NO20003651D0 - Procedure and arrangement for disseminating a private message to selected participants - Google Patents

Procedure and arrangement for disseminating a private message to selected participants

Info

Publication number
NO20003651D0
NO20003651D0 NO20003651A NO20003651A NO20003651D0 NO 20003651 D0 NO20003651 D0 NO 20003651D0 NO 20003651 A NO20003651 A NO 20003651A NO 20003651 A NO20003651 A NO 20003651A NO 20003651 D0 NO20003651 D0 NO 20003651D0
Authority
NO
Norway
Prior art keywords
message
parts
encrypted
held
private
Prior art date
Application number
NO20003651A
Other languages
Norwegian (no)
Other versions
NO20003651L (en
Inventor
Terence Edward Sumner
Original Assignee
Terence Edward Sumner
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Terence Edward Sumner filed Critical Terence Edward Sumner
Publication of NO20003651D0 publication Critical patent/NO20003651D0/en
Publication of NO20003651L publication Critical patent/NO20003651L/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/16Analogue secrecy systems; Analogue subscription systems
    • H04N7/162Authorising the user terminal, e.g. by paying; Registering the use of a subscription channel, e.g. billing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0827Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving distinctive intermediate devices or communication paths
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • H04L9/0833Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/266Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel
    • H04N21/26606Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel for generating or managing entitlement messages, e.g. Entitlement Control Message [ECM] or Entitlement Management Message [EMM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/45Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
    • H04N21/462Content or additional data management, e.g. creating a master electronic program guide from data received from the Internet and a Head-end, controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
    • H04N21/4623Processing of entitlement messages, e.g. ECM [Entitlement Control Message] or EMM [Entitlement Management Message]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/16Analogue secrecy systems; Analogue subscription systems
    • H04N7/167Systems rendering the television signal unintelligible and subsequently intelligible
    • H04N7/1675Providing digital key or authorisation information for generation or regeneration of the scrambling sequence
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/033Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • H04L2209/601Broadcast encryption

Abstract

An encrypted broadcast messaging system (102, 103) determines the management crypto-keys held by each selected subscriber (101) device and not held by each excluded subscriber device of a group. The private message is decomposed into message-parts, one message-part per an excluded subscriber device, each message-part intended to be encrypted using each management crypto-key held by the selected subscriber devices (101) and not held by the excluded subscriber device. Each message-part is encrypted using the management crypto-keys, and delivered to at least the selected subscriber devices, identifying the message-parts delivered and the message-parts necessary to re-compose the private message. Each received encrypted message-parts necessary to re-compose the private message. Each received encrypted message-part is decrypted using the intended management crypto-key, and the necessary message-parts are chosen from which the private message is re-composed by combining in the selected subscriber device (101).
NO20003651A 1998-01-19 2000-07-17 Procedure and arrangement for conveying a private message to selected members NO20003651L (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US7177698P 1998-01-19 1998-01-19
PCT/US1999/000896 WO1999037052A1 (en) 1998-01-19 1999-01-15 Method and apparatus for conveying a private message to selected members

Publications (2)

Publication Number Publication Date
NO20003651D0 true NO20003651D0 (en) 2000-07-17
NO20003651L NO20003651L (en) 2000-09-18

Family

ID=22103516

Family Applications (1)

Application Number Title Priority Date Filing Date
NO20003651A NO20003651L (en) 1998-01-19 2000-07-17 Procedure and arrangement for conveying a private message to selected members

Country Status (8)

Country Link
EP (1) EP1050132A4 (en)
JP (1) JP2002510164A (en)
CN (1) CN1292185A (en)
AU (1) AU750042B2 (en)
BR (1) BR9907094A (en)
CA (1) CA2318452A1 (en)
NO (1) NO20003651L (en)
WO (1) WO1999037052A1 (en)

Families Citing this family (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2001290188A1 (en) * 2000-09-29 2002-04-08 Nagravision S.A. Method for encrypting a formatted data set
GB2380369B (en) * 2001-09-27 2004-03-24 Marconi Comm Ltd A communications network encryption system
US20080170691A1 (en) * 2005-03-10 2008-07-17 Sung-Cheol Chang Encryption And Decryption Device In Wireless Portable Internet System,And Method Thereof
JP4823717B2 (en) 2006-02-28 2011-11-24 株式会社日立製作所 Encryption communication system, terminal state management server, encryption communication method, and terminal state management method
KR101308023B1 (en) 2011-10-27 2013-09-26 국방과학연구소 Broadcast encryption method for securing recipient privacy
JP5875441B2 (en) 2012-03-29 2016-03-02 インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Machines Corporation Apparatus and method for encrypting data
CN112152904B (en) 2015-02-16 2022-12-09 钉钉控股(开曼)有限公司 Network interaction method
CN106034068A (en) 2015-03-20 2016-10-19 阿里巴巴集团控股有限公司 Method and device for private chat in group chat, client-side, server and system
CN105610695B (en) 2015-12-21 2021-01-12 阿里巴巴集团控股有限公司 Object allocation method and device
CN105681056B (en) 2016-01-13 2019-03-19 阿里巴巴集团控股有限公司 Object distribution method and device
CN105812237B (en) 2016-03-07 2020-12-04 钉钉控股(开曼)有限公司 Method and device for quickly adding reminding object
CN107306286B (en) 2016-04-21 2020-12-04 钉钉控股(开曼)有限公司 Processing method and device for offline attendance
CN107305459A (en) 2016-04-25 2017-10-31 阿里巴巴集团控股有限公司 The sending method and device of voice and Multimedia Message
CN107368995A (en) 2016-05-13 2017-11-21 阿里巴巴集团控股有限公司 Task processing method and device
CN107800609B (en) * 2016-09-05 2021-06-01 阿里巴巴集团控股有限公司 Communication method and device
CN107846345A (en) 2016-09-18 2018-03-27 阿里巴巴集团控股有限公司 The means of communication and device
GB2560587A (en) * 2017-03-17 2018-09-19 Univ Oxford Innovation Ltd Secure data exchange
CN117240620B (en) * 2023-11-13 2024-02-06 杭州金智塔科技有限公司 Privacy set union system and method
CN117473539B (en) * 2023-12-28 2024-04-26 深圳市乐凡信息科技有限公司 Data encryption method, data decryption method, terminal device, and readable storage medium

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4803725A (en) * 1985-03-11 1989-02-07 General Instrument Corp. Cryptographic system using interchangeable key blocks and selectable key fragments
US5016277A (en) * 1988-12-09 1991-05-14 The Exchange System Limited Partnership Encryption key entry method in a microcomputer-based encryption system
US4926478A (en) * 1988-12-30 1990-05-15 Gruenberg Elliot Method and apparatus for continuously acknowledged link encrypting
US5117458A (en) * 1989-11-01 1992-05-26 Hitachi, Ltd. Secret information service system and method
GB9003326D0 (en) * 1990-02-14 1990-04-11 Enfranchise Sixty Ltd Apparatus and method for data communication
US5144664A (en) * 1990-11-16 1992-09-01 General Instrument Corporation Apparatus and method for upgrading terminals to maintain a secure communication network
GB9213169D0 (en) * 1992-06-22 1992-08-05 Ncr Int Inc Cryptographic key management apparatus and method
IL106796A (en) * 1993-08-25 1997-11-20 Algorithmic Res Ltd Broadcast encryption

Also Published As

Publication number Publication date
EP1050132A4 (en) 2005-05-18
BR9907094A (en) 2000-10-24
AU750042B2 (en) 2002-07-11
AU2758699A (en) 1999-08-02
CA2318452A1 (en) 1999-07-22
JP2002510164A (en) 2002-04-02
NO20003651L (en) 2000-09-18
EP1050132A1 (en) 2000-11-08
WO1999037052A1 (en) 1999-07-22
CN1292185A (en) 2001-04-18

Similar Documents

Publication Publication Date Title
NO20003651D0 (en) Procedure and arrangement for disseminating a private message to selected participants
ATE277466T1 (en) METHOD AND DEVICE FOR SELECTIVE ENCRYPTION AND DECRYPTION OF POINT-TO-MULTIPOINT MESSAGES
DE60306835D1 (en) Device for secure multicasting
HK1033518A1 (en) Method and apparatus for secure communication of information between a plurality of digital audiovisual devices
CA2264809A1 (en) Method and apparatus for encrypting radio traffic in a telecommunications network
TW370661B (en) Encrypted communication system that limits the damage caused when a secret key has been leaked
EP0841770A3 (en) Method for sending a secure message in a telecommunications system
CA2364398A1 (en) Method for operating a conditional access system for broadcast applications
TR200001921T2 (en) Mixing unit for a digital broadcast system.
CA2213096A1 (en) Key management system for mixed-trust environments
MXPA04005814A (en) Method and system for providing a private conversation channel in a videoconference system.
MXPA03008923A (en) Method and apparatus for security in a data processing system.
HK1091340A1 (en) Addressed broadcast messaging
MXPA01008462A (en) Method for controlling the use of a program signal in a broadcast system, and control device for a receiver for carrying out such a method.
AU2003258091A1 (en) Method and apparatus for secure e-mail
NO20020020L (en) Broadcasting and receiving messages
CA2399685A1 (en) Method and system for identification of pay-per-view programming
ATE319242T1 (en) METHOD AND DEVICE FOR SECURE CRYPTOGRAPHIC COMMUNICATION
HK1016375A1 (en) Decryption of retransmitted date in an encrypted communication system
EP1119132A3 (en) Broadcasting encrypted messages using session keys
ES8702756A1 (en) Method for distributing data by an organism to one or a plurality of receivers, and system for carrying out this method.
DZ3379A1 (en) METHOD AND SYSTEM FOR TRANSMITTING DECRYPTION INFORMATION
TR199701606T1 (en) Procedure/device for sending connection/service private information.
BR9810971A (en) Conditional access device for providing a receiver conditional access to information received at the receiver
TW358297B (en) Apparatus and method for generating on-screen-display messages using line doubling