CN103873895B - A kind of DVB/IPTV bimodulus interactive service protects system - Google Patents
A kind of DVB/IPTV bimodulus interactive service protects system Download PDFInfo
- Publication number
- CN103873895B CN103873895B CN201210539322.4A CN201210539322A CN103873895B CN 103873895 B CN103873895 B CN 103873895B CN 201210539322 A CN201210539322 A CN 201210539322A CN 103873895 B CN103873895 B CN 103873895B
- Authority
- CN
- China
- Prior art keywords
- key
- subsystem
- module
- server
- business
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
Abstract
A kind of DVB/IPTV bimodulus interactive service protects system; the system includes client-end subsystem, front end subsystem, Certificate Authority subsystem, subscriber management system, program Workflow Management System, program information management system part; wherein client-end subsystem, CA front ends subsystem, Certificate Authority subsystem are major part, and subscriber management system, program Workflow Management System, program information management system are peripheral accessory system.The system supports DVB and IPTV video scramblings, the deep-controlled strategy of controllable scrambling and adaptive scrambling, the key management mode for supporting more than three kinds of programme content are provided, the key length selection of more than 128, the distributed encapsulation of large scale content, with the support supervised to the content safety based on digital watermarking and business.System supports DVB/IPTV bimodulus; introduce key updating batch processing strategy and distributed authentication mandated program; key real-time update and the distribution of million userbases are provided; reduce overhead; enhance the ability of whole key updating; the security of system is improved, flexible and changeable protection mechanism is provided for pay TV business.
Description
Technical field
It is to be related to broadband interdynamic TV system bidirectional asymmetrical digital specifically the present invention relates to information security field
The key technology of television system.
Background technology
In the development of the interdynamic video systems such as iDTV (digital television interaction), IPTV (IPTV),
Protecting for interdynamic video business tine is just turning into the important bottleneck that influence interdynamic video business is able to promote with control, and it is related to interior
Hold the technology in terms of protection, transmission protection, access control, piracy tracking and contents supervision.
Traditional video traffic protection system is set up in unilateral network, in order to which the mandate of scrambled control word, user are believed
Breath and the important content such as management information entirely be transferred to client, employ the basic thought set up defenses in depth, system architecture is complicated,
Security is not high, easily by hack.
Because traditional Broadcasting Cable Network belongs to radio network, its video traffic protection system also necessarily broadcaster is determined
Formula.In this manner, service front-end does not know about the situation of client, it is impossible to which the validity and reliability of client is tested
Card, client can not also verify the validity and reliability of front end, reception that can only be passive, this and video traffic protection system pin
To user and its watch behavior carry out pay per view original intention there is contradiction.
In traditional video traffic protection system, front end generates the security information that may be needed encryption to all users simultaneously
Transmitted, on the one hand add network load, wasted massive band width, larger delay, the opposing party are brought to Consumer's Experience
Face because the presence of a large amount of encryption information, adds the possibility that saboteur cracks encryption system again, forms potential safety hidden
Suffer from.
Traditional video traffic protection system, as its key distribution mechanism, adds implementation using complicated multi-enciphering
Difficulty, easily produce security breaches.Often increase a key, the difficulty to the generation of key, distribution, management just has significantly
The lifting of degree.As long as saboteur destroys any one link therein, it is possible to whole system is effectively destroyed, even taking
The ancillary methods such as many cryptographic algorithm backups, also can not fundamentally solve this defect.
Traditional interactive service protection system is the charge system of radio network, not to the authentication of user, is not suitable for
Bilateral network;The opening of content data and internet causes very big difficulty to piracy tracking and contents supervision.
Protection to video frequency program typically uses two ways:Pre-packaged mode and real-time encrypted mode.When need encapsulation
Video frequency program is more or during larger video, because CPU disposal abilities are limited, program packaging efficiency is relatively low.
For legacy CA system, the collection and transmission of video source are all by the way of plaintext, and the security to video source is made
Into threat.In addition, existing storage mode, whether directly stores or receives file encryption storage, all there is potential safety hazard.
Common signal scrambling technique can not realize the selection control to scrambling depth, it is impossible to distinguish important and insignificant information,
Scrambling intensity is often excessive, and scrambling effect is not good.
The content of the invention
Based on above-mentioned, a kind of DVB/IPTV bimodulus interactive service protection system of present invention proposition, a kind of DVB/IPTV bimodulus
Interactive service protects system, it is characterised in that:The system include client-end subsystem, front end subsystem, Certificate Authority subsystem,
The parts such as subscriber management system, program Workflow Management System, program information management system.Wherein client-end subsystem, front end subsystem
System, Certificate Authority subsystem are major part, and subscriber management system, program Workflow Management System, program information management system are outer
Enclose accessory system.The system is included in service protection CAServer servers, empowerment management DRMServer and client STB
The part of CAClient modules three, wherein CAServer servers correspondence front end subsystem, empowerment management DRMServer correspondence certifications
CAClient modules correspondence client-end subsystem in authorization subsystem, client STB.
Described client-end subsystem (abbreviation client) is using layering and modular structure, and client is divided into from top to bottom to be connect
Mouth layer, key-course and operation layer;Interface layer provides the task interface of standard, receives customer service instruction and user profile, interface
Layer to user feedback system implementing result or descrambling after programme content;Key-course is responsible for business module list, according to industry
The corresponding operation layer module of instruction calls of being engaged in completes corresponding business, and there is provided each business module for the operation of each business module of coordination
Data exchange mechanism, and compile the implementing result of each industry module and feed back to interface layer;Operation layer includes multiple business moulds
Block, including:Order module, business application module, business acquisition module;Order module and complete registration, purchase, query function;Shen
Please module completion programme application, program request application, broadcast application, live application, arranging key function;Business acquisition module is completed
Demultiplexing, decryption ECM, descrambled program stream, the checking legal sexual function of program;Wherein, demultiplexing function is whole using tradition DVB-CA
End is synchronous with the foundation of front end subsystem, and receives, demultiplexes, and obtains ECM and program stream;Decrypt ECM functions and use the meeting consulted
Words key ECM is decrypted acquisition descrambled control words CW;The Control Word that descrambled program stream function is obtained using decryption is called
AES or CSA Descrambling Algorithms descramble to program stream, and obtained DVB/IPTV programs are streaming into key-course;Verify program
The legitimacy mark watermark that legal sexual function is used to extract in program stream.
Described front end subsystem further by encapsulating subsystem, pre-packaged subsystem, secure memory subsystem structure in real time
Into.Encapsulation subsystem is used for real-time online encapsulation and protection to programme content in real time, and pre-packaged subsystem is used in program
The offline encapsulation held and protection.In real time encapsulation subsystem and pre-packaged subsystem can select as needed one of them use or
Person is used in conjunction with.Secure memory subsystem can select to use as needed.Described front end subsystem includes:Control word is generated
Device (CWG), ECM makers (ECMG), watermarking algorithm (WEA) and Common Scrambling Algorithm (CSA);The effect of front end subsystem
It is generation control word, calls CSA to scramble the programme content from program Workflow Management System;The control word of front end subsystem
Generator generates control word based on system key, using DVB Common Scrambling Algorithms (CSA) to from program Workflow Management System
Programme content carry out Scrambling Operation;Front end subsystem simultaneously also using session key to control word be encrypted generation it is traditional
ECM;Programme content after scrambling passes to program distribution system with ECM and carries out multiplexing transmission;Front end subsystem will be between fixation
Every regenerating scrambled control word, it is ensured that the transmission safety of programme content;Under program request interactive mode, front end subsystem is simultaneously
It is responsible for receiving the broadcasting control information of user, and scrambling and program streaming is adjusted.
Described Certificate Authority subsystem is by service handling module, business cipher key SK update modules, bidirectional identification protocol, SK
Agreement protocol, timer, online user's list section composition, Certificate Authority subsystem receive application of the user to programme content,
Business cipher key SK is obtained by certification and negotiation, and periodically carries out key updating;The service handling of Certificate Authority subsystem
Module is the interface with user, starts corresponding operation flow according to the program application of user, in the cooperation of Subscriber Management System
Under application to user and its identity information, credit information carry out legitimacy and validation verification;For legal, effective Shen
Please, Certificate Authority subsystem provides key agreement mechanisms and user and consults to obtain session key, and by session key and its correlation
Programme information is sent to front end subsystem by safe lane, and Certificate Authority subsystem is by the body with fixed intervals again to user
Business cipher key is verified and regenerated to part.
Described CAServer servers include receiving port, sending port, descrambler, the part of key port four;It is described
Empowerment management DRMServer include CA ports, STB ports, certification and url management module, program key management module and control
Molding block;Described CAClient modules include descrambler and key port two parts, are key-course, business by distinguishing hierarchy
Layer, operation layer is core layer, realizes the registration of user, service authorization acquisition of information, the descrambling function of program.
System design KDC (Key Distribution Center, KDC) is the encryption and decryption of client
File provides business cipher key, and KDC first obtains the segmentation situation of client cryptograph files, when for n subfile,
Corresponding 1 to n unduplicated random sequence is generated, client sends ciphertext Ziwen to storage server successively according to random sequence
Part;Storage server sets up new file, and the ciphertext subfile received is write into new file, until ciphertext subfile is sent.
The system is directed under bandwidth varying environment to program scrambling and the demand of publicity, and design implements controllable scrambling depth
Strategy and adaptive scrambling technology, scrambling parameter is dynamically adjusted according to carrier network situation, different compressed encodings and code check,
While protection business, data processing amount is reduced, the scrambling expense of video is reduced.Control of the system for realization to scrambling depth
System, the method that (n1, n2) is counted using double upper limits to the method for counting of I frames and I- macro blocks so that count upper-limit n values all can use with
Any scrambling depth d can be selected;To arbitrary d, if:1) 1/d is integer, then makes n1=1/d, n2=1;2) 1/d is not
It is integer, then 1/d is expressed as fraction, and the greatest common divisor r of molecule denominator is obtained with Euclidean algorithm, 1/d is about obtained afterwards
=a/b, order:Wherein a and b are mutual prime rwmbers;
To I frame count c1, the c2 found, when c1 reaches upper limit n1, Scrambling Operation is performed to present frame;On c2 reaches
When limiting n2, two counters are all reset, c1=c2=0;
The set-up mode of two kinds of scrambling depth is provided in the application:1) n modes are set, and n is the scrambling upper limit, and actual setting adds
Depth is disturbed for 1/n;2) d modes are set, and d is scrambling depth, and scrambling upper limit n values are determined using above-mentioned double upper limit method of counting.
The efficiency that the system is packaged for the interactive large scale programme content of high definition, design is implemented based on intelligence
The distributed pre-packaged technology of thought is acted on behalf of, by means such as intelligentized segmentation, scheduling, collaborations, is ensureing security and one
On the premise of cause property, the pre-packaged speed to large scale programme content is improved.The system model uses C/S structures, pre-packaged
System end is server, and video input is client, C/S model is also used in pre-packaged internal system, by master server and generation
Server group is managed into proxy server is server end for master server, and master server is client;Add to needing to encapsulate
Close video, initially enters master server, and master server is judged according to video size, chooses whether to need proxy server
Encapsulation;If being not required to agency to perform, do not split video file, master server is directly packaged encryption;If desired agency performs,
Video file is then divided into several segments according to the algorithm of design, then the idle proxy server on automatic search network, will
The video being segmented sends available agency to, allows its execute encapsulation function;After proxy server encapsulation is completed, then return in time
Back to main server-side, the segmentation of return is recombinated by main server-side, a complete packaged " original is reverted to
Video " file.
The system has used dynamic key to update and distribution technique;Dynamic key updates is divided into two stages with distribution, point
It is not that business cipher key switching phase and dynamic service key push the stage;The business application mould of Certificate Authority subsystem and client
Block produces business cipher key SK by key agreement protocol.After successful negotiation key, user profile and its corresponding SK will be protected
Online user's list is stored to, timer is activated;When reaching specified time interval, by SK update modules to online user's list
In user re-start Authentication and Key Agreement, more new session key SK, wherein, business cipher key SK is passed through using SSL modes
Safe lane is distributed;In addition to business cipher key SK, Control Word and system key MK are also included in the system;Wherein control word
CW renewal is unrelated with user, is updated by appointed interval.
System has been respectively adopted cipher key hierarchy and updated and group key management during business cipher key is updated;Described
Cipher key hierarchy updates, i.e., DRM authorization Verification System is when carrying out key updating, and upper level DRM Server are only in local area
DRM Server carry out key updating, and without directly providing service to user, and group key management is by broadcasting service and other
Value-added service is treated with a certain discrimination, if user has had subscribed to the broadcasting service specified, then use other business in switching
When, DRM system does not update to broadcasting service cryptographic key, only key updating processing is carried out to value-added service, in the process of key updating
The middle minimum nodes for finding group key management.
System scrambling module in the pre-packaged module of front end subsystem uses two kinds of algorithms of CSA and AES, according to environment
Need to change scrambling algorithms in real time, encrypting module encrypts CW using aes algorithm, support CBC (inverse block linking scheme), OFB
(output feedback mode), CFB (cipher feedback pattern), CTR (technology mode), five kinds of encryption moulds of ECB (electronic codebook mode pattern)
Entitlement Control Message ECM is encrypted formula, is arbitrarily chosen in front terminal system configuration parameter structure, realizes information flow
Secrecy transmission.
The system uses double layer encryption strategy, includes two encryptions level, i.e. single-unit mesh relevant layers (PRL:Program
) and business relevant layers (SRL RelatedLayer:Service Related Layer), implement for PRL layers to be based on cw pairs of control word
The scrambling of video content, SRL layers based on business cipher key by encrypting generation business related control information (SRI:Service
RelatedInformation), i.e. Entitlement Control Message ECM, is scrambled using CW as key, calls Common Scrambling Algorithm CSA to complete
Direct scrambling protection to programme content to be transmitted, encrypts using business cipher key SK as key, AES is called, to Control Word
Encryption, form Entitlement Control Message (ECM), CW ensures the safe transmission of programme content, while CW and SK separation, also cause
The scrambling of programme content is unrelated with user, reduces the complexity of system.
The system introduces key updating batch processing strategy, makes key real-time update and the distribution of million userbases, it is wrapped
Include an authorization server (AS, Authentication Server) and multiple key servers (KS, Key Server) two
Part, wherein authorization server are as tree root, the key message of distribution service protection, and by key server manage between take over
Manage all users;Authorization server, including user authentication module, key server module and user's authorization module, authorize clothes
The access (leaving) that business device receives user by SSL safe lanes is asked, and carries out authentication to user;Key server,
Including key production module, key distribution module and key management module, key server is produced by key production module
Pseudo random number, is used as demand (telecommunication) service key to be distributed;Group key point for authorizing group membership is realized by key distribution module
Hair;Key management module carries out data interaction with authorization server, sends addition (deletion) mandatory member's in authorization server
During instruction, key management module notifies key production module to produce new demand (telecommunication) service key, and then key management module will be through
The program request key crossed after updating is sent to authorization server, and close to specified user key node progress by key distribution module
Key updates.
The system effectively solves technical problem proposed by the present invention.
Brief description of the drawings
Fig. 1 is system framework figure;
Fig. 2 is the basic block diagram of client;
Fig. 3 is the basic block diagram of front end subsystem;
Fig. 4 is Certificate Authority subsystem structure figure;
Fig. 5 is system general module structure chart;
Fig. 6 is distributed pre-packaged system model figure;
Fig. 7 is key updating Path selection figure.
Embodiment
DVB the and IPTV interactive services protection system of the present invention includes client-end subsystem, front end subsystem, Certificate Authority
The parts such as subsystem, subscriber management system, program Workflow Management System, program information management system.Wherein client-end subsystem, preceding
Terminal system, Certificate Authority subsystem are major part, subscriber management system, program Workflow Management System, program information management system
Unite as peripheral accessory system.The system includes service protection CAServer servers, empowerment management DRMServer and client
The part of CAClient modules three in STB, wherein CAServer servers correspondence front end subsystem, empowerment management DRMServer
CAClient modules correspondence client-end subsystem in correspondence Certificate Authority subsystem, client STB.
Referring to accompanying drawing 2, the basic structure of client-end subsystem (abbreviation client) is as follows:Client is that set top box or TV are carried
Access, the programme information provided according to user, be responsible for and subscriber management system, Certificate Authority subsystem for transparent programme content
With front terminal system interaction, descramble key is obtained, implements the descrambling work to scrambled program, Conditional Access is realized and has ready conditions
Ability to play.The order module of client interacts transmission subscriber identity information, user with subscriber management system by safe lane
The contents such as credit information, complete the functions such as registration, purchase, provide the user the interaction mechanism for inquiring about its identity and credit information;
The business application module of client interacts transmission subscriber identity information with the service handling module of Certificate Authority subsystem and right
Program, programme, the application of program category (program request, broadcast, live), and be responsible for consulting generation business with Certificate Authority subsystem
Key, passes to business acquisition module;The business acquisition module of client from preceding terminal system to synchronously obtaining the program scrambled
Content is decrypted and descrambled work, and submits the broadcasting control information of user (F.F., fast to CA under program request interactive mode
Move back, stop), realize the interactive operation to program stream.
Client is easy to the renewal and upgrading of system, to improve the compatible and spirit of system using layering and modular structure
Activity.Client is divided into interface layer, key-course and operation layer from top to bottom.Interface layer is responsible for the task interface of offer standard, connects
Receive the service order (such as registration, order, program request, broadcast, live, F.F., rewind, stopping) of user and its relevant information is (such as
Number of set-top box, identification card number, letter of identity of user etc.), submit to control module.Meanwhile, interface layer also is responsible for anti-to user
Programme content after feedback system implementing result or descrambling.
Key-course is responsible for business module list, calls corresponding operation layer module to complete according to service order corresponding
Business.
Operation layer is divided into several business modules, and each business module completes relatively independent business.Main business mould
Block includes:Order module, business application module, business acquisition module.Order module and complete registration, purchase, query function.Application
Module completes programme application, program request application, broadcast application, live application, arranging key function.Business acquisition module completes solution
Multiplexing, decryption ECM, descrambled program stream, the checking legal sexual function of program.Wherein, demultiplexing function uses tradition DVB-CA terminals
It is synchronous with the foundation of front end subsystem, and receive, demultiplex, obtain ECM and program stream;Decrypt ECM functions and use the session consulted
Key ECM is decrypted acquisition descrambled control words CW;The Control Word that descrambled program stream function is obtained using decryption calls solution
Disturb algorithm (AES or CSA algorithms) to descramble program stream, obtained DVB/IPTV programs are streaming to key-course;Checking
The legitimacy mark watermark that the legal sexual function of program is used to extract in program stream.
The main information stream of client includes:Conditional Access (CA), have ready conditions broadcast (CP) and piracy tracking (PT).
Defined according to information flow, client function is made up of CA, CP, PT, be respectively:
Wherein DS is descrambling function, and C is the transport stream after scrambling or encryption, and CW is the control of control word generator generation
Word, K is business cipher key, and D is decryption function, and EX obtains ECM (Entitlement Control Message) operation letter to be demultiplexed from transport stream
Number;WD is legitimacy watermark extracting function, and valid is detects whether successfully mark, and valid=1 is represented to detect successfully, carrier
In comprising watermark W, valid=0 represents that detection is unsuccessful, does not find legitimacy watermark W in carrier;FE is that finger water-print is embedded in letter
Number, α, β ∈ { 0,1 } ∧ α ≠ β.
Referring to accompanying drawing 3, front end subsystem basic structure is as follows:Front end subsystem includes control word generator (CWG), ECM
Maker (ECMG), watermarking algorithm (WEA) and Common Scrambling Algorithm (CSA), its main function are generation control words, are called
CSA is scrambled to the programme content from program Workflow Management System, realizes that encapsulation is (RP) and pre-packaged (PP) in real time.In addition,
In order to tackle the transmission and interference of illegal programs, pass through embedded legitimacy digital watermarking mark during encapsulating in real time and be pre-packaged
Know W to realize the broadcasting CP that has ready conditions, corresponding client-end subsystem whether there is legitimacy water by verifying in program transport streams
Marking knows W actually to control the broadcast of program on the subscriber terminal.
Defined according to information flow, front terminal system function is:
Wherein C is the transport stream after scrambling or encryption, and K is business cipher key, and WE represents legitimacy watermark imbedding function, S generations
Table scramble function, E represents encryption function, and T is carrier, and W is that legitimacy watermark generator generates legitimacy watermark information.
α,β∈{0,1}∧α≠β。
The control word generator of front end subsystem generates control word based on system key, is calculated using DVB common scramblings
Method (CSA) carries out Scrambling Operation to the programme content from program Workflow Management System (such as CDN content management server).Before
Terminal system is also encrypted to control word using session key and generates traditional ECM simultaneously.Programme content and ECM after scrambling
Pass to program distribution system and carry out multiplexing transmission.In addition, front end subsystem will regenerate scrambled control word with fixed intervals,
Ensure the transmission safety of programme content.Under program request interactive mode, front end subsystem also is responsible for receiving the broadcasting control of user simultaneously
Information (F.F., rewind, stopping etc.) processed, and scrambling and program streaming are adjusted.
The processing procedure of condition reception front end is as follows:
1) embedded legitimacy watermark:In order to which supports conditions are broadcasted and copyright protection, pass through water mark embedding device WEA copyright water
Print algorithm and legitimacy watermarking algorithm and be embedded in copyright and legitimacy watermark in TS transport streams.Copyright watermark bit sequence is taken by certification
Device be engaged according to front end mark and business information generation.Legitimacy watermark bit sequence is generated by regulator.
2) CW is generated:For MPTS and complicated front end system, CW is generated by independent scrambler.For single-unit
The front end system of program transport stream and low cost, CW is generated by CWG.According to the initial vector provided by EIS (event scheduling system)
(IV) and service identification (AC), CWG is that TS transport streams generate CW by nonlinear pseudorandom sequence generator, and according to 5-10 seconds
Cycle constantly update.
3) SK is obtained:Before system operation, front end system will be registered in certificate server.In system operation
In, front end system will set up SAC (secure authenticated channel) with certificate server.Dynamically updated based on SAC and business cipher key with
Agreement is obtained, front end obtains from certificate server and dynamically updates business cipher key.
4) scramble and encrypt:Scramble and be encrypted as parallel operation.It is embedding to cross copyright and the transport stream TS feeding of legitimacy watermark
The software scrambler of hardware independence scrambler or system front end is scrambled.Meanwhile, ECMG is using aes algorithm in business cipher key
The CW of each video traffic is encrypted under SK control and obtains ECM.
Front end subsystem is constituted by encapsulating subsystem, pre-packaged subsystem, secure memory subsystem in real time.Encapsulation is sub in real time
System is used for the encapsulation of the real-time online of programme content and protection, pre-packaged subsystem be used for offline encapsulation to programme content with
Protection.Encapsulation subsystem can select one of them to use or be used in conjunction with as needed with pre-packaged subsystem in real time.Peace
Full storage subsystem can select to use as needed.In the case of real-time encapsulation, the ski from Certificate Authority subsystem is (close
Key) Mobile state renewal will be entered according to specified time interval, the content after renewal is resend to front end using push mode
Subsystem, the business cipher key of front end subsystem is acted on behalf of after PUSH message is received, and is also switched to push- from listening state accordingly
Ready (prepares to push) state, after it checked internal state and memory space, and the port specified to Certificate Authority subsystem is sent out
Push-ready message is sent, ski transmission process is activated.The feedback of Certificate Authority subsystem is being obtained, is having new sk message to arrive
When coming, business cipher key agency is switched to Recv-SKI (reception key) state from listening state, and parsing comes from Certificate Authority subsystem
The message of system, extracts ski, stores into the communal space.
For the program transport streams to be encapsulated, first have to obtain transport stream and the business information such as its PSI/SI, passed in capture
After PSI/SI packets in defeated stream, Data-process (business scrambling encryption) is from Read-packet (reading package informatin) shape
State is switched to Read-PSI (reading PSI) state, and the information such as PSI and SI are analyzed from packet.For pre-packaged process,
PSI, SI information immobilize in whole transport stream, therefore only need to undergo a Read-PSI state, for encapsulation in real time
Process, PSI, SI information can change in whole transport stream according to the requirement of operator, and accordingly, there exist PSI, SI information
The possibility of renewal, at this moment needs that the version of these information is identified, it is necessary to repeatedly undergo Read-PSI states, progress is related
The renewal of information.
Referring to Fig. 4, the structure of Certificate Authority subsystem is as follows:Certificate Authority subsystem includes service handling module, business
The part such as key SK update module, bidirectional identification protocol, SK agreement protocols, timer, online user's list is constituted.Its effect is
Receive application of the user to programme content, business cipher key SK is obtained by certification and negotiation, and periodically carry out key updating.
The main information stream of Certificate Authority subsystem includes:Client certificate (CT), client authorization (CR), business cipher key
The ability (KM) with distribution is updated, its moment is in listening state, the client to access carries out CT certifications, and according to specified
Time interval Δ t dynamically updates and distribution business cipher key, is receiving the industry from client-end subsystem and front end subsystem
Protection information of being engaged in (SPI:Service Protection Information) ask and service authorization information (SAI:Service
Authorization Information) request after, respond respectively, perform CR Authorized operations.
Defined according to information flow, the handling function of Certificate Authority subsystem is made up of CT, CR, KM:
Wherein I representative capacities verification function, C represents credit accreditation function, and uid is the identity of user, hpassTo be quiet
The cryptographic Hash of state password, cert is user identity certificate, and uid is the identity of user;R represents right described function, and P is represented
Right encapsulates function, and sid is the service identification that user uid can be used, and it is basic that rid represents that user uid possesses business sid
Right is identified, and cid represents the condition and limitation when right is performed;KD represents business cipher key partition function, and PKG is generation right envelope
Fill the handling function of key, yn-1For the business cipher key at t-1 moment, α, β ∈ { 0,1 } ∧ α ≠ β.
The service handling module of Certificate Authority subsystem is responsible for being opened according to the program application of user as the interface with user
Corresponding operation flow is moved, the application and its identity information, credit information under the cooperation of Subscriber Management System to user are carried out
Legitimacy and validation verification.For legal, effective application, Certificate Authority subsystem provides key agreement mechanisms and assisted with user
Business obtains session key, and session key and its pertinent program information are sent into front end subsystem by safe lane.In addition,
Business cipher key is verified and regenerated to identity with fixed intervals again to user by Certificate Authority subsystem.
The service handling module of Certificate Authority subsystem is corresponding with the business application module of client to be interacted, support
Business mainly includes:Listing, program request, broadcast etc..
Under program request and broadcasting service, service handling module obtains user related information from Subscriber Management System, by double
The identity information of user and the legitimacy and validity of credit information are confirmed to authentication protocol, is then generated by SK agreement protocols
The business cipher key SK consistent with user terminal, front end subsystem is sent collectively to user profile, starts programme content scrambled transmission
Process.After successful negotiation key, user profile and its corresponding SK will be saved to online user's list, and timer is opened
It is dynamic.When reaching specified time interval, (interval provides the minimum interval that re-authentication is consulted, and this is increased with number of users
Interval may expand automatically) when, Authentication and Key Agreement is re-started to the user in online user's list by SK update modules,
More new session key SK, to improve the security of system.
SK update modules are produced and timing more new business key (SK) and initial vector (IV), and pass through SSL (safety
Socket layer) safe lane sends SK to client of the record in online user's list and updates signaling, by ICP/IP protocol to
Specify IP and the front end subsystem of port to send the SK data after updating, and ensure the SK data of client and front end subsystem
It is completely the same.
The key updating process of Certificate Authority subsystem and client is as follows:(program request)
Certificate Authority subsystem and client are set up after SSL is connected, and pass through SSL safe lane transmitting subscriber informations;
User profile is handled by Subscriber Management System, program request application form is sent to Certificate Authority subsystem by user;
Certificate Authority subsystem utilizes the Pid of program request application form, and corresponding SK is sent to client;
Client receives the information for being masked as SK, analyzes the SK that the information obtains subsequent time;
Peripheral accessory system
Subscriber management system provides user's registration, purchase, inquiry service.Subscriber management system sets up the essential information of user
Record, and user resource information record, the mainly record of smart card relevant information, and on this basis record user with
The corresponding service condition of smart card.Subscriber management system combination program information management system provides the user ordering interface, receives
Registration, the purchase application of user, checking is with identity information (such as set top box numbering, user name, identification card number, public key certificate etc.)
Legitimacy, generation user's registration information storehouse and user's ordering information storehouse.User only can not buy in registration, or not only registered but also purchased
Buy, or do not register only purchase (but must register in advance).Program Workflow Management System (such as CDN content management server) is right
Programme content is managed.Program information management system is classified to the information of program, and provides section to subscriber management system
Mesh information.
(1) DVB/IPTV bimodulus interactive service protection system
Referring to Fig. 5, system general module includes:Service protection CAServer servers, empowerment management DRMServer and visitor
The part of CAClient modules three in the STB of family end.Wherein CAServer servers correspond to front end subsystem, empowerment management
CAClient modules correspondence client-end subsystem in DRMServer correspondence Certificate Authority subsystems, client STB.
CAServer servers include receiving port, sending port, descrambler, the part of key port four.1) scrambler is real
In existing CW (control word) generation, ECM (Entitlement Control Message) generation, the analysis of TS streams, the scrambling processes such as ECM multiplexing
Whole core contents.2) receiving port realizes that real-time reception specifies the TS program streams of UDP multicast address;3) sending port is realized real
When the program TS streams after scrambling multiplexing are forwarded according to specified UDP multicast address;4) key port is realized and DRMServer
The interaction of server, and obtain service protection information.
Empowerment management DRMServer includes CA ports, STB ports, certification and url management module, program key management mould
Block and control module.1) the business cipher key request of CAServer servers is responsible for receiving in CA ports, and transfers to certification to be taken over chain
Manage module to set up after connection, carry out service protection information and update the transmission of service protection information.2) STB ports are responsible for receiving visitor
Family end STB service authorization request, and transfer to certification to be set up with url management module after escape way, carry out service authorization information
With the transmission for updating service authorization information.3) certification completes DRMServer servers and CAServer clothes with url management module
Link between business device is set up and safeguarded, completes to link foundation with safeguarding between DRMServer servers and client STB,
Set up and safeguard escape way.4) program key management module is responsible for the generation of service authorization information, updated, and is responsible for mandate
Online client STB and CAServer server distribution service authorization message.5) control module is responsible for system module management, and is
The concurrent processing of multi-user provides support, supports the extension and performance boost of system.
CAClient modules include descrambler and key port two parts, can also be key-course, business by distinguishing hierarchy
Layer, operation layer is core layer, realizes the functions such as registration, service authorization acquisition of information, the descrambling of program of user.1) descramble
Device realizes whole core contents in the descrambling procedures such as ECM demultiplexing, analysis, CW decryption, the descrambling of program of TS streams.2)
Key port is realized to be interacted with DRMServer servers, submission client STB information, and register user's registration information or
Obtain service authorization information.Client STB completes the program that user selects is received, descrambled by CAClient modules,
Decoding output.3) client STB is operated according to user and required, the multicast address of selection access respective program.4) client STB will
The program received gives CAClient modules, and the decryption to scrambled control word is completed using service authorization information.5) client STB
CAClient modules are given by the program received, it is analyzed, descrambled;(5) client STB carries out the program after descrambling
Decoding output.
(2) DVB/IPTV bimodulus interactive service protection system is directed to the application of different business pattern
Live (multicast) pattern:
Live (multicast) system groundwork flow:
Start set top box, BOSS systems (business operation support system) connection CA clients, and browse its ordered service row
Table, CA clients provide client id and service list by EPG/Portal (electronic program guides/portal technology) to BOSS,
Subscribed programmes or request program are played;
CA clients provide client id to authorization server, concurrently send service authorization information to ask;Authorization server leads to
Lookup online user's information is crossed, and the certification of client id is carried out between BOSS, service authorization information, BOSS Assets Reorganization Taking is generated
Can the account of reason module confirmation user be met needed for ordered program, if can meet, BOSS returns to service to authorization server and awarded
Weigh the request results of information;
If by authorizing, transmission instruction is to streaming server, and according to the service list of request, by SS, (stream takes program data stream TS
Business device) send, by CA servers, CA servers send service protection information request to authorization server;Authorization server is given
Service list generates corresponding system key information and service protection information, and returns to the request of CA server service protection informations
As a result;
In CA server ends, TS streams send CA clients to by PSI (program settings information) analyses, scrambling, encryption;
CA clients are passed through after the processing opposite with CA server ends, descrambling decryption TS and are sent to screen display.
Authorization server is pushed to CA servers and the Entitlement Control Message interface of CA clients respectively by pushing interface
Service protection information, for scrambling and descrambling.
Demand mode:
Program request iCAS system groundwork flows:
Start set top box, BOSS systems connection CA clients, and browse its ordered service list, CA clients pass through EPG/
Portal provides client id and media list to BOSS, and subscribed programmes or request program are played;
CA clients provide client id to authorization server, and send media authorization information request;Authorization server leads to
Lookup online user's information is crossed, and the certification of client id is carried out between BOSS, media authorization information, BOSS Assets Reorganization Taking is generated
Can the account of reason module confirmation user be met needed for ordered program, if can meet, BOSS returns to media to authorization server and awarded
Weigh the request results of information;
If by authorizing, transmission instruction to VOD server, program data stream TS according to the media list of request by VS (depending on
Demand service device) send;
Pre-packaged server sends media protection information request to authorization server;Authorization server is generated to media list
Corresponding system key information and service protection information, and return to the request results of pre-packaged server media protection information;
In pre-packaged server, TS flows pre-packaged agreement (the pre-packaged agreement according to C/S or B/S working methods:BOSS systems
Asset management in system sends the URL after original URL and encryption to pre-packaged server, and to scrambling depth and scrambling mode
Deng configuration, pre-packaged server returns to result.) carry out after PSI analyses, scrambling, encryption, send VOD server to;CA client
End obtains required content by accessing Web page, and by the processing opposite with pre-packaged server end, descrambling is decrypted after TS and passed
It is sent to screen display.
Authorization server is by pushing interface respectively to the Entitlement Control Message interface of preprocessing server and CA clients
Media protection information is pushed, for scrambling and descrambling.
(3) the controllable traffic flow security transmission of encryption mode
System scrambling module in the pre-packaged module of front end subsystem uses two kinds of algorithms of CSA and AES, can be according to ring
Border needs to change scrambling algorithms in real time.Encrypting module is encrypted using aes algorithm to CW, support CBC (inverse block linking scheme),
OFB (output feedback mode), CFB (cipher feedback pattern), CTR (technology mode), five kinds of encryptions of ECB (electronic codebook mode pattern)
Entitlement Control Message ECM is encrypted pattern, can arbitrarily be chosen in front terminal system configuration parameter structure, so that
Realize the secrecy transmission of information flow.Idiographic flow is as follows.
1)chiCan be unity logic channel or single one physical channel to need the program stream for protecting transmission;
2)skiFor with program (group) chiRelated business cipher key, is produced and is updated by Certificate Authority subsystem controls;
3) P is all skiThe set of composition, Q is ch selected by useriCorresponding skiThe subset of composition, and encrypted transmission
To user;
4)cwi tTo scramble ch in tiWhen the control word that uses, length is 64bits (CSA) or 128bits (AES);
5) S () is to tsiScramble function, may be selected to be CSA and AES, descrambling key is cwi t(note:S () and S-1
() selection algorithm should be consistent with key);
6)S-1() is to tsiDescrambling function, may be selected to be CSA and AES, descrambling key is cwi t(note:S () and S-1() selection algorithm should be consistent with key);
7)ECMiFor with chiCorresponding Entitlement Control Message, includes cwi tAnd its relevant information;
8) E () is ECMiGenerating function, is selected as AES, and encryption mode is one of CBC, CFB, OFB, CTR, is encrypted close
Key is ski(note:D () answers consistent with E () selection algorithm with pattern, key);
9) D () is ECMiDecryption function, is selected as AES, and encryption mode is one of CBC, CFB, OFB, CTR, is decrypted close
Key is ski(note:D () answers consistent with E () selection algorithm with pattern, key).
(4) the service protection level simplified
The system uses double layer encryption strategy, includes two encryptions level, i.e. single-unit mesh relevant layers (PRL:Program
Related Layer) and business relevant layers (SRL:Service Related Layer).Implement for PRL layers to be based on cw pairs of control word
The scrambling of video content, SRL layers based on business cipher key by encrypting generation business related control information (SRI:Service
Related Information), i.e. Entitlement Control Message ECM.Scrambling calls Common Scrambling Algorithm CSA to complete using CW as key
Direct scrambling protection to programme content to be transmitted.Encryption calls AES, such as AES using business cipher key SK as key, realizes
Encryption to Control Word, forms Entitlement Control Message (ECM).CW ensures the safe transmission of programme content, while CW and SK
Separation, also make it that the scrambling of programme content is unrelated with user, reduces the complexity of system.
Entitlement Control Message ECM further is multiplexed to form transport stream with the program stream after scrambling, is distributed by multipling channel
To client.Because ECM is related to user, therefore only holds SK user and could descramble, realize the target of Conditional Access.
For terminal consumer, some video traffic is accessed if desired, it is necessary to is interacted and is obtained with certificate server by IP duplex channels
Obtain the Entitlement Management Message related to consumer.
At PRL layers, video traffic transport stream is scrambled under descrambling key CW control.CW by front end CW makers
(CWG) generate, scrambling algorithms are using Common Scrambling Algorithm (CSA) so as to compatible with DVB-CAS.At SRL layers, CW will be close in business
Encryption generation ECM under key SK control.And business cipher key SK is then the business application mould by Certificate Authority subsystem and client
Block is produced by key agreement protocol.In the transport stream that ECM will be multiplexed to after scrambling.It is complete in the terminals such as consumer's set top box
Into opposite process, demultiplex ECM and decryption restoration goes out CW, and then obtain original transport stream and give decoder.With front end phase
Together, client will also be obtained from Certificate Authority subsystem and dynamic updates business cipher key sk.
(5) business cipher key updates
The system has used dynamic key to update and distribution technique.Dynamic key updates is divided into two stages with distribution, point
It is not that business cipher key switching phase and dynamic service key push the stage.The business application mould of Certificate Authority subsystem and client
Block produces business cipher key SK by key agreement protocol.After successful negotiation key, user profile and its corresponding SK will be protected
Online user's list is stored to, timer is activated.When reaching specified time interval, (interval provides the minimum that re-authentication is consulted
Time interval, may expand automatically with interval of increasing of number of users) when, by SK update modules in online user's list
User re-starts Authentication and Key Agreement, more new session key SK, to improve the security of system.Wherein, business cipher key SK
It is distributed using modes such as SSL by safe lane.In addition to business cipher key SK, Control Word and system are also included in the system
Key MK.The renewal of wherein Control Word is unrelated with user, is updated by appointed interval (such as 10seconds).When discovery industry
When business operation goes wrong, system key is just updated, or is carried out more when reaching and specifying time interval (such as 1month)
Newly.
System has been respectively adopted cipher key hierarchy update method and improved group close during business cipher key is updated
Key update method.So-called cipher key hierarchy updates, be exactly DRM authorization Verification System when carrying out key updating, upper level DRM
Server only carries out key updating to the DRM Server in local area, and without directly providing service to user, and improved group close
The characteristics of key agreement, allows for the specific business characteristic of television services, and broadcasting service and other value-added services are carried out into difference pair
Treat, if user has had subscribed to the broadcasting service specified, then when switching uses other business, DRM system is not to broadcast
Business cipher key updates, and key updating processing is only carried out to value-added service, and find group key more during key updating
New minimum nodes, communication overhead and computing capability loss that further reduction business cipher key updates.
The key updating process of Certificate Authority subsystem and front end subsystem is as follows:Certificate Authority subsystem and front end subsystem
TCP/IP connections are stood in construction in a systematic way, open the network monitoring of front end subsystem, and the message that Certificate Authority subsystem is sent is carried out in real time
Analysis;Certificate Authority subsystem sends the SK information updated in predetermined time interval;Front end subsystem receives Certificate Authority
After the message flag that subsystem is sent is SK information, the information is analyzed.Current SK is verified and extracted
The SK data that next moment uses.Then confirmation is sent to Certificate Authority subsystem.Complete Certificate Authority subsystem with
The key updating of front end subsystem.
The key updating process (broadcast) of Certificate Authority subsystem and client is as follows:Certificate Authority subsystem and client
Set up after SSL connections, pass through SSL safe lane transmitting subscriber informations;Certificate Authority subsystem is obtained according to online user's list
After user's program Pid and user profile, notify whether SSL is transferred to customer service key, and its program Pid;Client terminates
The information for being masked as SK is received, is saved backup.
The key updating process (program request) of Certificate Authority subsystem and client is as follows:Certificate Authority subsystem and client
Set up after SSL connections, pass through SSL safe lane transmitting subscriber informations;User profile is handled by Subscriber Management System, user is by point
Broadcast application form and be sent to Certificate Authority subsystem;Certificate Authority subsystem utilizes the Pid of program request application form, and phase is sent to client
The SK answered;Client receives the information for being masked as SK, analyzes the SK that the information obtains subsequent time.
(6) the pre-packaged technology based on agency
With reference to Fig. 6, the system model uses C/S structures, as shown in the figure.The pre-packaged system end on the right side is server, depending on
Frequency input is client.C/S model is also used in pre-packaged internal system, is made up of master server and proxy server, is acted on behalf of
Server is server end for master server, and master server is client.
Entirely the design philosophy of model is:To needing to encapsulate the video encrypted, master server is initially entered, it is according to video
Size is judged, chooses whether to need proxy server to encapsulate.If being not required to agency to perform, do not split video file, oneself
Directly it is packaged encryption;If desired agency performs, then video file is divided into several segments according to the algorithm of design, then certainly
Idle proxy server on dynamic search network, sends the video being segmented to available agency, allows its execute encapsulation function.
After proxy server encapsulation is completed, then main server-side is returned in time, weighed the segmentation of return by main server-side
Group, reverts to complete packaged " former video " file.
Proxy server mainly includes pre-packaged main control module and pre-packaged proxy module.According to pre-packaged main control module
Function can be classified as two parts:A part is central controller, and main realize acts on behalf of encapsulation operation to video file, such as divides
Cut, dispatch with merging;Another part is independent pre-packaged module, i.e., without using proxy server, and directly video content is completed
Encapsulation function.
Pre-packaged technical method based on agency mainly includes Video segmentation, and video dispatching and key are obtained.
Video segmentation is for the video for needing to encapsulate, if its size is m (mb), need to split hop count for s, video encapsulation
Speed is k (mb/s), and the speed of transmission of video is v (mb/s), and Video segmentation needs duration t1, and video merging takes a length of
t2.In specific implementation procedure, carry out according to the following rules:One section of segmentation, transmits one section;While transmission, to carry out in real time
Encapsulation;It is transmitted back at once after the completion of video-frequency band encapsulation;Pass several sections back, then merge several sections.The hop count s that should split should meet public affairs
Formula:Δt1+Δt2·s+2(m/s)/v+(m/s)/k<M/k, wherein, m/k is the independent pre-packaged required time.
TS video files are made up of the TS bags of multiple 188 bytes, therefore when size and the segmentation video part of segmentation video
Required buffer size should be the integral multiple of 188 bytes.If the video size of input is ten thousand TS bags of n, split thought
For:
(1)n<When=160, video is not split;
(2)160<n<When=320, Video segmentation is 2 sections;
(3)320<n<When=480, Video segmentation is 3 sections;
(4)480<n<When=640, Video segmentation is 4 sections;
(5)n>When 640, Video segmentation is 5 sections.
Video dispatching mainly realizes main control module selection proxy module and is allowed to complete pre-packaged process, idiographic flow
For:Pre-packaged main control module regularly sends broadcast message after starting, after the pre-packaged proxy module of line receives broadcast message,
Confirmation is sent to pre-packaged main control module end, the situation of each pre-packaged proxy module is saved in number by pre-packaged main control module
According in storehouse.After pre-packaged main control module end request agency, just start to transmit video, the relevant information of video transmission can be saved to
Corresponding journal file (including the agent identification that is transferred to of video name, video delivery time, video etc.) in.Work as video segmentation
Number less than respond when acting on behalf of number, it is necessary to randomly choose it is therein it is several act on behalf of execute encapsulation process, detailed process is:1) it will receive
The identity map of the agency arrived is the integer between 1-100 (assuming that agency's sum<=100);2) according to the dividing number of video,
It is determined that what is needed acts on behalf of number n;3) the n numbers between 1-100 are produced using pseudorandom number generator;4) according to the random number of generation
Corresponding agent identification is found, the final encapsulation agency for determining to need.
Key obtains the acquisition for including the pre-packaged service key of front terminal System Subsystem and client-end subsystem is pre-packaged
Key is obtained.The acquisition flow of the pre-packaged service key of front terminal System Subsystem is:(data base administration takes video content DBMS
Be engaged in device) according to Mlist (media list) to pre-packaged main control module send transport stream, pre-packaged main control module give Certificate Authority
The Certificate Authority module of system sends MPI (media protection information) request;Certificate Authority module sets up MKI (media keys
Information), MPI is generated, database is arrived into MKI storages, and using Mlist as index;Certificate Authority module returns to pre-packaged master control
Module MPI request results;Pre-packaged master control mould is after calling agency's completion pre-packaged, by TS transmission back to DBMS.Client child
The pre-packaged key of system obtains flow:Start after set top box, client receives packaged from video server
Video content;Client-end subsystem provides client identification and from transmission of video to the Certificate Authority module of Certificate Authority subsystem
The media list Mlist obtained in stream, sends MAI requests;Certificate Authority module carries out client mark with subscriber management intermodule
The certification of knowledge, subscriber management module returns to the media list Mlist ' that can be authorized for user to Certificate Authority module, according to number
MAI is generated according to the Mlist ' information in storehouse;Certificate Authority module returns to client-end subsystem MAI request results;Client child
System can descramble and watching video content.
The system supports off-line data processing, can be with when pre-packaged system server needs to close or interrupts service
Central controller is first passed through, proxy server is selected, after video transmission, that is, service is closed or interrupt.When pre-packaged system
After the service of server is again turned on, agent side automatically can send video, and server need to only carry out later operation can
With.Furthermore it is also possible to mitigate master server burden, realize that high efficiency is encapsulated.When video needs encapsulation all the way, if using generation
Server help is managed, processing time can be reduced;When multi-channel video needs scrambling, server end, due to the limitation of operational capability
The scrambling work of many data volumes is completed, excessive burden can be brought to server, the efficiency of encapsulation is influenceed.And if regarded multiple
Frequency gives the work that proxy server is packaged according to being handled, then, can so accelerate the efficiency of encapsulation, mitigates service
The burden at device end.The quantity of proxy server determines the number of video segmentation, and proxy server is more, and the segments of video is got over
It is many.The hop count of video point is more, will reduce the data volume that each video-frequency band is included, so on the one hand can further subtract
Few transmission time, on the other hand, can also tail off, so that on the whole the time required to the encapsulation video-frequency band on all proxy servers
Improve operating efficiency.
Distributed pre-packaged system, if under high performance network environment, will be more advantageous.The transmission of video file can
By means of the more quick transmission medium such as high bandwidth network or optical fiber, video file to be carried out to send in real time with receiving.
Because the transmission speed of the transmission mediums such as optical fiber is very fast, in terms of multiple video segmentation transmission, the long time will not be taken, because
And the efficiency of whole system can be improved.
(7) safety storage
Memory space ergodic algorithm of the system based on random process realizes safe storage.System design key point
Hair center (Key Distribution Center, KDC) to provide business cipher key for the encryption and decryption file of client, and KDC is first obtained
The segmentation situation (such as n subfile) of client cryptograph files is obtained, corresponding 1 to n unduplicated random sequence, client is generated
End sends ciphertext subfile to storage server successively according to random sequence;Storage server sets up new file, close by what is received
Literary subfile writes new file, until ciphertext subfile is sent;So, out of order ciphertext is just incorporated in storage server
File, file is uploaded successfully.When file is downloaded in user's application, storage server obtains file path, finds file, will disorderly
The cryptograph files of sequence directly transmit client, and the secure decryption of data is directly completed in client, and protection file adds end to end
Close transmission and the safety storage of data.
(8) selectivity scrambling is deep-controlled
The system is more accurately controlled to realize to scrambling depth, uses new to the method for counting of I frames and I- macro blocks
Double upper limits count (n1, n2) method so that count upper-limit n values all can use and arbitrarily scramble depth d can select.To appointing
The d of meaning, if:1) 1/d is integer, then makes n1=1/d, n2=1;2) 1/d is not integer, then 1/d is expressed as into fraction, is used in combination
Euclidean algorithm obtains the greatest common divisor r of molecule denominator, and 1/d=a/b, order are about obtained afterwards:Wherein a and b are
Mutual prime rwmber.
To I frame count c1, the c2 found, when c1 reaches upper limit n1, Scrambling Operation is performed to present frame;On c2 reaches
When limiting n2, two counters are all reset, c1=c2=0.
The set-up mode of two kinds of scrambling depth is provided in actual applications:1) n modes are set, and n is the scrambling upper limit, is actually set
It is 1/n to put scrambling depth;2) d modes are set, and d is scrambling depth, and scrambling upper limit n values are true using above-mentioned double upper limit method of counting
It is fixed.
(9) key updating batch processing strategy
System design introduces key updating batch processing strategy there is provided the key real-time update of million userbases and distribution,
Overhead is reduced, the ability of whole key updating is enhanced, the security of system is improved, provided for pay TV business
Flexible and changeable protection mechanism.This cipher key management structure proposed include authorization server (AS,
Authentication Server) and multiple key servers (KS, Key Server) the two major parts.Authorization service
Device manages all users of indirect control as tree root, the key message of distribution service protection by key server.
Authorization server, it includes user authentication module, key server module and user's authorization module.It acts on bag
Include the access (leaving) for receiving user by SSL safe lanes to ask, and authentication is carried out to user;In the event of grant set
Member changes, and the key server management module of authorization center obtains each key server module by SSL safe lanes and produced
Raw demand (telecommunication) service key simultaneously calculates broadcasting service cryptographic key by one-way function, while notifying demand (telecommunication) service key server more
Its new sub- grant set broadcast (program request) business cipher key, undertakes the key tree that authorization server is constituted with each program request key server
Foundation and maintenance work;Authoring system scrambles server by ES (Encryption System) interfaces and front end and controlled
Word descrambling key information exchange processed, adds so that the multicast key of each key server be sent to as control word descrambling key
Disturb server;Authorization server carries out interacting for user profile with Subscriber Management System, is signed and issued by authorization center and is based on x.509 marking
Accurate digital certificate.The certificate is used for authorized user and carries out authentication when application adds grant set.
Key server, including key production module, key distribution module and key management module.Its function includes logical
Cross key production module and produce pseudo random number, be used as demand (telecommunication) service key to be distributed;Realized by key distribution module for awarding
Weigh the group key distribution of group membership;Key management module carries out data interaction with authorization server, sends and adds in authorization server
Plus (deletion) mandatory member instruction when, key management module notifies key production module to produce new demand (telecommunication) service key, so
The program request key after renewal is sent to authorization server by key management module afterwards, and by key distribution module to specified
User key node carries out key updating.
Referring to Fig. 7, it is assumed that u3 and u4 are the users of two sub- grant sets of application transfer.U3 is transferred to B groups from A groups, and u4 is from B
Group is transferred to A groups.U4 substituted for the original positions of u3, and u3 substituted for original u4 position.It is K to need the cipher key node updatedA
And KB.Key updating path is determined, only need to be during each update, we track the section of each needs more new key
Point, the node for needing more new key to its upper level is marked.In this process, if it find that there is a node to be labeled
Then stop the mark in the path twice.Until all path tags are finished, key updating path is determined that.In whole key tree
In, only KA' and KB' need to update.KADemand (telecommunication) service key updating is KA', KBDemand (telecommunication) service key updating is KB’.Program request industry
Business key server A is sent to u1, is sent, is sent to u4 to u2.Demand (telecommunication) service key server B is sent to u3, is sent to u5,
Sent to u6.
Claims (12)
1. a kind of DVB/IPTV bimodulus interactive service protects system, it is characterised in that:The system includes client-end subsystem, front end
Subsystem, Certificate Authority subsystem, subscriber management system, program Workflow Management System, program information management system part, wherein visitor
Family terminal system, front end subsystem, Certificate Authority subsystem are major part, subscriber management system, program Workflow Management System, section
Mesh information management system is peripheral accessory system, DVB/IPTV bimodulus interactive service protection system, including service protection
The part of module of CAClient tri- in CAServer servers, empowerment management DRMServer and client STB, wherein
In CAServer servers correspondence front end subsystem, empowerment management DRMServer correspondence Certificate Authority subsystems, client STB
CAClient modules correspondence client-end subsystem;
Wherein, described front end subsystem includes:Control word generator (CWG), ECM makers (ECMG), watermarking algorithm
And Common Scrambling Algorithm (CSA) (WEA);The effect of front end subsystem is generation control word, calls Common Scrambling Algorithm (CSA) right
Programme content from program Workflow Management System is scrambled;The control word generator of front end subsystem is based on system key
Control word is generated, scrambling behaviour is carried out to the programme content from program Workflow Management System using DVB Common Scrambling Algorithms (CSA)
Make;Front end subsystem is also encrypted to control word using session key and generates traditional ECM simultaneously;Programme content after scrambling
Program distribution system, which is passed to, with ECM carries out multiplexing transmission;Front end subsystem will regenerate scrambled control word with fixed intervals,
Ensure the transmission safety of programme content;Under program request interactive mode, front end subsystem also is responsible for receiving the broadcasting control of user simultaneously
Information processed, and being adjusted to scrambling and program streaming, described front end subsystem further by encapsulating subsystem in real time, it is pre-
Encapsulate subsystem, secure memory subsystem to constitute, subsystem is encapsulated in real time for the real-time online encapsulation to programme content with protecting
Shield, pre-packaged subsystem is used for offline encapsulation and protection to programme content, and encapsulation subsystem can with pre-packaged subsystem in real time
To select one of them to use or be used in conjunction with as needed, secure memory subsystem can select to use as needed.
2. DVB/IPTV bimodulus interactive service according to claim 1 protects system, it is characterised in that:Client, which is used, divides
Layer and modular structure, client are divided into interface layer, key-course and operation layer from top to bottom;The task that interface layer provides standard connects
Mouthful, receive customer service instruction and user profile, interface layer to user feedback system implementing result or descrambling after programme content;
Key-course is responsible for business module list, calls corresponding operation layer module to complete corresponding business, association according to service order
The operation of each business module is adjusted there is provided the data exchange mechanism of each business module, and compiles the implementing result of each industry module
Feed back to interface layer;Operation layer includes multiple business modules:Order module, business application module, business acquisition module;Order mould
Block completes registration, purchase, query function;Business application module completes programme application, program request application, broadcast application, live Shen
Please, arranging key function;Business acquisition module completes demultiplexing, decryption ECM, descrambled program stream, the checking legal sexual function of program;
Wherein, demultiplexing function is synchronous with the foundation of front end subsystem using odd even control word mode in tradition DVB-CA systems, and receive,
Demultiplexing, obtains ECM and program stream;Decryption ECM functions ECM are decrypted acquisition descrambling control using the session key of negotiation
Word CW;The Control Word that descrambled program stream function is obtained using decryption calls AES or CSA Descrambling Algorithms to solve program stream
Disturb, obtained DVB/IPTV programs are streaming to key-course;The legal sexual function of checking program is used to extract the conjunction in program stream
Method identifies watermark.
3. DVB/IPTV bimodulus interactive service according to claim 1 protects system, it is characterised in that:Described certification is awarded
Subsystem is weighed by service handling module, business cipher key SK update modules, bidirectional identification protocol, SK agreement protocols, timer, online
User list part is constituted, and Certificate Authority subsystem receives application of the user to programme content, industry is obtained by certification and negotiation
Business key SK, and key updating is periodically carried out, the service handling module of Certificate Authority subsystem is the interface with user, root
Start corresponding operation flow, the application to user and its identity under the cooperation of Subscriber Management System according to the program application of user
Information, credit information carry out legitimacy and validation verification, and for legal, effective application, Certificate Authority subsystem provides close
Key negotiation mechanism consults to obtain session key with user, and session key and its pertinent program information are sent by safe lane
Front end subsystem is given, business is verified and regenerated to the identity with fixed intervals again to user by Certificate Authority subsystem
Key.
4. a kind of DVB/IPTV bimodulus interactive service protection system according to claim 1, it is characterised in that:Described
CAServer servers include receiving port, sending port, scrambler, the part of key port four;Described empowerment management
DRMServer includes CA ports, STB ports, certification and url management module, program key management module and control module;Institute
The CAClient modules stated include descrambler and key port two parts, are key-course, operation layer by distinguishing hierarchy, and operation layer is
Core layer, realizes the registration of user, service authorization acquisition of information, the descrambling function of program.
5. DVB/IPTV bimodulus interactive service according to claim 1 protects system, it is characterised in that:The system design
KDC (Key Distribution Center, KDC) provide business cipher key for the encryption and decryption file of client, close
Key Distribution Center first obtains the segmentation situation of client cryptograph files, when for n subfile, and generation corresponding 1 to n is not repeated
Random sequence, client according to random sequence successively to storage server send ciphertext subfile;Storage server is set up new
File, new file is write by the ciphertext subfile received, until ciphertext subfile is sent.
6. DVB/IPTV bimodulus interactive service according to claim 1 protects system, it is characterised in that:The system uses
Controllable scrambling depth-size strategy and adaptive scrambling technology, are dynamically adjusted according to carrier network situation, different compressed encodings and code check
Whole scrambling parameter, can reduce data processing amount while the business of protection, reduce the scrambling expense of video, and the system is real
Now to the control of scrambling depth, the method that (n1, n2) is counted using double upper limits to the method for counting of I frames and I- macro blocks so that meter
Number upper limit n values all be can use and any scrambling depth d can be selected;To arbitrary d, if:1) 1/d is integer, then makes n1=
1/d, n2=1;2) 1/d is not integer, then 1/d is expressed as into fraction, and obtains with Euclidean algorithm the maximum of molecule denominator
Common divisor r, about obtains 1/d=a/b, order afterwards:Wherein a and b are mutual prime rwmbers;
To I frame count c1, the c2 found, when c1 reaches upper limit n1, Scrambling Operation is performed to present frame;When c2 reaches upper limit n2
When, two counters are all reset, c1=c2=0;
The set-up mode of two kinds of scrambling depth is provided in the application:1) n modes are set, and n is the scrambling upper limit, and actual setting scrambling is deep
Spend for 1/n;2) d modes are set, and d is scrambling depth, and scrambling upper limit n values are determined using above-mentioned double upper limit method of counting.
7. DVB/IPTV bimodulus interactive service according to claim 1 protects system, it is characterised in that:The system is to high definition
The efficiency that interactive large scale programme content is packaged, the distributed pre-packaged technology based on intelligent agent, passes through intelligence
Segmentation, scheduling, the collaboration of change, on the premise of security and uniformity is ensured, improve the pre- envelope to large scale programme content
Speed is filled, system model uses C/S structures, and pre-packaged system end is server, and video input is client, in pre-packaged system
It is internal also to use C/S model, it is made up of master server and proxy server, proxy server is server for master server
End, master server is client;To needing to encapsulate the video encrypted, master server is initially entered, master server is big according to video
It is small to be judged, choose whether to need proxy server to encapsulate;If being not required to agency to perform, do not split video file, main service
Device is directly packaged encryption;If desired agency performs, then video file is divided into several segments according to the algorithm of design, then
Idle proxy server on automatic search network, sends the video being segmented to available agency, allows its execute encapsulation work(
Energy;After proxy server encapsulation is completed, then main server-side is returned in time, carried out the segmentation of return by main server-side
Restructuring, reverts to complete packaged " former video " file.
8. DVB/IPTV bimodulus interactive service according to claim 1 protects system, it is characterised in that:The system is used
Dynamic key updates and distribution technique;Dynamic key updates is divided into two stages with distribution, is business cipher key switching phase respectively
The stage is pushed with dynamic service key;The business application module of Certificate Authority subsystem and client is produced by key agreement protocol
Occupation business key SK;After successful negotiation key, user profile and its corresponding business cipher key SK will be saved to online user
List, timer is activated;When reaching specified time interval, by business cipher key SK update modules in online user's list
User re-starts Authentication and Key Agreement, more new session key SK, wherein, business cipher key SK passes through safety using SSL modes
Channel is distributed;In addition to business cipher key SK, Control Word and system key MK are also included in the system;Wherein Control Word
Update unrelated with user, be updated by appointed interval.
9. DVB/IPTV bimodulus interactive service according to claim 1 protects system, it is characterised in that:System is updating industry
It is engaged in during key, cipher key hierarchy being respectively adopted and has updated and group key management;Described cipher key hierarchy is updated, i.e., DRM is awarded
Verification System is weighed when carrying out key updating, upper level DRM Server only carry out key more to the DRM Server in local area
Newly, without directly providing user service, and group key management is to be treated with a certain discrimination broadcasting service and other value-added services,
If user has had subscribed to the broadcasting service specified, then when switching uses other business, DRM authorization Verification System is not right
Broadcasting service cryptographic key is updated, and only carries out key updating processing to value-added service, and group key is found more during key updating
New minimum nodes.
10. DVB/IPTV bimodulus interactive service according to claim 1 protects system, it is characterised in that:The system is preceding
Scrambling module uses two kinds of algorithms of CSA and AES in the pre-packaged module of terminal system, needs to change to scramble in real time according to environment to calculate
Method, encrypting module is encrypted using aes algorithm to CW, supports CBC (inverse block linking scheme), OFB (output feedback mode), CFB
(cipher feedback pattern), CTR (technology mode), five kinds of encryption modes of ECB (electronic codebook mode pattern) are to Entitlement Control Message ECM
It is encrypted, is arbitrarily chosen in front terminal system configuration parameter structure, realize the secrecy transmission of information flow.
11. DVB/IPTV bimodulus interactive service according to claim 1 protects system, it is characterised in that:The system is used
Double layer encryption strategy, includes two encryptions level, i.e. single-unit mesh relevant layers (PRL:Program Related Layer) and business
Relevant layers (SRL:Service Related Layer), scrambling of the PRL layers of implementation based on Control Word to video content, SRL layers
Based on business cipher key by encrypting generation business related control information (SRI:Service Related Information), i.e.,
Entitlement Control Message ECM, is scrambled using Control Word as key, calls Common Scrambling Algorithm CSA to complete to programme content to be transmitted
Direct scrambling protection, encrypt using business cipher key SK as key, call AES, the encryption to Control Word, formed authorize
Control information (ECM), Control Word ensures the safe transmission of programme content, while the separation of Control Word and business cipher key SK,
Also so that the scrambling of programme content is unrelated with user, the complexity of system is reduced.
12. DVB/IPTV bimodulus interactive service according to claim 1 protects system, it is characterised in that the system is introduced
Key updating batch processing strategy, makes key real-time update and the distribution of million userbases, it includes an authorization server
(AS, Authentication Server) and two parts of multiple key servers (KS, Key Server), wherein authorizing clothes
Device be engaged in as tree root, the key message of distribution service protection, and all users of indirect control are managed by key server;Authorize
Server, including user authentication module, key server module and user's authorization module, authorization server pass through SSL safety
Channel receives the access of user or leaves request, and carries out authentication to user;Key server, including key generation mould
Block, key distribution module and key management module, key server produce pseudo random number by key production module, as treating
The demand (telecommunication) service key of distribution;Group key distribution for authorizing group membership is realized by key distribution module;Key management module
Data interaction is carried out with authorization server, when authorization server sends addition or deletes the instruction of mandatory member, key management
Module notifies key production module to produce new demand (telecommunication) service key, and then key management module is close by the program request after renewal
Key is sent to authorization server, and carries out key updating to specified user key node by key distribution module.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210539322.4A CN103873895B (en) | 2012-12-14 | 2012-12-14 | A kind of DVB/IPTV bimodulus interactive service protects system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210539322.4A CN103873895B (en) | 2012-12-14 | 2012-12-14 | A kind of DVB/IPTV bimodulus interactive service protects system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103873895A CN103873895A (en) | 2014-06-18 |
CN103873895B true CN103873895B (en) | 2017-07-25 |
Family
ID=50911967
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210539322.4A Active CN103873895B (en) | 2012-12-14 | 2012-12-14 | A kind of DVB/IPTV bimodulus interactive service protects system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103873895B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108390754A (en) * | 2018-01-24 | 2018-08-10 | 上海航天芯锐电子科技有限公司 | Chip interior bus scrambling apparatus based on variable element and method for scrambling |
Families Citing this family (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104023237A (en) * | 2014-06-23 | 2014-09-03 | 安徽皖通邮电股份有限公司 | Signal source authenticity identification method for signal transmission tail end |
KR102541321B1 (en) * | 2014-07-11 | 2023-06-08 | 삼성전자주식회사 | Method and apparatus of joint security advanced ldpc cryptcoding |
CN106487773A (en) * | 2015-09-01 | 2017-03-08 | 中兴通讯股份有限公司 | A kind of encryption and decryption method and device |
CN105491409B (en) * | 2015-12-24 | 2019-01-08 | 北京腾锐视讯科技有限公司 | Enhance CA system in a kind of digital television system |
CN105898419B (en) * | 2016-06-20 | 2019-06-14 | 深圳创维数字技术有限公司 | A kind of pay per view method and system based on set-top box |
CN106411713B (en) * | 2016-10-24 | 2020-06-05 | 腾讯音乐娱乐(深圳)有限公司 | State notification method and server |
CN106658076B (en) * | 2016-10-26 | 2020-04-14 | 中国传媒大学 | Digital copyright management system |
CN108322778B (en) * | 2018-02-09 | 2020-11-20 | 珠海迈科智能科技股份有限公司 | Method and device for increasing scrambling speed of DVB data stream |
CN110049009B (en) * | 2019-03-08 | 2022-06-17 | 视联动力信息技术股份有限公司 | Identity information acquisition system and method |
CN110784318B (en) * | 2019-10-31 | 2020-12-04 | 广州华多网络科技有限公司 | Group key updating method, device, electronic equipment, storage medium and communication system |
CN111601155B (en) * | 2020-04-07 | 2022-05-17 | 广东省广播电视网络股份有限公司 | Method for set top box to be compatible with different network access devices and service platforms |
CN111613234B (en) * | 2020-05-29 | 2022-09-13 | 富盛科技股份有限公司 | Multi-stage flow scheduling method, system and device |
CN114125392B (en) * | 2021-11-24 | 2024-09-20 | 济南市房产测绘研究院 | Device for rapidly acquiring video monitoring data of engineering construction project |
CN116614277A (en) * | 2023-05-24 | 2023-08-18 | 中国电子科技集团公司第三十研究所 | Network security supervision system and method based on machine learning and abnormal behavior analysis |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101155048A (en) * | 2006-09-25 | 2008-04-02 | 华为技术有限公司 | Method and system for implementing network television service |
EP2071838A1 (en) * | 2006-09-25 | 2009-06-17 | Huawei Technologies Co., Ltd. | A system, device and method of suppoting ims terminals to share iptv services |
-
2012
- 2012-12-14 CN CN201210539322.4A patent/CN103873895B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101155048A (en) * | 2006-09-25 | 2008-04-02 | 华为技术有限公司 | Method and system for implementing network television service |
EP2071838A1 (en) * | 2006-09-25 | 2009-06-17 | Huawei Technologies Co., Ltd. | A system, device and method of suppoting ims terminals to share iptv services |
Non-Patent Citations (1)
Title |
---|
宽带互动电视双模有条件接收系统架构;杨成,刘剑波,张宜春,田佳音;《图像图形技术研究与应用2009—第四届图像图形技术与应用学术会议论文集》;20090430;第75页第2栏倒数第7行到第76页第1栏第12行,第77页第2栏第1行到第81页第2栏第8行,附图1-9 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108390754A (en) * | 2018-01-24 | 2018-08-10 | 上海航天芯锐电子科技有限公司 | Chip interior bus scrambling apparatus based on variable element and method for scrambling |
CN108390754B (en) * | 2018-01-24 | 2020-12-04 | 上海航天芯锐电子科技有限公司 | Scrambling method of chip internal bus scrambling device based on variable parameters |
Also Published As
Publication number | Publication date |
---|---|
CN103873895A (en) | 2014-06-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103873895B (en) | A kind of DVB/IPTV bimodulus interactive service protects system | |
JP4086782B2 (en) | Access to broadcast content | |
US20080065548A1 (en) | Method of Providing Conditional Access | |
TWI376131B (en) | Methods of broadcasting and receiving a scrambled multimedia programme, content,headend, terminal, receiver and security rpocessor for such methods | |
CN101076109B (en) | Two-way CA system of digital TV-set and method for ordering and cancelling programm based on it | |
CN101719910A (en) | Terminal equipment for realizing content protection and transmission method thereof | |
CN101277181A (en) | Dynamic multilayer encryption method for managing flow medium digital authority | |
EP2772062B1 (en) | Constructing a transport stream | |
JP5161372B2 (en) | How to enforce reception rules for broadcast programs by the Administration Center | |
CN100401769C (en) | Method for enciphering and deciphering living-broadcasting flow-medium data | |
CN107294927A (en) | Anti-stealing link method, device and system based on the network terminal | |
CN100442839C (en) | Information transmitting method and apparatus for interactive digital broadcast television system | |
JP2011510532A (en) | Digital television limited reception system and processing procedure | |
JP2012503389A5 (en) | ||
CN102111681B (en) | Key system for digital television broadcast condition receiving system | |
EP1903799B1 (en) | A method for realizing preview of iptv programs, an encryption apparatus, a right center system and a user terminal | |
CN103237010A (en) | Server side for providing digital content in encryption mode | |
RU2541923C1 (en) | Method of transmitting and receiving multimedia content | |
CN101018317A (en) | A virtual intelligent card security authentication method and system | |
KR20080083874A (en) | Security system based on conditional access system and method for controlling conditional access service | |
CN102340702A (en) | IPTV (Internet protocol television) network playing system and rights management and descrambling method based on USB (Universal serial bus) Key | |
CN101562520A (en) | Method and system for distributing service secret keys | |
CN102917252B (en) | IPTV (internet protocol television) program stream content protection system and method | |
CN1443421A (en) | Secure digital content delivery system and method over broadcast network | |
CN110868641B (en) | Method and system for detecting validity of live broadcast source |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |