GB2387505A - Method of securely coupling communications devices - Google Patents

Method of securely coupling communications devices Download PDF

Info

Publication number
GB2387505A
GB2387505A GB0208453A GB0208453A GB2387505A GB 2387505 A GB2387505 A GB 2387505A GB 0208453 A GB0208453 A GB 0208453A GB 0208453 A GB0208453 A GB 0208453A GB 2387505 A GB2387505 A GB 2387505A
Authority
GB
United Kingdom
Prior art keywords
sim
mobile terminal
data
key
communication apparatus
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
GB0208453A
Other versions
GB2387505B (en
GB0208453D0 (en
Inventor
Nicholas Bone
Timothy James Wright
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vodafone Group PLC
Original Assignee
Vodafone Group PLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vodafone Group PLC filed Critical Vodafone Group PLC
Priority to GB0208453A priority Critical patent/GB2387505B/en
Publication of GB0208453D0 publication Critical patent/GB0208453D0/en
Priority to CNB038082101A priority patent/CN1303538C/en
Priority to PCT/GB2003/001594 priority patent/WO2003088054A1/en
Priority to EP03720701.6A priority patent/EP1495409B1/en
Priority to AU2003224277A priority patent/AU2003224277A1/en
Publication of GB2387505A publication Critical patent/GB2387505A/en
Application granted granted Critical
Publication of GB2387505B publication Critical patent/GB2387505B/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/101Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities
    • G06F21/1011Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities to devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • G06F21/335User authentication using certificates for accessing specific resources, e.g. using Kerberos tickets
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2153Using hardware token as a secondary aspect
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/101Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measures for digital rights management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements

Abstract

A mobile terminal 3 is able to download data from content provider 15. The data is encrypted. To decrypt the data, the mobile terminal 3 obtains a licence from DRM broker 17. The DRM broker 17 transmits a licence including a decryption key to the mobile terminal 3 via short message service centre 7 associated with the mobile network 1 to which the mobile terminal 3 belongs. This data is encrypted using a public key of a public-private key pair. This public key corresponds to a private key 21 stored on the SIM 19 of the mobile terminal 3. Therefore, the licence data from DRM broker 17 can only be decrypted using the SIM 19. To prevent the SIM 19 being placed in another mobile terminal to decrypt corresponding licence data without an appropriate payment to DRM broker 17, the SIM 19 is "locked" to the mobile terminal 3 either by physical manufacture or by providing the mobile terminal 3 and the SIM 19 with a "shared" secret key 27,31. All communications between the SIM 19 and the core operating system 25 within the mobile terminal 3 are encoded using the shared secret key 27,31. Therefore, if the SIM 19 is removed from mobile terminal 3 and placed in another mobile terminal, communication between the SIM 19 and the other mobile terminal will not be possible as the other mobile terminal will not have a secret key corresponding to the shared secret key 27 of the SIM 19.

Description

COMMUNICATION SYSTEMS
The present invention relates to communication apparatus such as mobile telephones and Me controlled distribution of data thereto, to communication systems including such apparatus, and to a storage module such as a smart card for use with such communication apparatus.
Digital Rights Management (DRM) is a technology allowing encrypted digital files to be readily distributed to potential users without charge. The encrypted data may be freely cowardly transmitted by the user receiving the data. However, for any user to be able to make use of the data, it must be decrypted. To obtain a key to decrypt the data, a licence must be purchased or otherwise obtained from a licence broker.
According to the present invention, there is provided communication apparatus including receiver means for receiving data over a communication network, and a storage module including decoding means for enabling decryption of encoded data received by the receiver means from the communication network, the receiver means and the storage module being inter-operable with one another but not with selected other receiver means and storage modules.
According to another aspect of the invention, there is provided communication apparatus including receiver means for receiving data over a communication network, and a storage module including decoding means for enabling the decryption of encoded data received by the receiver means from the communication network, wherein each of the receiver means and the storage module has a key associated therewith for allowing the encryption of data transmitted from either one thereof for reception by the other and for allowing decryption of the encrypted data when so received.
According to a further aspect of the invention, there is provided a storage module for use with receiver means for receiving data over a communication network, the storage module including decoding means for enabling decryption of encoded data received by the receiver means from the communication network, the storage module being inter-operable with said receiver means and but not with selected other receiver means. Communication apparatus, a communication system and a storage module according to the present invention will now be described, by way of example, with reference to the accompanying drawings, in which: Figure 1 shows schematically a telecommunications network according to a first embodiment of the invention including facilities for handling short messages and for communication with the Internet; Figure 2 shows an alternative arrangement to the first embodiment; Figure 3 shows schematically a device for receiving audio and/or video data from a communications network including a smart card or subscriber identity module (SIM); and Figure 4 shows schematically a modification of the Figure 3 arrangement where a mobile terminal is used to obtain a decryption key.
In the drawings like elements are generally designated with the same reference numerals. Figure 1 shows a network 1 of a cellular telecommunications system that has a terminal 3 associated with it. The terminal 3 may be a mobile telephone, a computer
with cellular telecommunication facilities or other device with cellular telecommunication facilities. There will be many further terminals associated with the network 1, but such further terminals are not shown, for the sake of simplicity. In this embodiment the network 1 is a GSM network. When the terminal 3 wishes to communicate with another terminal or a fixed telephone, it will signal accordingly to a base station of the network 1 where it is situated. The details of the terminal 3 are obtained from a home location register (HLR) of the network and temporarily placed in a visitor location register (VLR) appropriate to the cell and used to enable the terminal 3 to complete the connechon wit the call destination.
The procedure for transmission of "short messages" is different. The term "short messages" (SMS) as used in relation to this embodiment means short messages as defined in the GSM Standard Specification. Such messages are commonly in the boron
of text messages of limited maximum length, but they can have other forms such as in the form of binary data. However, as an alternative to such short messages, the messaging format may be that of multi-media messaging (MMS).
Short messages may be sent to and from terminal 3 and other terminals belonging to the network 1. However, in addition, such messages may be sent to or from "short message entities" (SMEs) such as shown at 5. The SMEs 5 may be in the form of terminals of various sorts, such as fixed terminals for sending short messages of various types to mobile terminals and for receiving short messages from mobile terminals. For example, the SME terminal 5 may be in the form of a terminal associated with banking computers or computers of other types generating information (commercial information, for example) for transmission to mobile terminals and for receiving short messages in response from mobile terminals, but may be of any other type, such as application servers of various types.
The network 1 has a short message service centre (SMSC) 7 associated with it. For
example, if the mobile terminal 3 wishes to send a short message to another mobile terminal associated with the network 1, the short message is automatically addressed by the mobile terminal 3 to SMSC 7. SMSC 7 then delivers the short message to the addressed mobile terminal. When the local SMSC 7 receives the short message, it reads the address (the MSISDN or mobile terminal ISDN number or telephone number of the intended destination) and despatches the short message accordingly.
The SME terminal 5 is connected to the SMSC 7 by a fixed network 9 of suitable type.
When the terminal 3 sends or receives a short message, it will do this via the SMSC 7 of its network 1.
The telecommunications network 1 is also coupled to the Internet 11 for data communication therewith.
Mobile terminal 3 may, for example, include a wireless application protocol (WAP) browser 13 or other suitable means for allowing the running of applications from the Internet 1 1.
A "content provider" 15 makes available to the user of terminal 3 via the Internet 1 1 and network 1 information that can be downloaded to the mobile terminal 3. The content provider 15 could, for example, provide ringing tone formats, games and activity applications, screen savers or imaging for multi-media messaging (MMS).
When the user of mobile terminal 3 identifies content that he wishes to obtain from the content provider 15, the mobile terminal 3 is used to send a request via the network 1 and the Internet 11 for the content from the content provider 15. The requested content is transmitted to the mobile terminal 3 via the Internet 11 and the network 1 in encrypted form such that the content is of no use to the mobile terminal 3 in the form that it is received. At this stage no charge has been made to the mobile terminal 3 for the content provided by content provider 15. If desired, the mobile
s terminal 3 may be used to onwardly transmit the encrypted content to other users in the network 1 and beyond. However, these other users will not be able to make use of the content as it is in encrypted form at this stage.
When the user of mobile terminal 3, or the user of any other terminal to which the content has been transmitted, wishes to make use of this content, they will be prompted by their terminal to purchase " rights " to make use of the content. If the user ofthe mobile terminal accepts the purchase, this is communicated in the form of an SMS or WAP call to a digital rights management (DRM) broker 17, via SMSC 7 and fixed network 9. The DRM broker 17 is a short message entity, similar to SME 5, and has an agreement with content provider 15 to provide licences for use of the content. The payment for the content could be made, for example, by deducting an appropriate amount from the account of the user of mobile terminal 3 with the network 1. When the payment has been made, licence information including a licorice and content decryption key in the form of an SMS is sent to the mobile terminal 3 by DRM broker 17 via fixed network 9 and SMSC 7. The licence might, for example, grant the user of the mobile terminal 3 unlimited use of the content, or may restrict use of the content to be for a particular time period, depending on the price paid for the content by the user.
It is preferred to send the licence and content decryption key in the form of an SMS because an SMS must pass through the network operator's SMSC 7. The SMS may itself be of encrypted text for added security. Alternatively, or additionally, the SMS may be sent directly to the subscriber identity module (SIM) 19 associated with the mobile terminal 3 in a secure manner as an over the air (OTA) update.
A potential problem of such an arrangement is that the user of mobile terminal 3 may be able to obtain the content decryption key from the information sent by the DRM broker 17 and make this available to other users of mobile terminals, allowing these
other users to avoid paying for use of the content.
In the embodiment being described and in order to overcome this problem, the SIM 19 is provided with a private key of a public-private key pair during its manufacture.
The private key is stored in register 21 on the SIM 19. Other information stored on the SIM 19 includes a subscriber identity field (IMSI) stored in register 23 comprising
data providing a unique identity of the SIM within the telecommunication system.
The private key is stored on the SIM 19 rather than the mobile terminal 3 so that the mobile terminal manufacturer does not need to create its own public-private key infrastructure (i.e. the cost of creating and certifying key-pairs). Also, the SIM 19 is a more secure storage medium for the private key than the mobile terminal.
It is important that the information stored on the SIM 19 cannot be copied. Secret information on the SIM 19 (for example, the IMSI and/or the private key or a function of one or both of them) is bound in a data binding process with other secret information, the binding of these two types of secret information being certified and digitally signed in a widely recognised way by a Certificate Authority. This "binding" operation will normally be carried out at the time when the SIM 19 is manufactured, and could be performed in the manner described in GB 0018279.0 ("Binding Data").
When it is desired to communicate with the mobile terminal 3 the digitally signed Certificate can be used to confirm the authenticity of the SIM 19 (i.e., confirm that the SIM 19 is a genuine SIM).
The information may be obtained from the Certificate Authority by referring to the telephone number of the mobile terminal 3, for example. Also associated with the telephone number at the Certificate Authority, or alternatively on another database, is the public key associated with the private key stored on the register 21 of the SIM
19. The DRM broker 17 will optionally check the identity of the SIM 19 by referring to its Certificate. At this time, if the SIM 19 has become compromised in some way known to the operator of network 1, this can be notified to the DRM broker 17 so that it will not proceed with the transaction with the SIM 19.
According to the embodiment, the licence information provided by the DRM broker 17 is encrypted using the public key that the DRM broker 17 obtains from the relevant database, the obtained public key being the public key for the mobile terminal 3 requesting the content and not for any other mobile terminal 3. The encrypted licence information can be decrypted only by using the private key associated with the public key. Therefore, only the mobile terminal 3 is able to decrypt the content. Even if the user of mobile terminal 3 was able to transmit the encrypted licence information to other mobile terminals, this information would be of no use to those terminals as they would have a different private key and consequently would not be able to decrypt the licence information encrypted with the public key of mobile terminal 3.
When the DRM broker 17 obtains the public key from the relevant database, it may also obtain information identifying the type of mobile terminal or the particular mobile terminal (for example, the terminal's international mobile equipment identity number (IMEI)) associated with the public key. This information is useful because some mobile terminals may be poorly designed so that even encrypted data transmitted thereto would not be secure. If the mobile terminal requesting a licence from the DRM broker 17 is identified as not being secure, the DRM broker 17 could refuse to transmit the licence information.
Similarly, the database could include a field that indicated whether the mobile
terminal is one that is known to have had its operating system compromised in some
way. If the DRM 17 is made aware that the mobile terminal has been compromised it could refuse to transmit licence information.
If the mobile terminal 3 is deemed acceptably secure, encrypted licence information is transmitted to the mobile terminal 3. The encrypted licence information passes to the core operating system 25 of the mobile terminal 3. The core operating system 25 communicates with the SIM 19 and is operable to forward the received encrypted licence information to the SIM 19. The licence information including the content decryption key is decrypted using the private key stored on register 21 in the SIM 19.
The SIM 19 sends the decrypted licence information to the core operating system 25 so that the core operating system 25 can decrypt the encrypted content using the content decryption key. The content decryption key cannot be accessed by parts of the mobile terminal 3 other than the core operating system 25, so less controlled applications running in "untrusted" parts of the mobile terminal (for example, hacker programs or viruses) will not be able to decrypt the content. These other parts of the mobile terminal 3 cannot access the SIM 19 independently of the core operating system 25 and cannot access communications between the core operating system 25 and the SIM 19.
The core operating system 25 is designed to follow any usage restrictions of the lin.f.n.e To discourage rogue DRM brokers illegitimately offering licences for content that is not theirs to licence, the network 1 could make a charge for the distribution of the SMS or MMS used to transmit the licence, which would deter the distribution of free illegitimate licences. Additionally, or alternatively, legitimate brokers could electronically sign licences, and the mobile terminal 3 could be configured to only accept licences signed by an approved DRM broker.
A problem that could arise with the arrangement as so far described is that a user could remove the SIM 19 from mobile terminal 3 after the licence information has been decrypted and place the SIM 19 in another mobile terminal to which it previously forwarded the encrypted content. It would then be possible to decrypt the content on this other handset without paying an appropriate licence fee. It may also be that this new handset is of a weaker design than the first, so allowing the content to be extracted in decrypted form, and shared with others without payment.
According to the first embodiment, the SIM 19 is provided with a secret key stored on register 27, which is used by the SIM 19 to encrypt communications to the core operating system 25 and decrypt communications from the core operating system 25.
The communication between the SIM 19 and the mobile terminal 25 is indicated schematically by arrow 29. The terminal 3 is provided with a corresponding secret key stored in register 31 to allow encryption and decryption of data communicated to and from the SIM 19. The secret key stored in respective registers 27 and 31 is a "shared" or symmetric secret key. Only one mobile terminal 3 and one SIM 19 is provided with a particular secret key. This means that the mobile terminal 3 and the SIM 19 are effectively "locked" to one another. If the SIM 19 were removed from mobile terminal 3 and used in another mobile terminal, no meaningful communication between the mobile terminal and the SIM 19 would be able to take place as the secret key stored in the secret key register ofthe mobile terminal could not correspond to the secret key stored in the register 27 of the SIM 19. The data encrypted by the SIM 19 using the secret key of register 27 could not be decrypted by the mobile terminal, and the SIM 19 could not decrypt information encrypted by the different secret key of the mobile terminal.
During manufacture of the mobile terminal 3, a secret key is stored on register 31.
This secret key is stored on the mobile terminal manufacturer's database 33 of secret keys. The information on this database is provided in a secure manner to the network
1. When the SIM 19 is operatively connected to the mobile handset 3 for the first time when the SIM 19 and mobile terminal 3 are used in the network 1, the network interrogates the manufacturer's database 33 and obtains the secret key for the mobile terminal 3, which may be identified, for example, by the international mobile equipment identity number (IMEI) associated with the mobile terminal 3. This secret key is then passed to the SIM 19 installed on the secret key register 27 to allow secure communication between the mobile terminal 3 and SIM 19.
Communication of the secret keys is performed in a secure manner, for example by means of an OTA update to get the secret key to the SIM 19.
Preferably the network operator or the mobile terminal manufacturer (or preferably both) maintains a list of blacklisted IMEIs: handsets whose core operating systems 25 are known to have been hacked, or whose secret key values have been leaked. If the SIM 19 is placed in one of these mobile terminals no value will be sent to the SIM 19, and the mobile terminal 3 and SIM 19 will not be usable for receiving DRM-protected content. Preferably, the SIM 19 includes authentication information allowing it to be registered with more than one network, as described in GB 0118406.8 ("Variable SIM"). This will allow the "home" network of the SIM to be changed. This is particularly advantageous when the SIM is locked to the terminal because a user cannot change the home network of the terminal by obtaining a new SIM from a desired network provider because the new SIM will not work with the terminal.
Figure 2 shows an alternative embodiment where the SIM 40, is secured to the mobile
tenninal 42, so that it cannot be removed The SIM 40 may be secured by any suitable means, such as by a weld 44. The SIM 40 is secured permanently. Removal of the SIM 40 will damage the SIM 40 and/or the mobile terminal 42. In this embodiment the shared secret key is not required and unencrypted communication can take place between the SIM 40 and the mobile terminal 42, as the SIM 40 cannot be removed.
Therefore, the registers 27 and 31 storing the shared secret keys in the first embodiment are not required. The SIM identifier (IMSI) may be used directly as a handset identifier (IMEI) or, if an unrelated IMEI is to be used, this can be incorporated into the SIM's certificate. In this embodiment it is also useful to include in the SIM authentication information allowing it to be registered with more than one network, as described in GB 01 18406.8, referred to above. Batches of SIMs can be provided for pre-fit into mobile terminals sold internationally. On choice of a destination country, the SIM is tuned OTA so that it can be used by a local network operator, and connected to a particular account.
The above description is of a GSM telecommunications system. However, the
invention is not limited in this way and may be used with other systems such as UMTS, 3G and GPRS but also including other communication systems.
Figure 3 shows a further application for the use of encrypted communication between a SIM 50 and a communication device 52. In this embodiment, the communication device 52 is a device for receiving audio and/or visual information from a cable or satellite link - for example, a so-called "set top box" used with a television.
The SIM 50 is similar to the SIM of the first embodiment in that it is provided with a private key of a public-private key pair during its manufacture. The private key is stored on register 54 on the SIM 50. Other information stored on the SIM 50 includes a subscriber identity field stored on register 56 comprising data providing a unique
identity of the SIM 50 to the provider of audio/visual services from network 58. The
services may be provided by a cable link to the communication device 52 or by a satellite link.
The public key corresponding to the private key 54 stored on the SIM 50 is available from a database accessible by audio/visual network 58.
Audio/visual data from the network 58 is encrypted using a key. Each television program may, for example, have a different key. When a user wishes to view a particular television program they will communicate this desire to the network 58 which may make an appropriate deduction from the user's account with the network 58. A decryption key encoded using the public key obtained by the network which corresponds to the private key 54 of the SIM 50 is then sent by network 58 to the receiver device 52. Therefore, only the SIM 50 is able to decode the decryption key to allow viewing of the selected television program.
_ If a third party were able to remove, borrow or even copy the SIM 50 they may be able to obtain audio/visual data in the network 58 without payment of appropriate subscription charges. According to this embodiment, the SIM 50 is provided with a secret key 60 which is used by the SIM 50 to encrypt communications to the core processor 62 of the receiving device 52. The receiver device 52 is provided with a corresponding secret key 64 to allow decryption of data communicated from the SIM 50. Data transmitted from the processor 62 is also encrypted using the secret key 64, the secret key 60 of the SIM 50 being used to decrypt the data at the SIM when this is received. The secret key 60 of the SIM 50 and the secret key 64 of the receiver device 52 are a "shared" secret key. Only one receiver device 52 and one SIM 50 is provided with a particular secret key. This means that the receiver device 52 and the SIM 50 are effectively "locked" to one another. If the SIM 50 were removed or copied and an attempt was made to use this with another receiver device 52, no meaningful communication between the other receiver device and the SIM would be
able to take place as the secret key 60 stored on the SIM would not correspond to the secret key of the other receiver device. In addition, if a SIM is known to have been copied then it can be blacklisted (for example, by having its certificate assessable by the network 58 revoked), thereby preventing its receipt of any more program decryption keys.
As an alternative to providing the shared secret keys 60, 64 the SIM 50 could be secured to the receiving device 52. A facility could be provided to allow the SIM 50 to be tuned to the network operating in the country where the receiving device 52 is sold. Figure 4 shows a variation of the Figure 3 embodiment in which the decryption of keys for viewing selected television programs from network 58 is provided by a SIM 70 within a mobile terminal 72. Other components of the receiver device 52 are the same as in the Figure 3 embodiment. The SIM 70 contains a private key 73 in a similar manner to the Figure 1 and Figure 3 embodiments. Register 74 of the SIM 70 includes a subscriber identity field (IMSI) similar to the Figure 1 embodiment which
identifies the mobile terminal 72 to mobile network 74. The mobile terminal 72 is linked to the receiver device 52 by a wireless radio, an infra-red or a cable link 76.
Encrypted audio/visual data from the network 58 is transmitted to the receiver device 52 in a similar manner to the Figure 3 embodiment. A decryption key for decrypting this audio/visual data is provided by an exchange of short messages between the mobile terminal 72 and SMSC 78. The SMSC 78 communicates in turn with a licence broker 80 via fixed network 82. The licence broker 80 provides the decryption key encoded using the public key corresponding to the private key 73 of the SIM 70. The licence broker 80 obtains the public key corresponding to the SIM 70 from a database in the manner described previously. The decryption key is decoded using the private key 73. The decoded key is then passed securely to the core processor 62 of the receiver device 62 to allow the decryption of the audio/visual data from network 58.
According to this embodiment, the SIM 70 is provided with a secret key 84 which is used by the SIM 70 to encrypt communications to the core processor 62 of the receiving device 52. The main processor 62 is provided with a corresponding secret key 64 to allow decryption of data communicated from the SIM 70. Data transmitted from the processor 62 is also encrypted using the secret key 64, the secret key 84 of the SIM 70 being used to decrypt the data at the SIM when this is received. The secret key 84 of the SIM 70 and the secret key 64 of the processor 62 are a "shared" secret key. Only one processor 62 and one SIM 70 is provided with a particular secret key.
This means that the processor 62 and the SIM 70 are effectively "locked" to one another. The secret keys 64,84 can be provided to the SIM 70 and the core processor 62 in a similar manner to that described in relation to the Figure 1 embodiment.
It is possible to have more than one secret key stored on the SIM. This will allow a SIM/mobile owner to legally operate with several devices (for example, several set-
top boxes at different locations or different devices such as a set-top box and DVD player).

Claims (22)

1. Communication apparatus including receiver means for receiving data over a communication network, and a storage module including decoding means for enabling decryption of encoded data received by the receiver means from the communication network, the receiver means and the storage module being inter-operable with one another but not with selected other receiver means and storage modules.
2. Communication apparatus according to claim 1, wherein each of the receiver means and the storage module has a key associated therewith for allowing the encryption of data transmitted from either one thereof for reception by the other and for allowing decryption of the encrypted data when so received.
3. Communication apparatus according to claim 2, wherein the key associated with the receiver means and the storage module is a shared secret key.
4. Communication apparatus according to claim 1, wherein the receiver means and the storage module are physically interlocked with one another.
5. Communication apparatus according to claim 4, wherein the storage module is welded to the receiver means.
6. Communication apparatus according to any one of the preceding claims, wherein the communication network comprises a mobile telephone network and the storage module comprises a smart card such as a SIM.
7. Communication apparatus according to claim 6, wherein the receiver means comprises a mobile telephone.
8. Communication apparatus according to any one of claims 1 to 5, wherein the communication network comprises an audio and/or video data distribution network and the storage module comprises a smart card such as a SIM.
9. Communication apparatus according to claim 8, wherein the receiver means comprises a audio and/or video data receiver.
10. Communication apparatus according to any one of the preceding claims, including means for obtaining a network data decryption key to allow decryption of the encoded data from the network.
11. Communication apparatus according to claim 10, wherein the network data decryption key is provided in encoded form and the decoding means decodes the encoded network data decryption key.
12. Communication apparatus according to claim 11, wherein the storage module stores a private key of a public-private key pair for use by the decoding means, the encoded network data decryption key received by the receiving means being encoded using the public key of the public-private key pair.
13. Communication apparatus including receiver means for receiving data over a communication network and a storage module including decoding means for enabling the decryption of encoded data received by the receiver means from the communication network, wherein each of the receiver means and the storage module has a key associated therewith for allowing the encryption of data transmitted from either one thereof for reception by the other and for allowing decryption of the encrypted data when so received.
14. Communication apparatus substantially as hereinbefore described with
reference to and/or substantially as illustrated in any one of or any combination of the accompanying drawings.
15. A communication system including: communication apparatus as claimed in any one of the preceding claims; content provider means for providing encoded data for transmission to the communication apparatus; and decryption key provider means for selectively providing decryption keys for allowing the communication apparatus to decode the encoded data from the content provider means.
16. A communication system according to claim 15, wherein the decrytion key provider means includes means for determining identification data for the communication apparatus requesting a decryption key therefrom and for selectively providing a decryption key in dependence upon the identification data.
17. A communication system according to claim 16, wherein the identification data indicates the security characteristics of the communication apparatus.
18. A communication system according to claim 16 or 17, wherein the identification data indicates whether is receiver means and/or the storage module are authorised to receive the decryption key.
19. A communication system according to claim 15, 16, 17 or 18, wherein the decryption key provider means selectively provides decrytion keys by means of short messages.
20. A conununication system substantially as hereinbefore described with reference to and/or substantially as illustrated in any one of or any combination of the
. accompanying drawings.
21. A storage module for use with receiver means for receiving data over a communication network, the storage module including decoding means for enabling decryption of encoded data received by the receiver means from the communication network, the storage module being inter-operable with said receiver means and but not with selected other receiver means.
22. A storage module substantially as hereinbefore described with reference to and/or substantially as illustrated in any one of or any combination of the accompanying drawings.
l? ma) INVESTOR IN AEON | t. Tom Application No: GB 0208453. 1 Examiner: David McWhirter Claims searched: 1-5 Date of search: 14 November 2002
Patents Act 1977 Search Report under Section 17 Databases searched: UK Patent Office collections, including GB, EP, WO & US patent specifications, in:
UK Cl (Ed.T): H4L (LRAA, LRAB, LRAD, LRAX, LRCMA, LRCMS, LDPC, LDPPX LECCP, LECCX, LED, LEF, LEP, LESF, LEUX)
Int Cl (Ed.7): H04B 1/38, H04L 9/32, H04Q 7/32, 7/38 Other: Online: EPODOC, WPI, PAJ Documents considered to be relevant: Category Identity of document and relevant passage Relevant to claims Y EP 1047277 A2 (NEC) see whole document, particularly column 3,4,6,7 & line 33-column 4 line 34 2 Y WO 9939524 Al (SONERA OY) see page 7 line 29 - page 8 line 3,4,6,7 & Y US 6124799 (PARKER) see column 4 lines 13-33 2i Y US 5864757 (PARKER) see column 4 lines 5-25 i,4,6, & X Document indicating lack of novelty or inventive step A Document indicating technological background and/or state of the art.
Y Document indicating lack of inventive step if combined P Documentpublishedonoraflerthedeclaredprioritydatebutbeforethe with one or more other documents of same category. filing date of this invenhon.
E Patent document published on or after, but with priority date earlier & Member of the same patent family than, the f ling date of this application.
An Executive Agency of the Department of Trade and Industry
GB0208453A 2002-04-12 2002-04-12 Communication systems Expired - Lifetime GB2387505B (en)

Priority Applications (5)

Application Number Priority Date Filing Date Title
GB0208453A GB2387505B (en) 2002-04-12 2002-04-12 Communication systems
CNB038082101A CN1303538C (en) 2002-04-12 2003-04-11 Method ans system for distribution of encrypted data in a mobile network
PCT/GB2003/001594 WO2003088054A1 (en) 2002-04-12 2003-04-11 Method and system for distribution of encrypted data in a mobile network
EP03720701.6A EP1495409B1 (en) 2002-04-12 2003-04-11 Method and system for distribution of encrypted data in a mobile network
AU2003224277A AU2003224277A1 (en) 2002-04-12 2003-04-11 Method and system for distribution of encrypted data in a mobile network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB0208453A GB2387505B (en) 2002-04-12 2002-04-12 Communication systems

Publications (3)

Publication Number Publication Date
GB0208453D0 GB0208453D0 (en) 2002-05-22
GB2387505A true GB2387505A (en) 2003-10-15
GB2387505B GB2387505B (en) 2005-11-23

Family

ID=9934731

Family Applications (1)

Application Number Title Priority Date Filing Date
GB0208453A Expired - Lifetime GB2387505B (en) 2002-04-12 2002-04-12 Communication systems

Country Status (5)

Country Link
EP (1) EP1495409B1 (en)
CN (1) CN1303538C (en)
AU (1) AU2003224277A1 (en)
GB (1) GB2387505B (en)
WO (1) WO2003088054A1 (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1536606A1 (en) * 2003-11-27 2005-06-01 Nagracard S.A. Method for authenticating applications
EP1569482A1 (en) * 2004-01-29 2005-08-31 Nagracard S.A. Method for securing the transmission of short messages
WO2005093558A1 (en) * 2004-03-29 2005-10-06 Samsung Electronics Co., Ltd. Portable storage device and method of managing files in the portable storage device
EP1695563A2 (en) * 2003-12-16 2006-08-30 Infocus Corporation Security for wireless transmission
WO2007068263A1 (en) * 2005-12-12 2007-06-21 Telecom Italia S.P.A. Device, system and method for allowing authorised access to a digital content
US8346215B2 (en) 2005-07-11 2013-01-01 Giesecke & Devrient Gmbh Retrospective implementation of SIM capabilities in a security module
DE102011085050A1 (en) 2011-10-21 2013-04-25 Vodafone Holding Gmbh Management of license information for a communication terminal
US20180034786A1 (en) * 2016-08-01 2018-02-01 Google Inc. Providing online media content via a satellite broadcast system

Families Citing this family (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
SE0202451D0 (en) * 2002-08-15 2002-08-15 Ericsson Telefon Ab L M Flexible Sim-Based DRM agent and architecture
DE10317037A1 (en) * 2003-04-14 2004-11-04 Orga Kartensysteme Gmbh Process for protecting data against unauthorized use on a mobile device
CN100420181C (en) * 2004-12-31 2008-09-17 北京中星微电子有限公司 A method and chip for digital rights management (DRM) media information processing
CN100377613C (en) * 2005-06-01 2008-03-26 海信集团有限公司 Encryption method for short message of mobile telephone
CN1955971B (en) * 2005-10-27 2010-05-05 北京振戎融通通信技术有限公司 Safety installation method suitable for Java application program
CN1996831B (en) * 2005-12-31 2011-09-28 财团法人工业技术研究院 Certificate application method
US9198025B2 (en) * 2006-05-04 2015-11-24 Sandisk Il Ltd. High-capacity SIM storage control
JP5073308B2 (en) * 2007-02-08 2012-11-14 株式会社エヌ・ティ・ティ・ドコモ Content transaction management server device, content providing server device, terminal device and program thereof
CN101296482B (en) * 2007-04-28 2012-12-12 华为技术有限公司 Method, base station, relay station and relay communication system implementing message authentication
US8850230B2 (en) * 2008-01-14 2014-09-30 Microsoft Corporation Cloud-based movable-component binding
CN101325494B (en) * 2008-07-28 2011-08-03 华为终端有限公司 Method and device for protecting private information
US9514462B2 (en) * 2012-03-02 2016-12-06 Google Inc. Obtaining and managing access to content
CN103227944B (en) * 2013-04-18 2016-04-13 中国联合网络通信集团有限公司 The processing method of deciphering preset resource and device
CN105824811B (en) * 2015-01-04 2019-07-02 中国移动通信集团福建有限公司 A kind of big data analysis method and device thereof
CN106034298B (en) * 2015-03-11 2019-12-17 青岛海信移动通信技术股份有限公司 mobile terminal card locking method and terminal
CN105704139B (en) * 2016-03-16 2018-05-11 杭州开课啦教育科技有限公司 Streaming media service user authen method based on RTMP agreements
CN106295254B (en) * 2016-08-16 2019-06-25 新华三技术有限公司 A kind of Compliance control method and device of licensing
CN106941487B (en) 2017-02-24 2021-01-05 创新先进技术有限公司 Data sending method and device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5864757A (en) * 1995-12-12 1999-01-26 Bellsouth Corporation Methods and apparatus for locking communications devices
WO1999039524A1 (en) * 1998-01-16 1999-08-05 Sonera Oyj Procedure and system for the processing of messages in a telecommunication system
EP1047277A2 (en) * 1999-04-20 2000-10-25 Nec Corporation Mobile communication terminal with a detachable IC card and method of accessing the network

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5850444A (en) * 1996-09-09 1998-12-15 Telefonaktienbolaget L/M Ericsson (Publ) Method and apparatus for encrypting radio traffic in a telecommunications network
GB2327567A (en) * 1997-07-17 1999-01-27 Orange Personal Comm Serv Ltd Controlling Access to SMSCB Service
EP1033893A1 (en) * 1999-03-02 2000-09-06 TELEFONAKTIEBOLAGET LM ERICSSON (publ) Basic architecture for packet switched protocol based GSM networks
KR100320183B1 (en) * 1999-03-17 2002-01-10 구자홍 File encryption apparatus for digital data player
FI990616A0 (en) 1999-03-18 1999-03-18 Sonera Oy Data transmission method and systems
GB2378094B (en) 2001-07-27 2004-12-22 Vodafone Plc Telecommunications systems and methods and smart cards for use therewith

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5864757A (en) * 1995-12-12 1999-01-26 Bellsouth Corporation Methods and apparatus for locking communications devices
US6124799A (en) * 1995-12-12 2000-09-26 Bellsouth Intellectual Property Corporation Methods and apparatus for locking communications devices
WO1999039524A1 (en) * 1998-01-16 1999-08-05 Sonera Oyj Procedure and system for the processing of messages in a telecommunication system
EP1047277A2 (en) * 1999-04-20 2000-10-25 Nec Corporation Mobile communication terminal with a detachable IC card and method of accessing the network

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9531681B2 (en) 2003-11-27 2016-12-27 Nagravision S.A. Method for the authentication of applications
WO2005053263A2 (en) * 2003-11-27 2005-06-09 Nagracard S.A. Method for the authentication of applications
WO2005053263A3 (en) * 2003-11-27 2005-10-06 Nagracard Sa Method for the authentication of applications
US8813253B2 (en) 2003-11-27 2014-08-19 Nagravision S.A. Method for the authentication of applications
US8261365B2 (en) 2003-11-27 2012-09-04 Nagravision S.A. Method for the authentication of applications
US9143888B2 (en) 2003-11-27 2015-09-22 Nagravision S.A. Method for the authentication of applications
EP1536606A1 (en) * 2003-11-27 2005-06-01 Nagracard S.A. Method for authenticating applications
EP1695563A2 (en) * 2003-12-16 2006-08-30 Infocus Corporation Security for wireless transmission
EP1695563A4 (en) * 2003-12-16 2010-12-29 Seiko Epson Corp Security for wireless transmission
EP1569482A1 (en) * 2004-01-29 2005-08-31 Nagracard S.A. Method for securing the transmission of short messages
WO2005093558A1 (en) * 2004-03-29 2005-10-06 Samsung Electronics Co., Ltd. Portable storage device and method of managing files in the portable storage device
US8346215B2 (en) 2005-07-11 2013-01-01 Giesecke & Devrient Gmbh Retrospective implementation of SIM capabilities in a security module
WO2007068263A1 (en) * 2005-12-12 2007-06-21 Telecom Italia S.P.A. Device, system and method for allowing authorised access to a digital content
DE102011085050A1 (en) 2011-10-21 2013-04-25 Vodafone Holding Gmbh Management of license information for a communication terminal
EP2611221A1 (en) 2011-10-21 2013-07-03 Vodafone Holding GmbH Management of license information for a communication terminal
US20180034786A1 (en) * 2016-08-01 2018-02-01 Google Inc. Providing online media content via a satellite broadcast system
WO2018026834A1 (en) * 2016-08-01 2018-02-08 Google Llc Providing online media content via a satellite broadcast system
KR20190025681A (en) * 2016-08-01 2019-03-11 구글 엘엘씨 Providing online media contents through satellite broadcasting system
JP2019521606A (en) * 2016-08-01 2019-07-25 グーグル エルエルシー Provision of online media content via satellite broadcasting system
US10601794B2 (en) * 2016-08-01 2020-03-24 Google Llc Providing online media content via a satellite broadcast system
KR102175690B1 (en) * 2016-08-01 2020-11-06 구글 엘엘씨 Provision of online media contents through satellite broadcasting system

Also Published As

Publication number Publication date
AU2003224277A1 (en) 2003-10-27
WO2003088054A8 (en) 2004-11-11
WO2003088054A1 (en) 2003-10-23
CN1647052A (en) 2005-07-27
AU2003224277A8 (en) 2003-10-27
GB2387505B (en) 2005-11-23
GB0208453D0 (en) 2002-05-22
EP1495409A1 (en) 2005-01-12
CN1303538C (en) 2007-03-07
EP1495409B1 (en) 2013-10-23

Similar Documents

Publication Publication Date Title
EP1495409B1 (en) Method and system for distribution of encrypted data in a mobile network
CN100549903C (en) The method and system of rights data objects is provided
US7620814B2 (en) System and method for distributing data
RU2395166C2 (en) Method for provision of access to coded content of one of multiple subscriber systems, device for access provision to coded content and method for generation of protected content packets
EP1513113B2 (en) System and method for providing secured communication based on smart cards
US7149545B2 (en) Method and apparatus for facilitating over-the-air activation of pre-programmed memory devices
CN100459780C (en) Robust and flexible digital rights management involving a tamper-resistant identity module
US20030174838A1 (en) Method and apparatus for user-friendly peer-to-peer distribution of digital rights management protected content and mechanism for detecting illegal content distributors
US8351914B2 (en) Method and system for registration of licensed modules in mobile devices
JP2005539291A (en) Method for monitoring digital content provided by a content provider via a network
CN101167388A (en) Limited supply access to mobile terminal features
US20040253942A1 (en) Digital content acquisition and distribution in digitial rights management enabled communications devices and methods
JP2006314118A (en) Method and system for controlling access for broadcasting information service
US7191343B2 (en) Voucher driven on-device content personalization
US20070112680A1 (en) System and method for processing digital media content in a mobile device
CN101482963A (en) Service data processing platform, system and method
JP2007507012A (en) Method for automatically generating personalized data and / or programs with restricted access
CN101150851A (en) Method, server and mobile station for transmitting data from server to mobile station
US20040179687A1 (en) Method for transmitting copyrighted electronic documents in a wireless communication system
GB2403382A (en) Digital Rights Management (DRM) system providing licences to use encrypted content only after a predetermined time
EP1335266B1 (en) Distribution and management process and system for mobile terminals for use rights associated with a purchased content.
CN100543715C (en) Optimally adapting multimedia content is used for mobile subscriber device playback
KR100838034B1 (en) Inquiring system for alteration result of subscriber information in digital multimedia broadcas(conditional access system)ting service using ota wireless communication network
KR100823677B1 (en) DRM system and method for multimedia contents added in multimedia message
WO2001091365A1 (en) Data distribution system

Legal Events

Date Code Title Description
PE20 Patent expired after termination of 20 years

Expiry date: 20220411