Browse Prior Art Database

MULTI-MEDIA ENCRYPTION FOR THE VIDEO-CONFERENCING ENVIRONMENT

IP.com Disclosure Number: IPCOM000007359D
Original Publication Date: 1995-Mar-01
Included in the Prior Art Database: 2002-Mar-19
Document File: 2 page(s) / 108K

Publishing Venue

Motorola

Related People

Dave Gustafson: AUTHOR

Abstract

This describes a layered security environment to support multiple encryption algorithms along with file encryption and digital signature features for video teleconferencing. These are important to the secu- rity of voice, data, video, and fax information which are at the core of multi-media products entering the market today.

This text was extracted from a PDF file.
At least one non-text object (such as an image or picture) has been suppressed.
This is the abbreviated version, containing approximately 50% of the total text.

Page 1 of 2

0 M

MOlOROLA Technical Developments Volume 24 March 1995

MULTI-MEDIA ENCRYPTION FOR THE VIDEO-CONFERENCING ENVIRONMENT

by Dave Gustafson

  This describes a layered security environment to support multiple encryption algorithms along with file encryption and digital signature features for video teleconferencing. These are important to the secu- rity of voice, data, video, and fax information which are at the core of multi-media products entering the market today.

  The environment in which multi-media exists is mainly desktop computers where there are many user applications, user tiles, and add on hardware
(i.e. video conference cards, fax/modem cards, etc.) to either local area network (LAN) or the public switched telephone network (PSTN). This environ- ment allows a higher degree of compromise if there are only portions of the information or applications which are encrypted. The entry points in/out of the desktop computer must all be secured in a similar way in order to co-ordinate a simple user Friendly security application.

  Multi-Media encryption for thevideo-conferenc- ing environment is facilitated by end to end encryption, file encryption, and digital signatures. These security attributes are desirably built into layers which provide transparency to the user from physi- cal token cards which the user can insert and remove from their machine and to background software Cmc- tions which automatically encrypt files. The secu- rity layers provide security for the communications medium, the tiles (or portions thereof), and access to the computer.

  The diagram attached shows desktop computers 10, 11 which each contain video-conferencing hard- ware and software. Each of the computes has multi- ple layers of security which is diagrammed in the figure below:

  The layers shown in the diagram represent func- tions which are achieved by both hardware and sofl- ware means. The layers are described as:

0 Molorola.lnc. ,995

  Layer 1 provides real-time encryption 51, ofvideo and audio embedded into a frame structure (SO) for transport over c...