Summary of the invention
The present invention is intended to provide a kind of business and content protecting technology based on the BCAST of MBMS security mechanism service with superperformance for operator; the MBMS security mechanism is compared with existing; not only have the business protection capacity of more excellent BCAST service, have the ability that content protecting is provided simultaneously concurrently.
According to an aspect of the present invention, provide a kind of subscriber equipment that BCAST is provided the service protection and the content protecting device of service, comprise: be used for coming from the device of the MBMS user key deciphering service regeulations object that the MBMS security mechanism reuses, wherein said service regeulations to as if the result that consults at the use of application of user and the network equipment; Be used for using BCAST service process monitoring user whether to violate the device of the service regeulations of former negotiation the user; Need violate the service regeulations of original negotiation and adopt new service regeulations if be used for the user, then write down the device that these new service regeulations also send to new service regeulations operation information the network equipment that the BCAST service is provided; Be used to monitor the device that whether needs to preserve the BCAST data; And be used for preserving if desired the BCAST data, then produce the content protecting key and in the content protecting module, use the content protecting key data of required preservation to be encrypted the device of preserving again earlier by key material in the service regeulations object.
According to one embodiment of present invention, described service protection and content protecting device also comprise and be used for monitoring when not needing to preserve the BCAST data, then the device of deleted data immediately after the intact BCAST service of customer consumption.
According to a further aspect in the invention, provide a kind of network equipment that BCAST is provided the service protection and the content protecting device of service, comprise: be used to produce the device of service regeulations object, wherein said service regeulations are to liking the result that the user and the network equipment are consulted at the use of using; Be used to use and come from the device that MBMS user key that the MBMS security mechanism reuses is encrypted the service regeulations object; And the device that is used for the service regeulations object is sent to subscriber equipment.
According to one embodiment of present invention, described service regeulations object comprises: service regeulations, content protecting rule, be used to produce/derive the key material of content protecting key and the storage body of some characterization information.
According to a further aspect in the invention, provide a kind of subscriber equipment that BCAST is provided the service protection and the content protecting method of service, comprise the following steps: that wherein said service regeulations are to liking the result that the user and the network equipment are consulted at the use of using with coming from the MBMS user key deciphering service regeulations object that the MBMS security mechanism is reused; Use in the BCAST service process the user, whether monitoring user violates the service regeulations of former negotiation; If the user need violate the service regeulations of former negotiation and adopt new service regeulations, then write down these new service regeulations and also new service regeulations operation information is sent in the network equipment that the BCAST service is provided; Whether monitor needs to preserve the BCAST data; Preserve the BCAST data if desired, then produce the content protecting key, and in the content protecting module, use the content protecting key that the data of required preservation are encrypted earlier again and preserve by key material in the service regeulations object.
According to one embodiment of present invention, this method also comprises: monitoring when not needing to preserve the BCAST data, then deleted data immediately after the intact BCAST service of customer consumption.
According to a further aspect in the invention, the related service protection and the content protecting method that provide a kind of network equipment that the BCAST service is provided, comprise the following steps: to produce the service regeulations object, wherein said service regeulations are to liking the result that the user and the network equipment are consulted at the use of using; Use comes from the MBMS user key encryption service regeulations object that the MBMS security mechanism is reused; And the service regeulations object sent to subscriber equipment.
According to one embodiment of present invention, described service regeulations object comprises: service regeulations, content protecting rule, be used to produce/derive the key material of content protecting key and the storage body of some characterization information.
Adopted above-mentioned technical solution; the present invention is based on the transfer of data protection that existing MBMS provides; user security obtain the data of BCAST service after; the user is random operating data still; because the operation behavior of service regeulations monitor meeting supervisory user; and operation behavior that can be extra to the user (the promptly original operation behavior that there is not negotiation) is carried out record; and the related network device (server end) that provides BCSAT to serve can be provided, allow the charging center of server end that user's operation bidirectional behavior is correctly chargeed.Therefore; the present invention is on the basis of reusing existing MBMS security mechanism; not only can provide more excellent BCAST the business protection capacity of service than existing MBMS security mechanism; the more important thing is the ability that content protecting is provided that has concurrently; so that existing 3G network infrastructure is changed under the minimum situation, can dispose and provide safe and reliable BCAST service fast.
Embodiment
Purport of the present invention is: do not changing existing MBMS security mechanism; also under the prerequisite that promptly existing MBMS safety [3GPP TS33.246 v630] standard is not exerted an influence; on existing MBMS security mechanism, increase some functional modules, make and also can carry out content protecting when existing MBMS safety is carried out more excellent service protection reusing.
One, main contents of the present invention:
1) before carrying out the BCAST service, the user should with service regeulations functional module (the Usage Rules Function of the related network device (server) that BCSAT service is provided, URF) with alternant way consult this application service regeulations (as, only broadcast once " Play Once ", pay-per-use " Pay-Per-View ", preserve standby " saved for future use "), the result who consults be for this user form a service regeulations object (Usage Rules Object, URO)
2) before carrying out the BCAST service, whether the URM service regeulations monitor (Usage Rules Monitor) of UE (subscriber equipment, User Equipment) will monitor after this time BCAST service finishes needs the BCAST data are preserved.Preserve the BCAST data if desired; then before preserving data; earlier according to the service regeulations of service regeulations object URO content protecting module (Content Protection Function at UE; CPF) encrypt in and then preserve, otherwise service regeulations monitor URM need guarantee to delete the BCAST data immediately after the BCAST service finishes.
3) in carrying out the BCAST service, whether the service regeulations monitor URM among the UE violates monitoring user the service regeulations among the service regeulations object URO that is originally consulted.In case find the user violated original service regeulations of consulting (as original selection be only to broadcast once, want suddenly to record/preserve), service regeulations monitor URM reminds this user, whether needs to continue new operation:
If a) user abandons the new operation of recording/preserving, then the user gets back to the service regeulations of originally only broadcasting once and continues to enjoy the BCAST service, after the user used, the service regeulations monitor need be guaranteed to delete the BCAST data immediately after the user uses the BCAST service;
B) if the user selects to continue new operation one to record/preserve, service regeulations monitor URM can write down the information of the new operation of this time.After after a while, service regeulations monitor URM can allow the charging center of server end that these operation bidirectional behaviors of user are correctly chargeed with should all such operation bidirectional information of this user (the promptly original service regeulations that do not have negotiation) sending to server end in the time period.For example; the user only wanted to select only to broadcast service regeulations once originally; but in use find to record/preserve; service regeulations monitor URM can write down the behavior that this time recorded; and generate content protecting ciphering key PK and send to content protecting module CPF, then content protecting module CPF data are encrypted and are recorded/preserve.After after a while, service regeulations monitor URM can allow the charging center of server that these operation bidirectional behaviors of user are correctly chargeed with should all such operation bidirectional information of this user (the promptly original service regeulations that do not have negotiation) sending to server end in the time period.
Two, system architecture of the present invention
In the present invention, it is that service regeulations mainly are meant what carry out using when BCAST serves for which kind of mode, as: only broadcast once " Play Once ", pay-per-use " Pay-Per-View ", preservation standby " saved for future use " etc.
Based on present existing MBMS Security Architecture, in order to carry out content protecting, the functional module of required increase is as follows:
Increase service regeulations monitor in (1.UE subscriber equipment, User Equipment) (Usage Rules Monitor, URM)
2.UE middle increase content protecting module (Content Protection Function, CPF)
In the related network device of broadcast service is provided (as BroadCast MultiCast Service center BM-SC) increase the service regeulations functional module (Usage Rules Function, URF)
As shown in Figure 1, after increasing above functional module on the existing MBMS Security Architecture, the service protection and the content protecting that can carry out the BCAST service.Comprise: subscriber equipment (UE) 1, bootstrapping service module (Bootstrapping Server Function, BSF) 2, ownership client server (Home Subscriber System, HSS) 3 and the related network device 4 of BCSAT service is provided, wherein: provide the related network device 4 of BCSAT service can adopt BroadCast MultiCast Service center (Broadcast-Multicast Service Centre, BM-SC), its functional character is asked for an interview MBMS safety [3GPP TS33.246 v640].About the major function of service regeulations monitor (URM) 11, content protecting module (CPF) 12 and service regeulations functional module (URF) 41 as follows:
1) major function of service regeulations monitor (URM) is as follows:
(1) (MBMS User Key MUK) decipher service regeulations object URO, and MUK comes from reusing of MBMS safety to use the MBMS user key
(2) use in the BCAST service process the user, whether monitoring user violates the service regeulations of original negotiation
(3) use in the BCAST service process the user, if the user need violate the service regeulations of original negotiation and continue new service regeulations
A) write down the new service regeulations of this time
B) server end that provides BCSAT to serve is provided the user is extra service regeulations operation information
(4) monitor whether need to preserve the BCAST data.If desired, (Content Protection Key CPK) encrypts and then preserves the data of required preservation, otherwise deleted data immediately after the intact BCAST of customer consumption serves just then to use earlier the content protecting key in the content protecting module.Monitor whether need to preserve the BCAST data can be in the following manner:
A) before obtaining the BCAST service, by acquisition among the service guide (service guide) of BCAST service, perhaps
B) when obtaining the BCAST service; value by " the receiving the back preserves " parameter " protection_after_reception " in the transmission security key message (traffic key message) of ephemeral keys transport layer (Short Term Key Delivery Layer) obtains, and sees also business and the content protecting nearest related content " OMA-TS-BCAST_SvcCntProtection-V1_0-20051020-D " of present OMA (Open Mobile Alliance) about the BCAST service.
(5) producing content protecting ciphering key PK2 according to key material among the service regeulations object URO) major function of content protecting module (CPF) is as follows:
(1) use content protecting ciphering key PK to encrypt the BCAST data
(2) record or preserve the BCAST data with DCF (DRM Content Format) or PDCF (Packetized DRM Content Format) file format
3) major function of service regeulations functional module (URF) is as follows:
(1) produces service regeulations objects (URO)
(2) use MBMS user key (MUK) to encrypt service regeulations objects (URO)
(3) service regeulations object (URO) is sent to subscriber equipment (UE)
4) service regeulations object (URO) mainly comprises:
(1) service regeulations are as only broadcasting once " Play Once ", pay-per-use " Pay-Per-View ", preservation standby " saved for future use " etc.
(2) content protecting rule (being recording or preserving of BCAST data); for example; if being chosen as, user's service regeulations only broadcast once " Play Once "; then the BCAST data need not be recorded or be preserved after having consumed; if use after user's service regeulations are chosen as and preserve " saved for future use ", then the BCAST data need be recorded or preserve
(3) be used to produce/derive the key material of content protecting key (being data encryption key), as BCAST user's IMPI (the privately owned identity of IP Multimedia Private Identity IP multimedia), the identity of content supplier, etc.
(4) storage of some important informations (as key material, service regeulations information), these significant datas are stored in the smart card if smart card (being SIM card, UICC card) is available, if smart card is unavailable these significant datas be stored in mobile device (Mobile Equipment, ME) in
Three, use the BCAST service of service protection
For the service regeulations of similar only broadcasting once " Play Once ", BCAST service only needs service protection, and MBMS safety the transmission encipherment protection is provided is service protection.Service regeulations monitor URM only needs monitoring user whether to violate his original service regeulations of consulting when using the BCAST service, and guarantees that the user should delete the BCAST data immediately after using the BCAST service.
Only need carry out in the scene of service protection, following operation should be carried out (not necessarily will according to following order of operation):
1) user submits to (the Content Provider of content supplier with the service regeulations request (as only broadcasting once " Play Once ") of this BCAST service, CP), the CP of content supplier is transmitted to the service regeulations functional module URF that provides in the BCAST service related network device with user's service regeulations
2) user and BroadCast MultiCast Service center BM-SC authenticate mutually
3) treat that user and BroadCast MultiCast Service center BM-SC carry out mutual authentication success after, service regeulations functional module URF will generate service regeulations object URO, URF uses MBMS user key MUK to encrypt URO and also sends to user equipment (UE)
4) based on the MBMS security mechanism, user equipment (UE) will obtain the BCAST data of the encryption of process service protection (being that transport layer is encrypted) from the CP of content supplier
5) after regular monitor URM to be used uses MBMS user key MUK deciphering service regeulations object URO, and treat that the BCAST data are by MTK (MBMS Traffic Key, MBMS Traffic Key, from reusing of MBMS security mechanism) after the deciphering, the user just can be under the supervision of URM consume the BCAST data according to the service regeulations of original negotiation.In case URM also needs to guarantee the user and uses the BCAST service that the BCAST data must be deleted immediately
6) if the user has selected a new operation (being new service regeulations, the service regeulations of originally not consulting) in using the BCAST service, service regeulations monitor URM can write down the information of the new operation of this time.After after a while, service regeulations monitor URM can allow the charging center of server end that these operation bidirectional behaviors of user are correctly chargeed with should all such operation bidirectional information of this user (the promptly original service regeulations that do not have negotiation) sending to server end in the time period.For example; the user only wanted to select only to broadcast service regeulations once originally; but in use find to record/preserve; service regeulations monitor URM can write down the behavior that this time recorded; and generate content protecting ciphering key PK and send to content protecting module CPF, then content protecting module CPF data are encrypted and are recorded/preserve.After after a while, service regeulations monitor URM can allow the charging center of server that these operation bidirectional behaviors of user are correctly chargeed with should all such operation bidirectional information of this user (the promptly original service regeulations that do not have negotiation) sending to server end in the time period.
Four, use the BCAST service of content protecting
Get off to use the service regeulations of " saved for future use " in the future for similar preservation, must be to BCAST service carrying out content protecting.But MBMS safety can only provide service protection.In order to carry out content protecting, also need in user equipment (UE), increase content protecting module CPF.Service regeulations monitor URM needs monitoring user whether to violate his original service regeulations of consulting when using the BCAST service, also needs to guarantee to use contents encryption key CPK to encrypt to the BCAST data before recording or preserve the BCAST data.
Carry out in the scene of content protecting at needs, following operation should be carried out (not necessarily will according to following order of operation):
1) user submits to (the Content Provider of content supplier with the service regeulations request (as only broadcasting once " Play Once ") of this BCAST service, CP), the CP of content supplier is transmitted to the service regeulations functional module URF that provides in the BCAST service related network device with user's service regeulations
2) user and BroadCast MultiCast Service center BM-SC authenticate mutually
3) treat that user and BroadCast MultiCast Service center BM-SC carry out mutual authentication success after, service regeulations functional module URF will generate service regeulations object URO, URF uses MBMS user key MUK to encrypt URO and also sends to user equipment (UE)
4) based on the MBMS security mechanism, user equipment (UE) will obtain the BCAST data of the encryption of process service protection (being that transport layer is encrypted) from the CP of content supplier
5) after regular monitor URM to be used uses MBMS user key MUK deciphering service regeulations object URO, and treat that the BCAST data are by MTK (MBMS Traffic Key, MBMS Traffic Key, from reusing of MBMS security mechanism) after the deciphering, the user just can be under the supervision of URM consume the BCAST data according to the service regeulations of original negotiation.
6) after carrying out the BCAST service, content protecting module CPF uses contents encryption key CPK to encrypt to the BCAST data earlier, and then records or preserve the BCAST data
7) if the user has selected a new operation (being new service regeulations, the service regeulations of originally not consulting) in using the BCAST service, service regeulations monitor URM can write down the information of the new operation of this time.After after a while, service regeulations monitor URM can allow the charging center of server end that these operation bidirectional behaviors of user are correctly chargeed with should all such operation bidirectional information of this user (the promptly original service regeulations that do not have negotiation) sending to server end in the time period.
Five, key management
In Fig. 1, based on the MBMS Security Architecture, only having increased a key is contents encryption key CPK, is used for the BCAST data encryption/decryption of content protecting module CPF.
For service regeulations object URO keys for encryption/decryption MUK, be the MUK that reuses in the MBMS safety.MBMS safety [3GPP TS33.246 v640] is asked for an interview in the management of relevant MUK.
Contents encryption key CPK is that content protecting module CPF is used for the encrypt/decrypt to the BCAST data.In order to generate CPK, service regeulations monitor URM need get key material (seeing the functional character of URO) from smart card or mobile device ME, generate CPK then.Yet the identity information relevant (as IMPI) of key material and individual subscriber is so each user has CPK separately when encrypting storing BCAST data.
The cryptographic algorithm of content protecting can adopt AES-CBC pattern (Advanced Encryption Standard, superencipherment algorithm specification) [FIPS197], and key length is 128.
Above embodiment is only for the usefulness that the present invention is described, but not limiting the scope of the invention.Relevant those skilled in the art under the situation that does not break away from the spirit and scope of the present invention, can also make various conversion or modification, and the technical scheme that all are equal to also should belong within the category of the present invention's protection, is limited by each claim.