " 0 ", then with result after the zero padding and IV
0The encrypted result XOR, at last with XOR result's preceding t bit payload P as deciphering back transport stream data packet
1Output.
6. according to the decryption method of claim 4 or 5 described MPEG2 transport stream data packet, it is characterized in that, when i=1, first grouping of decryption processing transport stream data packet C
1Input parameter IV
0, and parameter Mode and key K all are shared parameters known between encryption side and the deciphering side.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 200910109747 CN101710964B (en) | 2009-11-17 | 2009-11-17 | Method for enciphering and deciphering MPEG2 transport stream packets |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 200910109747 CN101710964B (en) | 2009-11-17 | 2009-11-17 | Method for enciphering and deciphering MPEG2 transport stream packets |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101710964A true CN101710964A (en) | 2010-05-19 |
CN101710964B CN101710964B (en) | 2012-09-05 |
Family
ID=42403722
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN 200910109747 Expired - Fee Related CN101710964B (en) | 2009-11-17 | 2009-11-17 | Method for enciphering and deciphering MPEG2 transport stream packets |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101710964B (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102437910A (en) * | 2011-10-18 | 2012-05-02 | 国家超级计算深圳中心(深圳云计算中心) | Data encryption/decryption checking method and system |
CN102917250A (en) * | 2012-11-08 | 2013-02-06 | 四川虹微技术有限公司 | Audio and video transmission method for digital media interface |
CN108063760A (en) * | 2017-12-11 | 2018-05-22 | 苏州科达科技股份有限公司 | Method and its system, the method for packet deciphering of a kind of block encryption |
CN112769875A (en) * | 2021-04-08 | 2021-05-07 | 中国测绘科学研究院 | GNSS reference station data transmission and deformation monitoring and early warning method and system |
CN115801321A (en) * | 2022-10-20 | 2023-03-14 | 北京海泰方圆科技股份有限公司 | Data combination encryption method and device |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FI95756C (en) * | 1994-03-21 | 1996-03-11 | Nokia Technology Gmbh | A method for encrypting and decrypting a bitstream containing digital information |
JP3925218B2 (en) * | 2002-01-30 | 2007-06-06 | ソニー株式会社 | Streaming system and streaming method, streaming server and data distribution method, client terminal and data decoding method, program and recording medium |
US7103184B2 (en) * | 2002-05-09 | 2006-09-05 | Intel Corporation | System and method for sign mask encryption and decryption |
JP4235174B2 (en) * | 2002-08-08 | 2009-03-11 | パナソニック株式会社 | Encryption / decryption device, encryption device, decryption device, and transmission / reception device |
FR2857811A1 (en) * | 2003-07-16 | 2005-01-21 | St Microelectronics Sa | Compressed audio/video data flow encrypting method for wireless transmission system, involves encrypting part of packet bits of audio or video data that are defined by two consecutive timing marks, by random pseudo flow |
JP4734906B2 (en) * | 2004-12-07 | 2011-07-27 | ソニー株式会社 | Information processing apparatus, information recording medium, information processing method, and computer program |
-
2009
- 2009-11-17 CN CN 200910109747 patent/CN101710964B/en not_active Expired - Fee Related
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102437910A (en) * | 2011-10-18 | 2012-05-02 | 国家超级计算深圳中心(深圳云计算中心) | Data encryption/decryption checking method and system |
CN102917250A (en) * | 2012-11-08 | 2013-02-06 | 四川虹微技术有限公司 | Audio and video transmission method for digital media interface |
CN102917250B (en) * | 2012-11-08 | 2015-07-01 | 四川虹微技术有限公司 | Audio and video transmission method for digital media interface |
CN108063760A (en) * | 2017-12-11 | 2018-05-22 | 苏州科达科技股份有限公司 | Method and its system, the method for packet deciphering of a kind of block encryption |
CN108063760B (en) * | 2017-12-11 | 2020-06-16 | 苏州科达科技股份有限公司 | Method and system for block encryption and method for block decryption |
CN112769875A (en) * | 2021-04-08 | 2021-05-07 | 中国测绘科学研究院 | GNSS reference station data transmission and deformation monitoring and early warning method and system |
CN112769875B (en) * | 2021-04-08 | 2022-08-12 | 中国测绘科学研究院 | GNSS reference station data transmission and deformation monitoring and early warning method and system |
CN115801321A (en) * | 2022-10-20 | 2023-03-14 | 北京海泰方圆科技股份有限公司 | Data combination encryption method and device |
CN115801321B (en) * | 2022-10-20 | 2023-11-14 | 北京海泰方圆科技股份有限公司 | Data combination encryption method and device |
Also Published As
Publication number | Publication date |
---|---|
CN101710964B (en) | 2012-09-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
RU2439668C2 (en) | Methods to scramble and to unscramble data units | |
CN101753292B (en) | Methods and devices for a chained encryption mode | |
US6504930B2 (en) | Encryption and decryption method and apparatus using a work key which is generated by executing a decryption algorithm | |
US20150172053A1 (en) | Method for converting a conditional access content and receiver for the implementation for said method | |
KR101737299B1 (en) | Encoder, decoder and methods | |
CN102664740B (en) | Remote-authorization-based bidding document encryption and decryption method | |
CN101645773A (en) | Signcryption scheme based on elliptic curve cryptography | |
CN101247520B (en) | Video data enciphering/deciphering method | |
CN101710964B (en) | Method for enciphering and deciphering MPEG2 transport stream packets | |
Amorado et al. | Enhanced data encryption standard (DES) algorithm based on filtering and striding techniques | |
EP2904731B1 (en) | Method and device for digital data blocks encryption and decryption | |
CN111556004A (en) | Hybrid dual network encryption system | |
CN112532384B (en) | Method for quickly encrypting and decrypting transmission key based on packet key mode | |
US11057193B2 (en) | Enhanced randomness for digital systems | |
US7773753B2 (en) | Efficient remotely-keyed symmetric cryptography for digital rights management | |
CN110730366B (en) | Bit operation-based lightweight video stream encryption and decryption method and encryption and decryption method | |
CN102546152B (en) | Method for achieving multi-stage encryption and decryption of data | |
CN101500146A (en) | Digital television receiving control method and apparatus based on bi-directional network | |
CN101500147B (en) | Digital television receiving control method and apparatus based on bi-directional network | |
CN111556003A (en) | Dual network encryption system | |
CN101119170A (en) | Frequency modulated subcarrier based user management method | |
Verma et al. | Analysis of comparison between Single Encryption(Advance Encryption Scheme (AES)) and Multicrypt Encryption Scheme | |
CN103338105A (en) | Method for AES-encryption-based airport noise prediction data network transmission | |
Li et al. | Further Improvements of Fast Encryption Algoirthm for Multimedia. | |
THWE | Secure Information Exchange System for Criminal Cases |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CP03 | Change of name, title or address | ||
CP03 | Change of name, title or address |
Address after: 22A, Guoshi building, 1801 Shahe West Road, high tech Zone, Yuehai street, Nanshan District, Shenzhen City, Guangdong Province Patentee after: GUOWEI GROUP (SHENZHEN) Co.,Ltd. Address before: 518057 Guangdong city of Shenzhen province Nanshan District high tech Industrial Park South high SSMEC building two floor Patentee before: SHENZHEN STATE MICRO TECHNOLOGY Co.,Ltd. |
|
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20120905 |