WO2008001365A2 - Procédé, dispositif et système de communication radio chiffrée - Google Patents
Procédé, dispositif et système de communication radio chiffrée Download PDFInfo
- Publication number
- WO2008001365A2 WO2008001365A2 PCT/IL2007/000780 IL2007000780W WO2008001365A2 WO 2008001365 A2 WO2008001365 A2 WO 2008001365A2 IL 2007000780 W IL2007000780 W IL 2007000780W WO 2008001365 A2 WO2008001365 A2 WO 2008001365A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- encrypted
- encryption
- streams
- transmission
- decryption
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/16—Analogue secrecy systems; Analogue subscription systems
- H04N7/167—Systems rendering the television signal unintelligible and subsequently intelligible
- H04N7/1675—Providing digital key or authorisation information for generation or regeneration of the scrambling sequence
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K1/00—Secret communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L27/00—Modulated-carrier systems
- H04L27/32—Carrier systems characterised by combinations of two or more of the types covered by groups H04L27/02, H04L27/10, H04L27/18 or H04L27/26
- H04L27/34—Amplitude- and phase-modulated carrier systems, e.g. quadrature-amplitude modulated carrier systems
- H04L27/3488—Multiresolution systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
- H04N21/234—Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
- H04N21/2343—Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving reformatting operations of video signals for distribution or compliance with end-user requests or end-user device requirements
- H04N21/234327—Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving reformatting operations of video signals for distribution or compliance with end-user requests or end-user device requirements by decomposing into layers, e.g. base layer and one or more enhancement layers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
- H04N21/234—Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
- H04N21/2347—Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving video stream encryption
- H04N21/23476—Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving video stream encryption by partially encrypting, e.g. encrypting the ending portion of a movie
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
- H04N21/238—Interfacing the downstream path of the transmission network, e.g. adapting the transmission rate of a video stream to network bandwidth; Processing of multiplex streams
- H04N21/2383—Channel coding or modulation of digital bit-stream, e.g. QPSK modulation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
- H04N21/238—Interfacing the downstream path of the transmission network, e.g. adapting the transmission rate of a video stream to network bandwidth; Processing of multiplex streams
- H04N21/2385—Channel allocation; Bandwidth allocation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/25—Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
- H04N21/266—Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel
- H04N21/2662—Controlling the complexity of the video stream, e.g. by scaling the resolution or bitrate of the video stream based on the client capabilities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/438—Interfacing the downstream path of the transmission network originating from a server, e.g. retrieving encoded video stream packets from an IP network
- H04N21/4382—Demodulation or channel decoding, e.g. QPSK demodulation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/44—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
- H04N21/4405—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream decryption
- H04N21/44055—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream decryption by partially decrypting, e.g. decrypting a video stream that has been partially encrypted
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/60—Network structure or processes for video distribution between server and client or between remote clients; Control signalling between clients, server and network components; Transmission of management data between server and client, e.g. sending from server to client commands for recording incoming content stream; Communication details between server and client
- H04N21/63—Control signaling related to video distribution between client, server and network components; Network processes for video distribution between server and clients or between remote clients, e.g. transmitting basic layer and enhancement layers over different transmission paths, setting up a peer-to-peer communication via Internet between remote STB's; Communication protocols; Addressing
- H04N21/631—Multimode Transmission, e.g. transmitting basic layers and enhancement layers of the content over different transmission paths or transmitting with different error corrections, different keys or with different transmission protocols
Definitions
- Some embodiments relate generally to the filed of wireless communication and, more particularly, to encrypted wireless communication.
- Wireless communication has rapidly evolved over the past decades. Even today, when high performance and high bandwidth wireless communication equipment is made available there is demand for even higher performance at a higher bandwidth. As many wireless communication systems are susceptible to intrusion, it may be desirable to protect the wireless transmission.
- Some demonstrative embodiments of the invention include devices, systems and/or methods of encrypted wireless communication.
- Some demonstrative embodiments of the invention include a wireless transmitter to generate an encrypted wireless transmission corresponding to an input signal.
- the transmission may include at least first and second encrypted streams of symbols encrypted according to at least first and second different encryption schemes, respectively.
- the first and second encrypted streams may include symbols of first and second different constellations, respectively.
- the first and second constellations may include a fine constellation, and a coarse constellation, respectively.
- the first and second encrypted streams may represent a plurality of transformation coefficients corresponding to the input signal.
- the transmitter may include an encryptor to generate the first and second encrypted streams by encrypting first and second symbol streams representing the input signal.
- the encryptor may include an encryption code generator to generate one or more encryption codes; a first encryption module to encrypt the first symbol stream using the encryption codes according to the first encryption scheme; and a second encryption module to encrypt the second symbol stream using the encryption codes according to the second encryption scheme.
- the encryption code generator generates the encryption codes corresponding to a plurality of transmission frames.
- the transmission may include encryption information corresponding to the encryption codes:
- the encryption information may include one or more encryption keys.
- the transmitter may include a coefficient generator to apply a transformation to the input signal to generate a plurality of transformation coefficients representing the input signal; and a mapper to map the transformation coefficients to the first and second symbol streams.
- the input signal may include a video signal, e.g., a high-definition-television signal.
- Some demonstrative embodiments of the invention include a wireless receiver to receive an encrypted wireless transmission representing an input signal and to decrypt the transmission into an output signal corresponding to the input signal.
- the transmission may include at least first and second encrypted streams of symbols encrypted according to at least first and second different encryption schemes, respectively.
- the first and second encrypted streams may include symbols of first and second different constellations, respectively.
- the first and second constellations may include a fine constellation, and a coarse constellation, respectively.
- the first and second encrypted streams may represent a plurality of transformation coefficients, and the output signal may be based on the plurality of transformation coefficients.
- the r4eceiver may include a decryptor to decrypt the first and second encrypted streams into first and second decrypted symbol streams.
- the decryptor may include an encryption code generator to generate one or more decryption codes; a first decryption module to decrypt the first encrypted stream using the decryption codes according to a first decryption scheme corresponding to the first encryption scheme; and a second decryption module to decrypt the second encrypted stream using the decryption codes according to a second decryption scheme corresponding to the second encryption scheme.
- the decryption code generator may generate the decryption codes corresponding to a plurality of received transmission frames.
- the received transmission may include encryption information.
- the decryption code generator may generate the decryption codes based on the encryption information.
- the encryption information may include one or more encryption keys used to encrypt the first and second encrypted streams.
- the output signal may include a video signal, e.g., a high-definition-television signal.
- Some demonstrative embodiments include a wireless communication system including a source module to generate a signal to be transmitted to a destination module; and a wireless transmitter to generate an encrypted wireless transmission corresponding to the signal.
- the transmission may include at least first and second encrypted streams of symbols encrypted according to at least first and second different encryption schemes, respectively.
- the source module may include a video source, and the signal may include a video signal.
- the system may include a receiver to receive the encrypted wireless transmission and to decrypt the transmission into an output signal.
- Some demonstrative embodiments of the invention include a method of encrypted wireless communication, the method including transmitting an encrypted wireless transmission corresponding to an input signal.
- the transmission may include at least first and second encrypted streams of symbols encrypted according to at least first and second different encryption schemes, respectively.
- Some demonstrative embodiments of the invention include a method of encrypted wireless communication, the method including receiving an encrypted wireless transmission representing an input signal; and decrypting the transmission into a decrypted output signal corresponding to the input signal.
- the transmission may include at least first and second encrypted streams of symbols encrypted according to at least first and second different encryption schemes, respectively.
- FIG. 1 is a schematic illustration of a wireless communication system, in accordance with some demonstrative embodiments of the invention.
- Fig. 2 is a schematic illustration of a wireless transmitter, in accordance with some demonstrative embodiments of the invention;
- FIG. 3 is a schematic illustration of a symbol mapping scheme, in accordance with some demonstrative embodiments of the invention.
- FIG. 4 is a schematic illustration of a wireless receiver, in accordance with some demonstrative embodiments of the invention.
- FIG. 5 is a schematic flow-chart illustration of a method of synchronizing encryption information, in accordance with some demonstrative embodiments of the invention.
- FIG. 6 is a schematic flow-chart illustration of a method of generating an encrypted wireless transmission, in accordance with some demonstrative embodiments of the invention.
- Fig. 1 schematically illustrates a wireless communication system 100, in accordance with some demonstrative embodiments of the invention.
- system 100 may include a wireless transmitter 106 to transmit an encrypted wireless transmission 112 based on input signals 104 received from a source module 102.
- transmitter 106 may a generate an encrypted wireless transmission including at least first and second encrypted streams of symbols encrypted according to at least first and second different encryption schemes, respectively, as described below.
- Source module 102 may include any suitable software and/or hardware to generate signals 104, e.g., as described below.
- encrypted transmission 112 may include symbols of a plurality of streams encrypted according to a plurality of encryption schemes, as described in detail below.
- encrypted transmission 112 may include symbols of first and second streams encrypted according to first and second encryption schemes, e.g., as described in detail below.
- the first and second streams may include symbols of first and second different constellations, respectively.
- the first and second streams may include symbols of a coarse constellation and a fine constellation, respectively, e.g., as described below.
- transmitter 106 may include an encryptor 114 to generate a plurality of encrypted streams, e.g., encrypted streams 116 and 118, by encrypting a plurality of respective streams, e.g., streams 136 and 138, in accordance with a plurality of encryption schemes.
- an encryptor 114 to generate a plurality of encrypted streams, e.g., encrypted streams 116 and 118, by encrypting a plurality of respective streams, e.g., streams 136 and 138, in accordance with a plurality of encryption schemes.
- encrypted streams 116 and 118 may include symbols of two respective constellation types.
- encrypted stream 116 may include symbols of a first constellation, e.g., a fine constellation
- encrypted stream 118 may include symbols of a second constellation, e.g., a coarse constellation, as described in detail below.
- streams 136 and 138 may represent at least part of input signals 104.
- transmitter 106 may include a mapper 140 to map one or more values, e.g., transformation coefficients, corresponding to signals 104 to streams 136 and 138, e.g., according to the first and second constellations.
- stream 136 may include symbols of the first constellation
- stream 138 may include symbols of the second constellation, e.g., as described below.
- transmitter 106 may include at least one antenna to transmit encrypted transmission 112 including the symbols of the plurality of encrypted streams.
- Transmitter 106 may implement any suitable transmission method and/or configuration to transmit transmission 112.
- transmitter 106 may generate transmission 112 according to an Orthogonal-Division-Frequency-Multiplexing (OFDM) transmission scheme.
- OFDM Orthogonal-Division-Frequency-Multiplexing
- transmitter 106 may generate transmission 112 according to any other suitable transmission scheme.
- system 100 may also include a wireless receiver 124 having at least one antenna 120 to receive encrypted transmission 112.
- Receiver 124 may decrypt encrypted transmission 112, and generate output signals 132, e.g., corresponding to signals 104.
- Signals 132 may be provided to a destination module 134, which may include any suitable software and/or hardware to handle signals 132 in any suitable manner, e.g., as described below.
- receiver 124 may include a decryptor 126 to decrypt a plurality of received encrypted streams corresponding to transmission 112 into a plurality of respective decrypted streams.
- decryptor 126 may include a decryptor 126 to decrypt a plurality of received encrypted streams corresponding to transmission 112 into a plurality of respective decrypted streams.
- stream 128 may include symbols of the first constellation
- stream 130 may include symbols of the second constellation, e.g., as described below.
- signals 104 may include video signals in any suitable video format.
- signals 104 may include HDTV video signals, for example, uncompressed HDTV signals, e.g., in a Digital Video Interface (DVI) format, a High Definition Multimedia Interface (HDMI) format, or any other suitable video format.
- source module 102 may include any suitable video source, for example, a set-top box, a computer, a game console, a Video Cassette Recorder (VCR), a Digital Video Disc (DVD), and the like.
- Destination module 134 may include, for example, a display or screen, e.g., a flat screen display, a Liquid Crystal Display (LCD), a plasma display, a television, and the like. Accordingly, transmission 112 may include, for example, a HDTV video transmission, which may include, for example, a modem-frame, e.g., contained in 2400 OFDM frames, each OFDM frame containing, for example, 128 symbols.
- signals 104 may include any other suitable signals, and/or source 102 and/or destination 134 may include any other modules. In one example, signals 104 may include audio, voice, control and/or data signals, e.g., as described below.
- antennas 108 and/or 120 may include but are not limited to internal antenna, dipole antenna, omni-directional antenna, a monopole antenna, an end fed antenna, a circularly polarized antenna, a micro-strip antenna, a diversity antenna and the like.
- Fig. 2 schematically illustrates a wireless transmitter 200, in accordance with some demonstrative embodiments of the invention.
- transmitter 200 may perform the functionality of transmitter 106 (Fig. 1).
- transmitter 200 may include an encryptor 222 to generate a plurality of encrypted streams, e.g., including streams 220, 224, 226 and/or 228, by encrypting a plurality of respective streams, e.g., including streams 210, 212, 214, and/or 216, in accordance with a plurality of encryption schemes, e.g., as described in detail below.
- an encryptor 222 to generate a plurality of encrypted streams, e.g., including streams 220, 224, 226 and/or 228, by encrypting a plurality of respective streams, e.g., including streams 210, 212, 214, and/or 216, in accordance with a plurality of encryption schemes, e.g., as described in detail below.
- encryptor 222 may perform the functionality of encryptor 114 (Fig. 1).
- ericryptor 222 may include a plurality of encryption modules to implement the plurality of encryption schemes, respectively.
- Encryptor 222 may include, for example, a first encryption module 218 to implement a first encryption scheme, and a second encryption module 236 to implement a second encryption scheme.
- encryption module 218 may encrypt stream 210 into encrypted stream 220 using the first encryption scheme; and encryption module 236 may encrypt streams 212, 214, and/or 216 into encrypted streams 224, 226, and/or 228, respectively, using the second encryption scheme.
- streams 210 and 212 may include symbols of first and second transmission constellations, respectively, e.g., as described in detail below.
- encrypted stream 220 may include encrypted symbols of the first constellation encrypted according to the first encryption scheme
- encrypted stream 224 may include encrypted streams of the second constellation encrypted according to the second encryption scheme.
- streams 210 and 212 may include symbols representing an input video signal 204.
- stream 210 may include fine constellation symbols corresponding to signal 204
- stream 212 may include coarse constellation symbols corresponding to signal 204, as described below.
- transmitter 200 may also include a coefficient generator 202 to generate a plurality of transformation coefficients 206 corresponding to video signal 204.
- coefficient generator 202 may generate coefficients 206 by applying a de-correlating transformation, e.g., a Discrete-Cosine-Transformation (DCT), to signals 204, e.g., as described in US Patent application 11/551,641, entitled “Apparatus and method for uncompressed, wireless transmission of video", filed October 20, 2006, and published May 3, 2007, as US Patent Application Publication US 2007-0098063 (“the '641 Application”), the entire disclosure of which is incorporated herein by reference.
- DCT Discrete-Cosine-Transformation
- coefficient generator 202 may include a transform unit (not shown) to perform the de-correlating transformation on component data, e.g., in the format Y-Cr-Cb, representing pixels of signals 204, e.g., as described in the '641 Application.
- Coefficient generator 202 may optionally include a color converter (not shown) to convert color components of signal 204 into the component data, e.g., as described in the '641 Application.
- transmitter 200 may also include a mapper 208 to map transformation coefficients 206 to streams 210 and
- mapper 20,8 may map Most Significant Bits (MSBs) and Least Significant Bits (LSBs) of coefficients 206 to streams 210 and 212 based on any suitable mapping criterion.
- MSBs Most Significant Bits
- LSBs Least Significant Bits
- stream 210 may include values of fine constellation symbols
- stream 212 may include values of coarse constellation symbols, e.g., as described in the '641 Application.
- mapper 208 may map the MSBs representing quantized values of a first set of one or more of coefficients 206, e.g., including one or more low frequency coefficients, to stream 212.
- Mapper 208 may map to stream the LSBs representing quantization errors of the first set of coefficients, and/or values of a second set of one or more of coefficients 206, e.g., including high frequency coefficients, as described in the '641 Application.
- coefficients 206 are represented by 11 -bit values.
- mapper 208 may map three MSBs of each of a plurality of low frequency, coefficients to a respective coarse-constellation symbol of stream 212; and map eight LSBs of each of the plurality of low frequency coefficients, together with values of a plurality of high- frequency coefficients to fine constellation symbols of stream 210.
- a fine constellation symbol of stream 210 may have real and imaginary components, each representing, for example, a LSB component of a coefficient of coefficients 206.
- a plurality of coarse constellation symbols of stream 212 may represent, for example, MSB components of a plurality of coefficients 206, respectively.
- streams 214 and 216 may include any suitable signals, information and/or data.
- stream 214 may include audio signals, which may be received, for example, from an audio coder (not shown).
- stream 216 may include control signals, which may be received, for example, from a modem controller (not shown).
- encryption module 236 may encrypt the audio signals of stream 214 a ⁇ d/or the control signals of stream 216 to generate stream 226 including encrypted audio signals, and stream 228 including encrypted control signals in accordance with the second encrypting scheme.
- transmitter 238 may also include a transmission (Tx) module 238 to transmit an encrypted wireless transmission including streams 220, 224, 226, and/or 228 over a wireless link via at least one antenna 240.
- Transmission module 238 may include any suitable wireless transmission module, for example, a transmission module able to transmit symbols of two different constellations, e.g., the fine constellation symbols of stream 220 and the coarse constellation symbols of stream 224.
- Tx module 238 may include a framer 239 to generate OFDM frames including the fine constellation symbols of stream 220, the coarse constellation symbols of stream 224, the audio signals of stream 226, the control signals of stream 228 and/or any other signals, for example, pilot, timing, frequency tracking, and/or channel tracking signals, e.g., as described in the '641 Application.
- encryption modules 218 and 236 may use one or more encryption codes 232 to encrypt streams 210, 212, 214 and/or 216.
- encryptor 222 may include at least one Encryption Code Generator (ECG) 230 to generate encryption codes 232, e.g., as described in detail below.
- ECG Encryption Code Generator
- encryption codes 232 may include any suitable random or pseudo-random values, e.g., represented by a sequence of bits.
- ECG 230 may generate encryption codes 232 in accordance with any suitable block cipher technique, method or scheme, e.g., as defined by the Data Encryption Standard (DES), the Advanced Encryption Standard (AES), and the like.
- DES Data Encryption Standard
- AES Advanced Encryption Standard
- ECG 230 may generate encryption codes 232 in synchronization with encryption codes implemented by a receiver intended to receive the transmission transmitted by transmitter 200 ("the intended receiver"), e.g., as described in detail below with reference to Figs. 4 and/or 5.
- ECG 230 may generate encryption codes 232 based on a plurality of internal keys 250, a unit key 252, and an initial value 234. Keys 250 and 252, and initial value 234 may include any suitable values, e.g., represented by a sequence of bits. In one example, ECG 230 may maintain internal keys 250 in the form of a table.
- transmitter 200 may coordinate the value of unit key 252 with the intended receiver using any suitable key exchange mechanism, e.g., in accordance with the Rivest-Shamir-Adleman (RSA) public key cipher, the Diffie-Hellman key exchange protocol, and the like.
- RSA Rivest-Shamir-Adleman
- EGC 230 may generate encryption code 232 by encrypting initial value 234 using an encryption key resulting from a combination of unit key 252 and a selected internal key of internal keys 252. Encryption code 232 may be fed back as an input to ECG 230, such that additional codes 232 may be generated using a previous encryption code, e.g., instead of initial value 234. ECG 230 may select the selected internal key based on any suitable key selection criterion. For example, ECG 230 may re-select the internal key after a predefined number of frames, as described below.
- an encryptor e.g., encryptor 222, including an ECG to generate encryption codes, e.g., encryption codes 232, to be provided to plurality encryption modules, e.g., encryption modules 218 and 236, in other embodiments of the invention the encryptor may include any other suitable configuration.
- the encryptor may include a plurality of ECGs to generate the encryption codes of the plurality of encryption modules.
- at least first and second ECGs may generate at least first and second respective pluralities of encryption codes to be provided to the encryption modules.
- encryption module 218 may implement a first encryption scheme, e.g., to encrypt the fine constellation symbols of stream 210, and encryption module 236 may implement a second encryption scheme different than the first encryption scheme, e.g., to encrypt the coarse constellation symbols of stream 212, as described in detail below.
- the encryption scheme implemented by encryption module 236 to encrypt streams 212, 214 and/or 216 may include, for example, performing a logical operation on streams 212, 214, and/or 216 using encryption code 232.
- encryption module 236 may perform a logical Boolean operator, e.g., an Exclusive-OR (XOR) operation, between encryption code 232 and each of streams 212, 214 and/or 216.
- XOR Exclusive-OR
- the encryption scheme implemented by encryption module 218 to encrypt stream 210 may include, for example, performing a scrambling operation to scramble an order of the symbols of stream 210.
- fine constellation symbols of stream 210 may include symbols of an OFDM scheme having real and imaginary components.
- a symbol mapping scheme of an OFDM frame 310 may include a plurality of constellation symbols having real and imaginary components of a plurality of complex values.
- symbol mapping scheme 310 may include symbols 320, e.g., including a symbol 320-k having imaginary and real components 330-Ik and 330-Q k , respectively, of a first complex value; and a symbol 320-1 having imaginary and real components 330-Ii and 230-Qi, respectively, of a second complex value.
- Some of the symbols of scheme 310 may include the fine constellation symbols of stream 210, e.g., represented by the real and imaginary components of symbols 320.
- Encryption module 218 may scramble the fine constellation symbols, for example, by applying a random or pseudo-random permutation to the symbols. For example, encoding module 218 may write chunks of a predefined number of symbols 320 into a memory or buffer in a first permutation, and reading the chunks according to a second permutation, e.g., different than the first permutation. The first and second permutations may be determined, for example, according to encryption codes 232. In some demonstrative embodiments, encryption module 218 may perform the permutations of the fine-constellation symbols between consecutive frames, e.g., a symbol can be sent in a frame succeeding or preceding a frame originally including the symbol ("the origin frame").
- the encryption scheme implemented by encryption module 218 to encrypt stream 210 may include, for example, inverting one or more of the fine-constellation symbols.
- the real or/and the imaginary components of symbols 320 may be multiplied either by -1 or +1 based, for example, on encryption codes 232.
- the encryption scheme implemented by encryption module 218 to encrypt stream 210 may include, for example, changing the phase of the complex value corresponding to the fine-constellation symbols based on encryption code 232.
- the complex value of symbols 320 may be multiplied by e! a , wherein the value of the phase ⁇ may be determined based on encryption code 232.
- the encryption scheme implemented by encryption module 218 to encrypt stream 210 may include, for example, multiplying the fine constellation symbols of stream 210 with a unitary matrix, wherein values of cells of the matrix mat be based on encryption code 232.
- encryption module 218 may apply a Hadamard matrix including values based on encryption code 232.
- encryption module 218 may determine based on encryption code 232 which cells of the Hadamard matrix should have the value "1", and which cells should have the value "-1".
- transmitter 200 may transmit, as part of the wireless transmission, encryption information corresponding to encryption code 232.
- ECG 230 may provide transmission module 238 with encryption information 269 related to encryption code 232.
- Encryption .information 269 may include one or more values to enable the intended receiver to synchronize a decryption code used to decrypt the wireless transmission with encryption code 232, e.g., as described below.
- encryption information 269 may include an Initial Value Offset (IVO), a key index, and a key index offset, e.g., as are described below.
- IVO Initial Value Offset
- key index e.g., as are described below.
- ECG 230 may use a different initial value 234, e.g., for encrypting different video frames.
- the initial value may be incremented with respect to a previous initial value, for example, according to a value of the IVO.
- ECG 230 may select the selected internal key of internal keys 250, based for example, on the value of the key index. The selection of the internal key may be performed after a number of frames defined by the key index offset.
- Transmission module 238 may include encryption information 269 as part of one or more frames of the wireless transmission.
- framer 239 may include information 269 as part of a frame header of one or more of the frames, e.g., of substantially each of the frames.
- the encryption scheme implemented by encryption module 218 to encrypt stream 210 may include any other suitable encryption scheme.
- the encryption scheme may include a combination of two or more of the encryption schemes described above.
- Some demonstrative embodiments of the invention are described above with reference to an encryptor, e.g., encryptor 222, including first and second encryption modules, e.g., encryption modules 218 and 236, to encrypt first and second streams, e.g., streams 210 and 212, of first and second respective types of signals, e.g., signals the fine constellation symbols and the coarse constellation symbols.
- the encryptor may include any other suitable configuration of a plurality of encryption modules to encrypt a plurality of streams.
- the encryptor may include a first encryption module to perform a one-bit word encryption of the fine-constellation symbols, and a second encryption module to perform a two-bit word encryption of the coarse-constellation symbols.
- Fig. 4 schematically illustrates a wireless receiver 400, in accordance with some demonstrative embodiments of the invention.
- receiver 400 may perform he functionality of receiver 124 (Fig. 1).
- receiver 400 may include a demodulator 406 to demodulate wireless signals received via a plurality of antennas, e.g., including at least one receive antenna 402.
- the received signals may include, for example, signals representing OFDM symbols, e.g., of an encrypted OFDM transmission, e.g., the encrypted transmission generated by transmitter 200 (Fig. 2).
- the received signals may include symbols encrypted according to the plurality of encryption schemes described above with reference to Fig. 2.
- demodulator 406 may demodulate the received signals into a plurality of streams, e.g., as described in the '641 Application. For example, demodulator 406 may demodulate the received signals into a first stream 410 including symbols of a first type, e.g., fine-constellation symbols; and a second stream 420 including symbols of a second type, e.g., coarse-constellation symbols. Demodulator 406 may optionally demodulate the received signals into one or more additional streams, for example, streams 413 and/or 415, including any suitable signals, information and/or data. In one example, stream 413 may include encrypted audio signals corresponding, for example, to the audio signals of stream 226 (Fig. 2); and/or stream 415 may include encrypted control signals, corresponding, for example, to the control signals of stream 228 (Fig. 2).
- stream 413 may include encrypted audio signals corresponding, for example, to the audio signals of stream 226 (Fig. 2); and/or stream 415 may include encrypted control signals,
- demodulator 406 may also extract from the received signals encryption information 408 corresponding to encryption codes used for encrypting streams 410 and 412.
- Encryption information 408 may correspond, for example, to encryption information 269 (Fig. 2).
- encryption information 408 may include the IVO, key index, and key index offset.
- demodulator 406 may extract encryption information 408 from frame headers of the received transmission, e.g., from substantially each frame header.
- receiver 400 may also include a decryptor 414 to generate a plurality of decrypted streams, e.g., streams 430, 432, 433 and/or 435, by decrypting the plurality of streams ("the encrypted streams") resulting from the received signals, e.g., streams 410, 412, 413 and/or 415, respectively, as described in detail below.
- Stream 433 may include, for example, decrypted audio signals, e.g., corresponding to audio signals 214 (Fig. 2), which may be provided, for example, to a suitable audio module (not shown).
- Stream 435 may include, for example, decrypted control signals, e.g., corresponding to control signals 216 (Fig. 2), which may be provided, for example, to a modem controller (not shown).
- decryptor 414 may perform the functionality of decryptor 126 (Fig. 1).
- decryptor 414 may include a plurality of decryption modules to decrypt the plurality of streams based on a plurality of decryption schemes.
- the plurality of decryption schemes may correspond to the plurality of encryption schemes implemented to generate the encrypted transmission, e.g., the first and second encryption streams described above with reference to Fig. 2.
- Decryptor 414 may include, for example, a first decryption module 418 to decrypt stream 410 into decrypted stream 430 using a first decryption scheme; and a second decryption module 420 to decrypt streams 412, 413 and/or 415 into decrypted streams 432, 433 and/or 435, respectively, using a second decryption scheme.
- decryption modules 418 and 420 may use one or more common decryption codes 422 to decrypt streams 410, 412, 413 and/or 415.
- decryptor 414 may include at least one Decryption Code Generator (DCG) 424 to generate decryption codes 422, e.g., as described in detail below.
- DCG Decryption Code Generator
- decryption codes 422 may include any suitable random or pseudo-random value, e.g., represented by a sequence of bits.
- DCG 424 may generate decryption codes 422 in accordance with any suitable block cipher technique, method or scheme, e.g., as defined by the DES, the AES, and the like.
- DCG 424 may generate decryption codes 422 in synchronization with encryption codes implemented, e.g., by transmitter 200 (Fig. 2), for generating the encrypted transmission, e.g., as described in detail below with reference to Fig. 5.
- DCG 424 may generate decryption codes 422 based on a plurality of internal keys 426, a unit key 428, and an initial value 416. Keys 426 and 428, and initial value 416 may include any suitable values, e.g., represented by a sequence of bits.
- DCG 424 may maintain internal keys 426 in the form of a table. Internal keys 426 may be identical, for example, to internal keys 250 (Fig. 2).
- a value of unit key 428 may match a value of a unit key implemented for generating the encrypted transmission.
- receiver 400 may coordinate the value of unit key 428 with unit key 250 (Fig. 2) of transmitter 200 (Fig. 2) using any suitable key exchange mechanism, e.g., in accordance with the RSA public key cipher, the Diff ⁇ e-Hellman key exchange protocol, and the like.
- DCG 424 may generate encryption code 422 by encrypting initial value 416 using an encryption key resulting from a combination of unit key 428 and a selected internal key of internal keys 426. Decryption code 422 may be fed back as an input to DCG 424, such that additional codes 422 may be generated using a previous decryption code, e.g., instead of initial value 416.
- DCG 424 may select the selected internal key based on any suitable key selection criterion. For example, DCG 424 may re-select the internal key after a predefined number of frames, as described below. In one example, DCG 424 may re-select the internal key based on a frame counter 429, which may count down from a value corresponding to the key index offset, e.g., as described below with reference to Fig. 5.
- the decryptor may include any other suitable configuration.
- the decryptor may include a plurality of DCGs to generate the decryption codes of the plurality of decryption modules.
- at least first and second DCGs may generate at least first and second respective pluralities of decryption codes to be provided to the decryption modules.
- decryption module 418 may implement a first decryption scheme, e.g., to decrypt stream 410, and decryption module 420 may implement a second decryption scheme different than the first decryption scheme, e.g., to decrypt streams 412, 413, and/or 415, e.g., as described in detail below.
- the decryption scheme implemented by decryption module 420 to decrypt streams 412, 413 and/or 415 may include, for example, performing a logical operation on streams 412, 413 and/or 415 using decryption code 422.
- the logical operation may correspond, for example, to the logical operation performed by encryption module 236 (Fig. 2).
- decryption module 420 may perform a logical Boolean operator, e.g., an Exclusive-OR (XOR) operation, between decryption code 422 and each of streams 412, 413 and/or 415.
- XOR Exclusive-OR
- the decryption scheme implemented by decryption module 418 to decrypt stream 410 may include, for example, performing a decryption operation on stream 410 using decryption code 422.
- the decryption operation may correspond, for example, to the encryption scheme implemented for encrypting symbols of stream 410, e.g., the encryption scheme implemented by encryption module 218 (Fig. 2) to encrypt the fine-constellation symbols of stream 210 (Fig. 2), as are described above.
- receiver 400 may also include a demapper 434 to demap streams 430 and 432 into an output 436.
- demapper 434 may reconstruct transformation coefficients from fine-constellation symbols of stream 430, and coarse-constellation symbols of stream 432; perform an inverse transformation to reconstruct video component data, e.g., in the Y-Cr-Cb format; and/or convert the video component data into color component data, e.g., RGB data, as described in the '641 Application.
- output 436 may include a video signal corresponding to input video signal 204 (Fig. 2), e.g., if the transmission received by receiver 400 includes the transmission transmitted by transmitter 200 (Fig. 2).
- Fig. 5 schematically illustrates a method of synchronizing encryption information, in accordance with some demonstrative embodiments of the invention.
- the method of Fig. 5 may be implemented by a transmitter, e.g., transmitter 200 (Fig. 2) and a receiver, e.g., receiver 400 (Fig. 4), to synchronize between one or more encryption keys and/or values used by the transmitter to encrypt a transmission, and by the receiver to decrypt the transmission.
- a transmitter e.g., transmitter 200 (Fig. 2)
- a receiver e.g., receiver 400 (Fig. 4)
- one or more operations of the method of Fig. 5 may be implemented to synchronize between an ECG, e.g., ECG 230 (Fig.
- DCG 424 (Fig. 4)
- decryption code 422 (Fig. 4)
- encryption code 232 (Fig.- 2).
- the method may include setting a unit value of the ECG and a unit value of the DCG to an identical value.
- Setting the unit values may include, for example, using any suitable key exchange mechanism, e.g., in accordance with the RSA public key cipher, the Diffie-Hellman key exchange protocol, and the like.
- the method may also include extracting encryption information from a received transmission.
- the encryption information may be extracted, for example, from a header of a frame received by the receiver, e.g., as described above with reference to Fig. 4.
- the encryption information may include, for example, IVO, key index, and key index offset values, as are described above with reference to Fig. 2.
- the encryption information may include the IVO, key index and key index offset values used for encrypting the received frame.
- the method may include initializing the DGC.
- the DCG may be initialized with an initial value, a key index, and a unit key.
- DCG 424 (Fig. 4) may be initialized with unit key 428 (Fig. 4), initial value 416 (Fig. 4), and the key index, as described above.
- Initializing the DCG may also include, for example, initializing a frame counter to the value of the key index offset.
- DCG 424 (Fig. 4) may initialize frame counter 429 (Fig. 4) according to the key index offset of encryption information 408 (Fig. 4).
- the method may also include incrementing the initial value by a value of the IVO extracted from the received frame, e.g., upon receiving each frame.
- the method may also include decrementing the frame counter, e.g., by one, for example, upon receiving each frame.
- the method may include determining whether the frame counter reached a predefined threshold value, e.g., zero.
- the method may include advancing the key index and resetting the frame counter to the key index value, e.g. if the frame counter has reached the threshold value.
- the method may also include comparing the key index and initial value of the DCG with the key index and initial value extracted from the received frame.
- the method may also include incrementing an error counter, e.g., by one, if for example, the key index and initial value of the DCG do not match the key index and initial value extracted from the received frame.
- the error counter may indicate the number of frames in which the DCG and ECG do not use synchronized encryption and decryption codes.
- the method may include determining whether the error counter reaches a predefined error threshold.
- the method may include resetting the error counter, e.g., to zero and re-initializing the DCG, e.g., as described with reference to block 510, if the error counter has reached the error threshold.
- Fig. 6 schematically illustrates a method of generating an encrypted wireless transmission.
- a transmitter e.g., transmitter
- FIG. 06 Fig. 1 and/or transmitter 200 (Fig. 2) to generate an encrypted wireless transmission, e.g., transmission 112 (Fig. 1), corresponding to an input, e.g., signals 104 (Fig. 1) and/or 204 (Fig. 2).
- an input e.g., signals 104 (Fig. 1) and/or 204 (Fig. 2).
- the method may include generating transformation coefficients representing the input, for example, by applying a de-correlating transform to Y-Cr-Cb components of input video signals, as described above.
- the method may also include mapping the transformation coefficients to a plurality of symbols streams.
- the transformation coefficients may be mapped to at least a coarse-constellation symbol stream and a fine-constellation symbol stream, as described above.
- the method may also include encrypting the plurality of streams using a plurality of encryption schemes.
- the method may include encrypting a first stream of symbols, e.g., the coarse-constellation symbols, according to a first encryption scheme, e.g., by performing a XOR operation as described above with reference to Fig. 2.
- the method may also include encrypting a second stream of symbols, e.g., the fine-constellation symbols, using a second encryption scheme, e.g., as described above with reference to Fig. 2.
- a second encryption scheme e.g., as described above with reference to Fig. 2.
- the method may also include transmitting an encrypted wireless transmission corresponding to the input.
- the transmission may include the plurality of encrypted streams encrypted according to the plurality of encrypting schemes.
- the encrypted transmission may include at least first and second encrypted streams of symbols encrypted according to at least first and second different encryption schemes, respectively, e.g., as described above.
- Embodiments of the present invention may be implemented by software, by hardware, or by any combination of software and/or hardware as may be suitable for specific applications or in accordance with specific design requirements.
- Embodiments of the present invention may include units and sub-units, which may be separate of each other or combined together, in whole or in part, and may be implemented using specific, multipurpose or general processors, or devices as are known in the art.
- Some embodiments of the present invention may include buffers, registers, storage units and/or memory units, for temporary or long-term storage of data and/or in order to facilitate the operation of a specific embodiment.
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Multimedia (AREA)
- Computer Networks & Wireless Communication (AREA)
- Databases & Information Systems (AREA)
- Computer Security & Cryptography (AREA)
- Mobile Radio Communication Systems (AREA)
- Transmitters (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
Abstract
L'invention concerne, d'une part, des dispositifs, des systèmes et/ou des procédés de communication radio chiffrée. L'invention concerne, d'autre part, un émetteur radio permettant de générer une transmission radio chiffrée correspondant à un signal d'entrée. La transmission peut comprendre au moins des premier et second flux chiffrés de symboles chiffrés conformément à au moins des première et seconde logiques de chiffrement. D'autres formes d'exécution sont décritss et revendiquées.
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US80641006P | 2006-06-30 | 2006-06-30 | |
| US60/806,410 | 2006-06-30 |
Publications (3)
| Publication Number | Publication Date |
|---|---|
| WO2008001365A2 true WO2008001365A2 (fr) | 2008-01-03 |
| WO2008001365A3 WO2008001365A3 (fr) | 2008-07-31 |
| WO2008001365A8 WO2008001365A8 (fr) | 2008-11-27 |
Family
ID=38846095
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/IL2007/000780 WO2008001365A2 (fr) | 2006-06-30 | 2007-06-26 | Procédé, dispositif et système de communication radio chiffrée |
Country Status (2)
| Country | Link |
|---|---|
| CN (1) | CN101513059A (fr) |
| WO (1) | WO2008001365A2 (fr) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US9462283B2 (en) | 2013-04-18 | 2016-10-04 | Spotlight Technologies Ltd. | Efficient compression of Bayer images |
Families Citing this family (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN111487461A (zh) * | 2020-04-22 | 2020-08-04 | 国网河北省电力有限公司沧州供电分公司 | 一种线损监测系统 |
Family Cites Families (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5377194A (en) * | 1991-12-16 | 1994-12-27 | At&T Corp. | Multiplexed coded modulation with unequal error protection |
| DE10208480A1 (de) * | 2002-02-27 | 2003-09-11 | Siemens Ag | Verfahren zum Erzeugen und zum Abspielen eines Mediadatenstroms, Vorrichtungen zur Ausführung der Verfahren und Computerprogrammprodukt |
| US7313814B2 (en) * | 2003-04-01 | 2007-12-25 | Microsoft Corporation | Scalable, error resilient DRM for scalable media |
| JP2007507147A (ja) * | 2003-09-25 | 2007-03-22 | アミモン リミテッド | 高画質映像の無線伝送 |
-
2007
- 2007-06-26 WO PCT/IL2007/000780 patent/WO2008001365A2/fr active Application Filing
- 2007-06-26 CN CNA200780032198XA patent/CN101513059A/zh active Pending
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US9462283B2 (en) | 2013-04-18 | 2016-10-04 | Spotlight Technologies Ltd. | Efficient compression of Bayer images |
Also Published As
| Publication number | Publication date |
|---|---|
| WO2008001365A3 (fr) | 2008-07-31 |
| CN101513059A (zh) | 2009-08-19 |
| WO2008001365A8 (fr) | 2008-11-27 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US20070297612A1 (en) | Method, device and system of encrypted wireless communication | |
| US20070291855A1 (en) | Method, device and system of error-protection of a wireless video transmission | |
| US7684826B2 (en) | Method and system for processing wireless digital multimedia | |
| US8514208B2 (en) | Method and apparatus for optical wireless communication | |
| US8024580B2 (en) | Transmitting apparatus, receiving apparatus, and data transmitting system | |
| JP4710607B2 (ja) | 暗号装置、暗号方法および暗号プログラム、復号装置、復号方法および復号プログラム、ならびに、記録媒体 | |
| CN100358362C (zh) | 视频信号处理系统、视频信号处理装置和方法 | |
| EP1326447A1 (fr) | Procédé et système de distribution de clés de cryptage de signaux vidéo numériques | |
| EP1531578A1 (fr) | Dispositif et procede de cryptage/decryptage, dispositif et procede de cryptage, dispositif et procede de cryptage/decryptage et dispositif de transmission/reception | |
| US6870930B1 (en) | Methods and systems for TMDS encryption | |
| CN102014266A (zh) | 一种基于数字水印的高清视频加密传输方法及系统 | |
| EP2326088B1 (fr) | Système et procédé de chiffrement/déchiffrement d images | |
| US20090067625A1 (en) | Method for protection of digital rights at points of vulnerability in real time | |
| US20070291939A1 (en) | Method and system for transmission of uncompressed video over wireless channels | |
| KR100714694B1 (ko) | 네트워크 인터페이스 유닛 | |
| WO2008001365A2 (fr) | Procédé, dispositif et système de communication radio chiffrée | |
| US7734044B2 (en) | Method and apparatus for synchronous stream cipher encryption with reserved codes | |
| JP2004032001A (ja) | データ暗号化,復号化もしくは暗号化・復号化方法及び装置 | |
| CA2309519A1 (fr) | Methodes et systemes de cryptage tmds |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| WWE | Wipo information: entry into national phase |
Ref document number: 200780032198.X Country of ref document: CN |
|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 07766811 Country of ref document: EP Kind code of ref document: A2 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| NENP | Non-entry into the national phase |
Ref country code: RU |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 07766811 Country of ref document: EP Kind code of ref document: A2 |