Cryptography – Communication system using cryptography – Symmetric key cryptography
Reexamination Certificate
2008-05-06
2008-05-06
Zia, Syed A. (Department: 2131)
Cryptography
Communication system using cryptography
Symmetric key cryptography
C380S255000, C380S256000, C380S260000, C380S261000, C380S277000, C380S280000, C375S240120, C375S242000
Reexamination Certificate
active
09993947
ABSTRACT:
A method and an arrangement maintain end-to-end synchronization on a telecommunications connection transmitting data in frames substantially in real time and using synchronized end-to-end encryption, wherein at least a part of the telecommunications connection is a packet-switched connection, in which case the reproduction delay of the data to be transmitted can be increased by adding one or more extra frames to the frame string being transmitted, wherein the arrangement defines, based on the number of received frames, an initialization vector value corresponding to a frame received at the receiving end of the telecommunications connection and used in decrypting the frame, adjusts the reproduction delay to mark the frame to be added to increase the reproduction delay as an extra frame, and defines the initialization vector value to count only the frames not marked as extra frames in the number of received frames.
REFERENCES:
patent: 6091709 (2000-07-01), Harrison et al.
patent: 6658027 (2003-12-01), Kramer et al.
patent: 6922731 (2005-07-01), Morioka et al.
patent: 7076064 (2006-07-01), Relander et al.
patent: 2003/0202528 (2003-10-01), Eckberg
patent: 0 786 881 (1997-07-01), None
patent: 0 921 666 (1999-06-01), None
ETSI, “Radio Equipment and Systems (RES); Trans-European Trunked Radio (TETRA); Packet Data Optimzed (PDO); Part 1: General Network Design” Apr. 1996, ESTI. Doccument ID ETS 300 393-1.
Uhlirz, Markus. “Concept of a GSM-based Communication System for High-Speed Trains” 1994. IEEE.
Saltzer et al. “End-to-End Arguments in System Design,” Jun. 1983. ACM Transaction on Computer Systems, vol. 2, No. 4 Nov. 1984. pp. 277-288.
Newton, Harry. “Newton's Telecom Dictionary”. Mar. 2005. United Business Media. 21stEdition, pp. 105, 524.
Wikipedia. “Block cipher modes of operation” 2005, Wikipedia.org. http://en.wikipeda.org/wiki/Block—cipher—modes—of—operation.
Lipmaa, H., Rogaway, P., and Wagner, D., “Comments to NIST concerning AES Modes of Operation: CTR-Mode Encryption,” Manuscript, Oct. 2000. http://citeseer.ist.psu.edu/lipmaa00comments.html.
Samarakoon et al., “Encrypted Video Over Tetra,” IEEE Seminar on Tetra Market and Technology Developments, London, UK, Feb. 10, 2000, 5 pp.
Montgomery, “Techniques for Packet Voice Synchronization,” IEEE Journal on Selected Areas in Communication, Vo. SAC-1, No. 6, Dec. 1983, 1022-1028.
Kantola Raimo
Relander Rasmus
Barnes & Thornburg LLP
Eads Secure Networks Oy
Zia Syed A.
LandOfFree
Maintaining end-to-end synchronization on a... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Maintaining end-to-end synchronization on a..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Maintaining end-to-end synchronization on a... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3924322