CN109728912A - Broadcasting content safe transmission method, system and terminal - Google Patents

Broadcasting content safe transmission method, system and terminal Download PDF

Info

Publication number
CN109728912A
CN109728912A CN201711038944.8A CN201711038944A CN109728912A CN 109728912 A CN109728912 A CN 109728912A CN 201711038944 A CN201711038944 A CN 201711038944A CN 109728912 A CN109728912 A CN 109728912A
Authority
CN
China
Prior art keywords
key
terminal
content
drm platform
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711038944.8A
Other languages
Chinese (zh)
Inventor
沈晶歆
李兴达
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Telecom Corp Ltd
Original Assignee
China Telecom Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Telecom Corp Ltd filed Critical China Telecom Corp Ltd
Priority to CN201711038944.8A priority Critical patent/CN109728912A/en
Publication of CN109728912A publication Critical patent/CN109728912A/en
Pending legal-status Critical Current

Links

Landscapes

  • Storage Device Security (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

The present invention provides a kind of broadcasting content safe transmission method, system and terminal, method therein includes: to be authenticated in terminal booting with digital copyright management DRM platform, and terminal issues terminal key to DRM platform request after through certification;Content key after encryption is sent to terminal by DRM platform, and terminal is decrypted the content key after encryption based on terminal key, obtains content key and the broadcasting content that DRM platform issues is decrypted based on content key.Method and Internet of things system of the invention constructs high safety trust chain using level Four key, trust chain is implemented into terminal and session-level, greatly improves the safety of content key;The root key advantage for taking full advantage of the safety chip of terminal, substantially increases the efficiency of copyright protection, carries out the copyright protection application scenarios of full 4K business etc. suitable for current scale.

Description

Broadcasting content safe transmission method, system and terminal
Technical field
The present invention relates to field of communication technology more particularly to a kind of broadcasting content safe transmission methods, system and terminal.
Background technique
With the development of the technologies such as 4K (4096 × 2160 pixel resolutions)/Virtual Reality, content (film, video Deng) value it is higher and higher.For pirate mode increasingly hiddenization of content, sharing model is mainly downloaded by P2P, steals chain Mode, Dropbox mode, movement/OTT aggregation scheme etc., so that anti-piracy and evidence obtaining difficulty is continuously increased.Currently, content provides Quotient CP increasingly payes attention to copyright protection, and industry has generally been implemented to carry out DRM (Digital Rights to high-definition content Management, digital copyright management) protection, it prevents content from being used by piracy, still, currently prevents from letting out due to key not yet Leakage and caused by the effective ways that fail comprehensively of content antitheft mechanism.
Summary of the invention
One or more embodiments of the invention provides a kind of broadcasting content safe transmission method, system and terminal.
According to one aspect of the disclosure, a kind of broadcasting content safe transmission method is provided, comprising: in terminal booting, The terminal is authenticated with digital copyright management DRM platform;If authenticated successfully, the terminal is asked to the DRM platform It asks and issues terminal key;The terminal sends encrypted content playing request to the DRM platform, and the DRM platform will be by adding It is close that treated that content key is sent to the terminal;The terminal be based on the terminal key to described after encryption Content key be decrypted, obtain the content key and the DRM platform issued based on the content key Broadcasting content is decrypted.
Optionally, it includes: that the terminal receives what the DRM platform was sent that the terminal and DRM platform, which carry out certification, Session key public key and the first challenge word;The terminal obtains the sequence number SN and identification number IN of itself, is based on the SN and institute It states IN and calculates the second challenge word;The first challenge word is compared the terminal with the second challenge word, if compared As a result identical as the second challenge word for the first challenge word, then authenticate success.
Optionally, the SN and IN is as the burning of hardware trusted root key in the safety chip OTP of the terminal.
Optionally, it includes: that the terminal generates authen session that the terminal, which issues terminal key to DRM platform request, Key R1 and label Token will use the R1 after the session key public key encryption and the Token to be sent to described DRM platform;The DRM platform using after session key private key pair encryption the R1 and the Token be decrypted, obtain It takes and stores the R1 and the Token;The DRM platform uses the R1 ciphering terminal secret key and private key, and will be encrypted Terminal key private key is handed down to the terminal;Place is decrypted to encrypted terminal key private key using the R1 in the terminal Reason, obtains the terminal key private key.
Optionally, the terminal key private key includes: the private key of terminal, certificate;The terminal is using the R1 to encryption Private key, the certificate of terminal afterwards are decrypted, and obtain the terminal key private key, and by the private key of the terminal, certificate It is stored in trusted application environment TEE.
Optionally, the terminal receives the request for playing encrypted content, and Xiang Suoshu DRM platform reports the Token;Institute DRM platform use terminal key public key encryption content key corresponding with the Token is stated, and will be under encrypted content key Issue the terminal;The terminal is decrypted using the content key after the terminal key private key pair encryption, is obtained The content key.
Optionally, the content key is arranged in licensing, and the DRM platform uses the terminal key public key encryption The licensing;The terminal is decrypted using the licensing after the terminal key private key pair encryption, described in acquisition The content key in licensing.
Optionally, the terminal includes: set-top box.
According to another aspect of the present disclosure, a kind of terminal is provided, comprising: authentication module, for booting when and digital version Power managing drm platform is authenticated, if authenticated successfully, issues terminal key to DRM platform request;Key obtains mould Block, for sending encrypted content playing request to the DRM platform, receive that the DRM platform sends after encryption Content key;Content decryption module, for based on the terminal key to the content key after encryption into Row decryption processing is obtained the content key and is carried out based on the content key to the broadcasting content that the DRM platform issues Decryption.
Optionally, the authentication module, for receiving the session key public key and the first challenge that the DRM platform is sent Word obtains itself sequence number SN and identification number IN, calculates the second challenge word based on the SN and IN;Described first is chosen War word is compared with the second challenge word, if comparison result is the first challenge word and the second challenge word phase Together, then success is authenticated.
Optionally, the SN and IN is as the burning of hardware trusted root key in the safety chip OTP of the terminal.
Optionally, the Key Acquisition Module will use described for generating authen session key R1 and label Token The R1 and the Token after session key public key encryption are sent to the DRM platform;Wherein, the DRM platform uses meeting The encrypted R1 and the Token is decrypted in words secret key and private key, obtains and store the R1 and described Token;The DRM platform uses the R1 ciphering terminal secret key and private key, and encrypted terminal key private key is handed down to institute State Key Acquisition Module;The Key Acquisition Module is also used for the R1 and solves to encrypted terminal key private key Close processing obtains the terminal key private key.
Optionally, the terminal key private key includes: the private key of terminal, certificate;The Key Acquisition Module is also used to make It is decrypted with private key, certificate of the R1 to encrypted terminal, obtains the terminal key private key, and by the end Private key, the certificate at end are stored in trusted application environment TEE.
Optionally, the content decryption module, for receiving the request for playing encrypted content, Xiang Suoshu DRM platform is reported The Token;Wherein, DRM platform use terminal key public key encryption content key corresponding with the Token, and will Encrypted content key is handed down to the content decryption module;It is close to be also used for the terminal for the content decryption module Content key after key private key pair encryption is decrypted, and obtains the content key.
Optionally, the content key is arranged in licensing, and the DRM platform uses the terminal key public key encryption The licensing;The content decryption module, the licensing after being also used for the terminal key private key pair encryption are solved Close processing obtains the content key in the licensing.
Optionally, the terminal includes: set-top box.
According to the another aspect of the disclosure, a kind of broadcasting content secure transmission system is provided, comprising: DRM platform, institute as above The terminal stated.
According to the another aspect of the disclosure, a kind of terminal is provided, comprising: memory;And it is coupled to the memory Processor, the processor is configured to based on the instruction stored in the memory, broadcasting content peace in execution Full transmission method.
According to the another further aspect of the disclosure, a kind of computer readable storage medium is provided, computer program is stored thereon with The step of instruction, which realizes method as described above when being executed by one or more processors.
Broadcasting content safe transmission method, system and the terminal of the disclosure, terminal and digital copyright management in booting DRM platform is authenticated, and terminal issues terminal key to DRM platform request after through certification;DRM platform will be by encryption Content key after reason is sent to terminal, and place is decrypted to the content key after encryption based on terminal key in terminal Reason is obtained content key and the broadcasting content that DRM platform issues is decrypted based on content key;It is constructed using level Four key Trust chain is implemented into terminal and session-level by high safety trust chain, greatly improves the safety of content key;It makes full use of The root key advantage of the safety chip of terminal, substantially increases the efficiency of copyright protection, be suitable for current scale carry out it is complete The copyright protection application scenarios of 4K business etc..
Detailed description of the invention
In order to illustrate more clearly of the embodiment of the present disclosure or technical solution in the prior art, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only Some embodiments of the present disclosure, for those of ordinary skill in the art, without any creative labor, also Other drawings may be obtained according to these drawings without any creative labor.
Fig. 1 is the flow diagram according to one embodiment of the broadcasting content safe transmission method of the disclosure;
Fig. 2 is the flow diagram according to another embodiment of the broadcasting content safe transmission method of the disclosure;
Fig. 3 is the schematic diagram of level Four key mechanism;
Fig. 4 is the module diagram according to one embodiment of the terminal of the disclosure;
Fig. 5 is the schematic diagram according to one embodiment of the broadcasting content secure transmission system of the disclosure;
Fig. 6 is the module diagram according to another embodiment of the terminal of the disclosure.
Specific embodiment
The disclosure is described more fully with reference to the accompanying drawings, wherein illustrating the exemplary embodiment of the disclosure.Under Face will combine the attached drawing in the embodiment of the present disclosure, and the technical solution in the embodiment of the present disclosure is clearly and completely described, and show So, described embodiment is only disclosure a part of the embodiment, instead of all the embodiments.Based on the reality in the disclosure Example is applied, every other embodiment obtained by those of ordinary skill in the art without making creative efforts all belongs to In the range of disclosure protection.
" first " hereinafter, " second " etc. are only used for distinguishing in description, and there is no other special meanings.
Fig. 1 is according to the flow diagram of one embodiment of the broadcasting content safe transmission method of the disclosure, such as Fig. 1 institute Show
Step 101, when terminal is switched on, terminal is authenticated with digital copyright management DRM platform.Terminal can be machine top Box, intelligent terminal etc..Certification can be two-way authentication etc..
Step 102, if authenticated successfully, terminal issues terminal key to DRM platform request.
Step 103, terminal sends encrypted content playing request to DRM platform, and DRM platform will be in after encryption Hold key and is sent to terminal.
Step 104, terminal is decrypted the content key after encryption based on terminal key, in acquisition Hold key and the broadcasting content that DRM platform issues is decrypted based on content key.
In one embodiment, it is two-way authentication that terminal and DRM platform, which carry out certification,.Terminal receives DRM platform transmission Session key public key and the first challenge word, challenge word can be for a numeric string or character string etc..Terminal obtains the sequence of itself Row number SN and identification number IN calculates the second challenge word based on SN and IN.Terminal compares the first challenge word and the second challenge word It is right, if comparison result is that the first challenge word is identical as the second challenge word, authenticate success.
SN and IN as the burning of hardware trusted root key terminal safety chip OTP (One Time Programable) In, it can the burning before terminal is dispatched from the factory.When terminal is switched on, safety chip carries out the two-way of DRM platform and terminal using SN and IN Certification.
Terminal issues terminal key to DRM platform request can be there are many mode, for example, terminal generates authen session key R1 and label Token, will use the R1 after session key public key encryption and Token to be sent to DRM platform, session key R1 is by end End is generated when being switched on certification.
DRM platform using after session key private key pair encryption R1 and Token be decrypted, obtain and store R1 and Token.DRM platform uses R1 ciphering terminal secret key and private key, and encrypted terminal key private key is handed down to terminal.Terminal is close Key includes pairs of terminal key public key and terminal key private key, can be generated by DRM platform.
For example, terminal key private key includes: the private key of terminal, certificate, certificate can be manufacturer's signing certificate.Terminal uses Private key, the certificate of encrypted terminal is decrypted in R1, obtains terminal key private key, and by the private key of terminal, certificate It is stored in trusted application environment TEE.TrustZone technology is that a kind of safe operation for hardware level that ARM company proposes solves Scheme.System has been divided into two regions TEE and REE by TrustZone, runs android system in REE, and TEE has independence Operation, storage resource, be isolated entirely from REE.The program needs run on TEE are individually signed by manufacturer and could be run.
In user's click play encrypted content, terminal receives the request for playing encrypted content, reports to DRM platform Token.DRM platform use terminal key public key encryption content key corresponding with Token, and will be under encrypted content key Issue terminal.Encrypted content key is decrypted in terminal using terminal secret key and private key, obtains content key.Content Key can be set in licensing, DRM platform using terminal public key encrypted permission card.Terminal using terminal secret key and private key Encrypted licensing is decrypted, the content key in licensing is obtained.
In one embodiment, as shown in figure 3, the level Four key machine that the hardware trusted root key based on set-top box constructs System, comprising: root key SN and IN, session key R1, terminal key DK and content key CK.
The first order is SN+IN.SN and IN are stored in safety chip OTP as hardware root of trust.SN is readable data, IN is unreadable data, each terminal has unique SN (chip unique tag serial number) and IN, and (chip interior is uniquely marked Knowledge number, can not read and write).When terminal is switched on, safety chip carries out the two-way authentication of DRM platform and terminal using SN and IN.
The second level is authen session key R1.R1 is generated by terminal when being switched on and authenticating, and is sent to DRM platform, is completed Certification.After the completion of certification, DRM platform uses R1 ciphering terminal key in terminal D RM initialization procedure.
The third level is terminal key, private key, certificate including terminal.After booting authenticates successfully, carrying out, terminal D RM is initial When change, terminal uses authen session Token, from DRM platform requesting terminal key.DRM platform is obtained corresponding using Token Encrypted terminal secret key, certificate are returned to terminal, terminal decrypts in TEE and saves terminal with R1 ciphering terminal private key by R1 Private key, certificate.
The fourth stage is content key, is used for encrypted content.Content key is in licensing, using terminal public key encryption.? When content is decrypted, terminal using terminal private key decrypts the content key in licensing.
Fig. 2 is according to the flow diagram of another embodiment of the broadcasting content safe transmission method of the disclosure, such as Fig. 2 It is shown:
Step 201, terminal booting, first progress bidirectional identity authentication.
Step 202, DRM platform issue session key public key and challenge word to terminal.
Step 203, terminal calculate challenge word using SN+IN, are compared with value is issued, complete two-way authentication.
Step 204, terminal generate authen session key R1 and Token, using being sent to DRM after session key public key encryption Platform, DRM platform save R1 and Token after being decrypted with session key private key.
Step 205, DRM platform use R1 ciphering terminal secret key and private key, and are handed down to terminal, and terminal is obtained after being decrypted using R1 Obtain terminal key private key.
Step 206, terminal report Token to DRM platform according to user's click play encrypted content.
Step 207, DRM platform use terminal key public key encryption content key corresponding with Token, are handed down to terminal.
Step 208, terminal using terminal secret key and private key obtain content key after being decrypted, and solve to encrypted content It is close.
Broadcasting content safe transmission method provided by the above embodiment constructs high safety trust chain using level Four key, fills Divide the root key advantage that the safety chip of terminal is utilized, trust chain is implemented into terminal and session-level, greatly improves interior The safety for holding key, substantially increases the efficiency of copyright protection.
In one embodiment, as shown in figure 4, the disclosure provides a kind of terminal 40, comprising: authentication module 41, key obtain Modulus block 42 and content decryption module 43.As shown in figure 5, the disclosure provides a kind of broadcasting content secure transmission system, comprising: DRM platform 50, terminal 40 as above.
Authentication module 41 is authenticated in booting with digital copyright management DRM platform 50, if authenticate successfully, to DRM platform 50 requests to issue terminal key.Key Acquisition Module 42 sends encrypted content playing request to DRM platform 50, receives The content key after encryption that DRM platform 50 is sent.Content decryption module 43 is based on terminal key to by encrypting Treated, and content key is decrypted, the broadcasting for obtaining content key and being issued based on content key to DRM platform 50 Content is decrypted.
Authentication module 41 receives the session key public key that DRM platform 50 is sent and the first challenge word, obtains the sequence of itself Number SN and identification number IN calculates the second challenge word based on SN and IN.Authentication module 41 by first challenge word with second challenge word into Row compares, if comparison result is that the first challenge word is identical as the second challenge word, authenticates success.SN and IN trusts as hardware Root key burning is in the safety chip OTP of terminal.
Key Acquisition Module 42 generates authen session key R1 and label Token, after using session key public key encryption R1 and Token be sent to DRM platform 50.DRM platform 50 using after session key private key pair encryption R1 and Token solved Close processing obtains and stores R1 and Token.DRM platform 50 uses R1 ciphering terminal secret key and private key, and encrypted terminal is close Key private key is handed down to Key Acquisition Module 42.Key Acquisition Module 42 is decrypted encrypted terminal key private key using R1 Processing obtains terminal key private key.
Terminal key private key includes: the private key of terminal, certificate.Key Acquisition Module 42 is using R1 to encrypted terminal Private key, certificate are decrypted, and obtain terminal key private key, and the private key of terminal, certificate are stored in trusted application environment In TEE.
Content decryption module 43 receives the request for playing encrypted content, reports Token to DRM platform 50.DRM platform 50 makes Content decryption mould is handed down to terminal key public key encryption content key corresponding with Token, and by encrypted content key Block 43.Encrypted content key is decrypted in 43 using terminal secret key and private key of content decryption module, and it is close to obtain content Key.
Content key is arranged in licensing, 50 using terminal public key encrypted permission of DRM platform card.Content decrypts mould Encrypted licensing is decrypted in 43 using terminal secret key and private key of block, obtains the content key in licensing.
Fig. 6 is the module diagram according to another embodiment of terminal disclosed by the invention.As shown in fig. 6, the device It may include memory 61, processor 62, communication interface 63 and bus 64.Memory 61 for storing instruction, 62 coupling of processor Memory 61 is closed, processor 62 is configured as realizing above-mentioned broadcasting content safety based on the instruction execution that memory 61 stores Transmission method.
Memory 61 can be high speed RAM memory, nonvolatile memory (NoN-volatile memory) etc., deposit Reservoir 61 is also possible to memory array.Memory 61 is also possible to by piecemeal, and block can be combined into virtually by certain rule Volume.Processor 62 can be central processor CPU or application-specific integrated circuit ASIC (Application Specific Integrated Circuit), or it is arranged to implement one of broadcasting content safe transmission method disclosed by the invention Or multiple integrated circuits.
In one embodiment, the disclosure also provides a kind of computer readable storage medium, wherein computer-readable storage Media storage has computer instruction, and instruction realizes that the broadcasting content that any embodiment as above is related to passes safely when being executed by processor Transmission method.It should be understood by those skilled in the art that, embodiment of the disclosure can provide as method, apparatus or computer program Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the disclosure Apply the form of example.Moreover, it wherein includes the computer of computer usable program code that the disclosure, which can be used in one or more, The calculating implemented in non-transient storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) can be used The form of machine program product.
The disclosure is reference according to the method for the embodiment of the present disclosure, the flow chart of equipment (system) and computer program product And/or block diagram describes.It should be understood that each process in flowchart and/or the block diagram can be realized by computer program instructions And/or the combination of the process and/or box in box and flowchart and/or the block diagram.It can provide these computer programs to refer to Enable the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to generate One machine so that by the instruction that the processor of computer or other programmable data processing devices executes generate for realizing The device for the function of being specified in one or more flows of the flowchart and/or one or more blocks of the block diagram.
So far, the disclosure is described in detail.In order to avoid covering the design of the disclosure, it is public that this field institute is not described The some details known.Those skilled in the art as described above, completely it can be appreciated how implementing technology disclosed herein Scheme.
Broadcasting content safe transmission method, system and terminal provided by the above embodiment, terminal and number in booting Copyright management DRM platform is authenticated, and terminal issues terminal key to DRM platform request after certification;DRM platform will be by adding Close treated that content key is sent to terminal, and terminal solves the content key after encryption based on terminal key Close processing is obtained content key and the broadcasting content that DRM platform issues is decrypted based on content key;Utilize level Four key High safety trust chain is constructed, the root key advantage of the safety chip of terminal is taken full advantage of, trust chain is implemented into terminal and meeting Rank is talked about, the safety of content key is greatly improved, substantially increases the efficiency of copyright protection, melted suitable for current scale Open up the copyright protection application scenarios of full 4K business etc..
Disclosed method and system may be achieved in many ways.For example, can by software, hardware, firmware or Software, hardware, firmware any combination realize disclosed method and system.The said sequence of the step of for method is only In order to be illustrated, the step of disclosed method, is not limited to sequence described in detail above, especially says unless otherwise It is bright.In addition, in some embodiments, also the disclosure can be embodied as to record program in the recording medium, these programs include For realizing according to the machine readable instructions of disclosed method.Thus, the disclosure also covers storage for executing according to this public affairs The recording medium of the program for the method opened.
The description of the disclosure is given for the purpose of illustration and description, and is not exhaustively or by the disclosure It is limited to disclosed form.Many modifications and variations are obvious for the ordinary skill in the art.It selects and retouches Embodiment is stated and be the principle and practical application in order to more preferably illustrate the disclosure, and those skilled in the art is enable to manage The solution disclosure is to design various embodiments suitable for specific applications with various modifications.

Claims (19)

1. a kind of broadcasting content safe transmission method, comprising:
In terminal booting, the terminal is authenticated with digital copyright management DRM platform;
If authenticated successfully, the terminal issues terminal key to DRM platform request;
The terminal sends encrypted content playing request to the DRM platform, and the DRM platform will be in after encryption Hold key and is sent to the terminal;
The terminal is decrypted the content key after encryption based on the terminal key, obtains institute It states content key and the broadcasting content issued based on the content key to the DRM platform is decrypted.
2. the method for claim 1, wherein the terminal, which authenticate with DRM platform, includes:
The terminal receives the session key public key that the DRM platform is sent and the first challenge word;
The terminal obtains the sequence number SN and identification number IN of itself, calculates the second challenge word based on the SN and IN;
The first challenge word is compared the terminal with the second challenge word, if comparison result is chosen for described first Word of fighting is identical as the second challenge word, then authenticates success.
3. method according to claim 2, wherein
The SN and IN is as the burning of hardware trusted root key in the safety chip OTP of the terminal.
4. method according to claim 2, wherein the terminal issues terminal key to DRM platform request and includes:
The terminal generates authen session key R1 and label Token, will use after the session key public key encryption described in R1 and the Token are sent to the DRM platform;
The DRM platform using after session key private key pair encryption the R1 and the Token be decrypted, obtain simultaneously Store the R1 and the Token;
The DRM platform uses the R1 ciphering terminal secret key and private key, and encrypted terminal key private key is handed down to described Terminal;
The terminal is decrypted encrypted terminal key private key using the R1, and it is private to obtain the terminal key Key.
5. method as claimed in claim 4, wherein the terminal key private key includes: the private key of terminal, certificate;
The terminal is decrypted using private key, certificate of the R1 to encrypted terminal, obtains the terminal key Private key, and the private key of the terminal, certificate are stored in trusted application environment TEE.
6. method as claimed in claim 4, wherein further include:
The terminal receives the request for playing encrypted content, and Xiang Suoshu DRM platform reports the Token;
DRM platform use terminal key public key encryption content key corresponding with the Token, and by encrypted content Delivering key gives the terminal;
The terminal is decrypted using the content key after the terminal key private key pair encryption, and it is close to obtain the content Key.
7. method as claimed in claim 6, wherein
The content key is arranged in licensing, and the DRM platform uses licensing described in the terminal key public key encryption;
The terminal is decrypted using the licensing after the terminal key private key pair encryption, is obtained in the licensing The content key.
8. the method for claim 1, wherein
The terminal includes: set-top box.
9. a kind of terminal, comprising:
Authentication module, for being authenticated in booting with digital copyright management DRM platform, if authenticated successfully, Xiang Suoshu DRM platform request issues terminal key;
Key Acquisition Module receives what the DRM platform was sent for sending encrypted content playing request to the DRM platform Content key after encryption;
Content decryption module, for place to be decrypted to the content key after encryption based on the terminal key Reason, obtains the content key and the broadcasting content issued based on the content key to the DRM platform is decrypted.
10. terminal as described in claim 1, wherein
The authentication module obtains itself for receiving the session key public key and the first challenge word that the DRM platform is sent Sequence number SN and identification number IN calculates the second challenge word based on the SN and IN;By the first challenge word and described the Two challenge words are compared, if comparison result is that the first challenge word is identical as the second challenge word, authenticate success.
11. terminal as claimed in claim 10, wherein
The SN and IN is as the burning of hardware trusted root key in the safety chip OTP of the terminal.
12. terminal as claimed in claim 10, wherein
The Key Acquisition Module will use the session key public key for generating authen session key R1 and label Token The encrypted R1 and the Token are sent to the DRM platform;
Wherein, the DRM platform using after session key private key pair encryption the R1 and the Token be decrypted, It obtains and stores the R1 and the Token;The DRM platform uses the R1 ciphering terminal secret key and private key, and will be after encryption Terminal key private key be handed down to the Key Acquisition Module;
The Key Acquisition Module is also used for the R1 and encrypted terminal key private key is decrypted, and obtains The terminal key private key.
13. terminal as claimed in claim 12, wherein the terminal key private key includes: the private key of terminal, certificate;
The Key Acquisition Module is also used for the R1 and private key, the certificate of encrypted terminal is decrypted, obtains The terminal key private key is taken, and the private key of the terminal, certificate are stored in trusted application environment TEE.
14. terminal as claimed in claim 12, wherein
The content decryption module, for receiving the request for playing encrypted content, Xiang Suoshu DRM platform reports the Token;
Wherein, DRM platform use terminal key public key encryption content key corresponding with the Token, and will be after encryption Content key be handed down to the content decryption module;
Place is decrypted in the content decryption module, the content key after being also used for the terminal key private key pair encryption Reason, obtains the content key.
15. terminal as claimed in claim 14, wherein the content key is arranged in licensing, and the DRM platform uses Licensing described in the terminal key public key encryption;
The content decryption module, the licensing after being also used for the terminal key private key pair encryption are decrypted, Obtain the content key in the licensing.
16. terminal as claimed in claim 9, wherein
The terminal includes: set-top box.
17. a kind of broadcasting content secure transmission system, comprising:
The described in any item terminals of DRM platform, such as claim 9 to 16.
18. a kind of terminal, comprising:
Memory;And
It is coupled to the processor of the memory, the processor is configured to the instruction based on storage in the memory, Execute such as broadcasting content safe transmission method described in any item of the claim 1 to 8.
19. a kind of computer readable storage medium, is stored thereon with computer program instructions, which is handled by one or more The step of method described in claim 1 to 8 any one is realized when device executes.
CN201711038944.8A 2017-10-30 2017-10-30 Broadcasting content safe transmission method, system and terminal Pending CN109728912A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711038944.8A CN109728912A (en) 2017-10-30 2017-10-30 Broadcasting content safe transmission method, system and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711038944.8A CN109728912A (en) 2017-10-30 2017-10-30 Broadcasting content safe transmission method, system and terminal

Publications (1)

Publication Number Publication Date
CN109728912A true CN109728912A (en) 2019-05-07

Family

ID=66292578

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711038944.8A Pending CN109728912A (en) 2017-10-30 2017-10-30 Broadcasting content safe transmission method, system and terminal

Country Status (1)

Country Link
CN (1) CN109728912A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110752929A (en) * 2019-09-29 2020-02-04 华为终端有限公司 Application program processing method and related product
CN112969094A (en) * 2021-02-26 2021-06-15 江西格灵如科科技有限公司 Virtual reality video decryption system and method
CN113766344A (en) * 2020-06-19 2021-12-07 天翼智慧家庭科技有限公司 Method and system for constructing dynamic trust root based on high-security set top box
CN116775062A (en) * 2023-08-22 2023-09-19 深圳市华曦达科技股份有限公司 Encryption burning method for producing key

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1633062A (en) * 2004-12-31 2005-06-29 北京中星微电子有限公司 A secure transmission method for media content
CN1700765A (en) * 2005-06-30 2005-11-23 广东省电信有限公司研究院 A private key acquiring method for use in set-top box
CN101527818A (en) * 2009-04-23 2009-09-09 天柏宽带网络科技(北京)有限公司 Licence managing method of internet protocol television copyright management system
CN101621379A (en) * 2009-08-04 2010-01-06 中国联合网络通信集团有限公司 Method for realizing digital copyright management system and digital right management system
CN202364334U (en) * 2011-10-08 2012-08-01 北京视博数字电视科技有限公司 License management device capable of detecting clone and system
US20130232337A1 (en) * 2012-03-02 2013-09-05 Electronics And Telecommunications Research Institute User terminal and method for playing digital rights management content
CN106845160A (en) * 2015-12-03 2017-06-13 国家新闻出版广电总局广播科学研究院 A kind of digital copyright management for intelligent operating system(DRM)Method and system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1633062A (en) * 2004-12-31 2005-06-29 北京中星微电子有限公司 A secure transmission method for media content
CN1700765A (en) * 2005-06-30 2005-11-23 广东省电信有限公司研究院 A private key acquiring method for use in set-top box
CN101527818A (en) * 2009-04-23 2009-09-09 天柏宽带网络科技(北京)有限公司 Licence managing method of internet protocol television copyright management system
CN101621379A (en) * 2009-08-04 2010-01-06 中国联合网络通信集团有限公司 Method for realizing digital copyright management system and digital right management system
CN202364334U (en) * 2011-10-08 2012-08-01 北京视博数字电视科技有限公司 License management device capable of detecting clone and system
US20130232337A1 (en) * 2012-03-02 2013-09-05 Electronics And Telecommunications Research Institute User terminal and method for playing digital rights management content
CN106845160A (en) * 2015-12-03 2017-06-13 国家新闻出版广电总局广播科学研究院 A kind of digital copyright management for intelligent operating system(DRM)Method and system

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110752929A (en) * 2019-09-29 2020-02-04 华为终端有限公司 Application program processing method and related product
WO2021057982A1 (en) * 2019-09-29 2021-04-01 华为技术有限公司 Application processing method and related product
CN110752929B (en) * 2019-09-29 2022-04-22 华为终端有限公司 Application program processing method and related product
CN113766344A (en) * 2020-06-19 2021-12-07 天翼智慧家庭科技有限公司 Method and system for constructing dynamic trust root based on high-security set top box
CN113766344B (en) * 2020-06-19 2024-08-23 天翼数字生活科技有限公司 Method and system for constructing dynamic trust root based on high-security set top box
CN112969094A (en) * 2021-02-26 2021-06-15 江西格灵如科科技有限公司 Virtual reality video decryption system and method
CN116775062A (en) * 2023-08-22 2023-09-19 深圳市华曦达科技股份有限公司 Encryption burning method for producing key
CN116775062B (en) * 2023-08-22 2023-12-22 深圳市华曦达科技股份有限公司 Encryption burning method for producing key

Similar Documents

Publication Publication Date Title
CN111181720B (en) Service processing method and device based on trusted execution environment
US9853957B2 (en) DRM protected video streaming on game console with secret-less application
CN109313690B (en) Self-contained encrypted boot policy verification
CN107959567B (en) Data storage method, data acquisition method, device and system
CN105408912B (en) Handle certification and resource grant
US9602282B2 (en) Secure software and hardware association technique
US20190260716A1 (en) Managed securitized containers and container communications
KR100746030B1 (en) Method and apparatus for generating rights object with representation by commitment
CN103366102B (en) For content transmission and the system for numeral copyright management of distribution
CN103210396B (en) Comprise the method and apparatus of the framework for the protection of sensitive code and data
US7975312B2 (en) Token passing technique for media playback devices
CN103440436B (en) Access system for numeral copyright management and the method for the content from intelligence memory
TW202009778A (en) Firmware upgrade method and device
CN104246784B (en) For protecting the method, apparatus and system with safely transmission media content
CN105468940B (en) Method for protecting software and device
US8266707B2 (en) Tamper resistant method, apparatus and system for secure portability of digital rights management-protected content
CN109728912A (en) Broadcasting content safe transmission method, system and terminal
CN105893792B (en) Digital copyright management method, device and system
US11734394B2 (en) Distributed license encryption and distribution
JP6199712B2 (en) Communication terminal device, communication terminal association method, and computer program
CN103703718A (en) System and method for obfuscating initiation values of cryptography protocol
EP4016921A1 (en) Certificate management method and apparatus
KR101711024B1 (en) Method for accessing temper-proof device and apparatus enabling of the method
US8755521B2 (en) Security method and system for media playback devices
CN114936365B (en) System, method and device for protecting secret data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190507

RJ01 Rejection of invention patent application after publication