US20130185554A1 - Method for analyzing coded data streams simultaneously transmitted in ip networks - Google Patents

Method for analyzing coded data streams simultaneously transmitted in ip networks Download PDF

Info

Publication number
US20130185554A1
US20130185554A1 US13/772,679 US201313772679A US2013185554A1 US 20130185554 A1 US20130185554 A1 US 20130185554A1 US 201313772679 A US201313772679 A US 201313772679A US 2013185554 A1 US2013185554 A1 US 2013185554A1
Authority
US
United States
Prior art keywords
data
key information
stream
data packet
header
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US13/772,679
Inventor
Siegfried Hartmann
Jorg Krumbock
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Unify GmbH and Co KG
Original Assignee
Siemens Enterprise Communications GmbH and Co KG
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Siemens Enterprise Communications GmbH and Co KG filed Critical Siemens Enterprise Communications GmbH and Co KG
Priority to US13/772,679 priority Critical patent/US20130185554A1/en
Publication of US20130185554A1 publication Critical patent/US20130185554A1/en
Assigned to UNIFY GMBH & CO. KG reassignment UNIFY GMBH & CO. KG CHANGE OF NAME (SEE DOCUMENT FOR DETAILS). Assignors: SIEMENS ENTERPRISE COMMUNICATIONS GMBH & CO. KG
Assigned to SIEMENS ENTERPRISE COMMUNICATIONS GMBH & CO. KG reassignment SIEMENS ENTERPRISE COMMUNICATIONS GMBH & CO. KG ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: KRUMBOCK, JORG, HARTMANN, SIEGFRIED
Abandoned legal-status Critical Current

Links

Images

Classifications

    • H04L29/06
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/60Network streaming of media packets
    • H04L65/65Network streaming protocols, e.g. real-time transport protocol [RTP] or real-time control protocol [RTCP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/60Network streaming of media packets
    • H04L65/75Media network packet handling
    • H04L65/762Media network packet handling at the source 
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/60Network streaming of media packets
    • H04L65/75Media network packet handling
    • H04L65/764Media network packet handling at the destination 

Definitions

  • Embodiments of the invention relate to improvements to analysis or diagnosis of simultaneously transmitted data streams.
  • the RTP Real Time Protocol
  • the RTP is defined in RFC standard 1889, or since 2003 in RFC standard 3550. Due to increased security requirements, data streams have been transmitted encrypted for quite some time, and the secure RTP used for this is described in RFC standard 3711.
  • the key information required for encryption is assigned and used on a data-stream-specific basis. As an example, for a multimedia session between two endpoints on an IP-based communication network, an audio and a video data stream are each transmitted in one transmission direction.
  • connection signaling using the SIP (Session Initiation Protocol), for example—with a special key used to encrypt the connection signaling—Preshared Secrets, for example—which cannot be recognized even if the data stream is hacked.
  • SIP Session Initiation Protocol
  • multiple data streams or multimedia data streams are generally transmitted through a transmission leg or transmission segment.
  • analysis or diagnosis of the transmitted data streams is necessary in order to locate or delimit errors.
  • reconstruction of the unencrypted data streams is usually necessary.
  • An analysis or diagnosis is often performed on transmission segments with multiple data streams transmitted simultaneously using the RTP, so that the key information in the data streams (RTP data streams, for example), is not available and cannot be determined even during connection signaling, because the signaling information and the key information are re-encrypted, and the key information used is not available.
  • Embodiments taught herein improve the analysis or diagnosis of individual or simultaneously transmitted data streams containing data packets, with data streams generated and encrypted data-stream-specifically according to a network protocol for data stream transmission.
  • Embodiments reported herein may provide a network protocol with data packets having an extendable header, and that data-stream-specifically generated key information is inserted and transferred into an extended header of a data packet of the respective data stream. From the extended headers of the received data packets in the respective data stream, the key information is selected data-stream-specifically and the associated, encrypted data stream is decrypted using at least one piece of selected key information.
  • key information can be generated and inserted with minimal administrative effort and that efforts for analysis or diagnostics of simultaneously transferred data streams can be significantly reduced, so that the additional user information can be transmitted in the data packet with extended header.
  • the insertion of key information in an extended header of a data packet can be enabled or initiated only while the data stream's analysis or diagnostics are being performed.
  • the network protocol with extendable header is the standardized network protocol according to the RFC Standard 3550 or 1889, whereby the data streams (ds 1 . . . n) are encrypted according to the Secured Real Time Protocol (SRTP).
  • SRTP Secured Real Time Protocol
  • the standardized SRTP protocol is based on the standardized RTP (Real Time Protocol) according to RFC Standard 3550 or 1889. Through the use of the RTP, key information can be inserted into the standard extendable header with minimal additional effort.
  • the network protocol determines a data packet type for data packages with inserted key information so that the data packets may be discarded, if the data stream is received in accordance with the network protocol, whereby no payload data will be inserted in the data packet.
  • the data packet type for the data packets is defined as a data packet type that is new for the network or preferentially a previously unused data packet type, where the data packets are not read by a network protocol-compliant receiver, if the transfer is according to network protocol.
  • the data-stream-specific key information will be continuously inserted in the respective data stream's data packets with extended headers. Upon detection of several data packets with inserted key information, this allows continuous examination of the key information or examination of key information after a regular number of received data packets. Since not every data packet must be checked for inserted key information, the dynamic load is reduced.
  • the data-stream-specific insertion of key information (si 1 . . . n) for analysis or diagnostics and/or recording of data streams (ds 1 . . . n) can be enabled and subsequently disabled.
  • key information si 1 . . . n
  • ds 1 . . . n data streams
  • FIG. 1 a schematic showing one communication arrangement for applying the invented method
  • FIG. 2 a data packet suitable for the communication arrangement according to the invention
  • FIG. 3 is a first table illustrating an exemplary embodiment of a header extension for a data packet
  • FIG. 4 is a second table illustrating an exemplary embodiment of key information.
  • FIG. 1 is a schematic diagram showing an example of a communication arrangement in which the invented method is used, including only components in which the invented method is implemented or which are necessary in order to clarify the invented method.
  • the communication arrangement is suitable for Voice Over IP, i.e., for transmitting spoken information in the IP protocol, with signaling by means of the standardized H.323 or SIP protocol.
  • Voice Over IP i.e., for transmitting spoken information in the IP protocol
  • signaling by means of the standardized H.323 or SIP protocol.
  • RTP Real Time Protocol
  • speech and/or video information transmitted directly between the components that are connected by signaling.
  • the RTP is defined in RFC standard 1889 or 3550 and consists of a protocol for continuous transmission of real-time data, e.g., audiovisual or multimedia data over IP-based networks.
  • the data packets to be transferred are coded and then inserted for transmission in IP-compliant data packets via IP-based networks.
  • the data packets are transferred within a session between IP terminals, whereby each session is assigned at least one data stream ds or several data streams.
  • the RTP is suitable for transmission of individual data streams ds as well as for simultaneous transmission of multiple data streams ds 1 . . . n or data packets.
  • multiple data streams ds 1 . . . n i.e. multimedia streams, are transmitted simultaneously between components of an IP-based network.
  • the communication arrangement consists of a first component K 1 that is represented in the execution example by a Gateway GW.
  • the Gateway GW can, for example, be connected via a local network LAN—hereafter designated as LAN and represented in FIG. 1 by a dash-and-dot outlined oval—to a second component K 2 , which in the execution example is represented by an Internet endpoint IP-E such as a multimedia terminal MME.
  • the LAN can consist physically and procedurally of an Ethernet, for example.
  • multiple data streams ds 1 ′ . . . n′ or multimedia data streams generated according to the RTP are to be transmitted simultaneously from the Gateway GW to the Internet endpoint IP-E.
  • the multiple data streams ds 1 ′ . . . n′ are generated as audio data streams and video data streams, and both an audio and a video data stream can be assigned to each session.
  • the data streams ds 1 ′ . . . n′ generated according to the RTP are encrypted data-stream-specifically, using an encryption unit VE. This means that, for each data stream ds 1 ′ . . . n′, a different piece of key information si 1 . . . n is designated for encryption.
  • RTP data streams ds are encrypted preferably using the SRTP according to RFC standard 3711.
  • the encrypted data streams ds 1 . . . n from the data-stream-specifically encrypted data streams ds 1 . . . n should be decrypted for analysis of the data streams by a diagnosis unit DE.
  • a diagnosis unit DE is not involved in the signaling between the connection-generating components of an IP-based network, so as part of the signaling the used key information si is processed for each individual data stream.
  • signaling could also be analyzed by the diagnosis unit DE, but the key information si 1 . . . n for the data streams ds 1 . . . n could not be determined, because the signaling and the key information si 1 . . .
  • diagnosis unit DE has no information about the key information si used in the data streams ds 1 . . . n.
  • the invented method is used, with the invented method applied in the execution example to the simultaneous transmission of multiple data streams sds 1 . . . n generated according to the SRTP from the Gateway GW to the IP endpoint IP-E.
  • the methods and components described below apply to the opposite transmission direction.
  • the data streams ds 1 ′ . . . n′ are encrypted in an encryption unit VE according to the SRTP, whereby the encryption unit VE is arranged together with an insertion unit IE within a transmission unit UE.
  • the required key information si 1 . . . n is stored in a key unit SE and is available from the encryption unit VE and the insertion unit IE, designated in FIG. 1 by an arrow marked with si 1 . . . n.
  • a piece of key information si 1 . . . n is designated for each data stream ds 1 ′ . . . n′, i.e., the data streams ds 1 ′ . . . n′ are encrypted data-stream-specifically.
  • the extension KE—see FIG. 2 —of the header will be inserted in the data packet dp intended for transmitting the key information si 1 . . . n according to the RTP protocol by setting the header extension bits to 1. Furthermore, the number of 16-bit words included in the header extension is indicated in the extension KE of the header RTPH or in the header extension Additionally, a piece of data packet type information or a payload type PT according to the RTP may be indicated in the key information si 1 . . . n provided for transmission, which defines a data packet as a data packet dp with inserted key information.
  • a payload type PT should be selected or specified, which is not used in the standard data packets, and data packets with the selected payload type PT will be discarded during standard transmissions. This means that in this version, no user information or payload may be inserted in the data packet dp.
  • the data packets dp 1 or the key information si 1 . . . n contained in them may be additionally encrypted. Additional key information is needed for this, and it is generated using a public key spublic and a private key spriv.
  • the public key spub for the additional encryption is provided in the key unit SE in the Gateway GW and is sent to the transmission unit UE for encryption of the data packets dp or the key information si 1 . . . n contained in them, shown in FIG. 1 as an arrow marked spub.
  • the private key spriv is provided to the diagnosis unit DE by the decryption unit EE and is used to decrypt the additional encrypted data packets dp or key information si 1 . . . n, shown in FIG. 1 by the designation spriv in the decryption unit EE.
  • the key information si 1 . . . n will be inserted in the extension KE of the header RTPH or the extension header of the data packets of the respective data streams ds 1 . . . n.
  • the data streams sds 1 . . . n containing key data packets si 1 . . . n are transmitted over the LAN to the IP endpoint IP-E.
  • a diagnosis unit DE connected to the LAN is provided for the purpose of diagnosing or analyzing the data streams sds 1 . . . n. So that the data streams sds 1 . . . n containing the key information si 1 . . . n can be analyzed, the encrypted data streams sds 1 . . . n must be decrypted. As explained previously, for each encrypted data stream ds 1 . . . n, the key information si 1 . . . n needed for decryption is necessary.
  • the diagnostics unit DE uses a monitoring unit UEE to search, read, and store data packets dp in the respective data streams ds 1 . . . n that indicate an extension KE of the header RTPH or a header extension. Additionally, data packets dp with key information si 1 . . . n can also be detected by the payload type PT.
  • the key information si 1 . . . n will be selected and stored, after which the key information si 1 . . . n can be removed from the extensions KE of the header RTPH or the header extensions. Additionally, the extension of the headers RTPH can be reset by inserting suitable information in the header. Together with the respective key information si 1 . . . n, a piece of information i(ds 1 . . . n) from the extensions KE of the headers RTPH must be found and stored, to determine for which of the data streams ds 1 . . . n the key information si 1 . . . n for decryption is provided.
  • Both the encrypted data streams ds 1 . . . n and the selected key information si 1 . . . n are transferred to a decryption unit EE.
  • the respective key information si 1 . . . n i.e., the decryption information and the information i(ds 1 . . . n)
  • the unencrypted data streams ds 1 ′ . . . n′ are ready for diagnosis or analysis in the diagnosis unit DE.
  • the diagnosis unit DE is provided with a recording unit REC inserted between the LAN and the diagnosis unit DE, in which the data streams sds 1 . . . n can be recorded.
  • Key information si 1 . . . n can then be selected and recorded data streams sds 1 . . . n analyzed or diagnosed at a later time; they can be recorded at night, for example, and diagnosed later during the day.
  • the recording unit REC can also be inserted after the encrypted data streams sds 1 . . . n are decrypted—not shown—so that the data streams ds 1 ′ . . . n′ are unencrypted when readied for diagnosis or analysis.
  • FIG. 2 shows the protocol structure of a data packet dp, in which a piece of key information si 1 . . . n is inserted.
  • the data packet dp is generated according to the standard RTP and includes a RTPH heading portion according to RFC 3550—known as a header in the industry—and a RTPP usable portion known as the payload.
  • the RTP is embedded in a UDP, whose header UDPH is added into the RTP header RTPH. Because an IP-based transmission is involved, the UDP is packed into an IP protocol IPP, to which an IP header IPH is added.
  • the corresponding protocol element is still referenced—shown only partially for clarity.
  • the information on the extension KE of the header RTPH presents an important piece of information for the invented method.
  • a piece of information on the payload type PT can be inserted, designated with the label PT in FIG. 2 .
  • the payload type PT used is designated in the RTP, but no payload type PT is assigned to it.
  • a payload type PT of “19” is defined in the standardization phase, but it is later designated as unused and then as “reserved.” Therefore, to designate an RTP data packet with key information si 1 . .
  • payload type 19 is preferred.
  • no user information 1 may be inserted in the payload RTPP, since data packets dp generated this way will be discarded by the receiving component during standard transmissions.
  • the extension KE of the header PTRH or the header extension is positioned in the standardized RTP header RTPH according to FIG. 3 wherein the numbering 0 . . . 31 represents one bit.
  • the scope of the extension is indicated by the number of 16-bit fields in the header extension field.
  • the key information si 1 . . . n for the respective data stream ds 1 . . . n is inserted in the extension header KE, and
  • FIG. 4 shows the key information si used for decryption according to the standardized SRTP, wherein the numbering 0 . . . 9 represents one bit.
  • the information in FIG. 3 has the following meaning according to SRTP Standard.
  • a context is an association between a direction (Tx/Rx) and an SSRC. It has been judged that a maximum of 15 contexts should suffice for the current purposes.
  • the lengths of the authentication tag appended to the tracebeacon This length will always be zero for now as the authentication is not expected to be used in the short-term.
  • Length of the symmetric key encrypted using RSA in bytes. This length can be zero if the tracebeacon does not contain this key. Since the Encrypted KEK can be the longest part of the tracebeacon, sending the Encrypted KEK in, say, one tracebeacon out of two can result in appreciable gains in the average size of the tracebeacons sent.
  • Symmetric key encrypted using RSA This field to 256 bytes when the public key has 204 bits and does not need to end on a 32 bits boundary. This field is also optional as it can have a length of zero
  • this field corresponds to a Certification Id. This field does not need to end on a 32 bits boundary. Like the Encrypted KEK this field is optional, as it can have a length of zero.
  • the authentication tag of the tracebeacon The authenticated portion of the tracebeacon will be the first eight bytes, the contexts and keys section. This field is optional, as the authentication tag length can be zero. It is indeed not expected to be present for this version. of the tracebeacon.
  • the encrypted data streams ds 1 . . . n are decrypted, i.e. transformed back into the original data streams ds 1 ′ . . . n′.
  • the data streams ds 1 ′ . . . n′ can be processed in the diagnosis unit DE using the implemented diagnosis routines—not shown.

Abstract

One network protocol (RTP) each, having data packets (dp) comprising an expandable header (KE) is provided for a data stream (ds1 . . . n) encoded in a manner individual to said data stream, and the key information (si1 . . . n) formed in a data stream manner individual to said data stream is inserted into an expandable header (RTPH) of a data packet (dp) of the respective data stream (ds1 . . . n) and transmitted. The key information (sp1 . . . n) is selected in a manner individual to said data stream from the expanded headers (KE) of received data packets (dp) of the respective data stream (ds1 . . . n), and the associated encoded data stream (ds1 . . . n) is decoded by means of at least one piece of selected data stream individual key information (si1 . . . n). The forming and inserting of key information (si1 . . . n) into standard expanded headers (KE) can be performed with little additional expense, thus significantly reducing the expenditure for the analysis or diagnosis of the simultaneously transmitted encoded data streams (ds1 . . . n). Advantageously, the insertion of key information (si1 . . . n) can be activated or initiated only if the diagnosis or analysis and/or the recording of the data streams is currently being performed.

Description

    CROSS-REFERENCE TO RELATED APPLICATIONS
  • This application is the United States national phase under 35 U.S.C. §371 of PCT International Application No. PCT/EP2008/058552, filed on Jul. 3, 2008, and claiming priority to German Application No. 10 2007 041 143.1, filed on Aug. 30, 2007. Those applications are incorporated by reference herein.
  • BACKGROUND OF THE INVENTION
  • 1. Field of the Invention
  • Embodiments of the invention relate to improvements to analysis or diagnosis of simultaneously transmitted data streams.
  • 2. Background of the Art
  • In communication networks, especially in Voice Over IP communication networks, the RTP (Real Time Protocol) is often used to transmit data streams or multimedia data streams consisting of data packets, i.e., user information or speech information. The RTP is defined in RFC standard 1889, or since 2003 in RFC standard 3550. Due to increased security requirements, data streams have been transmitted encrypted for quite some time, and the secure RTP used for this is described in RFC standard 3711. In this context, the key information required for encryption is assigned and used on a data-stream-specific basis. As an example, for a multimedia session between two endpoints on an IP-based communication network, an audio and a video data stream are each transmitted in one transmission direction. Related to both transmission directions, four data streams are transmitted within a multimedia session, each of which is encrypted separately, i.e., encrypted data-stream-specifically. The key information for that particular session or data stream is assigned or processed during connection signaling—using the SIP (Session Initiation Protocol), for example—with a special key used to encrypt the connection signaling—Preshared Secrets, for example—which cannot be recognized even if the data stream is hacked.
  • In communication networks, multiple data streams or multimedia data streams are generally transmitted through a transmission leg or transmission segment. For problem situations arising in communication networks, analysis or diagnosis of the transmitted data streams is necessary in order to locate or delimit errors. For error analysis or diagnosis, reconstruction of the unencrypted data streams is usually necessary. An analysis or diagnosis is often performed on transmission segments with multiple data streams transmitted simultaneously using the RTP, so that the key information in the data streams (RTP data streams, for example), is not available and cannot be determined even during connection signaling, because the signaling information and the key information are re-encrypted, and the key information used is not available.
  • BRIEF SUMMARY OF THE INVENTION
  • Embodiments taught herein improve the analysis or diagnosis of individual or simultaneously transmitted data streams containing data packets, with data streams generated and encrypted data-stream-specifically according to a network protocol for data stream transmission.
  • Embodiments reported herein may provide a network protocol with data packets having an extendable header, and that data-stream-specifically generated key information is inserted and transferred into an extended header of a data packet of the respective data stream. From the extended headers of the received data packets in the respective data stream, the key information is selected data-stream-specifically and the associated, encrypted data stream is decrypted using at least one piece of selected key information.
  • In embodiments reported herein key information can be generated and inserted with minimal administrative effort and that efforts for analysis or diagnostics of simultaneously transferred data streams can be significantly reduced, so that the additional user information can be transmitted in the data packet with extended header. Preferentially the insertion of key information in an extended header of a data packet can be enabled or initiated only while the data stream's analysis or diagnostics are being performed.
  • In a preferred embodiment, the network protocol with extendable header is the standardized network protocol according to the RFC Standard 3550 or 1889, whereby the data streams (ds1 . . . n) are encrypted according to the Secured Real Time Protocol (SRTP). The standardized SRTP protocol is based on the standardized RTP (Real Time Protocol) according to RFC Standard 3550 or 1889. Through the use of the RTP, key information can be inserted into the standard extendable header with minimal additional effort.
  • In another embodiment, it is possible in the network protocol to determine a data packet type for data packages with inserted key information so that the data packets may be discarded, if the data stream is received in accordance with the network protocol, whereby no payload data will be inserted in the data packet. This ensures that the key information is not read if the data packets are transmitted according to network protocol by a network protocol-compliant data receiver. The data packet type for the data packets is defined as a data packet type that is new for the network or preferentially a previously unused data packet type, where the data packets are not read by a network protocol-compliant receiver, if the transfer is according to network protocol.
  • In another preferred embodiment, the data-stream-specific key information will be continuously inserted in the respective data stream's data packets with extended headers. Upon detection of several data packets with inserted key information, this allows continuous examination of the key information or examination of key information after a regular number of received data packets. Since not every data packet must be checked for inserted key information, the dynamic load is reduced.
  • Preferentially, the data-stream-specific insertion of key information (si1 . . . n) for analysis or diagnostics and/or recording of data streams (ds1 . . . n) can be enabled and subsequently disabled. By enabling the insertion of key information in data packets only during diagnostics of data streams, high security during operations without diagnostics remains intact.
  • Additional preferential developments of the invented method and one embodiment of an arrangement according to the invention can be found in other claims.
  • The following text further explains the invention and its developments, with reference to two drawings.
  • BRIEF DESCRIPTION OF THE FIGURES
  • FIG. 1, a schematic showing one communication arrangement for applying the invented method,
  • FIG. 2, a data packet suitable for the communication arrangement according to the invention,
  • FIG. 3 is a first table illustrating an exemplary embodiment of a header extension for a data packet, and
  • FIG. 4 is a second table illustrating an exemplary embodiment of key information.
  • DETAILED DESCRIPTION OF THE INVENTION
  • FIG. 1 is a schematic diagram showing an example of a communication arrangement in which the invented method is used, including only components in which the invented method is implemented or which are necessary in order to clarify the invented method.
  • The communication arrangement is suitable for Voice Over IP, i.e., for transmitting spoken information in the IP protocol, with signaling by means of the standardized H.323 or SIP protocol. For speech and/or video transmission, use of the RTP (Real Time Protocol) is preferred, with speech and/or video information transmitted directly between the components that are connected by signaling. The RTP is defined in RFC standard 1889 or 3550 and consists of a protocol for continuous transmission of real-time data, e.g., audiovisual or multimedia data over IP-based networks. The data packets to be transferred are coded and then inserted for transmission in IP-compliant data packets via IP-based networks. The data packets are transferred within a session between IP terminals, whereby each session is assigned at least one data stream ds or several data streams. The RTP is suitable for transmission of individual data streams ds as well as for simultaneous transmission of multiple data streams ds1 . . . n or data packets. For the execution example given here, it is assumed that multiple data streams ds1 . . . n, i.e. multimedia streams, are transmitted simultaneously between components of an IP-based network.
  • Due to increased security requirements for transmitting data streams ds, it has become increasingly common to encrypt data streams ds, especially data streams ds transmitted according to the RTP. Key information si, which is recognized by the components between which the data streams are transmitted in an IP-based network, is used for this encryption. A protocol for encrypting RTP data streams is defined in the SRTP (Secure Real Time Protocol) according to RFC standard 3711. It uses a symmetrical encryption system that offers a high degree of security.
  • The communication arrangement consists of a first component K1 that is represented in the execution example by a Gateway GW. The Gateway GW can, for example, be connected via a local network LAN—hereafter designated as LAN and represented in FIG. 1 by a dash-and-dot outlined oval—to a second component K2, which in the execution example is represented by an Internet endpoint IP-E such as a multimedia terminal MME. The LAN can consist physically and procedurally of an Ethernet, for example.
  • For the execution example, it is further assumed that multiple data streams ds1′ . . . n′ or multimedia data streams generated according to the RTP are to be transmitted simultaneously from the Gateway GW to the Internet endpoint IP-E. As an example, the multiple data streams ds1′ . . . n′ are generated as audio data streams and video data streams, and both an audio and a video data stream can be assigned to each session. In addition, the data streams ds1′ . . . n′ generated according to the RTP are encrypted data-stream-specifically, using an encryption unit VE. This means that, for each data stream ds1′ . . . n′, a different piece of key information si1 . . . n is designated for encryption. RTP data streams ds are encrypted preferably using the SRTP according to RFC standard 3711.
  • According to the invention, the encrypted data streams ds1 . . . n from the data-stream-specifically encrypted data streams ds1 . . . n should be decrypted for analysis of the data streams by a diagnosis unit DE. Normally a diagnosis unit DE is not involved in the signaling between the connection-generating components of an IP-based network, so as part of the signaling the used key information si is processed for each individual data stream. Of course, signaling could also be analyzed by the diagnosis unit DE, but the key information si1 . . . n for the data streams ds1 . . . n could not be determined, because the signaling and the key information si1 . . . n are re-encrypted and the pieces of key information for these encryptions are not available to the diagnosis unit, nor can they be determined from the signaling information. This means that the diagnosis unit DE has no information about the key information si used in the data streams ds1 . . . n.
  • So that data streams ds1 . . . n generated according to the SRTP can still be decrypted, the invented method is used, with the invented method applied in the execution example to the simultaneous transmission of multiple data streams sds1 . . . n generated according to the SRTP from the Gateway GW to the IP endpoint IP-E. The methods and components described below apply to the opposite transmission direction.
  • In the gateway GW, the data streams ds1′ . . . n′ are encrypted in an encryption unit VE according to the SRTP, whereby the encryption unit VE is arranged together with an insertion unit IE within a transmission unit UE. The required key information si1 . . . n is stored in a key unit SE and is available from the encryption unit VE and the insertion unit IE, designated in FIG. 1 by an arrow marked with si1 . . . n. This means that a piece of key information si1 . . . n is designated for each data stream ds1′ . . . n′, i.e., the data streams ds1′ . . . n′ are encrypted data-stream-specifically.
  • Within the insertion unit IE, the extension KE—see FIG. 2—of the header will be inserted in the data packet dp intended for transmitting the key information si1 . . . n according to the RTP protocol by setting the header extension bits to 1. Furthermore, the number of 16-bit words included in the header extension is indicated in the extension KE of the header RTPH or in the header extension Additionally, a piece of data packet type information or a payload type PT according to the RTP may be indicated in the key information si1 . . . n provided for transmission, which defines a data packet as a data packet dp with inserted key information. For this, a payload type PT should be selected or specified, which is not used in the standard data packets, and data packets with the selected payload type PT will be discarded during standard transmissions. This means that in this version, no user information or payload may be inserted in the data packet dp.
  • In order to increase the security during transmission of data packets dp with key information si1 . . . n, the data packets dp1 or the key information si1 . . . n contained in them may be additionally encrypted. Additional key information is needed for this, and it is generated using a public key spublic and a private key spriv. In this case, the public key spub for the additional encryption is provided in the key unit SE in the Gateway GW and is sent to the transmission unit UE for encryption of the data packets dp or the key information si1 . . . n contained in them, shown in FIG. 1 as an arrow marked spub. The private key spriv is provided to the diagnosis unit DE by the decryption unit EE and is used to decrypt the additional encrypted data packets dp or key information si1 . . . n, shown in FIG. 1 by the designation spriv in the decryption unit EE.
  • Subsequently, the key information si1 . . . n will be inserted in the extension KE of the header RTPH or the extension header of the data packets of the respective data streams ds1 . . . n.
  • The data streams sds1 . . . n containing key data packets si1 . . . n are transmitted over the LAN to the IP endpoint IP-E. A diagnosis unit DE connected to the LAN is provided for the purpose of diagnosing or analyzing the data streams sds1 . . . n. So that the data streams sds1 . . . n containing the key information si1 . . . n can be analyzed, the encrypted data streams sds1 . . . n must be decrypted. As explained previously, for each encrypted data stream ds1 . . . n, the key information si1 . . . n needed for decryption is necessary. Since according to the invention, the data packets dp that contain the key information si1 . . . n are inserted in the data streams sds1 . . . n, the diagnostics unit DE uses a monitoring unit UEE to search, read, and store data packets dp in the respective data streams ds1 . . . n that indicate an extension KE of the header RTPH or a header extension. Additionally, data packets dp with key information si1 . . . n can also be detected by the payload type PT.
  • In the data streams psd1 . . . n from the respective extensions KE of the header RTPH or header extension of the detected data packet dp, the key information si1 . . . n will be selected and stored, after which the key information si1 . . . n can be removed from the extensions KE of the header RTPH or the header extensions. Additionally, the extension of the headers RTPH can be reset by inserting suitable information in the header. Together with the respective key information si1 . . . n, a piece of information i(ds1 . . . n) from the extensions KE of the headers RTPH must be found and stored, to determine for which of the data streams ds1 . . . n the key information si1 . . . n for decryption is provided.
  • Both the encrypted data streams ds1 . . . n and the selected key information si1 . . . n are transferred to a decryption unit EE. In it the respective key information si1 . . . n, i.e., the decryption information and the information i(ds1 . . . n), is used to decrypt the encrypted data streams sds1 . . . n. After decryption, the unencrypted data streams ds1′ . . . n′ are ready for diagnosis or analysis in the diagnosis unit DE.
  • Preferentially or optionally, the diagnosis unit DE is provided with a recording unit REC inserted between the LAN and the diagnosis unit DE, in which the data streams sds1 . . . n can be recorded. Key information si1 . . . n can then be selected and recorded data streams sds1 . . . n analyzed or diagnosed at a later time; they can be recorded at night, for example, and diagnosed later during the day. Alternatively, the recording unit REC can also be inserted after the encrypted data streams sds1 . . . n are decrypted—not shown—so that the data streams ds1′ . . . n′ are unencrypted when readied for diagnosis or analysis.
  • FIG. 2 shows the protocol structure of a data packet dp, in which a piece of key information si1 . . . n is inserted. The data packet dp is generated according to the standard RTP and includes a RTPH heading portion according to RFC 3550—known as a header in the industry—and a RTPP usable portion known as the payload. The RTP is embedded in a UDP, whose header UDPH is added into the RTP header RTPH. Because an IP-based transmission is involved, the UDP is packed into an IP protocol IPP, to which an IP header IPH is added. When there is a transmission over the LAN, especially an Ethernet LAN, the corresponding protocol element is still referenced—shown only partially for clarity.
  • In the header RTPH of the RTP, the information on the extension KE of the header RTPH presents an important piece of information for the invented method. For this, an x-bit is provided according to the RTP standard, whereby the setting x-bit=1 shows the header extension, designated as xBit=1 in FIG. 2. Additionally, a piece of information on the payload type PT can be inserted, designated with the label PT in FIG. 2. The payload type PT used is designated in the RTP, but no payload type PT is assigned to it. A payload type PT of “19” is defined in the standardization phase, but it is later designated as unused and then as “reserved.” Therefore, to designate an RTP data packet with key information si1 . . . n, the use of payload type 19 is preferred. For the additional use of a payload type PT, no user information 1 may be inserted in the payload RTPP, since data packets dp generated this way will be discarded by the receiving component during standard transmissions.
  • The extension KE of the header PTRH or the header extension is positioned in the standardized RTP header RTPH according to FIG. 3 wherein the numbering 0 . . . 31 represents one bit.
  • According to FIG. 3, the x-bit shows the header extension KE, i.e., an x-bit=1 indicates that the header PTRH of a data packet is extended. The scope of the extension is indicated by the number of 16-bit fields in the header extension field. The key information si1 . . . n for the respective data stream ds1 . . . n is inserted in the extension header KE, and FIG. 4 shows the key information si used for decryption according to the standardized SRTP, wherein the numbering 0 . . . 9 represents one bit.
  • The information in FIG. 3 has the following meaning according to SRTP Standard.
  • Version:
  • Version of the tracebeacon.
  • BeaconType: In
  • Content of the tracebeacon.
  • F:
  • Indicate if the lengths of the variable fields is fixed to their maximum values (the lengths are fixed if F==1).
  • Rsv:
  • Reserved bits.
  • NbCtx:
  • Indicates the number of contexts contained in the packet. A context is an association between a direction (Tx/Rx) and an SSRC. It has been judged that a maximum of 15 contexts should suffice for the current purposes.
  • NbKeys:
  • Indicates the number of keys contained in the packet.
  • SCIAuthTagLen:
  • The lengths of the authentication tag appended to the tracebeacon. This length will always be zero for now as the authentication is not expected to be used in the short-term.
  • KEK SPI Len:
  • Length in bytes of the SPI needed to retrieve the key that encrypted the KEK. This length can be zero if the Encrypted KEK is not present in the tracebeacon.
  • Encrypted KEK Length:
  • Length of the symmetric key encrypted using RSA, in bytes. This length can be zero if the tracebeacon does not contain this key. Since the Encrypted KEK can be the longest part of the tracebeacon, sending the Encrypted KEK in, say, one tracebeacon out of two can result in appreciable gains in the average size of the tracebeacons sent.
  • Contexts:
  • Configuration information for the contexts (see the next diagrams).
  • Keys:
  • Configuration information for the keys (see the next diagrams).
  • Encrypted KEK:
  • Symmetric key encrypted using RSA. This field to 256 bytes when the public key has 204 bits and does not need to end on a 32 bits boundary. This field is also optional as it can have a length of zero
  • KEK SPI:
  • Identifier that allows to retrieve the key needed to decrypt the KEK. In your case this field corresponds to a Certification Id. This field does not need to end on a 32 bits boundary. Like the Encrypted KEK this field is optional, as it can have a length of zero.
  • SCI Authentication Tag:
  • The authentication tag of the tracebeacon. The authenticated portion of the tracebeacon will be the first eight bytes, the contexts and keys section. This field is optional, as the authentication tag length can be zero. It is indeed not expected to be present for this version. of the tracebeacon.
  • Using the previously described key information si1 . . . n according to the standardized SRTP, the encrypted data streams ds1 . . . n are decrypted, i.e. transformed back into the original data streams ds1′ . . . n′. The data streams ds1′ . . . n′ can be processed in the diagnosis unit DE using the implemented diagnosis routines—not shown.

Claims (17)

1-12. (canceled)
13. A method for decrypting at least one encrypted data stream containing data packets in which a first data stream is data-stream-specifically generated and data-stream-specifically encrypted according to a network protocol for encrypting and transmitting data streams, comprising:
providing the network protocol defining an extendable header for the data packets;
a first component of a communication arrangement generating key information data-stream-specifically;
the first component inserting the key information into the extendable header of a data packet of the first data stream;
the first component transmitting the data packet of the first data stream to a second component of the communication arrangement via a network connection;
a diagnosis unit recording the data packet of the first data stream;
the diagnosis unit selecting the key information from the header of the received data packet of the first data stream; and
the diagnosis unit decrypting the data packet of the first data stream using the key information from the header.
14. The method of claim 13 wherein the network protocol with the defined extendable header is a standardized network protocol according to RFC Standard 3550 or 1889, and wherein the first data stream is encrypted according to the Secured Real Time Protocol.
15. The method of claim 13 comprising providing as the data packet type for the data packets having the key information within the extendable header of the data packets an unused data packet type.
16. The method of claim 13 comprising continuously generating data-stream-specific key information in the data packets of the first data stream and inserting the generated data-stream-specific key information within the header of the data packets of first data stream.
17. The method of claim 13 comprising encrypting the key information with key encryption related information, the key encryption related information provided for at least one of analysis, diagnostics, and a recording.
18. The method of claim 17, comprising representing the key encryption related information as an asymmetrical piece of key information so that a piece of key information is provided for encrypting the key information that is different than that used to encrypt the data packet of the first data stream.
19. The method of claim 13 comprising activating and subsequently deactivating the data-stream-specific insertion of key information for at least one of analysis, diagnosis, and recording of the data streams.
20. The method of claim 13 wherein the data packet is structured so that there is no payload data within the data packet and the data packet is discarded after receipt by a data receiver that is compliant with the network protocol such that the data receiver does not read the data packet.
21. The method of claim 20 wherein the second component comprises the data receiver.
22. The method of claim 13 wherein the generation of the key information and the insertion of the key information is enabled only during diagnostics of the first data stream.
23. An arrangement for decrypting at least one encrypted data stream containing data packets in which a data stream is data-stream-specifically generated and data-stream-specifically encrypted according to a network protocol for encrypting and transmitting data streams, comprising:
a diagnosing unit having memory, a recording unit, a monitoring unit and a decryption unit;
the recording unit recording a first data packet of an encrypted data stream from a first component of a network via a network connection, the encrypted data stream being directed to a second component of the network, the first data packet having an extended header in which key information for encrypting the first data packet was inserted, the key information being generated data stream specifically;
the monitoring unit searching data packets recorded by the recording unit and storing the first data packet upon a determination that the extended header of the first data packet included the key information;
the decryption unit decrypting the first data packet based upon the key information within the extended header of the first data packet, the first data packet being decrypted so that the first data packet is diagnosable or analyzable.
24. The arrangement of claim 23 wherein the monitoring unit and the decryption unit are integrated.
25. The arrangement of claim 23 wherein the monitoring unit searches data packets recorded by the recording unit to determine whether any of the recorded data packets has an extended header that is extended in accordance with the network protocol.
26. The arrangement of claim 23 wherein the key information is encrypted within the first data packet and the first data packet and the decryption unit has a private key usable to decrypt the encrypted key information prior to using the decrypted key information to decrypt the first data packet.
27. The arrangement of claim 23 wherein the diagnosis unit decrypts the key information via the private key.
28. The arrangement of claim 23 wherein the network protocol with the defined extendable header is based on a standardized network protocol according to RFC Standard 3550 or 1889, and wherein the first data packet is encrypted according to the Secured Real Time Protocol.
US13/772,679 2007-08-30 2013-02-21 Method for analyzing coded data streams simultaneously transmitted in ip networks Abandoned US20130185554A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US13/772,679 US20130185554A1 (en) 2007-08-30 2013-02-21 Method for analyzing coded data streams simultaneously transmitted in ip networks

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
DE102007041143.1 2007-08-30
DE102007041143A DE102007041143B4 (en) 2007-08-30 2007-08-30 Method for analyzing concurrently transmitted, encrypted data streams in IP networks
PCT/EP2008/058552 WO2009030539A1 (en) 2007-08-30 2008-07-03 Method for analyzing coded data streams simultaneously transmitted in ip networks
US67533310A 2010-02-25 2010-02-25
US13/772,679 US20130185554A1 (en) 2007-08-30 2013-02-21 Method for analyzing coded data streams simultaneously transmitted in ip networks

Related Parent Applications (2)

Application Number Title Priority Date Filing Date
PCT/EP2008/058552 Continuation WO2009030539A1 (en) 2007-08-30 2008-07-03 Method for analyzing coded data streams simultaneously transmitted in ip networks
US67533310A Continuation 2007-08-30 2010-02-25

Publications (1)

Publication Number Publication Date
US20130185554A1 true US20130185554A1 (en) 2013-07-18

Family

ID=39767189

Family Applications (2)

Application Number Title Priority Date Filing Date
US12/675,333 Active 2030-02-14 US8478994B2 (en) 2007-08-30 2008-07-03 Method for analyzing coded data streams simultaneously transmitted in IP networks
US13/772,679 Abandoned US20130185554A1 (en) 2007-08-30 2013-02-21 Method for analyzing coded data streams simultaneously transmitted in ip networks

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US12/675,333 Active 2030-02-14 US8478994B2 (en) 2007-08-30 2008-07-03 Method for analyzing coded data streams simultaneously transmitted in IP networks

Country Status (6)

Country Link
US (2) US8478994B2 (en)
EP (1) EP2204013B1 (en)
CN (1) CN101843040B (en)
CA (1) CA2697926C (en)
DE (1) DE102007041143B4 (en)
WO (1) WO2009030539A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150180944A1 (en) * 2013-12-23 2015-06-25 Vection Technologies Inc. Highly efficient and parallel data transfer and display
US9910561B2 (en) 2013-12-23 2018-03-06 Vection Technologies Inc. Highly efficient and parallel data transfer and display with geospatial alerting
US10075721B2 (en) 2010-05-14 2018-09-11 Samsung Electronics Co., Ltd. Method and apparatus for encoding video signal and method and apparatus for decoding video signal

Families Citing this family (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8260877B2 (en) 2008-12-31 2012-09-04 Apple Inc. Variant streams for real-time or near real-time streaming to provide failover protection
US8578272B2 (en) 2008-12-31 2013-11-05 Apple Inc. Real-time or near real-time streaming
US8156089B2 (en) 2008-12-31 2012-04-10 Apple, Inc. Real-time or near real-time streaming with compressed playlists
US8099473B2 (en) 2008-12-31 2012-01-17 Apple Inc. Variant streams for real-time or near real-time streaming
BRPI0923917B1 (en) * 2008-12-31 2021-05-25 Apple Inc MACHINE IMPLEMENTED METHOD, MACHINE-READABLE, NON TRANSIENT STORAGE MEDIUM, AND DATA PROCESSING SYSTEM FOR CONTINUOUS TRANSMISSION IN REAL-TIME OR NEAR REAL-TIME
US8560642B2 (en) 2010-04-01 2013-10-15 Apple Inc. Real-time or near real-time streaming
US8805963B2 (en) 2010-04-01 2014-08-12 Apple Inc. Real-time or near real-time streaming
GB201105502D0 (en) 2010-04-01 2011-05-18 Apple Inc Real time or near real time streaming
TWI451279B (en) 2010-04-07 2014-09-01 Apple Inc Content access control for real-time or near real-time streaming
US8856283B2 (en) 2011-06-03 2014-10-07 Apple Inc. Playlists for real-time or near real-time streaming
US8843586B2 (en) 2011-06-03 2014-09-23 Apple Inc. Playlists for real-time or near real-time streaming
CN105471831B (en) * 2014-09-15 2019-05-10 杭州海康威视数字技术股份有限公司 The method and apparatus that a kind of pair of Realtime Transport Protocol data packet is encrypted
AU2018231407B2 (en) * 2017-03-08 2023-02-16 Hitachi Energy Ltd Methods and devices for providing cyber security for time aware end-to-end packet flow networks

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020025045A1 (en) * 2000-07-26 2002-02-28 Raike William Michael Encryption processing for streaming media
US20020105911A1 (en) * 1998-11-24 2002-08-08 Parag Pruthi Apparatus and method for collecting and analyzing communications data
US20030200176A1 (en) * 2002-04-18 2003-10-23 International Business Machines Corporation Method, system and program product for attaching a title key to encrypted content for synchronized transmission to a recipient
US20050135419A1 (en) * 2003-09-09 2005-06-23 Broadcom Corporation Downstream synchronous multichannels for a communications management system
US20070115832A1 (en) * 2005-11-21 2007-05-24 Cisco Technology, Inc. System and method for facilitating network performance analysis

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6453345B2 (en) * 1996-11-06 2002-09-17 Datadirect Networks, Inc. Network security and surveillance system
US6931531B1 (en) * 1998-09-02 2005-08-16 Matsushita Electric Industrial Co., Ltd. Image object recording, compression, and encryption method and system
NZ506002A (en) 2000-07-26 2003-01-31 Rpk New Zealand Ltd Encryption processing for streaming media by assigning tag value, creating packet key, encrypting data and adding tag value
WO2002029579A1 (en) * 2000-10-03 2002-04-11 Netagent Co. Ltd Communication information recorder
US7050583B2 (en) * 2001-03-29 2006-05-23 Etreppid Technologies, Llc Method and apparatus for streaming data using rotating cryptographic keys
US7242681B1 (en) * 2002-05-17 2007-07-10 Sandstorm Enterprises, Inc. System and method for intercepting and authenticating packets during one or more communication sessions and automatically recognizing content
US20050183120A1 (en) * 2004-01-13 2005-08-18 Saurabh Jain Multi-user personalized digital multimedia distribution methods and systems
JP2005210193A (en) * 2004-01-20 2005-08-04 Matsushita Electric Works Ltd Common secret key generating device
BRPI0508922A (en) 2004-03-18 2007-08-14 Qualcomm Inc efficient transmission of cryptographic information in secure real-time protocol
CN1735008A (en) * 2004-08-13 2006-02-15 华为技术有限公司 Method for intercommunicating to encryption network and encryption gateway bureau

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020105911A1 (en) * 1998-11-24 2002-08-08 Parag Pruthi Apparatus and method for collecting and analyzing communications data
US20020025045A1 (en) * 2000-07-26 2002-02-28 Raike William Michael Encryption processing for streaming media
US20030200176A1 (en) * 2002-04-18 2003-10-23 International Business Machines Corporation Method, system and program product for attaching a title key to encrypted content for synchronized transmission to a recipient
US20050135419A1 (en) * 2003-09-09 2005-06-23 Broadcom Corporation Downstream synchronous multichannels for a communications management system
US20070115832A1 (en) * 2005-11-21 2007-05-24 Cisco Technology, Inc. System and method for facilitating network performance analysis

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10075721B2 (en) 2010-05-14 2018-09-11 Samsung Electronics Co., Ltd. Method and apparatus for encoding video signal and method and apparatus for decoding video signal
US20150180944A1 (en) * 2013-12-23 2015-06-25 Vection Technologies Inc. Highly efficient and parallel data transfer and display
US9665267B2 (en) * 2013-12-23 2017-05-30 Vection Technologies Inc. Highly efficient and parallel data transfer and display
US9910561B2 (en) 2013-12-23 2018-03-06 Vection Technologies Inc. Highly efficient and parallel data transfer and display with geospatial alerting

Also Published As

Publication number Publication date
CN101843040B (en) 2013-07-17
US20100313015A1 (en) 2010-12-09
CA2697926C (en) 2017-08-22
WO2009030539A1 (en) 2009-03-12
DE102007041143B4 (en) 2010-04-08
DE102007041143A1 (en) 2009-03-05
EP2204013B1 (en) 2018-11-28
EP2204013A1 (en) 2010-07-07
CN101843040A (en) 2010-09-22
US8478994B2 (en) 2013-07-02
CA2697926A1 (en) 2009-03-12

Similar Documents

Publication Publication Date Title
US8478994B2 (en) Method for analyzing coded data streams simultaneously transmitted in IP networks
US8380986B2 (en) Method for analyzing simultaneously transmitted, encoded data streams
US7308101B2 (en) Method and apparatus for transporting encrypted media streams over a wide area network
US8918691B2 (en) Processing transport packets
US8949592B2 (en) System and methods for providing live streaming content using digital rights management-based key management
US7710978B2 (en) System and method for traversing a firewall with multimedia communication
US10826876B1 (en) Obscuring network traffic characteristics
US10630656B2 (en) System and method of encrypted media encapsulation
US7426636B1 (en) Compact secure data communication method
Mattsson et al. Authentication key recovery on galois/counter mode (GCM)
CA2619811C (en) Signal watermarking in the presence of encryption
US20170331798A1 (en) Encrypted-bypass webrtc-based voice and/or video communication method
CN114826748B (en) Audio and video stream data encryption method and device based on RTP, UDP and IP protocols
KR101457455B1 (en) Apparatus and method for data security in cloud networks
Uberti et al. RFC 9335: Completely Encrypting RTP Header Extensions and Contributing Sources
EP3544253B1 (en) Acquisition of files from an srtp-stream
JP2017060083A (en) Communication device and encryption communication method
JP4636896B2 (en) STREAM DATA REPRODUCING DEVICE, STREAM DATA REPRODUCING PROGRAM, AND STREAM DATA REPRODUCING METHOD
Downs et al. RFC 6597: RTP Payload Format for Society of Motion Picture and Television Engineers (SMPTE) ST 336 Encoded Data
Downs et al. RTP Payload Format for Society of Motion Picture and Television Engineers (SMPTE) ST 336 Encoded Data
JP2006013664A (en) Data transfer method

Legal Events

Date Code Title Description
AS Assignment

Owner name: UNIFY GMBH & CO. KG, GERMANY

Free format text: CHANGE OF NAME;ASSIGNOR:SIEMENS ENTERPRISE COMMUNICATIONS GMBH & CO. KG;REEL/FRAME:034537/0869

Effective date: 20131021

AS Assignment

Owner name: SIEMENS ENTERPRISE COMMUNICATIONS GMBH & CO. KG, G

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:HARTMANN, SIEGFRIED;KRUMBOCK, JORG;SIGNING DATES FROM 20100224 TO 20100410;REEL/FRAME:035028/0063

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION