WO2008131662A1 - Système de mise à jour de clé de chiffrée, procédé associé, terminal de transmission et terminal de réception - Google Patents

Système de mise à jour de clé de chiffrée, procédé associé, terminal de transmission et terminal de réception Download PDF

Info

Publication number
WO2008131662A1
WO2008131662A1 PCT/CN2008/070371 CN2008070371W WO2008131662A1 WO 2008131662 A1 WO2008131662 A1 WO 2008131662A1 CN 2008070371 W CN2008070371 W CN 2008070371W WO 2008131662 A1 WO2008131662 A1 WO 2008131662A1
Authority
WO
WIPO (PCT)
Prior art keywords
key
key update
ciphertext
data stream
composite data
Prior art date
Application number
PCT/CN2008/070371
Other languages
English (en)
French (fr)
Inventor
Xu Chen
Original Assignee
Huawei Technologies Co., Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co., Ltd. filed Critical Huawei Technologies Co., Ltd.
Priority to EP08715107A priority Critical patent/EP2063566A4/en
Publication of WO2008131662A1 publication Critical patent/WO2008131662A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/065Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/12Transmitting and receiving encryption devices synchronised or initially set up in a particular manner
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • H04L2209/601Broadcast encryption

Definitions

  • the present invention relates to a key update system, method, and sender and receiver.
  • RTP Real-time Transport Protocol
  • IPTV Internet Protocol Television
  • RTP Real-time Transport Protocol
  • RTP is a transport protocol for multimedia data streams on the Internet (internet).
  • RTP provides end-to-end network transport capabilities for transmitting real-time data such as video, audio and emulation data via multicast and on-demand, but RTP There are no real-time services such as resource booking and quality assurance.
  • the Secure Real-time Transport Protocol is a subset of the Real-Time Transport Protocol (RTP), which enhances privacy based on RTP and defines message authentication and integrity protection.
  • the establishment of an SRTP session requires first generating a session key (Session Key).
  • the session key includes an encryption key (encr_key), an authentication key (auth_key), and a salt key (salt_key).
  • the session key is a pseudo-random function (Pseudorandom). Function ) is responsible for generating.
  • the input parameters of the pseudo-random function include a master key (Master Key) and a message index of the RTP session.
  • the message index of the RTP session uses the ⁇ ROC, Seq #> binary group implicit notification mechanism, where ROC (Roll Over Counter) is used to mark the number of cycles of Seq #.
  • the popular scheme in IPTV copyright management is to expand the scrambling code mechanism in the cable television scheme, and to use the long-short-key key update mechanism of the hierarchical level.
  • the multimedia data is encrypted and transmitted by the SRTP protocol, and is sent by the multicast to the SRTP session receiving end, and the receiving end decrypts the multimedia data by using the shared session key shared in advance to complete the consumption of the multimedia content.
  • the key issue of this solution is to efficiently deliver key generation parameters to the SRTP protocol.
  • the SRTP protocol According to the analysis of the SRTP key generation algorithm, the SRTP protocol generates a session key, which requires three parameters: ⁇ Master Key, ROC, 869 #> triplet, and is used to distinguish different
  • the SSRC (Synchronization Source Identifier) parameter of the RTP session initiator must also be transmitted to the SRTP protocol.
  • the copyright management system needs to pass the ⁇ 881 ⁇ , Master Key, ROC, Seq #> parameters to the SRTP protocol, where the Master Key is the short-term key (STK, Short Term Key) of the copyright management system.
  • EKT Encrypted Key Transport
  • the (Real-time Transport Control Protocol) protocol carries part of the RTP protocol control function.
  • the inventor has found that the disadvantages of the EKT solution are:
  • the RTCP packet bandwidth is usually 5% of the effective RTP session bandwidth, and the RTCP bandwidth reserved for the session sender is only 75% of the total RTCP bandwidth.
  • the actual effective key download bandwidth is very limited. Therefore, if the EKT scheme is used to transmit the broadcast encryption key, the key update period will inevitably be too long.
  • the EKT scheme inherits the shortcomings of the RTCP scheme.
  • the RTCP port needs to be opened in the firewall itself. If the RTCP itself is limited by the firewall and cannot complete the traversal, the key transmission running on it cannot be completed.
  • Embodiments of the present invention provide a broadcast encryption update system, method, and a transmitting end and a receiving end, which can shorten the cycle time of a key update message to a certain extent.
  • An embodiment of the present invention provides a key update system, including an encryption module and a multiplexing module at a transmitting end, and a demultiplexing module and a session key generating module at a receiving end, where: the encryption module is configured to use a multimedia stream.
  • the multiplexing module is configured to multiplex the key update message and the ciphertext to form a composite data stream, and send the composite data stream to the solution a multiplexing module, where the key update message includes a parameter required to generate a session key;
  • the demultiplexing module is configured to separate the received key update message and the ciphertext in the composite data stream
  • the session key generation module is configured to decrypt and restore the parameters required to generate the session key from the key update message, and generate an updated session key accordingly.
  • the embodiment of the present invention provides a sending end that implements a key update, and includes: an encryption module, configured to encrypt a multimedia stream by using a session key to form a ciphertext; and a multiplexing module, configured to: use the ciphertext provided by the cryptographic module
  • the key update message is multiplexed to form a composite data stream, and the composite data stream is sent to receive End, the key update message includes parameters required to generate a session key.
  • An embodiment of the present invention provides a receiving end for implementing a key update, including: a demultiplexing module, configured to separate a key update message and a ciphertext in a received composite data stream; and a session key generating module, configured to: Decrypting from the key update message restores the parameters required to generate the session key, and generates an updated session key accordingly.
  • An embodiment of the present invention provides a method for key update, including: encrypting a multimedia stream by using a session key at a sending end to form a ciphertext; multiplexing the ciphertext with a key update message to form a composite data stream, And sending the composite data stream to the receiving end, where the key update message includes parameters required for generating a parameter required for the session key; separating the key update message in the composite data stream at the receiving end The ciphertext decrypts and restores the parameters required to generate the session key from the key update message, and generates an updated session key accordingly.
  • An embodiment of the present invention provides a method for sending a key update message, including: encrypting a multimedia stream by using a session key to form a ciphertext; multiplexing the ciphertext with a key update message to form a composite data stream, And transmitting the composite data stream to a receiving end, where the key update message includes parameters required to generate a session key.
  • An embodiment of the present invention provides a method for receiving a key update message, including: receiving a composite data stream, where the composite data stream includes a combined key update message and a ciphertext; and separating the composite data stream Key update message and ciphertext; decrypting and restoring the parameters required to generate the session key from the key update message, and generating an updated session key accordingly.
  • FIG. 1 is a structural diagram of a broadcast key update system according to an embodiment of the present invention.
  • FIG. 2 is a flowchart of a broadcast key update method according to an embodiment of the present invention.
  • FIG. 3 is a format diagram of a key update message according to an embodiment of the present invention.
  • FIG. 1 is a structural diagram of a broadcast key update system according to an embodiment of the present invention.
  • the broadcast key update system includes an encryption module, a multiplexing module, a demultiplexing module, a decryption module, and a session key generation module.
  • the cryptographic module receives the multimedia stream, and encrypts the multimedia stream through the session key to form a ciphertext transmission to the complex Use the module.
  • the multiplexing module multiplexes the broadcast key update message and the ciphertext to form a composite data stream, and uses the multicast data channel to send the entire composite data stream to the demultiplexing module of the session client, where the broadcast key update message includes Encrypted Shortcut Key STK and parameters required to establish a Real Time Transport Protocol SRTP session.
  • the demultiplexing module separates the broadcast key update message and the ciphertext, decrypts and restores the short-acting key STK, and transmits the ciphertext to the decryption module.
  • the STK information together with the parameters for establishing the SRTP session, generates an updated session key through the session key generation module, and the session key generation module transmits the updated session key to the decryption module for subsequent data decryption.
  • the decryption module decrypts the multimedia stream based on the updated session key.
  • the RTP multiplexing technique used by the multiplexing module includes various methods, and in this embodiment, a basic version number field multiplexing technique is used.
  • the value of the Version field of the standard RTP message is RTP version number 2, and the RTP ⁇ and the broadcast encryption key are updated by a new version number.
  • the broadcast key update method includes the following steps:
  • the multimedia stream is encrypted by the session key to form a ciphertext
  • the ciphertext and the broadcast key update message are multiplexed to form a composite data stream and sent to the session client, where the broadcast key update message includes the cryptographically protected short-acting key STK and parameters required for establishing the SRTP session;
  • the problem of unsynchronized encrypted multimedia data and key messages may be solved by setting the message buffer.
  • the inventors found through research that the asynchronous problem mainly occurs in the RTP session session establishment phase and key update.
  • the RTP real-time multimedia data may arrive before the broadcast encrypted message at the beginning of the RTP session.
  • the session receiving end needs to first buffer the SRTP data packet, and after receiving the broadcast encrypted packet, decrypt the packet.
  • the key generation parameter of the SRTP, the session key of the SRTP is restored, and the multimedia data message in the cache is decrypted.
  • the key update phase the key update message needs to be cached, in the process of key update.
  • the IPTV client needs to cache the old and new sets of session key information.
  • the client can verify whether the content is decrypted by using the new session key according to the Seq # of the RTP message. Since the key update period of the SSC algorithm is usually only in the order of seconds, No large cache overhead is generated regardless of whether the multimedia data message or the key update message is cached. At the same time, there is no unacceptable access delay due to buffering of multimedia data.
  • the RTP protocol verification is first performed on the data received by the RTP port, and generally includes packet-based and flow-based verification.
  • the specific broadcast encrypted message format is defined by EKT, including SSRC, SEQ #, ROC and the extensible ciphertext part.
  • the ciphertext part includes the ciphertext encrypted by the subset identifier and the subset key.
  • the packet contains a verification field, which is responsible for the integrity and authenticity protection of the broadcast encrypted message.
  • the Security Parameter Index is used to distinguish key update messages in different periods.
  • the sub-set identifier can be used for anti-replay protection of key update packets. For details, see the packet format. image 3.
  • the broadcast key update message and the ciphertext are separated, and the STK is decrypted and restored, and a session key is generated along with the parameters for establishing the SRTP session for decrypting the multimedia data stream.
  • the state change of the user will trigger the key update process.
  • the user join status can be obtained by listening to the RTSP Setup message.
  • the user's leaving status is mainly manifested in three aspects: End RTP session, switch channels or exit playback. All three aspects may independently generate a user leaving state. For the first case, you can obtain information about the user leaving by processing the RTCP BYE message. For the latter two cases, it is done by processing the RTSP Teardown message or the Announce message numbered 2103, 5502, 5401.
  • the different subset information of the broadcast key update method in the embodiment of the present invention is independent of each other and has no dependency relationship.
  • the message format definition subset ID information and the encrypted subset ciphertext information in FIG. 3 appear in pairs.
  • the key update message is delivered along the IPTV data channel, and the actual data receiving user will be gradually limited to a specific subset.
  • the other irrelevant subset key update information has no practical meaning for the user on the delivery path, and the intermediate monitoring node on the IPTV data transmission channel will filter the irrelevant subset key update information, and the identification (Identification)
  • the key update message is multiplexed to the RTP data channel for delivery.
  • the specific authentication efficiency is related to the construction of the key tree of the Stateful Subset Cover Algorithm.
  • the embodiment of the present invention combines the advantages of the SSC algorithm and the SRTP protocol in combination with the terminal state subset, and utilizes the advantage of the SSC algorithm in broadcast encryption to complete the distribution of the SRTP master key.
  • the number of subsets in the broadcast message is only LKH (Logical Key Hierarchy) algorithm (because the LKH algorithm is proposed earlier than complete) Subset concept, LKH
  • the number of subsets of key update messages is usually the number of path nodes to be encrypted on the LKH key tree) and about 1/4 of the SSD (Stateless Subset Different) algorithm, and the number of subsets of key updates and the actual number of users. Irrelevant, only related to the number of users joined and the number of users recalled.
  • # of Total Subsets ⁇ added users + 2 ⁇ Arevoked users + 1.
  • the speed of key update in the embodiment of the present invention can meet the requirements of IPTV copyright management.
  • the RTP multiplexing method in a bandwidth-constrained environment in the case where the simulation environment is unchanged, the key transmission bandwidth is increased from 5 % to 95% due to the RTP channel bearer.
  • the RTP multiplexing method does not need to introduce RTP header overhead, so the actual payload is increased by 64 bytes due to the reduced header overhead compared to an RTCP EKT message.
  • the embodiment of the present invention can complete the cross-firewall transmission of the key update message without complex firewall traversal technology. Regardless of the RTP multiplexing technology or the RTSP bearer technology, the two technologies respectively borrow the data channel and the control channel of the IPTV, and the firewall itself. There is no need to create additional ports.
  • Embodiments of the present invention reduce changes to existing protocols and reduce the difficulty of implementation.
  • the key update message is transmitted using the RTP data channel, and the key update message can be flexibly segmented to adapt to the QoS policy of RTP transmission.
  • the high-frequency broadcast key update of the large-scale user group can be completed by using the RTP channel bearer; in addition, the key update message does not need to establish an additional port through the firewall. .

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Description

一种密钥更新系统、 方法以 ½送端和接收端
本申请要求于 2007 年 4 月 26 日提交中国专利局、 申请号为 200710074227.0、 发明名称为 "一种广播加密更新系统及方法,,的中国专利申请 的优先权, 其全部内容通过引用结合在本申请中。
技术领域
本发明涉及一种密钥更新系统、 方法以及发送端和接收端。
背景技术
随着电信运营商 IPTV ( Internet Protocol Television,基于 IP网络的互动电 视业务) 业务的兴起, 针对 IPTV内容保护方案变得日益重要。 多个 IPTV版 权管理的标准化组织已经先后推出针对 IPTV业务的版权管理方案。 实时传输 协议( RTP , Real-time Transport Protocol )作为成熟的实时传输协议, 广泛应 用到 IPTV多媒体业务的数据承载。 RTP是用于 Internet (国际互联网络)上 针对多媒体数据流的一种传输协议, RTP提供端对端网络传输功能,适合通过 组播和点播传送实时数据, 如视频、 音频和仿真数据, 但 RTP没有涉及资源 预订和质量保证等实时服务。 安全的实时传输协议(SRTP, Secure Real-time Transport Protocol )是实时传输协议 RTP的一个子集, 该协议在 RTP基础上 加强了保密性, 并定义了消息认证和完整性保护。 一个 SRTP会话的建立需要 首先生成会话密钥 (Session Key ) , 会话密钥包括加密密钥 (encr_key ) 、 认 证密钥( auth_key )及盐密钥( salt_key ) ,会话密钥由伪随机函数( Pseudorandom Function ) 负责生成。 伪随机函数的输入参数包括一个主钥 (Master Key )和 RTP会话的报文索引。 RTP会话的报文索引釆用 <ROC, Seq #>二元组隐性通 告机制, 其中 ROC ( Roll Over Counter, 循环计数器 )用来标记 Seq #的循环 次数。
目前 IPTV版权管理中, 比较流行的方案是扩展有线电视方案中的扰码机 制, 釆用划分等级的长短效密钥更新机制。 多媒体数据通过 SRTP协议加密承 载, 由组播发送给 SRTP会话接收端, 接收端用事先共享的共享会话密钥解密 多媒体数据, 完成多媒体内容的消耗。 该方案的关键问题是向 SRTP协议高效 输送密钥生成参数。 根据对 SRTP密钥生成算法的分析, SRTP协议生成会话 密钥, 需要三个参数: <Master Key, ROC, 869 #>三元组, 另外用于区分不同 的 RTP会话发起者的 SSRC ( Synchronization Source Identifier, 同步资源标识) 参数, 也必须传送给 SRTP协议。 综上所述, 版权管理系统需向 SRTP协议传 递<881〇, Master Key, ROC, Seq #>四个参数, 其中 Master Key就是版权管 理系统的短效密钥 (STK, Short Term Key ) 。
现有的 EKT ( Encrypted Key Transport,加密密钥传输 )方案,是由 RTCP
( Real-time Transport Control Protocol, 实时传输控制协议)协议承载部分 RTP 协议的控制功能。 发明人在实现本发明的过程中发现, EKT 方案的缺点是: 为了保障 RTP会话的 QoS ( Quality of Service, 服务质量 ), 通常需要为 RTP 会话预留带宽。 而 RTCP报文带宽通常为有效 RTP会话带宽的 5%, 进一步留 给会话发送端的 RTCP带宽就只是 RTCP总带宽的 75%。加之 RTCP报文头的 开销 (约 64 字节), 实际的有效的密钥下载带宽非常有限。 因此, 如果釆用 EKT 方案传送广播加密密钥, 必然导致密钥更新 文周期超长。 此外, EKT 方案继承了 RTCP方案的缺点, 在存在防火墙的应用中, 需要在防火墙本身开 辟 RTCP端口, 如果 RTCP本身受限防火墙, 不能完成穿越, 则运行于其上的 密钥传输将不能完成。
发明内容
本发明的实施例提供一种广播加密更新系统、 方法以及发送端和接收端 , 能够在一定程度上缩短密钥更新报文的周期时间。
本发明实施例提供一种密钥更新系统,包括处于发送端的加密模块及复用 模块,和处于接收端的解复用模块及会话密钥生成模块,其中:所述加密模块, 用于将多媒体流通过会话密钥加密形成密文传输到复用模块; 所述复用模块, 用于将密钥更新报文和密文复用形成复合数据流,并将所述复合数据流发送到 所述解复用模块, 所述密钥更新报文中包含生成会话密钥所需的参数; 所述解 复用模块, 用于分离接收到的所述复合数据流中的密钥更新报文和密文; 所述 会话密钥生成模块,用于从所述密钥更新报文中解密还原出生成会话密钥所需 的参数, 进而据此生成更新的会话密钥。
本发明实施例提供一种实现密钥更新的发送端, 包括: 加密模块, 用于将 多媒体流通过会话密钥加密形成密文; 复用模块, 用于将所述加密模块提供的 密文和密钥更新报文复用形成复合数据流, 并将所述复合数据流发送到接收 端, 所述密钥更新报文中包含生成会话密钥所需的参数。
本发明实施例提供一种实现密钥更新的接收端, 包括: 解复用模块, 用于 分离接收到的复合数据流中的密钥更新报文和密文; 会话密钥生成模块, 用于 从所述密钥更新报文中解密还原出生成会话密钥所需的参数,进而据此生成更 新的会话密钥。
本发明实施例提供一种密钥更新的方法, 包括: 在发送端釆用会话密钥对 多媒体流加密, 形成密文; 将所述密文与密钥更新报文复用形成复合数据流, 并将所述复合数据流发送到接收端,所述密钥更新报文包括生成会话密钥所需 的参数所需的参数; 在接收端分离所述复合数据流中的密钥更新报文和密文, 从所述密钥更新报文中解密还原出生成会话密钥所需的参数,进而据此生成更 新的会话密钥。
本发明实施例提供一种密钥更新报文的发送方法, 包括: 釆用会话密钥对 多媒体流加密, 形成密文; 将所述密文与密钥更新报文复用形成复合数据流, 并将所述复合数据流发送到接收端,所述密钥更新报文包括生成会话密钥所需 的参数。
本发明实施例提供一种密钥更新报文的接收方法,包括:接收复合数据流, 所述复合数据流包括复合在一起的密钥更新报文和密文;分离所述复合数据流 中的密钥更新报文和密文;从所述密钥更新报文中解密还原出生成会话密钥所 需的参数, 进而据此生成更新的会话密钥。
附图说明
图 1是本发明实施例的广播密钥更新系统的结构图;
图 2是本发明实施例的广播密钥更新方法的流程图;
图 3是本发明实施例的密钥更新报文格式图。
具体实施方式
为了使本发明实施例的目的、技术方案及优点更加清楚明白, 以下结合附 图及实施例, 对本发明实施例进行进一步详细说明。
请参阅图 1 , 为本发明实施例的广播密钥更新系统的结构图。 该广播密钥 更新系统包括加密模块、 复用模块、 解复用模块、 解密模块及会话密钥生成模 块。加密模块接收多媒体流,将多媒体流通过会话密钥加密形成密文传输到复 用模块。 复用模块将广播密钥更新报文和密文复用形成复合数据流, 利用组播 数据信道将整个复合数据流发送到会话客户端的解复用模块, 其中, 广播密钥 更新报文中包含加密的短效密钥 STK和建立实时传输协议 SRTP会话所需的参 数。 解复用模块分离广播密钥更新报文和密文, 解密还原短效密钥 STK, 并将 密文传送到解密模块。 STK信息连同建立 SRTP会话的参数通过会话密钥生成 模块生成更新的会话密钥,会话密钥生成模块将更新的会话密钥传送至解密模 块, 用于后续的数据解密。 解密模块根据更新的会话密钥解密出多媒体流。 该 复用模块釆用的 RTP复用技术包含多种方法,在本实施例中釆用基本的版本号 字段复用技术。 标准的 RTP报文的 Version字段的数值为 RTP版本号 2, 通过一 个新的版本号区分 RTP^艮文和广播加密密钥更新 ^艮文。
请参阅图 2, 为本发明实施例的广播密钥更新方法的流程图。 该广播密钥 更新方法包括以下步骤:
多媒体流通过会话密钥加密形成密文;
密文与广播密钥更新报文经过复用形成复合数据流发送到会话客户端,所 述广播密钥更新报文包括加密保护的短效密钥 STK和建立 SRTP会话所需的参 数;
由于釆用 RTP复用技术,通过设置报文緩存解决可能存在加密多媒体数据 和密钥报文不同步的问题, 发明人通过研究发现, 不同步问题主要发生在 RTP 会话 Session建立阶段和密钥更新阶段, 对于第一种情况, 在 RTP会话刚刚开 始, RTP的实时多媒体数据可能先于广播加密报文到达, 会话接收端需要首先 緩存 SRTP的数据报文,等接收到广播加密报文后,解密 SRTP的密钥生成参数, 还原 SRTP的会话密钥, 解密緩存中的多媒体数据报文, 对于第二种情况, 即 密钥更新阶段, 需要緩存密钥更新报文, 在密钥更新的过程中, IPTV的客户 端需要緩存新旧两套会话密钥信息, 客户端可以根据 RTP报文的 Seq #检验是 否釆用新的会话密钥解密内容, 由于 SSC算法的密钥更新周期通常只有秒级, 无论緩存多媒体数据报文或是密钥更新报文都不会产生较大的緩存开销,同时 也不会因为緩存多媒体数据导致不可接受的接入延时。
在 RTP的编码实现中, 首先对 RTP端口收到的数据进行 RTP协议验证 , 一 般包括基于包和基于流的验证。 基于包的验证方式首先判断 Version字段, 只 有 Version = 2的报文交由 RTP协议栈处理。 在这里增加一个判断分支, 例如 Version = 1的报文, 送交广播加密程序处理。
具体的广播加密报文格式釆用类似 EKT的定义方式, 包含 SSRC、 SEQ # 、 ROC以及可扩展的密文部分。密文部分包括子集标识符和子集密钥加密后的密 文。 报文中包含一个验证域, 负责广播加密报文的完整性和真实性保护。 另外 报文中的安全参数索引 (Security Parameter Index )用来区分不同周期的密钥 更新报文, 配合子集标识可以用于密钥更新报文的抗重放保护, 具体的报文格 式请参阅图 3。
分离广播密钥更新报文和密文, 解密还原 STK, 连同建立 SRTP会话的参 数生成会话密钥, 用于多媒体数据流的解密。
在本发明实施例的广播密钥更新方法中,用户的状态变化将会触发密钥更 新过程。 在 IPTV系统中, 用户加入状态可以通过侦听 RTSP的 Setup报文获得。 用户的离开状态主要表现在三个方面: 结束 RTP会话, 切换频道或退出播放。 三个方面都可能独立产生用户离开状态。针对第一种情况,可以通过处理 RTCP BYE报文获得用户离开的信息。 针对后两种情况, 通过处理 RTSP的 Teardown 消息或者编号为 2103 , 5502, 5401的 Announce消息完成。
本发明实施例的广播密钥更新方法的不同子集信息相互独立,没有依存关 系。 图 3中的报文格式定义子集 ID信息和加密子集密文信息成对出现。 密钥 更新报文沿着 IPTV数据通道下发, 实际的数据接收用户将逐渐限定到特定的 子集。 其它不相关的子集密钥更新信息对于下发路径上的用户没有实际意义, IPTV数据传输通道上的中间监测节点将会过滤这些不相关的子集密钥更新信 息, 并将鉴裁 (Identification and Determination )后的密钥更新报文复用到 RTP 数据信道下发。 具体的鉴裁效率和状态的子集覆(Stateful Subset Cover Algorithm ) 算法密钥树的构造相关, 同一汇聚节点下的用户尽量集中覆盖在 一个子集中可以在一定程度上简化鉴裁算法的运算量。本发明实施例结合终端 状态子集覆盖 SSC算法和 SRTP协议的优势, 利用 SSC算法在广播加密方面 的优势,完成 SRTP主钥的分发。端状态子集覆盖 SSC算法在用户数量为 219, 并且以正弦规律或单调指数递减变化时, 广播报文中的子集数量仅为 LKH ( Logical Key Hierarchy )算法(由于 LKH算法的提出早于完备子集概念, LKH 密钥更新报文的子集数通常为 LKH 密钥树上需加密的路径节点数目)和 SSD ( Stateless Subset Different )算法的 1/4左右,并且密钥更新的子集数量和实际 的用户数量无关, 只与加入的用户数量和召回的用户数量有关, 具体的表达式 为: # of Total Subsets = Δ added users + 2χ Arevoked users + 1。
本发明实施例中密钥更新的速度可以满足 IPTV版权管理的需求。 以带宽 受限环境下的 RTP复用方法为例, 在模拟环境不变的情况下, 由于釆用 RTP信 道承载, 密钥传送带宽由 5 %增加到 95 %。 同时, RTP复用方法不需要引入 RTP 报头开销, 所以相比一个 RTCP EKT报文, 实际的有效载荷因报头开销减小而 增加 64字节。 综合以上两点, 按照上文例子中的数据计算, 总共需要 2.4秒完 成密钥更新, 这个时间间隔可以满足 IPTV数字版权的需要。
本发明实施例不需要复杂的防火墙穿越技术,就可以完成密钥更新报文的 跨防火墙传输,无论 RTP复用技术或者 RTSP承载技术,两种技术分别借用 IPTV 的数据信道和控制信道, 防火墙本身不需要建立额外的端口。
本发明实施例减少了对于现有协议的更改, 减小具体实施的难度。 釆用 RTP复用技术, 密钥更新报文釆用 RTP数据信道传送, 密钥更新报文可以灵活 分段, 以适应 RTP传输的 QoS策略。
从以上本发明实施例的述技术方案可以看出, 由于釆用 RTP信道承载, 能 够完成大规模用户组的高频率广播密钥更新; 另外, 密钥更新报文穿越防火墙 不需要建立额外的端口。
以上所述仅为本发明的较佳实施例而已, 并不用以限制本发明, 凡在本发 明的精神和原则之内所作的任何修改、等同替换和改进等, 均应包含在本发明 的保护范围之内。

Claims

权 利 要 求
1、 一种密钥更新系统, 其特征在于, 包括处于发送端的加密模块及复用 模块, 和处于接收端的解复用模块及会话密钥生成模块, 其中:
所述加密模块,用于将多媒体流通过会话密钥加密形成密文传输到复用模 块;
所述复用模块, 用于将密钥更新报文和密文复用形成复合数据流, 并将所 述复合数据流发送到所述解复用模块,所述密钥更新报文中包含生成会话密钥 所需的参数;
所述解复用模块,用于分离接收到的所述复合数据流中的密钥更新报文和 密文;
所述会话密钥生成模块,用于从所述密钥更新报文中解密还原出生成会话 密钥所需的参数, 进而据此生成更新的会话密钥。
2、 如权利要求 1所述的密钥更新系统, 其特征在于, 还包括:
解密模块,用于根据所述会话密钥生成模块提供的更新的会话密钥对接收 到的密文进行解密, 解密出多媒体流。
3、 如权利要求 1所述的密钥更新系统, 其特征在于, 所述复用模块, 具 体用于釆用实时传输协议 RTP复用技术将密钥更新报文和密文复用形成复合 数据流, 并将所述复合数据流发送到所述解复用模块, 所述密钥更新报文中包 含生成会话密钥所需的参数。
4、 如权利要求 3所述的密钥更新系统, 其特征在于, 所述 RTP复用技术具 体是基本的版本号字段复用技术,所述复合数据流中所述密文的版本号和所述 广播加密密钥更新报文的版本号不同。
5、 如权利要求 1至 4中任一项所述的密钥更新系统, 其特征在于, 所述生成会话密钥所需的参数包括短效密钥 STK以及建立 SRTP会话的参 数。
6、 一种实现密钥更新的发送端, 其特征在于, 包括:
加密模块, 用于将多媒体流通过会话密钥加密形成密文;
复用模块,用于将所述加密模块提供的密文和密钥更新报文复用形成复合 数据流, 并将所述复合数据流发送到接收端, 所述密钥更新报文中包含生成会 话密钥所需的参数。
7、 如权利要求 6所述的发送端, 其特征在于:
所述复用模块, 具体用于釆用 RTP复用技术将所述加密模块提供的密文 和密钥更新报文复用形成复合数据流, 并将所述复合数据流发送到接收端, 所 述密钥更新报文中包含生成会话密钥所需的参数。
8、 一种实现密钥更新的接收端, 其特征在于, 包括:
解复用模块, 用于分离接收到的复合数据流中的密钥更新报文和密文; 会话密钥生成模块,用于从所述密钥更新报文中解密还原出生成会话密钥 所需的参数, 进而据此生成更新的会话密钥。
9、 如权利要求 8所述的接收端, 其特征在于:
所述解复用模块, 具体用于根据 RTP编码对接收到的复合数据流进行 RTP 协议验证, 进而分离所述复合数据流中的密文和密钥更新报文。
10、 一种密钥更新的方法, 其特征在于, 包括:
在发送端釆用会话密钥对多媒体流加密, 形成密文;
将所述密文与密钥更新报文复用形成复合数据流,并将所述复合数据流发 送到接收端, 所述密钥更新报文包括生成会话密钥所需的参数所需的参数; 在接收端分离所述复合数据流中的密钥更新报文和密文,从所述密钥更新 报文中解密还原出生成会话密钥所需的参数, 进而据此生成更新的会话密钥。
11、 如权利要求 10所述的密钥更新方法, 其特征在于, 还包括: 釆用所述 更新的会话密钥对当前接收到的密文或此前接收到并緩存的密文或后续接收 到的密文进行解密, 解密出多媒体流。
12、 一种密钥更新 >¾文的发送方法, 其特征在于, 包括:
釆用会话密钥对多媒体流加密, 形成密文;
将所述密文与密钥更新报文复用形成复合数据流,并将所述复合数据流发 送到接收端, 所述密钥更新报文包括生成会话密钥所需的参数。
13、 如权利要求 12所述的发送方法, 其特征在于, 所述将密文与密钥更新 报文进行复用包括:
釆用 RTP复用技术将密文与密钥更新报文进行复用。
14、 如权利要求 13所述的发送方法, 其特征在于, 所述将复合数据流发送 到接收端包括:
将所述复合数据流利用 IPTV数据通道发送到接收端。
15、 如权利要求 14所述的发送方法, 其特征在于, 所述将复合数据流利 用 IPTV数据通道发送到接收端包括:
将所述复合数据流沿着 IPTV数据通道下发, 需要密钥更新的用户限定为 特定子集, 所述 IPTV数据传输通道上的中间节点从所述复合数据流中解复用 出密钥更新报文, 过滤其它不相关的子集密钥更新信息, 重新生成报文完整性 保护标签, 并将鉴裁后的密钥更新报文重新与所述密文复用后再通过所述 IPTV数据通道下发到接收端。
16、 如权利要求 12至 15中任一项所述的发送方法, 其特征在于, 所述生成会话密钥所需的参数包括短效密钥 STK以及建立 SRTP会话的参 数。
17、 如权利要求 12至 15中任一项所述的发送方法, 其特征在于, 引起所述 开状态获知用户状态改变。
18、 一种密钥更新报文的接收方法, 其特征在于, 包括:
接收复合数据流, 所述复合数据流包括复合在一起的密钥更新报文和密 文;
分离所述复合数据流中的密钥更新报文和密文;
从所述密钥更新报文中解密还原出生成会话密钥所需的参数,进而据此生 成更新的会话密钥。
19、 如权利要求 18所述的接收方法, 其特征在于, 所述分离复合数据流中 的密钥更新 ^艮文和密文包括:
根据 RTP编码对 RTP端口接收到的复合数据流进行 RTP协议验证 , 进而分 离所述多媒体流和密钥更新报文。
20、 如权利要求 18或 19所述的接收方法, 其特征在于, 所述生成会话密钥 所需的参数包括短效密钥 STK以及建立 SRTP会话的参数。
PCT/CN2008/070371 2007-04-26 2008-02-28 Système de mise à jour de clé de chiffrée, procédé associé, terminal de transmission et terminal de réception WO2008131662A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
EP08715107A EP2063566A4 (en) 2007-04-26 2008-02-28 PRESET KEY UPDATE SYSTEM, ASSOCIATED METHOD, TRANSMISSION TERMINAL, AND RECEIVING TERMINAL

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN200710074227.0 2007-04-26
CN 200710074227 CN101296358B (zh) 2007-04-26 2007-04-26 一种广播加密更新系统及方法

Publications (1)

Publication Number Publication Date
WO2008131662A1 true WO2008131662A1 (fr) 2008-11-06

Family

ID=39925199

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2008/070371 WO2008131662A1 (fr) 2007-04-26 2008-02-28 Système de mise à jour de clé de chiffrée, procédé associé, terminal de transmission et terminal de réception

Country Status (3)

Country Link
EP (1) EP2063566A4 (zh)
CN (1) CN101296358B (zh)
WO (1) WO2008131662A1 (zh)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103297400A (zh) * 2012-03-01 2013-09-11 中兴通讯股份有限公司 基于双向转发检测协议的安全联盟管理方法及系统
CN112423007B (zh) * 2020-11-09 2022-07-08 杭州叙简科技股份有限公司 一种基于组播的webrtc的视频流传输系统

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030068047A1 (en) * 2001-09-28 2003-04-10 Lee David A. One-way broadcast key distribution
CN1604534A (zh) * 2003-09-29 2005-04-06 华为技术有限公司 用户通过业务数据携带密钥信息的方式获取密钥的方法
CN1878058A (zh) * 2006-07-12 2006-12-13 中国移动通信集团公司 广播业务中用户终端密钥更新的方法
CN1946019A (zh) * 2005-10-04 2007-04-11 株式会社日立制作所 网络装置、网络系统及密钥更新方法

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7352868B2 (en) * 2001-10-09 2008-04-01 Philip Hawkes Method and apparatus for security in a data processing system
EP1499061A1 (en) * 2003-07-17 2005-01-19 Deutsche Thomson-Brandt Gmbh Individual video encryption system and method
US7657036B2 (en) * 2004-09-21 2010-02-02 Qualcomm Incorporated Determining a session encryption key during a broadcast/multicast service session using secure real-time transport protocol
US8189786B2 (en) * 2005-05-25 2012-05-29 Zenith Electronics Llc Encryption system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030068047A1 (en) * 2001-09-28 2003-04-10 Lee David A. One-way broadcast key distribution
CN1604534A (zh) * 2003-09-29 2005-04-06 华为技术有限公司 用户通过业务数据携带密钥信息的方式获取密钥的方法
CN1946019A (zh) * 2005-10-04 2007-04-11 株式会社日立制作所 网络装置、网络系统及密钥更新方法
CN1878058A (zh) * 2006-07-12 2006-12-13 中国移动通信集团公司 广播业务中用户终端密钥更新的方法

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP2063566A4 *

Also Published As

Publication number Publication date
CN101296358A (zh) 2008-10-29
CN101296358B (zh) 2011-06-22
EP2063566A4 (en) 2011-01-19
EP2063566A1 (en) 2009-05-27

Similar Documents

Publication Publication Date Title
US11102553B2 (en) Systems and methods for secure playback of encrypted elementary bitstreams
US8452008B2 (en) Content distributing method, apparatus and system
WO2009021441A1 (fr) Procédé d&#39;émission et de réception, appareil et système pour la politique de sécurité de la session en multidiffusion
US8948394B2 (en) Method and apparatus for distribution and synchronization of cryptographic context information
JP2007041223A (ja) データ配信装置及びデータ通信システム
US7466824B2 (en) Method and system for encryption of streamed data
US8645680B2 (en) Sending media data via an intermediate node
WO1997034279A1 (fr) Appareil transmetteur de donnees, procede de transmission de donnees, recepteur de donnees, procede de reception de donnees, dispositif de transfert de donnees et procede de transfert de donnees
US20110107082A1 (en) Storing and Forwarding Media Data
CN102694819B (zh) 一种基于广播加密的流媒体传输方法
WO2008131662A1 (fr) Système de mise à jour de clé de chiffrée, procédé associé, terminal de transmission et terminal de réception
CN101222324B (zh) 用于端到端的媒体流安全的实现方法和装置
Marksteiner et al. A protocol for synchronizing quantum-derived keys in IPsec and its implementation
Steffen et al. SIP security
Iyyanar et al. Effective and secure scheme for video streaming using SRTP
Fortino et al. Enhancing cooperative playback systems with efficient encrypted multimedia streaming
Akkus et al. Secure transmission of video on an end system multicast using public key cryptography
Kim et al. Implementation of quality of service control and security based on real-time transport protocol
Park et al. Design of the Adaptive Encryption Using Parallel TCP in the Open IPTV
WO2009152845A1 (en) Converting encrypted media data

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 08715107

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 2008715107

Country of ref document: EP

NENP Non-entry into the national phase

Ref country code: DE