Class / Patent application number | Description | Number of patent applications / Date published |
380042000 | Data stream/substitution enciphering | 81 |
20080199004 | Cipher System - A system including a pseudo-random number generator having a register to store an extended state having a reduced state and a dynamic constant, an initialization module to initialize a part of the extended state based on a Key and/or an Initial Value, a state update module to update the reduced state, an output word module to generate output words, the state update module and the output word module being adapted to operate through cyclical rounds, each round including updating the reduced state and then generating one of the output words, and an update dynamic constant module to update the dynamic constant, wherein in a majority of the rounds, updating of the reduced state and/or generation of the output word is based on the dynamic constant, and the dynamic constant is only updated in a minority of the rounds. Related apparatus and method are also described. | 08-21-2008 |
20080205641 | PRESERVING PRIVACY OF ONE-DIMENSIONAL DATA STREAMS USING DYNAMIC AUTOCORRELATION - A method, information processing system, and computer readable medium are provided for preserving privacy of one-dimensional nonstationary data streams. The method includes receiving a one-dimensional nonstationary data stream. A set of first-moment statistical values are calculated, for a given instant of sub-space of time, for the data. The first moment statistical values include a principal component for the sub-space of time. The data is perturbed with noise along the principal component in proportion to the first-moment of statistical values so that at least part of a set of second-moment statistical values for the data is perturbed by the noise only within a predetermined variance. | 08-28-2008 |
20080232581 | Data parallelized encryption and integrity checking method and device - A method and device for encrypting and/or decrypting binary data blocks protecting both confidentiality and integrity of data sent to or received from a memory. The encryption method comprises steps of: applying to the input data block a reversible scrambling process, the scrambling process providing a scrambled data block in which the bits of the input data block are mixed so that a modification of one bit in the scrambled data block impacts on every bit of the input data block, and applying to the scrambled data block a stream cipher encryption algorithm providing an encrypted data block. Application can be made to secured integrated circuits requiring to securely store data in an external memory. | 09-25-2008 |
20080279371 | METHODS OF ENCRYPTING AND DECRYPTING DATA AND BUS SYSTEM USING THE METHODS - Methods of encrypting and decrypting data, and a bus system using the methods are provided. The method of encrypting data includes: performing an operation on data that is to be transmitted through a bus with a key stream generated from a predetermined key so as to encrypt the data; transmitting the encrypted data to a predetermined module through the bus; and transmitting a synchronization signal that is logic high when the encrypted data is transmitted through the bus to the predetermined module. Therefore, an encryption speed is improved and encryption can be simply embodied so that security of data received from the bus can be improved. | 11-13-2008 |
20080298580 | CONTENT DELIVERY SERVER AND CONTENT DELIVERY SYSTEM - A content delivery server comprises a packet generator operative to generate packetized content data; an encryptor operative to encrypt the packetized content data with content key data to generate encrypted content data and also operative to encrypt the content key data with user key data to generate encrypted content key data; a TS multiplexer operative to multiplex the encrypted content data into a transport stream and add the encrypted content key data to a TS header thereof; and a transmitter operative to transmit the transport stream to a user terminal. | 12-04-2008 |
20090034721 | ENCRYPTING AND DECRYPTING A DATA STREAM - The present invention provides methods, systems and apparatus for encrypting and for decrypting a data stream, for securely sending a data stream and for securely receiving a data stream, and for secure transmission of a data stream. The data stream, after at least a part of it being encrypted, is transmitted from a sender to a receiver via a channel. An exemplary method for encrypting comprises: adjusting encryption attributes during transmission; encrypting the data stream according to the adjusted encryption attributes; and transmitting the encrypted data stream and information of the encryption attributes to the receiver. | 02-05-2009 |
20090041234 | METHOD AND APPARATUS FOR ENCRYPTING AND DECRYPTING DATA TO/FROM AN ESCON TAPE SYSTEM - A method and apparatus for encrypting data written to an Enterprise System Connection (ESCON) tape system and reading encrypted data from such a tape system and decrypting the encrypted data is described. One illustrative embodiment, in writing encrypted data to an ESCON tape system, receives from a computer over a first ESCON link a command to write a data block of specified size to the ESCON tape system; requests data constituting the data block from the computer in sub-blocks; compresses and encrypts each sub-block to produce a corresponding compressed and encrypted sub-block; and transmits to the ESCON tape system over a second ESCON link the compressed and encrypted sub-blocks using a series of chained-data write operations, the transmitted compressed and encrypted sub-blocks forming a compressed and encrypted data block on a tape of the ESCON tape system. | 02-12-2009 |
20090041235 | Secure Information Distribution System Utilizing Information Segment Scrambling - A method and apparatus for securing and, optionally, distributing an information stream by divided the information stream into a collection of segments and compressing the segments, rearranging the order of the segments and encrypting the segments. | 02-12-2009 |
20090052661 | REDUCED HIERARCHY KEY MANAGEMENT SYSTEM AND METHOD - A controller receives an encrypted media stream (“EMS”) and an identifier indicative of a selected content key from a headend. The EMS is encrypted with an encryption key and can be decrypted with a corresponding decryption key which is determinable from the selected content key. The controller receives indexes and content keys from the headend prior to receiving the EMS. Each index respectively corresponds to an identifier with one index corresponding to the identifier indicative of the selected content key. The content keys correspond to the indexes with one content key corresponding to the index corresponding to the identifier indicative of the selected content key. The controller selects the index corresponding to the identifier indicative of the selected content key upon receiving the EMS, determines the selected content key from the selected index, determines the decryption key from the selected content key, and decrypts the EMS with the decryption key. | 02-26-2009 |
20090060177 | SIGNATURE SPECIFICATION FOR ENCRYPTED PACKET STREAMS - Methods, systems, and products are disclosed for specifying a signature for an encrypted packet stream. One method receives the encrypted stream of packets, and encryption obscures the contents of a packet. A signature for insertion into the stream of packets is specified, and the signature identifies a type of data encrypted within the stream of packets. The signature identifies the contents of the packet despite the encryption obscuring the contents. | 03-05-2009 |
20090067621 | Method of providing an encrypted data stream - A method of providing an encrypted data stream, includes obtaining a first data stream, partitioned into sections corresponding to key periods, each of a plurality of the key periods being associated with a respective value of a key, wherein each section corresponding to a key period associated with a value of the key includes at least one encrypted data unit decryptable using that associated key value, obtaining a sequence of key messages, at least some of which carry key information for obtaining at least one of the key values, obtaining a replacement data stream section, forming an encrypted output data stream, corresponding at least partially to the first data stream, by inserting the replacement data stream section so as to replace a corresponding part of the first data stream with a tail end of the replacement data stream section preceding at least part of a section of the first stream corresponding to a certain key period, and providing as output the encrypted output data stream in synchrony with an associated stream of key messages. A key message carrying key information for obtaining the key value associated with the certain key period is included in the stream of key messages so as to coincide with a point of the encrypted output data stream preceding the tail end of the replacement data stream section. | 03-12-2009 |
20090103721 | DATA TRANSMITTING APPARATUS, DATA RECEIVING APPARATUS AND DATA COMMUNICATION APPARATUS - Provided is a data communication apparatus which is highly concealable and significantly increases time necessary for an eavesdropper to analyze cipher text. A multi-level code generation section ( | 04-23-2009 |
20090129587 | METHOD, SYSTEM AND APPARATUS FOR SHARING MEDIA CONTENT IN A PRIVATE NETWORK - A method, system and apparatus for sharing media content securely and reliably among various computing devices in a private network through media streaming technology is provided. According to the invention, a media streaming apparatus is installed on each computing device, said media streaming apparatus comprises: a controller for controlling a media streaming proxy and a trusted media player to render the requested media stream according to a user's request or the request coming from other application component; the trusted media player for securely rendering the requested media stream for the user under the control of said controller; the media streaming proxy for communicating with the trusted media player the other remote media streaming proxies in said private network, forwarding encrypted media stream, controlling encryption/decryption module to encrypt/decrypt the media player and providing the decrypted media stream to the trusted media player; and the encryption/decryption module for encrypting/decrypting the media stream under the control of the media streaming proxy. | 05-21-2009 |
20090129588 | Information processing apparatus - An information processing apparatus capable of effectively preventing unauthorized use of content distributed through a network when playing the content. The information processing apparatus includes a tamper-resistant secure module, a receiving block, and a playback block. The secure module includes a key storage block for storing a decryption key, a decryption block, and an encryption block. The receiving block receives distribution data distributed through the network and transfers the data to the decryption block. The decryption block decrypts the distribution data to obtain content by using the decryption key. The encryption block divides the content to a plurality of split pieces of content and encrypts them by using a temporary encryption key. Information on a temporary decryption key is output each time the temporary encryption key is changed. The playback block decrypts the encrypted pieces of content by using the temporary decryption key and combines and plays them. | 05-21-2009 |
20090129589 | SECURITY SYSTEM AND METHOD FOR USE IN NETWORK - A security system, method and device for use in a network for providing a real-time stream are provided. A server updates security association of a terminal device by periodically providing a key stream. When the key stream for changing the security association of the terminal device is received from the server, the terminal device updates stored key stream information after identifying at least one changed field in the key stream and performs a security policy with the server using the updated key stream information. When a security setting operation is performed through a stream notification periodically provided from the server, an unnecessary waste of system resources can be reduced by updating only a specific changed field through the stream notification and reducing the load of generating a security association table. | 05-21-2009 |
20090136026 | WATERMARK EMBEDDING USING LOOK-UP TABLES - The invention relates to embedding a spread spectrum watermark in a data signal as well as to detection of the embedded watermark. A data signal ( | 05-28-2009 |
20090141888 | METHOD AND APPARATUS FOR PERFORMING TRICK PLAY ON SCRAMBLED DATA STREAM - A method of performing trick play on a scrambled data stream, the method comprising: extracting position information corresponding to scrambling information from an input scrambled transport stream; demultiplexing a transport stream of a predetermined position according to the stored position information of the scrambling information and extracting the scrambling information and a scrambled data stream pertaining to the scrambling information; descrambling the extracted scrambled data stream by using the extracted scrambling information; and decoding a reference picture based on the position information. | 06-04-2009 |
20090202067 | CRYPTOGRAPHIC SYSTEM CONFIGURED TO PERFORM A MIXED RADIX CONVERSION WITH A PRIORI DEFINED STATISTICAL ARTIFACTS - A cryptographic system (CS) is provided. The CS ( | 08-13-2009 |
20090208000 | SIGNATURE MANAGEMENT METHOD AND SIGNATURE MANAGEMENT DEVICE - A signature management apparatus and method of cutting-out streaming data. The signature management apparatus includes a signature-related information preparing device which prepares signature-related information for streaming data, a signature-related information storage device which partitions a sequence header of the streaming data into stream header information needed for reproduction of the streaming data and user header information which a user can freely use for storage, and stores the signature-related information within the user header information in a form that allows no start code to emerge. | 08-20-2009 |
20090208001 | Instant Messaging Private Tags - Systems for instant messaging private tags preferably comprise a parser for parsing an instant message for sensitive data and an encryption engine for encrypting the sensitive data. A modified uuencoder is also preferably included for converting the encrypted sensitive data into a data stream that complies with an XML format. Other systems and methods are also provided. | 08-20-2009 |
20090220074 | Steganographic method and device - An apparatus and method for encoding and decoding additional information into a stream of digitized samples in an integral manner. The information is encoded using special keys. The information is contained in the samples, not prepended or appended to the sample stream. The method makes it extremely difficult to find the information in the samples if the proper keys are not possessed by the decoder. The method does not cause a significant degradation to the sample stream. The method is used to establish ownership of copyrighted digital multimedia content and provide a disincentive to piracy of such material. | 09-03-2009 |
20090257584 | Encrypted stream processing circuit and method of processing encrypted stream - An encrypted-stream processing circuit includes: a decryption mechanism decrypting an encrypted stream; a stream-data processing mechanism separating a plurality of packets included in a stream decrypted by the decryption mechanism in accordance with a packet identifier identifying the packet, and creating a partial stream by extracting a part from the stream under the control of a CPU (Central Processing Unit); and an encryption mechanism encrypting the partial stream, wherein the decryption mechanism, the stream-data processing mechanism, and the encryption mechanism are included in a packaged integrated circuit, and are connected to the CPU through a bus. | 10-15-2009 |
20090290706 | Methods and Apparatus for Secure and Adaptive Delivery of Multimedia Content - Techniques for securely and adaptively delivering multimedia content are disclosed in which a set of alternate access units for each time slot is obtained. Then, the encryption stream index of each access unit from the set of alternate access units of the previous time slot are obtained. An encryption stream index is then assigned to each access unit in the set of alternate access units in the current time slot, such that the encryption index increases over time. Thus, the invention overcomes the problem of encrypting a multimedia stream that may have multiple access units for each time slot by selecting the encryption index for each access unit such that the encryption index increases, regardless of which access unit the delivery system (e.g., server) selects for transmission. | 11-26-2009 |
20090323938 | Mechanism for transport-safe codings for cryptographic use - In one embodiment, a mechanism for transport-safe codings for cryptographic use is disclosed. In one embodiment, a method for transport-safe coding for cryptographic use includes converting an input data stream into index values associated with “n” printable characters, wherein “n” is a radix associated with a base-“n” coding scheme and a prime power less than 94, performing a cryptographic operation on the index values to encrypt the index values, and translating the encrypted values directly into an output data stream of printable characters associated with the encrypted values in a base-“n” coding scheme. | 12-31-2009 |
20090323939 | DATA TRANSMISSION METHOD AND TERMINAL - Embodiments of the present invention provide a data transmission method, a Coaxial-Cable Network Unit (CNU) and a Coaxial-cable Line Terminal (CLT). The method is applied to a point-to-multipoint Coaxial-cable Network, wherein the point-to-multipoint Coaxial-cable Network includes a Coaxial-cable Line Terminal, CLT, and a plurality of Coaxial-Cable Network Units, CNUs; the CLT shares transmission medium with the CNUs. The method includes: obtaining, by the CLT, an uplink receiving scrambling code, and decrypting, by the CLT, with the obtained uplink receiving scrambling code, data sent from a CNU after being encrypted with an uplink transmission scrambling code; and obtaining, by the CNU, a downlink receiving scrambling code, and decrypting, by the CNU, data received by the CNU with the obtained downlink receiving scrambling code; wherein the uplink receiving scrambling code is different from the downlink receiving scrambling code. In embodiments of the present invention, the CNU includes a scrambling code obtaining unit, a decryption execution unit and a data interaction unit. The CLT includes a scrambling code processing unit, a decryption execution unit and a data interaction unit. With the embodiments of the present invention, the security of the uplink data transmission in an Ethernet Passive Coaxial Network (EPCN) system is guaranteed, and the QoS of services is greatly enhanced. | 12-31-2009 |
20100002875 | Slice-Based Prioritized Secure Video Streaming - Slice-based prioritized secure video streaming comprises a transmitter receiving a slice comprising a plurality of macroblocks and selecting an encryption key based at least in part on a relative importance of secure transmission of the macroblocks. If the importance is high, a master key is selected. If the importance is medium, a first key derivable by applying a one-way function to the master key is selected. If the importance is low, a second key derivable by applying the one-way function to the first key is selected. The slice is encrypted using the encryption key. A receiver receives the encrypted slice, decrypts a header of the slice using the master key, to obtain an indication of a relative importance of secure transmission of the macroblocks. The receiver selects a decryption key based at least in part on the indication, and decrypts the slice using the decryption key. | 01-07-2010 |
20100002876 | ENCRYPTION APPARATUS, DECRYPTION APPARATUS, LICENSING APPARATUS AND CONTENT DATA GENERATION METHOD - In order to provide various service types to the users in a case of supplying the contents constituted from multiple resources via broadcast, the following apparatuses are provided. An encryption apparatus ( | 01-07-2010 |
20100008497 | STREAM ENCRYPTION METHOD AND ENCRYPTION SYSTEM - A stream encryption method encodes plaintext of N number of 1-bit input, signal sequences into L (L is N or more) bits of encrypted text using N number of pseudo random sequences and uses only one pseudo random sequence used for the encryption to decode the single corresponding plaintext. This stream encryption method comprises using the N number of pseudo random sequences to divide a L-bit encryption symbol set, averagely into two equal parts; selecting either of the two partial sets by a corresponding 1-bit plaintext sequence; and when there are one or more elements of the selected N number of partial sets forming common parts in the sets, using one of those as an encryption symbol. | 01-14-2010 |
20100014661 | APPARATUS, SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR DISTRIBUTING SERVICE INFORMATION AND DIGITAL RIGHTS FOR BROADCAST DATA - An apparatus, system method and computer program product configured to transmit data over a broadcast network. The data is encrypted and decoded using a decryption key available to terminals in combination with a digital rights object. A media guide is broadcast to the terminals. Information from the media guide is also stored by a request handling means in order to ensure that information, such as pricing information, broadcast to the terminals is synchronized with information used to register a terminal as a subscriber. A request is sent from a terminal to the broadcast network through a second network. Authentication information identifying the terminal may be included in the request without manual input from a user of the terminal. Authentication information is extracted from a component or added to the message by a component of the second network. The digital rights object is then sent to the terminal via the second network. | 01-21-2010 |
20100027782 | Device and Method for Processing Datastreams - The invention relates to a device for processing datastreams in a communications unit with two mutually-separate data-processing regions, which provide at least two separate message paths. The message paths are connected respectively to a message transmitter and a message receiver, wherein, in each message path, an encoding module is provided, which is connected both to a first data-processing region and also to a second data-processing region. Furthermore, in the second data-processing region, a distribution unit is provided, which is connected to the message paths of the first data-processing region and to all encoding modules of the corresponding message paths in order to distribute given messages in a targeted manner. | 02-04-2010 |
20100034375 | SECURE WIEGAND COMMUNICATIONS - The present invention is directed toward secure access systems. Specifically, a method and system is provided that enhances the security of unidirectional communication protocols used in access control systems, such as the Wiegand protocol. The enhancements may include obfuscation of data, a two-way packet-mode communications, and blind synchronization of pseudo-random number generators. | 02-11-2010 |
20100046748 | SYSTEM AND METHOD FOR DIGITAL DATA VALIDATION - A memory card is presented. The memory card includes a storage medium for storing data. The memory card also includes a processor electronically coupled to the storage medium. The processor is configured to receive a data stream from a digital imaging device, and analyze the data stream to detect a pre-determined signal from the digital imaging device. When the pre-determined signal is detected in the data stream, the processor is configured to retrieve digital image data from the data stream, encrypt the digital image data, and store the encrypted digital image data on the storage medium. | 02-25-2010 |
20100054462 | INFORMATION RECORDING/REPRODUCING APPARATUS AND METHOD - A block key to encrypt block data is generated using an ATS (arrival time stamp) appended to each of TS (transport stream) packets included in a transport stream correspondingly to the arrival time of the TS packet. The ATS is a random data depending upon an arrival time, and so a block-unique key can be generated, which enhances the protection against data cryptanalysis. A block key is generated from a combination of an ATS with a key unique to a device, recording medium or the like such as a master key, disc-unique key, title-unique key or the like. Since an ATS is used to generate a block key, any area for storage of an encryption key for each block may not be provided in a recording medium. | 03-04-2010 |
20100061549 | RIGHT OBJECT RENEWAL METHOD AND APPARATUS FOR RIGHT-PROTECTED BROADCAST SERVICE - A Right Object renewal method and apparatus for a right-protected digital broadcast service that is capable of predicting the expiration of a Right Object issued for the right-protected broadcast channel and renewing the Right Object prior to the expiration of the Right object based on the predicted expiry is provided. A right object renewal method for a right-protected broadcast service using a long term right object having a purchased license duration and a short term right object having a temporary license duration which is shorter than the purchased license duration according to the present invention includes determining whether the time to expire of a previously issued short term right object is less than a predetermined threshold value; requesting, when the time to expire of the previously issued short term right object is less than the threshold value, requesting and receiving a new short term object; and renewing the duration of the short term right object based on the received new short term right object. | 03-11-2010 |
20100086129 | METHOD AND APPARATUS FOR TRANSMITTING SIGNAL - A signal transmitting method according to an exemplary embodiment of the present invention includes channel-coding broadcasting channel information by using a first scrambling code in a first frame within a broadcasting channel information updating period including a plurality of frames, and channel-coding the broadcasting channel information by using a second scrambling code in a second frame within the broadcasting channel information updating period. The second scrambling code is different from the first scrambling code. | 04-08-2010 |
20100111299 | DATA TRANSFER SYSTEM, DATA TRANSFER METHOD, DATA TRANSMISSION DEVICE AND DATA RECEIVING DEVICE - A data transfer system. The data transfer system includes a first device and a second device. The first device is configured to encrypt a partial information group of the plurality of information groups and to transfer an encrypted information group to the second device, to generate an omission information group with information having a predetermined relation omitted from at least remaining information groups of the plurality of information groups, to encrypt and to transfer the omission information group to the second device, when a partial kind of information of the plurality of information groups has the predetermined relation. The second device is configured to decrypt the partial information group and the omission information group, to restore omitted information based on the omitted information having the predetermined relation included in a transferred partial information group, and to add the restored information to the transferred omission information group. | 05-06-2010 |
20100119059 | Integrated Circuit Device and Data Transmission System - An integrated circuit device includes: a reception control unit that receives data from an information processing terminal over a network; a main control unit having a route selection determining unit that controls selection of data to be transmitted to a subsequent system based on information whether data received by the reception control unit is encrypted; a decrypting unit that decrypts the encrypted data outputted from the main control unit; and a route selector that selects whether to acquire undecrypted data outputted from the main control unit or to acquire decrypted data outputted from the decrypting unit based on control by the route selection determining unit. | 05-13-2010 |
20100124328 | EXTENSIVE CIPHERTEXT FEEDBACK - Some embodiments of a method and apparatus for encrypting and decrypting data have been presented. In one embodiment, a stream cipher is run in parallel with a block cipher to output a stream of bits with a length equal to a number of ciphertext blocks in an output stream of the block cipher. The method may further include pre-processing a current plaintext block based on the stream of bits and the number of ciphertext blocks in the output stream of the block cipher. Then the block cipher may encipher the pre-processed block to generate a current ciphertext block. | 05-20-2010 |
20100166178 | METHOD AND SYSTEM FOR SECURING PACKETIZED VOICE TRANSMISSIONS - An approach is provided for providing secure packetized voice transmissions. A public/private key pair is generated at a call device (or endpoint). An encrypted voice stream is received from another call device, where the encrypted voice stream was encrypted using a public key of the public/private key pair. This encrypted voice stream when received at the call device is decrypted using a private key of the public/private key pair. | 07-01-2010 |
20100220855 | STRENGTHENED KEY SCHEDULE FOR ARCFOUR - Some embodiments of a method and an apparatus to strengthen key schedule for arcfour have been presented. In one embodiment, an S array of a predetermined size is initialized. The S array is usable in a key generating process of arcfour encryption. The key generation process is extended to generate keys, which are substantially random and substantially unbiased. Using the keys generated, a stream cipher performs arcfour encryption on plaintext data to output ciphertext data. | 09-02-2010 |
20100246816 | DATA ENCRYPTION - A system for encryption, and subsequent decryption, of encoded data allows for transcoding of the encrypted data. The data is encoded in such a way that different packets have different importance levels, so that some or all of the packets at the lower importance levels can be discarded or truncated in order to reduce the data rate. This is achieved by introducing dependencies into the encoding process. The packets at the highest importance level are encoded with reference only to other packets at the highest importance level, while the encoding of packets at lower importance levels also depend on the encoding of the packets at the highest importance level. The encoded data is then encrypted in such a way that the encryption process has dependencies that correspond to the dependencies in the encoding process. Packets at the highest importance level are encrypted with reference to other encrypted packets at the highest importance level, while the encryption of packets at lower importance levels also uses the results of encrypting the packets at the highest importance level. | 09-30-2010 |
20100260335 | METHOD AND APPARATUS FOR GENERATING A KEY STREAM - A method of generating a key stream for a precomputed state information table. The method comprises initialising a counter and an accumulator with non-zero values; combining state information identified by the counter with the accumulator; swapping state information identified by the counter with state information identified by the accumulator; combining the two pieces of state information; outputting the state information identified by the combination as a byte of the key stream; adding a predetermined number odd number to the counter; and repeating the above steps to produce each byte of the key stream. | 10-14-2010 |
20100316216 | Content Data, Transmitting Apparatus, Receiving Apparatus and Decoding Method - A transmitting apparatus | 12-16-2010 |
20100322415 | MULTILAYER ENCRYPTION OF A TRANSPORT STREAM DATA AND MODIFICATION OF A TRANSPORT HEADER - Several methods and a system of multilayer encryption of a transport stream data and modification of a transport header are disclosed. An exemplary embodiment provides a method of a multilayer encryption. The method includes further encrypting an initially encrypted transport stream data to generate a multilayer encrypted data using a processor and a memory. The method also includes determining a further encryption flag data. The encryption method modifies a transport header of the multilayer encrypted data. In addition, the encryption method includes the further encryption flag data in an adapted component of a modified transport header. | 12-23-2010 |
20110026707 | COMMUNICATION APPARATUS - A communication apparatus includes a plurality of isochronous transfer processing units, each of which is configured to perform isochronous transfer using an isochronous channel set thereto; a security ensuring processing unit coupled to each of the plurality of isochronous transfer processing units, and configured to perform security ensuring processing to ensure the security of isochronous transfer performed by the corresponding isochronous transfer processing unit; and a security ensuring control unit configured to, in response to a request from a second communication apparatus for ensuring security of isochronous transfer, cause the security ensuring processing unit corresponding to the isochronous transfer processing unit which performs the isochronous transfer using an isochronous channel having been notified from the second communication apparatus along with or in advance of the request for ensuring security of isochronous transfer to perform the security ensuring processing. | 02-03-2011 |
20110069835 | Method and apparatus for allowing software access to navigational data in a decrypted media stream while protecting stream payloads - A method, apparatus and system enabling software access to navigational data in a decrypted media stream while protecting stream payloads. In one embodiment, a filter may route an encrypted content stream and associated information to a secure partition having a trusted computing component for decryption. Upon decryption, the trusted computing component may store the decrypted payload of the content in a secure storage location accessible to the trusted computing component. Thereafter, the decrypted navigational header information of the content may be used to navigate to the decrypted content via a trusted component such as a trusted rendering unit in the secure partition. | 03-24-2011 |
20110129086 | Unicode-Compatible Stream Cipher - A process and system for enciphering and deciphering Unicode characters that is compatible with scripting languages such as JAVASCRIPT®, JSCRIPT® and VBSCRIPT®. The process and system can encipher each character individually and maintain the size of the character. The enciphered character is deciphered at the application layer at the client to provide endpoint security. | 06-02-2011 |
20110142232 | SYSTEM AND METHOD FOR EFFECTIVE SCRAMBLING OR DESCRAMBLING - Provided is an scrambling or descrambling method and apparatus. The scrambling system includes a data stream generating unit to generate data streams, a scrambling linear feedback shift register (LFSR) group to calculate a sequence output with respect to each of the generated data streams, and a scrambling processing unit to perform scrambling of the generated data streams based on the calculated sequence outputs. The descrambling system includes a data stream generating unit to generate scrambled data streams using scrambled data, a descrambling LFSR group to calculate a sequence output of each of the generated scrambled data streams, and a descrambling processing unit to perform descrambling of the scrambled data streams using the calculated sequence outputs. | 06-16-2011 |
20110158402 | METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR SCRAMBLED COMMUNICATION OF DATA TO, FROM, OR OVER A MEDIUM - The subject matter described herein includes methods, systems, and computer readable medium for scrambled communication of data to, from, or over a medium. According to one aspect, the subject matter described herein includes a method for communicating data in scrambled form to or over a medium. The method includes receiving analog or digital data to be transmitted to or over a medium. The method further includes modulating samples representing at least signal using the analog or digital data to produce data modulated signal samples. The method further includes scrambling the data modulated signal samples using a predetermined scrambling algorithm. The method further includes transmitting the scrambled data modulated signal samples to or over the medium. The method further includes descrambling samples received from the medium using the inverse of the predetermined scrambling algorithm to obtain the unscrambled modulated signal samples, which can then be demodulated to retrieve original data. | 06-30-2011 |
20110255689 | MULTIPLE-MODE CRYPTOGRAPHIC MODULE USABLE WITH MEMORY CONTROLLERS - In one embodiment, a multi-mode Advanced Encryption Standard (MM-AES) module for a storage controller is adapted to perform interleaved processing of multiple data streams, i.e., concurrently encrypt and/or decrypt string-data blocks from multiple data streams using, for each data stream, a corresponding cipher mode that is any one of a plurality of AES cipher modes. The MM-AES module receives a string-data block with (a) a corresponding key identifier that identifies the corresponding module-cached key and (b) a corresponding control command that indicates to the MM-AES module what AES-mode-related processing steps to perform on the data block. The MM-AES module generates, updates, and caches masks to preserve inter-block information and allow the interleaved processing. The MM-AES module uses an unrolled and pipelined architecture where each processed data block moves through its processing pipeline in step with correspondingly moving key, auxiliary data, and instructions in parallel pipelines. | 10-20-2011 |
20110261957 | Technique for Handling Media Content to be Accessible via Multiple Media Tracks - A technique for protecting media content that is to be accessible via multiple media tracks of a media file is provided. A method implementation of this technique comprises the step of providing a set of one or more first layer data items that are to be accessible via a first media track, with each first layer data item being decodable to be rendered as a portion of the media content. Moreover, a set of one or more second layer data items is provided that are to be accessible via at least one second media track, with each second layer data item being decodable to be rendered in combination with at least one decoded first layer data item as an enhanced portion of the media content. With each second layer data item a track reference index is associated that allows to identify the first media track via which the first layer data items are accessible. Then, in a next step, the second layer data items and the associated track reference indices (plus optionally the first layer data items) are encrypted for being transmitted to a content recipient. | 10-27-2011 |
20120020475 | MECHANISM FOR PARTIAL ENCRYPTION OF DATA STREAMS - Embodiments of the invention are generally directed to partial encryption of data stream. An embodiment of a method includes receiving, at a data transmitting device, a data stream having content including one or more of audio content, video content, and control content, determining one or more content that are to be encrypted. The method further includes partially encrypting the data stream by encrypting the one or more content, and leaving other content unencrypted, and transmitting, from the data transmitting device, the partially encrypted data stream to a data receiving device. | 01-26-2012 |
20120027203 | INTERFACE CIRCUIT - A decoder extracts a synchronization signal from a data stream received via an active port. Synchronization signal generators are arranged for respective ports, and each is configured such that, when it receives a synchronization signal for the corresponding port from the decoder, it cyclically generates a replica of the synchronization signal for the port. When the synchronization signal received from the decoder or the synchronization signal generator is asserted, a first calculation module calculates authentication data. When the synchronization signal for the active port is asserted, a second calculation module generates a decipher code used to decipher the data stream input to the active port, using data obtained by the calculation processing of the first calculation module. | 02-02-2012 |
20120027204 | BANDWIDTH EFFICIENT METHOD AND SYSTEM FOR OBSCURING THE EXISTENCE OF ENCRYPTION IN A COMMUNICATIONS CHANNEL - A system, method, and network interface obscures the existence of data encryption in a communication network is provided. A set of characters is generated by using a set of encryption keys as an input to a pseudo-random function. Each character corresponds to an index value. The encrypted data is divided into a plurality of parts. Each part is sectioned into a plurality of groups. Each group of the plurality of groups is encoded by mapping the group to a character in the set of characters according to its corresponding index value. The mapped characters are transmitted through the communication network. | 02-02-2012 |
20120033806 | METHOD OF ENCRYPTING A DATA STREAM - The disclosure relates to a method of encrypting or of decrypting a binary data stream by generating a binary encryption stream and combining by a reversible logic operation each bit of the binary data stream with a bit of the binary encryption stream, the generation of the binary encryption stream including generating an input block by applying a cryptographic function using a secret key to a data block, and generating the binary encryption stream from the input block by combining the bits of the input block with each other by logic operations in a manner so as to prevent the input block from being determined from the binary encryption stream. | 02-09-2012 |
20120057697 | SECURITY OF A MULTIMEDIA STREAM - A method including receiving encrypted multimedia information of a multimedia broadcast multicast service streaming session, wherein the multimedia information is encrypted using an encryption key. An indication allowing to switch the receiving of the encrypted multimedia information to a peer-to-peer streaming session is received and receiving of the encrypted multimedia information from the multimedia broadcast multicast service streaming session to the peer-to-peer streaming session is switched. Encrypted multimedia information of the peer-to-peer streaming session is received. | 03-08-2012 |
20120114118 | KEY ROTATION IN LIVE ADAPTIVE STREAMING - Key rotation required for adaptive streaming of data is described. Metadata is added or provides extensions to two file formats, namely, ISO-based FF (also known as MP4 FF) and MPEG2-TS. A new Sample Group Type box in ISO-based FF is introduced to support key rotation required in adaptive streaming use cases, especially for live adaptive streaming. A mapping from MPEG2-TS FF to ISO-based FF is also enabled with the introduction of this new Sample Group Type by embedding metadata required for key rotation. Key rotation needed for live adaptive streaming in a broadcast environment is enabled. | 05-10-2012 |
20120128151 | Authentication of Data Streams - The present invention relates to techniques for authentication of data streams. Specifically, the invention relates to the insertion of identifiers into a data stream, such as a Dolby Pulse, AAC or HE AAC bitstream, and the authentication and verification of the data stream based on such identifiers. A method and system for encoding a data stream comprising a plurality of data frames is described. The method comprises the step of generating a cryptographic value of a number N of successive data frames and configuration information, wherein the configuration information comprises information for rendering the data stream. The method then inserts the cryptographic value into the data stream subsequent to the N successive data frames. | 05-24-2012 |
20120189118 | METHOD AND SYSTEM FOR ENCRYPTION OF A DATASTREAM - A method for an encryption of a data stream is provided. The method includes: providing the data stream, providing at least two first random number generators having a first cryptographic strength, wherein each of the at least two first random number generators is switchable between states including a clocked state and a working state, and providing a second random number generator having a second cryptographic strength, wherein the second cryptographic strength is higher than the cryptographic strength. The method further includes switching the states of the at least two first random number generators using an output of the second random number generator and using an XOR-function for combining the data stream with an output of one of the at least two first random number generators, which is in the working state, such that a ciphered data stream is created. | 07-26-2012 |
20130077780 | METHOD AND APPARATUS FOR FACILITATING EFFICIENT AUTHENTICATED ENCRYPTION - In some embodiments, a key shared between communicating parties is mapped to a key variant using a block cipher. The key variant is mapped into a sequence of basis offsets using shifts and conditional xors. A nonce-dependent base offset is formed, and a sequence of offsets is constructed by starting with the base offset and then xoring, for each offset, an appropriate basis offset. Each message block is combined with a corresponding offset, enciphered, and then combined again with the offset, yielding a ciphertext block. The message fragment is xored with a computed pad to give a ciphertext fragment. A checksum is formed using the message blocks, the message fragment, and the pad, and is then combined with an offset and enciphered to yield a tag. The encrypted message includes the ciphertext blocks, the ciphertext fragment, and the tag. | 03-28-2013 |
20130129085 | System And Method For Decryption Of Content Including Partial-Block Discard - Embodiments may include receiving a protected version of content that includes multiple encryption chains each including encrypted blocks of content. The protected version of content may include one or more initialization vectors for decrypting the encrypted blocks of content and discard information that specifies non-content portions of one or more data blocks to be discarded after decryption. Embodiments may also include performing chained decryption on the multiple encryption chains using the initialization vectors specified by the decryption information. The chained decryption may result in a sequence of decrypted data blocks. Embodiments may also include, based on the discard information, locating and removing the non-content portions of one or more data blocks in the sequence of decrypted data blocks. Embodiments may also include generating the protected version of content. Embodiments may also include performing any of the aforesaid techniques on one or more computers. | 05-23-2013 |
20130182837 | METHOD AND APPARATUS FOR ALLOWING SOFTWARE ACCESS TO NAVIGATIONAL DATA IN A DECRYPTED MEDIA STREAM WHILE PROTECTING STREAM PAYLOADS - A method, apparatus and system enabling software access to navigational data in a decrypted media stream while protecting stream payloads. In one embodiment, a filter may route an encrypted content stream and associated information to a secure partition having a trusted computing component for decryption. Upon decryption, the trusted computing component may store the decrypted payload of the content in a secure storage location accessible to the trusted computing component. Thereafter, the decrypted navigational header information of the content may be used to navigate to the decrypted content via a trusted component such as a trusted rendering unit in the secure partition. | 07-18-2013 |
20140192974 | SYSTEM AND METHOD FOR CRYPTOGRAPHIC PROCESSING IN A TIME WINDOW - A method is disclosed for providing first data and a first secret key to a cipher processor for ciphering. The first data is ciphered in accordance with a first cipher process and the first secret key to provide output data. Before ciphering of the first data, extra data is inserted within the cipher processor for ciphering in accordance with at least a portion of said first cipher process. The extra data is inserted within a sequence of cipher processor operations for obfuscating the output data. | 07-10-2014 |
20140192975 | SYSTEM AND METHOD FOR MULTICHANNEL CRYPTOGRAPHIC PROCESSING - A processor is disclosed for ciphering of first data. The processor includes a key store and a first data store. In use the processor for ciphering the first data in accordance with a first cipher process and a first secret key to provide output data, during ciphering of the first data inserting within the cipher processor other data for ciphering in accordance with at least a portion of the first cipher process, the other data inserted within a sequence of cipher processor operations and scheduled for obfuscating the output data. | 07-10-2014 |
20150043730 | STREAMING ONE TIME PAD CIPHER USING ROTATING PORTS FOR DATA ENCRYPTION - A streaming one time pad cipher using rotating ports for data encryption uses a One Time Pad (OTP) and an Exclusive Or (XOR) (or other cipher) with a public key channel to encrypt and decrypt OTP data. There is no method in cryptography to thwart the OTP/XOR method and it is proven impossible to crack. The method also rotates the ports of the channels periodically to increase communication obfuscation. Through pre-fetching and cache of OTP data, latency increases from encryption are kept to an absolute minimum as the XOR for encryption and decryption is done with a minimal number of instructions. | 02-12-2015 |
20150043731 | DATA PROTECTION METHOD AND APPARATUS - A data protection method and apparatus that can protect data through encryption using a Boolean function is provided. The data protection method includes applying an inverse affine transformation to data to be encrypted using a Boolean function; applying round operations of an Advanced Encryption Standard (AES) cryptographic algorithm to the inverse-affine transformed data; and producing ciphertext data by applying an affine transformation to the result of the round operations. | 02-12-2015 |
20150372820 | METADATA TRANSCODING - The present document relates to transcoding of metadata, and in particular to a method and system for transcoding metadata with reduced computational complexity. A transcoder configured to transcode an inbound bitstream comprising an inbound content frame and an associated inbound metadata frame into an outbound bitstream comprising an outbound content frame and an associated outbound metadata frame is described. The inbound content frame is indicative of a signal encoded according to a first codec system and the outbound content frame is indicative of the signal encoded according to a second codec system. The transcoder is configured to identify an inbound block of metadata from the inbound metadata frame, the inbound block of metadata associated with an inbound descriptor indicative of one or more properties of metadata comprised within the inbound block of metadata, and to generate the outbound metadata frame from the inbound metadata frame based on the inbound descriptor. | 12-24-2015 |
380043000 | Key sequence signal combined with data signal | 14 |
20090041236 | Cryptographic primitives, error coding, and pseudo-random number improvement methods using quasigroups - Stream ciphers, including synchronous stream ciphers, self-synchronizing stream ciphers, and totally asynchronous stream ciphers, employ a working key and a quasigroup transformation, where the quasigroup used is based on an initial secret key. Error-correction and pseudo-random number generation improver methods also employ quasigroup transformations. | 02-12-2009 |
20090052662 | METHOD AND SYSTEM FOR A RECURSIVE SECURITY PROTOCOL FOR DIGITAL COPYRIGHT CONTROL - Systems and methods are described which utilize a recursive security protocol for the protection of digital data. These may include encrypting a bit stream with a first encryption algorithm and associating a first decryption algorithm with the encrypted bit stream. The resulting bit stream may then be encrypted with a second encryption algorithm to yield a second bit stream. This second bit stream is then associated with a second decryption algorithm. This second bit stream can then be decrypted by an intended recipient using associated keys. | 02-26-2009 |
20100020963 | Method and Apparatus for Descrambling Content - In accordance with one embodiment, a method for securing control words is provided. The method includes receiving scrambled digital content in a descrambler integrated circuit. The method further includes receiving an encrypted control word in the descrambler integrated circuit, decrypting the encrypted control word using a key stored in a register circuit of the descrambler integrated circuit, and descrambling the scrambled digital content in the descrambler integrated circuit using the decrypted control word. | 01-28-2010 |
20100067688 | Method and system for encoding multimedia content based on secure coding schemes using stream cipher - Described herein are various embodiments of a coding technique that utilize a stream cipher for switching between first and second coding conventions for encoding a symbol sequence. The first coding convention specifies a first mapping between a symbol and a first codeword and the second coding convention specified a second mapping between the symbol and a second codeword. According to the invention, a key generated by the stream cipher is used to selected one of the first and second coding convention and the mapping of the selected coding convention is then utilized for encoding the symbol. | 03-18-2010 |
20100119060 | RECEIVING APPARATUS AND METHOD FOR CONTROLLING THE SAME - The present invention provides a receiving apparatus including a device key generating unit which generates a device key, a work key generating unit which generates a work key, a device key storing unit which sequentially stores the generated device key, every time the device key is updated, and a recording unit which stores a digital broadcast signal in a transport stream format, wherein in a case where the device key generating unit cannot generate, from the stored transport stream, a device key necessary for descrambling the stored transport stream when the stored transport stream is to be reproduced, the work key generating unit decrypts an encrypted work key that is obtained from the stored transport stream, using the device key stored in the device key storing unit, and generates a work key. | 05-13-2010 |
20100142703 | METHOD, DEVICE AND SYSTEM FOR PROCESSING STREAMING MEDIA CONTENTS - A method for processing streaming media contents is provided. The method includes: encrypting the streaming media contents and generating corresponding Entitlement Control Message (ECM) and Entitlement Management Message (EMM); and transmitting the encrypted streaming media contents, the ECM and the EMM to a terminal device, in which each I frame of the encrypted streaming media contents is segmented into multiple data packets for transmission and the ECM is transmitted during the transmission of the multiple data packets. A conditional access system and a system for processing streaming media contents are also provided. Through the above technical solutions, fuzzy screen phenomena in processing streaming media contents may be eliminated, channel-switching time or dark screen time may be reduced, and thus the user's experience may be improved. | 06-10-2010 |
20100239086 | SYSTEM AND METHOD FOR SECURE TRANSMISSION OF MEDIA CONTENT - A system that incorporates teachings of the present disclosure may include, for example, a gateway comprising a controller to receive from a communication device a request for media content, receive a key and a record associated with the communications device from an interactive Television (iTV) system, wherein the record comprises a list of entitled media content, determine whether the requested media content is in the list of entitled media content, retrieve the requested media content from the iTV system when the requested media content is determined to be in the list of entitled media content, encrypt the retrieved media content utilizing the key, and transmit the encrypted media content to the communications device. Other embodiments are disclosed. | 09-23-2010 |
20100310068 | METHOD FOR MONITORING EXECUTION OF DATA PROCESSING PROGRAM INSTRUCTIONS IN A SECURITY MODULE - A method for monitoring execution of a sequence of data processing program instructions in a security module associated to a multimedia unit connected to a managing center supplying control messages authorizing access to broadcast data streams. The security module comprises a processor for executing the instructions, a memory, and a monitoring module for analyzing the instructions before execution by the processor. The managing center comprises a security module emulator generating reference data sets by executing a sequence of instructions induced by data of a given control message in the program. The reference data sets are appended to control messages sent to the security module. The monitoring module analyzes a sequence of program instructions for determining a check data set which is compared with a reference data set received from the control messages. When the reference and check data sets match, the program continues executing. Otherwise, further control message processing stops. | 12-09-2010 |
20110182424 | SEQUENCING ENCODED DATA SLICES - A method begins by a processing module receiving data segments of a data stream to produce received data segments. The method continues with the processing module encrypting a data segment of the received data segments to produce an encrypted data segment and dispersed storage error encoding the encrypted data segment to produce a set of encoded data slices in order of receiving the data segments. The method continues with the processing module buffering encoded data slices of sets of the encoded data slices unit to produce buffered encoded data slices and comparing a number of buffered encoded data slices to a threshold. The method continues with the processing module outputting the encoded data slices of the buffered encoded data slices based on a pseudo-random sequencing order when the number of buffered encoded data slices compares favorably to the threshold. | 07-28-2011 |
20110200186 | Method of cipher block chaining using elliptic curve cryptography - The method of cipher block chaining using elliptic curve cryptography allows for the encryption of messages through elliptic curve cryptography and, particularly, with the performance of cipher block chaining utilizing both the elliptic curve and its twist, regardless of whether the elliptic curve and its twist are isomorphic with respect to one another. The method of performing elliptic curve cryptography is based on the elliptic curve discrete logarithm problem. It is well known that an elliptic curve discrete logarithm problem is a computationally “difficult” or “hard” problem. | 08-18-2011 |
20110200187 | Elliptic polynomial cryptography with secret key embedding - Elliptic polynomial cryptography with secret key embedding is a method that allows for the encryption of messages through elliptic polynomial cryptography and, particularly, with the embedding of secret keys in the message bit string. The method of performing elliptic polynomial cryptography is based on the elliptic polynomial discrete logarithm problem. It is well known that an elliptic polynomial discrete logarithm problem is a computationally “difficult” or “hard” problem. | 08-18-2011 |
20110200188 | Method of performing cipher block chaining using elliptic polynomial cryptography - The method of performing cipher block chaining using elliptic polynomial cryptography allows for the encryption of messages through elliptic polynomial cryptography and, particularly, with the utilization of cipher block chaining based upon both the elliptic polynomial and its twist, regardless of whether the elliptic polynomial and its twist are isomorphic with respect to one another. The method of performing cipher block chaining is based on the elliptic polynomial discrete logarithm problem. It is well known that an elliptic polynomial discrete logarithm problem is a computationally “difficult” or “hard” problem. | 08-18-2011 |
20130114807 | INFORMATION SHARING METHOD AND MODULE, DEVICE AND ELECTRONIC PRODUCT USING THE SAME - An exemplary information sharing method is provided. The information sharing method includes a step of: broadcasting predetermined sharing information to a user terminal(s) within a preset region on a client side in response to a sharing request while an information sharing function is enable. An information sharing module, device and electronic apparatus using the same are also provided. | 05-09-2013 |
20150339252 | Embedded Extensible Instrumentation Bus - A method of configuring a controller for communication with at least one instrument module includes electrically connecting an interface of the at least one instrument module to an interface of the controller, receiving with the controller an identification signal from the interface of the at least one instrument module through a portion of the interface of the controller, and executing with the controller a configuration program that corresponds to the identification signal to enable communication between the at least one instrument module and the controller. | 11-26-2015 |