WO2007132840A1 - ストリーム生成方法、放送受信装置および表示方法 - Google Patents
ストリーム生成方法、放送受信装置および表示方法 Download PDFInfo
- Publication number
- WO2007132840A1 WO2007132840A1 PCT/JP2007/059943 JP2007059943W WO2007132840A1 WO 2007132840 A1 WO2007132840 A1 WO 2007132840A1 JP 2007059943 W JP2007059943 W JP 2007059943W WO 2007132840 A1 WO2007132840 A1 WO 2007132840A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- key
- program
- stream
- packet
- identifier
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims description 57
- 238000003860 storage Methods 0.000 claims description 25
- 230000035945 sensitivity Effects 0.000 claims description 14
- 238000001514 detection method Methods 0.000 claims description 7
- 239000013598 vector Substances 0.000 abstract description 7
- 230000005540 biological transmission Effects 0.000 description 11
- 238000010586 diagram Methods 0.000 description 7
- 238000003780 insertion Methods 0.000 description 6
- 230000037431 insertion Effects 0.000 description 6
- 238000012545 processing Methods 0.000 description 5
- 238000006243 chemical reaction Methods 0.000 description 4
- 238000009826 distribution Methods 0.000 description 4
- 238000004891 communication Methods 0.000 description 3
- 230000006870 function Effects 0.000 description 3
- 238000012544 monitoring process Methods 0.000 description 3
- 102100032533 ADP/ATP translocase 1 Human genes 0.000 description 2
- 101000768061 Escherichia phage P1 Antirepressor protein 1 Proteins 0.000 description 2
- 101000796932 Homo sapiens ADP/ATP translocase 1 Proteins 0.000 description 2
- 230000008901 benefit Effects 0.000 description 2
- 238000012937 correction Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 102100026396 ADP/ATP translocase 2 Human genes 0.000 description 1
- 101000718417 Homo sapiens ADP/ATP translocase 2 Proteins 0.000 description 1
- 238000010411 cooking Methods 0.000 description 1
- 125000004122 cyclic group Chemical group 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/80—Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
- H04N21/83—Generation or processing of protective or descriptive data associated with content; Content structuring
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/065—Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/41—Structure of client; Structure of client peripherals
- H04N21/414—Specialised client platforms, e.g. receiver in car or embedded in a mobile appliance
- H04N21/41407—Specialised client platforms, e.g. receiver in car or embedded in a mobile appliance embedded in a portable device, e.g. video client on a mobile phone, PDA, laptop
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/44—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
- H04N21/4405—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/60—Network structure or processes for video distribution between server and client or between remote clients; Control signalling between clients, server and network components; Transmission of management data between server and client, e.g. sending from server to client commands for recording incoming content stream; Communication details between server and client
- H04N21/63—Control signaling related to video distribution between client, server and network components; Network processes for video distribution between server and clients or between remote clients, e.g. transmitting basic layer and enhancement layers over different transmission paths, setting up a peer-to-peer communication via Internet between remote STB's; Communication protocols; Addressing
- H04N21/633—Control signals issued by server directed to the network components or client
- H04N21/6332—Control signals issued by server directed to the network components or client directed to client
- H04N21/6334—Control signals issued by server directed to the network components or client directed to client for authorisation, e.g. by transmitting a key
- H04N21/63345—Control signals issued by server directed to the network components or client directed to client for authorisation, e.g. by transmitting a key by transmitting keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/16—Analogue secrecy systems; Analogue subscription systems
- H04N7/167—Systems rendering the television signal unintelligible and subsequently intelligible
- H04N7/1675—Providing digital key or authorisation information for generation or regeneration of the scrambling sequence
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
- H04L2209/601—Broadcast encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
Definitions
- the present invention relates to a stream encryption method stream generation method, a broadcast receiving apparatus, and a display method.
- a broadcast program encrypted (scrambled) by such a stream encryption method is such that a user pays a fee for each program, obtains a decryption key, and uses this key to view the program. Broadcasting by program-based billing system is assumed. Therefore, in the case of such a program-based billing system, the broadcast program is started by purchasing in advance the key of the encrypted program desired to be viewed by referring to the program guide or EPG of the newspaper. I have to wait for it.
- the user has time and willingness to watch the pay program without fail, and the time when the user can have enough time to acquire the key (generally, the release of the program immediately before the pay program is released). It would be good if you decide to purchase the key during the transmission, that is, just before the start of the paid program, and you can purchase and watch the key smoothly. Not developed.
- the present invention provides the user with an opportunity to determine the purchase intention of the key at a timing that ensures a sufficient amount of time to watch the pay program and ensure sufficient time for the key acquisition operation.
- An object is to provide a technique (method or apparatus) that enables a user to smoothly purchase and view a key.
- a stream generation method that solves the above-described problems includes:
- Initialization to initialize the stream cipher algorithm with the key identifier for decrypting the stream cipher data of the current program (that is, the data encrypted with the stream cipher)
- the initial packet is stored in a packet, and the initialization packet is inserted into a stream (such as a transport stream or a program stream).
- a stream generation method includes: The method further includes storing a key identifier for decrypting the stream cipher data after the next number_ in the initialization packet at predetermined intervals.
- a stream generation method includes:
- the initialization packet inserted at the end of the stream further includes a step of storing a key identifier (identifier for the subsequent program) for decrypting the stream encrypted data after the next program.
- the receiver can monitor the start notice flag and easily take a timing to confirm whether or not the key for the subsequent program has been acquired.
- a broadcast receiving apparatus includes an initial value for initializing a stream cipher algorithm and an identifier of a key for decrypting stream cipher data of a current program.
- Receiving means (such as a circuit) for receiving an initialization packet for storing (identifier for the current program) and an encryption packet for storing stream cipher data;
- the stream cipher algorithm is initialized and the received initialization is performed.
- a key corresponding to a key identifier (identifier for the current program) for decrypting the stream encryption data of the current program stored in the packet is acquired from the storage means, and the encryption is performed using the key.
- Decryption means circuit, CPU executing instructions of software module, etc.
- Control means for controlling notifying means that is, display means, audio output means, vibration means, etc. so as to determine whether or not to speak and to notify the determination result (circuit, CPU executing instructions of software module, etc.)
- Program information storage means for storing program information (such as an EPG included in a packet constituting a stream or acquired via a network using communication means), and the control means stores the program information storage
- the reporting means is controlled so as to report the program information corresponding to the identifier in the program information stored in the means in association with the determination result.
- program information storage means may be configured in common with the storage means.
- the present invention can also be realized as a broadcast receiving apparatus. That is, the broadcast receiving apparatus according to one embodiment of the present invention is
- Broadcast reception means receiveives a stream including data such as a video stream or BML), a display means (or a notification means such as an audio output means, a vibration means), and the broadcast reception means.
- a storage means (such as a memory) for storing a key for decrypting the stream encryption data (that is, data encrypted by the stream encryption method);
- Program information storage means (such as a memory) for storing program information (such as an EPG included in a packet constituting the received stream or acquired via a network using communication means);
- Information on the following programs (the next program, and the next several programs) scheduled to be broadcast after the currently broadcast program (title, subtitle, content, performers, etc.)
- Information indicating whether or not a key for decrypting a stream (video stream, BML data, etc.) composed of stream encryption data of the subsequent program based on the storage means is displayed on the display means; If the information indicates that the key has not been acquired, the message prompts you to acquire the key for the corresponding subsequent program (for example, the message “Key has not been acquired. If you want to view it, please acquire the key.” )
- To display on the display means circuit, CPU executing a software module instruction, etc.
- Key acquisition means for acquiring a key of a subsequent program that is displayed as having not acquired a key in the acquisition presence / absence information (from a key supply server or the like via a wireless communication means);
- the program information storage means may be configured in common with the storage means for storing the key.
- a broadcast receiving apparatus includes:
- the control means is
- the display means controls to display a message prompting the user to obtain the key of the subsequent program in at least a part of the area where the video stream is to be displayed.
- a broadcast receiving apparatus includes:
- the control means is
- the subsequent program Controlling the display means to display on the display means the program information of the program and the acquisition information on the key of the subsequent program, together with the video stream received by the broadcast receiving means,
- a broadcast receiving apparatus includes:
- Sensitivity detection means for detecting reception sensitivity (of a broadcast wave carrying a program stream) in the broadcast reception means is further provided,
- the control means is Based on the reception sensitivity detected by the sensitivity detection means, the key acquisition means controls the acquisition of the key of the subsequent program (for example, when the current reception sensitivity exceeds a set threshold value so that the user can watch well) Only the key acquisition operation is permitted).
- the present invention can be realized as a method, a program, and a storage medium recording the program substantially equivalent to these, and it is understood that these are also included in the scope of the present invention. I want to be.
- a display method of a broadcast receiving apparatus is as follows:
- the video stream being received (by the broadcast receiving means of the broadcast receiving device) and the current broadcast (refer to the time information supplied from the clock means among the program information stored in the storage means)
- Information on the subsequent program scheduled to be broadcast after the program and acquisition / non-acquisition information on a key for decrypting the stream corresponding to the stream encryption data power of the subsequent program are displayed on the display means, and the key based on the acquisition / non-existence information is displayed.
- the display means displays a message prompting the user to obtain a key for the corresponding subsequent program.
- the present invention there is time to watch a pay program, and a timing at which a sufficient time can be secured for key acquisition work (for example, during the broadcast of a program before the pay program, that is, It is possible to determine whether or not a key has been purchased immediately before the start of a paid program, and to determine the willingness to purchase the key at that time and provide the user with a framework for smoothly purchasing and viewing the key. Is significantly improved. Also, the program provider (broadcasting company program production company) has lost a little bit of timing, that is, the “program purchase” that was lost because the program that did not purchase the key started. It can provide an opportunity to sell pay programs to potential users with high potential.
- FIG. 1 is a configuration diagram of a broadcasting system including a broadcasting device (encrypting device) and a broadcasting receiving device suitable for using the stream generation method according to the present invention.
- FIG. 2 is a diagram showing a configuration example of an IV packet used in the system of FIG.
- FIG. 3 is a timing chart of packets constituting a stream generated by the stream generation method (broadcast apparatus Z encryption apparatus) according to the present invention.
- FIG. 4 is a flowchart showing each process of the stream generation method (broadcasting device Z encryption device) according to the present invention.
- FIG. 5 is a diagram showing a screen configuration example of a broadcast receiving apparatus according to the present invention.
- FIG. 6 is a block diagram showing a configuration of a digital broadcasting system for mobile terminals to which the present invention is applied.
- FIG. 1 is a configuration diagram of a broadcasting system configured by a broadcasting device (encryption device) and a broadcasting receiving device suitable for use with the stream generation method according to the present invention.
- the broadcasting system of this embodiment includes a broadcasting device (encryption device) 100 and a broadcast receiving device (decryption device) 200.
- the broadcast device (encryption device) 100 includes a header conversion unit 110, an IV packet insertion unit 120, an encryption unit 130, a transmission unit 140, and an antenna ANT1.
- the header conversion unit 110 performs header conversion of a transport packet (TS packet).
- TS packets conform to ISO / IEC 138 18-1 (MPEG-2 system standard).
- the header converter 110 rewrites the transport-scrambling-control field value in the header of the TS packet.
- transport The values “01”, “10” and “11” in the scram bling_control field indicate encryption.
- a value “00” of the transp_rt_scrambling_control field indicates that encryption is not performed.
- the IV packet insertion unit 120 generates an initialization packet (IV packet) that stores an initial value (IV: initialization vector) used to initialize the stream encryption algorithm at the initialization interval of the stream encryption algorithm. To do.
- the IV packet insertion unit 120 also adds a key I to the IV packet. Stores D. There are two types of key IDs: ⁇ "and 6 1:”. The key ID “Current” is the identifier of the key currently in use. The key ID “Next” is an identifier of a key to be used next.
- the IV packet insertion unit 120 inserts the generated IV packet into the TS packet sequence output from the header conversion unit 110.
- FIG. 2 shows a configuration example of an IV packet used in the system of FIG.
- the IV packet is configured as a kind of TS packet.
- the value “0x889 (hexadecimal number)” indicating the IV packet is stored in the PID field in the header.
- the value of the tran sport_scrambling_control field is “00”. In other words, IV packets are not encrypted.
- the adaptation_field_control finale is fixed to “01”, and adaption_field is none.
- the data_byte field includes IV (iv), ID1 (id.current) indicating the current key identifier, and ID2 (id.next) indicating the key identifier of the next program.
- IV iv
- ID1 id.current
- ID2 id.next
- a plurality of IVs iv [n]; n is an integer of 0 or more
- iv_ts flag [n] and iv [n] When storing multiple IVs, form a set of iv_ts flag [n] and iv [n].
- Each iv [n] is used to initialize the stream encryption algorithm in the corresponding stream encryption process.
- the initialization interval can be changed for each iv [n]. In this case, only the initialization timing iv [n] is stored in the IV packet.
- the initialization interval corresponding to each iv [n] corresponds to the corresponding stream encryption process. For example, an initialization interval corresponding to the media type of data to be encrypted is used. Examples of media types include voice, image, and data.
- the encryption unit 130 performs stream encryption on the TS packet sequence after IV packet insertion.
- This encryption target is TS packets whose transport_scrambling_control field values are “01”, “10”, and “11”. Note that the TS packet header is not a sign.
- IV packets are transport_scrambling_control Because the value of the password is “00”, do not encrypt! ,.
- the encryption unit 130 includes the IV packet in the TS packet sequence.
- IV is read from the found IV packet.
- the stream encryption algorithm is initialized using the read IV.
- the stream encryption algorithm is performed on the TS packet to be encrypted after the IV packet.
- the current program key identifier ID 1 id.current
- the next program key identifier ID 2 id.next
- the encryption unit 130 may have a plurality of stream encryption processes [n]. Each stream cipher encryption process [n] initializes the stream cipher algorithm using the corresponding IV (iv [n]). Each stream encryption process [n] determines the TS packet to be encrypted according to the PID field value.
- the encryption unit 130 outputs the TS packet sequence including the IV packet and the encrypted TS packet to the transmission unit 140 in the order in which the TS packet sequence is received from the IV packet insertion unit 120.
- the transmission unit 140 transmits (broadcasts) the TS packet sequence (stream cipher data) received from the encryption unit 130 via the antenna ANT1.
- the broadcast receiving device (decoding device) 200 includes an ANT2, a receiving unit 210, a sensitivity detecting unit 212, a packet sorting unit 220, an IV packet reading unit 230, a decoding unit 240, a control unit 250, and a playback unit.
- the receiving unit 210 receives a TS packet sent from the broadcasting device (encrypting device) 100.
- the receiving unit 210 performs error detection and error correction processing on the received TS packet. At this time, the IV packet in which an error is detected by the CRC check is discarded.
- the sensitivity detection unit 212 detects the reception sensitivity of the carrier wave that carries the stream cipher data received by the reception unit 210 and passes it to the control unit 250. Based on the reception sensitivity, the control unit 250 does not allow the key acquisition unit 270 to acquire the key, for example, when the reception sensitivity does not exceed a threshold value that can guarantee program viewing. When the control unit 250 permits the key acquisition, the key acquisition unit 270 acquires the decryption key from the key supply server KES via the network NE (such as the Internet). [0028] The packet distribution unit 220 distributes the TS packet output from the reception unit 210 to each destination according to the PID field value in the header.
- the IV packet (PID field value “0x889 (hexadecimal number)”) is output to the packet distribution unit 230.
- the encrypted TS packet (transport-scrambling-control field values “01”, “10”, and “11”) is output to the decryption unit 240 corresponding to the PID field value.
- Other TS packets that are not encrypted are output from the broadcast receiving apparatus (decryption apparatus) 200 as they are.
- the packet reading unit 230 reads the IV and the key IDs “Current” (id—current) and “N ext” (icLnext) from the IV packet. From the read key IDs “Current” (id_current) and “Next” (icLnext), a key to be used for decoding the stream cipher is prepared. Then, the prepared key and IV are output to the decryption unit 240. When a plurality of IVs (iv [n]) are stored in the IV packet, each iv [n] is output to the decoding unit 240 having the corresponding stream decoding process [n].
- Decryption section 240 receives the encrypted TS packet from packet distribution section 220, and decrypts the stream cipher.
- the decryption unit 240 initializes the stream cipher algorithm using the IV.
- the decryption process of the stream cipher is started using the key received from the packet reading unit 230.
- the stream cipher algorithm is initialized at the position of the IV packet in the received TS packet sequence, the stream cipher for the encrypted TS packets after the IV packet is decrypted.
- Decoding section 240 includes image decoding section 240A, audio decoding section 240B, and data broadcast decoding section 240C, and outputs each decoded TS packet to reproducing section 260.
- Reproduction section 260 reproduces the decoded TS packet.
- the playback unit 260 includes an image playback control unit 260A, an audio playback control unit 260B, and a data broadcast display control unit 260C.
- the image reproduction control unit 260A, the audio reproduction control unit 260B, and the data broadcast display control unit 260C control the reproduction of the TS packets output from the corresponding decoding units 240, and the reproduction is performed by the display 260D and the speaker 260E.
- the configuration of the playback unit 260 shown in FIG. 1 is an example, and the media type and the like can be changed as appropriate.
- the control unit 250 controls the entire broadcast receiving apparatus 200 (that is, the blocks included in the apparatus are All are controlled by this controller 250).
- the state of the stream encryption algorithm in the encryption process and the state of the stream encryption algorithm in the decryption process can be matched with the IV packet. Therefore, even if the encrypted TS packet is lost due to a transmission error, etc., and the state of the stream encryption algorithm in both the encryption process and the decryption process is temporarily inconsistent, the encryption is not performed when the next IV packet is received. Thus, the state of the stream cipher algorithm in both the decryption process and the decryption process match, and normal decryption can be resumed. This makes it possible to enhance resistance to transmission data loss due to transmission errors and the like in stream cryptography.
- FIG. 3 is a timing chart (arrangement order) of packets constituting a stream generated by the stream generation method (broadcast apparatus Z encryption apparatus) according to the present invention.
- the program A stream is generated first, and then the program B stream is generated.
- An initialization vector I VI that is, a packet storing IV1 that includes only id_current, which is the current program key identifier, is placed at the beginning of thread 1A, and then a similar initialization vector is periodically inserted into the stream.
- a predetermined timing (below the predetermined time until the start of program B, or the remaining number of packets until the packet transmission of program B is less than the predetermined number, or encryption key
- the identifier of id_current and icLnext which is the key identifier of the next program, are set as shown in the initialization vector IVn + 1. Place the containing packet.
- the receiving device can easily know that the next program B is about to start, and immediately after this is known, It is checked whether the key of the next program B has already been purchased, and the user is informed of whether or not the key has been purchased. If the key has not been purchased, the user can be prompted to purchase.
- FIG. 4 is a flowchart showing each process of the stream generation method (broadcast apparatus Z encryption apparatus) according to the present invention.
- step S10 the ID (identifier) of the key of the current program is stored in the IV packet.
- step S14 it is determined whether the power is within 5 minutes until the start time of the next program. Repeat steps S10 and S12 until the condition is met. If it is determined in step S14 that it is within 5 minutes until the start of the next program, the process proceeds to step S16.
- the ID of the key of the next program is also stored in the IV packet. An IV packet containing one ID is inserted into the stream (S18).
- FIG. 5 is a diagram showing a screen configuration example of the broadcast receiving apparatus according to the present invention.
- the video of the current program “Sunday Golf” is displayed in the video display area P1.
- This current program is displayed in the current program field D1 in the data display area D, indicating that it is a program that requires a key (regardless of whether it is paid or free) and the key K1 has been acquired)
- the next program field D2 indicates that the next program key K2 has not been acquired.
- next program field D3 it is displayed in the next program field D3 that the key K3 of the next program “Quiz Special ⁇ 3” has been acquired.
- a message C1 is displayed to notify the user that the key of the next program has not been acquired and to prompt the user to acquire (purchase) the key.
- a user who decides to purchase a key by looking at this display presses the soft key SK1, and a user who does not purchase presses the soft key SK2.
- FIG. 6 is a block diagram showing a configuration of a digital broadcast system for mobile terminals to which the present invention is applied.
- the user acquires in advance a decryption key corresponding to the content to be viewed from the pseudo license purchase server 500 via the network NE.
- the key acquisition module 410 accesses the pseudo license purchase Sano 500 via a network NE such as the Internet and downloads the decryption key.
- the decryption key is supplied to the content decryption module 420.
- the decryption key may be paid or free.
- IV TS packet inserted TS stream generation tool 310 generates a generated IV packet (IV stream) for a TS packet sequence (TS stream) composed of TS packets containing content. TS packet) is inserted.
- the TS stream into which the IV packet is inserted (TS stream with the IV TS packet inserted) is subjected to stream encryption by the TS stream encryption tool 320.
- TS packet for IV after the encryption is inserted
- the ream is transmitted on the digital broadcast wave by the broadcast wave transmission device group 330.
- digital TV (television) application 440 receives "TS stream with IV TS packet inserted after encryption" on digital broadcast waves.
- the content decryption module 420 performs decryption of the stream cipher on the received “TS stream into which the encrypted IV TS packet has been inserted”.
- the content included in the TS stream after the decoding is reproduced for each media type by each media decoder 430.
- the decoding module processing procedure includes an initial key step T1 and a decoding step K2.
- the initial step T1 the decryption key received by the key acquisition module 410 and the IV in the IV packet included in the received TS stream for encrypted IV TS packet are used.
- the uninitialized decoding module 420A is initialized to obtain the initialized decoding module 420B.
- the decryption modules 420A and 420B have a stream encryption algorithm.
- the initialized decryption module 420B decrypts the ciphertext of the stream cipher system and outputs the plaintext of the decryption result in the stream format.
- the ciphertext of the stream encryption method is obtained from the encrypted TS packet included in the received “TS stream for IV packet after encryption”. If an IV is acquired by receiving a new IV packet during the execution of step K2, the process returns to the initial step T1, and the decoding module 420A is initialized again.
- the state of the stream cipher algorithm on both the broadcasting station side and the mobile terminal side is lost due to loss of TS packets storing stream cipher data due to transmission error of broadcast data in digital broadcasting. Even if the reception status of the digital broadcast temporarily becomes unstable, the status of the stream encryption algorithm on both the broadcasting station side and the portable terminal side is matched by the subsequent IV packet, and the digital broadcast reception status The state can be restored to a good state. This will contribute to improving the quality of digital broadcasting for mobile terminals.
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Multimedia (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Engineering & Computer Science (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
Abstract
Description
Claims
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2007800177870A CN101449578B (zh) | 2006-05-16 | 2007-05-15 | 流发生方法、广播接收装置以及显示方法 |
KR1020107023288A KR101414348B1 (ko) | 2006-05-16 | 2007-05-15 | 스트림 생성 방법 및 방송 수신 장치 |
BRPI0712100-8A BRPI0712100A2 (pt) | 2006-05-16 | 2007-05-15 | método de geração de fluxo, aparelho de recepção de radiodifusão e método de exibição |
US12/300,999 US8532292B2 (en) | 2006-05-16 | 2007-05-15 | Stream generation method, broadcast receiving apparatus, and display method |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2006-136982 | 2006-05-16 | ||
JP2006136982A JP5059343B2 (ja) | 2006-05-16 | 2006-05-16 | ストリーム生成方法および放送受信装置 |
JP2006-136984 | 2006-05-16 | ||
JP2006136984A JP5184757B2 (ja) | 2006-05-16 | 2006-05-16 | 放送受信装置および表示方法 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2007132840A1 true WO2007132840A1 (ja) | 2007-11-22 |
WO2007132840A8 WO2007132840A8 (ja) | 2008-12-18 |
Family
ID=38693930
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2007/059943 WO2007132840A1 (ja) | 2006-05-16 | 2007-05-15 | ストリーム生成方法、放送受信装置および表示方法 |
Country Status (4)
Country | Link |
---|---|
US (1) | US8532292B2 (ja) |
KR (2) | KR101012979B1 (ja) |
BR (1) | BRPI0712100A2 (ja) |
WO (1) | WO2007132840A1 (ja) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP5144157B2 (ja) * | 2007-07-25 | 2013-02-13 | 京セラ株式会社 | 受信装置 |
GB2457253B (en) * | 2008-02-07 | 2010-08-11 | Ericsson Telefon Ab L M | Controlling media distribution |
KR101920439B1 (ko) * | 2011-04-28 | 2019-02-14 | 삼성전자주식회사 | 공용 인터페이스를 통해 수신 제한 모듈로 암호화된 데이터를 전송하기 위한 데이터 전송 장치 및 그에 적용되는 방법, 수신 제한 모듈 그리고 시스템. |
US11349699B2 (en) * | 2012-08-14 | 2022-05-31 | Netflix, Inc. | Speculative pre-authorization of encrypted data streams |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002158651A (ja) * | 2000-11-22 | 2002-05-31 | Nec Corp | 連鎖鍵放送受信システム及び連鎖鍵放送受信方法 |
JP2003333032A (ja) * | 2002-05-15 | 2003-11-21 | Oki Electric Ind Co Ltd | 暗号処理方法,及び,暗号処理装置 |
Family Cites Families (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5585866A (en) * | 1993-09-09 | 1996-12-17 | Miller; Larry | Electronic television program guide schedule system and method including virtual channels |
US6732369B1 (en) * | 1995-10-02 | 2004-05-04 | Starsight Telecast, Inc. | Systems and methods for contextually linking television program information |
US6069957A (en) * | 1997-03-07 | 2000-05-30 | Lucent Technologies Inc. | Method and apparatus for providing hierarchical key system in restricted-access television system |
US6549718B1 (en) * | 1999-12-22 | 2003-04-15 | Spotware Technologies, Inc. | Systems, methods, and software for using markers on channel signals to control electronic program guides and recording devices |
EP1111923A1 (en) * | 1999-12-22 | 2001-06-27 | Irdeto Access B.V. | Method for operating a conditional access system for broadcast applications |
JP2001308846A (ja) | 2000-04-21 | 2001-11-02 | Micro Technology Kk | ストリーム暗号 |
JP3869224B2 (ja) | 2001-03-30 | 2007-01-17 | 株式会社東芝 | 限定受信システム、広域局契約管理装置及び地域局契約管理装置 |
US20040247295A1 (en) * | 2003-06-04 | 2004-12-09 | Samsung Electronics Co., Ltd | Audio/video stream processing system and method for data copy protection |
US7620185B2 (en) | 2004-09-15 | 2009-11-17 | Nokia Corporation | Preview of payable broadcasts |
US20060106806A1 (en) * | 2004-11-12 | 2006-05-18 | Smith Micro Software, Inc. | Software update for a plurality of mobile devices |
US8189786B2 (en) * | 2005-05-25 | 2012-05-29 | Zenith Electronics Llc | Encryption system |
-
2007
- 2007-05-15 KR KR1020087028035A patent/KR101012979B1/ko active IP Right Grant
- 2007-05-15 US US12/300,999 patent/US8532292B2/en not_active Expired - Fee Related
- 2007-05-15 WO PCT/JP2007/059943 patent/WO2007132840A1/ja active Application Filing
- 2007-05-15 BR BRPI0712100-8A patent/BRPI0712100A2/pt not_active Application Discontinuation
- 2007-05-15 KR KR1020107023288A patent/KR101414348B1/ko active IP Right Grant
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002158651A (ja) * | 2000-11-22 | 2002-05-31 | Nec Corp | 連鎖鍵放送受信システム及び連鎖鍵放送受信方法 |
JP2003333032A (ja) * | 2002-05-15 | 2003-11-21 | Oki Electric Ind Co Ltd | 暗号処理方法,及び,暗号処理装置 |
Also Published As
Publication number | Publication date |
---|---|
KR101414348B1 (ko) | 2014-07-01 |
US8532292B2 (en) | 2013-09-10 |
BRPI0712100A2 (pt) | 2012-01-17 |
KR101012979B1 (ko) | 2011-02-10 |
US20090323948A1 (en) | 2009-12-31 |
WO2007132840A8 (ja) | 2008-12-18 |
KR20100120315A (ko) | 2010-11-15 |
KR20090014275A (ko) | 2009-02-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP5059343B2 (ja) | ストリーム生成方法および放送受信装置 | |
US7676039B2 (en) | Apparatus for controlling storage and playback of digital broadcasting contents | |
JPH10262013A (ja) | データ送信装置、受信装置および送受信システム | |
WO2007132840A1 (ja) | ストリーム生成方法、放送受信装置および表示方法 | |
WO2007132895A1 (ja) | 暗号化装置、復号装置、ライセンス発行装置、及びコンテンツデータ生成方法 | |
JP2000115091A (ja) | 情報記録装置および情報再生装置 | |
JP5180262B2 (ja) | システム、サーバ、及び端末装置並びに方法 | |
JP5184757B2 (ja) | 放送受信装置および表示方法 | |
JPH08297919A (ja) | ディジタル信号の受信方法及び装置 | |
JP2001223653A (ja) | 番組受信端末装置及び番組提供方法 | |
JP2009278651A (ja) | 放送システム、並びに受信装置および受信方法 | |
JP2000350181A (ja) | 放送の蓄積方法および蓄積制御プログラムを記録した記録媒体 | |
JP2014045422A (ja) | デジタル放送受信機、放送サービス提示方法、および、プログラム | |
JP4176778B2 (ja) | ディジタル放送送信方法 | |
JP2001211127A (ja) | デジタル放送におけるスクランブル制御 | |
JP5180728B2 (ja) | 放送受信装置およびその制御方法 | |
JP2003009078A (ja) | ディジタル信号の受信方法及び装置 | |
JP4902760B2 (ja) | 受信装置及び受信方法 | |
JP4172804B2 (ja) | ディジタル放送受信装置および方法 | |
JP5095003B2 (ja) | 受信装置及び受信方法 | |
JP4521467B2 (ja) | ディジタル信号の受信方法及び装置 | |
JPH11243535A (ja) | ディジタル放送受信再生システムおよびディジタル放送送信方法 | |
JP2006270973A (ja) | ディジタル放送送信方法 | |
JP2008118629A (ja) | 受信装置 | |
JP2005269638A (ja) | ディジタル信号の受信方法及び装置 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 200780017787.0 Country of ref document: CN |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 07743378 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1020087028035 Country of ref document: KR |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 12300999 Country of ref document: US |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 07743378 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1020107023288 Country of ref document: KR |
|
ENP | Entry into the national phase |
Ref document number: PI0712100 Country of ref document: BR Kind code of ref document: A2 Effective date: 20081114 |