Browse Prior Art Database

Encryption in a Distributed Real-Time Communication System

IP.com Disclosure Number: IPCOM000116465D
Original Publication Date: 1995-Sep-01
Included in the Prior Art Database: 2005-Mar-30
Document File: 2 page(s) / 40K

Publishing Venue

IBM

Related People

Aldred, BK: AUTHOR [+3]

Abstract

Secure data transmission is necessary in many applications of communications systems. In such a system for providing distributed real-time multimedia communications data is mapped to physical communications links by multiplexing data from a number of streams. Such data will typically include data from logical channels allocated to applications which have specified quality of service parameters to be associated with their allocated channels.

This text was extracted from an ASCII text file.
This is the abbreviated version, containing approximately 88% of the total text.

Encryption in a Distributed Real-Time Communication System

      Secure data transmission is necessary in many applications of
communications systems.  In such a system for providing distributed
real-time multimedia communications data is mapped to physical
communications links by multiplexing data from a number of streams.
Such data will typically include data from logical channels allocated
to applications which have specified quality of service parameters to
be associated with their allocated channels.

      In the system described here, when a channel is created, one of
the quality of service parameters is related to encryption.  By this
means an application can, on a per channel basis, ensure that data
encryption is used for all data being transmitted down that channel.
The quality of service parameter identifies an encryption routine by
specifying a keyword in the {encryption} section of the quality of
service profile.  When data is to be sent down such a channel, e.g.,
SendData, a CIPHER_KEY_REQUEST event is raised to the port event
handler for that channel requesting the completion of a cipher_block.
This provides the encryption routine with the encryption key and also
allows the option of requiring the CIPHER_KEY_REQUEST event to be
raised for each subsequent data block down that channel.  This
facility therefore allows dynamic encryption keys, changed on a data
block basis.

      Data receipt at the destination port behaves in a analogous way
wit...