Processing

Please wait...

Settings

Settings

Goto Application

1. WO2020109623 - SECURED TRANSMISSION OF CONTENT

Publication Number WO/2020/109623
Publication Date 04.06.2020
International Application No. PCT/EP2019/083314
International Filing Date 02.12.2019
IPC
H04W 12/00 2009.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
12Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
H04N 21/2347 2011.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
NPICTORIAL COMMUNICATION, e.g. TELEVISION
21Selective content distribution, e.g. interactive television or video on demand
20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
23Processing of content or additional data; Elementary server operations; Server middleware
234Processing of video elementary streams, e.g. splicing of video streams or manipulating MPEG-4 scene graphs
2347involving video stream encryption
H04N 7/18 2006.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
NPICTORIAL COMMUNICATION, e.g. TELEVISION
7Television systems
18Closed-circuit television systems, i.e. systems in which the signal is not broadcast
G08B 13/196 2006.01
GPHYSICS
08SIGNALLING
BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
13Burglar, theft or intruder alarms
18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
189using passive radiation detection systems
194using image scanning and comparing systems
196using television cameras
H04L 9/08 2006.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
9Arrangements for secret or secure communication
08Key distribution
CPC
G08B 13/196
GPHYSICS
08SIGNALLING
BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
13Burglar, theft or intruder alarms
18Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength
189using passive radiation detection systems
194using image scanning and comparing systems
196using television cameras
H04L 2209/601
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
2209Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
60Digital content management, e.g. content distribution
601Broadcast encryption
H04L 63/0428
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
63Network architectures or network communication protocols for network security
04for providing a confidential data exchange among entities communicating through data packet networks
0428wherein the data content is protected, e.g. by encrypting or encapsulating the payload
H04L 63/062
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
63Network architectures or network communication protocols for network security
06for supporting key management in a packet data network
062for key distribution, e.g. centrally by trusted party
H04L 63/068
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
63Network architectures or network communication protocols for network security
06for supporting key management in a packet data network
068using time-dependent keys, e.g. periodically changing keys
H04L 9/0822
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
9Cryptographic mechanisms or cryptographic; arrangements for secret or secure communication
08Key distribution ; or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
0822using key encryption key
Applicants
  • NAGRAVISION S.A. [CH]/[CH]
Inventors
  • MACCHETTI, Marco
  • PERRINE, Jérôme
  • HUNACEK, Didier
  • WIRZ, Christian
Agents
  • HOYNG ROKH MONEGIER LLP
Priority Data
18209610.730.11.2018EP
Publication Language English (EN)
Filing Language English (EN)
Designated States
Title
(EN) SECURED TRANSMISSION OF CONTENT
(FR) TRANSMISSION SÉCURISÉE DE CONTENU
Abstract
(EN)
The disclosure enables securing a transmission of content from a surveillance device to a remote server. The surveillance device is configured to obtain the content from observing a surroundings. The surveillance device is e.g. a security camera, in which case the content can comprise video data. The remote server is e.g. a centralized monitoring system or VMS. An encryption key that is generated in the remote server is received in the surveillance device from the remote server. The content is encrypted in the surveillance device using the encryption key and transmitted from the surveillance device to the remote server. The encryption key can be a control word that is received in an entitlement control message generated in the remote server.
(FR)
L'invention permet de sécuriser une transmission de contenu d'un dispositif de surveillance à un serveur distant. Le dispositif de surveillance est configuré pour obtenir le contenu par l'observation de l’environnement. Le dispositif de surveillance est par exemple une caméra de sécurité, auquel cas le contenu peut comprendre des données vidéo. Le serveur distant est par exemple un système de surveillance centralisé ou VMS. Une clé de chiffrement qui est générée dans le serveur distant est reçue dans le dispositif de surveillance à partir du serveur distant. Le contenu est chiffré dans le dispositif de surveillance à l'aide de la clé de chiffrement et transmis du dispositif de surveillance vers le serveur distant. La clé de chiffrement peut être un mot de commande qui est reçu dans un message de commande d'authorisation généré dans le serveur distant.
Latest bibliographic data on file with the International Bureau