TWI523474B - Protection method for security data transmitted by a transmitter device to a receiver device - Google Patents

Protection method for security data transmitted by a transmitter device to a receiver device Download PDF

Info

Publication number
TWI523474B
TWI523474B TW098124419A TW98124419A TWI523474B TW I523474 B TWI523474 B TW I523474B TW 098124419 A TW098124419 A TW 098124419A TW 98124419 A TW98124419 A TW 98124419A TW I523474 B TWI523474 B TW I523474B
Authority
TW
Taiwan
Prior art keywords
message
receiver
duration
data
stream
Prior art date
Application number
TW098124419A
Other languages
Chinese (zh)
Other versions
TW201105079A (en
Inventor
安東尼 雀凡利爾
馬修 法米斯
Original Assignee
薇瑟斯公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 薇瑟斯公司 filed Critical 薇瑟斯公司
Priority to TW098124419A priority Critical patent/TWI523474B/en
Publication of TW201105079A publication Critical patent/TW201105079A/en
Application granted granted Critical
Publication of TWI523474B publication Critical patent/TWI523474B/en

Links

Landscapes

  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Description

從發射器發送到接收器的保全資料之保護方法Protection method for security data transmitted from the transmitter to the receiver 發明領域Field of invention

本發明係關於電信領域,特別係關於一種從發射器裝置發射至接收器裝置之保全資料之保護方法。The present invention relates to the field of telecommunications, and in particular to a method of protecting a security data transmitted from a transmitter device to a receiver device.

本發明亦係關於位於一操作員網路頭端且配置來發射工作訊息至接收器終端裝置之發射器終端裝置。The present invention is also directed to a transmitter terminal device located at an operator network head end and configured to transmit a work message to a receiver terminal device.

本發明進一步係關於一種儲存於一載體上且設計來於發射器終端裝置內運算而於發射端實施根據本發明之方法之電腦程式。The invention further relates to a computer program stored on a carrier and designed to operate within the transmitter terminal device and to implement the method according to the invention at the transmitting end.

本發明亦係關於一種配置來接收從該發射器終端裝置發射之訊息之接收器終端裝置,及一種儲存於載體上且設計來於接收器終端裝置上執行而實施根據本發明之方法之電腦程式。The present invention also relates to a receiver terminal device configured to receive a message transmitted from the transmitter terminal device, and a computer program stored on the carrier and designed to be executed on the receiver terminal device to implement the method according to the present invention .

更精確言之,本發明係關於改良從運算元網路之頭端發送至客戶之接收系統之EMM訊息的保護。但更一般性地,係應用於藉通訊網路連結的實體間訊息之全部傳輸的保護,而與該實體及該網路之本質及特性無關。More precisely, the present invention relates to improving the protection of EMM messages transmitted from the head end of the operating element network to the receiving system of the customer. More generally, it is applied to the protection of the entire transmission of information between entities connected by a communication network, regardless of the nature and characteristics of the entity and the network.

發明背景Background of the invention

隨著透過通訊網路分布內容的蓬勃發展,內容被駭的風險變成此等內容之提供者與受訊者間的主要擔憂。With the proliferation of content distributed through communication networks, the risk of content being shackled becomes a major concern between providers and recipients of such content.

結果係從原基上保護分送的內容,避免此等內容相關聯之存取權利被詐欺地再路由通過的風險,同時也避免此等權利被使用者所偽造。The result is to protect the content of the distribution from the original source, to avoid the risk that the access rights associated with such content are spoofed and re-routed, and also to prevent such rights from being forged by the user.

確實於CAS型存取控制系統中,分送的內容通常經編碼,而其解碼係藉邏輯授權(使用者可存取該內容歷經一段預定時間)組合金鑰,稱作為運算金鑰來規定條件,其中後者允許授權存取該內容至其他訊息被解碼。邏輯授權及運算金鑰通常係以EMM(權利管理訊息)及ECM(權利控制訊息)特殊存取控制訊息(該訊息的本身必須被保護)來發送至接收器終端裝置。Indeed, in a CAS-type access control system, the distributed content is usually encoded, and its decoding is performed by a logical authorization (the user can access the content for a predetermined period of time) to combine the keys, which are referred to as operating keys to specify conditions. The latter allows the authorization to access the content to other messages that are decoded. The logical authorization and operation key is usually sent to the receiver terminal device by EMM (Entitlement Management Message) and ECM (Entitlement Control Message) special access control message (the message itself must be protected).

為了更明瞭本技術領域之特定術語可參考下述文件:「條件式存取系統之功能模型」,歐洲廣播協會EBU技術綜論,比利時布魯塞爾,266期,1995年12月21日。For a more specific terminology in the art, reference may be made to the following document: "Functional Model of Conditional Access System", European Broadcasting Union EBU Technical Review, Brussels, Belgium, Issue 266, December 21, 1995.

先前技術之一項缺點係源自於下述事實,此等訊息可能被攔截且被分析來測定解碼該內容所需的存取條件及金鑰。One shortcoming of the prior art stems from the fact that such messages may be intercepted and analyzed to determine the access conditions and keys needed to decode the content.

於某些情況下,操作員可能期望刪除或限制某些受訊中的存取權利。於此種情況下,EMM訊息及ECM訊息含有用於達成此項目的之資訊。In some cases, the operator may wish to remove or restrict access rights in certain communications. In this case, the EMM message and ECM message contain information to achieve this project.

另一種詐欺模式包含過濾此等由操作員所發送的訊息來防止該訊息被接收器終端裝置之保全處理器使用。Another type of scam mode involves filtering such messages sent by the operator to prevent the message from being used by the processor of the receiver terminal device.

此外,期望回復EMM訊息的駭客可能將該EMM訊息送至準備用於測試的接收器系統來藉實驗性判定其效果。In addition, a hacker wishing to reply to an EMM message may send the EMM message to a receiver system ready for testing to experimentally determine its effectiveness.

此外,操作員操作存取控制系統,導入於特定月份日期添加、修改或刪除權利的EMM訊息,此乃由於電腦批次處理的結果,可能有助於駭客來區別由此項處理所得之新的EMM訊息,且允許駭客設計過濾策略。In addition, the operator operates the access control system to import EMM messages that are added, modified, or deleted on a specific month date. This may be due to the results of computer batch processing, which may help the hacker to distinguish the new ones from this process. EMM messages and allow hackers to design filtering policies.

當使用密碼冗餘進行存取控制訊息的認證時,於下列情況下本辦法無效:When password authentication is used for authentication of access control messages, this method is invalid in the following cases:

-若駭客成功地獲得金鑰,或若駭客成功地獲得正確密碼冗餘。若密碼冗餘為對稱性時特別可能為此種情況。- If the hacker successfully obtains the key, or if the hacker successfully obtains the correct password redundancy. This is especially the case if the password redundancy is symmetrical.

-若駭客成功地使得該訊息被保全處理器接收為含有正確的密碼冗餘因而認證為真時。當以物理方式破壞負責驗證真實性之該接收系統的保全處理器之運算環境時,此點特別為真。此等破壞例如包括溫度陡升、電源供應器信號或時鐘的變化,將組件暴露於雷射脈衝、電磁發射或放射性粒子輻射。- If the hacker successfully causes the message to be received by the security processor with the correct password redundancy and the authentication is true. This is especially true when the computing environment of the security processor of the receiving system responsible for verifying authenticity is physically destroyed. Such damage, for example, includes temperature ramps, power supply signals, or changes in the clock, exposing the assembly to laser pulses, electromagnetic emissions, or radioactive particle radiation.

於訊息係藉正序與負序的組合發送至接收器終端裝置來受保護的情況下,唯有於駭客可能失敗時該辦法才令人感興趣。特定言之,某些攻擊包含加權至官方保全處理器(稱作MOSC,修改型官方晶片卡)。於此種情況下,若操作員改變運算金鑰過濾訊息時駭客才可能失敗。In the case where the message is transmitted to the receiver terminal device in a combination of positive sequence and negative sequence, the method is only interesting when the hacker may fail. In particular, some attacks include weighting to the official security processor (called MOSC, modified official wafer card). In this case, the hacker may fail if the operator changes the operation key to filter the message.

較佳係不要以多工方式傳輸此等金鑰,以免不必要地暴露金鑰。Preferably, these keys are not transmitted in a multiplexed manner to avoid unnecessarily exposing the keys.

因此,顯然存取控制系統(CAS)並非經常性可對抗駭客的攻擊,特別係對抗不應送至保全處理器之非期望的訊息的刪失或訊息的插入。Therefore, it is clear that the Access Control System (CAS) is not a regular attack against hackers, especially against the deletion of undesired messages that should not be sent to the security processor or the insertion of messages.

本發明之目的係克服前文說明之先前技術存取控制系統之缺點。It is an object of the present invention to overcome the shortcomings of the prior art access control systems described above.

發明概要Summary of invention

本發明係基於發射器與接收器間維持常規訊息流動,因此即使操作員並未作任何請求,訊息仍被發射之構想。The present invention is based on the idea that the normal message flow is maintained between the transmitter and the receiver, so that even if the operator does not make any request, the message is still transmitted.

本發明推薦一種方法,包含一種藉一發射器發射至一接收器之保全資料之保護方法,其包括與該保全資料相交替地,週期性地發射中性資料予該接收器,該中性資料係設計來防止該保全資料之過濾。The present invention proposes a method comprising a method of protecting a security data transmitted by a transmitter to a receiver, comprising periodically transmitting neutral data to the receiver alternately with the security data, the neutral data It is designed to prevent the filtering of the preservation data.

此種規則性允許發射器與接收器間之通訊對外界觀察者為混淆不明,如此難以進行保全訊息的詐欺過濾。進一步允許接收器檢測此等訊息可能的過濾情況。This regularity allows communication between the transmitter and the receiver to be confusing to outside observers, making it difficult to perform scam filtering of the security message. The receiver is further allowed to detect possible filtering of such messages.

根據本發明之實施例及該順序之二次訊息的本質,接著為檢測操作或計數器操作。可使用不同類型的檢測,諸如記錄檔的記憶或檢測計數器的遞增。對策例如包含讓含有保全處理器的卡片暫時性失效或摧毀。The nature of the secondary message in accordance with an embodiment of the invention and the sequence is followed by a detection operation or a counter operation. Different types of detection can be used, such as the memory of the log file or the increment of the detection counter. The countermeasures include, for example, temporarily invalidating or destroying a card containing a security processor.

根據本發明之另一特性,於從發射器末次發射資料至接收器後之預定時間後觸發該中性資料的發送。According to another feature of the invention, the transmission of the neutral data is triggered after a predetermined time after the last transmission of the data by the transmitter to the receiver.

較佳該中性資料係呈現與該保全資料結構相似之結構。Preferably, the neutral data presents a structure similar to the security data structure.

於一個變化方法中,根據本發明之方法包含下列步驟:In a variation method, the method according to the invention comprises the following steps:

-定義由接收器接收從發射器所發射之資料之連續兩次接收間分隔的持續時間DR,及Defining the duration DR separated by the receiver for receiving two consecutive receptions of data transmitted from the transmitter, and

-於一給定瞬間t,測量由接收器接收從發射器所發射之資料已經經過之時間間隔TR,- measuring the time interval TR that the receiver has received the data transmitted from the transmitter at a given instant t,

-若時間間隔TR係大於該持續時間DR,則發射警報信號予對策管理單元。- If the time interval TR is greater than the duration DR, an alarm signal is transmitted to the countermeasure management unit.

於本變化法中,該方法進一步包含一步驟,該步驟包含計數從該接收器發送至該對策管理單元之警報信號數目N;將該數目N記憶於該對策管理單元;定義表示觸發制裁之一臨界值的警報信號數目SA;將該數目SA與記憶於該對策管理單元中之數目N做比對;以及若數目N係大於數目SA,則進行對策程序。In the variation method, the method further includes a step of counting the number N of alarm signals sent from the receiver to the countermeasure management unit; storing the number N in the countermeasure management unit; defining one of the triggering sanctions The number of alarm signals SA of the threshold value; the number SA is compared with the number N stored in the countermeasure management unit; and if the number N is greater than the number SA, the countermeasure program is performed.

該對策程序可由接收器局部作動,或由發射器遠端作動,且包含暫時性或永久性懸置該接收器的操作。The countermeasure can be actuated locally by the receiver or by the transmitter at the far end and includes the operation of temporarily or permanently suspending the receiver.

於設計用來加強CAS型存取控制系統之保全之根據本發明方法之一項特殊應用中,保全資料及中心資料係於EMM訊息發送至接收器。In a particular application of the method according to the invention designed to enhance the preservation of a CAS-type access control system, the security data and the central data are sent to the receiver via the EMM message.

該保全資料及中性資料可經編碼以加強保全。但可以編碼形式發送。The preservation information and neutral information can be coded to enhance preservation. But it can be sent in encoded form.

保全資料及中性資料可進一步包含已編碼之音訊視覺程式之資料流中發送至接收器。於此種情況下,運算的暫時性懸置或永久性懸置包含當讀取多媒體內容時不再處理EMM訊息。The preservation data and the neutral data may further be sent to the receiver in the data stream of the encoded audio visual program. In this case, the temporary suspension or permanent suspension of the operation includes no longer processing the EMM message when reading the multimedia content.

根據本發明之方法可利用連結至該操作員網路之多個終端裝置中,位於操作員網路之頭端且配置來發送工作訊息予一接收器終端裝置之一發射器終端裝置實施。The method according to the present invention can be implemented by a plurality of terminal devices coupled to the operator network, located at the head end of the operator network and configured to transmit a work message to a transmitter terminal device of a receiver terminal device.

本終端裝置包含儲存於該串流中連續兩次發送訊息間之時間之最大持續時間D之儲存裝置;測定自末次發送訊息所經過之時間T之測定裝置;及若從末次發送訊息所經過之時間T係大於或等於該持續時間D時,將一中性訊息插入該串流之插入裝置。The terminal device includes a storage device that stores the maximum duration D of the time between consecutive transmissions of the message in the stream; the measuring device that measures the time T elapsed since the last message was sent; and if the message is sent from the last time the message is sent When the time T is greater than or equal to the duration D, a neutral message is inserted into the insertion device of the stream.

根據本發明方法係於該網路之頭端側利用一電腦程式實施,該電腦程式係儲存於一載體上且設計來於發射器終端裝置上跑,用於儲存於該串流中連續兩次發送訊息間之時間之最大持續時間D,用於測量從末次發送訊息所經過之時間T,以及用於若由末次發送訊息所通過之時間間隔T係大於或等於該持續時間D時,於該串流內插入一中心訊息。The method according to the invention is implemented on the head end side of the network by a computer program stored on a carrier and designed to run on the transmitter terminal device for storage in the stream twice in succession. The maximum duration D of the time between sending the message, used to measure the time T elapsed since the last message was sent, and when the time interval T passed by the last message is greater than or equal to the duration D, Insert a central message into the stream.

根據本發明之接收器終端裝置包含用於儲存最大持續時間DR係大於或等於該串流中連續兩次接收訊息之時間之持續時間D之儲存裝置;用於測量從末次接收訊息所經過之時間間隔TR之測定裝置;及若從末次接收訊息所經過之時間間隔TR係大於等於該持續時間DR,用於通知該對策行動單元時間已經超過之通知裝置。The receiver terminal device according to the present invention includes storage means for storing a duration D of a maximum duration DR being greater than or equal to a time of two consecutively received messages in the stream; for measuring the elapsed time from the last reception of the message The measuring device of the interval TR; and the time interval TR elapsed from the last reception of the message is greater than or equal to the duration DR, and is used to notify the notification device that the countermeasure action unit has exceeded the time.

於接收器端,根據本發明方法係利用一種電腦程式實施,該電腦程式係儲存於一載體上且係設置來於接收器終端裝置上跑用於儲存大於或等於該串流中連續兩次接收訊息之時間之持續時間D的最大持續時間DR;用於測量從末次接收該訊息所通過之時間間隔TR;及若從末次接收訊息所通過之時間TR係大於或等於該持續時間DR;則通知該時間超過予該對策行動單元。At the receiver end, the method according to the invention is implemented by a computer program stored on a carrier and arranged to run on the receiver terminal device for storing greater than or equal to two consecutive receptions in the stream. The maximum duration DR of the duration D of the message; used to measure the time interval TR from which the message was last received; and if the time TR passed by the last message received is greater than or equal to the duration DR; This time exceeds the countermeasure action unit.

圖式簡單說明Simple illustration

其他本發明之特徵及優點當參考附圖研讀利用非限制性實例所提供之後文說明將更為清晰,附圖中:第1圖表示一大致流程圖顯示根據本發明之方法之主要步驟。Other features and advantages of the present invention will become more apparent from the following description, taken in the <

第2圖以圖解表示一流程圖顯示藉根據本發明之終端裝置檢測訊息之過濾。Fig. 2 is a diagram showing a flow chart showing the filtering of a message detected by a terminal device according to the present invention.

較佳實施例之詳細說明Detailed description of the preferred embodiment

後文說明係有關根據本發明方法用於於特殊應用之實施例,其中位於一操作員網路頭端之一發射器終端裝置發射一數位內容予連結至該操作員網路之接收器。該數位內容首先係藉於EMM訊息中發送至該接收器終端裝置之一控制字元編碼。The following description is directed to an embodiment for a particular application in accordance with the method of the present invention wherein a transmitter terminal device located at the head end of an operator network transmits a digital content to a receiver coupled to the operator network. The digital content is first encoded by the control character code sent to the receiver terminal device in the EMM message.

操作員可使用不同頻道來廣播該EMM訊息,且使用不同定址模式來發送訊息至不同的聽眾。藉此方式,EMM-GA係設計用於全部使用者(GA-全球聽眾),EMM-S設計用於一組使用者(S-分享)及EMM-U設計用於一單一使用者(U-使用者)。一頻道典型用來廣播EMM訊息至各個此等定址模式。The operator can use different channels to broadcast the EMM message and use different addressing modes to send messages to different listeners. In this way, the EMM-GA is designed for all users (GA-Global Listeners), EMM-S is designed for a group of users (S-Share) and EMM-U is designed for a single user (U- user). A channel is typically used to broadcast EMM messages to each of these addressing modes.

甚至於單一定址模式之情況下,也可使用不同EMM頻道。例如於行動電話,某些訊息可於如同含有視訊之相通多工發送,而其他訊息可於SMS發送。也可能若干使用者將接收訊息。於本發明之上下文中,發送至一使用者之各個EMM-U須被視為EMM頻道。Different EMM channels can be used even in the case of a single address mode. For example, in a mobile phone, some messages can be sent as if they were multiplexed with video, while other messages can be sent at SMS. It is also possible that several users will receive the message. In the context of the present invention, each EMM-U sent to a user must be considered an EMM channel.

為了於發射器終端裝置與各個接收器終端裝置間開放的各個EMM頻道上維持常規資訊流量,根據本發明方法應用至全部類型的EMM頻道而與本頻道所支援之訊息類型無關。In order to maintain regular information traffic on each EMM channel that is open between the transmitter terminal device and each of the receiver terminal devices, the method according to the present invention applies to all types of EMM channels regardless of the type of message supported by the channel.

如同於標準CAS系統,操作員請求發送訊息予CAS系統。於本說明書之其餘部分,此等訊息將被稱作為「工作」。As with the standard CAS system, the operator requests to send a message to the CAS system. In the remainder of this manual, such information will be referred to as "work."

若無任何訊息係與任何EMM頻道相關聯,則EMM頻道仍然維持作用狀態:藉此方式,「功能中性」訊息將由CAS系統插入該頻道。功能訊息為具有有效語法設計來由受訊者終端裝置分析之訊息,但該訊息並未含有來自於操作員之任何資訊且特別並未含於該終端裝置處理之任何作動請求。If no message is associated with any EMM channel, the EMM channel remains active: in this way, a "functional neutral" message will be inserted into the channel by the CAS system. The function message is a message that has a valid grammar design for analysis by the respondent's terminal device, but the message does not contain any information from the operator and is not specifically included in any action request processed by the terminal device.

離開CAS系統之訊息流為由工作訊息或中性訊息所組成之訊息流。The flow of information leaving the CAS system is a stream of messages consisting of work messages or neutral messages.

第1圖示例說明工作訊息於獨立EMM頻道發送之情況下,根據本發明方法之主要步驟,個別EMM頻道具有其本身之「恆定內容」上下文於該串流。Figure 1 illustrates an example in which the individual EMM channel has its own "constant content" context for the stream in the case of a separate EMM channel transmission, in accordance with the main steps of the method of the present invention.

步驟2為發射器及接收器終端裝置之操作員先前配置之相位。本相位包含於個人串流之情況下,對於給定串流及對於給定使用者定義授權不活動狀態之最大持續時間。對此持續時間設定一內設值。Step 2 is the phase previously configured by the operator of the transmitter and receiver terminal devices. This phase is included in the case of a personal stream, the maximum duration for which a given stream is defined for a given stream and for a given user. Set a value for this duration.

須注意操作員可對於給定串流修改授權不活動狀態之最大持續時間。舉例言之,於對使用者之正直存疑之情況下,操作員可強迫要求於EMM頻道-U上接收當日訊息。It is important to note that the operator can modify the maximum duration of the authorization inactivity for a given stream. For example, in the case of doubts about the integrity of the user, the operator can force a request to receive the current day message on the EMM channel-U.

然後接收器終端裝置配置來對各個定址於該終端裝置之頻道接受若干訊息間之某個時間。The receiver terminal device is then configured to accept a certain time between the plurality of messages for each of the channels addressed to the terminal device.

於操作期間,於網路頭端於該發射器終端裝置實施電腦程式,執行步驟4之測試判定操作員是否期望發送一工作訊息予該接收器終端裝置。During operation, a computer program is executed at the head end of the network at the transmitter terminal device, and the test of step 4 is performed to determine whether the operator desires to send a work message to the receiver terminal device.

若經過確認,則於步驟6定義一工作訊息,及於步驟8該工作訊息發送至接收器終端裝置。然後處理程序由步驟4重複。If confirmed, a work message is defined in step 6, and in step 8 the work message is sent to the receiver terminal device. The process is then repeated by step 4.

若未經確認,則進行測試來判定於比步驟2定義的持續時間D更短的時間後,訊息是否已經發送至接收器。If not confirmed, a test is made to determine if the message has been sent to the receiver after a shorter time than the duration D defined in step 2.

若經過確認,則處理程序由步驟4重複。If confirmed, the processing is repeated by step 4.

若未經確認,則於步驟12定義之中性訊息發送(步驟8)至接收器終端裝置。If not confirmed, a neutral message transmission (step 8) is defined in step 12 to the receiver terminal device.

第2圖圖解示例說明允許從發射器終端裝置發送至接收器終端裝置之工作訊息檢測詐欺過濾之步驟。發現操作員可藉接收器終端裝置經由發送特定指令予該指定的接收器而活化或解除活化該工作訊息可能之過濾之檢測。Figure 2 illustrates the steps of a job message detection fraud filtering that allows for transmission from a transmitter terminal device to a receiver terminal device. It is found that the operator can activate or deactivate the detection of possible filtering of the work message by transmitting the specific command to the designated receiver by the receiver terminal device.

注意實施本檢測程序,操作員定義接收器連續兩次接收從發射器所發送之資料之分開持續時間DR,及於給定瞬間t,安裝於接收器終端裝置之軟體測量至接收器接收從發射器所發送之資料以來所經過之時間間隔TR,若該時間間隔TR係大於或等於持續時間DR,則發送一警報信號至對策管理單元。Note that in implementing this test procedure, the operator defines the receiver to receive the separate duration DR of the data transmitted from the transmitter twice, and at a given instant t, the software measurement installed at the receiver terminal device is received from the receiver. The time interval TR elapsed since the data sent by the device, if the time interval TR is greater than or equal to the duration DR, sends an alarm signal to the countermeasure management unit.

本實例中,對策管理單元係嵌合於接收器終端裝置,因此該終端裝置並未發送任何資訊至網路頭端。In this example, the countermeasure management unit is embedded in the receiver terminal device, so the terminal device does not send any information to the network headend.

於步驟20,操作員發送指令至接收器來作動詐欺過濾的檢測。In step 20, the operator sends an instruction to the receiver to actuate the detection of fraud filtering.

於步驟22,安裝於接收器終端裝置之軟體測量透過該頻道發送兩個連續訊息間之時間,且於步驟24比較於持續時間DR測量得之時間。In step 22, the software installed in the receiver terminal device measures the time between two consecutive messages transmitted through the channel, and in step 24 compares the time measured in the duration DR.

若時間間隔TR係大於持續時間DR,則接收器終端考慮嘗試詐欺過濾,且發送本警報予對策管理單元(步驟26),及對策管理單元應用制裁(步驟30)。If the time interval TR is greater than the duration DR, the receiver terminal considers attempting fraud filtering, and transmits the alert to the countermeasure management unit (step 26), and the countermeasure management unit applies the sanction (step 30).

制裁包含當讀取一多體內容時不再處理ECM訊息,使得該多媒體內容無法解碼。The sanction includes not processing the ECM message when reading a multi-body content, such that the multimedia content cannot be decoded.

另一項制裁包含刪除於接收器終端裝置之保全處理器中之全部運算金鑰及全部權利內容。Another sanction includes the deletion of all operational keys and all entitlements in the security processor of the receiver terminal device.

於第一變化法中,對策管理單元係於從接收器發送預定數目N至警報信號之該對策管理單元後才應用制裁程序。In the first variation method, the countermeasure management unit applies the sanction procedure after transmitting the predetermined number N to the countermeasure management unit of the alarm signal from the receiver.

於第二變化法中,對策管理單元根據所記錄的警報信號數目來漸進選擇欲應用的對策程序。對策例如包含於兩次警報信號中後不再處理ECM,或甚至於十次警報信號後刪除保全處理器的權利及運算金鑰。In the second variation method, the countermeasure management unit progressively selects the countermeasure program to be applied based on the number of recorded alarm signals. The countermeasure is included, for example, after the two alarm signals are received, and the ECM is no longer processed, or even after ten alarm signals, the rights and operation keys of the security processor are deleted.

若時間間隔TR比持續時間DR更短,於步驟28,安裝於接收器終端裝置之軟體將執行於工作訊息中發送的命令。If the time interval TR is shorter than the duration DR, in step 28, the software installed in the receiver terminal device will execute the command sent in the work message.

注意藉接收器終端裝置執行之處理係根據下列步驟進行:Note that the processing performed by the receiver terminal device is performed according to the following steps:

-當被切換為on時或於待機狀態經歷一段時間後啟動時,該終端裝置等候EMM訊息,- the terminal device waits for an EMM message when it is switched to on or when it is started in a standby state for a period of time,

-當接收到EMM訊息時,也如同先前技術處理,而與該EMM訊息為工作訊息或功能中性訊息無關。- When an EMM message is received, it is also handled as in the prior art, regardless of whether the EMM message is a work message or a function neutral message.

於訊息之詐欺過濾檢測被活化之情況下,處理經修改,因此當接收到EMM訊息時,EMM訊息之日期(發射或接收)被記憶,或預期下次發射或接收EMM訊息之最大日期經計算作為先前日期與無活性之最大持續時間之和,然後記憶;以及當接收EMM訊息時,若計算得之日期係大於先前記憶的用於發送或接收EMM訊息之日期達超過不作用狀態之最大持續時間,或若此日期係大於先前記憶的下次發送或接收EMM訊息之最大期望日期,則該終端裝置記憶該訊息過濾之檢測。In the case where the scam filter detection of the message is activated, the process is modified so that when the EMM message is received, the date (transmission or reception) of the EMM message is memorized, or the maximum date of the next transmission or reception of the EMM message is expected to be calculated. As the sum of the previous date and the maximum duration of inactivity, and then remember; and when receiving the EMM message, if the calculated date is greater than the previous memory used to send or receive the EMM message, the date exceeds the maximum duration of the inactive state. The time, or if the date is greater than the maximum expected date of the next memory to transmit or receive the EMM message, the terminal device memorizes the detection of the message filtering.

須注意工作訊息及中性訊息之處理時間不允許訊息類型有缺點。It should be noted that the processing time of the work message and the neutral message does not allow the message type to be defective.

於本發明之第三變化法中,對策管理單元係安裝於網路頭端且由操作員控制。於此種情況下,對策程序包含配置發射器終端裝置發送於制裁EMM訊息定址於該接收器終端裝置。此EMM制裁訊息係由接收器終端裝置處理,指示當存在有若干對策時應應用哪一個對策。In the third variation of the present invention, the countermeasure management unit is installed at the head end of the network and is controlled by an operator. In this case, the countermeasure program includes configuring the transmitter terminal device to transmit the sanction EMM message to the receiver terminal device. This EMM sanction message is processed by the receiver terminal device to indicate which countermeasure should be applied when there are several countermeasures.

本發明特別於EMM頻道功能或全部頻道共同選擇性實施或於欲廣播之工作訊息本質功能選擇性實施。The invention is particularly selectively implemented in conjunction with EMM channel functions or all channels or selectively implemented on the essential functions of the work message to be broadcast.

2-12...步驟2-12. . . step

20-30...步驟20-30. . . step

第1圖表示一大致流程圖顯示根據本發明之方法之主要步驟。Figure 1 shows a general flow chart showing the main steps of the method according to the invention.

第2圖以圖解表示一流程圖顯示藉根據本發明之終端裝置檢測訊息之過濾。Fig. 2 is a diagram showing a flow chart showing the filtering of a message detected by a terminal device according to the present invention.

2-12...步驟2-12. . . step

Claims (16)

一種用於從發射器發射至接收器之保全資料之串流的保護方法,其特徵在於其包括插入中性資料到該串流中並與該保全資料相交替地,週期性地發射該中性資料予該接收器,以防止該保全資料之過濾,該方法進一步包含下列步驟:- 定義由該接收器接收到該發射器發射之資料之兩次連續接收間分隔之持續時間(DR),以及- 於一給定瞬間(t),測量自該接收器接收到該發射器所發射之資料起所經過的時間間隔(TR),- 若該時間間隔(TR)大於該持續時間(DR),則發送一警報信號至一對策管理單元。 A method of protecting a stream of security data transmitted from a transmitter to a receiver, characterized in that it comprises inserting neutral data into the stream and alternately with the security data, periodically transmitting the neutral Information is provided to the receiver to prevent filtering of the preservation data, the method further comprising the steps of: - defining a duration (DR) of the separation between two consecutive receptions of the data transmitted by the transmitter received by the receiver, and - measuring the time interval (TR) elapsed since the receiver received the data transmitted by the transmitter at a given instant (t), - if the time interval (TR) is greater than the duration (DR), Then send an alarm signal to a countermeasure management unit. 如申請專利範圍第1項之方法,其中該中性資料之發射係於從該發射器末次發射資料至該接收器算起的一預定時間後觸發。 The method of claim 1, wherein the transmission of the neutral data is triggered after a predetermined time from the last transmission of the data by the transmitter to the receiver. 如申請專利範圍第1項之方法,其中該中性資料具有與該保全資料之結構類似的一結構。 The method of claim 1, wherein the neutral material has a structure similar to the structure of the security data. 如申請專利範圍第1項之方法,其中更包含下列步驟:包含計數由該接收器發送至該對策管理單元之警報信號數目(N),及將該數目(N)記憶於該對策管理單元中。 The method of claim 1, further comprising the steps of: counting the number of alarm signals (N) sent by the receiver to the countermeasure management unit, and storing the number (N) in the countermeasure management unit . 如申請專利範圍第4項之方法,其中進一步包含下列步驟:- 定義表示用於觸發制裁之一臨界值之警報信號數目(SA); - 比較該數目(SA)與記憶於該對策管理單元中之數目(N);以及- 若該數目(N)大於該數目(SA),則進行一對策程序。 The method of claim 4, further comprising the steps of: - defining a number of warning signals (SA) indicating a threshold for triggering the sanctions; - comparing the number (SA) with the number (N) stored in the countermeasure management unit; and - if the number (N) is greater than the number (SA), performing a countermeasure procedure. 如申請專利範圍第5項之方法,其中該對策程序係由該接收器於本地啟動(activated)。 The method of claim 5, wherein the countermeasure program is locally activated by the receiver. 如申請專利範圍第5項之方法,其中該對策程序係由一發射器於遠端啟動(activated)。 The method of claim 5, wherein the countermeasure program is activated remotely by a transmitter. 如申請專利範圍第6或7項之方法,其中該對策程序包含短暫地或永久地懸置該接收器的操作。 The method of claim 6 or 7, wherein the countermeasure program comprises an operation of suspending the receiver briefly or permanently. 如申請專利範圍第1至7項中任一項之方法,其中該保全資料及該中性資料係於EMM(權利管理訊息)訊息中發送至該接收器。 The method of any one of claims 1 to 7, wherein the security information and the neutral data are sent to the receiver in an EMM (Entitlement Management Message) message. 如申請專利範圍第9項之方法,其中該保全資料及該中性資料係經編碼。 The method of claim 9, wherein the preservation information and the neutral data are encoded. 如申請專利範圍第1至7項中任一項之方法,其中該保全資料及該中性資料係於進一步包含已編碼之影音節目之一資料串流中發送至該接收器。 The method of any one of claims 1 to 7, wherein the security information and the neutral data are transmitted to the receiver in a stream of data further comprising one of the encoded audio and video programs. 如申請專利範圍第9項之方法,其中該操作之短暫性或永久性懸置包含當讀取一多媒體內容時不再處理ECM(權利控制訊息)訊息。 The method of claim 9, wherein the transient or permanent suspension of the operation comprises no longer processing the ECM (Entitlement Control Message) message when reading a multimedia content. 一種發射器終端裝置,其安裝於營運商網路頭端並組配來根據申請專利範圍第12項之方法發送工作訊息之串流予一接收器終端裝置,其特徵在於其包含用以進行下 列動作之裝置:a)儲存於該串流中訊息連續兩次發送間之時間之最大持續時間(D),b)測量自末次發送訊息所經過之時間(T),c)若自末次發送訊息所經過之時間間隔(T)大於(或等於)該持續時間(D),則將中性資料插入該串流並發送至該接收器。 A transmitter terminal device installed at a head end of an operator network and configured to transmit a stream of work messages to a receiver terminal device according to the method of claim 12, characterized in that it is included for performing The device of the column action: a) the maximum duration (D) of the time between consecutive transmissions of the message stored in the stream, b) the time elapsed since the last message was sent (T), c) if sent from the last time When the time interval (T) elapsed by the message is greater than (or equal to) the duration (D), neutral data is inserted into the stream and sent to the receiver. 一種儲存於載體上之電腦程式,設計來於根據申請專利範圍第13項之發射器終端裝置上執行,以進行下列動作:a)儲存於該串流中訊息連續兩次發送間之時間之最大持續時間(D),b)測量自末次發送訊息所經過之時間(T),c)若自末次發送訊息所經過之時間間隔(T)大於(或等於)該持續時間(D),則將中性資料插入該串流並發送該中性資料至該接收器。 A computer program stored on a carrier, designed to be executed on a transmitter terminal device according to claim 13 of the patent application, to perform the following actions: a) the maximum time between consecutive transmissions of the message stored in the stream Duration (D), b) measure the time elapsed since the last message was sent (T), c) if the time interval (T) elapsed since the last message was sent is greater than (or equal to) the duration (D), then Neutral data is inserted into the stream and the neutral data is sent to the receiver. 一種接收器終端裝置,其組配來接收根據申請專利範圍第14項之發射器終端裝置發送之訊息,其特徵在於其包含用以進行下列動作之裝置:a)儲存於該串流中訊息連續兩次接收間之時間之最大持續時間(D),b)測量自末次接收訊息所經過之時間(T),c)若自訊息末次發送所經過之時間間隔(TR)大於或等於該持續時間(DR),則通知逾時予一對策管理單 元。 A receiver terminal device configured to receive a message transmitted by a transmitter terminal device according to claim 14 of the patent application, characterized in that it comprises means for performing the following actions: a) storing the message continuously in the stream The maximum duration (D) of the time between receptions, b) the time elapsed since the last message was received (T), c) if the time interval (TR) elapsed since the last transmission of the message is greater than or equal to the duration (DR), notify the timeout to a countermeasure management form yuan. 一種儲存於載體上之電腦程式,設計來於根據申請專利範圍第15項之接收器終端裝置上執行,以進行下列動作:a)儲存於該串流中訊息兩次連續接收間之時間之最大持續時間(DR)或等於該持續時間(D),b)測量於末次接收訊息後經過之時間間隔(TR),c)若自末次接收訊息所經過之時間間隔(TR)大於或等於該持續時間(DR),則通知逾時予對策行動單元。A computer program stored on a carrier, designed to be executed on a receiver terminal device according to claim 15 of the patent application, to perform the following actions: a) the maximum time between two consecutive receptions of the message stored in the stream Duration (DR) or equal to the duration (D), b) measure the time interval (TR) after the last message is received, c) if the time interval (TR) elapsed since the last message was received is greater than or equal to the duration Time (DR), the timeout is notified to the countermeasure action unit.
TW098124419A 2009-07-20 2009-07-20 Protection method for security data transmitted by a transmitter device to a receiver device TWI523474B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW098124419A TWI523474B (en) 2009-07-20 2009-07-20 Protection method for security data transmitted by a transmitter device to a receiver device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW098124419A TWI523474B (en) 2009-07-20 2009-07-20 Protection method for security data transmitted by a transmitter device to a receiver device

Publications (2)

Publication Number Publication Date
TW201105079A TW201105079A (en) 2011-02-01
TWI523474B true TWI523474B (en) 2016-02-21

Family

ID=44813872

Family Applications (1)

Application Number Title Priority Date Filing Date
TW098124419A TWI523474B (en) 2009-07-20 2009-07-20 Protection method for security data transmitted by a transmitter device to a receiver device

Country Status (1)

Country Link
TW (1) TWI523474B (en)

Also Published As

Publication number Publication date
TW201105079A (en) 2011-02-01

Similar Documents

Publication Publication Date Title
WO2021063068A1 (en) Operation and maintenance control and operation and maintenance analysis method and apparatus, system, and storage medium
KR101160346B1 (en) Remote control method enabling a user to control the operation of a receiving unit
RU2506704C2 (en) Managing confidentiality for monitored devices
US20150220707A1 (en) System and process for monitoring malicious access of protected content
KR101709417B1 (en) Security mode for mobile communications devices
US20090220088A1 (en) Autonomic defense for protecting data when data tampering is detected
CN105335654B (en) Android malicious program detection and processing method, device and equipment
CN103873243A (en) Method for realizing data security transmission, system, server and terminal
CN101617520B (en) A conditional access system
KR20090073169A (en) Method for detecting the abnormal use of a safety processor
US10339307B2 (en) Intrusion detection system in a device comprising a first operating system and a second operating system
CN112417391A (en) Information data security processing method, device, equipment and storage medium
CN108667802B (en) Method and system for monitoring power application network security
CN115499844A (en) Mobile terminal information safety protection system and method
CN117592041B (en) Data safety protection system
TWI452895B (en) Method for detecting an illicit use of a security processor
RU2523952C2 (en) Method of protecting security data transmitted by transmitter device to receiver device
CN109246148A (en) Message processing method, device, system, equipment and computer readable storage medium
TWI523474B (en) Protection method for security data transmitted by a transmitter device to a receiver device
CN105631290A (en) Safe file operation method and device as well as terminal
US20180307807A1 (en) Method for the identification of security processors
CN111417122A (en) Attack prevention method and device
KR101706021B1 (en) Method for detecting call recording
CN110830479A (en) Multi-card-based one-key login method, device, equipment and storage medium
CN113672925B (en) Method and device for preventing lux software attack, storage medium and electronic equipment

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees