SE514500C2 - Communication method for transmitting digital information over non secure network, automatically inserts receiver identity into information sequence during encryption on sender side - Google Patents
Communication method for transmitting digital information over non secure network, automatically inserts receiver identity into information sequence during encryption on sender sideInfo
- Publication number
- SE514500C2 SE514500C2 SE0000011A SE0000011A SE514500C2 SE 514500 C2 SE514500 C2 SE 514500C2 SE 0000011 A SE0000011 A SE 0000011A SE 0000011 A SE0000011 A SE 0000011A SE 514500 C2 SE514500 C2 SE 514500C2
- Authority
- SE
- Sweden
- Prior art keywords
- sequence
- identity
- stored
- synchronization pattern
- receiver
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
514 500 2(3) Delcrypteringssekvensen och synkroniseringsmönstret lagrade på det flyttbara datalagret 21 förs via separat säker kanal 22 (t ex post, bud etc) till mottagarens separationsanordning 23. I separationsanordningen 23 separeras delcrypteringssekvens och synkroniseringsrnönster och lagras i respektive datalager 16 respektive 15. 514 500 2 (3) The partial encryption sequence and the synchronization pattern stored on the surface data store 21 are fed via a separate secure channel 22 (eg mail, courier, etc.) to the receiver's separation device 23.
Vid transmission av nyttosignalen 1 pekar anordningen 6 ut ett antal tidpunkter i nyttosekvensen 1 där bitmönster, hämtade enligt ett förut bestämt schema 4 ur datalagret 5, skjuts in i nyttosekvensen i anordningen 2. Den sålunda modifierade nyttosignalen 3 blir längre än den ursprungliga nyttosekvensen 1.When transmitting the utility signal 1, the device 6 points out a number of times in the utility sequence 1 where bit patterns, retrieved according to a predetermined scheme 4 from the data store 5, are pushed into the utility sequence in the device 2. The thus modified utility signal 3 becomes longer than the original utility sequence 1.
Den modifierade nyttosekvensen 3 krypteras genom modulo 2 addition i anordningen 9 med en krypteringssekvens hämtad från datalagret 8. Kryptosekvensen, som finns lagrad i datalagret 8, är mycket lång och krypteringssekvensen väljs dânir genom något förfaringssätt 26, t ex val av startpunkt Den modifierade nyttosekvensen sålunda krypterad i figuren utmärkt 10 transmitteras över ett osäkert nät 1 1.The modified utility sequence 3 is encrypted by modulo 2 addition in the device 9 with an encryption sequence retrieved from the data warehouse 8. The crypto sequence, which is stored in the data warehouse 8, is very long and the encryption sequence is selected by any method 26, e.g. encrypted in fi guren excellent 10 is transmitted over an insecure network 1 1.
Hos mottagaren finns en anordning 12, som gör succesiva deluypteringar genom modulo 2 addition med dekrypteringssekvenser hämtade från datalagret 16 enligt något förfarande 28 och samtidigt succesivt analyserar det dekrypterade resultatet för att âterfinna ett synkroniseringsmönster hämtat från 15 enligt ett fórutbestämt förfarande 30. När synkroniseringsmönstret återfinnes är den modifierade nyttosekvensen som krypterats dekrypterad 13, men förändrad på de platser, som motsvarat vari delcrypteringssekvensen mottagaridentiteten urspnmgligen inplacerats i anordningen 18. Samtidigt återfinnes sändaridentiteten i det återvunna synlcroniseringsmönsteret 29. I anordningen 14 borttages de i anordningen 2 inskjutna bitmönstren dvs synkroniseringsmönstret. Den återvurma mottagarsekvensen 24 är identisk med nyttosekvensen 1 utom på de platser där mottagaridentiteten automatiskt införts.The receiver has a device 12 which performs successive deluiptions by modulo 2 addition with decryption sequences retrieved from the data layer 16 according to some method 28 and at the same time successively analyzes the decrypted result to retrieve a synchronization pattern retrieved from 15 according to a predetermined retrieval method 30. When synchronizing the modified utility sequence encrypted is decrypted 13, but changed at the locations corresponding to where the sub-encryption sequence the receiver identity was originally placed in the device 18. At the same time, the transmitter identity is recovered in the recovered synchronization pattern 29. The rewired receiver sequence 24 is identical to the payload sequence 1 except at the locations where the receiver identity is automatically entered.
Resultatet kan användas i olika sammanhang. Här ges endast tvâ exempel.The result can be used in different contexts. Only two examples are given here.
Exempel 1: Om t ex kopior av mottagarsekvensen 24 återfinnes hos många olika användare och man kan misstänka att materialet kopierats utan tillstånd. Man kan då enkelt jämföra en lagrad kopia av den urspnmgliga nyttosekvensen och den misstänkta kopian och dänned enkelt avgöra vilken mottagare, som gjort en kopia Exempel 2: Antag att olika sändare var och en förses med en unik sändaridentitet, som i sin tur ger ett unikt synkronieringsmönster. Genom att analysera det återvunna synlcroniseringsmönstret på mottagarsidan, kan en mottagare vara säker på vilken sändare, som sänt ut nyttosekvensen.Example 1: If, for example, copies of the receiver sequence 24 are recalled by many different users and it can be suspected that the material has been copied without permission. One can then easily compare a stored copy of the original utility sequence and the suspected copy and then easily determine which receiver made a copy. Example 2: Suppose that different transmitters are each provided with a unique transmitter identity, which in turn gives a unique synchronization pattern. By analyzing the recovered synchronization pattern on the receiver side, a receiver can be sure of which transmitter transmitted the payload sequence.
Claims (8)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
SE0000011A SE0000011L (en) | 2000-01-04 | 2000-01-04 | Procedure for secure transmission over an unsecured network including the automatic insertion of an identity tag |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
SE0000011A SE0000011L (en) | 2000-01-04 | 2000-01-04 | Procedure for secure transmission over an unsecured network including the automatic insertion of an identity tag |
Publications (3)
Publication Number | Publication Date |
---|---|
SE0000011D0 SE0000011D0 (en) | 2000-01-04 |
SE514500C2 true SE514500C2 (en) | 2001-03-05 |
SE0000011L SE0000011L (en) | 2001-03-05 |
Family
ID=20278014
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
SE0000011A SE0000011L (en) | 2000-01-04 | 2000-01-04 | Procedure for secure transmission over an unsecured network including the automatic insertion of an identity tag |
Country Status (1)
Country | Link |
---|---|
SE (1) | SE0000011L (en) |
-
2000
- 2000-01-04 SE SE0000011A patent/SE0000011L/en not_active IP Right Cessation
Also Published As
Publication number | Publication date |
---|---|
SE0000011D0 (en) | 2000-01-04 |
SE0000011L (en) | 2001-03-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10097522B2 (en) | Encrypted query-based access to data | |
CN1197023C (en) | Method and system for securely transferring data set in a data communications system | |
US5442706A (en) | Secure mobile storage | |
US7079653B2 (en) | Cryptographic key split binding process and apparatus | |
EP1396957A3 (en) | Methods and apparatus for initialization vector processing | |
DK1751911T3 (en) | Method of encrypting and transmitting data between a transmitter and a receiver using a network | |
US20020114453A1 (en) | System and method for secure cryptographic data transport and storage | |
US9397984B1 (en) | Apparatus and method for secure file transfer | |
CA2516568A1 (en) | System and method of protecting data on a communication device | |
RU2007144827A (en) | SELECTIVE MANAGEMENT OF RIGHTS FOR STREAM CONTENT | |
MXPA06000364A (en) | Method for generating and managing a local area network. | |
US20030212886A1 (en) | Encryption/decryption system and encryption/decryption method | |
JP3457184B2 (en) | Search device and medium storing control program therefor | |
RU2010139237A (en) | METHOD OF SUBMITTING ELECTRONIC FILE | |
US11341254B2 (en) | Method and system for securing data using random bits | |
JP2002281013A (en) | Key management device for protecting copyright, recording medium, reproduction device, recording device, key management method, reproduction method, key management program, and computer readable recording medium with key management program recorded | |
KR20180130249A (en) | Encryption systems based on cloud storage and method thereof | |
CN111818023A (en) | Data transmission method and data transmission system suitable for air-ground communication link | |
EP0786881A3 (en) | Method and system for synchronisation of encryption/decryption keys in a data communications network using marker packets | |
SE514500C2 (en) | Communication method for transmitting digital information over non secure network, automatically inserts receiver identity into information sequence during encryption on sender side | |
JP2003264549A (en) | Data distribution system, sending device, receiving device, data distribution method, sending method, receiving method, recording medium on which data preparation program is recorded, and recording medium on which data assembling program is recorded | |
DK1116368T3 (en) | Secure data transfer system | |
KR101757768B1 (en) | Method for encrypting data and apparatus and system for executing the method | |
KR102055380B1 (en) | A security-enhanced messages transmission and reception techniques | |
JPH08223152A (en) | Ciphering method and cipher information converter |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
NUG | Patent has lapsed |