EP1842364A1 - Dispositif d'execution de contenus equipe de moyens d'authentification independants et procede de redistribution de contenus - Google Patents

Dispositif d'execution de contenus equipe de moyens d'authentification independants et procede de redistribution de contenus

Info

Publication number
EP1842364A1
EP1842364A1 EP06715761A EP06715761A EP1842364A1 EP 1842364 A1 EP1842364 A1 EP 1842364A1 EP 06715761 A EP06715761 A EP 06715761A EP 06715761 A EP06715761 A EP 06715761A EP 1842364 A1 EP1842364 A1 EP 1842364A1
Authority
EP
European Patent Office
Prior art keywords
content
tool
server
target device
smart card
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP06715761A
Other languages
German (de)
English (en)
Other versions
EP1842364A4 (fr
Inventor
Beom Suk Choi
Sang Hyun Ju
Hye Ju Lee
Jin Su Choi
Jin Woo Hong
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Electronics and Telecommunications Research Institute ETRI
Original Assignee
Electronics and Telecommunications Research Institute ETRI
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from KR1020060007634A external-priority patent/KR100784688B1/ko
Application filed by Electronics and Telecommunications Research Institute ETRI filed Critical Electronics and Telecommunications Research Institute ETRI
Priority to EP10178156A priority Critical patent/EP2309731A1/fr
Publication of EP1842364A1 publication Critical patent/EP1842364A1/fr
Publication of EP1842364A4 publication Critical patent/EP1842364A4/fr
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/16Analogue secrecy systems; Analogue subscription systems
    • H04N7/162Authorising the user terminal, e.g. by paying; Registering the use of a subscription channel, e.g. billing
    • H04N7/163Authorising the user terminal, e.g. by paying; Registering the use of a subscription channel, e.g. billing by receiver means only
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/254Management at additional data server, e.g. shopping server, rights management server
    • H04N21/2541Rights Management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/258Client or end-user data management, e.g. managing client capabilities, user preferences or demographics, processing of multiple end-users preferences to derive collaborative data
    • H04N21/25808Management of client data
    • H04N21/25816Management of client data involving client authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/80Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
    • H04N21/81Monomedia components thereof
    • H04N21/8166Monomedia components thereof involving executable data, e.g. software
    • H04N21/8193Monomedia components thereof involving executable data, e.g. software dedicated tools, e.g. video decoder software or IPMP tool
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/80Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
    • H04N21/83Generation or processing of protective or descriptive data associated with content; Content structuring
    • H04N21/835Generation of protective data, e.g. certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/80Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
    • H04N21/83Generation or processing of protective or descriptive data associated with content; Content structuring
    • H04N21/835Generation of protective data, e.g. certificates
    • H04N21/8355Generation of protective data, e.g. certificates involving usage data, e.g. number of copies or viewings allowed

Definitions

  • the present invention relates to a content providing service method
  • DRM digital rights management
  • a conventional conditional access system (CAS)
  • each of broadcasting station In a conventional broadcasting system, each of broadcasting station
  • servers (broadcasters) uses its own specific protection mechanism for a
  • STB set-top-box
  • the present invention is directed to strengthening of security and/or
  • the present invention is also directed to a content execution device for
  • the present invention is directed to a method of efficiently
  • the present invention is directed to a method of
  • the present invention is directed to a method of
  • One aspect of the present invention provides a content execution
  • an independent authentication unit for storing a tool
  • Another aspect of the present invention provides a content
  • method including the steps of: in the user device, requesting a broadcasting
  • Yet another aspect of the present invention provides a content
  • Yet another aspect of the present invention provides a method for re ⁇
  • target device the method including the steps of:
  • station server to the target device; in the target device, connecting to the
  • Yet another aspect of the present invention provides a method for re ⁇
  • method including the steps of: checking whether or not re-distribution of the
  • Yet another aspect of the present invention provides a method for re ⁇
  • the method including the steps of: checking whether or not re ⁇
  • Yet another aspect of the present invention provides a method for re ⁇
  • the method including the steps of: receiving the content, use tool
  • Yet another aspect of the present invention provides a method for
  • the method including the steps of:
  • the source device is permitted; requesting a tool server for transmission of a
  • portable tool (hereinafter, referred to as “portable tool”)
  • Yet another aspect of the present invention provides a method for
  • conversional re-distributing content from a source device to an external target device including the steps of: checking whether or not
  • invention employs the smart card for user authentication and/or content
  • broadcasting non-subscribers also can execute broadcast content within a
  • content protected by a copyright protection device can be executed in different multimedia devices such as a PDA, as well as a content
  • FIG. 1 illustrates a structure of a content broadcasting system capable
  • FIG. 2 is a block diagram illustrating a structure of a content execution
  • FIG. 3 is a block diagram illustrating a structure of a tool pack, which
  • FIG. 4 is a block diagram illustrating a content providing service
  • FIG. 5 is a block diagram illustrating a content service providing
  • FIG. 6 is a block diagram illustrating a content service providing
  • FIG. 7 is a block diagram illustrating a content re-distribution method
  • FIG. 8 is a block diagram illustrating a content re-distribution method
  • FIG. 9 is a block diagram illustrating a content re-distribution method
  • Content execution device 110 Authentication support module
  • Tool agent 130 Content execution unit
  • Tool storage unit 220 Authentication module
  • Authority storage unit 300 Broadcasting station server
  • the present invention can be used together with various types of digital content
  • a producer server of a content provider includes a producer server of a content provider; a transmission server 300-1
  • a clearing house 300-2 for authenticating the respective subscribers and/or content
  • a tool server 400 for managing tools for
  • the producer server which is a server for authoring information for
  • the producer server registers content to be broadcasted with the
  • clearing house 300-2 receives information (e.g. a content ID, a clearing
  • the producer server determines a tool to be applied to the content
  • tool information (a tool ID and a tool descriptor).
  • the producer server can
  • CP can be operated as CP or SP.
  • the transmission server 300-1 serves to receive the protection stream
  • domain controller content execution device 100 of the service subscriber.
  • the protection stream can be converted to have
  • the protection stream can be also converted by the tool registered with the tool
  • the tool server 400 for managing tools applied to the broadcast
  • the tool server 400 can include a server for registering the
  • the tool server 400 is for downloading the tools stored in a smart card of
  • the clearing house 300-2 a kind of a server system, takes charge of a
  • the clearing house 300-2 may be
  • integrally providing digital broadcasting may be an authentication system
  • the producer server the clearing house 300-2, the transmission server
  • the tool server 400 belong to a broadcasting server domain that is a
  • broadcasting sever 300 are collectively called a broadcasting sever.
  • domain system having a plurality of content execution devices and/or a
  • 300-2 can have device and/or user information included on a home domain-
  • an authentication execution module can perform a
  • the content execution device of this embodiment can be any one of the domain-by-home domain basis.
  • the content execution device of this embodiment can be any one of the domain-by-home domain basis.
  • the home domain refers to one home domain controller
  • One home domain controller defines one home domain, and each
  • home domain includes a plurality of users and devices. It can be embodied
  • controller combines one multimedia player by itself, and can also be embodied
  • domain controller performs an important role in defining each home domain
  • the content execution device of FIG. 2 is an exemplary embodiment
  • an independent authentication module is embodied as the smart card
  • an authentication support module 110 for providing a user authentication channel between the connected smart card 200 and the external
  • the connected smart card 200 and a content execution unit 130 for executing
  • the authentication smart card 200 connected to the content execution
  • device 100 of this embodiment is comprised of a smart chip having an
  • CPU embedded central processing unit
  • EEPROM storage memory
  • authentication smart card 200 includes a tool storage unit 210 for storing tools
  • an authority storage unit 230 for storing
  • authentication module 220 for performing mutual authentication for the
  • the smart card 200 can also be embodied as an RF card employing an
  • the authentication support module 110 can include a contact type
  • the content execution unit 130 and the tool agent 120 can be any type of smart card.
  • the content execution unit 130 and the tool agent 120 can be any type of smart card.
  • arithmetic memory such as a RAM for loading the program.
  • execution unit 130 has a similar structure and operation as a general
  • execution unit 130 can call the tool agent 120.
  • the tool agent 120 serves to
  • the content execution device 100 of this embodiment can further control
  • broadcasting station server 300 using a remote communication channel such as
  • the tool storage unit 210 and the authority storage unit 230 can be
  • the authentication module 220 can be embodied by a CPU core embedded in
  • the smart card one chip inside the smart card and a corresponding program.
  • serial communication interface capable of performing
  • the tool storage unit 210 is for storing
  • the authority storage unit 230 stores identification information of
  • information e.g. key information, and certificate
  • broadcasting station and having an issued smart card can execute broadcast
  • authentication module 220 can hold a security key (a symmetric key method
  • Mutual authentication refers to a
  • smart card authentication method including authentication of the broadcasting
  • Mutual authentication is a technology widely used in the
  • tool agent 120 is more useful in an embodiment
  • tool pack structure is a software and data package
  • tool pack ; a tool agent that is original data before being loaded as the tool agent of FIG. 2; and tool group possessing at least one tool program activated
  • type of content data providing service such as public broadcasting or Internet
  • tool pack structure may further include a tool pack signature value for
  • the tool pack information can include a tool server URL indicating a position
  • the content data is
  • the tool program is for a separate encoding/decoding process. While
  • the activated tool agent can call
  • the tool agent is called by the external device or the application program
  • tool pack data storage efficiency can be improved, though
  • broadcasters transmit their tool information and tool initialization information together with content.
  • the broadcasters "A” and “B” transmit their protection
  • the tool server of a tool registration authority (TRA).
  • TRA tool registration authority
  • a user registers, manages, and transmits a new tool to an end user (device).
  • the user "C” desires to subscribe to a new paid channel service from
  • the structure shown is embodied using the key information as a
  • the key information is used for generating
  • the smart card 200 a descrambling key in the smart card 200.
  • the smart card 200 the
  • structure may be more complex, and may use a certificate having a format
  • the smart card having the embedded subscription certificate to any device (e.g.
  • broadcaster "B" includes steps of, in the user device 100 connected with the
  • the broadcasting station server 300 requested to transmit the broadcast
  • the content by the user device 100 transmits the tool information including a tool version to the user device 100 together with the content.
  • the tool information may further include a seed number for
  • the user device 100 receiving the content data confirms whether or not there
  • the content is executed (played) using the suitable tool.
  • a user "C” receives the paid channel service from the
  • a content execution device including smart card
  • the tool information including a tool version
  • the user device connects to a broadcasting station server positioned at a
  • the tool or the tool link can be broadcast together
  • the tool transmission request procedure The tool transmission request procedure
  • the tool server 400 receiving the tool transmission request performs a
  • the tool transmission procedure includes
  • a user "C” subscribes to the broadcasting station "A" and a
  • the source device of the user "C" which applies to this scenario, includes steps of checking whether or not the content intended to be re-distributed are
  • the re-distribution permission checking step (S310) is performed such
  • the bibliographic information may not be encrypted.
  • target device 100-2 in the external broadcasting station server 300 may be any target device 100-2 in the external broadcasting station server 300.
  • inventions preferably have inherent identification values such as a media access
  • the content execution device can be any type of code (MAC).
  • MAC code
  • the inherent identification value for example, a MAC value or
  • the authenticating step of the target device 100-2 can include the steps
  • the requested tool server may
  • the tool can be used.
  • the step of requesting content execution permission (S330) is
  • target device 100-2 requests the broadcasting station server 300 of the broadcasting station holding rights to the content for
  • the broadcasting server 300 decides whether or not to
  • the target device 100-2 plays
  • the permission may
  • the scenario includes steps of checking whether or not the content intended to
  • the step of checking re-distribution permission (S410) can be
  • the bibliographic information is preferably encrypted.
  • the bibliographic information may not be encrypted.
  • the step of receiving authentication of the target device (S420) is a first step of receiving authentication of the target device (S420)
  • broadcasting system of the present invention preferably have inherent
  • identification values such as a media access code (MAC).
  • MAC media access code
  • the content execution device can be identified using the inherent identification
  • MAC value for example, a MAC value or an identification number allotted with
  • the step of receiving authentication of the target device (S420) can be any one of the target device (S420).
  • the authenticating step (S424) the
  • identification value of the target device may be searched for within the DB to
  • connection with the broadcasting server may be made to directly
  • target device 100-2 is information on the tool used for playing the
  • the target device 100-2 may
  • the source device 100-1 The source device 100-1.
  • the target device 100-2 plays the
  • the target device 100-2 may play the re-distributed content
  • broadcasting station registers a tool for playing the portable-device with the
  • the portable device generally has low performance in playing the
  • the content requires conversion to a suitable
  • a user "C” stores the broadcast
  • the device of the user "C”, applied to this scenario, includes steps of: checking
  • broadcasting station server 300 for permission to perform altered
  • the bibliographic information is preferably
  • any one of the service domains e.g. a home domain.
  • a list of devices including portable devices
  • the smart card and serving primarily to receive content from the broadcasting
  • the step of downloading the portable tool (S520) is performed in the
  • target device 100-3 is mostly used in an offline state.
  • the source device 100-1 In the content transmission step (S540), the source device 100-1
  • a wired/wireless communication means (generally,
  • the target device 100-3 may receive only the
  • the target device 100-3 executes the
  • the initially provided content in the source is the initially provided content in the source
  • device 100-1 may be converted into portable content in the broadcasting
  • the content is converted in the source device 100-1, less communication is required. In this case, the content

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Databases & Information Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Graphics (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

L'invention concerne en particulier un procédé de service de fourniture de contenus numériques et un dispositif d'exécution de contenus associé, permettant de maximiser la commodité pour l'utilisateur et de maintenir un niveau suffisant de sécurité au moyen d'une carte à puce. Le dispositif d'exécution de contenus selon l'invention comprend une unité d'authentification indépendante servant à stocker un outil nécessaire à l'exécution du contenu ; un module de support d'authentification servant à établir une voie de communication de données entre la carte à puce et un serveur de diffusion externe ; un agent d'outil servant à appeler l'outil stocké dans l'unité d'authentification indépendante ; et une unité d'exécution de contenu servant à exécuter les données de contenu reçues en provenance du serveur de diffusion externe. Ce dispositif d'exécution de contenus, faisant partie d'un système de gestion d'autorisation de contenus selon l'invention, utilise une carte à puce pour l'authentification de l'utilisateur et/ou la gestion de l'outil de lecture de contenus. Ainsi, un utilisateur peut librement exécuter son contenu autorisé dans différents dispositifs d'exécution de contenus tout simplement en retirant et insérant de nouveau la carte à puce, sans faire appel à des mesures séparées. En outre, selon l'invention, un utilisateur peut efficacement utiliser des contenus provenant de différents diffuseurs.
EP06715761A 2005-01-26 2006-01-26 Dispositif d'execution de contenus equipe de moyens d'authentification independants et procede de redistribution de contenus Withdrawn EP1842364A4 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
EP10178156A EP2309731A1 (fr) 2005-01-26 2006-01-26 Dispositif d'exécution de contenus equipé de moyens d'authentification indépendants et procédés de redistribution de contenu

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
KR20050007143 2005-01-26
KR1020060007634A KR100784688B1 (ko) 2005-01-26 2006-01-25 독립 인증 수단을 가지는 콘텐츠 실행 디바이스 콘텐츠 실행 방법 및 콘텐츠 재배포 방법
PCT/KR2006/000308 WO2006080814A1 (fr) 2005-01-26 2006-01-26 Dispositif d'execution de contenus equipe de moyens d'authentification independants et procede de redistribution de contenus

Publications (2)

Publication Number Publication Date
EP1842364A1 true EP1842364A1 (fr) 2007-10-10
EP1842364A4 EP1842364A4 (fr) 2010-02-03

Family

ID=36740769

Family Applications (1)

Application Number Title Priority Date Filing Date
EP06715761A Withdrawn EP1842364A4 (fr) 2005-01-26 2006-01-26 Dispositif d'execution de contenus equipe de moyens d'authentification independants et procede de redistribution de contenus

Country Status (2)

Country Link
EP (1) EP1842364A4 (fr)
WO (1) WO2006080814A1 (fr)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6055314A (en) * 1996-03-22 2000-04-25 Microsoft Corporation System and method for secure purchase and delivery of video content programs
EP1282315A2 (fr) * 1997-03-21 2003-02-05 Canal+ Technologies Carte à puce utilisable avec un récepteur de signaux de radiodiffusion chiffres et récepteur

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2834406A1 (fr) * 2001-12-28 2003-07-04 Thomson Licensing Sa Procede de mise a jour d'une liste de revocation de cles, d'appareils ou de modules non-conformes dans un systeme de diffusion securise de contenu
KR100467929B1 (ko) * 2002-02-28 2005-01-24 주식회사 마크애니 디지털 컨텐츠의 보호 및 관리를 위한 시스템

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6055314A (en) * 1996-03-22 2000-04-25 Microsoft Corporation System and method for secure purchase and delivery of video content programs
EP1282315A2 (fr) * 1997-03-21 2003-02-05 Canal+ Technologies Carte à puce utilisable avec un récepteur de signaux de radiodiffusion chiffres et récepteur

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of WO2006080814A1 *

Also Published As

Publication number Publication date
WO2006080814A1 (fr) 2006-08-03
EP1842364A4 (fr) 2010-02-03

Similar Documents

Publication Publication Date Title
US8151342B2 (en) Contents execution device equipped with independent authentication means and contents re-distribution method
US7299362B2 (en) Apparatus of a baseline DVB-CPCM
JP4856168B2 (ja) ツールパック構造及びコンテンツ実行デバイス
JP4854753B2 (ja) Mpegipmpコンテンツにおける権利の分配形ipmp装置メッセージングおよび多重化の方法
US20090044241A1 (en) Broadcasting content protection/management system
US20040139312A1 (en) Categorization of host security levels based on functionality implemented inside secure hardware
EP2925007B1 (fr) Dispositif de traitement d'informations, et procédé de traitement d'informations
US20090313665A1 (en) Digital rights management licensing over third party networks
KR20110004333A (ko) 스트림에서의 레코딩가능한 콘텐트의 프로세싱
US20110239287A1 (en) Method for sharing content
CN102598620A (zh) 通信系统、通信设备、通信方法和计算机程序
WO2006071495A2 (fr) Modele flexible de fixation de prix pour contenu persistant
KR101705010B1 (ko) 스트림에서의 레코딩가능한 콘텐트의 프로세싱
CN101123503A (zh) 一种电子文件在通讯网络中传播时的加解密方法
US20060107045A1 (en) Method for verifying validity of domestic digital network key
JP4252280B2 (ja) ベースラインdvb−cpcmの装置
KR101073836B1 (ko) 저작권보호 시스템에서의 효율적인 디지털콘텐츠 라이센스관리 및 운영방법
EP1842364A1 (fr) Dispositif d'execution de contenus equipe de moyens d'authentification independants et procede de redistribution de contenus
CN101630519A (zh) Ip流式拷贝控制方法和系统
CN109005427B (zh) 加密视频播放方法、装置及设备、存储介质
CN107547946B (zh) 在互联网数据通信网络上传输流媒体数字内容的方法及介质
KR20110059474A (ko) 네트워크 기반의 개인용 녹화 서비스를 제공하기 위한 방법, 시스템 및 컴퓨터 판독 가능한 기록 매체
KR20090006055A (ko) 콘텐트 보호 방법
TW200843504A (en) System and method of digital rights management

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20070820

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU LV MC NL PL PT RO SE SI SK TR

DAX Request for extension of the european patent (deleted)
A4 Supplementary search report drawn up and despatched

Effective date: 20100107

RIC1 Information provided on ipc code assigned before grant

Ipc: H04N 5/00 20060101ALI20091229BHEP

Ipc: H04N 5/44 20060101AFI20060809BHEP

17Q First examination report despatched

Effective date: 20100416

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20101027