摘要:
A database encryption and query method keeping an order within a bucket partially, which encrypts and stores numeric data in a database, includes calculating a relative value of a plaintext within a bucket to which the plaintext is allocated; generating a first key value by producing a random number within the bucket; generating a second key value for defining a function having a bucket range of the bucket as an input; and changing the relative value based on the first and the second key value with keeping an order of the relative value partially to store the changed relative value. The first key value may be a value of separating order informations on the relative value. Further, the second key value may be a resultant value obtained by applying a mod 2 operation to the bucket size of the bucket.
摘要:
An SVC encryption apparatus includes: an encoding/encryption unit for performing SVC (Scalable Video Coding) encoding on input data contents and carrying out encryption for data in accordance with a first encryption condition to generate a corresponding SVC bitstream; and a NAL (Network Adaptation Layer) data analysis unit for analyzing NAL data of the generated SVC bitstream to find out NAL data satisfying a second encryption condition. Further, the SVC encryption apparatus includes a conditional NAL data encryption unit for encrypting the extracted NAL data in accordance with the second encryption condition; and a bitstream transmitting unit for transmitting the SVC bitstream with encrypted NAL data.
摘要:
A security label generation apparatus for scalable content distribution, includes a scalable content transmitter for receiving service level requirements of a user and network bandwidth information over a network and generating security labels and encrypted scalable units. Further, the security label generation apparatus includes a scalable content receiver for receiving the encrypted scalable units and the security labels from the scalable content transmitter and for decrypting, decoding, playing, modifying, storing or redistributing the encrypted scalable units based on the security labels. Furthermore, the security label generation apparatus includes scalable content storage for searching for scalable content and metadata corresponding to a request of the scalable content transmitter.
摘要:
An encryption method for providing layered access control for scalable media includes encrypting the scalable media using different encryption keys for respective layers of the scalable media to create a protected content; providing the protected content to a first user terminal; selectively inserting part or all of the encryption keys into a key area of a right object based on the grade of the first user terminal to generate a first right object; and providing the first right object to the first user terminal.
摘要:
A content sharing method performed in a content redistribution device based on a non-realtime IPTV service includes transmitting a secret key in password information of a user of the content redistribution device to an IPTV service server and storing a public key corresponding to the secret key; and transmitting an event message for content request to the IPTV service server to request a non-realtime IPTV service. Further, the content sharing method includes receiving contents requested in the event message for content requesting from the IPTV service server; and decoding the received contents and encrypting the decoded contents using the public key. Furthermore, the content sharing method includes transmitting the contents encrypted using the public key to content recipient devices; and generating an event message for content sharing using the public key to transmit the generated event message to the content recipient devices.
摘要:
An adaptive security policy based scalable video service apparatus includes a video streaming server, an adaptive security policy server and a terminal. The video streaming server receives a service demand via a network and generates an encrypted streaming data. The adaptive security policy server analyzes a media structure and the service demand, by using a service profile received from the video streaming server, so as to generate a security policy description. The terminal generates and transmits the service demand to the video streaming server or the adaptive security server, obtains the encrypted streaming data from the video streaming server and decrypts the encrypted streaming data for playback, storing and retransmission.