CN1964524B - MBMS safety mechanism based service protection and content protection system for BCAST service - Google Patents

MBMS safety mechanism based service protection and content protection system for BCAST service Download PDF

Info

Publication number
CN1964524B
CN1964524B CN2005101103203A CN200510110320A CN1964524B CN 1964524 B CN1964524 B CN 1964524B CN 2005101103203 A CN2005101103203 A CN 2005101103203A CN 200510110320 A CN200510110320 A CN 200510110320A CN 1964524 B CN1964524 B CN 1964524B
Authority
CN
China
Prior art keywords
service
bcast
service regeulations
user
regeulations
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN2005101103203A
Other languages
Chinese (zh)
Other versions
CN1964524A (en
Inventor
胡志远
骆志刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nokia Shanghai Bell Co Ltd
Original Assignee
Alcatel Lucent Shanghai Bell Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alcatel Lucent Shanghai Bell Co Ltd filed Critical Alcatel Lucent Shanghai Bell Co Ltd
Priority to CN2005101103203A priority Critical patent/CN1964524B/en
Publication of CN1964524A publication Critical patent/CN1964524A/en
Application granted granted Critical
Publication of CN1964524B publication Critical patent/CN1964524B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The related business protection and contain protection technology of BCAST service based on MBMS security mechanism comprises: based on current mechanism, adding rule applying monitor, contain protective module and rule applying function module for both business and contain protection; while preventing user arbitrary operating data after user obtaining BCAST service data, and using charge center in server for right charging. This invention can provide safe reliable BCAST service with least modifying current 3G network.

Description

Service protection and content protective system based on the BCAST of MBMS security mechanism service
Technical field
The present invention relates to 3G (Third Generation) Moblie (3 RdG) technology especially refers to business and content protective system based on BCAST (broadcasting) service of MBMS (Multimedia Broadcast/Multicast Service, multimedia broadcast/multi broadcast business) security mechanism.
Background technology
For BCAST (broadcasting) service based on the MBMS security mechanism, no matter the user select which kind of service regeulations (as, only broadcast once " Play Once ", pay-per-use " Pay-Per-View ", preserve standby " saved for future use "), only may there be two kinds of possible modes of operation for BCAST data that exist with clear-text way or content, a kind of possible mode of operation is to delete the BCAST data immediately after the BCAST service consumption finishes, and another kind of possible mode of operation is that BCAST data (with DCF or PDCF file format) are preserved in order to using.For the former (after promptly consumption finishes the mode of deleted data) immediately, service is only used and need be carried out service protection to BCAST.And for the latter; service is used except being engaged in also needing to carry out content protecting after the protection in the enterprising industry of transport layer to BCAST; be that the user earlier obtains BCAST data (clear-text way) in the mode of service protection and consumes, must carry out content protecting to the BCAST data after having consumed.
For the service protection of BCAST service on transport layer, MBMS security mechanism [3GPPTS33.246] standard has provided a scheme of dealing with problems.Specific as follows:
After user and BroadCast MultiCast Service center (BM-SC) carried out the mutual authentication of success, BM-SC encrypted the BCAST service data and sends to the user with the MBMS traffic encryption key, also can the MBMS traffic encryption key be sent to the user by secured channels simultaneously; The user receive encrypted the BCAST service data and MBMS traffic encryption key that exists with the ciphertext form after, with MBMS traffic encryption key decrypting ciphertext data; The user just can enjoy broadcast service then.
Therefore; the service protection that existing MBMS security mechanism is carried out can only guarantee the safety of data when transmission; but after in case the user obtains decrypted data; the user is any operating data just; such as record, extra operation behavior such as forwarding, this operation behavior that exceeds former negotiation scope monitors owing to lack; cause record blank, and effectively chargeed to these operation bidirectional behaviors of user in the charging center of server end.
In addition, existing MBMS security mechanism can not provide content protecting for the BCAST service.
Summary of the invention
The present invention is intended to provide a kind of business and content protecting technology based on the BCAST of MBMS security mechanism service with superperformance for operator; the MBMS security mechanism is compared with existing; not only have the business protection capacity of more excellent BCAST service, have the ability that content protecting is provided simultaneously concurrently.
According to an aspect of the present invention, provide a kind of subscriber equipment that BCAST is provided the service protection and the content protecting device of service, comprise: be used for coming from the device of the MBMS user key deciphering service regeulations object that the MBMS security mechanism reuses, wherein said service regeulations to as if the result that consults at the use of application of user and the network equipment; Be used for using BCAST service process monitoring user whether to violate the device of the service regeulations of former negotiation the user; Need violate the service regeulations of original negotiation and adopt new service regeulations if be used for the user, then write down the device that these new service regeulations also send to new service regeulations operation information the network equipment that the BCAST service is provided; Be used to monitor the device that whether needs to preserve the BCAST data; And be used for preserving if desired the BCAST data, then produce the content protecting key and in the content protecting module, use the content protecting key data of required preservation to be encrypted the device of preserving again earlier by key material in the service regeulations object.
According to one embodiment of present invention, described service protection and content protecting device also comprise and be used for monitoring when not needing to preserve the BCAST data, then the device of deleted data immediately after the intact BCAST service of customer consumption.
According to a further aspect in the invention, provide a kind of network equipment that BCAST is provided the service protection and the content protecting device of service, comprise: be used to produce the device of service regeulations object, wherein said service regeulations are to liking the result that the user and the network equipment are consulted at the use of using; Be used to use and come from the device that MBMS user key that the MBMS security mechanism reuses is encrypted the service regeulations object; And the device that is used for the service regeulations object is sent to subscriber equipment.
According to one embodiment of present invention, described service regeulations object comprises: service regeulations, content protecting rule, be used to produce/derive the key material of content protecting key and the storage body of some characterization information.
According to a further aspect in the invention, provide a kind of subscriber equipment that BCAST is provided the service protection and the content protecting method of service, comprise the following steps: that wherein said service regeulations are to liking the result that the user and the network equipment are consulted at the use of using with coming from the MBMS user key deciphering service regeulations object that the MBMS security mechanism is reused; Use in the BCAST service process the user, whether monitoring user violates the service regeulations of former negotiation; If the user need violate the service regeulations of former negotiation and adopt new service regeulations, then write down these new service regeulations and also new service regeulations operation information is sent in the network equipment that the BCAST service is provided; Whether monitor needs to preserve the BCAST data; Preserve the BCAST data if desired, then produce the content protecting key, and in the content protecting module, use the content protecting key that the data of required preservation are encrypted earlier again and preserve by key material in the service regeulations object.
According to one embodiment of present invention, this method also comprises: monitoring when not needing to preserve the BCAST data, then deleted data immediately after the intact BCAST service of customer consumption.
According to a further aspect in the invention, the related service protection and the content protecting method that provide a kind of network equipment that the BCAST service is provided, comprise the following steps: to produce the service regeulations object, wherein said service regeulations are to liking the result that the user and the network equipment are consulted at the use of using; Use comes from the MBMS user key encryption service regeulations object that the MBMS security mechanism is reused; And the service regeulations object sent to subscriber equipment.
According to one embodiment of present invention, described service regeulations object comprises: service regeulations, content protecting rule, be used to produce/derive the key material of content protecting key and the storage body of some characterization information.
Adopted above-mentioned technical solution; the present invention is based on the transfer of data protection that existing MBMS provides; user security obtain the data of BCAST service after; the user is random operating data still; because the operation behavior of service regeulations monitor meeting supervisory user; and operation behavior that can be extra to the user (the promptly original operation behavior that there is not negotiation) is carried out record; and the related network device (server end) that provides BCSAT to serve can be provided, allow the charging center of server end that user's operation bidirectional behavior is correctly chargeed.Therefore; the present invention is on the basis of reusing existing MBMS security mechanism; not only can provide more excellent BCAST the business protection capacity of service than existing MBMS security mechanism; the more important thing is the ability that content protecting is provided that has concurrently; so that existing 3G network infrastructure is changed under the minimum situation, can dispose and provide safe and reliable BCAST service fast.
Description of drawings
Fig. 1 is business and the content protective system schematic diagram that the present invention is based on the BCAST service of MBMS security mechanism.
Embodiment
Purport of the present invention is: do not changing existing MBMS security mechanism; also under the prerequisite that promptly existing MBMS safety [3GPP TS33.246 v630] standard is not exerted an influence; on existing MBMS security mechanism, increase some functional modules, make and also can carry out content protecting when existing MBMS safety is carried out more excellent service protection reusing.
One, main contents of the present invention:
1) before carrying out the BCAST service, the user should with service regeulations functional module (the Usage Rules Function of the related network device (server) that BCSAT service is provided, URF) with alternant way consult this application service regeulations (as, only broadcast once " Play Once ", pay-per-use " Pay-Per-View ", preserve standby " saved for future use "), the result who consults be for this user form a service regeulations object (Usage Rules Object, URO)
2) before carrying out the BCAST service, whether the URM service regeulations monitor (Usage Rules Monitor) of UE (subscriber equipment, User Equipment) will monitor after this time BCAST service finishes needs the BCAST data are preserved.Preserve the BCAST data if desired; then before preserving data; earlier according to the service regeulations of service regeulations object URO content protecting module (Content Protection Function at UE; CPF) encrypt in and then preserve, otherwise service regeulations monitor URM need guarantee to delete the BCAST data immediately after the BCAST service finishes.
3) in carrying out the BCAST service, whether the service regeulations monitor URM among the UE violates monitoring user the service regeulations among the service regeulations object URO that is originally consulted.In case find the user violated original service regeulations of consulting (as original selection be only to broadcast once, want suddenly to record/preserve), service regeulations monitor URM reminds this user, whether needs to continue new operation:
If a) user abandons the new operation of recording/preserving, then the user gets back to the service regeulations of originally only broadcasting once and continues to enjoy the BCAST service, after the user used, the service regeulations monitor need be guaranteed to delete the BCAST data immediately after the user uses the BCAST service;
B) if the user selects to continue new operation one to record/preserve, service regeulations monitor URM can write down the information of the new operation of this time.After after a while, service regeulations monitor URM can allow the charging center of server end that these operation bidirectional behaviors of user are correctly chargeed with should all such operation bidirectional information of this user (the promptly original service regeulations that do not have negotiation) sending to server end in the time period.For example; the user only wanted to select only to broadcast service regeulations once originally; but in use find to record/preserve; service regeulations monitor URM can write down the behavior that this time recorded; and generate content protecting ciphering key PK and send to content protecting module CPF, then content protecting module CPF data are encrypted and are recorded/preserve.After after a while, service regeulations monitor URM can allow the charging center of server that these operation bidirectional behaviors of user are correctly chargeed with should all such operation bidirectional information of this user (the promptly original service regeulations that do not have negotiation) sending to server end in the time period.
Two, system architecture of the present invention
In the present invention, it is that service regeulations mainly are meant what carry out using when BCAST serves for which kind of mode, as: only broadcast once " Play Once ", pay-per-use " Pay-Per-View ", preservation standby " saved for future use " etc.
Based on present existing MBMS Security Architecture, in order to carry out content protecting, the functional module of required increase is as follows:
Increase service regeulations monitor in (1.UE subscriber equipment, User Equipment) (Usage Rules Monitor, URM)
2.UE middle increase content protecting module (Content Protection Function, CPF)
In the related network device of broadcast service is provided (as BroadCast MultiCast Service center BM-SC) increase the service regeulations functional module (Usage Rules Function, URF)
As shown in Figure 1, after increasing above functional module on the existing MBMS Security Architecture, the service protection and the content protecting that can carry out the BCAST service.Comprise: subscriber equipment (UE) 1, bootstrapping service module (Bootstrapping Server Function, BSF) 2, ownership client server (Home Subscriber System, HSS) 3 and the related network device 4 of BCSAT service is provided, wherein: provide the related network device 4 of BCSAT service can adopt BroadCast MultiCast Service center (Broadcast-Multicast Service Centre, BM-SC), its functional character is asked for an interview MBMS safety [3GPP TS33.246 v640].About the major function of service regeulations monitor (URM) 11, content protecting module (CPF) 12 and service regeulations functional module (URF) 41 as follows:
1) major function of service regeulations monitor (URM) is as follows:
(1) (MBMS User Key MUK) decipher service regeulations object URO, and MUK comes from reusing of MBMS safety to use the MBMS user key
(2) use in the BCAST service process the user, whether monitoring user violates the service regeulations of original negotiation
(3) use in the BCAST service process the user, if the user need violate the service regeulations of original negotiation and continue new service regeulations
A) write down the new service regeulations of this time
B) server end that provides BCSAT to serve is provided the user is extra service regeulations operation information
(4) monitor whether need to preserve the BCAST data.If desired, (Content Protection Key CPK) encrypts and then preserves the data of required preservation, otherwise deleted data immediately after the intact BCAST of customer consumption serves just then to use earlier the content protecting key in the content protecting module.Monitor whether need to preserve the BCAST data can be in the following manner:
A) before obtaining the BCAST service, by acquisition among the service guide (service guide) of BCAST service, perhaps
B) when obtaining the BCAST service; value by " the receiving the back preserves " parameter " protection_after_reception " in the transmission security key message (traffic key message) of ephemeral keys transport layer (Short Term Key Delivery Layer) obtains, and sees also business and the content protecting nearest related content " OMA-TS-BCAST_SvcCntProtection-V1_0-20051020-D " of present OMA (Open Mobile Alliance) about the BCAST service.
(5) producing content protecting ciphering key PK2 according to key material among the service regeulations object URO) major function of content protecting module (CPF) is as follows:
(1) use content protecting ciphering key PK to encrypt the BCAST data
(2) record or preserve the BCAST data with DCF (DRM Content Format) or PDCF (Packetized DRM Content Format) file format
3) major function of service regeulations functional module (URF) is as follows:
(1) produces service regeulations objects (URO)
(2) use MBMS user key (MUK) to encrypt service regeulations objects (URO)
(3) service regeulations object (URO) is sent to subscriber equipment (UE)
4) service regeulations object (URO) mainly comprises:
(1) service regeulations are as only broadcasting once " Play Once ", pay-per-use " Pay-Per-View ", preservation standby " saved for future use " etc.
(2) content protecting rule (being recording or preserving of BCAST data); for example; if being chosen as, user's service regeulations only broadcast once " Play Once "; then the BCAST data need not be recorded or be preserved after having consumed; if use after user's service regeulations are chosen as and preserve " saved for future use ", then the BCAST data need be recorded or preserve
(3) be used to produce/derive the key material of content protecting key (being data encryption key), as BCAST user's IMPI (the privately owned identity of IP Multimedia Private Identity IP multimedia), the identity of content supplier, etc.
(4) storage of some important informations (as key material, service regeulations information), these significant datas are stored in the smart card if smart card (being SIM card, UICC card) is available, if smart card is unavailable these significant datas be stored in mobile device (Mobile Equipment, ME) in
Three, use the BCAST service of service protection
For the service regeulations of similar only broadcasting once " Play Once ", BCAST service only needs service protection, and MBMS safety the transmission encipherment protection is provided is service protection.Service regeulations monitor URM only needs monitoring user whether to violate his original service regeulations of consulting when using the BCAST service, and guarantees that the user should delete the BCAST data immediately after using the BCAST service.
Only need carry out in the scene of service protection, following operation should be carried out (not necessarily will according to following order of operation):
1) user submits to (the Content Provider of content supplier with the service regeulations request (as only broadcasting once " Play Once ") of this BCAST service, CP), the CP of content supplier is transmitted to the service regeulations functional module URF that provides in the BCAST service related network device with user's service regeulations
2) user and BroadCast MultiCast Service center BM-SC authenticate mutually
3) treat that user and BroadCast MultiCast Service center BM-SC carry out mutual authentication success after, service regeulations functional module URF will generate service regeulations object URO, URF uses MBMS user key MUK to encrypt URO and also sends to user equipment (UE)
4) based on the MBMS security mechanism, user equipment (UE) will obtain the BCAST data of the encryption of process service protection (being that transport layer is encrypted) from the CP of content supplier
5) after regular monitor URM to be used uses MBMS user key MUK deciphering service regeulations object URO, and treat that the BCAST data are by MTK (MBMS Traffic Key, MBMS Traffic Key, from reusing of MBMS security mechanism) after the deciphering, the user just can be under the supervision of URM consume the BCAST data according to the service regeulations of original negotiation.In case URM also needs to guarantee the user and uses the BCAST service that the BCAST data must be deleted immediately
6) if the user has selected a new operation (being new service regeulations, the service regeulations of originally not consulting) in using the BCAST service, service regeulations monitor URM can write down the information of the new operation of this time.After after a while, service regeulations monitor URM can allow the charging center of server end that these operation bidirectional behaviors of user are correctly chargeed with should all such operation bidirectional information of this user (the promptly original service regeulations that do not have negotiation) sending to server end in the time period.For example; the user only wanted to select only to broadcast service regeulations once originally; but in use find to record/preserve; service regeulations monitor URM can write down the behavior that this time recorded; and generate content protecting ciphering key PK and send to content protecting module CPF, then content protecting module CPF data are encrypted and are recorded/preserve.After after a while, service regeulations monitor URM can allow the charging center of server that these operation bidirectional behaviors of user are correctly chargeed with should all such operation bidirectional information of this user (the promptly original service regeulations that do not have negotiation) sending to server end in the time period.
Four, use the BCAST service of content protecting
Get off to use the service regeulations of " saved for future use " in the future for similar preservation, must be to BCAST service carrying out content protecting.But MBMS safety can only provide service protection.In order to carry out content protecting, also need in user equipment (UE), increase content protecting module CPF.Service regeulations monitor URM needs monitoring user whether to violate his original service regeulations of consulting when using the BCAST service, also needs to guarantee to use contents encryption key CPK to encrypt to the BCAST data before recording or preserve the BCAST data.
Carry out in the scene of content protecting at needs, following operation should be carried out (not necessarily will according to following order of operation):
1) user submits to (the Content Provider of content supplier with the service regeulations request (as only broadcasting once " Play Once ") of this BCAST service, CP), the CP of content supplier is transmitted to the service regeulations functional module URF that provides in the BCAST service related network device with user's service regeulations
2) user and BroadCast MultiCast Service center BM-SC authenticate mutually
3) treat that user and BroadCast MultiCast Service center BM-SC carry out mutual authentication success after, service regeulations functional module URF will generate service regeulations object URO, URF uses MBMS user key MUK to encrypt URO and also sends to user equipment (UE)
4) based on the MBMS security mechanism, user equipment (UE) will obtain the BCAST data of the encryption of process service protection (being that transport layer is encrypted) from the CP of content supplier
5) after regular monitor URM to be used uses MBMS user key MUK deciphering service regeulations object URO, and treat that the BCAST data are by MTK (MBMS Traffic Key, MBMS Traffic Key, from reusing of MBMS security mechanism) after the deciphering, the user just can be under the supervision of URM consume the BCAST data according to the service regeulations of original negotiation.
6) after carrying out the BCAST service, content protecting module CPF uses contents encryption key CPK to encrypt to the BCAST data earlier, and then records or preserve the BCAST data
7) if the user has selected a new operation (being new service regeulations, the service regeulations of originally not consulting) in using the BCAST service, service regeulations monitor URM can write down the information of the new operation of this time.After after a while, service regeulations monitor URM can allow the charging center of server end that these operation bidirectional behaviors of user are correctly chargeed with should all such operation bidirectional information of this user (the promptly original service regeulations that do not have negotiation) sending to server end in the time period.
Five, key management
In Fig. 1, based on the MBMS Security Architecture, only having increased a key is contents encryption key CPK, is used for the BCAST data encryption/decryption of content protecting module CPF.
For service regeulations object URO keys for encryption/decryption MUK, be the MUK that reuses in the MBMS safety.MBMS safety [3GPP TS33.246 v640] is asked for an interview in the management of relevant MUK.
Contents encryption key CPK is that content protecting module CPF is used for the encrypt/decrypt to the BCAST data.In order to generate CPK, service regeulations monitor URM need get key material (seeing the functional character of URO) from smart card or mobile device ME, generate CPK then.Yet the identity information relevant (as IMPI) of key material and individual subscriber is so each user has CPK separately when encrypting storing BCAST data.
The cryptographic algorithm of content protecting can adopt AES-CBC pattern (Advanced Encryption Standard, superencipherment algorithm specification) [FIPS197], and key length is 128.
Above embodiment is only for the usefulness that the present invention is described, but not limiting the scope of the invention.Relevant those skilled in the art under the situation that does not break away from the spirit and scope of the present invention, can also make various conversion or modification, and the technical scheme that all are equal to also should belong within the category of the present invention's protection, is limited by each claim.

Claims (8)

1. a subscriber equipment provides BCAST the service protection and the content protecting device of service, comprising:
Be used for coming from the device of the MBMS user key deciphering service regeulations object that the MBMS security mechanism reuses, wherein said service regeulations to as if the result that consults at the use of application of user and the network equipment;
Be used for using BCAST service process monitoring user whether to violate the device of the service regeulations of former negotiation the user;
Need violate the service regeulations of original negotiation and adopt new service regeulations if be used for the user, then write down the device that these new service regeulations also send to new service regeulations operation information the network equipment that the BCAST service is provided;
Be used to monitor the device that whether needs to preserve the BCAST data; And
Be used for preserving if desired the BCAST data, then produce the content protecting key and in the content protecting module, use the content protecting key data of required preservation to be encrypted the device of preserving again earlier by key material in the service regeulations object.
2. device according to claim 1 is characterized in that also comprising: be used for monitoring when not needing to preserve the BCAST data, then the device of deleted data immediately after the intact BCAST service of customer consumption.
3. a network equipment provides BCAST the service protection and the content protecting device of service, comprising:
Be used to produce the device of service regeulations object, wherein said service regeulations are to liking the result that the user and the network equipment are consulted at the use of using;
Be used to use and come from the device that MBMS user key that the MBMS security mechanism reuses is encrypted the service regeulations object; And
Be used for the service regeulations object is sent to the device of subscriber equipment.
4. device according to claim 3 is characterized in that: described service regeulations object comprises: service regeulations, content protecting rule, be used to produce/derive the key material of content protecting key and the storage body of some characterization information.
5. a subscriber equipment provides BCAST the service protection and the content protecting method of service, comprises the following steps:
With coming from the MBMS user key deciphering service regeulations object that the MBMS security mechanism is reused, wherein said service regeulations are to liking the result that the user and the network equipment are consulted at the use of using;
Use in the BCAST service process the user, whether monitoring user violates the service regeulations of former negotiation;
If the user need violate the service regeulations of former negotiation and adopt new service regeulations, then write down these new service regeulations and also new service regeulations operation information is sent in the network equipment that the BCAST service is provided;
Whether monitor needs to preserve the BCAST data;
Preserve the BCAST data if desired, then produce the content protecting key, and in the content protecting module, use the content protecting key that the data of required preservation are encrypted earlier again and preserve by key material in the service regeulations object.
6. method according to claim 5 is characterized in that: monitoring when not needing to preserve the BCAST data, then deleted data immediately after the intact BCAST service of customer consumption.
7. a network equipment provides the related service of BCAST service to protect and content protecting method, comprises the following steps:
Produce the service regeulations object, wherein said service regeulations are to liking the result that the user and the network equipment are consulted at the use of using;
Use comes from the MBMS user key encryption service regeulations object that the MBMS security mechanism is reused; And
The service regeulations object is sent to subscriber equipment.
8. method according to claim 7 is characterized in that: described service regeulations object comprises: service regeulations, content protecting rule, be used to produce/derive the key material of content protecting key and the storage body of some characterization information.
CN2005101103203A 2005-11-11 2005-11-11 MBMS safety mechanism based service protection and content protection system for BCAST service Active CN1964524B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2005101103203A CN1964524B (en) 2005-11-11 2005-11-11 MBMS safety mechanism based service protection and content protection system for BCAST service

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2005101103203A CN1964524B (en) 2005-11-11 2005-11-11 MBMS safety mechanism based service protection and content protection system for BCAST service

Publications (2)

Publication Number Publication Date
CN1964524A CN1964524A (en) 2007-05-16
CN1964524B true CN1964524B (en) 2011-04-06

Family

ID=38083358

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2005101103203A Active CN1964524B (en) 2005-11-11 2005-11-11 MBMS safety mechanism based service protection and content protection system for BCAST service

Country Status (1)

Country Link
CN (1) CN1964524B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1464676A (en) * 2002-06-12 2003-12-31 华为技术有限公司 Method for implementing secret communication and encryption apparatus thereof
WO2004075584A1 (en) * 2003-02-20 2004-09-02 Siemens Aktiengesellschaft Method for creating and distributing cryptographic keys in a mobile radio system, and corresponding mobile radio system
CN1581744A (en) * 2003-07-31 2005-02-16 北京三星通信技术研究有限公司 Method for providing multiple QOS for MBMS business

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1464676A (en) * 2002-06-12 2003-12-31 华为技术有限公司 Method for implementing secret communication and encryption apparatus thereof
WO2004075584A1 (en) * 2003-02-20 2004-09-02 Siemens Aktiengesellschaft Method for creating and distributing cryptographic keys in a mobile radio system, and corresponding mobile radio system
CN1581744A (en) * 2003-07-31 2005-02-16 北京三星通信技术研究有限公司 Method for providing multiple QOS for MBMS business

Also Published As

Publication number Publication date
CN1964524A (en) 2007-05-16

Similar Documents

Publication Publication Date Title
US8619993B2 (en) Content protection for OMA broadcast smartcard profiles
CN1933393B (en) Inter-entity coupling method, apparatus and system for content protection
CN101094065B (en) Method and system for distributing cipher key in wireless communication network
CN103338437B (en) The encryption method of a kind of mobile instant message and system
CN102196422B (en) Method for preventing leakage of lost file of handheld communication terminal
US20060291660A1 (en) SIM UICC based broadcast protection
EP1979850B1 (en) Method and apparatus for content protection in wireless communications
CN100403814C (en) Packet broadcasting service key controlling method
CN101141680A (en) Short message encrypting transmission and reception method
CN101711028B (en) Method for automatically protecting user data on mobile terminal
CN103198261A (en) Method and system for protecting file content security
CN100589377C (en) Multimedia business protection and key management method based on portable terminal
CN101883102A (en) Link generation method
CN101562520B (en) Method and system for distributing service secret keys
CN100547955C (en) A kind of method of protecting mobile multimedia service, system and equipment
CN101656583B (en) Key management system and key management method
CN101572694B (en) Method for acquiring media stream key, session equipment and key management function entity
CN107566119A (en) A kind of guard method of eSIM cards data safety and system
CN101145932A (en) A realization method and system for program stream secret key in mobile multi-media broadcast service
JP2002247022A (en) Method for delivering information, method for utilizing information, their execution device and processing program, and recording medium
CN103634313B (en) Address list processing method and device, as well as mobile terminal
CN1964524B (en) MBMS safety mechanism based service protection and content protection system for BCAST service
CN101087188B (en) MBS authentication secret key management method and system in wireless network
CN101162997B (en) Method of updating broadcast sharing cipher between electronic equipment interfaces
CN112054905A (en) Secure communication method and system of mobile terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C56 Change in the name or address of the patentee

Owner name: SHANGHAI ALCATEL-LUCENT CO., LTD.

Free format text: FORMER NAME: BEIER AERKATE CO., LTD., SHANGHAI

CP01 Change in the name or title of a patent holder

Address after: 201206 Pudong New Area Jinqiao Export Processing Zone, Nanjing Road, No. 388, Shanghai

Patentee after: Shanghai Alcatel-Lucent Co., Ltd.

Address before: 201206 Pudong New Area Jinqiao Export Processing Zone, Nanjing Road, No. 388, Shanghai

Patentee before: Beier Aerkate Co., Ltd., Shanghai

CP01 Change in the name or title of a patent holder

Address after: 201206 Pudong New Area Jinqiao Export Processing Zone, Nanjing Road, No. 388, Shanghai

Patentee after: Shanghai NOKIA Baer Limited by Share Ltd

Address before: 201206 Pudong New Area Jinqiao Export Processing Zone, Nanjing Road, No. 388, Shanghai

Patentee before: Shanghai Alcatel-Lucent Co., Ltd.

CP01 Change in the name or title of a patent holder