Sending Secure Media Streams
First Claim
1. A method of sending a first secured media stream having a payload via an intermediate node, the method comprising:
- at the intermediate node, receiving from a sender the first secured media stream;
determining for the first secured media stream an end-to-end cryptographic context identifier and a hop-by-hop cryptographic context identifier, the hop-by-hop cryptographic context identifier relating to the intermediate node and the end-to-end cryptographic identifier relating to the sender;
generating a second secured media stream, the second secured media stream including at least the payload of the first secured media stream and the cryptographic context identifiers to identify the first secured media stream;
sending the second secured media stream to a receiving node; and
sending the cryptographic context identifiers to the receiving node, the cryptographic context identifiers being usable by the receiving node to recover the first secured media stream.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and apparatus for sending a first secured media stream having a payload via an intermediate node. The intermediate node receives from a sender the first secured media stream. An end-to-end context identifier and a hop-by-hop context identifier are determined for the first secured media stream, where the hop-by-hop context identifier relates to the intermediate node and the end-to-end identifier relates to the sender. A second secured media stream is generated, which includes at least the payload of the first secured media stream and the context identifiers to identify the first secured media stream. The second secured media stream is sent to a receiving node, and the context identifiers are also sent to the receiving node. The context identifiers are usable by the receiving node to recover the first secured media stream.
21 Citations
15 Claims
-
1. A method of sending a first secured media stream having a payload via an intermediate node, the method comprising:
-
at the intermediate node, receiving from a sender the first secured media stream; determining for the first secured media stream an end-to-end cryptographic context identifier and a hop-by-hop cryptographic context identifier, the hop-by-hop cryptographic context identifier relating to the intermediate node and the end-to-end cryptographic identifier relating to the sender; generating a second secured media stream, the second secured media stream including at least the payload of the first secured media stream and the cryptographic context identifiers to identify the first secured media stream; sending the second secured media stream to a receiving node; and sending the cryptographic context identifiers to the receiving node, the cryptographic context identifiers being usable by the receiving node to recover the first secured media stream. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. An intermediate node for use in a communication network, the intermediate node comprising:
-
a receiver for receiving from a sender a first secured media stream; a first context determining function for determining for the first secured media stream an end-to-end cryptographic context identifier and a hop-by-hop cryptographic context identifier, the hop-by-hop cryptographic context identifier relating to the intermediate node and the end-to-end cryptographic identifier relating to the sender; a processing function for generating a second secured media stream, the second secured media stream including at least the payload of the first secured media stream and the cryptographic context identifiers to identify the first secured media stream; a first transmitting function for transmitting the second secured media stream to a receiving node; and a second transmitting function for transmitting the cryptographic context identifiers to the receiving node, the cryptographic context identifiers being usable by the receiving node to recover the secured media stream. - View Dependent Claims (11)
-
-
12. A receiving node for receiving a multiplexed secured media stream derived from a plurality of secured media streams, the receiving node comprising:
-
a first receiver for receiving an end-to-end cryptographic context identifier and a hop-by-hop cryptographic context identifier, the end-to-end cryptographic context identifier relating to a sender, the hop-by-hop cryptographic context identifier relating to an intermediate node between a media data source and a receiver node, the cryptographic context identifiers used for multiplexing the plurality of secured media streams to identify those portions of the secured multiplexed media stream relating to each media stream; a second receiver for receiving the secured multiplexed media stream; a processor for using the cryptographic context identifiers to demultiplex the secured multiplexed media stream.
-
-
13-14. -14. (canceled)
-
15. A computer program product for sending a first secured media stream having a payload via an intermediate node, the computer program product comprising a computer readable storage medium having computer readable program code embodied in the medium, the computer readable program code comprising:
-
computer readable program code configured to receive from a sender the first secured media stream at the intermediate node; computer readable program code configured to determine for the first secured media stream an end-to-end cryptographic context identifier and a hop-by-hop cryptographic context identifier, the hop-by-hop cryptographic context identifier relating to the intermediate node and the end-to-end cryptographic identifier relating to the sender; computer readable program code configured to generate a second secured media stream, the second secured media stream including at least the payload of the first secured media stream and the cryptographic context identifiers to identify the first secured media stream; computer readable program code configured to send the second secured media stream to a receiving node; and computer readable program code configured to send the cryptographic context identifiers to the receiving node, the cryptographic context identifiers being usable by the receiving node to recover the first secured media stream.
-
Specification