CN1744707A - Method and device for protecting broadband audio-video broadcasting content - Google Patents

Method and device for protecting broadband audio-video broadcasting content Download PDF

Info

Publication number
CN1744707A
CN1744707A CNA200410075345XA CN200410075345A CN1744707A CN 1744707 A CN1744707 A CN 1744707A CN A200410075345X A CNA200410075345X A CN A200410075345XA CN 200410075345 A CN200410075345 A CN 200410075345A CN 1744707 A CN1744707 A CN 1744707A
Authority
CN
China
Prior art keywords
key
scrambling
message
index
content
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA200410075345XA
Other languages
Chinese (zh)
Other versions
CN100356789C (en
Inventor
李军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CNB200410075345XA priority Critical patent/CN100356789C/en
Priority to PCT/CN2005/001379 priority patent/WO2006024234A1/en
Publication of CN1744707A publication Critical patent/CN1744707A/en
Application granted granted Critical
Publication of CN100356789C publication Critical patent/CN100356789C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/238Interfacing the downstream path of the transmission network, e.g. adapting the transmission rate of a video stream to network bandwidth; Processing of multiplex streams
    • H04N21/2389Multiplex stream processing, e.g. multiplex stream encrypting
    • H04N21/23895Multiplex stream processing, e.g. multiplex stream encrypting involving multiplex stream encryption
    • H04N21/23897Multiplex stream processing, e.g. multiplex stream encrypting involving multiplex stream encryption by partially encrypting, e.g. encrypting only the ending portion of a movie
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/266Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel
    • H04N21/26613Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel for generating or managing keys in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/438Interfacing the downstream path of the transmission network originating from a server, e.g. retrieving encoded video stream packets from an IP network
    • H04N21/4385Multiplex stream processing, e.g. multiplex stream decrypting
    • H04N21/43853Multiplex stream processing, e.g. multiplex stream decrypting involving multiplex stream decryption
    • H04N21/43856Multiplex stream processing, e.g. multiplex stream decrypting involving multiplex stream decryption by partial decryption, e.g. decrypting a multiplex stream that has been partially encrypted
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/60Network structure or processes for video distribution between server and client or between remote clients; Control signalling between clients, server and network components; Transmission of management data between server and client, e.g. sending from server to client commands for recording incoming content stream; Communication details between server and client 
    • H04N21/63Control signaling related to video distribution between client, server and network components; Network processes for video distribution between server and clients or between remote clients, e.g. transmitting basic layer and enhancement layers over different transmission paths, setting up a peer-to-peer communication via Internet between remote STB's; Communication protocols; Addressing
    • H04N21/643Communication protocols
    • H04N21/64322IP
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/033Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Multimedia (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

At sending side, the method picks up content of start part of payload from IP message, and calculates out information of scrambling position and indexing information. Using indexing information obtains local cryptographic key. Using the cryptographic key and information of scrambling position carries out scrambling process for content at pointed segment, which does not include the start part in IP message. At receiving side, picking up content of start part of payload from scrambled IP message, the method calculates scrambling position and indexing information by using algorithm identical to the algorithm applied at scrambling time. Using indexing information obtains local cryptographic key at receiving side. Using the cryptographic key and information of scrambling position carries out de-scrambling process for the scrambling segment of IP message. Comparing with existed techniques, the invention solves issue of security existed in content of video and audio broadcast in wide band.

Description

A kind of method and device of protecting broadband audio-video broadcasting content
Technical field
The present invention relates to the broadband video and audio frequency technology applications in the communication network, relate in particular to a kind of method and device of protecting broadband audio-video broadcasting content.
Background technology
In cable television network, video-voice frequency flow was encrypted before being broadcast to network or scrambling, sent to the user by network then, and user side obtains key and finishes the deciphering or the descrambling of program stream from network.Key is broadcast to all terminals in this method, in order to guarantee that key is difficult for being cracked, needs complex key management and cryptographic algorithm, and key needs frequent real-time update.Therefore, there is following shortcoming in this method:
(1) key must transmit on the net, easy crack.
(2) key needs frequent updating, takies a large amount of network bandwidths.
(3) encryption and decryption and key management algorithm complexity are with high costs.
(4) encryption or scrambling algorithm are relevant with concrete video encoding form, bad adaptability.
(5) in a single day enciphering and deciphering algorithm is broken, and lacks effective solution.
Be the data service that the broadband access technology of representative not only can provide internet access and so on Digital Subscriber Loop (DSL) at present, the video and the audio service that comprise Broadband TV business, audio broadcasting business, demand (telecommunication) service can also be provided.Look audio service and carry out based on set-top box or computer usually, behind set-top box or the computer access network, can obtain by network and look audio content; Usually program request class business is carried by unicast stream, and TV class and audio broadcasting class business are carried by multicast data flow, and its network model as shown in Figure 1.
An emphasis carrying out television services and audio broadcasting business on broadband networks is to guarantee content safety, and so-called content safety wherein one deck implication is exactly to guarantee that the user can not arbitrarily carry out illegal digital copies to channel content, is called anti-digital copies.And on broadband networks, audio-video broadcasting content not being taked anti-digital copies measure at present, the user can copy arbitrary channel content, so its fail safe is relatively poor.
Summary of the invention
The invention provides a kind of method and device of protecting broadband audio-video broadcasting content, there is the relatively poor problem of fail safe in broadband audio-video broadcasting content in the prior art to solve.
For addressing the above problem, the invention provides following technical scheme:
A kind of method of protecting broadband audio-video broadcasting content, described audio-video broadcasting content is produced by the audio-video broadcasting source, and adopts the IP message format to be sent to user terminal by broadband network and broadband access equipment; This method comprises the steps:
A, at transmitter side, from the IP message, extract the content that payload begins part, and calculate scrambling positional information and index information;
B, obtain key from transmitter side this locality, and the scrambling positional information of utilizing this key and steps A to calculate is carried out scrambling to the specified section content that does not comprise described beginning partial content in the IP message and is handled according to the index information that calculates in the steps A;
C, the IP message after the scrambling is sent to receiver side;
D, at receiver side, from the IP message of scrambling, extract the content that described payload begins part, and employing during with scrambling identical algorithm computation go out scrambling positional information and index information;
E, obtain key from receiver side this locality, and utilize the scrambling positional information that calculates among this key and the step D that the scrambling section of IP message is carried out scramble process according to the index information that calculates among the step D.
A kind of scrambler comprises:
The key seed storehouse is used to preserve the seed that generates key;
Key seed index generation module is used for extracting content and generating the key seed index from message;
Key production module is obtained key seed and is generated key from described key seed storehouse according to described index;
Scrambling position generation module is used for extracting content and generating the beginning and the end position information of message scrambling section from message;
Scrambling module utilizes the key of generation and the beginning and the end position information of described scrambling section that message is carried out the scrambling processing.
A kind of broadband audio-video broadcasting system comprises:
The audio-video broadcasting source is used to produce the audio-video broadcasting content of each channel;
User terminal is used to receive the audio-video broadcasting content of one or more channels;
Broadband network transmits the broadcasted content that export in described audio-video broadcasting source;
Broadband access equipment, the broadcasted content of each channel that described broadband network is sent multicasts to described user terminal;
Scrambler receives the audio-video broadcasting content of described audio-video broadcasting source output, and carries out being sent to described broadband network after the scrambling;
Described user terminal carries out descrambling to the audio-video broadcasting content of scrambling.
The present invention utilizes the digital interference technology, and video-voice frequency flow transmits in the mode of scrambling, guarantees that having only legal terminal to decode watches, the user can't directly obtain the digital copies of video-voice frequency flow and watch for other general purpose terminals.Utilize this digital interference technology, can avoid the propagation of key on network, reduce the risk that key is cracked and reduce the extra network bandwidth taking; Algorithm and concrete video coding techniques frequently are irrelevant, and directly the payload to the IP bag carries out scrambling, applicable to different video encoding technology; Do not need complex key management technology and cryptographic algorithm, do not increase the realization difficulty of terminal set top box and cost, reduction local side cost; If the scrambling algorithm is broken in addition, can upgrade local side and terminal algorithm/key is in time remedied by Network Synchronization.
Description of drawings
Fig. 1 looks the networking schematic diagram of voice applications for broadband in the prior art;
Fig. 2 realizes the networking schematic diagram of broadband audio-video broadcasting content protection for the present invention;
Fig. 3 A, 3B are the structural representation of scrambler;
Fig. 4 is the structural representation of the descrambling part of user terminal;
Fig. 5 is the schematic diagram of scrambling and descrambling.
Embodiment
Consult shown in Figure 2ly, the present invention increases a scrambler in network system.Whole system comprises: the audio-video broadcasting source, be used to produce the audio-video broadcasting content of each channel, and its output format is the IP message.Scrambler receives the audio-video broadcasting content of described audio-video broadcasting source output, and carries out being sent to described broadband network after the scrambling.
Broadband network transmits the broadcasted content that export in described audio-video broadcasting source.
Broadband access equipment, the broadcasted content of each channel that described broadband network is sent multicasts to described user terminal.
User terminal is used to receive the audio-video broadcasting content of one or more channels, and the IP message of scrambling is carried out descrambling.
Digital interference technological core thinking is:
(1) only the payload of IP message is carried out scrambling, encryption technology has nothing to do with concrete payload content;
(2) beginning of IP message payload part may be used to transmit some protocol information, does not do scrambling and handles, and its length can be provided with;
(3) realize specific scrambling position generating algorithm on scrambler and the terminal, key seed index generating algorithm is preserved an identical key seed storehouse or a cipher key store respectively on the key schedule and add Descrambling Algorithms, scrambler and user terminal.
Consult shown in Fig. 3 A, scrambler comprises:
The key seed storehouse is used to preserve the key seed that generates key.
Key seed index generation module adopts key kind index generating algorithm to extract content and generate the key seed index from message.This algorithm can adopt privately owned algorithm, as the Haval+MD5 combinational algorithm.
Key production module is obtained key seed according to described index from described key seed storehouse, and adopts key schedule to generate key.This algorithm can adopt privately owned algorithm, as the Haval+MD5 combinational algorithm.
Scrambling position generation module, employing scrambling position generating algorithm extract content and generate the beginning and the end position information of message scrambling section from message.This algorithm can adopt privately owned algorithm, as the combinational algorithm of XOR, HASH scheduling algorithm.
Scrambling module according to the key that generates and the beginning and the end position information of described scrambling section, adopts the scrambling algorithm that message is carried out scrambling and handles.The scrambling algorithm can adopt DES, 3DES or AES scheduling algorithm.
Consult shown in Fig. 3 B, scrambler also can comprise:
Cipher key store is used to preserve key.
The cipher key index generation module is used for extracting content from message and generates cipher key index, and utilizes described cipher key index to obtain key from described cipher key store.
Scrambling position generation module is used for extracting content and generating the beginning and the end position information of message scrambling section from message.
Scrambling module, the key that utilization is obtained and the beginning of described scrambling section and end position information carry out scrambling to message to be handled.
The mode that the difference of Fig. 3 A and scrambler shown in Fig. 3 B is to obtain key is different.Scrambler shown in Fig. 3 A utilizes index information to obtain earlier key seed from the storehouse, and then generates key, and Fig. 3 B then utilizes index information directly to obtain key from the storehouse.
Consult shown in Fig. 4 A, this structure is corresponding with the scrambling structure shown in Fig. 3 A, and user terminal also comprises except comprising basic structure of the prior art:
The key seed storehouse, identical with the key seed storehouse in the scrambler shown in Fig. 3 A, be used to preserve the key seed that generates key;
Key seed index generation module is used for extracting content and generating the key seed index from message;
Key production module is obtained key seed and is generated key according to described index from the key seed storehouse;
Scrambling position generation module is used for extracting content and generating the beginning and the end position information of message scrambling section from message;
Descrambling module utilizes the key of generation and the beginning and the end position information of described scrambling section that the scrambling section of message is carried out scramble process.
Consult shown in Fig. 4 B, this structure is corresponding with the scrambling structure shown in Fig. 3 B, and user terminal also comprises except comprising basic structure of the prior art:
Cipher key store, identical with cipher key store in the scrambler shown in Fig. 3 B, be used to preserve key.
The cipher key index generation module is used for extracting content from message and generates cipher key index, and utilizes described cipher key index to obtain key from described cipher key store.
Scrambling position generation module is used for extracting content and generating the beginning and the end position information of message scrambling section from message.
Descrambling module, the key that utilization is obtained and the beginning and the end position information of described scrambling section are carried out scramble process to the scrambling section of message.
Consult shown in Figure 5ly, preserve with scrambler and user terminal that all to preserve identical key seed storehouse be example, the concrete processing procedure of scrambling is as follows:
(1) at transmitter side, scrambler extracts some content of the beginning part of IP message payload by scrambling position generating algorithm and key seed index generating algorithm.These contents are the contents that change with the bag content changing, but not immobilized substance.
(2) calculate corresponding scrambling positional information by scrambling position generating algorithm, i.e. beginning/the end position of message scrambling section generates the key seed index by key seed index generating algorithm.
(3) scrambler inquires corresponding key seed according to the key seed index from the key seed storehouse of this locality.
(4) scrambler calculates key according to key seed by key schedule.
(5) scrambler, adopts predetermined scrambling algorithm to carry out scrambling and handles the specified section of IP message according to the key that generates and scrambling positional information.
The concrete processing procedure of descrambling is as follows:
(1) at receiver side, after user terminal is received the scrambling message, use scrambling position generating algorithm identical with scrambler and key seed index generating algorithm to extract some content of the beginning part of IP message payload, these contents are identical with content in the scrambling step (1).
(2) calculate corresponding scrambling positional information by scrambling position generating algorithm, i.e. beginning/the end position of message scrambling section generates the key seed index by key seed index generating algorithm.
(3) user terminal finds corresponding key seed according to the key seed index in local key seed storehouse kind.
(4) user terminal calculates key according to key seed by key schedule.
(5) user terminal adopts predetermined Descrambling Algorithms that the scrambling section of appointment is carried out descrambling according to key and scrambling positional information.
If scrambler and user terminal are all preserved cipher key store mutually, replace cipher key index seed generating algorithm to generate cipher key index with the cipher key index generating algorithm, utilize cipher key index from cipher key store, directly to obtain key then and carry out scrambling or scramble process, its processing procedure and in like manner above-mentioned.
Above-mentioned digital interference technology has following characteristics:
(1), irrelevant with concrete video encoding technology to the scrambling of IP message payload;
(2) do not take any extra bandwidth;
(3) multi-layer security, add close algorithm;
(4) according to the dynamic scrambling of bag content, scramble information dynamic exchange;
(5) key does not transmit on network;
(6) scrambler and terminal realize that technical difficulty is low, and cost is also lower;
(7) high security, the user will crack this algorithm need obtain following information simultaneously: add all key seed, key schedules in Descrambling Algorithms, scrambling position generating algorithm, key seed index generating algorithm, the key seed storehouse;
(8) mode by the online upgrading terminal software, but the upgrading in time of implementation algorithm, key seed.

Claims (10)

1, a kind of method of protecting broadband audio-video broadcasting content, described audio-video broadcasting content is produced by the audio-video broadcasting source, and adopts the IP message format to be sent to user terminal by broadband network and broadband access equipment; It is characterized in that this method comprises the steps:
A, at transmitter side, from the IP message, extract the content that payload begins part, and calculate scrambling positional information and index information;
B, obtain key from transmitter side this locality, and the scrambling positional information of utilizing this key and steps A to calculate is carried out scrambling to the specified section content that does not comprise described beginning partial content in the IP message and is handled according to the index information that calculates in the steps A;
C, the IP message after the scrambling is sent to receiver side;
D, at receiver side, from the IP message of scrambling, extract the content that described payload begins part, and employing during with scrambling identical algorithm computation go out scrambling positional information and index information;
E, obtain key from receiver side this locality, and utilize the scrambling positional information that calculates among this key and the step D that the scrambling section of IP message is carried out scramble process according to the index information that calculates among the step D.
2, the method for claim 1, it is characterized in that, at transmitter side or receiver side local key seed storehouse is set respectively, the index information that calculates in steps A and step D is the key seed index information, utilize this key seed index information from the key seed storehouse, to obtain key seed, and generate key according to this key seed; Perhaps at transmitter side or receiver side local cipher key store is set respectively, the index information that calculates in steps A and step D is a cipher key index information, utilizes this cipher key index information directly to obtain key from cipher key store.
3, method as claimed in claim 1 or 2 is characterized in that, described beginning partial content is meant the content that changes with the IP message content, and the length of extracting content can be provided with.
4, a kind of broadband audio-video broadcasting system comprises:
The audio-video broadcasting source is used to produce the audio-video broadcasting content of each channel;
User terminal is used to receive the audio-video broadcasting content of one or more channels;
Broadband network transmits the broadcasted content that export in described audio-video broadcasting source;
Broadband access equipment, the broadcasted content of each channel that described broadband network is sent multicasts to described user terminal;
It is characterized in that also comprising:
Scrambler receives the audio-video broadcasting content of described audio-video broadcasting source output, and carries out being sent to described broadband network after the scrambling;
Described user terminal carries out descrambling to the audio-video broadcasting content of scrambling.
5, system as claimed in claim 4 is characterized in that, described scrambler comprises:
The key seed storehouse is used to preserve the seed that generates key;
Key seed index generation module is used for extracting content and generating the key seed index from message;
Key production module is obtained key seed and is generated key according to described index from the key seed storehouse;
Scrambling position generation module is used for extracting content and generating the beginning and the end position information of message scrambling section from message;
Scrambling module utilizes the key of generation and the beginning and the end position information of described scrambling section that message is carried out the scrambling processing.
Perhaps, described scrambler comprises:
Cipher key store is used to preserve key;
The cipher key index generation module is used for extracting content from message and generates cipher key index, and utilizes this cipher key index to obtain key from described cipher key store;
Scrambling position generation module is used for extracting content and generating the beginning and the end position information of message scrambling section from message;
Scrambling module, the key that utilization is obtained and the beginning of described scrambling section and end position information carry out scrambling to message to be handled.
6, system as claimed in claim 5 is characterized in that, described user terminal comprises:
The key seed storehouse, identical with the key seed storehouse in the described scrambler, be used to preserve the seed that generates key;
Key seed index generation module is used for extracting content and generating the key seed index from message;
Key production module is obtained key seed and is generated key according to described index from the key seed storehouse;
Scrambling position generation module is used for extracting content and generating the beginning and the end position information of message scrambling section from message;
Descrambling module utilizes the key of generation and the beginning and the end position information of described scrambling section that the scrambling section of message is carried out scramble process;
Perhaps, described user terminal comprises:
Cipher key store, identical with cipher key store in the described scrambler, be used to preserve key;
The cipher key index generation module is used for extracting content from message and generates cipher key index, and utilizes this cipher key index to obtain key from described cipher key store;
Scrambling position generation module is used for extracting content and generating the beginning and the end position information of message scrambling section from message;
Descrambling module, the key that utilization is obtained and the beginning and the end position information of described scrambling section are carried out scramble process to the scrambling section of message.
7, a kind of scrambler is characterized in that comprising:
The key seed storehouse is used to preserve the seed that generates key;
Key seed index generation module is used for extracting content and generating the key seed index from message;
Key production module is obtained key seed and is generated key from described key seed storehouse according to described index;
Scrambling position generation module is used for extracting content and generating the beginning and the end position information of message scrambling section from message;
Scrambling module utilizes the key of generation and the beginning and the end position information of described scrambling section that message is carried out the scrambling processing.
8, a kind of scrambler is characterized in that comprising:
Cipher key store is used to preserve key;
The cipher key index generation module is used for extracting content from message and generates cipher key index, and utilizes described cipher key index to obtain key from described cipher key store;
Scrambling position generation module is used for extracting content and generating the beginning and the end position information of message scrambling section from message;
Scrambling module, the key that utilization is obtained and the beginning of described scrambling section and end position information carry out scrambling to message to be handled.
9, a kind of user terminal is characterized in that comprising:
The key seed storehouse is used to preserve the key seed that generates key;
Key seed index generation module is used for extracting content and generating the key seed index from message;
Key production module is obtained key seed and is generated key according to described index from the key seed storehouse;
Scrambling position generation module is used for extracting content and generating the beginning and the end position information of message scrambling section from message;
Descrambling module utilizes the key of generation and the beginning and the end position information of described scrambling section that the scrambling section of message is carried out scramble process.
10, a kind of user terminal is characterized in that comprising:
Cipher key store is used to preserve key;
The cipher key index generation module is used for extracting content from message and generates cipher key index, and utilizes described cipher key index to obtain key from described cipher key store;
Scrambling position generation module is used for extracting content and generating the beginning and the end position information of message scrambling section from message;
Descrambling module, the key that utilization is obtained and the beginning and the end position information of described scrambling section are carried out scramble process to the scrambling section of message.
CNB200410075345XA 2004-09-01 2004-09-01 Method and device for protecting broadband audio-video broadcasting content Expired - Fee Related CN100356789C (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CNB200410075345XA CN100356789C (en) 2004-09-01 2004-09-01 Method and device for protecting broadband audio-video broadcasting content
PCT/CN2005/001379 WO2006024234A1 (en) 2004-09-01 2005-09-01 Method ano apparatus for protecting broadband video and audio broadcast content

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB200410075345XA CN100356789C (en) 2004-09-01 2004-09-01 Method and device for protecting broadband audio-video broadcasting content

Publications (2)

Publication Number Publication Date
CN1744707A true CN1744707A (en) 2006-03-08
CN100356789C CN100356789C (en) 2007-12-19

Family

ID=35999710

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB200410075345XA Expired - Fee Related CN100356789C (en) 2004-09-01 2004-09-01 Method and device for protecting broadband audio-video broadcasting content

Country Status (2)

Country Link
CN (1) CN100356789C (en)
WO (1) WO2006024234A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101924595B (en) * 2009-06-12 2012-09-12 北京视博数字电视科技有限公司 Audio scrambling method, descrambling method and device thereof
CN101461237B (en) * 2006-05-16 2013-06-05 京瓷株式会社 Address generating method and broadcast receiver
CN107733639A (en) * 2017-08-24 2018-02-23 上海壹账通金融科技有限公司 Key management method, device and readable storage medium storing program for executing
CN108881022A (en) * 2018-05-30 2018-11-23 中国人民解放军战略支援部队信息工程大学 A kind of datagram scrambles the network node device and method for forwarding of tabling look-up

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002520682A (en) * 1998-07-14 2002-07-09 コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ Copy protection with ticket encryption
KR20010023967A (en) * 1998-07-14 2001-03-26 요트.게.아. 롤페즈 Copy protection by ticket encryption
US6377690B1 (en) * 1998-09-14 2002-04-23 Lucent Technologies Inc. Safe transmission of broadband data messages
KR20030031959A (en) * 2000-07-21 2003-04-23 제너럴 인스트루먼트 코포레이션 System and method for facilitating subscriber access to web enabled services

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101461237B (en) * 2006-05-16 2013-06-05 京瓷株式会社 Address generating method and broadcast receiver
CN101924595B (en) * 2009-06-12 2012-09-12 北京视博数字电视科技有限公司 Audio scrambling method, descrambling method and device thereof
CN107733639A (en) * 2017-08-24 2018-02-23 上海壹账通金融科技有限公司 Key management method, device and readable storage medium storing program for executing
CN107733639B (en) * 2017-08-24 2020-08-04 深圳壹账通智能科技有限公司 Key management method, device and readable storage medium
CN108881022A (en) * 2018-05-30 2018-11-23 中国人民解放军战略支援部队信息工程大学 A kind of datagram scrambles the network node device and method for forwarding of tabling look-up
CN108881022B (en) * 2018-05-30 2020-11-10 中国人民解放军战略支援部队信息工程大学 Network node device and method for scrambling and look-up table forwarding of datagram

Also Published As

Publication number Publication date
CN100356789C (en) 2007-12-19
WO2006024234A1 (en) 2006-03-09

Similar Documents

Publication Publication Date Title
CN1201527C (en) Data transmission controlling method and data transmission system
CN1258898C (en) Method for managing symmetrical secret key in communication network, and device for carrying out such method
CN1465159A (en) Secure packet-based data broadcasting architecture
CN101061666A (en) Method for managing digital rights in broadcast/multicast service
CN1859084A (en) Enciphering and deenciphering method for request broadcast stream media data of mocro soft media format
CN101032167A (en) Method for broadcasting digital data to a targeted set of reception terminals
CN101035255A (en) System, protection method and server for realizing the virtual channel service
CN1992589A (en) Methods of scrambling and descrambling units of data
CN1771706A (en) Methods and apparatus for secure and adaptive delivery of multimedia content
CN101047830A (en) Method and device for authorising conditional access
CN1613228A (en) Generation of a watermark being unique to a receiver of a multicast transmission of multimedia
CN1777277A (en) Apparatus, system, and method for transmitting content in home network
CN1960453A (en) Quick method and system for digital channel, and device for creating auxiliary channel
CN1549595A (en) Information transmitting method and apparatus for interactive digital broadcast television system
CN101076109A (en) Two-way CA system of digital TV-set and method for ordering and cancelling programm based on it
CN1845599A (en) Method for obtaining and updating service key in mobile television service
CN1852432A (en) Method for enciphering and deciphering living-broadcasting flow-medium data
CN1777274A (en) Flow media content protection method based on motion audio-video stardard file format
CN1867066A (en) Digital television program broadcasting system and method
CN1744706A (en) Method for protecting broadband video-audio broadcasting content
CN1863041A (en) Method for implementing network television programme preview
CN1913617A (en) System for implementing mobile terminal TV service and program transmitting watching method
CN1758593A (en) Service key updating method of multimedium playing service
CN1668101A (en) A conditional reception system merging Internet and cable television network environments
CN1744707A (en) Method and device for protecting broadband audio-video broadcasting content

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20071219

Termination date: 20150901

EXPY Termination of patent right or utility model