CN202475692U - Security chip-based secret key management system and terminal device - Google Patents

Security chip-based secret key management system and terminal device Download PDF

Info

Publication number
CN202475692U
CN202475692U CN2012200764721U CN201220076472U CN202475692U CN 202475692 U CN202475692 U CN 202475692U CN 2012200764721 U CN2012200764721 U CN 2012200764721U CN 201220076472 U CN201220076472 U CN 201220076472U CN 202475692 U CN202475692 U CN 202475692U
Authority
CN
China
Prior art keywords
key
content
module
product
once
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn - After Issue
Application number
CN2012200764721U
Other languages
Chinese (zh)
Inventor
王天星
卢增祥
王文军
李伟东
柯发敏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Shibo Digital TV Technology Co Ltd
Original Assignee
Beijing Shibo Digital TV Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Shibo Digital TV Technology Co Ltd filed Critical Beijing Shibo Digital TV Technology Co Ltd
Priority to CN2012200764721U priority Critical patent/CN202475692U/en
Application granted granted Critical
Publication of CN202475692U publication Critical patent/CN202475692U/en
Anticipated expiration legal-status Critical
Withdrawn - After Issue legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The utility model discloses a security chip-based secret key management system and a terminal device. The security chip-based secret key management system comprises a front end encryption system and a terminal device, wherein the front end encryption system comprises a scrambling module, an encrypting module, a security key management module and a sending module; the scrambling module is used for producing a content security key and scrambling a program content, the security key management module is used for managing a hierarchical security key, the encrypting module is used for carrying out hierarchical security key encryption on the scrambling data into ciphertext data, and the ciphertext data are sent to the terminal device through the sending module; the terminal device comprises a receiving module, a deciphering module, a security chip and a playing module; and the receiving module is used for receiving the ciphertext data, the deciphering module carries out preliminary deciphering to obtain a deciphered content security key, the deciphered content security key is deciphered and descrambled in the security chip to obtain the program content, and the program content is played by the playing module. According to the technical scheme of the utility model, the content secret key is prevented from being leaked and shared, thus the safety and the reliability of the system are improved.

Description

A kind of key management system and terminal equipment based on safety chip
Technical field
The utility model relates to the key encryption and decryption technology in the digital TV field content protective system, relates in particular to a kind of key management system and terminal equipment based on safety chip.
Background technology
In order to reach the purpose of safe storage and transmission, key is widely used in every field, and layering cipher key has played important function to preventing that content from illegally being usurped.Layering cipher key is meant, under the multilayer key cryptosystem, media content is through the content key encryption of the bottom, and the key of other levels all is used for encrypting its one deck or which floor key down down, and the key of top layer is the core of whole cipher key system.Encrypt data after the encryption is transferred to terminal equipment, and terminal equipment has only the acquisition use authority, decrypts content key; Again by after the content key decrypt media content; The user could normal viewing program, come the user is managed with this, prevent that content from illegally usurping.In this process, the control and the management of content key seemed particularly important, also be the core and the key of content protective system.
Fig. 1 (a) and Fig. 1 (b) be in the prior art digital TV receiving system through the sketch map of layering cipher key encryption and decryption.The middle front end encryption system of Fig. 1 (a) carries out layer by layer to programme content through content key (CW), session key (SK), product key (PK) and user key (UK), and encipherment protection sends to the terminal equipment deciphering; The front end scrambler produces content key and with this content key programme content is carried out scrambling; The front end encryption device utilizes session key that content key is once encrypted; Product key is once encrypted said session key; User key sends to terminal equipment after said product key is once encrypted; Wherein, the product key after once encrypting sends to terminal equipment with the form of Entitlement Management Message (EMM) packet, and the session key after once encrypting and encrypted content key send to terminal equipment with the form of Entitlement Control Message (ECM) packet.
Terminal equipment adopts smart card solution that programme content and key data after encrypting are deciphered among Fig. 1 (b).Terminal equipment comprises receiving element, decryption unit, descrambling unit, intelligent card unit and broadcast unit.Receiving element receives programme content and the key data of encrypting; Entitlement Control Message (ECM) packet that inserts in the ciphertext program stream data and Entitlement Management Message (EMM) packet are sent to decryption unit, and the ciphertext program stream data that will remove Entitlement Control Message (ECM) packet send to the descrambling unit; Decryption unit sends to smart card with Entitlement Control Message (ECM) packet and Entitlement Management Message (EMM) packet and receives the CW data of the ciphertext that smart card sends; Smart card is used for decrypt authorized information, from Entitlement Control Message (ECM) packet, obtains content key (CW); Smart card decrypts content key (CW) back and negotiates an interim session key with decryption unit; Use temporary key encrypted content key (CW) to send to decryption unit; Last decryption unit decrypts content key (CW) expressly, and (CW) delivers to the descrambling unit with this content key; The descrambling unit uses content key (CW) descrambling to go out expressly program stream; Broadcast unit is used for playing and display program, supplies the terminal use to watch.
Adopt the multilayer key code system; The mode that the use symmetric key combines with unsymmetrical key is encrypted media content successively, changes content key randomly, constantly adds the difficulty that cracks of strong encryption keys; Though can effectively improve the fail safe of media content; But for the decryption unit and descrambling unit of Fig. 1 (b) terminal equipment, content key (CW) is stored with mode expressly and is transmitted, and has read content key (CW) if in a single day the disabled user cracks from software, internal memory or the hardware pin of terminal equipment; The safety management of whole system is performed practically no function so, the hidden danger that exists content key illegally to be usurped.Therefore, need a kind of system, equipment or method that can prevent effectively that content key (CW) from leaking and quilt is shared, come key is managed, prevent that content from illegally being usurped.
The utility model content
In order to overcome defective of the prior art and deficiency, the utility model proposes a kind of system and terminal equipment that can prevent effectively that content key (CW) from leaking and quilt is shared, and key is managed.
The utility model discloses a kind of key management system based on safety chip, and this system comprises front end encryption system and terminal equipment, and said front end encryption system comprises scrambling module, encrypting module, key management module and sending module,
Scrambling module is used to produce content key and utilizes said content key that programme content is carried out scrambling;
Key management module is used for second product key, security chip key, session key and user key are managed;
Encrypting module utilizes session key that an encrypted content key is carried out superencipher after being used to utilize second product key that content key is once encrypted again; After utilizing security chip key that said second product key is once encrypted, utilize user key that second product key after once encrypting is carried out superencipher again;
Sending module is used for second product key of content key behind the superencipher and superencipher is sent to terminal equipment;
Said terminal equipment comprises receiver module, deciphering module, safety chip and playing module,
Receiver module is used to receive the programme content and the key data of encryption;
Deciphering module is used to utilize the user key and the session key that prestore respectively the content key of superencipher and second product key of superencipher to be deciphered with content key that obtains once to encrypt and second product key of once encrypting;
Safety chip comprises decryption unit and descrambling unit;
Wherein, Said decryption unit is used to receive second product key of said once encryption and the content key of once encrypting; Second product key that utilizes the security chip key deciphering once to encrypt; Utilize second product key that obtains to decipher the content key of once encrypting, and the content key that decrypts is sent the descrambling unit; The descrambling unit is used for according to said content key programme content being carried out descrambling;
Playing module is used for the broadcast program content.
Further; Said key management module also is used for first product key is managed; Encrypting module utilizes first product key that session key is once encrypted, and sends to terminal equipment after utilizing said user key that first product key is once encrypted.
Further; Second product key of said superencipher and first product key of once encrypting send to terminal equipment with Entitlement Management Message (EMM) data packet form, and the content key of a said encrypted session key and superencipher sends to terminal equipment with the form of Entitlement Control Message (ECM) packet.
Further, said deciphering module can be deciphered through software or smart card mode.
The utility model discloses a kind of key management terminal equipment based on safety chip, and said terminal equipment comprises receiver module, deciphering module, safety chip and playing module;
Receiver module is used to receive the programme content and the key data of encryption;
Deciphering module is used to utilize the user key and the session key that prestore respectively second product key of superencipher and the content key of superencipher to be deciphered with second product key that obtains once to encrypt and the content key of once encrypting; Wherein, Content key carries out encrypted secret key for being used for to programme content; Second product key of superencipher utilizes security chip key and twice encryption of user key to obtain by the front end encryption device, and the content key of superencipher utilizes second product key and twice encryption of session key to obtain by the front end encryption device;
Safety chip comprises decryption unit and descrambling unit;
Wherein, Said decryption unit is used to receive second product key of said once encryption and the content key of once encrypting; Utilize the security chip key of safety chip storage to decipher second product key of once encrypting; Utilize second product key that obtains to decipher the content key of once encrypting, and content key is sent the descrambling unit; The descrambling unit is used for according to said content key programme content being carried out descrambling;
Playing module is used for the broadcast program content.
Further, said safety chip and playing module adopt SMD connected mode.
The utility model is based on the key management system and the terminal equipment of safety chip, effectively prevented leaking and sharing of content key (CW), guaranteed content supplier, operator and user's interests.Simultaneously, based on customizable employing software scenario in the terminal of safety chip and smart card solution, make operation way more flexible; This scheme is simple to the requirement of safety chip in the terminal equipment, has saved system cost, has improved the operating efficiency and the reliability of system.
Description of drawings
Fig. 1 (a) is a key management system sketch map in the prior art;
Fig. 1 (b) is the structured flowchart of terminal equipment in the prior art;
Fig. 2 is the key management system block diagram based on safety chip of the utility model embodiment;
Fig. 3 is the sketch map based on the encrypting and decrypting flow process of the key management system of safety chip of the utility model embodiment;
Fig. 4 is the structured flowchart based on the terminal equipment of safety chip of the utility model embodiment;
Fig. 5 is the encryption and decryption flow chart based on the key management system of safety chip of the utility model embodiment.
Embodiment
By the technology contents that specifies the utility model, realized specifying purpose and effect below in conjunction with execution mode and conjunction with figs..
Fig. 2 is the key management system block diagram based on safety chip of the utility model embodiment.This system comprises front end encryption system and terminal equipment,
Said front end encryption system comprises scrambling module, encrypting module, key management module and sending module, and scrambling module is used to produce content key and utilizes said content key that programme content is carried out scrambling; Key management module is used for second product key, security chip key, first product key, session key and user key are managed; Encrypting module utilizes session key that an encrypted content key is carried out superencipher after being used to utilize second product key that content key is once encrypted again; After utilizing security chip key that said second product key is once encrypted, utilize user key that second product key after once encrypting is carried out superencipher again; Sending module is used for second product key behind content key behind the superencipher and the superencipher is sent to terminal equipment;
Said terminal equipment comprises receiver module, deciphering module, safety chip and playing module, and receiver module is used to receive the programme content and the key data of encryption; Deciphering module is used to utilize the user key and the session key that prestore respectively the content key of superencipher and second product key of superencipher to be deciphered with content key that obtains once to encrypt and two product keys of encrypting for the first time; Safety chip comprises decryption unit and descrambling unit; Wherein, Said decryption unit is used to receive second product key of said once encryption and the content key of once encrypting; Second product key that utilizes the security chip key deciphering once to encrypt; Utilize second product key that obtains to decipher the content key of once encrypting, and the content key that decrypts is sent the descrambling unit; The descrambling unit is used for according to said content key programme content being carried out descrambling; Playing module is used for the broadcast program content.
The front end encryption system is mainly used in and uses key that programme content is carried out encryption, simultaneously, if any demand, can also adopt DRM (Digital Rights Management, digital copyright management) technology that the copyright of program is controlled.
Fig. 3 is the sketch map based on the encrypting and decrypting flow process of the key management system of safety chip of the utility model embodiment.Referring to Fig. 3; The scrambling module of front end encryption system produces content key and uses this content key that programme content is carried out scrambling; Key management module is used for layering cipher key is managed, and said layering cipher key comprises session key, first product key, user key, second product key and security chip key.Wherein, the layering cipher key system adopts symmetry or asymmetric arithmetic according to the actual requirements, uses symmetry or unsymmetrical key to encrypt.The layering cipher key system that adopts among the utility model embodiment is specially:
Content key (Control Word, CW): claim control word again, be used to realize protection to programme content.Content key (CW) is used for the one or more basic stream of a program is added descrambling.After using content key (CW) scrambling programme televised live, the programme televised live that the terminal equipment that obtains this content key (CW) just can descrambling be protected by its.
Second product key (Product Key1, PK2): be used for protection, promptly be used for to content key (CW) encryption and decryption to content key (CW).After using second product key (PK2) encrypted content key (CW), obtain the content key (CW) of the terminal equipment deciphering of this second product key (PK2) by its protection.
Session key (Session Key, SK): be used for protection, promptly be used for to encrypted content key (CW ') encryption and decryption to encrypted content key (CW ').Use session key (SK) to encrypt encrypted content key (CW '), obtain the terminal equipment deciphering of this session key (SK) by the encrypted content key of its protection (CW ').
User key (User Key; UK): be used for first product key (PK1) and the protection of second product key after once encrypting (PK2 '); Said user key is not reproducible, unpredictable; User key is produced by the front end encryption system, and the user key (UK) that front end system produces is corresponding with ID (User ID), and user key (UK) is solidified when the smart card hair fastener in advance in the smart card of terminal equipment or terminal equipment obtains user key and storage through registration.After using user key (UK) to encrypt first product key (PK1), the user who obtains this user key (UK) just can decrypt first product key (PK1) by its protection; Simultaneously, use user key (UK) to encrypt second product key after once encrypting (PK2 ') after, the user who obtains this user key (UK) just can decrypt by second product key after the once encryption of its protection (PK2 ').
Security chip key (Device Signature Key, DSK): be used for the protection to second product key (PK2), solidify in advance in safety chip, is used for second product key (PK2) encryption and decryption by security chip key (DSK).After chip keys safe in utilization (DSK) was encrypted second product key (PK2), the user who obtains this security chip key (DSK) just can decrypt second product key (PK2) by its protection.
The front end encryption system adopts layering cipher key that programme content is carried out ciphering process; That is: utilize second product key (PK2) earlier to content key (CW) encrypt form once encrypt in same key (CW '); Second product key (PK2) encrypt to form second product key once encrypted (PK2 ') through security chip key (DSK), and second product key of once encrypting (PK2 ') is encrypted second product key that forms superencipher (PK2 ") through user key (UK); The said content key of once encrypting (CW ') is encrypted the content key that forms superencipher (CW ") through session key (SK); session key (SK) is encrypted through first product key (PK1) and formed encrypted session key (SK '), and first product key (PK1) is encrypted through user key (UK) and formed first product key once encrypted (PK1 '); Wherein, Second product key of superencipher (PK2 ") and first product key once encrypted (PK1 ') send to terminal equipment through the form of Entitlement Management Message (EMM) packet; simultaneously, and the content key of superencipher (CW ") and encrypted session key (SK ') send to terminal equipment through the form of Entitlement Control Message (ECM) packet.
Terminal equipment receives programme content and key data and the deciphering after encrypting; That is: terminal equipment receives programme content and the key data after encrypting; Entitlement Management Message (EMM, Entitled Manage Message) packet and Entitlement Control Message (ECM) packet are sent to deciphering module; Deciphering module receives Entitlement Management Message (EMM) packet and verifies; Distinguish second product key (PK2 ") of superencipher and first product key of once encrypting (PK1 ') and decipher through the user key of storage in advance; second product key that deciphering is once encrypted to second product key of superencipher (PK2 ") (PK2 '), deciphering obtains first product key to first product key once encrypted (PK1 '); Deciphering module receives Entitlement Control Message (ECM) packet and verifies; Distinguish content key (CW ") and encrypted session key (SK ') of superencipher and through deciphering; encrypted session key (SK ') is obtained session key (SK) with the deciphering of first product key, the content key of superencipher (CW ") is adopted the content key that session key (SK) deciphering once encrypted (CW '); The content key of second product key of once encrypting (PK2 ') and once encryption (CW ') is sent to safety chip; Safety chip solidifies security chip key (DSK) in decryption unit in advance and is used for that deciphering obtains second product key to second product key once encrypted (PK2 '); Second product key is used for that deciphering obtains content key to the content key of once encrypting (CW '); Content key sends to the descrambling unit through the escape way of safety chip; Programme content after the scrambling of descrambling unit obtains programme content expressly through the content key descrambling, and playing module is play programme content.
The terminal use deciphers programme content and the key data encrypted through the terminal equipment based on safety chip, plays thereby obtain programme content.Wherein, second product key (PK2) and content key (CW) are in the inner deciphering of safety chip, and second product key of superencipher, the content key of superencipher, session key (SK) and first product key (PK1) are in the outside deciphering of safety chip.
Referring to Fig. 4 is the structured flowchart based on the terminal equipment of safety chip of the utility model embodiment.Said terminal equipment comprises receiver module, deciphering module, safety chip and playing module, and wherein, receiver module is used to receive the programme content and the key data of encryption; Deciphering module is used to utilize the user key and the session key that prestore respectively second product key of superencipher and the content key of superencipher to be deciphered with second product key that obtains once to encrypt and the content key of once encrypting; Wherein, Content key carries out encrypted secret key for being used for to programme content; Second product key of superencipher utilizes security chip key and twice encryption of user key to obtain by the front end encryption device, and the content key of superencipher utilizes second product key and twice encryption of session key to obtain by the front end encryption device; Safety chip comprises decryption unit and descrambling unit; Wherein, Decryption unit is used to receive second product key of said once encryption and the content key of once encrypting; Utilize the security chip key of safety chip storage to decipher second product key of once encrypting, second product key deciphering that utilization obtains is the content key of encryption once, and content key is sent the descrambling unit; The descrambling unit is used for according to said content key programme content being carried out descrambling; Playing module is used for the broadcast program content.
In conjunction with the said system of Fig. 2; The receiver module of terminal equipment receives programme content and the key data of encrypting; The content key of second product key that earlier preliminary deciphering obtains once to encrypt in deciphering module (PK2 ') and once encryption (CW '); Second product key that to once encrypt then (PK2 ') and the content key once encrypted (CW ') send to safety chip; Finally the decryption unit by safety chip decrypts content key (CW), and content key (CW) sends to the descrambling unit through escape way scrambled data is carried out descrambling, wherein; Content key is equivalent in safety chip, transmit and preserve with the form of ciphertext between decryption unit and descrambling unit, has guaranteed the safety of content key.
In addition, safety chip in the terminal equipment and playing module adopt SMD connected mode, have prevented that effectively content key is by unauthorized theft.
In the terminal equipment based on safety chip; The encryption and decryption of safety chip is a precondition with the encryption and decryption of the outside deciphering module of safety chip; In deciphering module, Entitlement Control Message (ECM) packet and Entitlement Management Message (EMM) packet are verified and preliminary deciphering to have only after deciphering module checking and deciphering pass through, could data message be sent to safety chip inside; Get into next step decryption work, terminal equipment finally decrypts content key (CW) in safety chip inside.If in the safety chip outside can't also be futile for whole decrypting process through the checking and the deciphering of deciphering module so.It is thus clear that the checking of deciphering module and safety chip and decryption work are to complement each other, and be indispensable.
Through front end encryption system and terminal equipment key is carried out coordinated management among the utility model embodiment; Terminal equipment decrypts content key and content key is sent to the descrambling unit with the mode of ciphertext in safety chip; Prevented that effectively content key (CW) from leaking and, effectively protected content supplier, operator and user's interests by shared.Referring to Fig. 5 is the encryption and decryption flow chart based on the key management system of safety chip of the utility model embodiment, comprising:
Step 501: the scrambling module of front end secret system produces content key media data is carried out scrambling; Key management module adopts layering cipher key by encrypting module scrambled data to be encrypted and forms encrypt data, and encrypt data is handed down to terminal equipment by sending module.
The front end encryption system utilizes session key that an encrypted content key is carried out superencipher after utilizing second product key that the content key that is used for the ciphered program content is once encrypted again; After the front end encryption system utilizes security chip key that said second product key is once encrypted, utilize user key that second product key after once encrypting is carried out superencipher again; The front end encryption system sends to terminal equipment with the programme content of encrypting and the content key of superencipher and second product key of superencipher.
Session key sends to terminal equipment after utilizing first product key to encrypt by the front end encryption device, and terminal equipment utilizes said first product key deciphering to obtain said session key; First product key sends to terminal equipment after utilizing said user key to encrypt by the front end encryption device, and the user key deciphering that the terminal equipment utilization prestores obtains said first product key.
Second product key of superencipher and first product key of once encrypting send to terminal equipment with Entitlement Management Message (EMM) data packet form, and the content key of a said encrypted session key and superencipher sends to terminal equipment with the form of Entitlement Control Message (ECM) packet.Entitlement Management Message (EMM) packet adopts 3DES-MAC algorithm and said user key to generate the MAC value, and Entitlement Control Message (EMM) packet adopts 3DES-MAC algorithm and said session key to generate the MAC value.
Step 502: terminal equipment receives encrypt data through receiver module, tentatively deciphers the content key that obtains encrypting by deciphering module, and the content key of encryption in safety chip, deciphers and descrambling obtains programme content, and playing module is used for the broadcast program content.
Terminal equipment utilizes session key and the user key that prestores that the content key of said superencipher and second product key of superencipher are deciphered acquisition content key of once encrypting and second product key of once encrypting respectively, and content key that terminal equipment will said once encryption and second product key of once encryption send to the safety chip processing.
Deciphering module receives Entitlement Management Message (EMM) packet and Entitlement Management Message (EMM) packet; Deciphering module carries out tentatively deciphering behind the legitimate verification to Entitlement Management Message (EMM) packet MAC value, utilizes session key and the user key that prestores that second product key of the content key of said superencipher and superencipher is deciphered content key that acquisition once encrypts and second product key of encryption once; Deciphering module carries out tentatively deciphering behind the legitimate verification to Entitlement Management Message (EMM) packet MAC value; Safety chip utilizes said second product key of once encrypting of security chip key deciphering; The content key that further utilizes second product key deciphering that obtains once to encrypt obtains content key, according to said content key the programme content descrambling of scrambling is obtained programme content expressly by the descrambling unit of said safety chip.
Deciphering module can adopt software decryption or smart card mode to decipher.
Solidify security chip key (DSK) in the decryption unit of safety chip in advance, be used for the content key of once encrypting is carried out encryption and decryption; Safety chip disposes unique chip identification (ID); The front end encryption system is storage security chip keys (DSK) and chip identification (ID) in advance, and the front end encryption system is through chip identification (ID) respective user sign (User ID), the corresponding relation between maintenance safe chip and the user.Wherein, security chip key DSK is provided by terminal equipment manufacturer or operator provides, and terminal equipment manufacturer is responsible for safety chip is integrated in the STB.
In addition, the key management terminal equipment based on safety chip can adopt soft deciphering+safety chip scheme or smart card+safety chip scheme decrypting ciphertext data according to the actual demand of operator.
Adopt " soft deciphering+safety chip scheme " that encrypt data is deciphered based on terminal equipment in the key management system of safety chip, step is following:
S101: the front end scrambler produces content key (CW), and content key carries out scrambling to media data and forms scrambled data;
S102: the front end encryption device generates second product key (PK2), second product key (PK2) content key that generation is once encrypted to content key encryption (CW '); The front end encryption device produces session key (SK), and session key (SK) is encrypted the content key that generates superencipher (CW ") to the content key once encrypted (CW '); The front end encryption device generates first product key (PK1); Use first product key (PK1) that session key (SK) encrypt is generated encrypted session key (SK '), encrypted session key (SK ') is packaged in Entitlement Control Message (ECM) packet with the content key of superencipher (CW ") and sends to terminal equipment.Entitlement Control Message (ECM) bag adopts 3DES-MAC algorithm and session key (SK) to generate MAC (Message Authentication Code) value, guarantees Entitlement Control Message (ECM) packet integrality and reliability.
S103: the front end encryption device uses the security chip key (DSK) corresponding with ID (Chip ID) that second product key (PK2) is encrypted and forms second product key of once encrypting; The front end encryption equipment produces user key (UK); Use user key (UK) that second product key of once encrypting is encrypted second product key that generates superencipher (PK2 "); simultaneously; to use user key (UK) that first product key (PK1) secret key encryption is formed first product key once encrypted (PK1 '), second product key of superencipher (PK2 ") and first product key of once encrypting (PK1 ') are packaged into during Entitlement Management Message (EMM) wraps together.Entitlement Management Message (EMM) bag adopts 3DES-MAC algorithm and user key (UK) to generate the MAC value, guarantees the transmission of EMM Entitlement Management Message security data packet.
S104: terminal equipment acquisition request Entitlement Management Message (EMM) packet; Transplant in the library software at the terminal of deciphering module; Judge through checking MAC value whether Entitlement Management Message (EMM) bag that receives is legal; Distinguish second product key (PK2 ") of superencipher and first product key of once encrypting (PK1 ') then; second product key that uses second product key (PK2 ") of user key (UK) deciphering superencipher to generate then once to encrypt (PK2 '), use first product key that user key (UK) deciphering once encrypts (PK1 ') to generate first product key (PK1).
User key (UK) is produced by the front end encryption device; (User ID) is corresponding with ID, is stored in the front end data storehouse, when terminal equipment is registered; User key that the terminal equipment receiving front-end sends and storage are deciphered ciphertext through the user key of storage.
S105: terminal equipment obtains Entitlement Control Message (ECM) packet; Transplant in the library software at the terminal of deciphering module; Judge through checking MAC value whether Entitlement Control Message (ECM) packet that receives is legal; Distinguish the content key (CW ") of encrypted session key (SK ') and superencipher then; use encrypted session key of first product key (PK1) deciphering (SK ') to generate session key (SK) then, the content key that uses the content key (CW ") of session key (SK) deciphering superencipher to generate once to encrypt (CW ').
S106: the content key (CW ') that second product key of once encrypting that library software will decrypt (PK2 ') and once encryption are transplanted in the terminal sends in the safety chip; Second product key that security chip key (DSK) deciphering of solidifying in advance in the safety chip decryption unit is once encrypted (PK2 ') generation second product key (PK2); The content key that second product key (PK2) deciphering is once encrypted (CW ') generate content key (CW), content key obtains programme content expressly through the descrambling unit that escape way sends in the safety chip to the scrambled data descrambling.
Adopt " smart card+safety chip scheme " that encrypt data is deciphered based on terminal equipment in the key management system of safety chip, step is following:
S201: the front end scrambler produces content key (CW), and content key carries out scrambling to media data and forms scrambled data;
S202: the front end encryption device generates second product key (PK2), second product key (PK2) content key that generation is once encrypted to content key encryption (CW '); The front end encryption device produces session key (SK), and session key (SK) is encrypted the content key that generates superencipher (CW ") to the content key once encrypted (CW '); The front end encryption device generates first product key (PK1); Use first product key (PK1) that session key (SK) encrypt is generated encrypted session key (SK '), encrypted session key (SK ') is packaged in Entitlement Control Message (ECM) packet with the content key of superencipher (CW ") and sends to terminal equipment.Entitlement Control Message (ECM) bag adopts 3DES-MAC algorithm and session key (SK) to generate MAC (Message Authentication Code) value, guarantees Entitlement Control Message (ECM) packet integrality and reliability.
S203: the front end encryption device uses the security chip key (DSK) corresponding with ID (Chip ID) that second product key (PK2) is encrypted and forms second product key of once encrypting; The front end encryption equipment produces user key (UK); Use user key (UK) that second product key of once encrypting is encrypted second product key that generates superencipher (PK2 "); simultaneously; to use user key (UK) that first product key (PK1) secret key encryption is formed first product key once encrypted (PK1 '), second product key of superencipher (PK2 ") and first product key of once encrypting (PK1 ') are packaged into during Entitlement Management Message (EMM) wraps together.Entitlement Management Message (EMM) bag adopts 3DES-MAC algorithm and user key (UK) to generate the MAC value, guarantees the transmission of EMM Entitlement Management Message security data packet.
S204: terminal equipment acquisition request Entitlement Management Message (EMM) packet; In the smart card of deciphering module; Judge through checking MAC value whether Entitlement Management Message (EMM) bag that receives is legal; Distinguish second product key (PK2 ") of superencipher and first product key of once encrypting (PK1 ') then; second product key that uses second product key (PK2 ") of user key (UK) deciphering superencipher to generate then once to encrypt (PK2 '), use first product key that user key (UK) deciphering once encrypts (PK1 ') to generate first product key (PK1).
User key (UK) is produced by the front end encryption device, and (User ID) is corresponding with ID, is stored in the front end data storehouse, and when the smart card hair fastener, user key (UK) solidifies in smart card in advance.
S205: terminal equipment obtains Entitlement Control Message (ECM) packet; In the smart card of deciphering module; Judge through checking MAC value whether Entitlement Control Message (ECM) packet that receives is legal; Distinguish the content key (CW ") of encrypted session key (SK ') and superencipher then; use encrypted session key of first product key (PK1) deciphering (SK ') to generate session key (SK) then, the content key that uses the content key (CW ") of session key (SK) deciphering superencipher to generate once to encrypt (CW ').
S206: the content key of second product key of once encrypting that the terminal intelligent card will decrypt (PK2 ') and once encryption (CW ') send in the safety chip; Second product key that security chip key (DSK) deciphering of solidifying in advance in the safety chip decryption unit is once encrypted (PK2 ') generation second product key (PK2); The content key that second product key (PK2) deciphering is once encrypted (CW ') generate content key (CW), content key obtains programme content expressly through the descrambling unit that escape way sends in the safety chip to the scrambled data descrambling.
In above-mentioned two kinds of schemes; The ciphering process of front end encryption system is identical; It is different with manner of decryption that terminal equipment obtains user key, but during based on the terminal equipment decrypting ciphertext data of safety chip, security chip key (DSK), the content key (CW) and the descrambling unit that decrypt all are encapsulated in the safety chip; Guaranteed that security chip key (DSK), content key (CW) can not be stolen or distort, and have guaranteed the safety of system.
In addition, safety chip and playing module adopt SMD connected mode in terminal equipment, and this kind connected mode can't be passed through pin reading of content key, has prevented that effectively content key from illegally being usurped.
Key management system and the terminal equipment based on safety chip of the utility model embodiment have effectively prevented leaking and sharing of content key (CW), have guaranteed content supplier, operator and user's interests.Simultaneously, based on customizable employing software scenario in the terminal of safety chip and smart card solution, make operation way more flexible; This scheme is simple to the requirement of safety chip in the terminal equipment, has saved system cost, has improved the operating efficiency and the reliability of system.
Above-mentioned preferred embodiment and the institute's application technology principle that is merely the utility model, any technical staff who is familiar with the present technique field is in the technical scope that the present invention discloses, and the variation that can expect easily or replacement all should be encompassed in protection scope of the present invention.

Claims (6)

1. key management system based on safety chip, this system comprises front end encryption system and terminal equipment, said front end encryption system comprises scrambling module, encrypting module, key management module and sending module,
Scrambling module is used to produce content key and utilizes said content key that programme content is carried out scrambling;
Key management module is used for second product key, security chip key, session key and user key are managed;
Encrypting module utilizes session key that an encrypted content key is carried out superencipher after being used to utilize second product key that content key is once encrypted again; After utilizing security chip key that said second product key is once encrypted, utilize user key that second product key after once encrypting is carried out superencipher again;
Sending module is used for second product key of content key behind the superencipher and superencipher is sent to terminal equipment;
Said terminal equipment comprises receiver module, deciphering module, safety chip and playing module,
Receiver module is used to receive the programme content and the key data of encryption;
Deciphering module is used to utilize the user key and the session key that prestore respectively the content key of superencipher and second product key of superencipher to be deciphered with content key that obtains once to encrypt and second product key of once encrypting;
Safety chip comprises decryption unit and descrambling unit;
Wherein, Said decryption unit is used to receive second product key of said once encryption and the content key of once encrypting; Second product key that utilizes the security chip key deciphering once to encrypt; Utilize second product key that obtains to decipher the content key of once encrypting, and the content key that decrypts is sent the descrambling unit;
The descrambling unit is used for according to said content key programme content being carried out descrambling.
Playing module is used for the broadcast program content.
2. the key management system based on safety chip according to claim 1; It is characterized in that; Said key management module also is used for first product key is managed; Encrypting module utilizes first product key that session key is once encrypted, and sends to terminal equipment after utilizing said user key that first product key is once encrypted.
3. the key management system based on safety chip according to claim 2; It is characterized in that; Second product key of said superencipher and first product key of once encrypting send to terminal equipment with Entitlement Management Message (EMM) data packet form, and the content key of a said encrypted session key and superencipher sends to terminal equipment with the form of Entitlement Control Message (ECM) packet.
4. the key management system based on safety chip according to claim 1 is characterized in that, said deciphering module can be deciphered through software or smart card mode.
5. key management terminal equipment based on safety chip, said terminal equipment comprises receiver module, deciphering module, safety chip and playing module;
Receiver module is used to receive the programme content and the key data of encryption;
Deciphering module is used to utilize the user key and the session key that prestore respectively second product key of superencipher and the content key of superencipher to be deciphered with second product key that obtains once to encrypt and the content key of once encrypting; Wherein, Content key is the key that is used for programme content is carried out scrambling; Second product key of superencipher utilizes security chip key and twice encryption of user key to obtain by the front end encryption device, and the content key of superencipher utilizes second product key and twice encryption of session key to obtain by the front end encryption device;
Safety chip comprises decryption unit and descrambling unit;
Wherein, Said decryption unit is used to receive second product key of said once encryption and the content key of once encrypting; Utilize the security chip key of safety chip storage to decipher second product key of once encrypting; Utilize second product key that obtains to decipher the content key of once encrypting, and content key is sent the descrambling unit; The descrambling unit is used for according to said content key programme content being carried out descrambling;
Playing module is used for the broadcast program content.
6. the key management terminal equipment based on safety chip according to claim 5 is characterized in that said safety chip and playing module adopt SMD connected mode.
CN2012200764721U 2012-03-02 2012-03-02 Security chip-based secret key management system and terminal device Withdrawn - After Issue CN202475692U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2012200764721U CN202475692U (en) 2012-03-02 2012-03-02 Security chip-based secret key management system and terminal device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2012200764721U CN202475692U (en) 2012-03-02 2012-03-02 Security chip-based secret key management system and terminal device

Publications (1)

Publication Number Publication Date
CN202475692U true CN202475692U (en) 2012-10-03

Family

ID=46923813

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2012200764721U Withdrawn - After Issue CN202475692U (en) 2012-03-02 2012-03-02 Security chip-based secret key management system and terminal device

Country Status (1)

Country Link
CN (1) CN202475692U (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102595198A (en) * 2012-03-02 2012-07-18 北京视博数字电视科技有限公司 System, terminal equipment and method for managing secret key based on security chip
CN105165045A (en) * 2013-06-07 2015-12-16 英特尔公司 Device-to-device discovery information encryption
CN105553945A (en) * 2015-12-08 2016-05-04 北京元心科技有限公司 Method and device for encrypting and decrypting data in mobile terminal

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102595198A (en) * 2012-03-02 2012-07-18 北京视博数字电视科技有限公司 System, terminal equipment and method for managing secret key based on security chip
CN102595198B (en) * 2012-03-02 2015-12-09 北京视博数字电视科技有限公司 A kind of key management system based on safety chip, terminal equipment and method
CN105165045A (en) * 2013-06-07 2015-12-16 英特尔公司 Device-to-device discovery information encryption
CN105165045B (en) * 2013-06-07 2020-01-21 英特尔公司 Encryption of device-to-device discovery information
CN105553945A (en) * 2015-12-08 2016-05-04 北京元心科技有限公司 Method and device for encrypting and decrypting data in mobile terminal

Similar Documents

Publication Publication Date Title
CN102595198B (en) A kind of key management system based on safety chip, terminal equipment and method
CN101005356B (en) Method of descrambling a scrambled content data object
US20130262869A1 (en) Control word protection
EP3207659B1 (en) Securing communication in a playback device with a control module using a key contribution
CN103748890B (en) Receiver Software is protected
CN102075812B (en) Data receiving method and system of digital television
US20130275755A1 (en) Systems, methods and apparatuses for the secure transmission of media content
CN102075802B (en) Method for realizing secure communication between set-top box and intelligent card
CN101277181A (en) Dynamic multilayer encryption method for managing flow medium digital authority
CN101719910A (en) Terminal equipment for realizing content protection and transmission method thereof
JP2012510743A (en) Content decryption apparatus and encryption system using additional key layer
EP2647213B1 (en) System and method to record encrypted content with access conditions
WO2011120901A1 (en) Secure descrambling of an audio / video data stream
CN101626484A (en) Method for protecting control word in condition access system, front end and terminal
CN101018317A (en) A virtual intelligent card security authentication method and system
CN202475692U (en) Security chip-based secret key management system and terminal device
CN103546767B (en) Content protection method and system of multimedia service
CN102917252B (en) IPTV (internet protocol television) program stream content protection system and method
CN100461199C (en) Method and device for encrypting and de-encrypting digital content
CN201515456U (en) Safe device, set-top box and receiving terminal for digital television receiving terminals
CN101902610B (en) Method for realizing secure communication between IPTV set top box and smart card
CN101179345A (en) Method of encrypting and decrypting condition receiving system
JP2006518134A5 (en)
CN101646060B (en) Protecting method of data content in storage device
CN102857821A (en) IPTV (internet protocol television) security terminal

Legal Events

Date Code Title Description
C14 Grant of patent or utility model
GR01 Patent grant
AV01 Patent right actively abandoned

Granted publication date: 20121003

Effective date of abandoning: 20151209

C25 Abandonment of patent right or utility model to avoid double patenting