WO2022098336A1 - Method of encrypted data transmission over a computer network for a conferencing system - Google Patents
Method of encrypted data transmission over a computer network for a conferencing system Download PDFInfo
- Publication number
- WO2022098336A1 WO2022098336A1 PCT/TR2021/051131 TR2021051131W WO2022098336A1 WO 2022098336 A1 WO2022098336 A1 WO 2022098336A1 TR 2021051131 W TR2021051131 W TR 2021051131W WO 2022098336 A1 WO2022098336 A1 WO 2022098336A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- multimedia content
- server
- encrypted
- terminal
- content
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/125—Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code
- G06F21/126—Interacting with the operating system
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
Definitions
- the present invention relates to a method of pre-encrypted data transmission via a content distributor server in conference systems operating on a computer network.
- Security systems are deployed in a remote connected meeting.
- Security systems are generally realized as two layers with SSL security layer and user ID number and password assigned to ID number.
- SSL security layer With the two-stage security layers, third parties and third-party software are prevented from exceeding the security layer.
- an extra layer of security is needed due to the emerging malicious software which may exploit the security layers.
- US2018262388A1 discloses an authentication traffic tagged as AU in the message. Once keys have been exchanged all encrypted message traffic is shown tagged as E1 and E2 in the message explanations below.
- E1 is used to denote encrypted server traffic.
- E2 is used to denote encrypted P2P traffic between devices.
- E1 and E2 use separate keys and separate encryption mechanisms.
- E1 is used to indicate encrypted server traffic.
- E2 is used to denote encrypted P2P traffic between devices.
- E1 and E2 use separate keys and separate encryption mechanisms.
- Supported video formats H.264 video up to 1080p, 30 frames per second, main profile with AAC-LC audio up to 160 Kbps Level 3.1 , 48 kHz, stereo audio in ,m4v, .mp4 and .mov file formats; MPEG-4 video up to 2.5 Mbps, 640 x 480 pixels, 30 fps, AAC-LC audio up to 160 Kbps per channel, 48 kHz, with stereo audio in ,m4v, .mp4 and .mov file formats simple profile ; Motion JPEG (M-JPEG) up to 35 Mbps, 1280 x 1020 pixels, 30 frames per second, audio in ulaw, PCM stereo audio in .avi file format are recorded.
- M-JPEG Motion JPEG
- the object of the invention is to enable the use of special encryption libraries in the content delivery server used for sending one or more packets over a computer network.
- the invention is method for sending one or more packets over a computer network in a conference system comprising the steps of establishing an SSL encrypted communication session between a first terminal and at least one second terminal over a content distribution server, transferring a multimedia content by means of the content distribution server further comprising steps of selection of a corresponding predetermined local encryption library at the first and second terminals; encrypting the multimedia content produced by the first and second terminals with the local encryption library; sending the encrypted multimedia content to the content distribution server and transmitting the encrypted multimedia content to the corresponding first or second terminal for which the communication session is established; decrypting the encrypted multimedia content using the local encryption library and playing a decrypted multimedia content by the corresponding first or second terminal.
- a preferred application of the invention communication session comprising the step of establishing a direct connection between the first and second terminals and the content distribution server. In this way, it is possible to provide a fast transmission.
- a preferred application of the invention is for the communication session to run over a WebRTC protocol. Thanks to the Webrtc protocol, the recording and transmission of the user's media units such as audio and video are realized in an object-real time manner.
- a preferred application of the invention includes the steps of the content distribution server to select the predetermined corresponding encryption library, decryption of encrypted multimedia content from the first and second terminals by means of the local encryption library, combining the decoded multimedia content into a single server multimedia content and sending it to the first and second terminals.
- Decryption of encrypted multimedia contents on the terminal is therefore only on the local encryption library and is prevented from being decrypted by third parties or third-party software. Additionally, the conversion of a single server multimedia content allow the size of the information sent is reduced and the transmission speed is increased.
- a preferred application of the invention comprising the steps of obtaining an encrypted server multimedia content by encrypting the server multimedia content via the local encryption library and transmitting the encrypted server multimedia content to the first and second terminals.
- a preferred application of the invention the steps of connecting a first VR device to the first terminal and a second VR device to the second terminal in a signal transmitting manner, adding media information provided by the first or second terminal from the corresponding VR device to the multimedia content.
- the three-dimensional media information provided via the VR device is transmitted to the terminal and the multimedia content created is transmitted to the terminals.
- the AR device can also be used instead of the VR device.
- a preferred application of the invention includes the processing step of playing the decoded multimedia content provided from the first or second terminal by the corresponding first or second VR device. Thanks to the playback of the decoded multimedia content by VR devices, the three-dimensional media information can be seen by the corresponding VR device.
- an AR device can be integrated into the method instead of a VR device.
- a preferred application of the invention comprising the steps of authentication by content delivery server to first and second terminals during establishing the communication session.
- third parties or third-party software are prevented from accessing multimedia content and security layers are strengthened.
- a preferred application of the invention comprising the steps of selecting a server encryption library to the content delivery server; encryption of encrypted multimedia content via the server encryption library; selecting the server encryption library in the corresponding first or second terminal; and decrypting the encrypted multimedia content by the server encryption library.
- the encrypted multimedia content provided from the terminal is reencrypted by the server encryption library and the security level is increased.
- the encrypted multimedia content transmitted is only decrypted by the server encryption library, it is prevented from being decrypted by third parties and third-party software.
- FIGURES Figure 1 is a schematic illustration of the equipment to implement the method of subject matter invention.
- Figure 2 is a representative illustration of the first exemplary scenario according to method of the invention.
- Figure 3 is a representative illustration of the second exemplary scenario of the method of the invention.
- Figure 4 is a representative illustration of the third exemplary scenario of the method of the invention.
- FIG. 1 is a schematic representation of the equipment of the inventive method.
- a communication session is established on a content distribution server (30) between a first terminal (10) and at least one second terminal (20).
- the communication session is run over a WebRTC protocol.
- a direct connection is established between the first terminal (10) and the second terminal (20) in a way that provides signal transmission over the network.
- An SSL security protocol is applied so that the established communication session cannot be detected by third parties and third-party software.
- SSL security protocol is one of the security protocols used to protect from external factors.
- the multimedia content sent by the terminals 10, 20 is encrypted by a first terminal processor 12 in a local encryption library corresponding to the first terminal and an encrypted multimedia content is generated. Thanks to the encryption library, the cryptos determined by the user are stored and encrypted with the cryptos that the user creates according to himself. Thus, the security protocols can be determined by the user himself.
- the encrypted multimedia content provided from the terminals 10, 20 is transmitted to the content delivery server (30), it is decrypted by local encryption libraries, converted to a single server multimedia content in the content delivery server (30) and encrypted in a server encryption library assigned to the content delivery server (30). encrypted by a server processor (32).
- a server processor 302.
- the multimedia content encrypted in the content delivery server (30) is sent to the target terminals (10, 20) by transmitting signals over the network. After the encrypted multimedia content sent to the target terminals (10, 20) reaches the terminals (10, 20) by the server encryption library, the encrypted multimedia content is decrypted. The decrypted encrypted multimedia content is decrypted by the encryption library. By playing the decoded multimedia content by the target terminals (10, 20), the sending of the multimedia content is completed.
- the first example scenario is shown schematically in Figure 2.
- the audio and video information of the first participant creates multimedia content on the first terminal (10) to which the first participant is assigned, and is transmitted by the first terminal processor (12) using the cryptos in the corresponding local encryption library in the first terminal (10).
- encrypted and encrypted multimedia content is created.
- the encrypted multimedia content is sent to the content delivery server (30) and decrypted by the local encryption library and converted into server multimedia content by the content delivery server (30).
- the server multimedia content is encrypted by the server encryption processor (32) using the cryptos in the server encryption library located on the content distribution server (30).
- the encrypted multimedia content encrypted in the content delivery server (30) is sent to the second terminal (20), where the second person is assigned.
- the encrypted multimedia content sent to the second terminal (20) is decrypted by a second terminal processor (22) using the cryptographic information contained in the server encryption library.
- the decrypted encrypted multimedia content is converted to multimedia content and played on the second terminal 20.
- audio and video information of the second participant creates multimedia content on the second terminal (20) to which the second participant is assigned, and encrypted by the corresponding local encryption library at the second terminal (20) and encrypted multimedia content is created.
- the encrypted multimedia content is sent to the content delivery server (30) and decrypted by the local encryption library and converted into server multimedia content by the content delivery server (30).
- the server multimedia content is encrypted by the server encryption library located on the content delivery server (30).
- Encrypted multimedia content encrypted in the content delivery server (30) is sent to the first terminal (10) to which the first person is assigned.
- the encrypted multimedia content sent to the first terminal (10) is decrypted by the server encryption library.
- the decrypted encrypted multimedia content is converted to multimedia content and played on the first terminal 10.
- the remote meeting is held securely.
- a second example scenario is shown in Figure 3 as a representation.
- the audio, video information of each participant creates multimedia content on the target terminals (10, 20) to which each participant is assigned and is encrypted by the corresponding local encryption library on the target terminals (10, 20), and encrypted multimedia content is created.
- the encrypted multimedia content is sent to the content delivery server (30) and decrypted by the local encryption library and converted into server multimedia content by the content delivery server (30).
- the server multimedia content is encrypted by the server encryption library located on the content delivery server (30). Encrypted multimedia content encrypted on the content delivery server (30) is sent to other terminals (10, 20) to which other participants are assigned.
- Encrypted multimedia content sent to other terminals (10, 20) is decrypted by the server encryption library.
- the decrypted encrypted multimedia content is converted to multimedia content and played on other terminals (10, 20).
- a multi-participant remote meeting is held securely.
- FIG 4 is a representative illustration of the third example scenario.
- the audio, video and ambient information images of each participant provided by a first VR device (40) multimedia content is created in the first terminal (10) assigned to the participant and corresponded in the first terminal (10). It is encrypted by the incoming native encryption library and encrypted multimedia content is created.
- the encrypted multimedia content is sent to the content delivery server (30) and decrypted by the local encryption library and converted into server multimedia content by the content delivery server (30).
- the server multimedia content is encrypted by the server encryption library located on the content delivery server (30).
- the encrypted multimedia content encrypted in the content delivery server (30) is sent to the second terminal (20) to which the second participant is assigned.
- the encrypted multimedia content sent to the second terminal (20) is decrypted by the second terminal processor (22) using the cryptos in the server encryption library.
- the decrypted encrypted multimedia content is converted into multimedia content by the second terminal processor (22) and played on the second terminal (20) and a second VR device (50).
- the three-dimensional remote meeting is held securely.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computing Systems (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Telephonic Communication Services (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention relates to a method for sending one or more packets over a computer network in a conference system comprising the steps of establishing an SSL encrypted communication session between a first terminal (10) and at least one second terminal (20) over a content distribution server (30), transferring a multimedia content by means of the content distribution server (30) further comprising steps of selection of a corresponding predetermined local encryption library at the first and second terminals (10, 20); encrypting the multimedia content produced by the first and second terminals (10, 20) with the local encryption library; sending the encrypted multimedia content to the content distribution server (30) and transmitting the encrypted multimedia content to the corresponding first or second terminal (10, 20) for which the communication session is established; decrypting the encrypted multimedia content using the local encryption library and playing a decrypted multimedia content by the corresponding first or second terminal (10, 20).
Description
METHOD OF ENCRYPTED DATA TRANSMISSION OVER A COMPUTER NETWORK FOR A CONFERENCING SYSTEM
TECHNICAL FIELD
The present invention relates to a method of pre-encrypted data transmission via a content distributor server in conference systems operating on a computer network.
BACKGROUND OF THE ART
Various security systems are deployed in a remote connected meeting. Security systems are generally realized as two layers with SSL security layer and user ID number and password assigned to ID number. With the two-stage security layers, third parties and third-party software are prevented from exceeding the security layer. However, an extra layer of security is needed due to the emerging malicious software which may exploit the security layers.
US2018262388A1 discloses an authentication traffic tagged as AU in the message. Once keys have been exchanged all encrypted message traffic is shown tagged as E1 and E2 in the message explanations below. E1 is used to denote encrypted server traffic. E2 is used to denote encrypted P2P traffic between devices. E1 and E2 use separate keys and separate encryption mechanisms. E1 is used to indicate encrypted server traffic. E2 is used to denote encrypted P2P traffic between devices. E1 and E2 use separate keys and separate encryption mechanisms. Supported video formats: H.264 video up to 1080p, 30 frames per second, main profile with AAC-LC audio up to 160 Kbps Level 3.1 , 48 kHz, stereo audio in ,m4v, .mp4 and .mov file formats; MPEG-4 video up to 2.5 Mbps, 640 x 480 pixels, 30 fps, AAC-LC audio up to 160 Kbps per channel, 48 kHz, with stereo audio in ,m4v, .mp4 and .mov file formats simple profile ; Motion JPEG (M-JPEG) up to 35 Mbps, 1280 x 1020 pixels, 30 frames per second, audio in ulaw, PCM stereo audio in .avi file format are recorded.
BRIEF DESCRIPTION OF THE INVENTION
The object of the invention is to enable the use of special encryption libraries in the content delivery server used for sending one or more packets over a computer network.
In order to achieve above mentioned objective, the invention is method for sending one or more packets over a computer network in a conference system comprising the steps of establishing an SSL encrypted communication session between a first terminal and at least one second terminal over a content distribution server, transferring a multimedia content by means of the content distribution server further comprising steps of selection of a corresponding predetermined local encryption library at the first and second terminals; encrypting the multimedia content produced by the first and second terminals with the local encryption library; sending the encrypted multimedia content to the content distribution server and transmitting the encrypted multimedia content to the corresponding first or second terminal for which the communication session is established; decrypting the encrypted multimedia content using the local encryption library and playing a decrypted multimedia content by the corresponding first or second terminal. Thus, security protocols will be applied while transmitting multimedia content between terminals and it will be prevented from being viewed and obtained by third parties during the transmission of multimedia content. In addition, thanks to the encryption library feature, the encryption method of the users will be stored in the encryption library in an undisclosed manner and the reliability will increase.
A preferred application of the invention communication session comprising the step of establishing a direct connection between the first and second terminals and the content distribution server. In this way, it is possible to provide a fast transmission.
A preferred application of the invention is for the communication session to run over a WebRTC protocol. Thanks to the Webrtc protocol, the recording and transmission of the user's media units such as audio and video are realized in an object-real time manner.
A preferred application of the invention includes the steps of the content distribution server to select the predetermined corresponding encryption library, decryption of encrypted multimedia content from the first and second terminals by means of the local encryption library, combining the decoded multimedia content into a single server multimedia content and sending it to the first and second terminals. Decryption of encrypted multimedia contents on the terminal is therefore only on the local encryption library and is prevented from being decrypted by third parties or third-party software. Additionally, the conversion of a single server multimedia content allow the size of the information sent is reduced and the transmission speed is increased.
A preferred application of the invention comprising the steps of obtaining an encrypted server multimedia content by encrypting the server multimedia content via the local encryption
library and transmitting the encrypted server multimedia content to the first and second terminals. In this way, transmission of encrypted server multimedia content to all available terminals during transmission is ensured in a safe and fast manner.
A preferred application of the invention the steps of connecting a first VR device to the first terminal and a second VR device to the second terminal in a signal transmitting manner, adding media information provided by the first or second terminal from the corresponding VR device to the multimedia content. Thus, the three-dimensional media information provided via the VR device is transmitted to the terminal and the multimedia content created is transmitted to the terminals. In an alternative application, the AR device can also be used instead of the VR device.
A preferred application of the invention includes the processing step of playing the decoded multimedia content provided from the first or second terminal by the corresponding first or second VR device. Thanks to the playback of the decoded multimedia content by VR devices, the three-dimensional media information can be seen by the corresponding VR device. In an alternative application, an AR device can be integrated into the method instead of a VR device.
A preferred application of the invention comprising the steps of authentication by content delivery server to first and second terminals during establishing the communication session.. Thus, third parties or third-party software are prevented from accessing multimedia content and security layers are strengthened.
A preferred application of the invention comprising the steps of selecting a server encryption library to the content delivery server; encryption of encrypted multimedia content via the server encryption library; selecting the server encryption library in the corresponding first or second terminal; and decrypting the encrypted multimedia content by the server encryption library. In this way, the encrypted multimedia content provided from the terminal is reencrypted by the server encryption library and the security level is increased. In addition, since the encrypted multimedia content transmitted is only decrypted by the server encryption library, it is prevented from being decrypted by third parties and third-party software.
BRIEF DESCRIPTION OF THE FIGURES
Figure 1 is a schematic illustration of the equipment to implement the method of subject matter invention.
Figure 2 is a representative illustration of the first exemplary scenario according to method of the invention.
Figure 3 is a representative illustration of the second exemplary scenario of the method of the invention.
Figure 4 is a representative illustration of the third exemplary scenario of the method of the invention.
DETAILED DESCRIPTION OF THE INVENTION
In this detailed explanation, the subject development of the invention is explained without any limitation and only with reference to examples to better explain the subject matter.
Figure 1 is a schematic representation of the equipment of the inventive method. In the working principle of the method, a communication session is established on a content distribution server (30) between a first terminal (10) and at least one second terminal (20). The communication session is run over a WebRTC protocol. A direct connection is established between the first terminal (10) and the second terminal (20) in a way that provides signal transmission over the network. There is a modem (60) connected to provide the internet connection of the first and second terminals (10, 20). An SSL security protocol is applied so that the established communication session cannot be detected by third parties and third-party software. SSL security protocol is one of the security protocols used to protect from external factors. The multimedia content sent by the terminals 10, 20 is encrypted by a first terminal processor 12 in a local encryption library corresponding to the first terminal and an encrypted multimedia content is generated. Thanks to the encryption library, the cryptos determined by the user are stored and encrypted with the cryptos that the user creates according to himself. Thus, the security protocols can be determined by the user himself. After the encrypted multimedia content provided from the terminals 10, 20 is transmitted to the content delivery server (30), it is decrypted by local encryption libraries, converted to a single server multimedia content in the content delivery server (30) and encrypted in a server encryption library assigned to the content delivery server (30). encrypted by a server processor (32). Thus, a two-stage encryption system is implemented. The multimedia content encrypted in the content delivery server (30) is sent to the target terminals (10, 20) by transmitting signals over the network. After the encrypted multimedia content sent to the target terminals (10, 20) reaches the terminals (10, 20) by the server encryption library, the encrypted multimedia content is decrypted. The decrypted encrypted multimedia content is
decrypted by the encryption library. By playing the decoded multimedia content by the target terminals (10, 20), the sending of the multimedia content is completed.
The first example scenario is shown schematically in Figure 2. In the first example scenario, during a remote meeting to be held between two participants, the audio and video information of the first participant creates multimedia content on the first terminal (10) to which the first participant is assigned, and is transmitted by the first terminal processor (12) using the cryptos in the corresponding local encryption library in the first terminal (10). encrypted and encrypted multimedia content is created. The encrypted multimedia content is sent to the content delivery server (30) and decrypted by the local encryption library and converted into server multimedia content by the content delivery server (30). The server multimedia content is encrypted by the server encryption processor (32) using the cryptos in the server encryption library located on the content distribution server (30). The encrypted multimedia content encrypted in the content delivery server (30) is sent to the second terminal (20), where the second person is assigned. The encrypted multimedia content sent to the second terminal (20) is decrypted by a second terminal processor (22) using the cryptographic information contained in the server encryption library. The decrypted encrypted multimedia content is converted to multimedia content and played on the second terminal 20. Likewise, during a remote meeting, audio and video information of the second participant creates multimedia content on the second terminal (20) to which the second participant is assigned, and encrypted by the corresponding local encryption library at the second terminal (20) and encrypted multimedia content is created. The encrypted multimedia content is sent to the content delivery server (30) and decrypted by the local encryption library and converted into server multimedia content by the content delivery server (30). The server multimedia content is encrypted by the server encryption library located on the content delivery server (30). Encrypted multimedia content encrypted in the content delivery server (30) is sent to the first terminal (10) to which the first person is assigned. The encrypted multimedia content sent to the first terminal (10) is decrypted by the server encryption library. The decrypted encrypted multimedia content is converted to multimedia content and played on the first terminal 10. Thus, the remote meeting is held securely.
A second example scenario is shown in Figure 3 as a representation. In the second example scenario, in the case of a remote meeting of more than two participants, the audio, video information of each participant creates multimedia content on the target terminals (10, 20) to which each participant is assigned and is encrypted by the corresponding local encryption library on the target terminals (10, 20), and encrypted multimedia content is created. The encrypted multimedia content is sent to the content delivery server (30) and decrypted by the
local encryption library and converted into server multimedia content by the content delivery server (30). The server multimedia content is encrypted by the server encryption library located on the content delivery server (30). Encrypted multimedia content encrypted on the content delivery server (30) is sent to other terminals (10, 20) to which other participants are assigned. Encrypted multimedia content sent to other terminals (10, 20) is decrypted by the server encryption library. The decrypted encrypted multimedia content is converted to multimedia content and played on other terminals (10, 20). Thus, a multi-participant remote meeting is held securely.
Figure 4 is a representative illustration of the third example scenario. In the third exemplary scenario, in the case of a three-dimensional remote meeting attended by two participants, the audio, video and ambient information images of each participant provided by a first VR device (40) multimedia content is created in the first terminal (10) assigned to the participant and corresponded in the first terminal (10). It is encrypted by the incoming native encryption library and encrypted multimedia content is created. The encrypted multimedia content is sent to the content delivery server (30) and decrypted by the local encryption library and converted into server multimedia content by the content delivery server (30). The server multimedia content is encrypted by the server encryption library located on the content delivery server (30). The encrypted multimedia content encrypted in the content delivery server (30) is sent to the second terminal (20) to which the second participant is assigned. The encrypted multimedia content sent to the second terminal (20) is decrypted by the second terminal processor (22) using the cryptos in the server encryption library. The decrypted encrypted multimedia content is converted into multimedia content by the second terminal processor (22) and played on the second terminal (20) and a second VR device (50). Thus, the three-dimensional remote meeting is held securely.
REFERENCE NUMBERS
10 Terminal One
12 Primary Terminal Processor
20 Second Terminal
22 Second Terminal Processor
30 Content Delivery Server
32 Server Processor
40 First VR Device
50 Second VR Device
60 Modem
Claims
1- A method for sending one or more packets over a computer network in a conference system comprising the steps of establishing an SSL encrypted communication session between a first terminal (10) and at least one second terminal (20) over a content distribution server (30), transferring a multimedia content by means of the content distribution server (30) further comprising steps of selection of a corresponding predetermined local encryption library at the first and second terminals (10, 20); encrypting the multimedia content produced by the first and second terminals (10, 20) with the local encryption library; sending the encrypted multimedia content to the content distribution server (30) and transmitting the encrypted multimedia content to the corresponding first or second terminal (10, 20) for which the communication session is established; decrypting the encrypted multimedia content using the local encryption library and playing a decrypted multimedia content by the corresponding first or second terminal (10, 20).
2- A method according to claim 1 , wherein the communication session comprising the step of establishing a direct connection between the first and second terminals (10, 20) and the content distribution server (30).
3- A method according to any of the preceding claims, wherein the communication session is running over a WebRTC protocol.
4- A method according to any of the preceding claims, wherein the content distribution server (30) selects the predetermined corresponding encryption library, decryption of encrypted multimedia content from the first and second terminals (10, 20) by means of the local encryption library, combining the decoded multimedia content into a single server multimedia content and sending it to the first and second terminals (10, 20).
5- A method according to claim 4, comprising the steps of obtaining an encrypted server multimedia content by encrypting the server multimedia content via the local encryption library and transmitting the encrypted server multimedia content to the first and second terminals (10, 20).
6- A method according to any of the preceding claims, comprising the steps of connecting a first VR device (40) to the first terminal (10) and a second VR device (50) to the second terminal (20) in a signal transmitting manner, adding media information provided by the first
or second terminal (10, 20) from the corresponding VR device (40, 50) to the multimedia content.
7- A method according to claim 6, comprising the steps of playback of decoded multimedia content supplied from the first or second terminal (10, 20) by the corresponding first or second VR device (40, 50).
8- A method according to any of the preceding claims, comprising the steps of authentication by content delivery server (30) to first and second terminals (10, 20) during establishing the communication session.
9. A method according to any one of the preceding claims, comprising the steps of selecting a server encryption library to the content delivery server (30); encryption of encrypted multimedia content via the server encryption library; selecting the server encryption library in the corresponding first or second terminal (10, 20); and decrypting the encrypted multimedia content by the server encryption library.
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| TR2020/17836A TR202017836A2 (en) | 2020-11-08 | 2020-11-08 | ENCRYPTED DATA TRANSMISSION OVER A COMPUTER NETWORK FOR A CONFERENCE SYSTEM |
| TR2020/17836 | 2020-11-08 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2022098336A1 true WO2022098336A1 (en) | 2022-05-12 |
Family
ID=81457346
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/TR2021/051131 Ceased WO2022098336A1 (en) | 2020-11-08 | 2021-11-03 | Method of encrypted data transmission over a computer network for a conferencing system |
Country Status (2)
| Country | Link |
|---|---|
| TR (1) | TR202017836A2 (en) |
| WO (1) | WO2022098336A1 (en) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN119766481A (en) * | 2024-11-26 | 2025-04-04 | 本源量子计算科技(合肥)股份有限公司 | Data transmission method and related device |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20040059939A1 (en) * | 2002-09-13 | 2004-03-25 | Sun Microsystems, Inc., A Delaware Corporation | Controlled delivery of digital content in a system for digital content access control |
| US6785811B1 (en) * | 2000-03-23 | 2004-08-31 | International Business Machines Corporation | Methods, systems and computer program products for providing multiple cryptographic functions to applications using a common library |
| US9590958B1 (en) * | 2016-04-14 | 2017-03-07 | Wickr Inc. | Secure file transfer |
| CN109714292A (en) * | 2017-10-25 | 2019-05-03 | 华为技术有限公司 | The method and apparatus of transmitting message |
-
2020
- 2020-11-08 TR TR2020/17836A patent/TR202017836A2/en unknown
-
2021
- 2021-11-03 WO PCT/TR2021/051131 patent/WO2022098336A1/en not_active Ceased
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6785811B1 (en) * | 2000-03-23 | 2004-08-31 | International Business Machines Corporation | Methods, systems and computer program products for providing multiple cryptographic functions to applications using a common library |
| US20040059939A1 (en) * | 2002-09-13 | 2004-03-25 | Sun Microsystems, Inc., A Delaware Corporation | Controlled delivery of digital content in a system for digital content access control |
| US9590958B1 (en) * | 2016-04-14 | 2017-03-07 | Wickr Inc. | Secure file transfer |
| CN109714292A (en) * | 2017-10-25 | 2019-05-03 | 华为技术有限公司 | The method and apparatus of transmitting message |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN119766481A (en) * | 2024-11-26 | 2025-04-04 | 本源量子计算科技(合肥)股份有限公司 | Data transmission method and related device |
Also Published As
| Publication number | Publication date |
|---|---|
| TR202017836A2 (en) | 2022-05-23 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| KR101026609B1 (en) | Methods, Devices, and Key Management Methods for Scalable, Error-Resilient DDRs for Scalable Media | |
| US20050216731A1 (en) | Content distribution apparatus, content receiving apparatus, and content distribution method | |
| US20090063314A1 (en) | Distributed digital rights management node module and methods for use therewith | |
| JP2002514859A (en) | Communication network | |
| US5822676A (en) | Digital serialization of program events | |
| EP3691257B1 (en) | Internet protocol camera security system allowing secure encryption information to be transmitted | |
| CN115051857A (en) | Global quantum secure audio and video communication method | |
| KR20040089108A (en) | Device for secure transmission recording and visualisation of audiovisual programmes | |
| Kunkelmann | Applying encryption to video communication | |
| EP1499061A1 (en) | Individual video encryption system and method | |
| WO2022098336A1 (en) | Method of encrypted data transmission over a computer network for a conferencing system | |
| CN115883883B (en) | Method and system for secure transmission of broadcast and television live signals | |
| WO2002025861A1 (en) | Dynamic key management architecture for ensuring conditional access to secure multimedia multicast | |
| CN110719247B (en) | Terminal network access method and device | |
| CN119484019B (en) | A method and device for recording audio and video based on quantum key | |
| US7764791B2 (en) | Method for secured transmission of audiovisual files | |
| Kunkelmann et al. | Evaluation of different video encryption methods for a secure multimedia conferencing gateway | |
| EP1673897A1 (en) | Secure distributed method and system for the distribution of audiovisual flows | |
| CA2372810A1 (en) | Method and apparatus for access control of pre-encrypted on-demand television services | |
| US20240235816A1 (en) | Protecting augmented reality call content | |
| US20250323788A1 (en) | Authenticating avatar data during augmented reality (ar) communication sessions | |
| CN111193943B (en) | Distributed and collaborative content distribution method and system | |
| WO2006024234A1 (en) | Method ano apparatus for protecting broadband video and audio broadcast content | |
| Yu | Streaming media encryption | |
| WO2010000786A1 (en) | Process to ensure massive data diffusion security, and devices associated |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 21889753 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 21889753 Country of ref document: EP Kind code of ref document: A1 |