WO2008127115A1 - Detachable secure videoconferencing module - Google Patents

Detachable secure videoconferencing module Download PDF

Info

Publication number
WO2008127115A1
WO2008127115A1 PCT/NO2007/000133 NO2007000133W WO2008127115A1 WO 2008127115 A1 WO2008127115 A1 WO 2008127115A1 NO 2007000133 W NO2007000133 W NO 2007000133W WO 2008127115 A1 WO2008127115 A1 WO 2008127115A1
Authority
WO
WIPO (PCT)
Prior art keywords
module
module according
card
stream
terminal
Prior art date
Application number
PCT/NO2007/000133
Other languages
French (fr)
Inventor
Ole Hansvold
Original Assignee
Ole Hansvold
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ole Hansvold filed Critical Ole Hansvold
Priority to PCT/NO2007/000133 priority Critical patent/WO2008127115A1/en
Publication of WO2008127115A1 publication Critical patent/WO2008127115A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/85Protecting input, output or interconnection devices interconnection devices, e.g. bus-connected or in-line devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/14Systems for two-way working
    • H04N7/15Conference systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2153Using hardware token as a secondary aspect

Definitions

  • the present invention relates to detachable security modules for data transmission. Specifically the invention relates to conveniently attachable and detachable integrated hardware/software modules bringing secure video conferencing to standard terminals having little security means.
  • SKYPE Systems for videoconferencing designed for ease of use or low price, e.g. SKYPE, are available for consumer installation on PCs and mobile terminals, but as the terminal is open, the level of security that can be provided via such terminals is limited as encryption/decryption keys will have to be stored in general purpose memory available for other software. This means that if the terminal comes outside the control of the owner or otherwise available to intruders, the keys can easily be copied or manipulated enabling an intruder to make an eavesdropping device that can monitor subsequent video conferences without being detected.
  • the present invention is an electronic module comprising functions for encryption and decryption of data streams including associated key management, compression and decompression of streams for video conferencing and embedding of stream describing parameters into or alongside the data streams.
  • the module is based on a tamper-resistant hardware with a card-type form factor for conveniently being operatively attachable to and detachable from a network terminal.
  • fig. 1 describes videoconferencing based on present art proprietary terminals featuring secure storage and use of keys for encryption of the information exchange
  • fig. 2 shows the structure of a present art open non-tamper-resistant terminal
  • fig. 3 shows videoconferencing based on both open terminals and proprietary (secure) terminals where the open terminals are secured by the module according to the present invention
  • fig. 4 shows the same as figure 3 besides that embedding of meta information is added
  • fig. 5 shows a module-secured open terminal where the compression and decompression functions are moved out of the module to the terminal
  • fig. 1 describes videoconferencing based on present art proprietary terminals featuring secure storage and use of keys for encryption of the information exchange
  • fig. 2 shows the structure of a present art open non-tamper-resistant terminal
  • fig. 3 shows videoconferencing based on both open terminals and proprietary (secure) terminals where the open terminals are secured by the module according to the present invention
  • fig. 4 shows the same as figure 3 besides that embedding of
  • the present invention is an easy detachable and highly tamper resistant module (the Module) containing compression and key-based encryption functions and the corresponding key-handling functions for secure videoconferencing and being embedded in a small card or cartridge form factor, for example Integrated Circuit Cards (Smart Cards), USB- and IEEE 1394 dongles, SD card, Multimedia card (MMC) or Subscriber Identity Module (SIM, UIM, RIM and UICC), compact flash, Smart Media, PCMCIA cards.
  • the various functions shall preferably reside in a single chip inside the Module.
  • the light-weight form factor makes the present invention easy to carry around and to install it with the necessary facilities for secure videoconferencing in open terminals thereby solving the re-location problem of rugged proprietary terminals.
  • Different embodiments of the present invention connect to the network terminal using for instance typical socket type connections (SIM, SD-card), via a wire or close proximity wireless communication.
  • SIM socket type connections
  • SD-card Secure Digital
  • Performing encryption/decryption and key management inside the highly tamper resistant environment of the present invention solves the security problem associated with management of secret keys in open general purpose terminals. Even if an intruder has stolen or otherwise captured the module according to the present invention, the high level of tamper resistance will make it infeasible for the intruder to retrieve the keys necessary to compromise the system.
  • the present invention also makes it easy for the user to change from using one terminal to another simply by unplugging it from one terminal, e.g. the laptop PC, and plug it into the next, e.g. the mobile phone, a handheld video display unit or a PDA.
  • This level of convenience is not possible with proprietary terminals or with most other security schemes designed for open terminals.
  • Figure 1 describes videoconferencing based on proprietary terminals featuring secure storage and use of keys for encryption of the information exchange.
  • the proprietary terminals, connected to a common network structure - for instance the Internet - comprise 5 modules for key management, data compression, encryption, decryption and data decompression, where the key management supplies the necessary keys to the encryption and decryption modules.
  • video input means for instance a camera
  • audio input means typically a microphone
  • video output means display
  • audio output means a loudspeaker or similar
  • the terminal is proprietary, an intruder will not have immediate access to all its construction details, and one can therefore assume that proprietary terminals will have a relatively high level of security compared with open terminals.
  • Figure 2 shows an open terminal for videoconferencing such as a PC or a mobile phone.
  • Open interoperable network terminals do not in general provide for a secure environment for management of secret keys.
  • An example of such a system is the free SKYPE system, downloadable from the Internet to standard network terminals to be used on the Internet.
  • FIG. 3 describes the present invention.
  • the present invention is denoted the Module.
  • the Module being substantially a secure area by being implemented within tamper-resistant hardware, receives the un-compressed digital audio/video streams (1) coming from the video camera of the open terminal.
  • the digital audio/video streams are compressed to create the compressed outgoing audio/video streams (2) using the compression algorithm (C).
  • the streams are encrypted using a cryptographic key (SK) supplied by the key management part and an encryption algorithm (A) to create the outgoing encrypted audio/video streams (3) which are returned to the open terminal for transmission via the communication network to the other terminals participating in the video conference.
  • SK cryptographic key
  • A encryption algorithm
  • the Module receives one or more incoming encrypted audio/video streams from the other participating terminals (of the proprietary kind according to prior art or of the open kind together with a module according to the present invention) connected to the communication network.
  • These streams are first decrypted using A inverse and, depending on type of A, the SK or the SK inverse cryptographic key provided by the key management part in the Module, to retrieve the compressed clear text audio/video streams (5).
  • the compressed incoming audio/video streams are decompressed using C inverse to retrieve the un-compressed incoming audio/video streams (6) which are delivered back to the open terminal for presentation to the user via display and speakers.
  • the SKs (and SK inverses) may be fixed for the entire session or may dynamically change during the session.
  • the Modules in the participating open terminals and possibly other types of terminal security modules may have to synchronize or exchange SKs/SK inverses. This process may involve just the terminals, or be managed by a central key server. SKs/SK inverses may be generated using management keys or distributed using messages encrypted by management keys. Each Module or terminal security module will in such a case have at least one unique management key, and normally also several domain management keys. A domain can for example be all the Modules and terminal security modules associated with the national branch of a multinational company or all the doctors of a group of hospitals.
  • Domains can also be formed based on sharing of logical privileges in which case the members of the videoconference not only must share the SK/SK inverse, but also have the appropriate privilege to participate.
  • the use of privileges may simplify set-up of video conferences.
  • FIG. 4 illustrates an embodiment with time-stamping of one or more of the data streams.
  • a secure time-stamp that authenticates when the video conference stream was processed by the Module is one of several possible parameters that can be added to describe a video conference stream.
  • Other such session describing parameters are the identity of the Module having processed a video conference stream, geo-location information indicating the location of the Module while it is processing the video stream, and any other parameter characterizing the video stream or the video stream processing.
  • the video conference stream describing parameters can be used to authenticate when a video conference took place, from which locations it took place, who participated, and so on, and as a tool to identify traitors who consciously or un-consciously have made clear text video conference streams available to others than the intended recipients.
  • the video conference stream describing parameters can be sent alongside the video conference stream or in specific fields in the video conference stream.
  • a characteristic of the present invention is the possible use of compression (C) and decompression (C inverse) functions that supports the secure embedding of video conference stream describing parameters into the video conference stream itself.
  • the video conference stream describing parameters can obtain a high level of integrity against unauthorized manipulation.
  • FIG. 5 Another embodiment of the present invention shown in Figure 5, is to move the video compression/decompression functions, i.e. C and C inverse out of the module and into the open terminal.
  • the main data exchanged across the interface between the module and the terminal then becomes the clear text and encrypted incoming and outgoing compressed video streams.
  • the advantage of this variant is a less complex Module.
  • the disadvantages are that the terminal must support the appropriate compression/decompression algorithm, and that the above mentioned addition of video stream describing parameters will not obtain the high level of integrity as it will not be performed in the tamper resistant environment of the Module.
  • FIG. 6 Another embodiment of the present invention illustrated by Figure 6, is to move also the encryption/decryption function, i.e. A and A inverse out of the module and into the open terminal.
  • the main data exchanged across the interface between the Module and the terminal then becomes the delivery of SK and SK inverse and optionally configuration messages containing new SKs, management keys, access control data/PIN and/or stream describing parameters.
  • the advantages of this variant are an even less complex Module and the possibility of including the remaining functions in a general purpose device like a Universal Integrated Circuit Card (UICC).
  • UICC Universal Integrated Circuit Card
  • the further disadvantages are that the terminal must support also the appropriate encryption/decryption algorithms, and that the SK and SK inverse traffic across the interface may be easier to eavesdrop than the entire compressed or uncompressed video streams present for the other alternatives.
  • An additional feature of an embodiment of the invention is to provide means for the terminal to download software from the Module where this software is necessary for further communication between the terminal and the Module.

Abstract

An electronic module is presented comprising functions for encryption and decryption of data streams including associated key management, compression and decompression of streams for video conferencing and embedding of stream describing parameters into or alongside the data streams. The module is based on a tamper-resistant hardware, being based on a card-type form factor for conveniently being operatively attachable to and detachable from a network terminal.

Description

"Detachable secure videoconferencing module"
TECHNICAL FIELD
The present invention relates to detachable security modules for data transmission. Specifically the invention relates to conveniently attachable and detachable integrated hardware/software modules bringing secure video conferencing to standard terminals having little security means.
BACKGROUND AND PRIOR ART
Systems for videoconferencing needing high level of security, e.g. high level corporate or governmental meetings, are today mainly based on proprietary and dedicated terminals, and not on industry-standard, open, general purpose terminals. These dedicated terminals can be expected to support security functions for confidential conferencing. Most such terminals are designed for use in well protected conference rooms, and not for being conveniently portable or transportable in the briefcase outside the office.
Systems for videoconferencing designed for ease of use or low price, e.g. SKYPE, are available for consumer installation on PCs and mobile terminals, but as the terminal is open, the level of security that can be provided via such terminals is limited as encryption/decryption keys will have to be stored in general purpose memory available for other software. This means that if the terminal comes outside the control of the owner or otherwise available to intruders, the keys can easily be copied or manipulated enabling an intruder to make an eavesdropping device that can monitor subsequent video conferences without being detected.
Whereas the high-quality, dedicated, secure terminals are the preferred choice for videoconferencing from the conference room, and will probably remain so, there is a need for enabling users to participate in confidential videoconferencing wherever they are, even via open terminals like mobile phones or PCs and even via wireless networks easily available to eavesdroppers. The present invention can fill this need.
SUMMARY
The present invention is an electronic module comprising functions for encryption and decryption of data streams including associated key management, compression and decompression of streams for video conferencing and embedding of stream describing parameters into or alongside the data streams.
The module is based on a tamper-resistant hardware with a card-type form factor for conveniently being operatively attachable to and detachable from a network terminal.
Generally the present invention is defined by the attached claims.
BRIEF DESCRIPTION OF THE DRAWINGS
Below the invention will be described with reference to the attached illustrating, but not limiting drawings, where fig. 1 describes videoconferencing based on present art proprietary terminals featuring secure storage and use of keys for encryption of the information exchange, fig. 2 shows the structure of a present art open non-tamper-resistant terminal, fig. 3 shows videoconferencing based on both open terminals and proprietary (secure) terminals where the open terminals are secured by the module according to the present invention, fig. 4 shows the same as figure 3 besides that embedding of meta information is added, fig. 5 shows a module-secured open terminal where the compression and decompression functions are moved out of the module to the terminal, and fig. 6 shows a module-secured open terminal where also the encryption and decryption is moved out of the module to the terminal. DESCRIPTION OF PREFERRED EMBODIMENTS The present invention is an easy detachable and highly tamper resistant module (the Module) containing compression and key-based encryption functions and the corresponding key-handling functions for secure videoconferencing and being embedded in a small card or cartridge form factor, for example Integrated Circuit Cards (Smart Cards), USB- and IEEE 1394 dongles, SD card, Multimedia card (MMC) or Subscriber Identity Module (SIM, UIM, RIM and UICC), compact flash, Smart Media, PCMCIA cards. To increase tamper resistance, the various functions shall preferably reside in a single chip inside the Module.
The light-weight form factor makes the present invention easy to carry around and to install it with the necessary facilities for secure videoconferencing in open terminals thereby solving the re-location problem of rugged proprietary terminals.
Different embodiments of the present invention connect to the network terminal using for instance typical socket type connections (SIM, SD-card), via a wire or close proximity wireless communication.
Performing encryption/decryption and key management inside the highly tamper resistant environment of the present invention solves the security problem associated with management of secret keys in open general purpose terminals. Even if an intruder has stolen or otherwise captured the module according to the present invention, the high level of tamper resistance will make it infeasible for the intruder to retrieve the keys necessary to compromise the system.
The present invention also makes it easy for the user to change from using one terminal to another simply by unplugging it from one terminal, e.g. the laptop PC, and plug it into the next, e.g. the mobile phone, a handheld video display unit or a PDA. This level of convenience is not possible with proprietary terminals or with most other security schemes designed for open terminals. Figure 1 describes videoconferencing based on proprietary terminals featuring secure storage and use of keys for encryption of the information exchange. The proprietary terminals, connected to a common network structure - for instance the Internet - comprise 5 modules for key management, data compression, encryption, decryption and data decompression, where the key management supplies the necessary keys to the encryption and decryption modules. Additionally video input means (for instance a camera), audio input means (typically a microphone), video output means ("display") and audio output means (a loudspeaker or similar) are connected to or integrated with the terminal. As the terminal is proprietary, an intruder will not have immediate access to all its construction details, and one can therefore assume that proprietary terminals will have a relatively high level of security compared with open terminals.
Figure 2 on the other hand shows an open terminal for videoconferencing such as a PC or a mobile phone. Open interoperable network terminals do not in general provide for a secure environment for management of secret keys. An example of such a system is the free SKYPE system, downloadable from the Internet to standard network terminals to be used on the Internet.
Figure 3 describes the present invention. In figure 3 the present invention is denoted the Module. The Module, being substantially a secure area by being implemented within tamper-resistant hardware, receives the un-compressed digital audio/video streams (1) coming from the video camera of the open terminal. The digital audio/video streams are compressed to create the compressed outgoing audio/video streams (2) using the compression algorithm (C). The streams are encrypted using a cryptographic key (SK) supplied by the key management part and an encryption algorithm (A) to create the outgoing encrypted audio/video streams (3) which are returned to the open terminal for transmission via the communication network to the other terminals participating in the video conference.
Simultaneously, the Module receives one or more incoming encrypted audio/video streams from the other participating terminals (of the proprietary kind according to prior art or of the open kind together with a module according to the present invention) connected to the communication network. These streams are first decrypted using A inverse and, depending on type of A, the SK or the SK inverse cryptographic key provided by the key management part in the Module, to retrieve the compressed clear text audio/video streams (5). The compressed incoming audio/video streams are decompressed using C inverse to retrieve the un-compressed incoming audio/video streams (6) which are delivered back to the open terminal for presentation to the user via display and speakers. The SKs (and SK inverses) may be fixed for the entire session or may dynamically change during the session.
Prior to the video conference, the Modules in the participating open terminals and possibly other types of terminal security modules may have to synchronize or exchange SKs/SK inverses. This process may involve just the terminals, or be managed by a central key server. SKs/SK inverses may be generated using management keys or distributed using messages encrypted by management keys. Each Module or terminal security module will in such a case have at least one unique management key, and normally also several domain management keys. A domain can for example be all the Modules and terminal security modules associated with the national branch of a multinational company or all the doctors of a group of hospitals.
Domains can also be formed based on sharing of logical privileges in which case the members of the videoconference not only must share the SK/SK inverse, but also have the appropriate privilege to participate. The use of privileges may simplify set-up of video conferences.
A practical realization of the present invention will normally include security mechanisms not allowing the Module to be functional for a user until the identity of the user has been checked and accepted by the Module. An example of an authentication mechanism is the provision of a PIN. Figure 4 illustrates an embodiment with time-stamping of one or more of the data streams. A secure time-stamp that authenticates when the video conference stream was processed by the Module is one of several possible parameters that can be added to describe a video conference stream. Other such session describing parameters are the identity of the Module having processed a video conference stream, geo-location information indicating the location of the Module while it is processing the video stream, and any other parameter characterizing the video stream or the video stream processing. The video conference stream describing parameters can be used to authenticate when a video conference took place, from which locations it took place, who participated, and so on, and as a tool to identify traitors who consciously or un-consciously have made clear text video conference streams available to others than the intended recipients.
The video conference stream describing parameters can be sent alongside the video conference stream or in specific fields in the video conference stream. A characteristic of the present invention is the possible use of compression (C) and decompression (C inverse) functions that supports the secure embedding of video conference stream describing parameters into the video conference stream itself.
As the present invention is highly tamper resistant, and as such embedding of the video conference stream describing parameters are performed on the video and/or audio data while inside the Module and possibly involving for example digital signature or watermarking techniques, the video conference stream describing parameters can obtain a high level of integrity against unauthorized manipulation.
Another embodiment of the present invention shown in Figure 5, is to move the video compression/decompression functions, i.e. C and C inverse out of the module and into the open terminal. The main data exchanged across the interface between the module and the terminal then becomes the clear text and encrypted incoming and outgoing compressed video streams. The advantage of this variant is a less complex Module. The disadvantages are that the terminal must support the appropriate compression/decompression algorithm, and that the above mentioned addition of video stream describing parameters will not obtain the high level of integrity as it will not be performed in the tamper resistant environment of the Module.
Another embodiment of the present invention illustrated by Figure 6, is to move also the encryption/decryption function, i.e. A and A inverse out of the module and into the open terminal. The main data exchanged across the interface between the Module and the terminal then becomes the delivery of SK and SK inverse and optionally configuration messages containing new SKs, management keys, access control data/PIN and/or stream describing parameters. The advantages of this variant are an even less complex Module and the possibility of including the remaining functions in a general purpose device like a Universal Integrated Circuit Card (UICC). The further disadvantages are that the terminal must support also the appropriate encryption/decryption algorithms, and that the SK and SK inverse traffic across the interface may be easier to eavesdrop than the entire compressed or uncompressed video streams present for the other alternatives.
An additional feature of an embodiment of the invention is to provide means for the terminal to download software from the Module where this software is necessary for further communication between the terminal and the Module.

Claims

PATENT CLAIMS
1. An electronic module comprising functions for encryption and decryption of at least one data stream,
CHARACTERIZED BY a tamper-resistant hardware, said hardware having a card-type form factor for conveniently being operatively attachable to and detachable from a network terminal, and means for secure handling of encryption and decryption keys.
2. Module according to claim 1 ,
CHARACTERIZED IN THAT said tamper-resistant card-type hardware is based on one of the following: generic Integrated Circuit Cards (Smart Cards), mobile subscriber identity modules including SIM, UIM, RIM and UICC, memory-cards for portable equipment like SD card, compact flash, MMC card, Smart Media, PCMCIA card, devices to be connected to a USB port like a USB dongle, and devices to be connected to a IEEE 1394 port like a dongle.
3. Module according to one of the preceding claims, CHARACTERIZED BY being arranged to perform functions to synchronize security keys with trusted elements in other network terminals prior to a data stream exchange session.
4. Module according to one of the preceding claims,
CHARACTERIZED IN THAT said module further comprises security mechanisms restricting said module to be functional for a user until the identity of said user has been checked and accepted by said module.
5. Module according to claim 4,
CHARACTERIZED IN THAT said security mechanism is based on entering a PIN- code.
6. Module according to one of the preceding claims, CHARACTERIZED BY said module further being arranged to perform compression and decompression of said data streams.
7. Module according to one of the preceding claims,
CHARACTERIZED IN THAT said module further being arranged to embed stream describing parameters describing at least one of said data streams in a stream exchange session into or alongside at least one of said data streams.
8. Module according to claim 7,
CHARACTERIZED IN THAT said stream describing parameters comprise at least one of secure time-stamps, secure identity of a sender or a receiver, and geo-location data.
9. Module according to one of the preceding claims, CHARACTERIZED BY said module connecting to said terminal directly via a socket type connection, via a wire, or via close proximity wireless communication.
10. Module according to one of the preceding claims, CHARACTERIZED IN THAT said module comprises a mechanism allowing said network terminal to read from said module a software necessary for said network terminal to further communicate with said module.
11. Module according to one of the preceding claims,
CHARACTERIZED IN THAT at least one of said data streams comprise video conferencing data.
PCT/NO2007/000133 2007-04-17 2007-04-17 Detachable secure videoconferencing module WO2008127115A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/NO2007/000133 WO2008127115A1 (en) 2007-04-17 2007-04-17 Detachable secure videoconferencing module

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/NO2007/000133 WO2008127115A1 (en) 2007-04-17 2007-04-17 Detachable secure videoconferencing module

Publications (1)

Publication Number Publication Date
WO2008127115A1 true WO2008127115A1 (en) 2008-10-23

Family

ID=39864131

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/NO2007/000133 WO2008127115A1 (en) 2007-04-17 2007-04-17 Detachable secure videoconferencing module

Country Status (1)

Country Link
WO (1) WO2008127115A1 (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5623637A (en) * 1993-12-06 1997-04-22 Telequip Corporation Encrypted data storage card including smartcard integrated circuit for storing an access password and encryption keys
EP1039462A2 (en) * 1999-03-15 2000-09-27 Sony Corporation Processing method and apparatus for encrypted data transfer
US20030074319A1 (en) * 2001-10-11 2003-04-17 International Business Machines Corporation Method, system, and program for securely providing keys to encode and decode data in a storage cartridge
US20040101140A1 (en) * 2002-11-25 2004-05-27 Fuji Photo Film Co., Ltd. Recording medium cartridge and a recording-and-reproducing apparatus thereof
US6779115B1 (en) * 2000-02-18 2004-08-17 Digital5, Inc. Portable device using a smart card to receive and decrypt digital data
GB2431258A (en) * 2005-10-14 2007-04-18 Hewlett Packard Development Co Microprocessor operable in a fault-tolerant mode and a performance mode
US20070109978A1 (en) * 2005-11-16 2007-05-17 Cisco Technology, Inc. Method and system for secure conferencing

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5623637A (en) * 1993-12-06 1997-04-22 Telequip Corporation Encrypted data storage card including smartcard integrated circuit for storing an access password and encryption keys
EP1039462A2 (en) * 1999-03-15 2000-09-27 Sony Corporation Processing method and apparatus for encrypted data transfer
US6779115B1 (en) * 2000-02-18 2004-08-17 Digital5, Inc. Portable device using a smart card to receive and decrypt digital data
US20030074319A1 (en) * 2001-10-11 2003-04-17 International Business Machines Corporation Method, system, and program for securely providing keys to encode and decode data in a storage cartridge
US20040101140A1 (en) * 2002-11-25 2004-05-27 Fuji Photo Film Co., Ltd. Recording medium cartridge and a recording-and-reproducing apparatus thereof
GB2431258A (en) * 2005-10-14 2007-04-18 Hewlett Packard Development Co Microprocessor operable in a fault-tolerant mode and a performance mode
US20070109978A1 (en) * 2005-11-16 2007-05-17 Cisco Technology, Inc. Method and system for secure conferencing

Similar Documents

Publication Publication Date Title
EP1452027B1 (en) Access to encrypted broadcast content
US8347407B2 (en) Authority management method, system therefor, and server and information equipment terminal used in the system
CN1871572B (en) Binding content to a user
US20040196370A1 (en) Image transmission system, image pickup apparatus, image pickup apparatus unit, key generating apparatus, and program
CN105634737B (en) Data transmission method, terminal and system
CN113132091B (en) Method for sharing equipment and electronic equipment
CA2427621A1 (en) Secure method for communicating and providing services on digital networks and implementing architecture
EP1632828A1 (en) DRM system for device communicating with a portable device
TW201830949A (en) Methods for sharing sim card and mobile terminals
CN102577454A (en) A method for communicating data between a secure element and a network access point and a corresponding secure element
US7792928B2 (en) Method for establishing secure remote access over a network
JP2008535427A (en) Secure communication between data processing device and security module
JP2007249507A (en) Information leakage prevention method, information leakage prevention system and information terminal
EP3261317B1 (en) Authentication system, communication system, and authentication and authorization method
EP3139564B1 (en) Encryption coding module
EP1739913A1 (en) DRM system for devices communicating with portable device.
CN108540591B (en) Address book management method, address book management device and electronic equipment
CN113240836A (en) Bluetooth lock connection method adopting two-dimensional code and related configuration system
CA2327919C (en) Internal line control system
WO2008127115A1 (en) Detachable secure videoconferencing module
SK500542015U1 (en) System for secure transmission of voice communication via the communication network and method for secure transmission of voice communication
KR20130053132A (en) Memory card and portable terminal and encrypted message exchanging method
CN214959883U (en) Distributed remote audio and video control system for guaranteeing data safety transmission
US20170180326A1 (en) Secure transmission of local private encoding data
CA2398323A1 (en) Method for safeguarding the access to a data processing apparatus and corresponding arrangement

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 07747594

Country of ref document: EP

Kind code of ref document: A1

DPE1 Request for preliminary examination filed after expiration of 19th month from priority date (pct application filed from 20040101)
NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 07747594

Country of ref document: EP

Kind code of ref document: A1