CN1744707A - Method and device for protecting broadband audio-video broadcasting content - Google Patents
Method and device for protecting broadband audio-video broadcasting content Download PDFInfo
- Publication number
- CN1744707A CN1744707A CNA200410075345XA CN200410075345A CN1744707A CN 1744707 A CN1744707 A CN 1744707A CN A200410075345X A CNA200410075345X A CN A200410075345XA CN 200410075345 A CN200410075345 A CN 200410075345A CN 1744707 A CN1744707 A CN 1744707A
- Authority
- CN
- China
- Prior art keywords
- key
- scrambling
- message
- index
- content
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 30
- 239000000284 extract Substances 0.000 claims description 6
- 238000005516 engineering process Methods 0.000 description 10
- 238000010586 diagram Methods 0.000 description 3
- 230000006855 networking Effects 0.000 description 2
- 238000004891 communication Methods 0.000 description 1
- 239000000126 substance Substances 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
- H04N21/238—Interfacing the downstream path of the transmission network, e.g. adapting the transmission rate of a video stream to network bandwidth; Processing of multiplex streams
- H04N21/2389—Multiplex stream processing, e.g. multiplex stream encrypting
- H04N21/23895—Multiplex stream processing, e.g. multiplex stream encrypting involving multiplex stream encryption
- H04N21/23897—Multiplex stream processing, e.g. multiplex stream encrypting involving multiplex stream encryption by partially encrypting, e.g. encrypting only the ending portion of a movie
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/25—Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
- H04N21/266—Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel
- H04N21/26613—Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel for generating or managing keys in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/438—Interfacing the downstream path of the transmission network originating from a server, e.g. retrieving encoded video stream packets from an IP network
- H04N21/4385—Multiplex stream processing, e.g. multiplex stream decrypting
- H04N21/43853—Multiplex stream processing, e.g. multiplex stream decrypting involving multiplex stream decryption
- H04N21/43856—Multiplex stream processing, e.g. multiplex stream decrypting involving multiplex stream decryption by partial decryption, e.g. decrypting a multiplex stream that has been partially encrypted
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/60—Network structure or processes for video distribution between server and client or between remote clients; Control signalling between clients, server and network components; Transmission of management data between server and client, e.g. sending from server to client commands for recording incoming content stream; Communication details between server and client
- H04N21/63—Control signaling related to video distribution between client, server and network components; Network processes for video distribution between server and clients or between remote clients, e.g. transmitting basic layer and enhancement layers over different transmission paths, setting up a peer-to-peer communication via Internet between remote STB's; Communication protocols; Addressing
- H04N21/643—Communication protocols
- H04N21/64322—IP
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
- H04W12/033—Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/041—Key generation or derivation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Multimedia (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Databases & Information Systems (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
Abstract
At sending side, the method picks up content of start part of payload from IP message, and calculates out information of scrambling position and indexing information. Using indexing information obtains local cryptographic key. Using the cryptographic key and information of scrambling position carries out scrambling process for content at pointed segment, which does not include the start part in IP message. At receiving side, picking up content of start part of payload from scrambled IP message, the method calculates scrambling position and indexing information by using algorithm identical to the algorithm applied at scrambling time. Using indexing information obtains local cryptographic key at receiving side. Using the cryptographic key and information of scrambling position carries out de-scrambling process for the scrambling segment of IP message. Comparing with existed techniques, the invention solves issue of security existed in content of video and audio broadcast in wide band.
Description
Technical field
The present invention relates to the broadband video and audio frequency technology applications in the communication network, relate in particular to a kind of method and device of protecting broadband audio-video broadcasting content.
Background technology
In cable television network, video-voice frequency flow was encrypted before being broadcast to network or scrambling, sent to the user by network then, and user side obtains key and finishes the deciphering or the descrambling of program stream from network.Key is broadcast to all terminals in this method, in order to guarantee that key is difficult for being cracked, needs complex key management and cryptographic algorithm, and key needs frequent real-time update.Therefore, there is following shortcoming in this method:
(1) key must transmit on the net, easy crack.
(2) key needs frequent updating, takies a large amount of network bandwidths.
(3) encryption and decryption and key management algorithm complexity are with high costs.
(4) encryption or scrambling algorithm are relevant with concrete video encoding form, bad adaptability.
(5) in a single day enciphering and deciphering algorithm is broken, and lacks effective solution.
Be the data service that the broadband access technology of representative not only can provide internet access and so on Digital Subscriber Loop (DSL) at present, the video and the audio service that comprise Broadband TV business, audio broadcasting business, demand (telecommunication) service can also be provided.Look audio service and carry out based on set-top box or computer usually, behind set-top box or the computer access network, can obtain by network and look audio content; Usually program request class business is carried by unicast stream, and TV class and audio broadcasting class business are carried by multicast data flow, and its network model as shown in Figure 1.
An emphasis carrying out television services and audio broadcasting business on broadband networks is to guarantee content safety, and so-called content safety wherein one deck implication is exactly to guarantee that the user can not arbitrarily carry out illegal digital copies to channel content, is called anti-digital copies.And on broadband networks, audio-video broadcasting content not being taked anti-digital copies measure at present, the user can copy arbitrary channel content, so its fail safe is relatively poor.
Summary of the invention
The invention provides a kind of method and device of protecting broadband audio-video broadcasting content, there is the relatively poor problem of fail safe in broadband audio-video broadcasting content in the prior art to solve.
For addressing the above problem, the invention provides following technical scheme:
A kind of method of protecting broadband audio-video broadcasting content, described audio-video broadcasting content is produced by the audio-video broadcasting source, and adopts the IP message format to be sent to user terminal by broadband network and broadband access equipment; This method comprises the steps:
A, at transmitter side, from the IP message, extract the content that payload begins part, and calculate scrambling positional information and index information;
B, obtain key from transmitter side this locality, and the scrambling positional information of utilizing this key and steps A to calculate is carried out scrambling to the specified section content that does not comprise described beginning partial content in the IP message and is handled according to the index information that calculates in the steps A;
C, the IP message after the scrambling is sent to receiver side;
D, at receiver side, from the IP message of scrambling, extract the content that described payload begins part, and employing during with scrambling identical algorithm computation go out scrambling positional information and index information;
E, obtain key from receiver side this locality, and utilize the scrambling positional information that calculates among this key and the step D that the scrambling section of IP message is carried out scramble process according to the index information that calculates among the step D.
A kind of scrambler comprises:
The key seed storehouse is used to preserve the seed that generates key;
Key seed index generation module is used for extracting content and generating the key seed index from message;
Key production module is obtained key seed and is generated key from described key seed storehouse according to described index;
Scrambling position generation module is used for extracting content and generating the beginning and the end position information of message scrambling section from message;
Scrambling module utilizes the key of generation and the beginning and the end position information of described scrambling section that message is carried out the scrambling processing.
A kind of broadband audio-video broadcasting system comprises:
The audio-video broadcasting source is used to produce the audio-video broadcasting content of each channel;
User terminal is used to receive the audio-video broadcasting content of one or more channels;
Broadband network transmits the broadcasted content that export in described audio-video broadcasting source;
Broadband access equipment, the broadcasted content of each channel that described broadband network is sent multicasts to described user terminal;
Scrambler receives the audio-video broadcasting content of described audio-video broadcasting source output, and carries out being sent to described broadband network after the scrambling;
Described user terminal carries out descrambling to the audio-video broadcasting content of scrambling.
The present invention utilizes the digital interference technology, and video-voice frequency flow transmits in the mode of scrambling, guarantees that having only legal terminal to decode watches, the user can't directly obtain the digital copies of video-voice frequency flow and watch for other general purpose terminals.Utilize this digital interference technology, can avoid the propagation of key on network, reduce the risk that key is cracked and reduce the extra network bandwidth taking; Algorithm and concrete video coding techniques frequently are irrelevant, and directly the payload to the IP bag carries out scrambling, applicable to different video encoding technology; Do not need complex key management technology and cryptographic algorithm, do not increase the realization difficulty of terminal set top box and cost, reduction local side cost; If the scrambling algorithm is broken in addition, can upgrade local side and terminal algorithm/key is in time remedied by Network Synchronization.
Description of drawings
Fig. 1 looks the networking schematic diagram of voice applications for broadband in the prior art;
Fig. 2 realizes the networking schematic diagram of broadband audio-video broadcasting content protection for the present invention;
Fig. 3 A, 3B are the structural representation of scrambler;
Fig. 4 is the structural representation of the descrambling part of user terminal;
Fig. 5 is the schematic diagram of scrambling and descrambling.
Embodiment
Consult shown in Figure 2ly, the present invention increases a scrambler in network system.Whole system comprises: the audio-video broadcasting source, be used to produce the audio-video broadcasting content of each channel, and its output format is the IP message.Scrambler receives the audio-video broadcasting content of described audio-video broadcasting source output, and carries out being sent to described broadband network after the scrambling.
Broadband network transmits the broadcasted content that export in described audio-video broadcasting source.
Broadband access equipment, the broadcasted content of each channel that described broadband network is sent multicasts to described user terminal.
User terminal is used to receive the audio-video broadcasting content of one or more channels, and the IP message of scrambling is carried out descrambling.
Digital interference technological core thinking is:
(1) only the payload of IP message is carried out scrambling, encryption technology has nothing to do with concrete payload content;
(2) beginning of IP message payload part may be used to transmit some protocol information, does not do scrambling and handles, and its length can be provided with;
(3) realize specific scrambling position generating algorithm on scrambler and the terminal, key seed index generating algorithm is preserved an identical key seed storehouse or a cipher key store respectively on the key schedule and add Descrambling Algorithms, scrambler and user terminal.
Consult shown in Fig. 3 A, scrambler comprises:
The key seed storehouse is used to preserve the key seed that generates key.
Key seed index generation module adopts key kind index generating algorithm to extract content and generate the key seed index from message.This algorithm can adopt privately owned algorithm, as the Haval+MD5 combinational algorithm.
Key production module is obtained key seed according to described index from described key seed storehouse, and adopts key schedule to generate key.This algorithm can adopt privately owned algorithm, as the Haval+MD5 combinational algorithm.
Scrambling position generation module, employing scrambling position generating algorithm extract content and generate the beginning and the end position information of message scrambling section from message.This algorithm can adopt privately owned algorithm, as the combinational algorithm of XOR, HASH scheduling algorithm.
Scrambling module according to the key that generates and the beginning and the end position information of described scrambling section, adopts the scrambling algorithm that message is carried out scrambling and handles.The scrambling algorithm can adopt DES, 3DES or AES scheduling algorithm.
Consult shown in Fig. 3 B, scrambler also can comprise:
Cipher key store is used to preserve key.
The cipher key index generation module is used for extracting content from message and generates cipher key index, and utilizes described cipher key index to obtain key from described cipher key store.
Scrambling position generation module is used for extracting content and generating the beginning and the end position information of message scrambling section from message.
Scrambling module, the key that utilization is obtained and the beginning of described scrambling section and end position information carry out scrambling to message to be handled.
The mode that the difference of Fig. 3 A and scrambler shown in Fig. 3 B is to obtain key is different.Scrambler shown in Fig. 3 A utilizes index information to obtain earlier key seed from the storehouse, and then generates key, and Fig. 3 B then utilizes index information directly to obtain key from the storehouse.
Consult shown in Fig. 4 A, this structure is corresponding with the scrambling structure shown in Fig. 3 A, and user terminal also comprises except comprising basic structure of the prior art:
The key seed storehouse, identical with the key seed storehouse in the scrambler shown in Fig. 3 A, be used to preserve the key seed that generates key;
Key seed index generation module is used for extracting content and generating the key seed index from message;
Key production module is obtained key seed and is generated key according to described index from the key seed storehouse;
Scrambling position generation module is used for extracting content and generating the beginning and the end position information of message scrambling section from message;
Descrambling module utilizes the key of generation and the beginning and the end position information of described scrambling section that the scrambling section of message is carried out scramble process.
Consult shown in Fig. 4 B, this structure is corresponding with the scrambling structure shown in Fig. 3 B, and user terminal also comprises except comprising basic structure of the prior art:
Cipher key store, identical with cipher key store in the scrambler shown in Fig. 3 B, be used to preserve key.
The cipher key index generation module is used for extracting content from message and generates cipher key index, and utilizes described cipher key index to obtain key from described cipher key store.
Scrambling position generation module is used for extracting content and generating the beginning and the end position information of message scrambling section from message.
Descrambling module, the key that utilization is obtained and the beginning and the end position information of described scrambling section are carried out scramble process to the scrambling section of message.
Consult shown in Figure 5ly, preserve with scrambler and user terminal that all to preserve identical key seed storehouse be example, the concrete processing procedure of scrambling is as follows:
(1) at transmitter side, scrambler extracts some content of the beginning part of IP message payload by scrambling position generating algorithm and key seed index generating algorithm.These contents are the contents that change with the bag content changing, but not immobilized substance.
(2) calculate corresponding scrambling positional information by scrambling position generating algorithm, i.e. beginning/the end position of message scrambling section generates the key seed index by key seed index generating algorithm.
(3) scrambler inquires corresponding key seed according to the key seed index from the key seed storehouse of this locality.
(4) scrambler calculates key according to key seed by key schedule.
(5) scrambler, adopts predetermined scrambling algorithm to carry out scrambling and handles the specified section of IP message according to the key that generates and scrambling positional information.
The concrete processing procedure of descrambling is as follows:
(1) at receiver side, after user terminal is received the scrambling message, use scrambling position generating algorithm identical with scrambler and key seed index generating algorithm to extract some content of the beginning part of IP message payload, these contents are identical with content in the scrambling step (1).
(2) calculate corresponding scrambling positional information by scrambling position generating algorithm, i.e. beginning/the end position of message scrambling section generates the key seed index by key seed index generating algorithm.
(3) user terminal finds corresponding key seed according to the key seed index in local key seed storehouse kind.
(4) user terminal calculates key according to key seed by key schedule.
(5) user terminal adopts predetermined Descrambling Algorithms that the scrambling section of appointment is carried out descrambling according to key and scrambling positional information.
If scrambler and user terminal are all preserved cipher key store mutually, replace cipher key index seed generating algorithm to generate cipher key index with the cipher key index generating algorithm, utilize cipher key index from cipher key store, directly to obtain key then and carry out scrambling or scramble process, its processing procedure and in like manner above-mentioned.
Above-mentioned digital interference technology has following characteristics:
(1), irrelevant with concrete video encoding technology to the scrambling of IP message payload;
(2) do not take any extra bandwidth;
(3) multi-layer security, add close algorithm;
(4) according to the dynamic scrambling of bag content, scramble information dynamic exchange;
(5) key does not transmit on network;
(6) scrambler and terminal realize that technical difficulty is low, and cost is also lower;
(7) high security, the user will crack this algorithm need obtain following information simultaneously: add all key seed, key schedules in Descrambling Algorithms, scrambling position generating algorithm, key seed index generating algorithm, the key seed storehouse;
(8) mode by the online upgrading terminal software, but the upgrading in time of implementation algorithm, key seed.
Claims (10)
1, a kind of method of protecting broadband audio-video broadcasting content, described audio-video broadcasting content is produced by the audio-video broadcasting source, and adopts the IP message format to be sent to user terminal by broadband network and broadband access equipment; It is characterized in that this method comprises the steps:
A, at transmitter side, from the IP message, extract the content that payload begins part, and calculate scrambling positional information and index information;
B, obtain key from transmitter side this locality, and the scrambling positional information of utilizing this key and steps A to calculate is carried out scrambling to the specified section content that does not comprise described beginning partial content in the IP message and is handled according to the index information that calculates in the steps A;
C, the IP message after the scrambling is sent to receiver side;
D, at receiver side, from the IP message of scrambling, extract the content that described payload begins part, and employing during with scrambling identical algorithm computation go out scrambling positional information and index information;
E, obtain key from receiver side this locality, and utilize the scrambling positional information that calculates among this key and the step D that the scrambling section of IP message is carried out scramble process according to the index information that calculates among the step D.
2, the method for claim 1, it is characterized in that, at transmitter side or receiver side local key seed storehouse is set respectively, the index information that calculates in steps A and step D is the key seed index information, utilize this key seed index information from the key seed storehouse, to obtain key seed, and generate key according to this key seed; Perhaps at transmitter side or receiver side local cipher key store is set respectively, the index information that calculates in steps A and step D is a cipher key index information, utilizes this cipher key index information directly to obtain key from cipher key store.
3, method as claimed in claim 1 or 2 is characterized in that, described beginning partial content is meant the content that changes with the IP message content, and the length of extracting content can be provided with.
4, a kind of broadband audio-video broadcasting system comprises:
The audio-video broadcasting source is used to produce the audio-video broadcasting content of each channel;
User terminal is used to receive the audio-video broadcasting content of one or more channels;
Broadband network transmits the broadcasted content that export in described audio-video broadcasting source;
Broadband access equipment, the broadcasted content of each channel that described broadband network is sent multicasts to described user terminal;
It is characterized in that also comprising:
Scrambler receives the audio-video broadcasting content of described audio-video broadcasting source output, and carries out being sent to described broadband network after the scrambling;
Described user terminal carries out descrambling to the audio-video broadcasting content of scrambling.
5, system as claimed in claim 4 is characterized in that, described scrambler comprises:
The key seed storehouse is used to preserve the seed that generates key;
Key seed index generation module is used for extracting content and generating the key seed index from message;
Key production module is obtained key seed and is generated key according to described index from the key seed storehouse;
Scrambling position generation module is used for extracting content and generating the beginning and the end position information of message scrambling section from message;
Scrambling module utilizes the key of generation and the beginning and the end position information of described scrambling section that message is carried out the scrambling processing.
Perhaps, described scrambler comprises:
Cipher key store is used to preserve key;
The cipher key index generation module is used for extracting content from message and generates cipher key index, and utilizes this cipher key index to obtain key from described cipher key store;
Scrambling position generation module is used for extracting content and generating the beginning and the end position information of message scrambling section from message;
Scrambling module, the key that utilization is obtained and the beginning of described scrambling section and end position information carry out scrambling to message to be handled.
6, system as claimed in claim 5 is characterized in that, described user terminal comprises:
The key seed storehouse, identical with the key seed storehouse in the described scrambler, be used to preserve the seed that generates key;
Key seed index generation module is used for extracting content and generating the key seed index from message;
Key production module is obtained key seed and is generated key according to described index from the key seed storehouse;
Scrambling position generation module is used for extracting content and generating the beginning and the end position information of message scrambling section from message;
Descrambling module utilizes the key of generation and the beginning and the end position information of described scrambling section that the scrambling section of message is carried out scramble process;
Perhaps, described user terminal comprises:
Cipher key store, identical with cipher key store in the described scrambler, be used to preserve key;
The cipher key index generation module is used for extracting content from message and generates cipher key index, and utilizes this cipher key index to obtain key from described cipher key store;
Scrambling position generation module is used for extracting content and generating the beginning and the end position information of message scrambling section from message;
Descrambling module, the key that utilization is obtained and the beginning and the end position information of described scrambling section are carried out scramble process to the scrambling section of message.
7, a kind of scrambler is characterized in that comprising:
The key seed storehouse is used to preserve the seed that generates key;
Key seed index generation module is used for extracting content and generating the key seed index from message;
Key production module is obtained key seed and is generated key from described key seed storehouse according to described index;
Scrambling position generation module is used for extracting content and generating the beginning and the end position information of message scrambling section from message;
Scrambling module utilizes the key of generation and the beginning and the end position information of described scrambling section that message is carried out the scrambling processing.
8, a kind of scrambler is characterized in that comprising:
Cipher key store is used to preserve key;
The cipher key index generation module is used for extracting content from message and generates cipher key index, and utilizes described cipher key index to obtain key from described cipher key store;
Scrambling position generation module is used for extracting content and generating the beginning and the end position information of message scrambling section from message;
Scrambling module, the key that utilization is obtained and the beginning of described scrambling section and end position information carry out scrambling to message to be handled.
9, a kind of user terminal is characterized in that comprising:
The key seed storehouse is used to preserve the key seed that generates key;
Key seed index generation module is used for extracting content and generating the key seed index from message;
Key production module is obtained key seed and is generated key according to described index from the key seed storehouse;
Scrambling position generation module is used for extracting content and generating the beginning and the end position information of message scrambling section from message;
Descrambling module utilizes the key of generation and the beginning and the end position information of described scrambling section that the scrambling section of message is carried out scramble process.
10, a kind of user terminal is characterized in that comprising:
Cipher key store is used to preserve key;
The cipher key index generation module is used for extracting content from message and generates cipher key index, and utilizes described cipher key index to obtain key from described cipher key store;
Scrambling position generation module is used for extracting content and generating the beginning and the end position information of message scrambling section from message;
Descrambling module, the key that utilization is obtained and the beginning and the end position information of described scrambling section are carried out scramble process to the scrambling section of message.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB200410075345XA CN100356789C (en) | 2004-09-01 | 2004-09-01 | Method and device for protecting broadband audio-video broadcasting content |
PCT/CN2005/001379 WO2006024234A1 (en) | 2004-09-01 | 2005-09-01 | Method ano apparatus for protecting broadband video and audio broadcast content |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB200410075345XA CN100356789C (en) | 2004-09-01 | 2004-09-01 | Method and device for protecting broadband audio-video broadcasting content |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1744707A true CN1744707A (en) | 2006-03-08 |
CN100356789C CN100356789C (en) | 2007-12-19 |
Family
ID=35999710
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNB200410075345XA Expired - Fee Related CN100356789C (en) | 2004-09-01 | 2004-09-01 | Method and device for protecting broadband audio-video broadcasting content |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN100356789C (en) |
WO (1) | WO2006024234A1 (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101924595B (en) * | 2009-06-12 | 2012-09-12 | 北京视博数字电视科技有限公司 | Audio scrambling method, descrambling method and device thereof |
CN101461237B (en) * | 2006-05-16 | 2013-06-05 | 京瓷株式会社 | Address generating method and broadcast receiver |
CN107733639A (en) * | 2017-08-24 | 2018-02-23 | 上海壹账通金融科技有限公司 | Key management method, device and readable storage medium storing program for executing |
CN108881022A (en) * | 2018-05-30 | 2018-11-23 | 中国人民解放军战略支援部队信息工程大学 | A kind of datagram scrambles the network node device and method for forwarding of tabling look-up |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002520682A (en) * | 1998-07-14 | 2002-07-09 | コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ | Copy protection with ticket encryption |
KR20010023967A (en) * | 1998-07-14 | 2001-03-26 | 요트.게.아. 롤페즈 | Copy protection by ticket encryption |
US6377690B1 (en) * | 1998-09-14 | 2002-04-23 | Lucent Technologies Inc. | Safe transmission of broadband data messages |
KR20030031959A (en) * | 2000-07-21 | 2003-04-23 | 제너럴 인스트루먼트 코포레이션 | System and method for facilitating subscriber access to web enabled services |
-
2004
- 2004-09-01 CN CNB200410075345XA patent/CN100356789C/en not_active Expired - Fee Related
-
2005
- 2005-09-01 WO PCT/CN2005/001379 patent/WO2006024234A1/en active Application Filing
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101461237B (en) * | 2006-05-16 | 2013-06-05 | 京瓷株式会社 | Address generating method and broadcast receiver |
CN101924595B (en) * | 2009-06-12 | 2012-09-12 | 北京视博数字电视科技有限公司 | Audio scrambling method, descrambling method and device thereof |
CN107733639A (en) * | 2017-08-24 | 2018-02-23 | 上海壹账通金融科技有限公司 | Key management method, device and readable storage medium storing program for executing |
CN107733639B (en) * | 2017-08-24 | 2020-08-04 | 深圳壹账通智能科技有限公司 | Key management method, device and readable storage medium |
CN108881022A (en) * | 2018-05-30 | 2018-11-23 | 中国人民解放军战略支援部队信息工程大学 | A kind of datagram scrambles the network node device and method for forwarding of tabling look-up |
CN108881022B (en) * | 2018-05-30 | 2020-11-10 | 中国人民解放军战略支援部队信息工程大学 | Network node device and method for scrambling and look-up table forwarding of datagram |
Also Published As
Publication number | Publication date |
---|---|
CN100356789C (en) | 2007-12-19 |
WO2006024234A1 (en) | 2006-03-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN1201527C (en) | Data transmission controlling method and data transmission system | |
CN1258898C (en) | Method for managing symmetrical secret key in communication network, and device for carrying out such method | |
CN1465159A (en) | Secure packet-based data broadcasting architecture | |
CN101061666A (en) | Method for managing digital rights in broadcast/multicast service | |
CN1859084A (en) | Enciphering and deenciphering method for request broadcast stream media data of mocro soft media format | |
CN101032167A (en) | Method for broadcasting digital data to a targeted set of reception terminals | |
CN101035255A (en) | System, protection method and server for realizing the virtual channel service | |
CN1992589A (en) | Methods of scrambling and descrambling units of data | |
CN1771706A (en) | Methods and apparatus for secure and adaptive delivery of multimedia content | |
CN101047830A (en) | Method and device for authorising conditional access | |
CN1613228A (en) | Generation of a watermark being unique to a receiver of a multicast transmission of multimedia | |
CN1777277A (en) | Apparatus, system, and method for transmitting content in home network | |
CN1960453A (en) | Quick method and system for digital channel, and device for creating auxiliary channel | |
CN1549595A (en) | Information transmitting method and apparatus for interactive digital broadcast television system | |
CN101076109A (en) | Two-way CA system of digital TV-set and method for ordering and cancelling programm based on it | |
CN1845599A (en) | Method for obtaining and updating service key in mobile television service | |
CN1852432A (en) | Method for enciphering and deciphering living-broadcasting flow-medium data | |
CN1777274A (en) | Flow media content protection method based on motion audio-video stardard file format | |
CN1867066A (en) | Digital television program broadcasting system and method | |
CN1744706A (en) | Method for protecting broadband video-audio broadcasting content | |
CN1863041A (en) | Method for implementing network television programme preview | |
CN1913617A (en) | System for implementing mobile terminal TV service and program transmitting watching method | |
CN1758593A (en) | Service key updating method of multimedium playing service | |
CN1668101A (en) | A conditional reception system merging Internet and cable television network environments | |
CN1744707A (en) | Method and device for protecting broadband audio-video broadcasting content |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20071219 Termination date: 20150901 |
|
EXPY | Termination of patent right or utility model |