WO1998007252A1 - Data encryption - Google Patents

Data encryption Download PDF

Info

Publication number
WO1998007252A1
WO1998007252A1 PCT/GB1997/002138 GB9702138W WO9807252A1 WO 1998007252 A1 WO1998007252 A1 WO 1998007252A1 GB 9702138 W GB9702138 W GB 9702138W WO 9807252 A1 WO9807252 A1 WO 9807252A1
Authority
WO
WIPO (PCT)
Prior art keywords
sequence
user
data
bits
identity code
Prior art date
Application number
PCT/GB1997/002138
Other languages
French (fr)
Inventor
Richard Steven Faria
Original Assignee
Richard Steven Faria
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Richard Steven Faria filed Critical Richard Steven Faria
Priority to AU38567/97A priority Critical patent/AU3856797A/en
Publication of WO1998007252A1 publication Critical patent/WO1998007252A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/065Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/16Analogue secrecy systems; Analogue subscription systems
    • H04N7/167Systems rendering the television signal unintelligible and subsequently intelligible
    • H04N7/1675Providing digital key or authorisation information for generation or regeneration of the scrambling sequence
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/16Analogue secrecy systems; Analogue subscription systems
    • H04N7/173Analogue secrecy systems; Analogue subscription systems with two-way working, e.g. subscriber sending a programme selection signal
    • H04N7/17309Transmission or handling of upstream communications
    • H04N7/17318Direct or substantially direct transmission and handling of requests
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/30Compression, e.g. Merkle-Damgard construction
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • H04L2209/603Digital right managament [DRM]

Definitions

  • the present invention relates to encryption and/or decryption of transmitted data and in particular to transmitted audio and/or video data.
  • a system for transmitting digital data to a plurality of users on demand, each user having an associated unique identity code comprising means for receiving from a user that user's unique identity code together with a demand for specified digital data and, in response thereto, encrypting the demanded data, using as an encryption key a function of that user's unique identity code, and transmitting the encrypted data to the user.
  • a method of transmitting digital data to a plurality of users on demand, each user having an associated unique identity code comprising receiving from a user that user's unique identity code together with a demand for specified digital data and, in response thereto, encrypting the demanded data, using as an encryption key a function of that user's unique identity code, and transmitting the encrypted data to the user.
  • a server stores unique identity codes UNI, UN2 , UN3 ... for all authorised users USER 1, USER 2, USER 3 of the system.
  • the server also stores audio and/or video data X, Y which may be requested by one or more of the users.
  • a user e.g. USER 1
  • requests transmission of audio data X it transmits to the server its unique identity code UNI, together with a request for audio data X.
  • the server then encrypts a data file X including audio data X using the identity code UNI as the encryption key and transmits the encrypted data file to USER 1.
  • USER 1 then decrypts the encrypted data using the encryption key UNI to regenerate the original data file X including the audio data X. Whilst it is possible for other users to receive this data, they will not be able to decrypt it, because their respective decryption keys UN2, UN3 ... are different from UNI.
  • Each data bit within the data file X is logically combined as an exclusive OR (XOR) function with a corresponding bit from a bit sequence constituting the user identity code, e.g. UNI.
  • An exclusive OR function is a logical combination having the value O if both data bits A and B are the same and the value 1 if they are different:
  • the resulting combination would be 1000011 ...
  • a corresponding decryption method is used, again using an exclusive OR function.
  • Such a function has the property that if the exclusive OR combination C, of two bits A and B is itself combined with one of the two bits, e.g. A, the other bit B is generated:
  • the user identity code is typically 32 or 64 bits long, and when the last bit of the code has been used the sequence is repeated until all the audio data has been encrypted.
  • a preferred format for audio data transmission on the Internet is MPEG, as described in ISO IEC 11172-1,2,3,4,5.
  • This format uses a data compression technique to enable large amounts of data to be transmitted for a given bandwidth.
  • Such data is transmitted in data files termed "bitstreams" having four separate sections, namely: (1) a header section containing synchronization and stereo/mono state data; (2) an error check data section containing information regarding error detection; (3) an audio data section containing the audio data which may be subject to copyright protection; and (4) an ancillary data section.
  • An alternative format would be DOLBY AC3.
  • data could be protected against unauthorised reception and redistribution by encrypting the ancillary data section without performing the bit-by-bit encryption described above. Equally the encryption could be based on an algorithmic transformation of a group of data bits.
  • Each user's unique identity code is derived from, or identical to, credit card data, which provides the user with a disincentive to pass unauthorized copies of the received data to third parties, since they would then be able to access such credit card data.
  • a user is registered by supplying credit/debit card details to the server, and, once suitable bank checks have been made, the server generates a unique user identity code, based on the credit/debit card details, which is stored in a user's module.
  • the user identity code is read from the module and transmitted, along with the data request, to the server.

Abstract

A system of transmitting encrypted digital data to a plurality of users using a unique encryption key for each user, the system comprising transforming each bit of data into a corresponding bit in dependence on the encryption key, which is in the form of a further bit sequence. A logical exclusive OR function is employed, both to encrypt the data and subsequently for decryption. The invention finds particular application in the transmission of audio and/or video data which may be subject to copyright protection.

Description

DATA ENCRYPTION
The present invention relates to encryption and/or decryption of transmitted data and in particular to transmitted audio and/or video data.
Whenever audio/video data is transmitted from a transmitting station to a receiving station, there is the risk that third parties may also receive the data, and, in the case of data subject to copyright protection, they can prevent copyright owners receiving appropriate remuneration. In the case of such transmission occurring on the Internet, large numbers of people could receive, and therefore benefit from, such data transmission without paying appropriate royalties. To overcome this problem, it has been proposed to encrypt certain parts of the transmitted data with the aim of enabling reception only by authorised receivers, who are provided with means for decrypting the data.
In accordance with a first aspect of the present invention there is provided a system for transmitting digital data to a plurality of users on demand, each user having an associated unique identity code, the system comprising means for receiving from a user that user's unique identity code together with a demand for specified digital data and, in response thereto, encrypting the demanded data, using as an encryption key a function of that user's unique identity code, and transmitting the encrypted data to the user.
In accordance with a second aspect of the present invention there is provided a method of transmitting digital data to a plurality of users on demand, each user having an associated unique identity code, the method comprising receiving from a user that user's unique identity code together with a demand for specified digital data and, in response thereto, encrypting the demanded data, using as an encryption key a function of that user's unique identity code, and transmitting the encrypted data to the user.
A preferred embodiment of the present invention will now be described with reference to the accompanying drawing which illustrates a transmission system incorporating data encryption and decryption of the preferred embodiment.
A server stores unique identity codes UNI, UN2 , UN3 ... for all authorised users USER 1, USER 2, USER 3 of the system. The server also stores audio and/or video data X, Y which may be requested by one or more of the users. When a user, e.g. USER 1, requests transmission of audio data X, it transmits to the server its unique identity code UNI, together with a request for audio data X. The server then encrypts a data file X including audio data X using the identity code UNI as the encryption key and transmits the encrypted data file to USER 1. USER 1 then decrypts the encrypted data using the encryption key UNI to regenerate the original data file X including the audio data X. Whilst it is possible for other users to receive this data, they will not be able to decrypt it, because their respective decryption keys UN2, UN3 ... are different from UNI.
The method of encryption is as follows. Each data bit within the data file X is logically combined as an exclusive OR (XOR) function with a corresponding bit from a bit sequence constituting the user identity code, e.g. UNI. An exclusive OR function is a logical combination having the value O if both data bits A and B are the same and the value 1 if they are different:
A B A XOR B
0 0 0
0 1 1
1 0 1
1 1 0
For example, if the audio data X comprises the bit sequence 1001110 ... and the user identity code UNI comprises the bit sequence 0001101 ... , then the resulting combination would be 1000011 ...
When the user receives the encrypted data, a corresponding decryption method is used, again using an exclusive OR function. Such a function has the property that if the exclusive OR combination C, of two bits A and B is itself combined with one of the two bits, e.g. A, the other bit B is generated:
B A XOR B=C C A C XOR A = B
0 0 0 0 0 0 0
0 1 1 1 0 1 1
1 0 1 1 1 0 0
1 1 0 0 1 1 1
Thus, in the above example, when the resulting XOR combination is reco bined with the user identity code UNI, the original data file X is retrieved, as follows:
Data file X (A) 1001110 User identity code UNI (B) 0001101
XOR combination of A and B (C) 1000011
User identity code UNI (B) 0001101
XOR combination of B and C 1001110 = Data file X
The user identity code is typically 32 or 64 bits long, and when the last bit of the code has been used the sequence is repeated until all the audio data has been encrypted.
A preferred format for audio data transmission on the Internet is MPEG, as described in ISO IEC 11172-1,2,3,4,5. This format uses a data compression technique to enable large amounts of data to be transmitted for a given bandwidth. Such data is transmitted in data files termed "bitstreams" having four separate sections, namely: (1) a header section containing synchronization and stereo/mono state data; (2) an error check data section containing information regarding error detection; (3) an audio data section containing the audio data which may be subject to copyright protection; and (4) an ancillary data section. An alternative format would be DOLBY AC3. In an alternative arrangement, data could be protected against unauthorised reception and redistribution by encrypting the ancillary data section without performing the bit-by-bit encryption described above. Equally the encryption could be based on an algorithmic transformation of a group of data bits.
Each user's unique identity code is derived from, or identical to, credit card data, which provides the user with a disincentive to pass unauthorized copies of the received data to third parties, since they would then be able to access such credit card data.
Initially, a user is registered by supplying credit/debit card details to the server, and, once suitable bank checks have been made, the server generates a unique user identity code, based on the credit/debit card details, which is stored in a user's module. When a user requires a data transmission, the user identity code is read from the module and transmitted, along with the data request, to the server. It will be appreciated that the above-described preferred embodiment of the present invention provides a secure method of transmitting data from a server of a user thus preventing unauthorised reception of copyright- protected data. Various modifications of the preferred embodiment may be made without departing from the scope of the invention, which is defined by the following claims.

Claims

1. A system for transmitting digital data to a plurality of users on demand, each user having an associated unique identity code, the system comprising means for receiving from a user that user's identity code together with a demand for specified digital data and, in response thereto, encrypting the demanded data, using as an encryption key a function of that user's unique identity code, and transmitting the encrypted data to the user.
2. A system as claimed in claim 1, wherein the encryption key is identical to the received unique identity code.
3. A system as claimed in claim 1 or claim 2, wherein each user's unique identity code represents credit card data.
4. A system as claimed in any preceding claim, arranged to encrypt date in the form of a first sequence of bits into a second sequence of bits by individually transforming each bit of said first sequence into a corresponding bit of said second sequence in dependence on said encryption key.
5. A method of transmitting digital data to a plurality of users on demand, each user having an associated unique identity code, the method comprising receiving from a user that user ' s identity code together with a demand for specified digital data and, in response thereto, encrypting the demanded data, using as an encryption key a function of that user's unique identity code, and transmitting the encrypted data to the user.
6. A method as claimed in claim 5, wherein the encryption key is identical to the received unique identity code.
7. A method as claimed in claim 5 or claim 6, wherein each user's unique identity code represents credit card data.
8 A method as claimed in any one of claims 5 to 7 , wherein the digital data is in the form of a first sequence of bits and the step of encrypting comprises encrypting said first sequence of bits into a second sequence of bits, the method further comprising individually transforming each bit of said first sequence into a corresponding bit of said second sequence in dependence on said encryption key.
9. A method as claimed in claim 8, wherein said encryption key comprises a third sequence of bits.
10. A method as claimed in claim 9, wherein said encryption key comprises 32 bits.
11. A method as claimed in claim 9, wherein said encryption key comprises 64 bits.
12. A method as claimed in any one of claims 9 to 11, wherein the individual transformation comprises logically combining each bit of said first sequence with a bit selected from said third sequence.
13. A method as claimed in claim 12, wherein the bits of said first and third sequences are so combined using a logical exclusive OR function.
14. A method as claimed in claim 12 or claim 13, wherein the bits of said third sequence are selected sequentially from the first bit in the third sequence to the last bit and wherein the sequential selection is repeated until all bits of the first sequence have been logically combined.
15. A method as claimed in any one of claims 5 to 14, wherein the first sequence of bits comprises audio or video data within an MPEG bitstream.
16. A method as claimed in claim 15, wherein the first sequence of bits comprises a complete MPEG bitstream.
PCT/GB1997/002138 1996-08-09 1997-08-11 Data encryption WO1998007252A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU38567/97A AU3856797A (en) 1996-08-09 1997-08-11 Data encryption

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GB9616803.4 1996-08-09
GB9616803A GB2316278A (en) 1996-08-09 1996-08-09 Data Encryption

Publications (1)

Publication Number Publication Date
WO1998007252A1 true WO1998007252A1 (en) 1998-02-19

Family

ID=10798296

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/GB1997/002138 WO1998007252A1 (en) 1996-08-09 1997-08-11 Data encryption

Country Status (3)

Country Link
AU (1) AU3856797A (en)
GB (1) GB2316278A (en)
WO (1) WO1998007252A1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6944296B1 (en) * 1999-03-24 2005-09-13 Intel Corporation Video bit scrambling
GB2382739B (en) * 2000-08-31 2004-10-20 Nds Ltd Non-standard coding systems

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0134655A2 (en) * 1983-07-07 1985-03-20 Sony Corporation Method of, and apparatus for, scrambling a TV picture
FR2608338A1 (en) * 1986-12-15 1988-06-17 Dassault Electronique Device for exchanging confidential data between a series of terminals and a concentrator
WO1995017796A1 (en) * 1993-12-20 1995-06-29 Urmet Sud S.P.A. Costruzioni Elettro-Telefoniche System for enabling the decoding of television programs

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5477263A (en) * 1994-05-26 1995-12-19 Bell Atlantic Network Services, Inc. Method and apparatus for video on demand with fast forward, reverse and channel pause
US5544161A (en) * 1995-03-28 1996-08-06 Bell Atlantic Network Services, Inc. ATM packet demultiplexer for use in full service network having distributed architecture

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0134655A2 (en) * 1983-07-07 1985-03-20 Sony Corporation Method of, and apparatus for, scrambling a TV picture
FR2608338A1 (en) * 1986-12-15 1988-06-17 Dassault Electronique Device for exchanging confidential data between a series of terminals and a concentrator
WO1995017796A1 (en) * 1993-12-20 1995-06-29 Urmet Sud S.P.A. Costruzioni Elettro-Telefoniche System for enabling the decoding of television programs

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
BACHTIAR T M ET AL: "A SECURE VIDEO ON DEMAND SYSTEM", PROCEEDINGS OF THE PACIFIC RIM CONFERENCE ON COMMUNICATIONS, COMPUTERS, AND SIGNAL PROCESSING. (PAC RIM), VICTORIA, BRITISH COLUMBIA, MAY 17 - 19, 1995, 17 May 1995 (1995-05-17), INSTITUTE OF ELECTRICAL AND ELECTRONICS ENGINEERS, pages 304 - 307, XP000559562 *

Also Published As

Publication number Publication date
AU3856797A (en) 1998-03-06
GB2316278A (en) 1998-02-18
GB9616803D0 (en) 1996-09-25

Similar Documents

Publication Publication Date Title
US7047421B2 (en) Data signal with a database and a compressed key
CN102118655B (en) System and method for controlled copying and moving of contents
JP3086887B2 (en) Information transmission method, information transmission method, information reproduction method, and communication device
US7536016B2 (en) Encrypted content data structure package and generation thereof
CN1305310C (en) Device and method for selectively supplying access to a service encrypted using a control word and smart card
EP2040411B1 (en) Terminal device, server device, and content distribution system
CN1194548C (en) Secure data transmission system and method
CN1128595A (en) Method and apparatus for uniquely encrypting a plurality of services at a transmission site
CN1767032B (en) Multi-streaming apparatus and muti-streaming method using temporary storage medium
US6359986B1 (en) Encryption system capable of specifying a type of an encrytion device that produced a distribution medium
PL182259B1 (en) Information enciphering method
CN1939061A (en) Reception device, transmission device, security module, and digital right management system
EP2073142A2 (en) Methods for authenticating a hardware device and providing a secure channel to deliver data
EP1120934B1 (en) Method and apparatus for key distribution using a key base
RU2457624C2 (en) Verification of mac code without disclosure thereof
JP4703805B2 (en) ENCRYPTION DEVICE, ENCRYPTION METHOD, DECRYPTION DEVICE, DECRYPTION METHOD, AND COMMUNICATION SYSTEM
KR100977969B1 (en) Methods for transmitting and receiving data in a network
US20140289529A1 (en) Content data reproduction system and recording device
WO1998007252A1 (en) Data encryption
JP2001274784A (en) Contents information transmission method, contents information recording method, contents information transmitter, contents information recorder, transmission medium and recording medium
JP2001274785A (en) Contents information decoding method and contents information decoder
Saranya et al. User Authorization with Encrypted Visual Cryptography Using High Definition Images
US20070143216A1 (en) Data Signal with a Database and a Compressed Key
JPH0275038A (en) Information offering device

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GE GH HU IL IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG US UZ VN YU ZW AM AZ BY KG KZ MD RU TJ TM

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH KE LS MW SD SZ UG ZW AT BE CH DE DK ES FI FR GB GR IE IT LU MC NL

DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
121 Ep: the epo has been informed by wipo that ep was designated in this application
NENP Non-entry into the national phase

Ref country code: JP

Ref document number: 1998509492

Format of ref document f/p: F

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: CA