EP1842364A1 - Dispositif d'execution de contenus equipe de moyens d'authentification independants et procede de redistribution de contenus - Google Patents
Dispositif d'execution de contenus equipe de moyens d'authentification independants et procede de redistribution de contenusInfo
- Publication number
- EP1842364A1 EP1842364A1 EP06715761A EP06715761A EP1842364A1 EP 1842364 A1 EP1842364 A1 EP 1842364A1 EP 06715761 A EP06715761 A EP 06715761A EP 06715761 A EP06715761 A EP 06715761A EP 1842364 A1 EP1842364 A1 EP 1842364A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- content
- tool
- server
- target device
- smart card
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/16—Analogue secrecy systems; Analogue subscription systems
- H04N7/162—Authorising the user terminal, e.g. by paying; Registering the use of a subscription channel, e.g. billing
- H04N7/163—Authorising the user terminal, e.g. by paying; Registering the use of a subscription channel, e.g. billing by receiver means only
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/25—Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
- H04N21/254—Management at additional data server, e.g. shopping server, rights management server
- H04N21/2541—Rights Management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/25—Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
- H04N21/258—Client or end-user data management, e.g. managing client capabilities, user preferences or demographics, processing of multiple end-users preferences to derive collaborative data
- H04N21/25808—Management of client data
- H04N21/25816—Management of client data involving client authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/80—Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
- H04N21/81—Monomedia components thereof
- H04N21/8166—Monomedia components thereof involving executable data, e.g. software
- H04N21/8193—Monomedia components thereof involving executable data, e.g. software dedicated tools, e.g. video decoder software or IPMP tool
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/80—Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
- H04N21/83—Generation or processing of protective or descriptive data associated with content; Content structuring
- H04N21/835—Generation of protective data, e.g. certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/80—Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
- H04N21/83—Generation or processing of protective or descriptive data associated with content; Content structuring
- H04N21/835—Generation of protective data, e.g. certificates
- H04N21/8355—Generation of protective data, e.g. certificates involving usage data, e.g. number of copies or viewings allowed
Definitions
- the present invention relates to a content providing service method
- DRM digital rights management
- a conventional conditional access system (CAS)
- each of broadcasting station In a conventional broadcasting system, each of broadcasting station
- servers (broadcasters) uses its own specific protection mechanism for a
- STB set-top-box
- the present invention is directed to strengthening of security and/or
- the present invention is also directed to a content execution device for
- the present invention is directed to a method of efficiently
- the present invention is directed to a method of
- the present invention is directed to a method of
- One aspect of the present invention provides a content execution
- an independent authentication unit for storing a tool
- Another aspect of the present invention provides a content
- method including the steps of: in the user device, requesting a broadcasting
- Yet another aspect of the present invention provides a content
- Yet another aspect of the present invention provides a method for re ⁇
- target device the method including the steps of:
- station server to the target device; in the target device, connecting to the
- Yet another aspect of the present invention provides a method for re ⁇
- method including the steps of: checking whether or not re-distribution of the
- Yet another aspect of the present invention provides a method for re ⁇
- the method including the steps of: checking whether or not re ⁇
- Yet another aspect of the present invention provides a method for re ⁇
- the method including the steps of: receiving the content, use tool
- Yet another aspect of the present invention provides a method for
- the method including the steps of:
- the source device is permitted; requesting a tool server for transmission of a
- portable tool (hereinafter, referred to as “portable tool”)
- Yet another aspect of the present invention provides a method for
- conversional re-distributing content from a source device to an external target device including the steps of: checking whether or not
- invention employs the smart card for user authentication and/or content
- broadcasting non-subscribers also can execute broadcast content within a
- content protected by a copyright protection device can be executed in different multimedia devices such as a PDA, as well as a content
- FIG. 1 illustrates a structure of a content broadcasting system capable
- FIG. 2 is a block diagram illustrating a structure of a content execution
- FIG. 3 is a block diagram illustrating a structure of a tool pack, which
- FIG. 4 is a block diagram illustrating a content providing service
- FIG. 5 is a block diagram illustrating a content service providing
- FIG. 6 is a block diagram illustrating a content service providing
- FIG. 7 is a block diagram illustrating a content re-distribution method
- FIG. 8 is a block diagram illustrating a content re-distribution method
- FIG. 9 is a block diagram illustrating a content re-distribution method
- Content execution device 110 Authentication support module
- Tool agent 130 Content execution unit
- Tool storage unit 220 Authentication module
- Authority storage unit 300 Broadcasting station server
- the present invention can be used together with various types of digital content
- a producer server of a content provider includes a producer server of a content provider; a transmission server 300-1
- a clearing house 300-2 for authenticating the respective subscribers and/or content
- a tool server 400 for managing tools for
- the producer server which is a server for authoring information for
- the producer server registers content to be broadcasted with the
- clearing house 300-2 receives information (e.g. a content ID, a clearing
- the producer server determines a tool to be applied to the content
- tool information (a tool ID and a tool descriptor).
- the producer server can
- CP can be operated as CP or SP.
- the transmission server 300-1 serves to receive the protection stream
- domain controller content execution device 100 of the service subscriber.
- the protection stream can be converted to have
- the protection stream can be also converted by the tool registered with the tool
- the tool server 400 for managing tools applied to the broadcast
- the tool server 400 can include a server for registering the
- the tool server 400 is for downloading the tools stored in a smart card of
- the clearing house 300-2 a kind of a server system, takes charge of a
- the clearing house 300-2 may be
- integrally providing digital broadcasting may be an authentication system
- the producer server the clearing house 300-2, the transmission server
- the tool server 400 belong to a broadcasting server domain that is a
- broadcasting sever 300 are collectively called a broadcasting sever.
- domain system having a plurality of content execution devices and/or a
- 300-2 can have device and/or user information included on a home domain-
- an authentication execution module can perform a
- the content execution device of this embodiment can be any one of the domain-by-home domain basis.
- the content execution device of this embodiment can be any one of the domain-by-home domain basis.
- the home domain refers to one home domain controller
- One home domain controller defines one home domain, and each
- home domain includes a plurality of users and devices. It can be embodied
- controller combines one multimedia player by itself, and can also be embodied
- domain controller performs an important role in defining each home domain
- the content execution device of FIG. 2 is an exemplary embodiment
- an independent authentication module is embodied as the smart card
- an authentication support module 110 for providing a user authentication channel between the connected smart card 200 and the external
- the connected smart card 200 and a content execution unit 130 for executing
- the authentication smart card 200 connected to the content execution
- device 100 of this embodiment is comprised of a smart chip having an
- CPU embedded central processing unit
- EEPROM storage memory
- authentication smart card 200 includes a tool storage unit 210 for storing tools
- an authority storage unit 230 for storing
- authentication module 220 for performing mutual authentication for the
- the smart card 200 can also be embodied as an RF card employing an
- the authentication support module 110 can include a contact type
- the content execution unit 130 and the tool agent 120 can be any type of smart card.
- the content execution unit 130 and the tool agent 120 can be any type of smart card.
- arithmetic memory such as a RAM for loading the program.
- execution unit 130 has a similar structure and operation as a general
- execution unit 130 can call the tool agent 120.
- the tool agent 120 serves to
- the content execution device 100 of this embodiment can further control
- broadcasting station server 300 using a remote communication channel such as
- the tool storage unit 210 and the authority storage unit 230 can be
- the authentication module 220 can be embodied by a CPU core embedded in
- the smart card one chip inside the smart card and a corresponding program.
- serial communication interface capable of performing
- the tool storage unit 210 is for storing
- the authority storage unit 230 stores identification information of
- information e.g. key information, and certificate
- broadcasting station and having an issued smart card can execute broadcast
- authentication module 220 can hold a security key (a symmetric key method
- Mutual authentication refers to a
- smart card authentication method including authentication of the broadcasting
- Mutual authentication is a technology widely used in the
- tool agent 120 is more useful in an embodiment
- tool pack structure is a software and data package
- tool pack ; a tool agent that is original data before being loaded as the tool agent of FIG. 2; and tool group possessing at least one tool program activated
- type of content data providing service such as public broadcasting or Internet
- tool pack structure may further include a tool pack signature value for
- the tool pack information can include a tool server URL indicating a position
- the content data is
- the tool program is for a separate encoding/decoding process. While
- the activated tool agent can call
- the tool agent is called by the external device or the application program
- tool pack data storage efficiency can be improved, though
- broadcasters transmit their tool information and tool initialization information together with content.
- the broadcasters "A” and “B” transmit their protection
- the tool server of a tool registration authority (TRA).
- TRA tool registration authority
- a user registers, manages, and transmits a new tool to an end user (device).
- the user "C” desires to subscribe to a new paid channel service from
- the structure shown is embodied using the key information as a
- the key information is used for generating
- the smart card 200 a descrambling key in the smart card 200.
- the smart card 200 the
- structure may be more complex, and may use a certificate having a format
- the smart card having the embedded subscription certificate to any device (e.g.
- broadcaster "B" includes steps of, in the user device 100 connected with the
- the broadcasting station server 300 requested to transmit the broadcast
- the content by the user device 100 transmits the tool information including a tool version to the user device 100 together with the content.
- the tool information may further include a seed number for
- the user device 100 receiving the content data confirms whether or not there
- the content is executed (played) using the suitable tool.
- a user "C” receives the paid channel service from the
- a content execution device including smart card
- the tool information including a tool version
- the user device connects to a broadcasting station server positioned at a
- the tool or the tool link can be broadcast together
- the tool transmission request procedure The tool transmission request procedure
- the tool server 400 receiving the tool transmission request performs a
- the tool transmission procedure includes
- a user "C” subscribes to the broadcasting station "A" and a
- the source device of the user "C" which applies to this scenario, includes steps of checking whether or not the content intended to be re-distributed are
- the re-distribution permission checking step (S310) is performed such
- the bibliographic information may not be encrypted.
- target device 100-2 in the external broadcasting station server 300 may be any target device 100-2 in the external broadcasting station server 300.
- inventions preferably have inherent identification values such as a media access
- the content execution device can be any type of code (MAC).
- MAC code
- the inherent identification value for example, a MAC value or
- the authenticating step of the target device 100-2 can include the steps
- the requested tool server may
- the tool can be used.
- the step of requesting content execution permission (S330) is
- target device 100-2 requests the broadcasting station server 300 of the broadcasting station holding rights to the content for
- the broadcasting server 300 decides whether or not to
- the target device 100-2 plays
- the permission may
- the scenario includes steps of checking whether or not the content intended to
- the step of checking re-distribution permission (S410) can be
- the bibliographic information is preferably encrypted.
- the bibliographic information may not be encrypted.
- the step of receiving authentication of the target device (S420) is a first step of receiving authentication of the target device (S420)
- broadcasting system of the present invention preferably have inherent
- identification values such as a media access code (MAC).
- MAC media access code
- the content execution device can be identified using the inherent identification
- MAC value for example, a MAC value or an identification number allotted with
- the step of receiving authentication of the target device (S420) can be any one of the target device (S420).
- the authenticating step (S424) the
- identification value of the target device may be searched for within the DB to
- connection with the broadcasting server may be made to directly
- target device 100-2 is information on the tool used for playing the
- the target device 100-2 may
- the source device 100-1 The source device 100-1.
- the target device 100-2 plays the
- the target device 100-2 may play the re-distributed content
- broadcasting station registers a tool for playing the portable-device with the
- the portable device generally has low performance in playing the
- the content requires conversion to a suitable
- a user "C” stores the broadcast
- the device of the user "C”, applied to this scenario, includes steps of: checking
- broadcasting station server 300 for permission to perform altered
- the bibliographic information is preferably
- any one of the service domains e.g. a home domain.
- a list of devices including portable devices
- the smart card and serving primarily to receive content from the broadcasting
- the step of downloading the portable tool (S520) is performed in the
- target device 100-3 is mostly used in an offline state.
- the source device 100-1 In the content transmission step (S540), the source device 100-1
- a wired/wireless communication means (generally,
- the target device 100-3 may receive only the
- the target device 100-3 executes the
- the initially provided content in the source is the initially provided content in the source
- device 100-1 may be converted into portable content in the broadcasting
- the content is converted in the source device 100-1, less communication is required. In this case, the content
Landscapes
- Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Databases & Information Systems (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Graphics (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
Abstract
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP10178156A EP2309731A1 (fr) | 2005-01-26 | 2006-01-26 | Dispositif d'exécution de contenus equipé de moyens d'authentification indépendants et procédés de redistribution de contenu |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR20050007143 | 2005-01-26 | ||
KR1020060007634A KR100784688B1 (ko) | 2005-01-26 | 2006-01-25 | 독립 인증 수단을 가지는 콘텐츠 실행 디바이스 콘텐츠 실행 방법 및 콘텐츠 재배포 방법 |
PCT/KR2006/000308 WO2006080814A1 (fr) | 2005-01-26 | 2006-01-26 | Dispositif d'execution de contenus equipe de moyens d'authentification independants et procede de redistribution de contenus |
Publications (2)
Publication Number | Publication Date |
---|---|
EP1842364A1 true EP1842364A1 (fr) | 2007-10-10 |
EP1842364A4 EP1842364A4 (fr) | 2010-02-03 |
Family
ID=36740769
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP06715761A Withdrawn EP1842364A4 (fr) | 2005-01-26 | 2006-01-26 | Dispositif d'execution de contenus equipe de moyens d'authentification independants et procede de redistribution de contenus |
Country Status (2)
Country | Link |
---|---|
EP (1) | EP1842364A4 (fr) |
WO (1) | WO2006080814A1 (fr) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6055314A (en) * | 1996-03-22 | 2000-04-25 | Microsoft Corporation | System and method for secure purchase and delivery of video content programs |
EP1282315A2 (fr) * | 1997-03-21 | 2003-02-05 | Canal+ Technologies | Carte à puce utilisable avec un récepteur de signaux de radiodiffusion chiffres et récepteur |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2834406A1 (fr) * | 2001-12-28 | 2003-07-04 | Thomson Licensing Sa | Procede de mise a jour d'une liste de revocation de cles, d'appareils ou de modules non-conformes dans un systeme de diffusion securise de contenu |
KR100467929B1 (ko) * | 2002-02-28 | 2005-01-24 | 주식회사 마크애니 | 디지털 컨텐츠의 보호 및 관리를 위한 시스템 |
-
2006
- 2006-01-26 EP EP06715761A patent/EP1842364A4/fr not_active Withdrawn
- 2006-01-26 WO PCT/KR2006/000308 patent/WO2006080814A1/fr active Application Filing
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6055314A (en) * | 1996-03-22 | 2000-04-25 | Microsoft Corporation | System and method for secure purchase and delivery of video content programs |
EP1282315A2 (fr) * | 1997-03-21 | 2003-02-05 | Canal+ Technologies | Carte à puce utilisable avec un récepteur de signaux de radiodiffusion chiffres et récepteur |
Non-Patent Citations (1)
Title |
---|
See also references of WO2006080814A1 * |
Also Published As
Publication number | Publication date |
---|---|
WO2006080814A1 (fr) | 2006-08-03 |
EP1842364A4 (fr) | 2010-02-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8151342B2 (en) | Contents execution device equipped with independent authentication means and contents re-distribution method | |
US7299362B2 (en) | Apparatus of a baseline DVB-CPCM | |
JP4856168B2 (ja) | ツールパック構造及びコンテンツ実行デバイス | |
JP4854753B2 (ja) | Mpegipmpコンテンツにおける権利の分配形ipmp装置メッセージングおよび多重化の方法 | |
US20090044241A1 (en) | Broadcasting content protection/management system | |
US20040139312A1 (en) | Categorization of host security levels based on functionality implemented inside secure hardware | |
EP2925007B1 (fr) | Dispositif de traitement d'informations, et procédé de traitement d'informations | |
US20090313665A1 (en) | Digital rights management licensing over third party networks | |
KR20110004333A (ko) | 스트림에서의 레코딩가능한 콘텐트의 프로세싱 | |
US20110239287A1 (en) | Method for sharing content | |
CN102598620A (zh) | 通信系统、通信设备、通信方法和计算机程序 | |
WO2006071495A2 (fr) | Modele flexible de fixation de prix pour contenu persistant | |
KR101705010B1 (ko) | 스트림에서의 레코딩가능한 콘텐트의 프로세싱 | |
CN101123503A (zh) | 一种电子文件在通讯网络中传播时的加解密方法 | |
US20060107045A1 (en) | Method for verifying validity of domestic digital network key | |
JP4252280B2 (ja) | ベースラインdvb−cpcmの装置 | |
KR101073836B1 (ko) | 저작권보호 시스템에서의 효율적인 디지털콘텐츠 라이센스관리 및 운영방법 | |
EP1842364A1 (fr) | Dispositif d'execution de contenus equipe de moyens d'authentification independants et procede de redistribution de contenus | |
CN101630519A (zh) | Ip流式拷贝控制方法和系统 | |
CN109005427B (zh) | 加密视频播放方法、装置及设备、存储介质 | |
CN107547946B (zh) | 在互联网数据通信网络上传输流媒体数字内容的方法及介质 | |
KR20110059474A (ko) | 네트워크 기반의 개인용 녹화 서비스를 제공하기 위한 방법, 시스템 및 컴퓨터 판독 가능한 기록 매체 | |
KR20090006055A (ko) | 콘텐트 보호 방법 | |
TW200843504A (en) | System and method of digital rights management |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20070820 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU LV MC NL PL PT RO SE SI SK TR |
|
DAX | Request for extension of the european patent (deleted) | ||
A4 | Supplementary search report drawn up and despatched |
Effective date: 20100107 |
|
RIC1 | Information provided on ipc code assigned before grant |
Ipc: H04N 5/00 20060101ALI20091229BHEP Ipc: H04N 5/44 20060101AFI20060809BHEP |
|
17Q | First examination report despatched |
Effective date: 20100416 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
18D | Application deemed to be withdrawn |
Effective date: 20101027 |