WO2006012788A1 - Procede d'autorisation d'abonnes et systeme d'autorisation - Google Patents

Procede d'autorisation d'abonnes et systeme d'autorisation Download PDF

Info

Publication number
WO2006012788A1
WO2006012788A1 PCT/CN2005/001092 CN2005001092W WO2006012788A1 WO 2006012788 A1 WO2006012788 A1 WO 2006012788A1 CN 2005001092 W CN2005001092 W CN 2005001092W WO 2006012788 A1 WO2006012788 A1 WO 2006012788A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
key
authorization
dynamic
lifetime
Prior art date
Application number
PCT/CN2005/001092
Other languages
English (en)
French (fr)
Inventor
Jinming Liu
Degang Ju
Junling Hu
Yonghong Xu
Jun Yao
Original Assignee
Huawei Technologies Co., Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co., Ltd. filed Critical Huawei Technologies Co., Ltd.
Publication of WO2006012788A1 publication Critical patent/WO2006012788A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/16Analogue secrecy systems; Analogue subscription systems
    • H04N7/167Systems rendering the television signal unintelligible and subsequently intelligible
    • H04N7/1675Providing digital key or authorisation information for generation or regeneration of the scrambling sequence
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/234Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
    • H04N21/2347Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving video stream encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/258Client or end-user data management, e.g. managing client capabilities, user preferences or demographics, processing of multiple end-users preferences to derive collaborative data
    • H04N21/25866Management of end-user data
    • H04N21/25875Management of end-user data involving end-user authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/266Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel
    • H04N21/26613Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel for generating or managing keys in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/41Structure of client; Structure of client peripherals
    • H04N21/418External card to be used in combination with the client device, e.g. for conditional access
    • H04N21/4181External card to be used in combination with the client device, e.g. for conditional access for conditional access
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
    • H04N21/4405Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/60Network structure or processes for video distribution between server and client or between remote clients; Control signalling between clients, server and network components; Transmission of management data between server and client, e.g. sending from server to client commands for recording incoming content stream; Communication details between server and client 
    • H04N21/63Control signaling related to video distribution between client, server and network components; Network processes for video distribution between server and clients or between remote clients, e.g. transmitting basic layer and enhancement layers over different transmission paths, setting up a peer-to-peer communication via Internet between remote STB's; Communication protocols; Addressing
    • H04N21/633Control signals issued by server directed to the network components or client
    • H04N21/6332Control signals issued by server directed to the network components or client directed to client
    • H04N21/6334Control signals issued by server directed to the network components or client directed to client for authorisation, e.g. by transmitting a key
    • H04N21/63345Control signals issued by server directed to the network components or client directed to client for authorisation, e.g. by transmitting a key by transmitting keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/16Analogue secrecy systems; Analogue subscription systems
    • H04N7/173Analogue secrecy systems; Analogue subscription systems with two-way working, e.g. subscriber sending a programme selection signal
    • H04N7/17309Transmission or handling of upstream communications
    • H04N7/17318Direct or substantially direct transmission and handling of requests

Definitions

  • the present invention relates to cable television technology in the field of broadcast television, and more particularly to a user authorization method and authorization system.
  • CAS Conditional Access System
  • the front end (He, Head End) of the broadcast television network scrambles the television program data to be sent to the user, and then authorizes the program that the user can watch, and authorizes the processed authorization data to be encrypted. Transfer to the end user;
  • FIG. 1 the figure is a schematic diagram of a prior art implementation of performing descrambling and encryption and decryption processing on a television program in a broadcast television network; the process of adding descrambling processing and encryption and decryption processing on television program data is as follows:
  • the scrambler uses the control word (CW, Control Words) After the television program data is multiplexed, the transport stream (TS, Transport Stream) is scrambled and can be expressed as:
  • the front end HE 10 also uses the service key (SK, Service Key) to encrypt the control word CW to form the authorization control information (ECM).
  • ECM authorization control information
  • the control word CW encapsulated by the service key SK is encapsulated and transmitted in the ECM, wherein the ECM further includes information such as a program source, a content classification, and a program charging price;
  • the front-end HE 10 encrypts the service key SK by using the user's personal distribution key (PDK, Personal Distribute Keyword) according to the authorization information when the user registers, to form an Entitlement Management Message (EMM).
  • PKI personal distribution key
  • EMM Entitlement Management Message
  • the service key SK encrypted by the personal distribution key PDK is encapsulated and transmitted in the medium, and the EMM further includes the address information of the receiver, the authorization information of the user, and the time period information of the television program that the user can watch.
  • the above EMM data is mainly generated for the user, the ECM data is mainly generated for the TV program data, and the generated ⁇ data and the ECM data are multiplexed with the TV program data in the transport stream TS through the fiber-optic coaxial hybrid cable network (HFC) , Hybrid Fiber-Coaxial ) is transmitted to the client.
  • HFC fiber-optic coaxial hybrid cable network
  • Hybrid Fiber-Coaxial Hybrid Fiber-Coaxial
  • the set-top box (STB) 20 of the user terminal After receiving the transport stream TS sent from the front end HE 10 of the broadcast television network, the set-top box (STB) 20 of the user terminal uses the user registration authorization data stored in the smart card to perform the following on the transport stream TS. Decryption and descrambling processing:
  • the STB 20 filters out the ECM data and the EMM data from the transport stream TS;
  • the smart card reads the personal distribution key PDK in the authorization data stored by itself, using the PDK Decrypt the EMM data to obtain the service key SK, which can be expressed as:
  • the smart card uses the obtained business key SK to decode the ECM data to obtain the control word CW, which can be expressed as:
  • the smart card sends the obtained CW to the STB's descrambling engine through the corresponding interface;
  • the set-top box STB 20's descrambling engine uses the control word CW to descramble the transport stream TS that has been scrambled to obtain the plaintext form of the television program data, which can be expressed as:
  • the original audio and video image information can be restored and played back to the user for viewing.
  • the above-mentioned CAS technology can realize encryption, decryption and descrambling processing of television program data, so as to drive the user to pay for the television program that he or she watches, thereby realizing the service that the broadcast television operator can provide for itself.
  • the user's authorization data (mostly the personal distribution key PDK) is stored in the smart card held by the user, which is easy to cause the criminals to use various methods to legally be driven by economic interests.
  • the smart card held by the user is cloned (including the copying of the personal distribution key PDK), and then the cloned smart card is sold in large quantities through illegal channels to obtain huge profits, which leads to the loss of a large number of customers of the broadcast and television operators, resulting in incalculable economic losses.
  • the broadcast TV operator cannot know whether the user is online or not, so the legality and uniqueness of the user identity cannot be authenticated, so even if a large number of illegally held Operators with the same identity information of smart cards can watch TV programs online at the same time, and operators can't do anything about it.
  • the present invention proposes a user authorization method and an authorization system thereof to solve the problem that a large number of illegal users existing in a conventional broadcast television system use a cloned smart card to watch a television program due to imperfection of the authorization technology.
  • the present invention provides a user authorization method, including the steps:
  • step (3) checking whether the lifetime of the dynamic personal key reaches the end time, if it is to continue step (3); otherwise, proceeding to step (4);
  • step (3) updating the dynamic personal key whose lifetime reaches the end time, and returning to step (2); (4) the front end performs encryption, scrambling and authorization processing on the transport stream based on the dynamic personal key, and the user terminal is based on The dynamic personal key performs decryption and descrambling processing on the scrambled transport stream.
  • the lifetime of the dynamic personal key is checked by a periodic rule.
  • the step (2) specifically includes the following steps:
  • the step (3) further includes surviving the dynamic personal key before updating the dynamic personal key.
  • the step of the user end of the period to perform identity authentication, if the authentication continues by updating the dynamic personal key processing, otherwise it ends.
  • the lifetime of checking the dynamic personal key in the step (2) is completed by the front end.
  • the step (3) of performing identity authentication on the client end of the dynamic personal key lifetime includes the following steps:
  • the front end sends an authentication indication command to the user end of the dynamic personal key lifetime, and instructs the user end to perform identity authentication on the front end;
  • the client uploads its own identification information to the front end;
  • the front end authenticates the user end according to the identification information of the user end.
  • the step (31) also includes the step of determining whether the user end of the dynamic personal key lifetime is online.
  • the lifetime of checking the dynamic personal key in the step (2) is completed by the user.
  • the step (3) of performing identity authentication on the client end of the dynamic personal key lifetime includes the following steps:
  • the front end authenticates the user end according to the identification information of the user end.
  • the step (3) of updating the dynamic personal key specifically includes:
  • the front end encrypts the updated dynamic personal key by using the personal distribution key shared with the client, and sends the updated dynamic personal key to the client;
  • the client decrypts the encrypted dynamic personal key data by using the personal distribution key stored in the user identity module to obtain an updated dynamic personal key.
  • the front end of the broadcast television network transmits the encrypted dynamic personal key data to the user through a wired transmission line of the wired communication network or a wireless transmission line of the wireless communication network.
  • the user end identification information includes:
  • the process of performing encryption, scrambling, and authorization processing on the transport stream based on the dynamic personal key in the step (4) specifically includes:
  • the front end uses a control word to perform scrambling processing on the transport stream
  • the process of performing decryption and descrambling processing on the key to the scrambled transport stream specifically includes:
  • the user end decrypts the authorization management information by using a dynamic personal key to obtain a service key
  • the present invention also provides a user authorization system including a front end for broadcasting a program stream and a client for receiving a program stream, the user terminal including a set top box for processing program stream information and for storing a user A user identification module for authorizing data, the system further comprising:
  • the two-way communication module is connected to the two-way communication line, and is configured to perform identity authentication processing on the user end according to the identification information uploaded by the user end, and update the user authorization data of the user end after the authentication is passed, and send the updated user authorization data to the The two-way communication module of the client.
  • the two-way communication module realizes connection with the set top box by being disposed inside the set top box.
  • the two-way communication module is a wireless communication module, and is connected to the authentication server through a wireless transmission line of a wireless communication network;
  • the two-way communication module is a wired communication module, and is connected to the authentication server through a wired transmission line of a wired communication network.
  • the present invention can achieve the following beneficial effects: Since the user authorization method based on the broadcast television network of the present invention sets the dynamic personal key separately at the front end and the user end, the front end and the user end perform encryption, decryption and descrambling processing on the transport stream based on the dynamic personal key, and are in dynamic personal secret.
  • the dynamic personal key is updated in time, so that the time limit of the dynamic personal key can limit the effective time of the illegal user to clone the smart card, which makes the operation difficulty for the illegal user to clone the smart card, thereby reducing the operation difficulty.
  • Illegal users use cloned smart cards to watch TV programs, while reducing the economic losses caused by operators to maintain smart cards.
  • the user authorization system based on the broadcast television network of the present invention has a two-way communication module at the user end, and an authentication server is provided at the front end, the authentication server and the two-way communication module are connected through a bidirectional transmission line, so that the broadcast television network can be realized.
  • the front end and the user end mutually transmit the user identification information and the dynamically updated user authorization data, thereby providing a platform for the front end to dynamically update the user authorization data of the user end, thereby reducing the probability that the illegal user uses the cloned smart card to watch the television program, and Reduce the economic losses caused by operators to maintain smart cards.
  • FIG. 1 is a schematic diagram showing the principle of implementing descrambling and encryption and decryption processing on a television program in a broadcast television network in the prior art
  • FIG. 2 is a block diagram showing the basic structure of a user authorization system based on a broadcast television network according to the present invention
  • FIG. 3 is a flow chart showing a basic implementation principle of a user authorization method based on a broadcast television network according to the present invention
  • FIG. 4 is a schematic diagram of a process of performing identity authentication processing on a client by a front end in the user authorization method based on the broadcast television network of the present invention
  • FIG. 5 is a schematic diagram of a process of performing identity authentication processing on a client by a user terminal in a method for authorizing a user of a broadcast television network according to the present invention.
  • the user authorization method based on the broadcast television network and the authorization system thereof are designed to: replace the smart card in a manner that is invisible to the user during the normal operation of the broadcast television network (the smart card is only the user identification module) a special case to illustrate the requirements of the present invention
  • the scope of protection is described below with a user identification module, wherein the existing smart card in the prior art is a user authorization data stored in a typical example of the user identification module described herein, thereby reducing illegal elements.
  • the user authorization method based on the broadcast television network and the authorization system thereof are only relative to the prior art, and can reduce the probability of the illegal user cloning the user identity recognition module, and cannot fundamentally prevent the user identity recognition module from being illegally cloned. possibility.
  • FIG. 2 is a block diagram showing the basic structure of a user authorization system based on a broadcast television network according to the present invention, wherein the user authorization system works as follows: Since the current broadcast television network is composed of a front end HE 2 for a broadcast program stream and a user terminal for receiving a program stream, wherein the user terminal generally includes a set top box 4 for processing program stream information and a user identity recognition module 5 for storing user authorization data and user identity information, and currently the broadcast network The working mode is that the front end HE 2 unidirectionally broadcasts program stream information to all the users through the broadcast channel, and the user terminal cannot send the reverse communication information to the front end HE 2 through the broadcast channel, so the broadcast television is added.
  • the two-way authentication function between the front end of the network, HE 2 and the client needs to be set as follows:
  • a two-way communication module 3 connected to the set top box 4 at the user end for uploading the user end identification information to the front end HE 2, and also for receiving updated user authorization data sent by the front end HE 2; wherein the two-way communication module 3 can be connected to the set top box 4 by being disposed inside the set top box 4, thus forming a set top box with the function of the interactive communication module; of course, the two-way communication module 3 can also be realized with the set top box 4 by being disposed outside the set top box 4.
  • an authentication server 1 is set up on the front end HE 2 of the broadcast television network, and the set authentication server 1 and the two-way communication module 3 on the user side are connected by a bidirectional transmission line, which is used for the identification information uploaded according to the user end.
  • the user end performs identity authentication processing, and updates the user authorization data of the user end after the authentication is passed, and sends the updated user authorization data to the Han direction communication module 3 of the user end.
  • the authentication server 1 and the client set top box 4 for connecting the front end of the broadcast television network may be a wireless transmission line, such as a wireless transmission channel in a GSM communication network or a wireless transmission channel in a 3G communication network, etc., at this time, the two-way communication module 3 is A wireless communication module having a wireless communication function; or a wired transmission line, such as a wired transmission channel in a PSTN communication network or a wired transmission channel (ie, a Cable channel) in a broadcast television network, etc., at this time, the two-way communication module 3 For wired communication modules.
  • the front end HE 2 of the broadcast television network can broadcast the transport stream TS to the set top box 4 of all the users through the one-way broadcast channel, and the user needs to go to the front end HE 2 for identity authentication.
  • the two-way communication module 3 can be used to upload its own identification information to the authentication server 1 on the front-end HE 2 side through the two-way transmission line, and the authentication server 1 authenticates the identity of the user end and authenticates the identity of the user end.
  • the user authorization data to be updated is sent to the two-way communication module 3 on the user side through the Hanxian transmission line between the authentication server 1 and the two-way communication module 3, and the updated information received by the user terminal according to the two-way communication module 3 is received.
  • the user authorizes the data to update the authorization data of the user.
  • the present invention also proposes a user authorization method based on a broadcast television network, which is explained in detail below.
  • FIG. 3 the figure is a flowchart of a basic implementation principle of a user authorization method based on a broadcast television network according to the present invention; the basic implementation process is as follows:
  • Step S10 setting a dynamic personal key with a lifetime (DPK, Dynamic Persona l
  • the front end of the broadcast television network sets a DPK for each user.
  • the DPK has a lifetime and needs to be updated after it has survived for a period of time; among them, the DPK, front end and each user are set.
  • the user side shares the DPK, that is, for each user, the front end stores the DPK set for the user, and the user terminal also stores the DPK of the setting.
  • the user will store the set DPK in the user identity carried by the user. Identify the module.
  • Step S20 detecting whether the DPK of each user reaches the lifetime thereof, wherein the DPK lifetime of each user may be checked by using a periodic rule. If a user's DPK reaches its lifetime, step S30 is performed; otherwise, the step is performed. S60; wherein the method for determining whether each DPK reaches its lifetime may be as follows: 1) Pre-set a fixed duration value (such as 1 hour);
  • the front end of the broadcast network may be selected to check the lifetime of each DPK; or the client of the broadcast network may choose to check the lifetime of each DPK.
  • Step S30 The front end of the broadcast television network authenticates the user end of the DPK lifetime.
  • the front end can authenticate the ID information of the user end to determine whether the identity of the user end is legal.
  • the front end can pass the user.
  • the ID of the set-top box is authenticated to determine whether the user is a legitimate user.
  • the user identity information stored in the user ID module can be authenticated to determine whether the user is a legitimate user.
  • the secure authentication mode is to determine whether the client is a legitimate user by binding the identification information of the set-top box ID of the authentication client to the user identity information stored in the user identity module.
  • Step S40 If the front end authenticates the user end, step S50 is performed, otherwise, the process ends, and the next DPK lifetime detection is performed.
  • Step S50 After updating the DPK whose lifetime has arrived, the front end of the broadcast television network arrives at the end program, and waits for the next DPK lifetime detection.
  • the process of updating the DPK arriving at the lifetime of the broadcast television network front end is as follows:
  • the front end utilizes the personal distribution key PDK shared with the client (wherein the PDK is the static personal authorization data assigned by the network operator when the user registers with the network, and the PDK also stores the user identity held by the front end and the user end respectively.
  • the updated dynamic personal key DPK is encrypted and sent to the user end;
  • the client decrypts the encrypted dynamic personal key data by using the personal distribution key PDK stored in the user identification module to obtain the updated dynamic personal key DPK.
  • the security of the updated DPK can be ensured, and the DPK data of the encrypted processing can be selected and transmitted to the user through the wired transmission line of the wired communication network or the wireless transmission line of the wireless communication network.
  • the security is also better guaranteed; of course, the broadcast channel (Cable channel) can also be used to transmit the encrypted DPK data to the client, but the security of the transmitted data is slightly less secure.
  • Step S60 The front end of the broadcast television network performs encryption, scrambling, and authorization processing on the transport stream TS based on the dynamic personal key DPK, and correspondingly, the user end transmits the scrambled transmission through the broadcast channel to the front end based on the shared dynamic personal key DPK.
  • the stream TS performs decryption and descrambling processing to obtain the descrambled TS, and then the set-top box of the user end demultiplexes and decodes the descrambled TS to display to the user for viewing, and then reaches the end program, waiting for execution.
  • One-time DPK lifetime detection One-time DPK lifetime detection.
  • the process of encrypting, scrambling and authorizing the transport stream TS to be sent to the set-top box of the client based on the dynamic personal key DPK at the front end of the broadcast television network is as follows:
  • the front end of the broadcast television network uses the control word CW to scramble the transport stream TS to obtain the scrambled transport stream TS, which can be expressed as: TS + CW -> TS,;
  • the front end reuses the service key SK encrypts the control word CW to obtain the authorization control information ECM, which can be expressed as: CW+S -> ECM;
  • the front end uses the dynamic personal key DPK to encrypt the service key SK to obtain the authorization management information EMM, which can be expressed as: SK + DPK -> EMM;
  • the broadcast television network user terminal performs decryption and descrambling processing on the received scrambled transport stream TS based on the dynamic personal key DPK as follows:
  • the UE sends the received ECM and EMM data to the user identification module, and the user identity module decrypts the EMM through the DPK stored by itself, and obtains SK, which can be expressed as: EMM + DPK -> SK;
  • the user identification module of the user end decrypts the ECM by using the obtained SK, and obtains
  • CW can be expressed as: ECM + SK -> CW;
  • the user identification module of the user end feeds the obtained CW to the set top box of the user end, and the descrambling engine in the set top box uses the obtained CW to perform descrambling processing on the scrambled transmission stream TS to obtain a transport stream TS, which can be expressed as: TS , + CW->TS.
  • a transport stream TS which can be expressed as: TS , + CW->TS.
  • the work key is updated to complete the update of the user authorization data stored in the user identification module; when the DPK is transmitted on the two-way transmission line, the user's personal distribution key (PDK) is used to encrypt the data.
  • the key system becomes four layers, as follows:
  • the three-layer encryption system is used for encryption and scrambling processing of the transport stream
  • This layer of encryption is used for the encryption process of the dynamic personal key DPK update transmission, wherein the EMM2 is preferably transmitted using the Han transmission line.
  • the process of authenticating the user end by the front end of the broadcast television network may be initiated by the front end or by the user end. The following two cases are described in detail.
  • FIG. 4 is a schematic diagram of a process for performing identity authentication processing on a user end initiated by a front end in the user authorization method based on the broadcast television network of the present invention
  • the processing procedure is as follows: Step S100, front end detection of the broadcast television network
  • the DPK of each client can be performed once by the periodic rule. Round check operation;
  • Step S110 the front end determines whether the detected DPK lifetime of the user arrives, and if so, step S130 is performed, otherwise step S120 is performed;
  • Step S120 the front end again determines whether the detected DPK distance of the user is less than 1 hour, if it is step S130, otherwise proceeds to step S195;
  • Step S130 the front end determines whether the user whose DPK has reached the lifetime is online. If yes, step S140 is performed; otherwise, the process goes to step S195; wherein the method for determining whether the user who has reached the lifetime of the DPK is online is as follows:
  • the front-end user who passed the last authentication will default to this user as an online user, and for each The user saves a status variable about whether it is online, until the next time the authentication process is unsuccessful or the authentication fails, the front end will determine that the current user is offline.
  • Step S140 The front end sends an authentication indication command to the UE that has reached the DPK lifetime.
  • step S150 after receiving the authentication indication command sent by the front end, the UE sends its own identification information to the front end through the Han transmission line.
  • the identifier information uploaded by the user terminal may be the ID identification information of the UE set-top box, or may be the user identity information stored in the user-side user identity module, or may be the set-top box ID identifier information and the user stored in the user identity module. Binding relationship of identity information;
  • Step S160 The front end uses the authentication server to perform authentication processing on the identity according to the identifier information sent by the user terminal.
  • Step S170 the front end determines whether the identity authentication of the user end passes according to the authentication result of step S160, if the authentication passes the step S180, otherwise proceeds to step S195;
  • Step S180 the front end updates the DPK whose lifetime is reached, and encrypts the updated DPK by using the PDK shared by the front end and the user end, that is, DPK + PDK->EMM2, obtains the encrypted data EMM2, and then sends the EMM2 to the corresponding user terminal;
  • Step S190 After receiving the encrypted data EMM2 sent by the front end, the user set-top box sends the encrypted data EMM2 to the user identification module, and the user identification module decrypts the EMM2 data by using the PDK stored by the user, and obtains the updated DPK, and Storage, its decryption process can be expressed as: EMM2 + PDK -> DPK;
  • Step S195 the front end determines whether the operation of detecting the DPK of each user reaches its lifetime is completed, that is, whether the DPK of each client has been detected, and if so, ends, waiting for the next round of each The operation of detecting the DPK lifetime of the UEs is performed; otherwise, the process returns to step S100 to continue to detect whether the lifetime of the DPK of the next user arrives.
  • Step S200 The user terminal sets its own set top box STB After booting, the client will automatically check its DPK lifetime; the client can check its DPK lifetime by using the periodic rule; in step S210, the client determines whether its DPK has reached its lifetime, and if yes, step S230 is performed. Otherwise, step S220 is performed; Step S220, the UE determines again whether the value of its own DPK is less than 1 hour from its lifetime arrival time. If yes, step S230 is performed; otherwise, it ends to wait for the detection of whether the next DPK lifetime arrives;
  • Step S230 in order to prevent the front-end authentication server from being overloaded, so that the user terminal is overloaded during the STB that has a large number of DPKs to reach the lifetime, the user terminal here adopts a processing method of backing off for a period of time;
  • Step S240 After the backoff time expires, the user end uploads the identification information of the user to the front end through the two-way transmission line, where the identifier information uploaded by the user end may be the ID identification information of the user set top box, or may be stored in the user end identification module.
  • the identifier information uploaded by the user end may be the ID identification information of the user set top box, or may be stored in the user end identification module.
  • User identity information may also be a binding relationship between the set-top box ID identification information and the user identity information stored in the user identity module;
  • Step S250 The front end uses the authentication server to perform authentication processing on the identity according to the identification information sent by the user end;
  • Step S260 The front end determines, according to the authentication result of step S250, whether the identity authentication of the user end passes, if the authentication passes the execution step S270, otherwise ends, to wait for the detection of whether the next DPK lifetime arrives;
  • Step S270 The front end updates the DPK whose lifetime is reached, and encrypts the updated DPK by using the PDK shared by the front end and the user end, that is, DPK + PD -> EMM2, obtains the encrypted data EMM2, and then sends the EMM2 to initiate authentication.
  • Client updates the DPK whose lifetime is reached, and encrypts the updated DPK by using the PDK shared by the front end and the user end, that is, DPK + PD -> EMM2, obtains the encrypted data EMM2, and then sends the EMM2 to initiate authentication.
  • Step S280 after receiving the encrypted data EMM2 sent by the front end, the user set-top box sends the encrypted data EMM2 to the user identification module, and the user identity recognition module decrypts the EMM2 data by using the PDK stored by the user, and obtains the updated DPK, and
  • the decryption process can be expressed as: EMM2 + PDK -> DPK; Then it ends, waiting for the next DPK lifetime to arrive.
  • the basic idea of the user authorization method based on the broadcast television network and the authorization system thereof is that the front end of the broadcast television network still uses the one-way broadcast channel (Cable channel) to broadcast the television program transmission stream TS, and is used alone.
  • the two-way communication module set in the client set-top box and the two-way transmission line set between the front end and the client end complete the identity authentication processing of the user end and the update processing of the dynamic personal key DPK; thereby realizing the periodic change of the dynamic individual
  • the key DPK is used to reduce the illegal user's use of the cloned user identity module to obtain illegal economic benefits.
  • the effective time for the illegal user to clone the user identity module can be effectively restricted, and the illegal user can clone the user identity.
  • the operational difficulty factor of the identification module is increased. At the same time, it also reduces the cost loss caused by the operator to maintain the entire user identity module system, because as long as the DPK of each user identity module is updated periodically, it is no longer necessary to partially clone the user identity module. It is also necessary to replace all actual physical user identification modules, so the economic cost will definitely be reduced.

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Databases & Information Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Graphics (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Description

用户授权方法及授权系统
技术领域
本发明涉及广播电视领域的有线电视技术, 尤其涉及一种用户授权 方法及授权系统。
背景技术 目前, 随着广播电视系统面向数字化、产业化的发展, 用户为自身收 看的电视节目内容付费已成为这一发展的必然, 而要实现用户为自身收 看的电视节目内容付费的目的, 首要解决的技术问题是应该对收看电视 节目的用户进行有效管理。
条件接收系统(CAS, Condi t iona l Acces s Sys tem )就是在现有广播 电视网中实施的用于对用户进行有效管理的方式之一, 而由 CAS技术实 现的对用户进行管理的主要过程如下:
广播电视网的前端( HE, Head End )对要发送给用户的电视节目数据 进行加扰处理, 然后再对用户能够收看的节目进行授权, 并且授权处理 后的授权数据还要进行加密处理后才能传送到最终用户端;
用户端接收到电视节目后,只有合法用户才能对加密处理的授权数据 进行解密, 得到相应的授权数据, 然后使用授权数据对加扰处理的电视 节目进行解扰处理, 以正常收看电视节目; 而非法用户或者没有正常接 收到自身授权数据的用户由于无法对加扰处理的电视节目进行解扰, 因 此就不能正常收看电视节目, 这样就到达了对用户收看的电视节目内容 进行控制和管理的目的, 进而驱使用户为自己所收看的电视节目内容进 行付费。
参照图 1,该图是现有技术在广播电视网中实现对电视节目进行加解 扰及加解密处理的原理示意图; 其对电视节目数据进行加解扰处理及加 解密处理的过程如下:
在广播电视网的前端 HE 10中进行如下操作:
1 )电视节目在播出前, 加扰器使用控制字(CW, Control Words )对 电视节目数据复用处理后传输流(TS, Transport Stream)进行加扰处 理, 可以表示为:
TS + CW -> TS';
2 ) CAS技术的核心实际上是对控制字 CW的传输进行控制, 因此在前 端 HE 10 中还要使用业务密钥 (SK, Service Key)对控制字 CW进行加 密处理, 形成授权控制信息(ECM, Entitlement Control Message ), 可 以表示为:
CW + S -> ECM;
其中由业务密钥 SK加密处理后的控制字 CW封装在 ECM中传送, 其 中 ECM中还包括节目来源、 内容分类和节目收费价格等信息;
3)前端 HE 10再根据用户注册时的授权信息, 使用用户的个人分配 密钥 (PDK, Personal Distribute Keyword )对业务密钥 SK进行加密处 理, 形成授权管理信息 ( EMM, Entitlement Management Message ), 可 以表示为:
SK + PDK -> EMM;
其中由个人分配密钥 PDK加密处理的业务密钥 SK封装在 中传送, EMM中还包括接收方地址信息、用户授权信息和用户可以收看的电视节目 时间段信息等。
其中上述的 EMM数据主要针对用户而生成, ECM数据主要针对电视节 目数据而生成, 生成的 ΕΝίΜ数据和 ECM数据与电视节目数据一起复用在 传输流 TS 里通过光纤同轴混合有线电视网络 ( HFC , Hybrid Fiber-Coaxial )传输到用户端。
用户端的机顶盒(STB, Set-Top Box) 20接收到广播电视网的前端 HE 10发来的传输流 TS后, 使用智能卡(Smart Card) 中存有的用户注 册授权数据对传输流 TS进行如下的解密及解扰处理:
4) STB 20从传输流 TS中过滤出 ECM数据和 EMM数据;
5 )通过智能卡的接口将 ECM数据和 EMM数据送到智能卡内部;
6)智能卡读取自身存有的授权数据中的个人分配密钥 PDK,利用 PDK 对 EMM数据进行解密, 得到业务密钥 SK, 可以表示为:
EMM + PDK -> S ;
7 )智能卡利用得到的业务密钥 SK对 ECM数据进行解码, 得到控制 字 CW, 可以表示为:
ECM + SK -> CW;
智能卡将得到的 CW通过相应接口发送给 STB的解扰引擎;
8 )机顶盒 STB 20的解扰引擎利用控制字 CW对进行了加扰处理的传 输流 TS进行解扰处理, 以得到电视节目数据的明文形式, 可以表示为:
TS, + CW -> TS;
解扰处理后的节目数据经过解复用和解调等处理后, 就可以恢复出 原始的音视频图像信息, 以播放给用户进行收看。
由此可见, 上述使用 CAS技术能够实现对电视节目数据进行加解密 及加解扰处理, 以驱使用户对自身收看的电视节目进行付费, 从而实现 了使广播电视运营商能够为自身提供的业务进行合理性收费的目的。
但是由于在用户端,用户的授权数据(最主要的是个人分配密钥 PDK ) 都保存在用户手持的智能卡中, 这样就容易导致在经济利益的驱使下, 不法分子可以采用各种方法对合法用户手持的智能卡进行克隆(包括对 个人分配密钥 PDK的复制), 再通过非法渠道大量出售克隆的智能卡以牟 取暴利, 从而导致了广播电视运营商大量客户的流失, 造成了不可估量 的经济损失:
因为传统的广播电视系统是一个单向传输的广播网络, 广播电视运 营商根本无法获知用户是否在线的情况, 因此就无法对用户身份的合法 性与唯一性进行鉴权, 所以即使大量持有非法智能卡的身份信息相同的 用户同时在线收看电视节目, 运营商也无能为力。
目前, 广播电视运营商为防止非法用户对智能卡进行克隆, 提供了 两种处理措施:
第一, 加强智能卡本身的物理安全, 以降低智能卡被克隆的可能性, 但是这种方式必将会增加智能卡的烧制成本; 第二,在发现智能卡被克隆后及时进行智能卡升级处理, 即更换智能 卡中存储的用户授权数据(最主要是更换个人分配密钥 PDK ), 以使非法 用户克隆的智能卡在进行了智能卡升级处理后, 不能再正常使用。 但是 这种处理方式却面临着即使一张智能卡被克隆, 广播电视运营商也要将 整个系统中的所有智能卡全部进行升级处理, 并更换全部用户端的智能 卡, 其主要原因在于运营商并不太容易知道哪些智能卡被克隆了, 而哪 些智能卡没有被克隆; 其次即使只有一张智能卡被克隆, 则其他智能卡 也存在被克隆的可能性, 因此必须更换整个智能卡系统才能避免这种风 险。 但是如果更换整个系统的所有智能卡, 也同样会增加运营商为升级 所有智能卡而带来的经济损失。
发明内容
本发明提出一种用户授权方法及其授权系统, 以解决现有广播电视系 统中因授权技术的不完善而存在的大量非法用户使用克隆智能卡收看电 视节目的问题。
为解决上述问题, 本发明提出了一种用户授权方法, 包括步骤:
( 1 )设置前端和用户端共享的具有生存期的动态个人密钥;
( 2 )检查所述动态个人密钥的生存期是否到达终止时间, 如果是继续 步骤(3 ); 否则转至步骤(4 );
( 3 ) 更新生存期到达终止时间的所述动态个人密钥后返回步骤(2 ); ( 4 ) 前端基于所述动态个人密钥对传输流实施加密、加扰及授权处理, 用户端基于所述动态个人密钥对加扰传输流实施解密及解扰处 理。
所述步骤(2 ) 中以周期规律检查动态个人密钥的生存期。
所述步骤(2 )具体包括如下步骤:
( 21 )设置一固定时长值;
( 22 )判断当前检测时间点距动态个人密钥生存期到达时间点的时长值 是否小于所述固定时长值, 如果是, 判定动态个人密钥的生存期 已到达; 否则判定未到达。
所述步骤(3 )在更新动态个人密钥之前还包括对动态个人密钥生存 期到达的用户端进行身份认证的步骤, 如果认证通过继续更新动态个人密 钥处理, 否则结束。
所述步骤(2 ) 中检查动态个人密钥的生存期是由前端完成。
所述步骤(3 )对动态个人密钥生存期到达的用户端进行身份认证的 过程具体包括步骤:
( 31 )所述前端发送认证指示命令到动态个人密钥生存期到达的用户端, 指示用户端到前端进行身份认证;
( 32 )用户端将自身标识信息上传到前端;
( 33 )前端根据用户端的标识信息对用户端进行身份认证。
所述步骤( 31 )之前还包括前端判断动态个人密钥生存期到达的用户 端是否在线的步骤。
所述步骤(2 ) 中检查动态个人密钥的生存期由用户端完成。
所述步骤(3 )对动态个人密钥生存期到达的用户端进行身份认证的 过程具体包括步骤:
( 3a )动态个人密钥生存期到达的用户端将自身标识信息上传到广播电视 网前端;
( 3b )前端根据用户端的标识信息对用户端进行身份认证。
所述步骤(3 ) 更新动态个人密钥的过程具体包括:
( 3-1 )前端利用与用户端共享的个人分配密钥对更新的动态个人密钥进 行加密后下发给用户端;
( 3-2 )用户端利用用户身份识别模块中存储的个人分配密钥对加密的动 态个人密钥数据进行解密, 得到更新的动态个人密钥。 所述步骤(3-1 ) 中广播电视网前端将加密后的动态个人密钥数据通 过有线通信网的有线传输线路或无线通信网的无线传输线路下发到用户 端。
所述用户端标识信息包括:
用户端机项盒的 ID标识信息; 或
用户端用户身份识别模块中存储的用户身份标识信息; 或
用户端机顶盒 ID标识信息和用户端用户身份识别模块中存储的用户 身份标识信息的绑定关系。
其中步骤(4 ) 中所述基于动态个人密钥对传输流实施加密、 加扰及 授权处理的过程具体包括:
( 41 ) 所述前端使用控制字对传输流进行加扰处理;
( 42 )使用业务密钥对控制字进行加密处理, 得到授权控制信息;
( 43 吏用动态个人密钥对业务密钥进行加密处理,得到授权管理信息; ( 44 )将授权控制信息和授权管理信息复用到传输流中下发到用户端; 所述基于动态个人密钥对加扰传输流实施解密及解扰处理的过程具 体包括:
( 45 )所述用户端使用动态个人密钥对授权管理信息进行解密处理, 得 到业务密钥;
( 46 )使用业务密钥对授权控制信息进行解密处理, 得到控制字;
( 47 )使用控制字对加扰传输流进行解扰处理。
相应地, 本发明还提出了一种用户授权系统, 包括用于广播节目流的 前端和用于接收节目流的用户端, 所述用户端包括用于处理节目流信息的 机顶盒和用于存储用户授权数据的用户身份识别模块, 所述的系统还包 括:
在所述用户端设置有与机顶盒连接的双向通信模块, 用于将用户端标 识信息上传到所述前端 , 并用于接收前端发来的更新的用户授权数据; 在所述前端设置有认证服务器, 与所述双向通信模块通过双向传输线 路连接, 用于根据用户端上传的标识信息对用户端进行身份认证处理, 并 在认证通过后更新用户端的用户授权数据, 并将更新的用户授权数据发送 到用户端的双向通信模块。
所述双向通信模块通过设置在机顶盒内部实现与机顶盒的连接。
所述双向通信模块为无线通信模块,通过无线通信网的无线传输线路 与所述认证服务器连接; 或
所述双向通信模块为有线通信模块,通过有线通信网的有线传输线路 与所述认证服务器连接。
本发明能够到达如下有益效果: 由于本发明基于广播电视网的用户授权方法通过在前端和用户端分 别设置动态个人密钥, 前端和用户端基于动态个人密钥对传输流实施加解 密及加解扰处理, 并在动态个人密钥的生存期到达时, 及时对动态个人密 钥进行更新, 这样由于动态个人密钥的定时更新就可以限制非法用户克隆 智能卡的有效时间, 为非法用户克隆智能卡带来了操作难度, 从而降低了 非法用户使用克隆智能卡收看电视节目的机率, 同时降低了运营商为维护 智能卡所造成的经济损失。
同时, 由于本发明基于广播电视网的用户授权系统在用户端设置有双 向通信模块, 同时在前端设置有认证服务器, 认证服务器和双向通信模块 之间通过双向传输线路连接, 这样可以实现广播电视网前端和用户端双方 之间相互传递用户端标识信息和动态更新的用户授权数据, 从而为前端动 态更新用户端的用户授权数据提供了平台, 因此降低了非法用户使用克隆 智能卡收看电视节目的机率, 并降低了运营商为维护智能卡所造成的经济 损失。
附图说明 图 1是现有技术在广播电视网中实现对电视节目进行加解扰及加解密 处理的原理示意图;
图 2是本发明基于广播电视网的用户授权系统的基本组成结构框图; 图 3 是本发明基于广播电视网的用户授权方法的基本实现原理流程 图;
图 4是在本发明基于广播电视网的用户授权方法中, 由前端发起的对 用户端进行身份认证处理的过程示意图;
图 5是在本发明基于广播电视网的用户授权方法中, 由用户端发起的 对用户端进行身份认证处理的过程示意图。
具体实施方式 本发明基于广播电视网的用户授权方法及其授权系统的设计思想是: 能够在广播电视网络正常运营过程中, 以一种用户不可察觉的方式更换智 能卡(智能卡只是用户身份识别模块中的一种特例, 为了说明本发明要求 的保护范围, 下面以用户身份识别模块进行说明, 其中现有技术中已存在 的智能卡是这里所述的用户身份识别模块中的一种典型的例子)中保存的 用户授权数据 , 从而减少非法分子克隆用户身份识别模块所带来的非法经 济利益, 并降低广播电视网络运营商为维护整个用户身份识别模块系统而 造成的经济损失。 但是本发明基于广播电视网的用户授权方法及其授权系 统只是相对现有技术而言, 能够减少非法用户克隆用户身份识别模块的机 率, 而并不能从根本上杜绝用户身份识别模块被非法克隆的可能性。
下面首先结合附图对本发明提出的基于广播电视网的用户授权系统 的基本原理进行详细阐述。 参照图 2 , 该图是本发明基于广播电视网的用 户授权系统的基本组成结构框图, 其中用户授权系统的工作原理如下: 由于目前的广播电视网是由用于广播节目流的前端 HE 2和用于接收 节目流的用户端所组成的, 其中用户端一般包括用于处理节目流信息的机 顶盒 4和用于存储用户授权数据和用户身份标识信息的用户身份识别模块 5, 而目前广播电视网的工作模式都是由前端 HE 2通过广播信道单向对所 有用户端来进行广播节目流信息的, 而用户端并不能通过广播信道向前端 HE 2来发送反向通信信息, 因此为增加广播电视网的前端 HE 2和用户端 之间的双向认证功能, 需作如下设置:
在用户端设置一个与机顶盒 4连接的双向通信模块 3, 以用于将用户 端标识信息上传到前端 HE 2 , 同时还用于接收前端 HE 2发来的更新的用 户授权数据; 其中双向通信模块 3可以通过设置在机顶盒 4的内部来实现 与机顶盒 4的连接, 这样就会构成一个带交互通信模块功能的机顶盒; 当 然双向通信模块 3也可以通过设置在机顶盒 4的外部来实现与机顶盒 4的 外置连接;
同时在广播电视网的前端 HE 2设置一个认证服务器 1,该设置的认证 服务器 1与用户端侧的双向通信模块 3之间通过双向传输线路进行连接, 其用于根据用户端上传的标识信息对用户端进行身份认证处理, 并在认证 通过后更新用户端的用户授权数据 , 并将更新的用户授权数据发送到用户 端的汉向通信模块 3。
其中用于连接广播电视网前端设置的认证服务器 1和用户端机顶盒 4 处设置的汉向通信模块 3 的双向传输线路的物理形态可以为无线传输线 路, 如为 GSM通信网中的无线传输信道或为 3G通信网中的无线传输信道 等, 这时双向通信模块 3为具有无线通信功能的无线通信模块; 也可以为 有线传输线路, 如为 PSTN通信网中的有线传输信道或为广播电视网中的 有线传输信道(即 Cable信道)等, 这时双向通信模块 3就为有线通信模 块。
基于上述在广播电视网上建立的用户授权系统, 广播电视网前端 HE 2 就可以通过单向广播信道单向广播传输流 TS到所有用户端的机顶盒 4,而 用户端需要到前端 HE 2进行身份认证时, 就可以通过设置的双向通信模 块 3将自身的标识信息通过双向传输线路上传到前端 HE 2侧的认证服务 器 1, 由认证服务器 1对用户端的身份合法性进行认证, 并在用户端身份 认证通过后, 将对其更新的用户授权数据通过认证服务器 1和双向通信模 块 3之间的汉先传输线路下发到用户端侧的双向通信模块 3, 用户端根据 双向通信模块 3接收的更新后的用户授权数据来实现对自身用户授权数据 的更新。
相应地, 本发明还提出了一种基于广播电视网的用户授权方法, 下面 详细阐述。 参照图 3, 该图是本发明基于广播电视网的用户授权方法的基 本实现原理流程图; 其基本实现过程如下:
步骤 S10 , 设置具有生存期的动态个人密钥(DPK, Dynamic Persona l
Key ), 即广播电视网的前端为每个用户分别设置一个 DPK, 其中 DPK是有 生存期的, 需要在其生存一段时间后对其进行更新处理; 其中为每个用户 设置的 DPK, 前端和用户端都共享这个 DPK, 即针对每一用户, 前端存有 为该用户设置的 DPK, 用户端也存有该设置的 DPK, —般用户端会将该设 置的 DPK存放在自身携带的用户身份识别模块中。
步骤 S20, 检测每个用户的 DPK是否到达其生存期, 其中可以采取周 期规律对每个用户的 DPK生存期进行检查, 如果某个用户的 DPK到达了其 生存期, 执行步骤 S30; 否则执行步骤 S60; 其中判断每个 DPK是否到达 其生存期的方法可以采取如下方式: 1 )预先设置一个固定时长值(如 1小时);
2 )判断当前检测时间点距动态个人密钥 DPK生存期到达时间点的时 长值是否小于 1 ) 中设置的固定时长值, 如果是, 则可以判定动态个人密 钥 DPK的生存期已到达; 否则可以判定 DPK的生存期未到达(其中当前检 测时间点可以在 DPK生存期到达时间点的前面, 也可以在到达时间点的后 面, 即在检测 DPK生存期时, 其 DPK可能即将到达生存期或已经到达了生 存期)。
另外, 根据具体情况, 可以选择由广播电视网的前端来检查每个 DPK 的生存期; 也可以选择由广播电视网的用户端来检查每个 DPK的生存期。
步骤 S30, 广播电视网的前端对 DPK生存期到达的用户端进行身份认 证, 一般情况下, 前端可以通过对用户端的 ID标识信息进行认证, 来判 断用户端的身份是否合法, 如前端可以通过对用户端机顶盒的 ID标识信 息进行认证, 来判定用户端是否为合法用户; 也可以通过对用户端用户身 份识别模块中存储的用户身份标识信息进行认证, 来判定用户端是否为合 法用户; 当然更为安全的认证方式是前端通过认证用户端的机顶盒 ID标 识信息和用户身份识别模块中存储的用户身份标识信息的绑定关系, 来判 断用户端是否为合法用户。
步骤 S40, 如果前端对用户端进行身份认证通过, 执行步骤 S50, 否 则结束, 执行下一次的 DPK生存期检测。
步骤 S50, 广播电视网前端更新生存期已经到达的 DPK后, 到达结束 程序, 等待执行下一次的 DPK生存期检测。 其中广播电视网前端对到达生 存期的 DPK进行更新的过程如下:
a. 前端利用与用户端共享的个人分配密钥 PDK (其中 PDK是在用户入 网注册时, 由网络运营商为其分配的静态个人授权数据, PDK也分别保存 在前端和用户端手持的用户身份识别模块中)对更新后的动态个人密钥 DPK进行加密处理后下发给用户端;
b. 用户端接收到 a 中的加密数据后, 利用自身用户身份识别模块中 存储的个人分配密钥 PDK对加密的动态个人密钥数据进行解密处理, 得到 更新后的动态个人密钥 DPK。 利用这种方式传输更新的 DPK, 可以保证更新的 DPK的安全性, 其中 加密处理的 DPK数据可以选择通过有线通信网的有线传输线路或者无线通 信网的无线传输线路来传输下发到用户端, 这样其安全性也会得到较好的 保证; 当然也可以选择使用广播信道(Cable信道)来传输下发加密处理 后的 DPK数据到用户端, 但是这样传输数据的安全性保证会稍差一些。
步骤 S60,广播电视网前端基于动态个人密钥 DPK对传输流 TS实施加 密、 加扰及授权处理, 对应地用户端基于该共享的动态个人密钥 DPK对前 端通过广播信道下发的加扰传输流 TS 实施解密及解扰处理, 以得到解扰 后的 TS,然后用户端的机顶盒对解扰处理的 TS进行解复用及解码等处理, 以显示给用户观看, 然后到达结束程序, 等待执行下一次的 DPK生存期检 测。
其中广播电视网前端基于动态个人密钥 DPK对要发送到用户端机顶盒 的传输流 TS实施加密、 加扰及授权处理的过程如下:
A、 广播电视网前端使用控制字 CW对传输流 TS进行加扰处理, 得到 加扰传输流 TS,; 可以表示为: TS + CW ->TS,;
B、 前端再使用业务密钥 SK对控制字 CW进行加密处理, 得到授权控 制信息 ECM, 可以表示为: CW+S ->ECM;
C、 前端再使用动态个人密钥 DPK对业务密钥 SK进行加密处理, 得到 授权管理信息 EMM, 可以表示为: SK + DPK -〉 EMM;
相应地, 广播电视网用户端基于动态个人密钥 DPK对接收的加扰传输 流 TS,实施解密及解扰处理的过程如下:
D、 用户端将接收到的 ECM和 EMM数据发送到用户身份识别模块中, 用户身份识别模块通过自身存储的 DPK对 EMM进行解密,得到 SK, 可以表 示为: EMM + DPK -〉 SK;
E、 用户端的用户身份识别模块利用得到的 SK对 ECM进行解密, 得到
CW, 可以表示为: ECM + SK -〉 CW;
F、 用户端的用户身份识别模块将得到的 CW反馈给用户端的机顶盒, 机顶盒中的解扰引擎利用得到的 CW对加扰传输流 TS,实施解扰处理,得到 传输流 TS, 可以表示为: TS, + CW->TS。 由上述可见, 本发明基于广播电视网的用户授权方法是在传统 CAS三 层加密的体系下, 增加了一层动态个人密钥 (DPK)作为工作密钥, 同时 按照一定的有效期限制与更新策略对这个工作密钥进行更新, 从而完成了 对用户身份识别模块中存储的用户授权数据的更新; 在双向传输线路传递 DPK的时候再利用用户的个人分配密钥( PDK )对其进行加密, 即密钥体系 变为四层, 如下:
TS + CW -> TS,
CW + SK —> ECM
SK + DPK -> EMM
这三层加密体制用于传输流的加密及加扰处理;
DP + PDK -> EMM2
这层加密体制用于动态个人密钥 DPK 更新传输时的加密处理, 其中 EMM2优选使用汉向传输线路进行传输。
其中由广播电视网前端对用户端进行身份认证的过程可以由前端发 起, 也可以由用户端发起, 下面对这两种情况进行详细说明。
参照图 4, 该图是在本发明基于广播电视网的用户授权方法中, 由前 端发起的对用户端进行身份认证处理的过程示意图; 其处理过程如下: 步骤 S100, 广播电视网的前端检测下一个用户的 DPK生存期,其中对 于初始状态,该下一个用户即为第一个用户,后续逐一对每一用户端的 DPK 进行生存期检查处理, 其中可以采用周期规律对每一用户端的 DPK进行一 次轮回检查操作;
步骤 S110, 前端判断检测的该用户的 DPK生存期是否到达, 如果是, 执行步骤 S130, 否则执行步骤 S120;
步骤 S120,前端再次判断检测的该用户的 DPK距离其生存期的到达是 否小于 1小时, 如果是执行步骤 S130, 否则转至执行步骤 S195;
步骤 S130, 前端再判断该 DPK已到达其生存期的用户是否在线, 如果 在线, 执行步骤 S140; 否则转至执行步骤 S195; 其中判断 DPK已到达生 存期的用户是否在线的实现方式如下:
前端对上次认证通过的用户, 将默认这个用户是在线用户, 并为每一 个用户保存一个关于是否在线的状态变量, 直到下次认证过程用户端无响 应或者认证失败, 前端将认定当前用户为离线状态。
步骤 S140, 前端发送认证指示命令到 DPK生存期已到达的该用户端; 步骤 S150, 该用户端接收到前端发来的认证指示命令后,将自身的标 识信息通过汉向传输线路上传到前端, 其中用户端上传的标识信息可以为 用户端机顶盒的 ID标识信息, 也可以为用户端用户身份识别模块中存储 的用户身份标识信息, 也可以为机顶盒 ID标识信息和用户身份识别模块 中存储的用户身份标识信息的绑定关系;
步骤 S160, 前端根据该用户端发来的标识信息, 采用认证服务器对其 身份进行认证处理;
步骤 S170, 前端根据步骤 S160的认证结果, 判断该用户端的身份认 证是否通过, 如果认证通过执行步骤 S180, 否则转至执行步骤 S195;
步骤 S180, 前端对生存期到达的 DPK进行更新, 并用前端和用户端共 享的 PDK对更新后的 DPK进行加密处理, 即 DPK + PDK->EMM2 ,得到加密数 据 EMM2 , 然后将 EMM2发送到相应的用户端;
步骤 S190, 用户端机顶盒接收到前端发来的加密数据 EMM2后, 将其 发送至用户身份识别模块,用户身份识别模块利用自身存储的 PDK对 EMM2 数据进行解密处理, 得到更新的 DPK, 并将其存储, 其解密过程可以表示 为: EMM2 + PDK -〉 DPK;
步骤 S195 ,前端判断该次轮回检测每个用户的 DPK是否到达其生存期 的操作是否完成, 即判断每个用户端的 DPK是否都已检测到, 如果是则结 束, 以等待下一轮的对每个用户端的 DPK生存期进行检测的操作; 否则返 回执行步骤 S100, 继续检测下一个用户的 DPK的生存期是否到达。
参照图 5, 该图是在本发明基于广播电视网的用户授权方法中, 由用 户端发起的对用户端进行身份认证处理的过程示意图; 其处理过程如下: 步骤 S200, 用户端将自身机顶盒 STB开机后, 用户端将自动检查自身 的 DPK生存期; 用户端可以采用周期规律对自身的 DPK生存期进行检查; 步骤 S210, 用户端判断自身的 DPK是否到达其生存期, 如果是, 执行 步骤 S230; 否则执行步骤 S220; 步骤 S220,用户端再次判断自身 DPK距离其生存期到达时长值是否小 于 1小时, 如果是, 执行步骤 S230; 否则结束, 以等待下一次 DPK生存期 是否到达的检测;
步骤 S230,为避免同时有大量 DPK到达生存期的 STB同时发起认证流 程而导致前端认证服务器过载, 所以用户端在这里将采取退避一段时间的 处理方式;
步骤 S240, 退避时间过后, 用户端将自身的标识信息通过双向传输线 路上传到前端, 其中用户端上传的标识信息可以为用户端机顶盒的 ID标 识信息, 也可以为用户端用户身份识别模块中存储的用户身份标识信息, 当然也可以为机顶盒 ID标识信息和用户身份识别模块中存储的用户身份 标识信息的绑定关系;
步骤 S250, 前端根据用户端发来的标识信息, 采用认证服务器对其身 份进行认证处理;
步骤 S260, 前端根据步骤 S250的认证结果, 判断用户端的身份认证 是否通过, 如果认证通过执行步骤 S270, 否则结束, 以等待下一次 DPK 生存期是否到达的检测;
步骤 S270, 前端对生存期到达的 DPK进行更新, 并用前端和用户端共 享的 PDK对更新后的 DPK进行加密处理, 即 DPK + PD ->EMM2 ,得到加密数 据 EMM2 , 然后将 EMM2发送到发起认证的用户端;
步骤 S280, 用户端机顶盒接收到前端发来的加密数据 EMM2后, 将其 发送至用户身份识别模块,用户身份识别模块利用自身存储的 PDK对 EMM2 数据进行解密处理, 得到更新的 DPK, 并将其存储, 其解密过程可以表示 为: EMM2 + PDK -〉 DPK; 然后结束, 以等待下一次 DPK生存期是否到达的检 测。
综上所述, 本发明基于广播电视网的用户授权方法及其授权系统的基 本思想就是广播电视网的前端依旧利用单向的广播信道(Cable信道)广 播电视节目传输流 TS,而单独使用在用户端机顶盒中设置的双向通信模块 和前端与用户端之间设置的双向传输线路来完成用户端的身份认证处理 和动态个人密钥 DPK的更新处理; 从而可以实现通过周期性更改动态个人 密钥 DPK来降低非法用户利用克隆用户身份识别模块来获得非法经济利益 的目的, 即只要控制 DPK的更新周期就能够有效限制非法用户克隆用户身 份识别模块的有效时间 , 而使非法用户克隆用户身份识别模块的操作难度 系数加大。 同时也降低了运行商为维护整个用户身份识别模块系统所造成 的成本损失, 因为只要通过周期更新每个用户身份识别模块的 DPK, 就不 再需要在部分用户身份识别模块被克隆的情况下, 还要更换所有实际的物 理用户身份识别模块, 所以其经济成本一定会降低。
以上所述仅是本发明的优选实施方式, 应当指出, 对于本技术领域的 普通技术人员来说, 在不脱离本发明原理的前提下, 还可以作出若干改进 和润饰, 这些改进和润饰也应视为本发明的保护范围。

Claims

权 利 要 求
1、 一种用户授权方法, 其特征在于, 包括步骤:
( 1)设置前端和用户端共享的具有生存期的动态个人密钥;
(2)检查所述动态个人密钥的生存期是否到达终止时间, 如果是继续 步骤( 3); 否则转至步骤(4);
( 3) 更新生存期到达终止时间的所述动态个人密钥后返回步骤(2);
(4) 前端基于所述动态个人密钥对传输流实施加密、加扰及授权处理, 用户端基于所述动态个人密钥对加扰传输流实施解密及解扰处 理。
2、根据权利要求 1所述的用户授权方法, 其特征在于, 所述步骤( 2 ) 中以周期规律检查动态个人密钥的生存期。
3、 根据权利要求 1 所述的基于广播电视网的用户授权方法, 其特征 在于, 所述步骤(2 )具体包括如下步驟:
(21 )设置一固定时长值;
(22)判断当前检测时间点距动态个人密钥生存期到达时间点的时长值 是否小于所述固定时长值, 如果是, 判定动态个人密钥的生存期 已到达; 否则判定未到达。
4、根据权利要求 1所述的用户授权方法, 其特征在于, 所述步骤( 3 ) 在更新动态个人密钥之前还包括对动态个人密钥生存期到达的用户端进 行身份认证的步骤,如果认证通过继续更新动态个人密钥处理,否则结束。
5、才艮据权利要求 4所述的用户授权方法, 其特征在于, 所述步骤(2) 中检查动态个人密钥的生存期是由前端完成。
6、 根据权利要求 5所述的基于广播电视网的用户授权方法, 其特征 在于, 所述步骤(3)对动态个人密钥生存期到达的用户端进行身份认证 的过程具体包括步骤: (( 3311 ))所所述述前前端端发发送送认认证证指指示示命命令令到到动动态态个个人人密密钥钥生生存存期期到到达达的的用用户户端端,, 指指示示用用户户端端到到前前端端进进行行身身份份认认证证;;
(( 3322 ))用用户户端端将将自自身身标标识识信信息息上上传传到到前前端端;;
(( 3333 ))前前端端根根据据用用户户端端的的标标识识信信息息对对用用户户端端进进行行身身份份认认证证。。
55 77、、根根据据权权利利要要求求 66所所述述的的用用户户授授权权方方法法,,其其特特征征在在于于,,所所述述步步骤骤(( 3311 )) 之之前前还还包包括括前前端端判判断断动动态态个个人人密密钥钥生生存存期期到到达达的的用用户户端端是是否否在在线线的的步步骤骤。。
88、、根根据据权权利利要要求求 44所所述述的的用用户户授授权权方方法法,, 其其特特征征在在于于,, 所所述述步步骤骤((22 )) 中中检检查查动动态态个个人人密密钥钥的的生生存存期期由由用用户户端端完完成成。。
99、、根根据据权权利利要要求求 88所所述述的的用用户户授授权权方方法法,, 其其特特征征在在于于,, 所所述述步步骤骤(( 33 )) 1100 对对动动态态个个人人密密钥钥生生存存期期到到达达的的用用户户端端进进行行身身份份认认证证的的过过程程具具体体包包括括步步骤骤::
(( 33aa ))动动态态个个人人密密钥钥生生存存期期到到达达的的用用户户端端将将自自身身标标识识信信息息上上传传到到广广播播电电视视 网网前前端端;;
(( 33bb ))前前端端 居居用用户户端端的的标标识识信信息息对对用用户户端端进进行行身身份份认认证证。。
1100、、根根据据权权利利要要求求 11所所述述的的用用户户授授权权方方法法,,其其特特征征在在于于,,所所述述步步骤骤(( 33 )) 1155 更更新新动动态态个个人人密密钥钥的的过过程程具具体体包包括括::
(( 33--11 ))前前端端利利用用与与用用户户端端共共享享的的个个人人分分配配密密钥钥对对更更新新的的动动态态个个人人密密钥钥进进 行行加加密密后后下下发发给给用用户户端端;;
(( 33--22 ))用用户户端端利利用用用用户户身身份份识识别别模模块块中中存存储储的的个个人人分分配配密密钥钥对对加加密密的的动动 态态个个人人密密钥钥数数据据进进行行解解密密,, 得得到到更更新新的的动动态态个个人人密密钥钥。。
2200 1111、、 根根据据权权利利要要求求 1100所所述述的的用用户户授授权权方方法法,, 其其特特征征在在于于,, 所所述述步步骤骤
(( 33--11 )) 中中广广播播电电视视网网前前端端将将加加密密后后的的动动态态个个人人密密钥钥数数据据通通过过有有线线通通信信网网 的的有有线线传传输输线线路路或或无无线线通通信信网网的的无无线线传传输输线线路路下下发发到到用用户户端端。。
1122、、 根根据据权权利利要要求求 66或或 99所所述述的的用用户户授授权权方方法法,, 其其特特征征在在于于,, 所所述述用用 户户端端标标识识信信息息包包括括::
2255 * 用户端用户身份识别模块中存储的用户身份标识信息; 或
用户端机顶盒 ID标识信息和用户端用户身份识别模块中存储的用户 身份标识信息的绑定关系。
13、 根据权利要求 1所述的用户授权方法, 其特征在于,
步骤(4 ) 中所述基于动态个人密钥对传输流实施加密、 加扰及授权 处理的过程具体包括:
( 41 ) 所述前端使用控制字对传输流进行加扰处理;
( 42 )使用业务密钥对控制字进行加密处理, 得到授权控制信息;
( 43 M吏用动态个人密钥对业务密钥进行加密处理,得到授权管理信息; ( 44 )将授权控制信息和授权管理信息复用到传输流中下发到用户端; 所述基于动态个人密钥对加扰传输流实施解密及解扰处理的过程具 体包括:
( 45 )所述用户端使用动态个人密钥对授权管理信息进行解密处理, 得 到业务密钥;
( 46 )使用业务密钥对授权控制信息进行解密处理, 得到控制字; ( 47 )使用控制字对加扰传输流进行解扰处理。
14、 一种用户授权系统, 包括用于广播节目流的前端和用于接收节目 流的用户端, 所述用户端包括用于处理节目流信息的机顶盒和用于存储用 户授权数据的用户身份识别模块, 其特征在于, 所述的系统还包括: 在所述用户端设置有与机顶盒连接的双向通信模块, 用于将用户端标 识信息上传到所述前端, 并用于接收前端发来的更新的用户授权数据; 在所述前端设置有认证服务器, 与所述双向通信模块通过双向传输线 路连接, 用于根据用户端上传的标识信息对用户端进行身份认证处理, 并 在认证通过后更新用户端的用户授权数据, 并将更新的用户授权数据发送 到用户端的双向通信模块。 15、 根据权利要求 14所述的用户授权系统, 其特征在于, 所述双向 通信模块通过设置在机顶盒内部实现与机顶盒的连接。
16、 根据权利要求 14所述的用户授权系统, 其特征在于, 所述双向通信模块为无线通信模块,通过无线通信网的无线传输线路 与所述认证服务器连接; 或
所述双向通信模块为有线通信模块, 通过有线通信网的有线传输线路 与所述认证服务器连接。
PCT/CN2005/001092 2004-08-02 2005-07-21 Procede d'autorisation d'abonnes et systeme d'autorisation WO2006012788A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN200410070382.1 2004-08-02
CNB2004100703821A CN100384251C (zh) 2004-08-02 2004-08-02 用户授权方法及其授权系统

Publications (1)

Publication Number Publication Date
WO2006012788A1 true WO2006012788A1 (fr) 2006-02-09

Family

ID=35786871

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2005/001092 WO2006012788A1 (fr) 2004-08-02 2005-07-21 Procede d'autorisation d'abonnes et systeme d'autorisation

Country Status (2)

Country Link
CN (1) CN100384251C (zh)
WO (1) WO2006012788A1 (zh)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8522276B2 (en) 2006-02-17 2013-08-27 Verizon Services Organization Inc. System and methods for voicing text in an interactive programming guide
US8584174B1 (en) 2006-02-17 2013-11-12 Verizon Services Corp. Systems and methods for fantasy league service via television
US8713615B2 (en) 2006-02-17 2014-04-29 Verizon Laboratories Inc. Systems and methods for providing a shared folder via television
US9143735B2 (en) 2006-02-17 2015-09-22 Verizon Patent And Licensing Inc. Systems and methods for providing a personal channel via television
CN104954841A (zh) * 2015-06-17 2015-09-30 上海玮舟微电子科技有限公司 兼容多种条件访问的方法及所适用的视频播放设备
US9178719B2 (en) 2006-02-17 2015-11-03 Verizon Patent And Licensing Inc. Television integrated chat and presence systems and methods

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100781531B1 (ko) 2006-09-19 2007-12-03 삼성전자주식회사 컨텐츠 서비스 제공 방법 및 장치
CN101257358B (zh) * 2008-04-17 2011-09-21 中兴通讯股份有限公司 一种用户密钥的更新方法及系统
CN101568070B (zh) * 2008-04-23 2012-11-28 中兴通讯股份有限公司 一种移动终端管理系统和方法
CN101772045B (zh) * 2008-12-30 2012-06-06 中国移动通信集团公司 一种检测防克隆电信智能卡的方法及装置
CN105611353A (zh) * 2015-12-23 2016-05-25 福建新大陆通信科技股份有限公司 一种机顶盒利用指纹进行条件接收的方法
CN106302457A (zh) * 2016-08-16 2017-01-04 上海斐讯数据通信技术有限公司 一种数据通信方法及系统

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1249621A (zh) * 1998-07-02 2000-04-05 松下电器产业株式会社 带有增强保密措施以防非法收看下载节目的付费广播系统
WO2002058398A2 (en) * 2001-01-18 2002-07-25 General Instrument Corporation System for securely delivering pre-encrypted content on demand with access control
CN1372766A (zh) * 2000-11-10 2002-10-02 派威公司 通过协议转换防止伪造的stb
WO2003067888A1 (en) * 2002-02-07 2003-08-14 Nokia Corporation A hybrid network encrypt/decrypt scheme

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU732576C (en) * 1997-06-06 2001-11-22 Thomson Consumer Electronics, Inc Conditional access system for set-top boxes
US6834111B1 (en) * 1998-04-01 2004-12-21 Matsushita Electric Industrial Co., Ltd. Data transmitting/receiving method, data transmitter, data receiver, data transmitting/receiving system, av content transmitting method, av content receiving method, av content transmitter, av content receiver, and program recording medium
US6898285B1 (en) * 2000-06-02 2005-05-24 General Instrument Corporation System to deliver encrypted access control information to support interoperability between digital information processing/control equipment
US7080397B2 (en) * 2000-10-26 2006-07-18 General Instrument Corporation Communication protocol for content on demand system with callback time
CN2593500Y (zh) * 2002-12-16 2003-12-17 浪潮电子信息产业股份有限公司 共享缓存式交互机顶盒
CN1286306C (zh) * 2003-08-05 2006-11-22 中兴通讯股份有限公司 媒体网关鉴权的方法

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1249621A (zh) * 1998-07-02 2000-04-05 松下电器产业株式会社 带有增强保密措施以防非法收看下载节目的付费广播系统
CN1372766A (zh) * 2000-11-10 2002-10-02 派威公司 通过协议转换防止伪造的stb
WO2002058398A2 (en) * 2001-01-18 2002-07-25 General Instrument Corporation System for securely delivering pre-encrypted content on demand with access control
WO2003067888A1 (en) * 2002-02-07 2003-08-14 Nokia Corporation A hybrid network encrypt/decrypt scheme

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8522276B2 (en) 2006-02-17 2013-08-27 Verizon Services Organization Inc. System and methods for voicing text in an interactive programming guide
US8584174B1 (en) 2006-02-17 2013-11-12 Verizon Services Corp. Systems and methods for fantasy league service via television
US8713615B2 (en) 2006-02-17 2014-04-29 Verizon Laboratories Inc. Systems and methods for providing a shared folder via television
US9143735B2 (en) 2006-02-17 2015-09-22 Verizon Patent And Licensing Inc. Systems and methods for providing a personal channel via television
US9178719B2 (en) 2006-02-17 2015-11-03 Verizon Patent And Licensing Inc. Television integrated chat and presence systems and methods
US9462353B2 (en) 2006-02-17 2016-10-04 Verizon Patent And Licensing Inc. Systems and methods for providing a shared folder via television
CN104954841A (zh) * 2015-06-17 2015-09-30 上海玮舟微电子科技有限公司 兼容多种条件访问的方法及所适用的视频播放设备

Also Published As

Publication number Publication date
CN100384251C (zh) 2008-04-23
CN1735192A (zh) 2006-02-15

Similar Documents

Publication Publication Date Title
WO2006012788A1 (fr) Procede d'autorisation d'abonnes et systeme d'autorisation
EP1788811B1 (en) A method for obtaining user's on-line information
US7171553B2 (en) Method for providing a secure communication between two devices and application of this method
JP3742282B2 (ja) 放送受信方法および放送受信装置および情報配信方法および情報配信装置
KR101081160B1 (ko) 데이터 전송을 보호하기 위한 방법 및 장치
CN1171454C (zh) 用于加密数据流传输的方法和装置
JP4913989B2 (ja) ブロードキャストディジタルデータ受信システム
RU2329613C2 (ru) Способ безопасной передачи данных по схеме "точка-точка" и электронный модуль, реализующий этот способ
EP2506590A1 (en) Authentication Certificates
JP4847145B2 (ja) クライアントドメイン内でデジタルコンテンツの消費を管理する方法、および該方法を具現化する装置
TWI452888B (zh) 記錄的多媒體內容之保護方法
CN1643924A (zh) 智能卡适配协议
CN101945249A (zh) 处理流中的可录制内容
TW201031199A (en) Method and device for reception of control words, and device for transmission thereof
CN101335579A (zh) 一种实现条件接收的方法及条件接收装置
TWI523533B (zh) 控制字符之加密方法、傳送方法、解密方法、這些方法所用之記錄媒體以及控制字符伺服器
JP2006510323A (ja) デジタル有料テレビにおけるアクセスコントロール方法及びシステム
JP4521392B2 (ja) デコーダ及びスマートカードに関連した有料テレビジョンシステム、そのようなシステムにおける権利失効方法、及びそのようなデコーダに送信されたメッセージ
JP3708905B2 (ja) 放送受信機、放送受信システム及び情報配信方法
KR20100069373A (ko) 랜덤 값의 교환을 통한 수신 제한 시스템 및 방법
US20060233368A1 (en) Method for conditional access in a DMTS/DOCSIS enabled set top box environment
JP4266220B2 (ja) 情報配信方法及び情報配信装置
TW201203991A (en) Protection method, decrypting method, recording medium and terminal for this protection method
JP2011091538A (ja) 受信装置及びコンテンツの再暗号化方法
JP3798605B2 (ja) 情報配信方法及び情報配信装置

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KM KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NG NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU LV MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase