WO2002028104A2 - Methode d'encryption d'un ensemble de donnees formatees - Google Patents
Methode d'encryption d'un ensemble de donnees formatees Download PDFInfo
- Publication number
- WO2002028104A2 WO2002028104A2 PCT/IB2001/001813 IB0101813W WO0228104A2 WO 2002028104 A2 WO2002028104 A2 WO 2002028104A2 IB 0101813 W IB0101813 W IB 0101813W WO 0228104 A2 WO0228104 A2 WO 0228104A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- data
- file
- key
- useful
- encrypted
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
- H04N21/238—Interfacing the downstream path of the transmission network, e.g. adapting the transmission rate of a video stream to network bandwidth; Processing of multiplex streams
- H04N21/2389—Multiplex stream processing, e.g. multiplex stream encrypting
- H04N21/23895—Multiplex stream processing, e.g. multiplex stream encrypting involving multiplex stream encryption
- H04N21/23897—Multiplex stream processing, e.g. multiplex stream encrypting involving multiplex stream encryption by partially encrypting, e.g. encrypting only the ending portion of a movie
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/16—Analogue secrecy systems; Analogue subscription systems
- H04N7/167—Systems rendering the television signal unintelligible and subsequently intelligible
- H04N7/1675—Providing digital key or authorisation information for generation or regeneration of the scrambling sequence
Definitions
- the present invention relates to an encryption system for data transmitted by any means and which must satisfy a given format.
- the object of the present invention is to allow the manipulation of the data set represented by the data flow while maintaining encryption on the data themselves.
- This goal is achieved by a method which consists in having, during encryption, definition data describing the structure of the flow to be encrypted and extracting from the flow only the useful data and only encrypting the latter, of applying to encrypt a plurality of keys and to store the resulting encrypted file.
- useful data is understood to mean the variable data added to the stream whose value is not defined by the stream standard. This is for example the audio and video data during the transmission of a television stream.
- the device in charge of encryption analyzes the data flow to determine which part is formatting and which part is useful. It has for this a definition of the standard of the flow, which can only be partial but includes at least the identifiers of the useful parts, the other data being by default formatting data.
- the advantage provided by the method according to the invention is the conservation of the formatting of the data stream allowing it to be handled by the same equipment as the unencrypted stream. This is true for an MPEG editing unit, where it is possible to cut and paste from one or a block of video frames. Indeed, it was previously necessary to decrypt the flow with all the risks that this entails, in order to be able to insert other frames into the flow, then to encrypt the whole.
- the data stream is encrypted in a known manner, that is to say as a whole and a formatting information file is created in parallel.
- This file contains the information necessary for handling the data in the stream, for example the video frame headers.
- Partial encryption can be used for data manipulation in a content distribution environment between a producer and one or more users.
- the content is either fully encrypted or partially at the producer of the data according to the method described above.
- a file is produced which includes identification data such as description of the content, conditions of use and encryption method.
- This data is then transferred to a data server for dissemination.
- a data server for dissemination.
- the data is decrypted then the useful part of the data is encrypted by a plurality of keys.
- the key used to encrypt the useful data is changed according to the progress of the encryption process.
- a key file is created with the index of the data from which this key was used.
- a key When a key is changed can depend on many criteria. For example the number of blocks processed, the data-specific index, the type of data.
- These encrypted data are transmitted to the user by known means such as a cable, satellite broadcast via the Internet.
- the file containing the keys is encrypted by a high level algorithm guaranteeing security for this very important set. It is then transmitted to the user to allow him to decrypt the data.
- this security module which has the means to decrypt the key file, check the rights and return the keys to the user's device.
- the producer prepares the data in clear CC and the descriptive file MD. There he places the name of the data in several languages, indications on the format of the data (version, compression etc.)
- the data file CC and the descriptive file MD are then transferred to the server MS.
- the server prior to storage, encrypts the data in the CC file to form the secure file CS1. It is possible that this step takes place directly with the supplier, in order to secure its content during transport.
- this CS1 file can be of completely encrypted type, therefore with loss of formatting information, or partially encrypted, that is to say taking into account only the useful data.
- a server-specific key is used for this first step.
- the data file CS1 is transmitted to a decryption module to obtain the clear data CC and then the encryption ENC which generates the encryption keys and applies them to useful data from the CC file to obtain the secure downloadable file CS2
- the encryption keys are stored in the descriptive file MD and this file is encrypted by a key specific to the broadcasting system. It is possible to encrypt only the part of the keys, the other data remaining in the clear in order to facilitate the identification of encrypted data downloadable CS2.
- the RM usage rights are attached to this file and also encrypted by the system-specific key.
- the encrypted data CS2 and the secure descriptive file MDS are stored for later use.
- the key file is encrypted by a service key specific to the MS server and stored with the secure file.
- the data encryption operation is a time-consuming operation and, depending on the environment, is not compatible with online use. This is why, when a user requests for specific content, the key file is decrypted by the service key, then re-encrypted by the key specific to the transmission system with the user. The rights of use are also attached on this occasion and the user will be able to have the data very quickly.
- the downloadable file of CS2 data can be stored on removable media, therefore more vulnerable, without danger. Some data producers may require that only this form of storage is permitted for their content.
- the encrypted data CS2 is transmitted to the user with the descriptive file and MDS keys.
- the user's STB receiver Upon receipt, the user's STB receiver will transmit the key file to its security module SM. This module performs checks to determine if the rights available to the user are sufficient to decrypt the file. If so, the security module returns the keys to the user's STB module.
- the method of the invention can also be applied statically, for files for example.
- a Word type file will only be partially encrypted, taking into account the format of such a file.
- the Word application recognizes such a file and, when opened, only the text will be unintelligible, the form remaining that of the original file. This allows you to edit this file (without of course seeing the content), to add others of the same type and to save everything. To re-read the information, it will be necessary to go through the decryption operation.
- formatting data linked to the useful data may also be encrypted. This can be the case in our previous example when each word in the Word file includes a definition (font, size, color ...) linked to this word. These definitions are part of the formatting data but are only useful as long as the useful data are in clear. Keeping this formatting data in plain text has no interest because it acts on a part in any way unintelligible.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Multimedia (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Storage Device Security (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2001290188A AU2001290188A1 (en) | 2000-09-29 | 2001-10-01 | Method for encrypting a formatted data set |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CH19142000 | 2000-09-29 | ||
CH1914/00 | 2000-09-29 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2002028104A2 true WO2002028104A2 (fr) | 2002-04-04 |
WO2002028104A3 WO2002028104A3 (fr) | 2002-06-27 |
Family
ID=4566770
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/IB2001/001813 WO2002028104A2 (fr) | 2000-09-29 | 2001-10-01 | Methode d'encryption d'un ensemble de donnees formatees |
Country Status (2)
Country | Link |
---|---|
AU (1) | AU2001290188A1 (fr) |
WO (1) | WO2002028104A2 (fr) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4995080A (en) * | 1988-08-04 | 1991-02-19 | Zenith Electronics Corporation | Television signal scrambling system and method |
EP0926894A1 (fr) * | 1997-12-23 | 1999-06-30 | CANAL+ Société Anonyme | Unité d'embrouillage pour un système de transmission numérique |
WO1999037052A1 (fr) * | 1998-01-19 | 1999-07-22 | Terence Edward Sumner | Procede et appareil d'envoi d'un message prive a des membres selectionnes |
-
2001
- 2001-10-01 WO PCT/IB2001/001813 patent/WO2002028104A2/fr active Application Filing
- 2001-10-01 AU AU2001290188A patent/AU2001290188A1/en not_active Abandoned
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4995080A (en) * | 1988-08-04 | 1991-02-19 | Zenith Electronics Corporation | Television signal scrambling system and method |
EP0926894A1 (fr) * | 1997-12-23 | 1999-06-30 | CANAL+ Société Anonyme | Unité d'embrouillage pour un système de transmission numérique |
WO1999037052A1 (fr) * | 1998-01-19 | 1999-07-22 | Terence Edward Sumner | Procede et appareil d'envoi d'un message prive a des membres selectionnes |
Non-Patent Citations (1)
Title |
---|
PARKS, KASSAY AND WEINSTEIN: "Security Implications of Adaptive Multimedia Distribution" IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS., 1 juin 1999 (1999-06-01), XP002195155 Vancouver (Canada) * |
Also Published As
Publication number | Publication date |
---|---|
WO2002028104A3 (fr) | 2002-06-27 |
AU2001290188A1 (en) | 2002-04-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP1305948B1 (fr) | Methode de distribution securisee de donnees numeriques representatives d'un contenu multimedia | |
EP1525748B1 (fr) | Procede et module electronique de transmission securisee de donnees | |
FR2975250A1 (fr) | Procede et systeme pour une gestion securisee de services de documents xml en ligne grace a un chiffrement asymetrique conservant la structure | |
EP0740870A1 (fr) | Procede d'emission et de reception de programmes a acces conditionnel utilisant des mots de controle specifiques aux programmes | |
WO2007071697A1 (fr) | Architecture et procede pour controler le transfert d'informations entre utilisateurs | |
US20120311318A1 (en) | Information processing system, information processing device, information processing method and program | |
EP1374588B1 (fr) | Encryption d'un flux video compresse | |
EP2907315B1 (fr) | Heritage de parametres d'identifiant universel de ressource (uri) | |
EP1430711A1 (fr) | Methode de diffusion de donnees entre un serveur local et des peripheriques locaux | |
WO2012093216A1 (fr) | Dispositif et procède de stockage en ligne, dispositif et procède d'émission, dispositif et procède de réception | |
FR2869133A1 (fr) | Systeme et procede de tracabilite de contenus electroniques syndiques via un reseau de communication de type internet | |
EP1470690A2 (fr) | Procede et dispositif de transmission de message de gestion de titre d'acces | |
EP3732849B1 (fr) | Procédé et système d'identification de terminal d'utilisateur pour la réception de contenus multimédia protégés et fournis en continu | |
EP1756696B1 (fr) | Methode de mise a jour securisee de logiciel embarque dans un module de securite | |
FR2812147A1 (fr) | Procede de traitement d'un flux d'informations par un microcircuit de securite, notamment un microcircuit de carte a puce | |
FR2806231A1 (fr) | Procede de transmission d'informations avec controle d'acces en filigrane numerique et dispositifs de mise en oeuvre | |
EP2827601A1 (fr) | Méthode et dispositif pour la protection des clés de déchiffrement d'un décodeur | |
FR2940691A1 (fr) | Procedes de transmission, de reception et d'identification, processeur de securite et support d'enregistrement d'informations pour ces procedes. | |
WO2002028104A2 (fr) | Methode d'encryption d'un ensemble de donnees formatees | |
WO2007077400A2 (fr) | Distribution et gravure de donnees numeriques | |
US20180091857A1 (en) | Drm addition authentication | |
US10574629B2 (en) | Header translation modification | |
EP1994718B1 (fr) | Procédé et équipement de distribution de contenus audiovisuels numériques sécurisés par des solutions interopérables | |
EP1419640A2 (fr) | Reseau numerique local, procedes d'installation de nouveaux dispositifs et procedes de diffusion et de reception de donnees dans un tel reseau | |
WO2021245351A1 (fr) | Procede de discrimination d'un message entre un terminal et un serveur de donnees |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A2 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PH PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
AK | Designated states |
Kind code of ref document: A3 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PH PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A3 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
122 | Ep: pct application non-entry in european phase | ||
NENP | Non-entry into the national phase |
Ref country code: JP |