[go: up one dir, main page]

WO2022098336A1 - Method of encrypted data transmission over a computer network for a conferencing system - Google Patents

Method of encrypted data transmission over a computer network for a conferencing system Download PDF

Info

Publication number
WO2022098336A1
WO2022098336A1 PCT/TR2021/051131 TR2021051131W WO2022098336A1 WO 2022098336 A1 WO2022098336 A1 WO 2022098336A1 TR 2021051131 W TR2021051131 W TR 2021051131W WO 2022098336 A1 WO2022098336 A1 WO 2022098336A1
Authority
WO
WIPO (PCT)
Prior art keywords
multimedia content
server
encrypted
terminal
content
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/TR2021/051131
Other languages
French (fr)
Inventor
Akin KAYA
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of WO2022098336A1 publication Critical patent/WO2022098336A1/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/125Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code
    • G06F21/126Interacting with the operating system
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication

Definitions

  • the present invention relates to a method of pre-encrypted data transmission via a content distributor server in conference systems operating on a computer network.
  • Security systems are deployed in a remote connected meeting.
  • Security systems are generally realized as two layers with SSL security layer and user ID number and password assigned to ID number.
  • SSL security layer With the two-stage security layers, third parties and third-party software are prevented from exceeding the security layer.
  • an extra layer of security is needed due to the emerging malicious software which may exploit the security layers.
  • US2018262388A1 discloses an authentication traffic tagged as AU in the message. Once keys have been exchanged all encrypted message traffic is shown tagged as E1 and E2 in the message explanations below.
  • E1 is used to denote encrypted server traffic.
  • E2 is used to denote encrypted P2P traffic between devices.
  • E1 and E2 use separate keys and separate encryption mechanisms.
  • E1 is used to indicate encrypted server traffic.
  • E2 is used to denote encrypted P2P traffic between devices.
  • E1 and E2 use separate keys and separate encryption mechanisms.
  • Supported video formats H.264 video up to 1080p, 30 frames per second, main profile with AAC-LC audio up to 160 Kbps Level 3.1 , 48 kHz, stereo audio in ,m4v, .mp4 and .mov file formats; MPEG-4 video up to 2.5 Mbps, 640 x 480 pixels, 30 fps, AAC-LC audio up to 160 Kbps per channel, 48 kHz, with stereo audio in ,m4v, .mp4 and .mov file formats simple profile ; Motion JPEG (M-JPEG) up to 35 Mbps, 1280 x 1020 pixels, 30 frames per second, audio in ulaw, PCM stereo audio in .avi file format are recorded.
  • M-JPEG Motion JPEG
  • the object of the invention is to enable the use of special encryption libraries in the content delivery server used for sending one or more packets over a computer network.
  • the invention is method for sending one or more packets over a computer network in a conference system comprising the steps of establishing an SSL encrypted communication session between a first terminal and at least one second terminal over a content distribution server, transferring a multimedia content by means of the content distribution server further comprising steps of selection of a corresponding predetermined local encryption library at the first and second terminals; encrypting the multimedia content produced by the first and second terminals with the local encryption library; sending the encrypted multimedia content to the content distribution server and transmitting the encrypted multimedia content to the corresponding first or second terminal for which the communication session is established; decrypting the encrypted multimedia content using the local encryption library and playing a decrypted multimedia content by the corresponding first or second terminal.
  • a preferred application of the invention communication session comprising the step of establishing a direct connection between the first and second terminals and the content distribution server. In this way, it is possible to provide a fast transmission.
  • a preferred application of the invention is for the communication session to run over a WebRTC protocol. Thanks to the Webrtc protocol, the recording and transmission of the user's media units such as audio and video are realized in an object-real time manner.
  • a preferred application of the invention includes the steps of the content distribution server to select the predetermined corresponding encryption library, decryption of encrypted multimedia content from the first and second terminals by means of the local encryption library, combining the decoded multimedia content into a single server multimedia content and sending it to the first and second terminals.
  • Decryption of encrypted multimedia contents on the terminal is therefore only on the local encryption library and is prevented from being decrypted by third parties or third-party software. Additionally, the conversion of a single server multimedia content allow the size of the information sent is reduced and the transmission speed is increased.
  • a preferred application of the invention comprising the steps of obtaining an encrypted server multimedia content by encrypting the server multimedia content via the local encryption library and transmitting the encrypted server multimedia content to the first and second terminals.
  • a preferred application of the invention the steps of connecting a first VR device to the first terminal and a second VR device to the second terminal in a signal transmitting manner, adding media information provided by the first or second terminal from the corresponding VR device to the multimedia content.
  • the three-dimensional media information provided via the VR device is transmitted to the terminal and the multimedia content created is transmitted to the terminals.
  • the AR device can also be used instead of the VR device.
  • a preferred application of the invention includes the processing step of playing the decoded multimedia content provided from the first or second terminal by the corresponding first or second VR device. Thanks to the playback of the decoded multimedia content by VR devices, the three-dimensional media information can be seen by the corresponding VR device.
  • an AR device can be integrated into the method instead of a VR device.
  • a preferred application of the invention comprising the steps of authentication by content delivery server to first and second terminals during establishing the communication session.
  • third parties or third-party software are prevented from accessing multimedia content and security layers are strengthened.
  • a preferred application of the invention comprising the steps of selecting a server encryption library to the content delivery server; encryption of encrypted multimedia content via the server encryption library; selecting the server encryption library in the corresponding first or second terminal; and decrypting the encrypted multimedia content by the server encryption library.
  • the encrypted multimedia content provided from the terminal is reencrypted by the server encryption library and the security level is increased.
  • the encrypted multimedia content transmitted is only decrypted by the server encryption library, it is prevented from being decrypted by third parties and third-party software.
  • FIGURES Figure 1 is a schematic illustration of the equipment to implement the method of subject matter invention.
  • Figure 2 is a representative illustration of the first exemplary scenario according to method of the invention.
  • Figure 3 is a representative illustration of the second exemplary scenario of the method of the invention.
  • Figure 4 is a representative illustration of the third exemplary scenario of the method of the invention.
  • FIG. 1 is a schematic representation of the equipment of the inventive method.
  • a communication session is established on a content distribution server (30) between a first terminal (10) and at least one second terminal (20).
  • the communication session is run over a WebRTC protocol.
  • a direct connection is established between the first terminal (10) and the second terminal (20) in a way that provides signal transmission over the network.
  • An SSL security protocol is applied so that the established communication session cannot be detected by third parties and third-party software.
  • SSL security protocol is one of the security protocols used to protect from external factors.
  • the multimedia content sent by the terminals 10, 20 is encrypted by a first terminal processor 12 in a local encryption library corresponding to the first terminal and an encrypted multimedia content is generated. Thanks to the encryption library, the cryptos determined by the user are stored and encrypted with the cryptos that the user creates according to himself. Thus, the security protocols can be determined by the user himself.
  • the encrypted multimedia content provided from the terminals 10, 20 is transmitted to the content delivery server (30), it is decrypted by local encryption libraries, converted to a single server multimedia content in the content delivery server (30) and encrypted in a server encryption library assigned to the content delivery server (30). encrypted by a server processor (32).
  • a server processor 302.
  • the multimedia content encrypted in the content delivery server (30) is sent to the target terminals (10, 20) by transmitting signals over the network. After the encrypted multimedia content sent to the target terminals (10, 20) reaches the terminals (10, 20) by the server encryption library, the encrypted multimedia content is decrypted. The decrypted encrypted multimedia content is decrypted by the encryption library. By playing the decoded multimedia content by the target terminals (10, 20), the sending of the multimedia content is completed.
  • the first example scenario is shown schematically in Figure 2.
  • the audio and video information of the first participant creates multimedia content on the first terminal (10) to which the first participant is assigned, and is transmitted by the first terminal processor (12) using the cryptos in the corresponding local encryption library in the first terminal (10).
  • encrypted and encrypted multimedia content is created.
  • the encrypted multimedia content is sent to the content delivery server (30) and decrypted by the local encryption library and converted into server multimedia content by the content delivery server (30).
  • the server multimedia content is encrypted by the server encryption processor (32) using the cryptos in the server encryption library located on the content distribution server (30).
  • the encrypted multimedia content encrypted in the content delivery server (30) is sent to the second terminal (20), where the second person is assigned.
  • the encrypted multimedia content sent to the second terminal (20) is decrypted by a second terminal processor (22) using the cryptographic information contained in the server encryption library.
  • the decrypted encrypted multimedia content is converted to multimedia content and played on the second terminal 20.
  • audio and video information of the second participant creates multimedia content on the second terminal (20) to which the second participant is assigned, and encrypted by the corresponding local encryption library at the second terminal (20) and encrypted multimedia content is created.
  • the encrypted multimedia content is sent to the content delivery server (30) and decrypted by the local encryption library and converted into server multimedia content by the content delivery server (30).
  • the server multimedia content is encrypted by the server encryption library located on the content delivery server (30).
  • Encrypted multimedia content encrypted in the content delivery server (30) is sent to the first terminal (10) to which the first person is assigned.
  • the encrypted multimedia content sent to the first terminal (10) is decrypted by the server encryption library.
  • the decrypted encrypted multimedia content is converted to multimedia content and played on the first terminal 10.
  • the remote meeting is held securely.
  • a second example scenario is shown in Figure 3 as a representation.
  • the audio, video information of each participant creates multimedia content on the target terminals (10, 20) to which each participant is assigned and is encrypted by the corresponding local encryption library on the target terminals (10, 20), and encrypted multimedia content is created.
  • the encrypted multimedia content is sent to the content delivery server (30) and decrypted by the local encryption library and converted into server multimedia content by the content delivery server (30).
  • the server multimedia content is encrypted by the server encryption library located on the content delivery server (30). Encrypted multimedia content encrypted on the content delivery server (30) is sent to other terminals (10, 20) to which other participants are assigned.
  • Encrypted multimedia content sent to other terminals (10, 20) is decrypted by the server encryption library.
  • the decrypted encrypted multimedia content is converted to multimedia content and played on other terminals (10, 20).
  • a multi-participant remote meeting is held securely.
  • FIG 4 is a representative illustration of the third example scenario.
  • the audio, video and ambient information images of each participant provided by a first VR device (40) multimedia content is created in the first terminal (10) assigned to the participant and corresponded in the first terminal (10). It is encrypted by the incoming native encryption library and encrypted multimedia content is created.
  • the encrypted multimedia content is sent to the content delivery server (30) and decrypted by the local encryption library and converted into server multimedia content by the content delivery server (30).
  • the server multimedia content is encrypted by the server encryption library located on the content delivery server (30).
  • the encrypted multimedia content encrypted in the content delivery server (30) is sent to the second terminal (20) to which the second participant is assigned.
  • the encrypted multimedia content sent to the second terminal (20) is decrypted by the second terminal processor (22) using the cryptos in the server encryption library.
  • the decrypted encrypted multimedia content is converted into multimedia content by the second terminal processor (22) and played on the second terminal (20) and a second VR device (50).
  • the three-dimensional remote meeting is held securely.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computing Systems (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Telephonic Communication Services (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention relates to a method for sending one or more packets over a computer network in a conference system comprising the steps of establishing an SSL encrypted communication session between a first terminal (10) and at least one second terminal (20) over a content distribution server (30), transferring a multimedia content by means of the content distribution server (30) further comprising steps of selection of a corresponding predetermined local encryption library at the first and second terminals (10, 20); encrypting the multimedia content produced by the first and second terminals (10, 20) with the local encryption library; sending the encrypted multimedia content to the content distribution server (30) and transmitting the encrypted multimedia content to the corresponding first or second terminal (10, 20) for which the communication session is established; decrypting the encrypted multimedia content using the local encryption library and playing a decrypted multimedia content by the corresponding first or second terminal (10, 20).

Description

METHOD OF ENCRYPTED DATA TRANSMISSION OVER A COMPUTER NETWORK FOR A CONFERENCING SYSTEM
TECHNICAL FIELD
The present invention relates to a method of pre-encrypted data transmission via a content distributor server in conference systems operating on a computer network.
BACKGROUND OF THE ART
Various security systems are deployed in a remote connected meeting. Security systems are generally realized as two layers with SSL security layer and user ID number and password assigned to ID number. With the two-stage security layers, third parties and third-party software are prevented from exceeding the security layer. However, an extra layer of security is needed due to the emerging malicious software which may exploit the security layers.
US2018262388A1 discloses an authentication traffic tagged as AU in the message. Once keys have been exchanged all encrypted message traffic is shown tagged as E1 and E2 in the message explanations below. E1 is used to denote encrypted server traffic. E2 is used to denote encrypted P2P traffic between devices. E1 and E2 use separate keys and separate encryption mechanisms. E1 is used to indicate encrypted server traffic. E2 is used to denote encrypted P2P traffic between devices. E1 and E2 use separate keys and separate encryption mechanisms. Supported video formats: H.264 video up to 1080p, 30 frames per second, main profile with AAC-LC audio up to 160 Kbps Level 3.1 , 48 kHz, stereo audio in ,m4v, .mp4 and .mov file formats; MPEG-4 video up to 2.5 Mbps, 640 x 480 pixels, 30 fps, AAC-LC audio up to 160 Kbps per channel, 48 kHz, with stereo audio in ,m4v, .mp4 and .mov file formats simple profile ; Motion JPEG (M-JPEG) up to 35 Mbps, 1280 x 1020 pixels, 30 frames per second, audio in ulaw, PCM stereo audio in .avi file format are recorded.
BRIEF DESCRIPTION OF THE INVENTION
The object of the invention is to enable the use of special encryption libraries in the content delivery server used for sending one or more packets over a computer network. In order to achieve above mentioned objective, the invention is method for sending one or more packets over a computer network in a conference system comprising the steps of establishing an SSL encrypted communication session between a first terminal and at least one second terminal over a content distribution server, transferring a multimedia content by means of the content distribution server further comprising steps of selection of a corresponding predetermined local encryption library at the first and second terminals; encrypting the multimedia content produced by the first and second terminals with the local encryption library; sending the encrypted multimedia content to the content distribution server and transmitting the encrypted multimedia content to the corresponding first or second terminal for which the communication session is established; decrypting the encrypted multimedia content using the local encryption library and playing a decrypted multimedia content by the corresponding first or second terminal. Thus, security protocols will be applied while transmitting multimedia content between terminals and it will be prevented from being viewed and obtained by third parties during the transmission of multimedia content. In addition, thanks to the encryption library feature, the encryption method of the users will be stored in the encryption library in an undisclosed manner and the reliability will increase.
A preferred application of the invention communication session comprising the step of establishing a direct connection between the first and second terminals and the content distribution server. In this way, it is possible to provide a fast transmission.
A preferred application of the invention is for the communication session to run over a WebRTC protocol. Thanks to the Webrtc protocol, the recording and transmission of the user's media units such as audio and video are realized in an object-real time manner.
A preferred application of the invention includes the steps of the content distribution server to select the predetermined corresponding encryption library, decryption of encrypted multimedia content from the first and second terminals by means of the local encryption library, combining the decoded multimedia content into a single server multimedia content and sending it to the first and second terminals. Decryption of encrypted multimedia contents on the terminal is therefore only on the local encryption library and is prevented from being decrypted by third parties or third-party software. Additionally, the conversion of a single server multimedia content allow the size of the information sent is reduced and the transmission speed is increased.
A preferred application of the invention comprising the steps of obtaining an encrypted server multimedia content by encrypting the server multimedia content via the local encryption library and transmitting the encrypted server multimedia content to the first and second terminals. In this way, transmission of encrypted server multimedia content to all available terminals during transmission is ensured in a safe and fast manner.
A preferred application of the invention the steps of connecting a first VR device to the first terminal and a second VR device to the second terminal in a signal transmitting manner, adding media information provided by the first or second terminal from the corresponding VR device to the multimedia content. Thus, the three-dimensional media information provided via the VR device is transmitted to the terminal and the multimedia content created is transmitted to the terminals. In an alternative application, the AR device can also be used instead of the VR device.
A preferred application of the invention includes the processing step of playing the decoded multimedia content provided from the first or second terminal by the corresponding first or second VR device. Thanks to the playback of the decoded multimedia content by VR devices, the three-dimensional media information can be seen by the corresponding VR device. In an alternative application, an AR device can be integrated into the method instead of a VR device.
A preferred application of the invention comprising the steps of authentication by content delivery server to first and second terminals during establishing the communication session.. Thus, third parties or third-party software are prevented from accessing multimedia content and security layers are strengthened.
A preferred application of the invention comprising the steps of selecting a server encryption library to the content delivery server; encryption of encrypted multimedia content via the server encryption library; selecting the server encryption library in the corresponding first or second terminal; and decrypting the encrypted multimedia content by the server encryption library. In this way, the encrypted multimedia content provided from the terminal is reencrypted by the server encryption library and the security level is increased. In addition, since the encrypted multimedia content transmitted is only decrypted by the server encryption library, it is prevented from being decrypted by third parties and third-party software.
BRIEF DESCRIPTION OF THE FIGURES Figure 1 is a schematic illustration of the equipment to implement the method of subject matter invention.
Figure 2 is a representative illustration of the first exemplary scenario according to method of the invention.
Figure 3 is a representative illustration of the second exemplary scenario of the method of the invention.
Figure 4 is a representative illustration of the third exemplary scenario of the method of the invention.
DETAILED DESCRIPTION OF THE INVENTION
In this detailed explanation, the subject development of the invention is explained without any limitation and only with reference to examples to better explain the subject matter.
Figure 1 is a schematic representation of the equipment of the inventive method. In the working principle of the method, a communication session is established on a content distribution server (30) between a first terminal (10) and at least one second terminal (20). The communication session is run over a WebRTC protocol. A direct connection is established between the first terminal (10) and the second terminal (20) in a way that provides signal transmission over the network. There is a modem (60) connected to provide the internet connection of the first and second terminals (10, 20). An SSL security protocol is applied so that the established communication session cannot be detected by third parties and third-party software. SSL security protocol is one of the security protocols used to protect from external factors. The multimedia content sent by the terminals 10, 20 is encrypted by a first terminal processor 12 in a local encryption library corresponding to the first terminal and an encrypted multimedia content is generated. Thanks to the encryption library, the cryptos determined by the user are stored and encrypted with the cryptos that the user creates according to himself. Thus, the security protocols can be determined by the user himself. After the encrypted multimedia content provided from the terminals 10, 20 is transmitted to the content delivery server (30), it is decrypted by local encryption libraries, converted to a single server multimedia content in the content delivery server (30) and encrypted in a server encryption library assigned to the content delivery server (30). encrypted by a server processor (32). Thus, a two-stage encryption system is implemented. The multimedia content encrypted in the content delivery server (30) is sent to the target terminals (10, 20) by transmitting signals over the network. After the encrypted multimedia content sent to the target terminals (10, 20) reaches the terminals (10, 20) by the server encryption library, the encrypted multimedia content is decrypted. The decrypted encrypted multimedia content is decrypted by the encryption library. By playing the decoded multimedia content by the target terminals (10, 20), the sending of the multimedia content is completed.
The first example scenario is shown schematically in Figure 2. In the first example scenario, during a remote meeting to be held between two participants, the audio and video information of the first participant creates multimedia content on the first terminal (10) to which the first participant is assigned, and is transmitted by the first terminal processor (12) using the cryptos in the corresponding local encryption library in the first terminal (10). encrypted and encrypted multimedia content is created. The encrypted multimedia content is sent to the content delivery server (30) and decrypted by the local encryption library and converted into server multimedia content by the content delivery server (30). The server multimedia content is encrypted by the server encryption processor (32) using the cryptos in the server encryption library located on the content distribution server (30). The encrypted multimedia content encrypted in the content delivery server (30) is sent to the second terminal (20), where the second person is assigned. The encrypted multimedia content sent to the second terminal (20) is decrypted by a second terminal processor (22) using the cryptographic information contained in the server encryption library. The decrypted encrypted multimedia content is converted to multimedia content and played on the second terminal 20. Likewise, during a remote meeting, audio and video information of the second participant creates multimedia content on the second terminal (20) to which the second participant is assigned, and encrypted by the corresponding local encryption library at the second terminal (20) and encrypted multimedia content is created. The encrypted multimedia content is sent to the content delivery server (30) and decrypted by the local encryption library and converted into server multimedia content by the content delivery server (30). The server multimedia content is encrypted by the server encryption library located on the content delivery server (30). Encrypted multimedia content encrypted in the content delivery server (30) is sent to the first terminal (10) to which the first person is assigned. The encrypted multimedia content sent to the first terminal (10) is decrypted by the server encryption library. The decrypted encrypted multimedia content is converted to multimedia content and played on the first terminal 10. Thus, the remote meeting is held securely.
A second example scenario is shown in Figure 3 as a representation. In the second example scenario, in the case of a remote meeting of more than two participants, the audio, video information of each participant creates multimedia content on the target terminals (10, 20) to which each participant is assigned and is encrypted by the corresponding local encryption library on the target terminals (10, 20), and encrypted multimedia content is created. The encrypted multimedia content is sent to the content delivery server (30) and decrypted by the local encryption library and converted into server multimedia content by the content delivery server (30). The server multimedia content is encrypted by the server encryption library located on the content delivery server (30). Encrypted multimedia content encrypted on the content delivery server (30) is sent to other terminals (10, 20) to which other participants are assigned. Encrypted multimedia content sent to other terminals (10, 20) is decrypted by the server encryption library. The decrypted encrypted multimedia content is converted to multimedia content and played on other terminals (10, 20). Thus, a multi-participant remote meeting is held securely.
Figure 4 is a representative illustration of the third example scenario. In the third exemplary scenario, in the case of a three-dimensional remote meeting attended by two participants, the audio, video and ambient information images of each participant provided by a first VR device (40) multimedia content is created in the first terminal (10) assigned to the participant and corresponded in the first terminal (10). It is encrypted by the incoming native encryption library and encrypted multimedia content is created. The encrypted multimedia content is sent to the content delivery server (30) and decrypted by the local encryption library and converted into server multimedia content by the content delivery server (30). The server multimedia content is encrypted by the server encryption library located on the content delivery server (30). The encrypted multimedia content encrypted in the content delivery server (30) is sent to the second terminal (20) to which the second participant is assigned. The encrypted multimedia content sent to the second terminal (20) is decrypted by the second terminal processor (22) using the cryptos in the server encryption library. The decrypted encrypted multimedia content is converted into multimedia content by the second terminal processor (22) and played on the second terminal (20) and a second VR device (50). Thus, the three-dimensional remote meeting is held securely.
REFERENCE NUMBERS
10 Terminal One
12 Primary Terminal Processor
20 Second Terminal
22 Second Terminal Processor
30 Content Delivery Server
32 Server Processor
40 First VR Device
50 Second VR Device
60 Modem

Claims

1- A method for sending one or more packets over a computer network in a conference system comprising the steps of establishing an SSL encrypted communication session between a first terminal (10) and at least one second terminal (20) over a content distribution server (30), transferring a multimedia content by means of the content distribution server (30) further comprising steps of selection of a corresponding predetermined local encryption library at the first and second terminals (10, 20); encrypting the multimedia content produced by the first and second terminals (10, 20) with the local encryption library; sending the encrypted multimedia content to the content distribution server (30) and transmitting the encrypted multimedia content to the corresponding first or second terminal (10, 20) for which the communication session is established; decrypting the encrypted multimedia content using the local encryption library and playing a decrypted multimedia content by the corresponding first or second terminal (10, 20).
2- A method according to claim 1 , wherein the communication session comprising the step of establishing a direct connection between the first and second terminals (10, 20) and the content distribution server (30).
3- A method according to any of the preceding claims, wherein the communication session is running over a WebRTC protocol.
4- A method according to any of the preceding claims, wherein the content distribution server (30) selects the predetermined corresponding encryption library, decryption of encrypted multimedia content from the first and second terminals (10, 20) by means of the local encryption library, combining the decoded multimedia content into a single server multimedia content and sending it to the first and second terminals (10, 20).
5- A method according to claim 4, comprising the steps of obtaining an encrypted server multimedia content by encrypting the server multimedia content via the local encryption library and transmitting the encrypted server multimedia content to the first and second terminals (10, 20).
6- A method according to any of the preceding claims, comprising the steps of connecting a first VR device (40) to the first terminal (10) and a second VR device (50) to the second terminal (20) in a signal transmitting manner, adding media information provided by the first or second terminal (10, 20) from the corresponding VR device (40, 50) to the multimedia content.
7- A method according to claim 6, comprising the steps of playback of decoded multimedia content supplied from the first or second terminal (10, 20) by the corresponding first or second VR device (40, 50).
8- A method according to any of the preceding claims, comprising the steps of authentication by content delivery server (30) to first and second terminals (10, 20) during establishing the communication session.
9. A method according to any one of the preceding claims, comprising the steps of selecting a server encryption library to the content delivery server (30); encryption of encrypted multimedia content via the server encryption library; selecting the server encryption library in the corresponding first or second terminal (10, 20); and decrypting the encrypted multimedia content by the server encryption library.
PCT/TR2021/051131 2020-11-08 2021-11-03 Method of encrypted data transmission over a computer network for a conferencing system Ceased WO2022098336A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
TR2020/17836A TR202017836A2 (en) 2020-11-08 2020-11-08 ENCRYPTED DATA TRANSMISSION OVER A COMPUTER NETWORK FOR A CONFERENCE SYSTEM
TR2020/17836 2020-11-08

Publications (1)

Publication Number Publication Date
WO2022098336A1 true WO2022098336A1 (en) 2022-05-12

Family

ID=81457346

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/TR2021/051131 Ceased WO2022098336A1 (en) 2020-11-08 2021-11-03 Method of encrypted data transmission over a computer network for a conferencing system

Country Status (2)

Country Link
TR (1) TR202017836A2 (en)
WO (1) WO2022098336A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN119766481A (en) * 2024-11-26 2025-04-04 本源量子计算科技(合肥)股份有限公司 Data transmission method and related device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040059939A1 (en) * 2002-09-13 2004-03-25 Sun Microsystems, Inc., A Delaware Corporation Controlled delivery of digital content in a system for digital content access control
US6785811B1 (en) * 2000-03-23 2004-08-31 International Business Machines Corporation Methods, systems and computer program products for providing multiple cryptographic functions to applications using a common library
US9590958B1 (en) * 2016-04-14 2017-03-07 Wickr Inc. Secure file transfer
CN109714292A (en) * 2017-10-25 2019-05-03 华为技术有限公司 The method and apparatus of transmitting message

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6785811B1 (en) * 2000-03-23 2004-08-31 International Business Machines Corporation Methods, systems and computer program products for providing multiple cryptographic functions to applications using a common library
US20040059939A1 (en) * 2002-09-13 2004-03-25 Sun Microsystems, Inc., A Delaware Corporation Controlled delivery of digital content in a system for digital content access control
US9590958B1 (en) * 2016-04-14 2017-03-07 Wickr Inc. Secure file transfer
CN109714292A (en) * 2017-10-25 2019-05-03 华为技术有限公司 The method and apparatus of transmitting message

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN119766481A (en) * 2024-11-26 2025-04-04 本源量子计算科技(合肥)股份有限公司 Data transmission method and related device

Also Published As

Publication number Publication date
TR202017836A2 (en) 2022-05-23

Similar Documents

Publication Publication Date Title
KR101026609B1 (en) Methods, Devices, and Key Management Methods for Scalable, Error-Resilient DDRs for Scalable Media
US20050216731A1 (en) Content distribution apparatus, content receiving apparatus, and content distribution method
US20090063314A1 (en) Distributed digital rights management node module and methods for use therewith
JP2002514859A (en) Communication network
US5822676A (en) Digital serialization of program events
EP3691257B1 (en) Internet protocol camera security system allowing secure encryption information to be transmitted
CN115051857A (en) Global quantum secure audio and video communication method
KR20040089108A (en) Device for secure transmission recording and visualisation of audiovisual programmes
Kunkelmann Applying encryption to video communication
EP1499061A1 (en) Individual video encryption system and method
WO2022098336A1 (en) Method of encrypted data transmission over a computer network for a conferencing system
CN115883883B (en) Method and system for secure transmission of broadcast and television live signals
WO2002025861A1 (en) Dynamic key management architecture for ensuring conditional access to secure multimedia multicast
CN110719247B (en) Terminal network access method and device
CN119484019B (en) A method and device for recording audio and video based on quantum key
US7764791B2 (en) Method for secured transmission of audiovisual files
Kunkelmann et al. Evaluation of different video encryption methods for a secure multimedia conferencing gateway
EP1673897A1 (en) Secure distributed method and system for the distribution of audiovisual flows
CA2372810A1 (en) Method and apparatus for access control of pre-encrypted on-demand television services
US20240235816A1 (en) Protecting augmented reality call content
US20250323788A1 (en) Authenticating avatar data during augmented reality (ar) communication sessions
CN111193943B (en) Distributed and collaborative content distribution method and system
WO2006024234A1 (en) Method ano apparatus for protecting broadband video and audio broadcast content
Yu Streaming media encryption
WO2010000786A1 (en) Process to ensure massive data diffusion security, and devices associated

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21889753

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 21889753

Country of ref document: EP

Kind code of ref document: A1