WO2011035468A1 - 广播业务分组的实现方法、装置和系统 - Google Patents

广播业务分组的实现方法、装置和系统 Download PDF

Info

Publication number
WO2011035468A1
WO2011035468A1 PCT/CN2009/074131 CN2009074131W WO2011035468A1 WO 2011035468 A1 WO2011035468 A1 WO 2011035468A1 CN 2009074131 W CN2009074131 W CN 2009074131W WO 2011035468 A1 WO2011035468 A1 WO 2011035468A1
Authority
WO
WIPO (PCT)
Prior art keywords
virtual channel
checksum
channel table
data object
vct
Prior art date
Application number
PCT/CN2009/074131
Other languages
English (en)
French (fr)
Inventor
范云松
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to EP09849656.5A priority Critical patent/EP2482551B1/en
Priority to CN200980106656.9A priority patent/CN102648625B/zh
Priority to PCT/CN2009/074131 priority patent/WO2011035468A1/zh
Publication of WO2011035468A1 publication Critical patent/WO2011035468A1/zh
Priority to US13/425,917 priority patent/US9351022B2/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/236Assembling of a multiplex stream, e.g. transport stream, by combining a video stream with other content or additional data, e.g. inserting a URL [Uniform Resource Locator] into a video stream, multiplexing software data into a video stream; Remultiplexing of multiplex streams; Insertion of stuffing bits into the multiplex stream, e.g. to obtain a constant bit-rate; Assembling of a packetised elementary stream
    • H04N21/2362Generation or processing of Service Information [SI]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/235Processing of additional data, e.g. scrambling of additional data or processing content descriptors
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/266Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/266Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel
    • H04N21/2665Gathering content from different sources, e.g. Internet and satellite
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/434Disassembling of a multiplex stream, e.g. demultiplexing audio and video streams, extraction of additional data from a video stream; Remultiplexing of multiplex streams; Extraction or processing of SI; Disassembling of packetised elementary stream
    • H04N21/4345Extraction or processing of SI, e.g. extracting service information from an MPEG stream
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/435Processing of additional data, e.g. decrypting of additional data, reconstructing software from modules extracted from the transport stream

Definitions

  • the present invention relates to the field of network technologies, and in particular, to a method, an apparatus, and a system for implementing a broadcast service packet.
  • DTA digital TV Adapter
  • the separate broadcast service group authorization management for each user is not considered, and therefore it is determined that it can only provide the service to the user, and the packet authorization of the broadcast service cannot be realized.
  • even low-end users have a certain difference in broadcast service requirements.
  • this kind of control system that cannot provide broadcast service packets to users. It is impossible to meet the user's broadcast service grouping requirements.
  • the embodiment of the invention provides a method and a device for implementing a broadcast service packet, so as to solve the problem that the control system based on the DTA-type single-top box product in the prior art cannot group the broadcast service.
  • an embodiment of the present invention provides a method for obtaining a virtual channel table VCT, including:
  • the virtual channel table includes a first checksum and a data object generated by the network side, where the data object includes channel information
  • a virtual channel list that passes the check is obtained from at least one virtual channel table sent by the network side.
  • An embodiment of the present invention provides a method for implementing a broadcast service packet, including:
  • the first checksum of the two is obtained by using the corresponding broadcast service group identifier and the virtual channel table; And transmitting a virtual channel table including the first checksum and the data object to the terminal, to implement a broadcast service packet, where the data object includes channel information.
  • An embodiment of the present invention provides an apparatus for implementing a virtual channel table, including: a receiving module, configured to receive at least one virtual channel table that is sent by a network, where the first checksum generated by the network side is included;
  • a first check module configured to acquire, by using a preset broadcast service group identifier and a data object of the virtual channel table, a second checksum of the data object, where the data object includes channel information;
  • an obtaining module configured to obtain a verified virtual channel table from the at least one virtual channel table sent by the network side when the first checksum matches the second checksum.
  • An embodiment of the present invention provides an apparatus for implementing a broadcast service packet, including:
  • a second check module configured to acquire, by using a corresponding broadcast service group identifier and a virtual channel table, a first checksum of the broadcast channel information of different groups
  • a sending module configured to send a virtual channel table including the first checksum and the data object to the terminal, to implement a broadcast service packet, where the data object includes channel information.
  • the embodiment of the invention provides a system for implementing a broadcast service packet, which is characterized in that it comprises:
  • a network side device configured to acquire, by using a corresponding broadcast service group identifier and a virtual channel table, a first checksum of the broadcast channel information for different packets; and sending the virtual channel table including the first checksum To the terminal to implement broadcast service grouping;
  • a terminal configured to receive a virtual channel table that is sent by the network side, where the virtual channel table includes a first checksum generated by the network side, and acquires both the preset broadcast service packet identifier and the data object of the virtual channel table. a second checksum; when the first checksum matches the second checksum, obtaining a verified virtual channel table from at least one virtual channel table sent by the network side,
  • the data object includes channel information.
  • the service-level grouping authorization can be implemented based on the centralized control system, and the deployed terminal can only receive the basic program when the software is not upgraded, and the subsequently issued terminal can receive the channel of the service group.
  • Information, the subsequently issued terminal is a terminal having the checksum calculation check capability described in the present invention.
  • Embodiments of the present invention do not require the use of CA (conditional access), It is possible to implement the authorization receiving of the service packet classification on the terminal side under the existing network conditions.
  • FIG. 1 is a flowchart of Embodiment 1 of a method for obtaining a virtual channel table according to the present invention
  • FIG. 2 is a flowchart of Embodiment 2 of a method for obtaining a virtual channel table according to the present invention
  • FIG. 3 is a table for obtaining a virtual channel according to the present invention
  • Figure 4 is a flowchart of Embodiment 4 of the method for obtaining a virtual channel table according to the present invention
  • Figure 5 is a flowchart of Embodiment 5 of the method for obtaining a virtual channel table according to the present invention
  • 6 is a schematic structural diagram of Embodiment 1 of an apparatus for implementing a virtual channel table according to the present invention
  • FIG. 1 is a flowchart of Embodiment 1 of a method for obtaining a virtual channel table according to the present invention
  • FIG. 2 is a flowchart of Embodiment 2 of a method for obtaining a virtual channel table according to the present invention
  • FIG. 7 is a schematic structural diagram of Embodiment 2 of an apparatus for implementing a virtual channel table according to the present invention
  • FIG. 8 is a schematic diagram of obtaining a virtual channel table according to the present invention
  • FIG. 9 is a schematic structural diagram of Embodiment 4 of an apparatus for implementing a virtual channel table according to the present invention
  • FIG. 10 is a schematic structural diagram of Embodiment 5 of an apparatus for acquiring a virtual channel table according to the present invention
  • 11 is a schematic structural diagram of Embodiment 1 of an apparatus for implementing a broadcast service packet according to the present invention
  • FIG. 12 is a schematic structural diagram of Embodiment 2 of an apparatus for implementing a broadcast service packet according to the present invention.
  • Embodiment 3 is a schematic structural diagram of Embodiment 3 of an apparatus for implementing a broadcast service packet according to the present invention
  • FIG. 14 is a schematic structural diagram of Embodiment 4 of an apparatus for implementing a broadcast service packet according to the present invention.
  • Embodiment 15 is a schematic structural diagram of Embodiment 4 of an apparatus for implementing a broadcast service packet according to the present invention.
  • 16 is a schematic structural diagram of an embodiment of a system for acquiring broadcast channel information according to the present invention.
  • the terminal In a one-way network, after the terminal is powered on, if it is used for the first time, the terminal is not activated and cannot enter the normal service working state. It needs to wait for the legitimate addressed unicast message sent by the network side (that is, the device on the network side).
  • the device is configured to report the device identifier of the terminal to the network through the outband mode (that is, the communication channel itself is not used).
  • the physical identifier is the unique identifier of the internal hardware module of the terminal.
  • the address unicast message After receiving the physical identifier reported by the user, the address unicast message is delivered through the broadcast channel, where the addressed unicast address is uniquely determined by the device identifier of the terminal, and the address unicast message includes the area identifier and the service group identifier, and the terminal receives the After the address unicast message belongs to itself, the configuration information of the area identifier is first saved, and the configuration information of the service group identifier is also saved. After the area identifier is configured, the terminal further waits for a valid activation message sent by the network. The activation message carries the area identifier. The terminal can enter the service working state only after the area is activated by the network side.
  • the method provided in Embodiment 1 of the present invention may include the following steps:
  • Step 101 For the broadcast channel information of different groups, the network side calculates the first checksum of the two by using the corresponding broadcast service group identifier and the virtual channel table.
  • an extended virtual channel table VCT (Virtual Channel Table) is defined on the network side, and the extension
  • the VCT includes a broadcast channel number, a broadcast channel name, a broadcast frequency point, or a modulation mode.
  • the service group identifier needs to be introduced. Therefore, the corresponding broadcast service group identifier and the virtual channel are adopted on the network side.
  • Table VCT is used as source data, and the first checksum of the two is calculated; the data format of the extended VCT is similar to the data format of the basic VCT, but only the channel mapping table of the VCT is extended.
  • the relevant parameters are set to be displayed by the corresponding user; wherein, when calculating the first checksum, a Cyclic Redundancy Check (CRC) may be used, or other methods may be used to obtain the First checksum.
  • CRC Cyclic Redundancy Check
  • the terminal described in the example is a terminal that is subsequently issued. It can be understood as the terminal after the upgrade, and can support the related processing of the service group identifier. For the historical terminal, it is already deployed in the network, but does not support the service group identifier.
  • the terminal of the calculation mode because the processing of the service group identifier is not supported, when the checksum is acquired, the result of the calculation for the extended VCT corresponding to the extended channel table is always wrong, and therefore, the reference in the present application
  • the terminal is a terminal that is subsequently sent, that is, a terminal that can support related processing of the service group identifier.
  • the calculation method of the checksum may specifically include: a cyclic redundancy check CRC, a hash hash operation, and a packet encryption operation. , streaming encryption or XOR; streaming encryption is the use of algorithms and keys A random code stream is generated and XORed with the data stream to produce an encrypted data stream.
  • Step 102 The terminal receives at least one virtual channel table that is sent by the network side, where the virtual channel table that is sent by the network side includes a first checksum generated by the network side and a data object, where the data object includes channel information.
  • the network side includes the first checksum and the VCT of the data object sent to the terminal, the virtual channel table VCT includes a first checksum on the network side; the data object includes a channel that the terminal can receive Information, data objects are provided in the form of data structures in the VCT.
  • Step 103 The terminal uses the preset broadcast service packet identifier and the data object of the virtual channel table as source data to obtain a second checksum of the two.
  • the terminal searches for the broadcast service packet identifier saved by itself and the data object of the received VCT, and uses the two as the source data, and simultaneously calculates and obtains the second checksum of the two; wherein, the terminal needs to obtain the second school.
  • the mode of the checksum must be the same as the manner in which the network side obtains the first checksum; wherein, the terminal in this embodiment is a subsequently issued terminal, and the preset broadcast service packet identifier is already saved in the terminal;
  • the data object of the channel table is other data in the VCT than the first checksum.
  • the terminal then matches the first checksum obtained by the calculation with the second checksum.
  • the terminal obtains the corresponding checksum from the multiple VCTs sent by the network side.
  • VCT then the broadcast channel information included in the corresponding VCT is all the complete channel information of the terminal.
  • the VCT that passes the verification is equivalent to the extended VCT that includes the channel information of the specified service.
  • the terminal may obtain the channel information that can be received by the legal virtual channel table, and the terminal may obtain the channel information by parsing or extracting the channel information from the VCT. Go to the channel information you received.
  • the terminal by acquiring the first checksum and the second checksum on the network side and the terminal side respectively based on the broadcast service packet identifier, the terminal can be matched and detected on the terminal side, so that each terminal is The VCT corresponding to the VCT can be obtained according to the verification result, so that the complete channel information that can be received by itself can be obtained.
  • the service classification packet authorization can be implemented based on the centralized control system, and the deployed terminal is not upgraded in the software. In this case, only the basic program can be received, and the subsequently issued terminal can receive the channel information of the business group in which it is located.
  • the method provided in Embodiment 2 of the present invention may include the following steps:
  • Step 201 The network side device performs data splicing on the broadcast service group identifier and the data object of the VCT.
  • the process of data splicing may be performed by using a check data object first, and after the service group identifier is followed by: verifying the data object II service group identifier; or using the service group identifier before, the school After the data object is examined, it is expressed as: Service Group Identifier II Check Data Object (where II is just a separator and does not have other meanings).
  • Step 202 The network side device performs the CRC operation on the spliced result as the source data.
  • the network side acquires the first checksum
  • the cyclic redundancy check CRC is used, and is performed.
  • the data packet of the broadcast service packet and the data object of the VCT are first spliced.
  • the service group identifier needs to be introduced, and the (check data object II service group identifier) or Business share
  • the group identifier II check data object is subjected to data splicing, and then the CRC operation is performed; wherein the check data object is the data object of the VCT, and in practice, a specific example of the VCT may be as shown in Table 1. :
  • the data object of the VCT can be understood as a general term for other data except the "checksum” portion; wherein the value of the "checksum” field is the first checksum.
  • VCT data objects are ⁇ . , . ⁇
  • group identifiers are ⁇ 1... ⁇ , then they can be combined into ⁇ 1... ⁇ 1... ⁇ , in byte order Combine together; and perform CRC operation, the result of the operation is the first checksum.
  • Step 203 The network side device uses the operation result as the first checksum, and sends the VCT including the first checksum and the data object to the terminal.
  • the network side device uses the operation result as the first checksum, and sends the VCT including the first checksum to the terminal, so that the terminal also performs the CRC operation in the same manner, thereby matching the VCT that should be received by the terminal. .
  • Step 204 The terminal extracts a data object of the VCT, where the data object includes channel information.
  • the terminal when receiving the at least one virtual channel table sent by the network side, the terminal extracts the data object from the data structure of the virtual channel table, and the data object of each VCT includes the corresponding terminal.
  • Channel information including other verification data in the VCT table.
  • Step 205 The terminal splices the broadcast service group identifier and the extracted data object, and performs CRC operation on the spliced data as source data to obtain a second checksum of the two.
  • the terminal in this embodiment can support the processing of the broadcast service packet identifier. After receiving the VCT, the terminal needs to adopt the same calculation method as the network side device, that is, adopts (VCT data object II service group identifier) or (service group).
  • the data object identifying the IIVCT is used as an input to the CRC operation and a second checksum is calculated.
  • Step 206 The terminal performs matching detection on the first checksum and the second checksum. When the first checksum matches the second checksum, the terminal sends the same from the network side. A VCT with a pass-through is obtained in each VCT.
  • the terminal performs matching detection by calculating the obtained CRC. Only the VCT table corresponding to the service packet of the terminal can pass the CRC check, that is, the first checksum and the second checksum can be matched, and the terminal is based on The matching result is verified from multiple VCTs sent by the network side. Passed VCT.
  • the VCT that passes the verification includes all the channel information that the terminal can receive, and after obtaining the corresponding VCT, the terminal can parse the channel information from the VCT.
  • the data is spliced on both the network side and the terminal side to obtain a checksum.
  • the CRC operation is used to obtain the first checksum and the second checksum, thereby ensuring the designated service group.
  • the terminal will only receive its own VCT, although each terminal can receive many VCT tables, but only the verification is legal. This realizes the user's packet service authorization management on the control system of the package, and implements the hierarchical authorization of the service based on the centralized control system. At the same time, it can also limit the deployed terminal to receive the basic program only when the software is not upgraded.
  • the method provided in Embodiment 3 of the present invention may include the following steps:
  • Step 301 The network side device performs a checksum calculation on the data object of the VCT.
  • the calculation of the checksum in this step may be performed by using data splicing, compound computing, and extended reserved fields.
  • Step 302 The network side device performs a composite operation on the preset service group identifier and the calculated result of the checksum as source data.
  • the network side device takes the result of the calculation and the preset service group identifier as input, and performs a composite operation; wherein the composite operation may include: a cyclic redundancy check CRC, a hash hash operation, Packet cipher operation, stream cipher operation or XOR operation; for example, suppose the checksum of VCT is calculated by g (f ( X ) , y ), where X can be the data object of VCT, and y is the broadcast service The packet identifier; or, X may also be a broadcast service group identifier, and y is a data object of the VCT.
  • f ( ) and g ( ) are general algorithms.
  • step 302 may be performed first, and then the checksum calculation shown in step 301 may be performed, that is, steps 302 and 301 may also be reversed, and Affects the embodiment of the present invention.
  • Step 303 The network side device intercepts a value of a certain length from the result of the composite operation as a final first checksum.
  • MD5 is used as an example.
  • the output is 128 bits, and any length can be intercepted, for example, 32 bits.
  • the value of the 32 bits is not necessarily continuous, but the interception method needs to be consistent between the network side device and the terminal. Therefore, in this step, the network side device takes 32 bits of the network as the final first checksum.
  • the network side device When the packet encryption operation is used, the network side device first calculates the CRC value of the VCT, and then takes the calculated CRC as an input, uses the service packet identifier as a key, and performs a packet encryption operation, which can also take the 32 bit in the encryption operation result. As the final first checksum; likewise, the 32-bit value is not necessarily continuous, but the interception method needs to be consistent between the network side device and the terminal.
  • the CRC value of the VCT table is first calculated, and then the calculated CRC is taken as an input, and a bitwise bitwise exclusive OR operation is performed with the service packet identifier, and 32 bits of the same can also be taken as the final A checksum; Similarly, the 32-bit value is not necessarily continuous, but the interception method needs to be consistent on the network side and the terminal.
  • Step 304 The network side device sends the VCT including the first checksum and the data object to the terminal.
  • the network side device may cyclically transmit the VCT including the first checksum and the data object on the broadcast channel, that is, cyclically according to a set time period, wherein the sending period may be based on actual conditions. Make settings.
  • Step 305 The terminal extracts the data object of the VCT, and uses the data object to perform a checksum calculation.
  • the terminal When receiving the VCT, the terminal first extracts the data object from the VCT, and then performs processing according to the corresponding calculation method, that is, first, the data object of the VCT is used as the source data to perform the checksum calculation, and the check is obtained. with.
  • Step 306 The terminal performs a composite operation on the preset service packet identifier and the result of the CRC operation as source data.
  • the terminal According to the manner of the composite operation adopted by the network side, the terminal performs a composite operation on the result of the CRC operation and the preset service packet identifier in the same manner.
  • the terminal side When the network side adopts Hash operation, the terminal side also adopts Hash operation, assuming that the CRC of the VCT is calculated by g(f(x), y), where X can be VCT data, and y is service segment.
  • the group identifier may also be that X is a service group identifier and y is VCT data.
  • f(*) and g(*) are general algorithms including, but not limited to, hash operations, XOR operations, block cipher operations, stream cipher operations, and the like.
  • the network side first performs the composite operation and then performs the checksum calculation, that is, the calculation method of the checksum after the composite operation may be performed, and the terminal side also needs to follow the network side.
  • the calculation sequence is used to calculate the checksum before the legal VCT can be obtained.
  • Step 307 The terminal intercepts a value of a certain length from the result of the composite operation as a second checksum.
  • the method of intercepting the Hash operation at the terminal also needs to be the same as the network side, that is, which length and position values are intercepted on the network side, and the terminal side needs to intercept in the same manner.
  • Step 308 The terminal performs matching detection on the first checksum and the second checksum. When the two can match, the corresponding VCT that passes the check is obtained.
  • the terminal when acquiring the corresponding VCT, the terminal adopts a method of performing a CRC operation and then performing a composite operation. Similarly, on the network side, the VCT is performed by performing a CRC operation and then performing a composite operation. Matching with the terminal, the method of introducing the broadcast service group identifier into the composite operation can ensure that the matching between the network side and the terminal side is more accurate and correct, and can also reduce the network transmission overhead.
  • the method provided in Embodiment 4 of the present invention may include the following steps:
  • Step 401 The network side device identifies the basic VCT and the extension by using reserved fields in the VCT.
  • the basic VCT includes public broadcast channel information
  • the extended VCT includes packet broadcast channel information other than the public broadcast channel information
  • VCT VCT in Table 1, there is a reserved field of 2 bits, based on which the basic VCT and the extended VCT may be respectively defined; the basic VCT includes public broadcast channel information, and the extended VCT includes in addition to the public broadcast channel Packet broadcast channel information other than information; assuming that the 2 bit reserved field of the basic VCT is xlx2, the 2 bit reserved field of the extended VCT is yly2, where xlx2 and yly2 are different; according to the definition in the protocol, here can only be a binary number, ie X or y can only be 0 or 1.
  • the network side device may separately separate channel information in the basic VCT and the extended VCT. According to the broadcast service group identifier, the channel information in the basic VCT is visible to all users by default; the channel information in the extended VCT corresponds to the corresponding service group, and the channel information only visible to the terminal in the service group is included.
  • Step 402 The network side device uses a basic VCT for cyclic redundancy check CRC; or / and performs a cyclic redundancy check CRC by using a corresponding broadcast service packet identifier and an extended VCT to obtain a first checksum.
  • the padding 2 bit reserved field is xlx2, and the corresponding CRC calculation does not include any service group identifier.
  • the padding 2 bit reserved field is yly2, and correspondingly
  • the CRC calculation includes the service packet identifier, that is, the cyclic redundancy check CRC is performed by using the corresponding broadcast service packet identifier and the extended VCT.
  • Step 403 The network side device delivers the VCT including the first checksum to the terminal.
  • Step 404 The terminal determines, according to the reserved field in the VCT, whether the VCT is basic.
  • VCT if yes, proceeds to step 405; if not, proceeds to step 406.
  • the terminal when the terminal receives the VCT, it first determines whether the reserved field is xlx2. If it is xlx2, it indicates that the terminal side does not need to introduce the service group identifier, and proceeds to step 405. If it is not xlx2, the identifier reserved field is yly2. Then proceed to step 406.
  • Step 405 The terminal directly performs a cyclic redundancy check CRC on the basic VCT to obtain a second checksum.
  • the terminal does not introduce the service group identifier when calculating the CRC, and after determining that the VCT is legal, receives the corresponding channel information as the basic channel list;
  • Step 406 The terminal uses the preset broadcast service packet identifier and the extended VCT to perform a cyclic redundancy check CRC to obtain a second checksum.
  • the terminal introduces a service group identifier when calculating the CRC; and uses a preset broadcast service group identifier and the extended VCT to perform a cyclic redundancy check CRC to obtain a second checksum.
  • Step 407 The terminal performs matching detection on the first checksum and the second checksum. When the two can match, the corresponding basic VCT and the extended VCT that pass the check are obtained.
  • the terminal After the terminal determines that the VCT is legal, it also obtains the corresponding basic VCT and extension of the verification pass.
  • the VCT combines the channel information in the basic VCT with the channel information in the extended VCT to form the complete channel information of the authorized service packet.
  • the VCT attribute is extended to implement the combined transmission of the basic VCT and the extended VCT, and the extended VCT does not include the channel information of the basic VCT, which reduces the data of the extended VCT.
  • the amount of channel transmission efficiency is improved by this classification.
  • the reserved field of the VCT existing protocol can be further extended, and the combined transmission of the basic VCT and the hierarchical packet extended VCT can be realized, the amount of data of the extended VCT can be reduced, and the transmission efficiency of the network channel can be improved.
  • the level 2 (basic and extended) VCT is considered, and of course, it can be extended to multiple levels (for example, 0, 1, 2, 3 and four levels) VCT.
  • VCT which has a reserved field of 2 bits, based on which the basic VCT and extended VCT can be defined separately.
  • the 2bit reserved field defines the complete set as ⁇ X 1 x2 , y 1 y2 , zlz2 , mlm2 ⁇ , and the definition of the corresponding field corresponds to each level in the hierarchy, for example: xlx2 ⁇ yly2 ⁇ zlz2 ⁇ mlm2, then the yly2 level VCT Channel information at the xlx2 level should be included, the channel at the zlz2 level should contain channel information at the xlx2 and yly2 levels, and the VCT at the mlm2 level should contain channel information at the xlx2, yly2, and zlz2 levels.
  • each of the xlx2, yly2, and zlz2 may take 0 or 1; for example, xlx2 is 00, yly2 is 01, zlz
  • the channel information is Ch List 0, and the channel information corresponding to the VCT CRC has no service group identifier to participate in the calculation;
  • the complete channel information is Ch List 0 + Ch List A1, and the corresponding channel information corresponding to the VCT CRC is involved in the operation by the service group identifier A;
  • the CRC corresponding to the VCT of the corresponding channel table is involved in the operation by the service group identifier B, wherein the service identifier of the Ch List Bl is AO, and the AO is the public channel set of the yly2 level, which is only used for the extension of the zlz2 level channel table.
  • the complete channel table is Ch List 0 + Ch List Bl + Ch List C2 + Ch List C3, and the CRC corresponding to the VCT of the corresponding channel table is involved in the operation by the service group identifier C, where the service identifier of the Ch List C2 is BO, B0 is a collection of common channels at the zlz2 level, which is only used for the expansion of the mlm2 level channel table.
  • the reserved word-checksum in the VCT table needs to be used on the network side; when the terminal receives the VCT delivered by the network side, the terminal first obtains the level of the service packet according to the content of the reserved field. According to the information in the above table, you can get the complete channel list. You can also use the dynamic addition method. For the public channel table, for example, basic, A0, BO, etc., the network side needs to send the corresponding service identifier to the terminal first by default. Otherwise, the terminal cannot identify it.
  • the four-level channel information architecture can be separately defined, and the common channel information of the xlx2, yly2, and zlz2 levels are respectively extracted for transmission, thereby reducing the system transmission overhead of the channel information as much as possible by hierarchical means.
  • the method provided in Embodiment 5 of the present invention may include the following steps:
  • Step 501 The network side device groups the channel attribute descriptors according to preset rules, and encrypts each group of channel attribute descriptors by using a corresponding key.
  • the packet key index SK is 8 bits (A1A2A3A4A5A6A7A8), eight keys are generated on the network side, corresponding to A1-A8.
  • A1 in the SK is 0, it means that the channel information encrypted by the A1 corresponding key is not used.
  • A1 in the SK is 1, it indicates that the channel information encrypted by the A1 corresponding key is required.
  • the channel information can be divided into eight sets according to certain attribute principles.
  • the attribute principle is actually the feature of dividing the channel information, for example, by the adult level, for example, according to the plot (comedy, romance%), or Divided by rating level (basic package, enhancement package, Super package%) Divide the channel table into 8 groups, each group assigns a key index;
  • SK is 8bit is just a hypothesis, other lengths of SK can be used.
  • Step 502 The network side device combines the encrypted channel attribute descriptor into the virtual channel table VCT, and sends the VCT and the broadcast service packet key index to the terminal.
  • the channel information that is, the channel attribute descriptor is encrypted according to its grouping set attribute by the corresponding key, and then combined into the extended VCT for transmission.
  • the channel attribute descriptor can be as shown in Table 2 in practice:
  • Step 503 The terminal acquires a corresponding VCT according to the preset broadcast service packet identifier matching, and decrypts the channel attribute descriptor according to the packet key index.
  • the terminal can receive the matched extended VCT according to the preset broadcast service group identifier.
  • the terminal can also obtain the corresponding extended VCT according to the VCT identifier (VCT-ID) matching, and according to the received SK, the current terminal can be determined.
  • VCT-ID VCT identifier
  • the received channel sub-packets are respectively decrypted by the channel description information in the extended VCT by the corresponding key of the bit in the SK.
  • Step 504 The terminal extracts the valid channel attribute descriptor after the decryption.
  • the terminal extracts a legal descriptor from the extracted channel attribute descriptor. For example, if A1 is 1, the channel description information is decrypted by using the key corresponding to A1, and the legal descriptor is extracted after decryption. The legitimacy of a legal descriptor can be judged comprehensively by describing the sub-flag and the length of the descriptor.
  • Step 505 The terminal combines the legal channel attribute descriptors to obtain broadcast channel information that can be received by itself.
  • the terminal then combines the extracted legal channel description information, which is the complete channel list that the terminal can receive.
  • the service packet key index SK can be dynamically changed through the configuration message to improve the security of network transmission and support the dynamic switching of service packets.
  • the network side sends the service group key index SK at the same time as the service group identifier is sent, and the extended VCT filtering can be implemented by the service group identifier, and the hierarchical grouping is implemented by the service group key index SK.
  • the extraction of channel information in the encrypted VCT effectively reduces the transmission overhead.
  • the embodiment of the present invention further provides an apparatus for implementing a virtual channel table, where the apparatus may include:
  • the receiving module 601 is configured to receive at least one virtual channel table VCT sent by the network side, where the VCT includes a first checksum and a data object generated by the network side, where the data object includes channel information.
  • the device in this embodiment may be integrated into the terminal, or may be implemented by using a terminal, or be used as an entity separately; for the broadcast channel information of different groups, that is, extended channel information, not all users can see, Defining an extended virtual channel table VCT on the network side, the extended VCT including a broadcast channel number, a broadcast channel name, a broadcast frequency point, or a modulation method, in each In the CRC calculation mode corresponding to the VCT, the service group identifier needs to be introduced.
  • the corresponding broadcast service group identifier and the virtual channel table VCT are used as source data on the network side, and the first checksum of the two is calculated;
  • a Cyclic Redundancy Check (CRC) may be used, or the first checksum may be obtained in other manners; these other modes include but are not limited to: The hash operation, the packet encryption operation, the stream encryption operation or the exclusive OR operation; the data object includes channel information that the terminal can receive, and the data object is provided in the form of a data structure in the VCT.
  • a history terminal (a terminal that has been deployed in the network but does not support the calculation method of the service group identifier), and a terminal that is subsequently issued (can be understood as The terminal after the upgrade can support the terminal of the broadcast service group).
  • the terminal after the upgrade can support the terminal of the broadcast service group.
  • the common channel information it is defined as the basic VCT, and the corresponding manner of obtaining the checksum remains unchanged on the network side, and no service group identifier is introduced, and all terminals (including the above two types of terminals) can be viewed by the user;
  • the extended VCT corresponding to the extended channel table only the terminal that supports the subsequent issuance of the broadcast service packet can obtain the correct calculation result.
  • the terminals mentioned in this application are terminals that are subsequently transmitted.
  • the first check module 602 is configured to obtain a second checksum of the data objects of the VCT received by the preset broadcast service packet identifier and the receiving module 501.
  • the manner in which the first check module 602 obtains the second checksum must be the same as the manner in which the network side obtains the first checksum.
  • the obtaining module 603 is configured to obtain a verified VCT from the at least one virtual channel table sent by the network side when the first checksum is matched with the second checksum.
  • the terminal compares the first checksum obtained by the calculation with the second checksum, and when the two can match, the acquiring module 603 obtains the corresponding VCT that passes the verification, and the VCT includes
  • the broadcast channel information is all the complete channel information of the terminal.
  • the manner of matching detection on the terminal side may be adopted, so that each terminal can be based on The verification result obtains the VCT corresponding to itself, so as to obtain the complete channel information that can be received by itself.
  • the service hierarchical grouping authorization can be implemented based on the centralized control system, and the deployed terminal is limited in the case that the software is not upgraded. Can only receive basic The program, and the subsequently issued terminal can receive the channel information of the business group in which it is located.
  • the first verification module 702 may specifically include:
  • the extraction submodule 701 is configured to extract data objects in the virtual channel table.
  • the extracting sub-module 701 extracts the data object from the data structure of the virtual channel table when the at least one virtual channel table sent by the network side is received, and the data object of each VCT includes the corresponding terminal and can receive the data object.
  • Channel information including other verification data in the VCT table.
  • the first splicing sub-module 702 is configured to perform data splicing between the broadcast service group identifier and the data object of the VCT.
  • the terminal in this embodiment can support the processing of the broadcast service packet identifier. After receiving the VCT, the terminal needs to adopt the same calculation method as the network side, that is, adopting (VCT Data Object II service group identifier) or (service group identifier IIVCT). Data object) Data splicing.
  • the first syndrome module 703 is configured to perform cyclic redundancy check CRC on the spliced data as source data, and the result of the CRC is the second checksum.
  • the first syndrome module 703 can use the stitched result as an input of the CRC operation and calculate a second checksum.
  • the corresponding VCT that passes the verification may be acquired by the obtaining module 603.
  • the first verification module 602 may specifically include:
  • the extraction submodule 801 is configured to extract data objects in the virtual channel table.
  • the second syndrome module 802 is configured to perform a checksum calculation on the data object of the VCT as source data.
  • the terminal When receiving the VCT, the terminal first processes the second syndrome module 801 according to a corresponding calculation method, that is, first performs a CRC operation on the data object of the VCT as source data, and obtains a CRC operation result.
  • the composite operation sub-module 803 is configured to perform a composite operation on the preset service group identifier and the result of the calculation of the checksum as source data.
  • the method of the composite operation of the composite operation sub-module 802 in this embodiment needs to be the same as the method of the composite operation adopted by the network side, that is, the result of performing the CRC operation in the same manner in the terminal.
  • the preset operation group identifier 802 is combined with the operation; and the sequence of the composite operation sub-module 802 and the second verification sub-module 801 is not limited in the present invention, and the order relationship between the two does not affect the implementation of the embodiment of the present invention. .
  • the composite operation sub-module 802 When the network side adopts a hash operation, the composite operation sub-module 802 also adopts a hash operation, and assumes that the CRC of the VCT is calculated by g (f (X), y), where X may be VCT data, and y is a service group.
  • the identifier may also be that X is a service group identifier and y is VCT data.
  • f (*) and g (*) are general-purpose algorithms, including but not limited to Ha sh operations, XOR operations, block cipher operations, stream cipher operations, and so on.
  • the CRC value sub-module 804 is configured to intercept a value of a certain length from the result of the composite operation as a second checksum.
  • the method of intercepting the Hash operation at the terminal also needs to be the same as the network side, that is, which length and position values are intercepted on the network side, and the terminal side needs to intercept in the same manner.
  • the terminal when acquiring the corresponding VCT, the terminal adopts a method of performing a CRC operation and then performing a composite operation.
  • the VCT is performed by performing a CRC operation and then performing a composite operation.
  • the method of introducing the broadcast service group identifier into the composite operation can ensure that the matching between the network side and the terminal side is more accurate and correct, and can also reduce the network transmission overhead.
  • the first verification module 602 may specifically include:
  • the extraction submodule 901 is configured to extract data objects in the virtual channel table.
  • the determining sub-module 902 is configured to determine, according to the reserved field in the VCT, whether the VCT is a basic VCT.
  • the third syndrome module 903 is configured to directly obtain a checksum of the basic VCT when the result of the determining submodule is YES, and serve as a second checksum.
  • a fourth syndrome module 904 configured to: when the result of the determining submodule is negative, The preset broadcast service packet identifier and the data object of the extended VCT acquire a second checksum of both.
  • the obtaining module 603 is specifically configured to obtain a corresponding basic VCT and an extended VCT that pass the verification. That is, after the terminal determines that the VCT is legal, the terminal obtains the corresponding basic VCT and the extended VCT that pass the verification, and combines the channel information in the basic VCT and the channel information in the extended VCT to form the complete channel information of the authorized service group.
  • the VCT attribute is extended to implement the combined transmission of the basic VCT and the extended VCT, and the extended VCT does not include the channel information of the basic VCT, which reduces the data of the extended VCT. The amount of channel transmission efficiency is improved by this classification.
  • the first verification module 602 may specifically include:
  • the decryption sub-module 1001 is configured to decrypt the encrypted channel attribute descriptor in the VCT according to the preset broadcast service packet identifier and the packet key index.
  • the terminal can receive the matched extended VCT according to the preset broadcast service group identifier.
  • the terminal can also obtain the corresponding extended VCT according to the VCT identifier (VCT-ID) matching, and according to the received SK, the current terminal can be determined.
  • VCT-ID VCT identifier
  • the received channel sub-packets are respectively decrypted by the channel description information in the extended VCT by the corresponding key of the bit in the SK.
  • the extraction descriptor sub-module 1002 is configured to extract the decrypted channel attribute descriptor; the extraction descriptor sub-module 1002 extracts a legal descriptor from the extracted channel attribute descriptor, for example, A1 is 1. Then, the channel description information is decrypted by using the key corresponding to A1, and the legal descriptor is extracted after decryption; the terminal then combines the extracted legal channel description information, which is the complete channel list that the terminal can receive.
  • the obtaining module 603 is specifically configured to: combine the legal channel attribute descriptors to obtain broadcast channel information that can be received by itself.
  • the embodiment of the present invention further provides a first embodiment of a device for implementing a broadcast service packet, where the device may include: a second check module 1101, The first checksum of the two is obtained by using the corresponding broadcast service group identifier and the virtual channel table VCT for the broadcast channel information of different groups.
  • the device in this embodiment may be integrated on the network side, or may be directly implemented on the network side, or may be separately used as an entity connected to the network side; for different grouped broadcast channel information, that is, extended channel information, not all
  • the extended virtual channel table VCT is defined on the network side, and the extended VCT includes a broadcast channel number, a broadcast channel name, a broadcast frequency point, or a modulation mode.
  • the service packet identifier needs to be introduced.
  • the corresponding broadcast service group identifier and the virtual channel table VCT are used as the source data on the network side, and the first checksum of the two is calculated; wherein, when the first checksum is calculated, In the manner of Cyclic Redundancy Check (CRC), the first checksum may also be obtained in other manners.
  • CRC Cyclic Redundancy Check
  • the sending module 1102 is configured to send the VCT including the first checksum and the data object to the terminal to implement a broadcast service packet, where the data object includes channel information.
  • the sending module 1102 sends a VCT including the first checksum to the terminal, where the virtual channel table VCT includes a first checksum on the network side.
  • the terminal by acquiring the first checksum and the second checksum on the network side and the terminal side respectively based on the broadcast service packet identifier, the terminal can be matched and detected on the terminal side, so that each terminal is The VCT corresponding to the VCT can be obtained according to the verification result, so that the complete channel information that can be received by itself can be obtained.
  • the service classification packet authorization can be implemented based on the centralized control system, and the deployed terminal is not upgraded in the software. In this case, only the basic program can be received, and the subsequently issued terminal can receive the channel information of the business group in which it is located.
  • the second check module 1101 may specifically include:
  • the second splicing sub-module 1201 is configured to perform data splicing between the broadcast service group identifier and the data object of the VCT.
  • the network side uses the cyclic redundancy check when acquiring the first checksum.
  • the service group identifier needs to be introduced, and the data is spliced by (checking the data object II service group identifier) or (the service group identifier II check data object), and then performing a CRC operation; wherein the check data object is the VCT Data object.
  • the fifth syndrome module 1202 is configured to perform the CRC on the CRC as the source data in the specific calculation in the embodiment.
  • the VCT data object may be in the following manner, for example, the VCT data object is ⁇ . , . ⁇ . , . ⁇ , then can be combined into ⁇ 1... ⁇ 1... ⁇ , combined in byte order; and CRC operation, the result of the operation is the first checksum; The operation result is taken as a first checksum, and the VCT including the first checksum is transmitted to the terminal.
  • FIG. 13 a structural block diagram of a third embodiment of the apparatus of the present invention is shown.
  • the second verification module in the apparatus for implementing a broadcast service packet in this embodiment may specifically include:
  • a sixth syndrome module 1301, configured to perform a checksum calculation on the data object of the VCT as source data
  • the sixth syndrome module 1301 first performs a CRC operation on the data object of the VCT as source data.
  • the composite operation sub-module 1302 is configured to perform a composite operation on the preset service group identifier and the result of the calculation of the checksum as source data.
  • the second intercepting sub-module 1303 is configured to intercept a value of a certain length from the result of the composite operation as the first checksum.
  • MD5 is used as an example.
  • the output is 128 bits, and any length can be intercepted, for example, 32 bits.
  • the 32-bit value is not necessarily continuous, but the interception method needs to be consistent on the network side and the terminal. Therefore, in this step, the network side takes 32 bits as the final first checksum.
  • the CRC value of the VCT is first calculated on the network side, Then, the obtained CRC is calculated as an input, and the service packet identifier is used as a key, and a packet encryption operation is performed. Similarly, 32 bits of the encryption operation result can be taken as the final first checksum.
  • the CRC value of the VCT table is first calculated, and then the calculated CRC is taken as an input, and a bitwise bitwise exclusive OR operation is performed with the service packet identifier, and 32 bits of the same can also be taken as the final A checksum.
  • FIG. 14 is a schematic structural diagram of Embodiment 4 of a device for implementing a broadcast service packet according to the present invention.
  • the device may specifically include: an identifier module 1401, configured to adopt a reservation in a VCT table.
  • the field identifies a basic VCT including public broadcast channel information, and the extended VCT includes packet broadcast channel information other than the public broadcast channel information.
  • VCT in Table 1 there is a reserved field of 2 bits, based on which the basic VCT and the extended VCT may be respectively defined; the basic VCT includes public broadcast channel information, and the extended VCT includes in addition to the public broadcast channel Packet broadcast channel information other than information; assuming that the 2 bit reserved field of the basic VCT is xlx2, the 2 bit reserved field of the extended VCT is yly2, where xlx2 and yly2 are different; according to the definition in the protocol, here can only be a binary number, ie Yes X or y can only be 0 or 1.
  • the channel information in the VCT corresponds to the corresponding service packet, and includes channel information that only the terminal in the service packet can be seen.
  • the second check module 1402 is specifically configured to perform a cyclic redundancy check CRC by using a basic VCT, and use the result as the first checksum; or
  • the cyclic redundancy check CRC is performed using the corresponding broadcast service packet identifier and extended VCT, and the result is taken as the first checksum.
  • the padding 2bit reserved field is xlx2, and the corresponding CRC calculation does not contain any service group identifier.
  • the padding 2bit reserved field is yly2.
  • the corresponding CRC calculation includes the service group identifier, that is, the cyclic redundancy check CRC is performed by using the corresponding broadcast service group identifier and the extended VCT.
  • the sending module 1403 is configured to send the VCT including the first checksum to the terminal to implement a broadcast service packet.
  • the VCT attribute is extended to implement the combined transmission of the basic VCT and the extended VCT, and the extended VCT does not include the channel information of the basic VCT, which reduces the data of the extended VCT.
  • the amount of channel transmission efficiency is improved by this classification.
  • the second verification module may specifically include:
  • the packet encryption sub-module 1501 is configured to group the channel attribute descriptors according to preset rules, and encrypt each group of channel attribute descriptors by using a corresponding key;
  • the packet key index SK is 8 bits (A1A2A3A4A5A6A7A8), eight keys are generated on the network side, corresponding to A1-A8.
  • A1 in the SK is 0, it means that the channel information encrypted by the A1 corresponding key is not used.
  • A1 in the SK is 1, it indicates that the channel information encrypted by the A1 corresponding key is required.
  • the channel information can be divided into eight sets according to certain attribute principles.
  • the attribute principle is actually the feature of dividing the channel information, for example, by the adult level, for example, according to the plot (comedy, romance%), or Divided by the level of viewing (basic package, enhanced package, super package%)
  • the channel table is divided into 8 groups of sets, each group is assigned a key index; of course, here SK is 8bit is just a hypothesis, other lengths can be used SK.
  • a checksum sub-module 1502 is provided for adding the encrypted channel attribute description sub-combination as a first checksum to the virtual channel table VCT.
  • the channel attribute descriptor is encrypted according to its group set attribute by using the corresponding key, and then combined into the extended VCT for transmission.
  • the network side sends the service group key index SK at the same time that the service group identifier is sent, and the extended VCT filtering can be implemented by the service group identifier, and the service group key is used.
  • the index SK implements the extraction of channel information in the hierarchical packet encryption VCT, which effectively reduces the transmission overhead.
  • FIG. 16 an embodiment of a system for implementing a broadcast service packet according to the present invention is shown. As shown in the figure, the system may specifically include:
  • the terminal 1601 is configured to receive at least one virtual channel table VCT delivered by the network side, where the virtual channel table VCT includes a first checksum and a data object generated by the network side, and adopts a preset broadcast service group identifier and the VCT.
  • the data object obtains a second checksum of the two; when the first checksum matches the second checksum, the VCT that passes the check is obtained from the at least one VCT sent by the network side .
  • the network side 1602 is configured to obtain, by using the corresponding broadcast service group identifier and the virtual channel table VCT, a first checksum of the broadcast channel information for different packets, and send the VCT including the first checksum to the Terminal to implement broadcast service grouping.
  • the present invention can be implemented by hardware, or can be implemented by means of software plus necessary general hardware platform, and the technical solution of the present invention. It can be embodied in the form of a software product that can be stored in a non-volatile storage medium (which can be a CD-ROM, a USB flash drive, a removable hard drive, etc.), including a number of instructions for making a computer device (may Is A human computer, server, or network device, etc., performs the methods described in various embodiments of the present invention.
  • a non-volatile storage medium which can be a CD-ROM, a USB flash drive, a removable hard drive, etc.
  • a computer device may Is A human computer, server, or network device, etc., performs the methods described in various embodiments of the present invention.
  • the foregoing describes the method, device, and system for implementing the broadcast service packet provided by the embodiment of the present invention. The description of the above embodiment is only for helping to understand the method and the idea of the embodiment of the present invention. Meanwhile

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • Astronomy & Astrophysics (AREA)
  • General Physics & Mathematics (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Description

广播业务分组的实现方法、 装置和系统
技术领域
本发明涉及网络技术领域, 尤其涉及广播业务分组的实现方法、装置及系 统。
背景技术
北美有线电视电缆 Cable运营商出于 Cable TV系统数字化转换的需要, 推出了数字电视适配器 ( Digital TV Adapter, DTA )类筒单机顶盒终端产品, 用于实现数字电视信号的接收和转换。对于此类筒单机顶盒产品, 其系统控制 的管理方式一般相对较为筒单,控制体系方案筒洁, 面向不需要复杂广播业务 的低端用户提供了经济的解决方案, 降低了部署成本。
由于该系统构成筒单,没有考虑对每个用户进行单独的广播业务分组授权 管理, 因此也决定了它只能向用户提供筒单的服务, 无法实现广播业务的分组 授权。 但是在实际应用中, 即使是低端用户, 在一定程度上也存在广播业务需 求的差异, 当低端用户需要对广播业务进行选择时, 这种不能够向用户提供广 播业务分组的控制体系, 就无法满足用户的广播业务分组需求。
发明内容
本发明实施例提供一种广播业务分组的实现方法及装置,以解决现有技术 中基于 DTA类筒单机顶盒产品的控制系统,无法对广播业务进行分组的问题。
为解决上述技术问题,本发明实施例提供了一种获取虚拟频道表 VCT的 方法, 包括:
接收网络侧下发的至少一个虚拟频道表, 所述虚拟频道表包括网络侧 生成的第一校验和及数据对象, 所述数据对象包括频道信息;
采用预置的广播业务分组标识和所述虚拟频道表的数据对象获取两者 的第二校验和;
当所述第一校验和与所述第二校验和匹配时, 从所述网络侧下发的至 少一个虚拟频道表中获得校验通过的虚拟频道表。
本发明实施例提供了一种广播业务分组的实现方法, 包括:
针对不同分组的广播频道信息, 采用对应的广播业务分组标识和虚拟 频道表获取两者的第一校验和; 将包括所述第一校验和和数据对象的虚拟频道表下发至终端, 以实现 广播业务分组, 所述数据对象包括频道信息。
本发明实施例提供了一种获取虚拟频道表的实现装置, 包括: 接收模块, 用于接收网络侧下发的至少一个虚拟频道表, 所述包括网 络侧生成的第一校验和;
第一校验模块, 用于采用预置的广播业务分组标识和所述虚拟频道表 的数据对象获取两者的第二校验和, 所述数据对象包括频道信息;
获取模块, 用于当所述第一校验和与所述第二校验和匹配时, 从所述 网络侧下发的至少一个虚拟频道表中获得校验通过的虚拟频道表。
本发明实施例提供了一种广播业务分组的实现装置, 包括:
第二校验模块, 用于针对不同分组的广播频道信息, 采用对应的广播 业务分组标识和虚拟频道表获取两者的第一校验和;
发送模块, 用于将包括所述第一校验和及数据对象的虚拟频道表下发 至终端, 以实现广播业务分组, 所述数据对象包括频道信息。
本发明实施例提供了一种广播业务分组的实现系统, 其特征在于, 包 括:
网络侧设备, 用于针对不同分组的广播频道信息, 采用对应的广播业 务分组标识和虚拟频道表获取两者的第一校验和; 将包括所述第一校验和 的虚拟频道表下发至终端, 以实现广播业务分组;
终端, 用于接收网络侧下发的虚拟频道表, 所述虚拟频道表包括网络 侧生成的第一校验和; 采用预置的广播业务分组标识和所述虚拟频道表的 数据对象获取两者的第二校验和; 当所述第一校验和与所述第二校验和匹 配时, 从所述网络侧下发的至少一个虚拟频道表中获得校验通过的虚拟频 道表, 所述数据对象包括频道信息。
本发明实施例具有以下优点:
在本发明实施例中, 可以基于筒化的控制体系实现业务分级分组授权, 限定已部署终端在软件未升级情况下只能接收基本节目,而后续发放的终端则 可以接收到所在业务组的频道信息,所述后续发放的终端为具备本发明所描述 的校验和计算校验能力的终端。 本发明的实施例无需利用 CA (条件接收), 就能够在现网条件下, 在终端侧实现业务分组分级的授权接收。
附图说明
为了更清楚地说明本发明实施例或现有技术中的技术方案, 下面将对 实施例或现有技术描述中所需要使用的附图作筒单地介绍, 显而易见地, 下面描述中的附图仅仅是本发明的一些实施例, 对于本领域普通技术人员 来讲, 在不付出创造性劳动性的前提下, 还可以根据这些附图获得其他的 附图。
图 1是本发明的获取虚拟频道表的实现方法实施例一的流程图; 图 2是本发明的获取虚拟频道表的实现方法实施例二的流程图; 图 3是本发明的获取虚拟频道表的实现方法实施例三的流程图; 图 4是本发明的获取虚拟频道表的实现方法实施例四的流程图; 图 5是本发明的获取虚拟频道表的实现方法实施例五的流程图; 图 6是本发明的获取虚拟频道表的实现装置实施例一的结构示意图; 图 7是本发明的获取虚拟频道表的实现装置实施例二的结构示意图; 图 8是本发明的获取虚拟频道表的实现装置实施例三的结构示意图; 图 9是本发明的获取虚拟频道表的实现装置实施例四的结构示意图; 图 10是本发明的获取虚拟频道表的实现装置实施例五的结构示意图; 图 11是本发明的一种广播业务分组的实现装置实施例一的结构示意 图;
图 12是本发明的一种广播业务分组的实现装置实施例二的结构示意 图;
图 13是本发明的一种广播业务分组的实现装置实施例三的结构示意 图;
图 14是本发明的一种广播业务分组的实现装置实施例四的结构示意 图;
图 15是本发明的一种广播业务分组的实现装置实施例四的结构示意 图;
图 16是本发明的获取广播频道信息的系统实施例的结构示意图。
具体实施方式 下面将结合本发明实施例中的附图, 对本发明实施例中的技术方案进 行清楚、 完整地描述, 显然, 所描述的实施例仅仅是本发明一部分实施例, 而不是全部的实施例。 基于本发明中的实施例, 本领域普通技术人员在没 有作出创造性劳动前提下所获得的所有其他实施例, 都属于本发明保护的 范围。
为使本发明实施例的上述目的、 特征和优点能够更加明显易懂, 下面 结合附图和具体实施方式对本发明实施例作进一步详细的说明。
在单向网络中, 终端在通电之后, 如果是首次使用, 此时终端未被激活, 无法进入正常的业务工作状态, 需等待网络侧(即网络侧的设备)发送的合法 的定址单播消息进行配置, 此时用户需要通过带外方式(即不通过业务通道本 身, 通过其他通信手段)向网络侧上报终端的设备标识, 例如物理标识, 即是 终端内部硬件模块的唯一标识, 网络侧设备在收到用户上报的物理标识后, 经 由广播信道下发定址单播消息, 其中定址单播地址由终端的设备标识唯一决 定, 定址单播消息中包括区域标识和业务分组标识, 当终端接收到属于自己的 定址单播消息后, 首先将区域标识的配置信息进行保存, 同时将业务分组标识 的配置信息也进行保存。在完成区域标识配置后, 终端进一步等待网络侧下发 的合法的激活消息, 激活消息中携带有区域标识, 只有在所在区域被网络侧头 端激活后, 终端才能够正常进入业务工作状态。
参考图 1 , 在本发明实施例一中, 实现本发明实施例一所提供的方法可 以包括以下步骤:
步骤 101 : 针对不同分组的广播频道信息, 网络侧采用对应的广播业 务分组标识和虚拟频道表计算两者的第一校验和。
对于不同分组的广播频道信息, 即包括基本频道信息以及扩展频道信 息, 其中扩展频道信息不是所有的用户都能够看到, 则在网络侧定义扩展 虚拟频道表 VCT ( Virtual Channel Table ) , 所述扩展 VCT包括广播频道号、 广播频道名称、 广播频点或调制方式, 在每一组对应 VCT的 CRC计算方 式中, 需要引入业务分组标识, 因此, 在网络侧采用对应的广播业务分组 标识和虚拟频道表 VCT作为源数据, 并计算两者的第一校验和; 扩展 VCT 的数据格式和基本 VCT的数据格式类似, 只是扩展 VCT的频道映射表的 相关参数被设置为对应的用户才可以看到; 其中, 计算第一校验和的时候, 可以采用循环冗余校验( Cyclic Redundancy Check, CRC ) 的方式, 也可以 采用其他方式来获取所述第一校验和。
需要说明的是, 对于公共的频道信息, 所有终端用户都可以观看, 则 定义为基本 VCT, 在网络侧其对应的获取校验和的方式保持不变, 不引入 业务分组标识; 同时, 本实施例中所述的终端, 为后续发放的终端, 可以 理解为升级之后的终端, 可以支持业务分组标识的相关处理, 而对于历史 终端, 即是已经在网络中部署的, 但不支持业务分组标识的计算方式的终 端, 因为不支持业务分组标识的处理, 在获取校验和时, 对于扩展频道表 对应的扩展 VCT, 其计算获得的结果总是错误的, 因此, 本申请中所提及 的终端均为后续发送的终端, 即能够支持业务分组标识的相关处理的终端; 其中, 所述校验和的计算方法, 具体可以包括: 循环冗余校验 CRC、 哈希 Hash运算、 分组加密运算、 流式加密运算或异或运算; 流式加密即是用算 法和密钥一起产生一个随机码流, 再和数据流进行异或 (XOR )—起产生 加密后的数据流。
步骤 102: 终端接收网络侧下发的至少一个虚拟频道表, 所述网络侧 下发的虚拟频道表包括网络侧生成的第一校验和以及数据对象, 所述数据 对象包括频道信息。
网络侧将包括了所述第一校验和以及数据对象的 VCT发送至终端,所 述虚拟频道表 VCT包括网络侧的第一校验和; 所述数据对象中包括了终端 可以接收到的频道信息, 在 VCT中以数据结构的形式提供数据对象。
步骤 103: 终端采用预置的广播业务分组标识和所述虚拟频道表的数 据对象作为源数据, 获取两者的第二校验和。
终端针对自身保存的广播业务分组标识,和接收到的 VCT的数据对象, 将两者作为源数据, 同时计算获取两者的第二校验和; 其中, 需要说明的 是 ,终端获取第二校验和的方式必须和网络侧获取第一校验和的方式相同; 其中, 本实施例中的终端为后续发放的终端, 其预置的广播业务分组标识 已经保存在该终端中; 所述虚拟频道表的数据对象为所述 VCT中除了所述 第一校验和之外的其他数据。 步骤 104: 当所述第一校验和与所述第二校验和匹配时, 终端从所述 至少一个虚拟频道表中获得校验通过的虚拟频道表。
然后终端将自身计算获取到的第一校验和和所述第二校验和进行匹 配, 当两者能够匹配时, 终端就从网络侧下发的多个 VCT中, 获得校验通 过的对应 VCT, 则所述对应 VCT包括的广播频道信息即是该终端的所有完 整频道信息。 其中, 校验通过的 VCT相当于包括了指定业务的频道信息的 扩展 VCT。 具体的, 所述终端获取到校验通过的虚拟频道表时, 可以从合 法的虚拟频道表中获取到自己所能接收到的频道信息, 终端可以通过从 VCT中解析或者提取频道信息的方式获取到自己接收的频道信息。
在本发明实施例一中, 通过基于广播业务分组标识分别在网络侧和终 端侧获取第一校验和与第二校验和的方式, 可以通过在终端侧匹配检测的 方式, 使得各个终端都可以根据校验结果获取到与自身对应的 VCT, 从而 获取到自身能够接收到的完整频道信息, 本实施例中可以基于筒化的控制 体系实现业务分级分组授权, 限定已部署终端在软件未升级情况下只能接 收基本节目, 而后续发放的终端则可以接收到所在业务组的频道信息。 参考图 2 , 在本发明实施例二中, 实现本发明实施例二所提供的方法 可以包括以下步骤:
步骤 201 : 网络侧设备将广播业务分组标识和所述 VCT的数据对象进 行数据拼接。
在实施步骤 201 的过程中, 数据拼接的过程, 可以采用校验数据对象 在前, 业务分组标识在后, 表示为: 校验数据对象 II业务分组标识; 也可以 采用业务分组标识在前, 校验数据对象在后的方式, 表示为: 业务分组标 识 II校验数据对象(其中, II只是一个分隔符, 并不具有其他含义)。
步骤 202: 网络侧设备将拼接后的结果作为源数据进行 CRC运算; 在本实施例中, 网络侧在获取第一校验和的时候, 采用循环冗余校验 CRC的运算方式, 并且在进行 CRC运算之前, 首先将所述广播业务分组标 识和所述 VCT的数据对象进行数据拼接, 对应 VCT的 CRC计算方式中, 需要引入业务分组标识, 采用 (校验数据对象 II业务分组标识)或 (业务分 组标识 II校验数据对象) 进行数据拼接, 然后进行 CRC运算; 其中, 所述 校验数据对象为所述 VCT的数据对象, 在实际中, 所述 VCT的一个具体 例子可以如表 1所示:
表 1
Figure imgf000009_0001
}
所述 VCT的数据对象可以理解为除了 "校验和"部分的其他数据的总 称; 其中所述 "校验和" 字段的值即是第一校验和。
在具体的计算中,可以采用如下方式,例如: VCT数据对象为 ΑΙ . , .Αη, 分组标识为 Β1...Βη,则可组合为 Α1...ΑηΒ1...Βη,按字节顺序组合在一起; 并进行 CRC运算, 运算的结果即为第一校验和。
步骤 203: 网络侧设备将运算结果作为第一校验和, 并将包括了所述 第一校验和以及数据对象的 VCT发送至终端。
网络侧设备将运算结果作为第一校验和, 并将包括了所述第一校验和 的 VCT发送至终端, 以便于终端也进行相同方式的 CRC运算, 从而匹配 出自己应该接收到的 VCT。
步骤 204: 终端提取所述 VCT的数据对象, 所述数据对象包括频道信 息。
本步骤中, 终端在接收到网络侧下发的至少一个虚拟频道表时, 从虚 拟频道表的数据结构中, 提取出所述数据对象, 每一个 VCT的数据对象包 括对应的终端可以接收到的频道信息,还包括在 VCT表中其他的校验数据。
步骤 205: 终端将所述广播业务分组标识和提取的数据对象进行数据 拼接, 并将拼接后的数据作为源数据进行 CRC运算, 以获取两者的第二校 验和。
本实施例中的终端可以支持广播业务分组标识的处理, 终端在接收到 VCT后, 需要和网络侧设备采用相同的计算方式, 即是采用 (VCT的数据 对象 II业务分组标识 )或(业务分组标识 IIVCT的数据对象 )作为 CRC运算 的输入, 并计算出第二校验和。
步骤 206: 终端对所述第一校验和与第二校验和进行匹配检测, 当所 述第一校验和与所述第二校验和匹配时,从所述网络侧下发的多个 VCT中 获得校验通过的 VCT。
终端通过计算获得的 CRC进行匹配检测,只有属于终端自身业务分组 对应的 VCT表, 其 CRC校验才能通过, 即是所述第一校验和与第二校验 和才能匹配, 则终端就根据匹配结果从网络侧下发的多个 VCT中获得校验 通过的 VCT。在实际应用中, 所述校验通过的 VCT中包括了该终端所能接 收到的所有的频道信息, 终端获得了对应的 VCT后, 可以从该 VCT中解 析得到其中的频道信息。
本实施例通过在网络侧和终端侧都采用数据拼接的方式,获取校验和 , 实际中采用了 CRC运算的方式获取到第一校验和与第二校验和,从而可以 确保指定业务分组的终端只会接收到属于自己的 VCT, 虽然每一个终端都 可以收到很多的 VCT表, 但只有校验通过的才是合法的。 这就在筒单的控 制体系上实现了用户的分组业务授权管理, 基于筒化的控制体系实现业务 分级分组授权, 同时也能限定已部署终端在软件未升级情况下只能接收基 本节目。 参考图 3 , 在本发明实施例三中, 实现本发明实施例三所提供的方法 可以包括以下步骤:
步骤 301 : 网络侧设备将所述 VCT的数据对象进行校验和的计算; 其中, 本步骤中校验和的计算具体可以采用数据拼接、 复合运算、 扩 展保留字段等方式进行。
步骤 302: 网络侧设备将预置的业务分组标识和所述校验和的计算的 结果作为源数据进行复合运算。
在实施步骤 302时, 网络侧设备将所述计算的结果与预置的业务分组 标识作为输入, 实施复合运算; 其中, 所述复合运算可以包括: 循环冗余 校验 CRC、 哈希 Hash运算、 分组加密运算、 流式加密运算或异或运算; 例如, 假设 VCT的校验和采用 g ( f ( X ) , y ) 的方式计算获得, 其中 X可 以为 VCT的数据对象, y则为广播业务分组标识; 或者, X也可以为广播 业务分组标识, y就为 VCT的数据对象。 其中, f ( )和 g ( )为通用算法。
需要说明的是, 在本实施例中, 还可以首先进行步骤 302所示的复合 运算, 再进行步骤 301所示的校验和的计算, 即是步骤 302和步骤 301还 可以倒换顺序, 并不影响本发明实施例的实。
步骤 303 : 网络侧设备从所述复合运算的结果中截取一定长度的数值 作为最终的第一校验和。 当采用 Hash运算时, 以 MD5为例, 输出为 128bit, 其中可以截取其 中的任意长度, 例如 32bit, 这 32bit的数值不一定是连续的, 但这种截取 方法需要在网络侧设备和终端保持一致, 因此, 本步骤中, 网络侧设备取 其中的 32bit作为最终的第一校验和。
当采用分组加密运算时, 则在网络侧设备首先计算 VCT的 CRC数值, 然后将计算获得的 CRC作为输入, 以业务分组标识作为密钥, 实施分组加 密运算, 可以同样取加密运算结果中的 32bit作为最终的第一校验和; 同样 的, 这 32bit的数值不一定是连续的, 但这种截取方法需要在网络侧设备和 终端保持一致。
当采用异或运算时, 首先计算 VCT表的 CRC数值, 然后将计算获得 的 CRC作为输入, 与业务分组标识进行逐比特(bit )的异或运算, 同样也 可以取其中的 32bit作为最终的第一校验和; 同样的, 这 32bit的数值不一 定是连续的, 但这种截取方法需要在网络侧和终端保持一致。
步骤 304: 网络侧设备将包括所述第一校验和以及数据对象的 VCT发 送至终端。
其中, 网络侧设备可以将包括了所述第一校验和以及数据对象的 VCT 在广播信道上循环轮发, 即是按照某一个设定的时间周期循环发送, 其中 发送的周期可以根据实际情况进行设定。
步骤 305: 终端提取所述 VCT的数据对象, 并采用所述数据对象进行 校验和的计算。
终端在接收到 VCT时, 首先从所述 VCT中提取出数据对象, 然后按照 相应的计算方法进行处理, 即是首先将所述 VCT的数据对象作为源数据进 行校验和的计算, 获得校验和。
步骤 306: 终端将预置的业务分组标识和所述 CRC运算的结果作为源 数据进行复合运算。
根据网络侧采用的复合运算的方式, 在终端采用同样的方式进行对所 述 CRC运算的结果和预置的业务分组标识进行复合运算。
当网络侧采用 Hash运算时, 终端侧也采用 Hash运算, 假设 VCT的 CRC按 g(f(x) , y)方式计算获得, 其中可以是 X为 VCT数据, y为业务分 组标识, 也可以是 X为业务分组标识, y为 VCT数据。 f(*)和 g(*)为通用算 法, 包括但不限于 Hash运算、 异或运算、 分组加密运算、 流式加密运算等。
需要说明的是, 当网络侧采用首先进行复合运算, 再进行校验和的计 算时, 即是也可以按照先复合运算后校验和的计算方式, 则所述终端侧也 需要按照网络侧的计算顺序进行校验和的计算,才能够获取到合法的 VCT。
步骤 307: 终端从所述复合运算的结果中截取一定长度的数值作为第 二校验和。
在终端截取 Hash运算的方式也需要和网络侧相同,即是在网络侧截取 了哪些长度和位置的数值, 在终端侧需要以同样的方式截取。
步骤 308: 终端对所述第一校验和与第二校验和进行匹配检测, 当两 者能够匹配时, 获取校验通过的对应 VCT。
在本实施例中,终端在获取对应 VCT的时候,是采取先进行一次 CRC 运算再进行复合运算的方式, 同样, 在网络侧也是先进行一次 CRC运算再 进行复合运算的方式的 VCT, 才能够和终端相匹配, 这种将广播业务分组 标识引入复合运算的方式, 可以保证了在网络侧和终端侧运算的匹配更为 准确和正确, 也能够保证减少网络传输开销。 参考图 4, 在本发明实施例四中, 实现本发明实施例四所提供的方法 可以包括以下步骤:
步骤 401 : 网络侧设备采用 VCT中的保留字段标识基本 VCT和扩展
VCT, 所述基本 VCT包括公共广播频道信息, 所述扩展 VCT包括除了所 述公共广播频道信息之外的分组广播频道信息。
参考表 1中 VCT的语法定义, 其中有 2bit的保留字段, 基于该保留字 段可以分别定义基本 VCT和扩展 VCT; 所述基本 VCT包括公共广播频道 信息,所述扩展 VCT包括除了所述公共广播频道信息之外的分组广播频道 信息; 假设基本 VCT的 2bit保留字段为 xlx2, 则扩展 VCT的 2bit保留字 段为 yly2, 其中 xlx2和 yly2不相同; 按照协议中的定义, 这里只能是二 进制数, 即 X或 y只能为 0或 1。
其中, 网络侧设备可以将基本 VCT和扩展 VCT中的频道信息分别根 据广播业务分组标识进行组合,基本 VCT中的频道信息默认对于所有用户 都是可见的; 扩展 VCT中的频道信息与相应业务分组对应, 其中包含仅该 业务分组里的终端才能可见的频道信息。
步骤 402: 网络侧设备采用基本 VCT进行循环冗余校验 CRC; 或 /和 采用对应的广播业务分组标识和扩展 VCT进行循环冗余校验 CRC,获取第 一校验和。
网络侧设备在组织基本 VCT的时候, 填充 2bit保留字段为 xlx2, 同 时相应的 CRC计算不包含任何业务分组标识; 同时, 网络侧设备在组织扩 展 VCT的时候, 填充 2bit保留字段为 yly2, 同时相应的 CRC计算包含业 务分组标识, 即是采用对应的广播业务分组标识和扩展 VCT进行循环冗余 校验 CRC。
步骤 403: 网络侧设备将包括所述第一校验和的 VCT下发至终端。 步骤 404:终端根据所述 VCT中的保留字段判断所述 VCT是否是基本
VCT, 如果是, 则进入步骤 405; 如果否, 则进入步骤 406。
在本实施例中, 终端接收到 VCT 的时候, 首先判断保留字段是否为 xlx2, 如果是 xlx2, 则表明终端侧无需引入业务分组标识, 进入步骤 405 , 如果不是 xlx2, 即标识保留字段为 yly2, 则进入步骤 406。
步骤 405: 终端直接对所述基本 VCT进行循环冗余校验 CRC, 获取第 二校验和。
终端计算 CRC时不引入业务分组标识, 判断 VCT合法后, 接收相应 的频道信息作为基本频道表;
步骤 406: 终端采用预置的广播业务分组标识和所述扩展 VCT, 进行 循环冗余校验 CRC, 获取第二校验和。
如果保留字段为 yly2, 则终端计算 CRC时引入业务分组标识; 采用预 置的广播业务分组标识和所述扩展 VCT, 进行循环冗余校验 CRC, 以获取 第二校验和。
步骤 407: 终端对所述第一校验和与第二校验和进行匹配检测, 当两 者能够匹配时, 获取校验通过的对应基本 VCT和扩展 VCT。
终端判断 VCT 合法后, 同时获取校验通过的对应基本 VCT 和扩展 VCT, 同时将基本 VCT中的频道信息和扩展 VCT中的频道信息组合起来 共同构成授权业务分组的完整频道信息。
在本实施例中, 基于已有协议中的 VCT保留字段, 扩展定义 VCT属 性, 实现基本 VCT和扩展 VCT的组合传输, 扩展 VCT 中并不包括基本 VCT的频道信息, 这就减少扩展 VCT的数据量,通过这种分级提高了信道 传输效率。
同时, 在实际应用中, 还可以进一步扩展 VCT已有协议的保留字段, 实现基本 VCT和分级分组扩展 VCT的组合传输,减少扩展 VCT的数据量, 提高网络信道传输效率。 在实施例四中只考虑到 2级(基本和扩展) VCT, 当然可以扩展到多级(例如, 0、 1、 2、 3共四级) VCT。
参考 VCT的语法定义, 其中有 2bit的保留字段, 基于该保留字段可以 分别定义基本 VCT和扩展 VCT。其中 2bit保留字段定义全集为 { X 1 x2 , y 1 y2 , zlz2, mlm2} , 将相应字段的定义设置与分级中各个级别相对应, 例如: xlx2<yly2<zlz2<mlm2,则 yly2级别的 VCT应包含 xlx2级别的频道信息, zlz2级别的 VCT应包含 xlx2和 yly2级别的频道信息, mlm2级别的 VCT 应包含 xlx2、 yly2和 zlz2级别的频道信息。其中,所述 xlx2、 yly2和 zlz2 的每一位可以取 0或 1 ; 例如, xlx2为 00, yly2为 01 , zlz2为 10, mlm2 为 11。
具体可以参考下表所示:
Figure imgf000015_0001
参考上表所示, 对于级别 xlx2, 其频道信息为 Ch List 0, 频道信息对 应 VCT的 CRC没有业务分组标识参与计算;
对于级别 yly2, 其完整频道信息为 Ch List 0 + Ch List A1 ,相应频道信 息对应 VCT的 CRC由业务分组标识 A参与运算;
对于级别 zlz2, 其完整频道信息为 Ch List 0 + Ch List Bl + Ch List B2, 相应频道表对应 VCT的 CRC由业务分组标识 B参与运算,其中 Ch List Bl 对应业务标识为 AO, AO为 yly2级别公共频道集合, 仅用于 zlz2级别频 道表扩展使用。
同时,对于级别 mlm2,其完整频道表为 Ch List 0 + Ch List Bl + Ch List C2 + Ch List C3 ,相应频道表对应 VCT的 CRC由业务分组标识 C参与运算, 其中 Ch List C2对应业务标识为 BO, B0为 zlz2级别公共频道集合, 仅用 于 mlm2级别频道表扩展使用。
具体的, 关于多级分组的情况, 在网络侧需要采用 VCT表中的保留字 一校验和; 终端接收到网络侧下发的 VCT时, 首先根据保留字段的内容获 取到业务分组的级别, 并根据上表中的信息可以获取到完整的频道表。 还 可以采用动态增加的方式, 同时对于公共频道表, 例如 basic、 A0、 BO等, 网络侧需要通过预置方式将对应的业务标识先下发至终端, 否则终端无法 识别。
可以看出,基于 VCT中的保留字段,可以分别定义 4级频道信息架构, 分别提取 xlx2、 yly2、 zlz2级别的公共频道信息进行传输, 从而通过分级 的方式尽可能降低频道信息的系统传输开销。 参考图 5 , 在本发明实施例五中, 实现本发明实施例五所提供的方法 可以包括以下步骤:
步骤 501 : 网络侧设备将频道属性描述子按照预置规则进行分组, 并 对每一组频道属性描述子采用对应的密钥进行加密。
假设分组密钥索引 SK为 8bit ( A1A2A3A4A5A6A7A8 ), 则在网络侧 生成 8个密钥, 分别对应 A1-A8 , 当 SK中 A1为 0时, 表示没有使用到 A1对应密钥所加密的频道信息, 当 SK中 A1为 1 时, 表示需要使用 A1 对应密钥所加密的频道信息。
在网络侧可以将频道信息按照一定的属性原则划分为八组集合, 属性 原则其实就是对频道信息划分的特征, 例如, 按成人级别的划分, 例如按 剧情(喜剧、 言情…) 的划分, 或者按收视级别的划分(基本包, 增强包, 超级包…) 将频道表分为 8组集合, 每组分配一个密钥索引; 当然, 这里 SK为 8bit只是一种假设, 可以采用其他长度的 SK。
步骤 502: 网络侧设备将所述加密的频道属性描述子组合到虚拟频道 表 VCT中, 并将所述 VCT和广播业务分组密钥索引发送至终端。
将频道信息, 即是频道属性描述子按照其分组集合属性采用对应的密 钥进行加密, 然后组合到扩展 VCT中进行传输。
其中, 频道属性描述子在实际中可以如表 2所示:
表 2
Figure imgf000017_0001
步骤 503: 终端依据预置的广播业务分组标识匹配获取相应的 VCT, 并根据所述分组密钥索引对所述频道属性描述子进行解密。
在终端可以根据预置的广播业务分组标识接收到匹配的扩展 VCT, 当 然, 终端还可以根据 VCT标识 ( VCT-ID ) 匹配获取相应的扩展 VCT, 同 时根据接收到的 SK, 可以确定当前终端可以接收的频道子分组, 分别用 SK中 bit为 1的对应密钥对扩展 VCT中的频道描述信息逐个进行解密。
步骤 504: 终端提取所述解密后合法的频道属性描述子。
终端从提取出的频道属性描述子中提取出合法的描述子,例如 A1为 1 , 则使用 A 1对应的密钥对频道描述信息进行解密,解密后提取出合法的描述 子, 其中, 所述合法的描述子的合法性可以通过对描述子标志和描述子长 度进行综合判断的。 步骤 505 : 终端组合所述合法的频道属性描述子, 以获取自身能够接 收的广播频道信息。
终端再将这些提取出来的合法频道描述信息组合起来, 就是该终端所 可以接收到的完整频道表了。
需要说明的是, 基于本实施例所述的组合方式, 最多可以支持 28 (即 是 256 )种业务组合, 当然, 分组密钥索引的长度变化时, 支持的业务组 合也会相应的发生变化; 并且基于本实施例所述的方式, 扩展 VCT中已经 包括了所有划分的频道信息, 因此可以只传递一份扩展 VCT, 而不需要为 不同的业务分组传递多份频道表, 就有效降低了传输开销。
同时, 还可以通过配置消息动态更改业务分组密钥索引 SK, 提升网络 传输的安全性, 同时支持业务分组的动态切换。 可以看出, 本实施例中网 络侧在下发业务分组标识的同时, 下发业务分组密钥索引 SK, 可以通过业 务分组标识可以实现扩展 VCT的过滤, 通过业务分组密钥索引 SK实现对 分级分组加密 VCT中频道信息的提取, 有效降低了传输开销。
需要说明的是, 对于前述的各方法实施例, 为了筒单描述, 故将其都 表述为一系列的动作组合, 但是本领域技术人员应该知悉, 本发明并不受 所描述的动作顺序的限制, 因为依据本发明, 某些步骤可以采用其他顺序 或者同时进行。 其次, 本领域技术人员也应该知悉, 说明书中所描述的实 施例均属于优选实施例,所涉及的动作和模块并不一定是本发明所必须的。 与上述本发明实施例所提供的方法相对应, 参见图 6 , 本发明实施例 还提供了一种获取虚拟频道表的实现装置, 所述装置可以包括:
接收模块 601 , 用于接收网络侧下发的至少一个虚拟频道表 VCT, 所 述 VCT包括网络侧生成的第一校验和及数据对象,所述数据对象包括频道 信息。
本实施例所述的装置可以集成到终端上, 也可以采用终端来实现, 或 者单独作为一个实体; 对于不同分组的广播频道信息, 即是扩展频道信息, 不是所有的用户都能够看到, 则在网络侧定义扩展虚拟频道表 VCT, 所述 扩展 VCT包括广播频道号、 广播频道名称、 广播频点或调制方式, 在每一 组对应 VCT的 CRC计算方式中, 需要引入业务分组标识, 因此, 在网络 侧采用对应的广播业务分组标识和虚拟频道表 VCT作为源数据, 并计算两 者的第一校验和; 其中, 计算第一校验和的时候, 可以采用循环冗余校验 ( Cyclic Redundancy Check, CRC ) 的方式, 也可以采用其他方式来获取所 述第一校验和; 这些其他的方式包括但不限于: 哈希 Hash运算、 分组加密 运算、 流式加密运算或异或运算; 所述数据对象中包括了终端可以接收到 的频道信息, 在 VCT中以数据结构的形式提供数据对象。
需要说明的是, 对于一个网络中, 可能包括两种类型的终端: 历史终 端 (已经在网络中部署的, 但是不支持业务分组标识的计算方式的终端), 和后续发放的终端 (可以理解为升级之后的终端, 可以支持广播业务分组 的终端)。 对于公共的频道信息, 定义为基本 VCT, 在网络侧其对应的获取 校验和的方式保持不变, 不引入业务分组标识, 所有终端 (包括上面的两 种类型的终端) 用户都可以观看; 但是对于扩展频道表对应的扩展 VCT, 只有支持广播业务分组的后续发放的终端才能够得到正确的计算结果。 本 申请中所提及的终端均为后续发送的终端。
第一校验模块 602, 用于采用预置的广播业务分组标识和所述接收模 块 501接收到的 VCT的数据对象获取两者的第二校验和。
其中, 需要说明的是, 所述第一校验模块 602获取第二校验和的方式 必须和网络侧获取第一校验和的方式相同。
获取模块 603 , 用于当所述第一校验和与所述第二校验和匹配时, 从 所述网络侧下发的至少一个虚拟频道表中获得校验通过的 VCT。
终端将自身计算获取到的第一校验和和所述第二校验和进行匹配, 当 两者能够匹配时, 所述获取模块 603就获取校验通过的对应 VCT, 则所述 VCT包括的广播频道信息即是该终端的所有完整频道信息。
在本实施例中, 通过基于广播业务分组标识分别在网络侧和终端侧获 取第一校验和与第二校验和的方式, 可以通过在终端侧匹配检测的方式, 使得各个终端都可以根据校验结果获取到与自身对应的 VCT, 从而获取到 自身能够接收到的完整频道信息, 本实施例中可以基于筒化的控制体系实 现业务分级分组授权, 限定已部署终端在软件未升级情况下只能接收基本 节目, 而后续发放的终端则可以接收到所在业务组的频道信息。 同时, 也 可以不依赖于 CA技术, 就基于现有筒化的控制体系实现业务分组分级授 权, 降低了网络传输开销。 在本发明的另一个装置实施例二中, 参考图 7所示, 所述第一校验模 块 702在本实施例中具体可以包括:
提取子模块 701 , 用于提取所述虚拟频道表中的数据对象。
所述提取子模块 701在接收到网络侧下发的至少一个虚拟频道表时, 从虚拟频道表的数据结构中, 提取出所述数据对象, 每一个 VCT的数据对 象包括对应的终端可以接收到的频道信息,还包括在 VCT表中其他的校验 数据。
第一拼接子模块 702 , 用于将所述广播业务分组标识和所述 VCT的数 据对象进行数据拼接。
本实施例中的终端可以支持广播业务分组标识的处理, 终端在接收到 VCT后, 需要和网络侧采用相同的计算方式, 即是采用 (VCT数据对象 II 业务分组标识) 或 (业务分组标识 IIVCT数据对象) 进行数据拼接。
第一校验子模块 703 , 用于将拼接后的数据作为源数据进行循环冗余 校验 CRC , 则所述 CRC的结果即为所述第二校验和。
所述第一校验子模块 703可以将拼接后的结果作为 CRC运算的输入, 并计算出第二校验和。 后续可以由所述获取模块 603获取到校验通过的对 应 VCT。
同时, 在本发明的装置实施例三中, 参考图 8所示, 所述第一校验模 块 602在本实施例中具体可以包括:
提取子模块 801 , 用于提取所述虚拟频道表中的数据对象。
第二校验子模块 802 , 用于将所述 VCT的数据对象作为源数据进行校 验和的计算。
终端在接收到 VCT时,首先由所述第二校验子模块 801按照相应的计算方 法进行处理, 即是首先将所述 VCT的数据对象作为源数据进行 CRC运算, 获得 CRC运算结果。 复合运算子模块 803 , 用于将预置的业务分组标识和所述校验和的计 算的结果作为源数据进行复合运算。
需要说明的是, 本实施例中所述复合运算子模块 802的复合运算的方 式, 需要和网络侧采用的复合运算的方式相同, 即是在终端采用同样的方 式进行对所述 CRC运算的结果和预置的业务分组标识进行复合运算; 并且, 所述复合运算子模块 802和第二校验子模块 801 的顺序本发明并不限定, 两者的顺序关系并不影响本发明实施例的实现。
当网络侧采用 Hash运算时, 所述复合运算子模块 802也采用 Hash运 算, 假设 VCT的 CRC按 g (f (X) , y)方式计算获得, 其中可以是 X为 VCT 数据, y为业务分组标识, 也可以是 X为业务分组标识, y为 VCT数据。 f (*) 和 g (*)为通用算法, 包括但不限于 Ha sh运算、 异或运算、 分组加密运算、 流 式加密运算等。
获取 CRC数值子模块 804 , 用于从所述复合运算的结果中截取一定长 度的数值作为第二校验和。
在终端截取 Hash运算的方式也需要和网络侧相同,即是在网络侧截取 了哪些长度和位置的数值, 在终端侧需要以同样的方式截取。 在本实施例 中, 终端在获取对应 VCT的时候, 是采取先进行一次 CRC运算再进行复 合运算的方式, 同样, 在网络侧也是先进行一次 CRC运算再进行复合运算 的方式的 VCT , 才能够和终端相匹配, 这种将广播业务分组标识引入复合 运算的方式, 可以保证了在网络侧和终端侧运算的匹配更为准确和正确, 也能够保证减少网络传输开销。
同时, 与本发明的方法实施例四相对应, 参考图 9所示, 在本发明装 置实施例中, 所述第一校验模块 602具体可以包括:
提取子模块 901 , 用于提取所述虚拟频道表中的数据对象。
判断子模块 902 ,用于根据所述 VCT中的保留字段判断所述 VCT是否 是基本 VCT。
第三校验子模块 903 , 用于当所述判断子模块的结果为是时, 直接获 取所述基本 VCT的校验和, 并作为第二校验和。
第四校验子模块 904 , 用于当所述判断子模块的结果为否时, 则采用 预置的广播业务分组标识和所述扩展 VCT的数据对象获取两者的第二校验 和。
则在本实施例中, 获取模块 603 具体用于获取校验通过的对应基本 VCT和扩展 VCT。 即是终端判断 VCT合法后, 同时获取校验通过的对应 基本 VCT和扩展 VCT,同时将基本 VCT中的频道信息和扩展 VCT中的频 道信息组合起来共同构成授权业务分组的完整频道信息。 在本实施例中, 基于已有协议中的 VCT保留字段, 扩展定义 VCT属性, 实现基本 VCT和 扩展 VCT的组合传输, 扩展 VCT中并不包括基本 VCT的频道信息, 这就 减少扩展 VCT的数据量, 通过这种分级提高了信道传输效率。
同时, 与本发明的方法实施例五相对应, 参考图 10所示, 在本发明装 置实施例中, 所述第一校验模块 602具体可以包括:
解密子模块 1001 , 用于依据预置的广播业务分组标识和所述分组密钥 索引, 对所述 VCT中加密的频道属性描述子进行解密。
在终端可以根据预置的广播业务分组标识接收到匹配的扩展 VCT, 当 然, 终端还可以根据 VCT标识 ( VCT-ID ) 匹配获取相应的扩展 VCT, 同 时根据接收到的 SK, 可以确定当前终端可以接收的频道子分组, 分别用 SK中 bit为 1的对应密钥对扩展 VCT中的频道描述信息逐个进行解密。
提取描述子子模块 1002 ,用于提取所述解密后合法的频道属性描述子; 所述提取描述子子模块 1002 从提取出的频道属性描述子中提取出合 法的描述子, 例如 A1为 1 , 则使用 A1对应的密钥对频道描述信息进行解 密, 解密后提取出合法的描述子; 终端再将这些提取出来的合法频道描述 信息组合起来, 就是该终端所可以接收到的完整频道表了。
则所述获取模块 603 , 具体用于: 组合所述合法的频道属性描述子, 以获取自身能够接收的广播频道信息。 与上述本发明实施例所提供的方法相对应, 参见图 11 , 本发明实施例 还提供了一种广播业务分组的实现装置实施例一, 所述装置可以包括: 第二校验模块 1101 , 用于针对不同分组的广播频道信息, 采用对应的 广播业务分组标识和虚拟频道表 VCT获取两者的第一校验和。 本实施例所述的装置可以集成到网络侧上, 也可以直接采用网络侧实 现, 还可以单独作为一个与网络侧相连的实体; 对于不同分组的广播频道 信息, 即是扩展频道信息, 不是所有的用户都能够看到, 则在网络侧定义 扩展虚拟频道表 VCT, 所述扩展 VCT包括广播频道号、 广播频道名称、 广 播频点或调制方式, 在每一组对应 VCT的 CRC计算方式中, 需要引入业 务分组标识, 因此, 在网络侧采用对应的广播业务分组标识和虚拟频道表 VCT作为源数据, 并计算两者的第一校验和; 其中, 计算第一校验和的时 候, 可以采用循环冗余校验( Cyclic Redundancy Check , CRC ) 的方式, 也 可以采用其他方式来获取所述第一校验和。
需要说明的是, 对于公共的频道信息, 所有终端用户都可以观看, 则 定义为基本 VCT, 在网络侧其对应的获取校验和的方式保持不变, 不引入 业务分组标识。
发送模块 1102,用于将包括所述第一校验和和数据对象的 VCT下发至 终端, 以实现广播业务分组, 所述数据对象包括频道信息。
所述发送模块 1102将包括了所述第一校验和的 VCT发送至终端, 所 述虚拟频道表 VCT包括网络侧的第一校验和。
在本发明实施例一中, 通过基于广播业务分组标识分别在网络侧和终 端侧获取第一校验和与第二校验和的方式, 可以通过在终端侧匹配检测的 方式, 使得各个终端都可以根据校验结果获取到与自身对应的 VCT, 从而 获取到自身能够接收到的完整频道信息, 本实施例中可以基于筒化的控制 体系实现业务分级分组授权, 限定已部署终端在软件未升级情况下只能接 收基本节目, 而后续发放的终端则可以接收到所在业务组的频道信息。
同时参考图 12所示, 在本发明的一种广播业务分组的实现装置实施例二 中, 所述第二校验模块 1101具体可以包括:
第二拼接子模块 1201 ,用于将所述广播业务分组标识和所述 VCT的数 据对象进行数据拼接。
在本实施例中, 网络侧在获取第一校验和的时候, 采用循环冗余校验
CRC的运算方式, 并且在进行 CRC运算之前, 首先将所述广播业务分组标 识和所述 VCT的数据对象进行数据拼接, 对应 VCT的 CRC计算方式中, 需要引入业务分组标识, 采用 (校验数据对象 II业务分组标识)或 (业务分 组标识 II校验数据对象) 进行数据拼接, 然后进行 CRC运算; 其中, 所述 校验数据对象为所述 VCT的数据对象。
第五校验子模块 1202, 用于将拼接后的数据作为源数据进行 CRC运 在本实施例中具体的计算中, 可以采用如下方式, 例如 VCT数据对象 为 ΑΙ . , .Αη, 分组标识为 ΒΙ . , .Βη, 则可组合为 Α1...ΑηΒ1...Βη, 按字节顺 序组合在一起; 并进行 CRC运算, 运算的结果即为第一校验和; 以便于网 络侧后续再将运算结果作为第一校验和, 并将包括了所述第一校验和的 VCT发送至终端。
或者, 参考图 13所示, 示出了本发明装置实施例三的结构框图, 如图 所示, 本实施例中的广播业务分组的实现装置中所述第二校验模块具体可 以包括:
第六校验子模块 1301 ,用于将所述 VCT的数据对象作为源数据进行校 验和的计算;
在本实施例中, 所述第六校验子模块 1301首先将 VCT的数据对象作 为源数据进行 CRC运算。
复合运算子模块 1302, 用于将预置的业务分组标识和所述校验和的计 算的结果作为源数据进行复合运算。
将所述运算的结果与预置的业务分组标识作为输入, 实施复合运算; 其中, 所述校验和的计算方式、 或者所述复合运算可以包括: 循环冗余校 验 CRC、 哈希 Hash运算、 分组加密运算、 流式加密运算或异或运算。
第二截取子模块 1303 , 用于从所述复合运算的结果中截取一定长度的 数值作为第一校验和。
当采用 Hash运算时, 以 MD5为例, 输出为 128bit, 其中可以截取其 中的任意长度, 例如 32bit, 这 32bit的数值不一定是连续的, 但这种截取 方法需要在网络侧和终端保持一致,因此,本步骤中,网络侧取其中的 32bit 作为最终的第一校验和。
当采用分组加密运算时, 则在网络侧首先计算 VCT的 CRC数值, 然 后将计算获得的 CRC作为输入, 以业务分组标识作为密钥, 实施分组加密 运算, 可以同样取加密运算结果中的 32bit作为最终的第一校验和。
当采用异或运算时, 首先计算 VCT表的 CRC数值, 然后将计算获得 的 CRC作为输入, 与业务分组标识进行逐比特(bit )的异或运算, 同样也 可以取其中的 32bit作为最终的第一校验和。
本实施例中在网络侧先进行一次 CRC 运算再进行复合运算的方式的 VCT, 才能够和终端相匹配, 这种将广播业务分组标识引入复合运算的方 式, 可以保证了在网络侧和终端侧运算的匹配更为准确和正确, 也能够保 证减少网络传输开销。 同时参考图 14所示, 示出了本发明的广播业务分组 的实现装置实施例四的结构示意图, 如图所示, 所述装置具体可以包括: 标识模块 1401 , 用于采用 VCT表中的保留字段标识基本 VCT和扩展 VCT, 所述基本 VCT包括公共广播频道信息, 所述扩展 VCT包括除了所 述公共广播频道信息之外的分组广播频道信息。
参考表 1中 VCT的语法定义, 其中有 2bit的保留字段, 基于该保留字 段可以分别定义基本 VCT和扩展 VCT; 所述基本 VCT包括公共广播频道 信息,所述扩展 VCT包括除了所述公共广播频道信息之外的分组广播频道 信息; 假设基本 VCT的 2bit保留字段为 xlx2, 则扩展 VCT的 2bit保留字 段为 yly2, 其中 xlx2和 yly2不相同; 按照协议中的定义, 这里只能是二 进制数, 即是 X或 y只能为 0或 1。
其中, 基本 VCT 中的频道信息默认对于所有用户都是可见的; 扩展
VCT中的频道信息与相应业务分组对应, 其中包含仅该业务分组里的终端 才能可见的频道信息。
第二校验模块 1402, 具体用于采用基本 VCT进行循环冗余校验 CRC, 将结果作为第一校验和; 或者,
采用对应的广播业务分组标识和扩展 VCT进行循环冗余校验 CRC,将 结果作为第一校验和。
网络侧在组织基本 VCT的时候, 填充 2bit保留字段为 xlx2, 同时相 应的 CRC计算不包含任何业务分组标识。
或者, 网络侧在组织扩展 VCT的时候, 填充 2bit保留字段为 yly2, 同时相应的 CRC计算包含业务分组标识, 即是采用对应的广播业务分组标 识和扩展 VCT进行循环冗余校验 CRC。
发送模块 1403 ,用于将包括所述第一校验和的 VCT下发至终端, 以实 现广播业务分组。
在本实施例中, 基于已有协议中的 VCT保留字段, 扩展定义 VCT属 性, 实现基本 VCT和扩展 VCT的组合传输, 扩展 VCT 中并不包括基本 VCT的频道信息, 这就减少扩展 VCT的数据量,通过这种分级提高了信道 传输效率。
同时参考图 15所示,示出了本发明的广播业务分组的实现装置实施例 五的结构示意图, 如图所示, 所述第二校验模块具体可以包括:
分组加密子模块 1501 ,用于将频道属性描述子按照预置规则进行分组, 并对每一组频道属性描述子采用对应的密钥进行加密;
假设分组密钥索引 SK为 8bit ( A1A2A3A4A5A6A7A8 ), 则在网络侧 生成 8个密钥, 分别对应 A1-A8 , 当 SK中 A1为 0时, 表示没有使用到 A1对应密钥所加密的频道信息, 当 SK中 A1为 1 时, 表示需要使用 A1 对应密钥所加密的频道信息。
在网络侧可以将频道信息按照一定的属性原则划分为八组集合, 属性 原则其实就是对频道信息划分的特征, 例如, 按成人级别的划分, 例如按 剧情(喜剧、 言情…) 的划分, 或者按收视级别的划分(基本包, 增强包, 超级包 ...) 将频道表分为 8组集合, 每组分配一个密钥索引; 当然, 这里 SK为 8bit只是一种假设, 可以采用其他长度的 SK。
添加校验和子模块 1502, 用于将所述加密的频道属性描述子组合作为 第一校验和添加到虚拟频道表 VCT中。
即是频道属性描述子按照其分组集合属性采用对应的密钥进行加密, 然后组合到扩展 VCT中进行传输。
在本实施例中, 可以看出, 本实施例中网络侧在下发业务分组标识的 同时, 下发业务分组密钥索引 SK, 可以通过业务分组标识可以实现扩展 VCT的过滤,通过业务分组密钥索引 SK实现对分级分组加密 VCT中频道 信息的提取, 有效降低了传输开销。 参考图 16 所示, 示出了本发明的一种广播业务分组的实现系统实施 例, 如图所示, 所述系统具体可以包括:
终端 1601 , 用于接收网络侧下发的至少一个虚拟频道表 VCT, 所述虚 拟频道表 VCT包括网络侧生成的第一校验和和数据对象; 采用预置的广播 业务分组标识和所述 VCT的数据对象获取两者的第二校验和; 当所述第一 校验和与所述第二校验和匹配时,从所述网络侧下发的至少一个 VCT中获 取校验通过的 VCT。
网络侧 1602, 用于针对不同分组的广播频道信息, 采用对应的广播业 务分组标识和虚拟频道表 VCT获取两者的第一校验和;将包括所述第一校 验和的 VCT下发至终端, 以实现广播业务分组。
需要说明的是, 因为前述广播业务分组的实现方法和装置介绍的十分 详尽, 所以所述广播业务分组的实现系统实施例未详尽之处, 可以参见前 述对广播业务分组的实现方法和装置实施例的描述, 在此不再对系统作详 细描述。
还需要说明的是, 在本文中, 诸如第一和第二等之类的关系术语仅仅 用来将一个实体或者操作与另一个实体或操作区分开来, 而不一定要求或 者暗示这些实体或操作之间存在任何这种实际的关系或者顺序。 而且, 术 语"包括"、 "包含"或者其任何其他变体意在涵盖非排他性的包含, 从而使 得包括一系列要素的过程、 方法、 物品或者设备不仅包括那些要素, 而且 还包括没有明确列出的其他要素, 或者是还包括为这种过程、 方法、 物品 或者设备所固有的要素。在没有更多限制的情况下, 由语句 "包括一个 ...... " 限定的要素, 并不排除在包括所述要素的过程、 方法、 物品或者设备中还 存在另外的相同要素。
通过以上的实施方式的描述, 本领域的技术人员可以清楚地了解到本 发明可以通过硬件实现, 也可以可借助软件加必要的通用硬件平台的方式 来实现基于这样的理解, 本发明的技术方案可以以软件产品的形式体现出 来, 该软件产品可以存储在一个非易失性存储介质 (可以是 CD-ROM, U 盘, 移动硬盘等) 中, 包括若干指令用以使得一台计算机设备(可以是个 人计算机, 服务器, 或者网络设备等)执行本发明各个实施例所述的方法。 以上对本发明实施例所提供的广播业务分组的实现方法、 装置及系统 了阐述, 以上实施例的说明只是用于帮助理解本发明实施例的方法及其思 想; 同时, 对于本领域的一般技术人员, 依据本发明实施例的思想, 在具 体实施方式及应用范围上均会有改变之处, 综上所述, 本说明书内容不应 理解为对本发明的限制。

Claims

权 利 要 求
1、 一种获取虚拟频道表的方法, 其特征在于, 包括:
接收网络侧下发的至少一个虚拟频道表, 所述网络侧下发的虚拟频道 表包括网络侧生成的第一校验和与数据对象,所述数据对象包含频道信息; 采用预置的广播业务分组标识和所述虚拟频道表的数据对象获取两者 的第二校验和;
当所述第一校验和与所述第二校验和匹配时, 从所述接收的至少一个 虚拟频道表中获得校验通过的虚拟频道表。
2、 根据权利要求 1所述的方法, 其特征在于, 所述采用预置的广播业 务分组标识和所述虚拟频道表的数据对象获得两者的第二校验和, 具体包 括:
提取所述虚拟频道表中的数据对象;
将所述广播业务分组标识和所述提取的数据对象进行数据拼接; 将拼接后的结果作为源数据进行循环冗余校验 CRC ,则所述 CRC的结 果即为所述第二校验和。
3、 根据权利要求 1所述的方法, 其特征在于, 所述采用预置的广播业 务分组标识和所述提取的数据对象获取两者的第二校验和, 具体包括: 提取所述虚拟频道表中的数据对象;
将所述虚拟频道表的数据对象作为源数据进行校验和的计算; 将预置的业务分组标识和所述校验和的计算的结果作为源数据进行复 合运算;
从所述复合运算的结果中截取适当长度的数值作为第二校验和。
4、 根据权利要求 3所述的方法, 其特征在于, 所述校验和的计算, 或 者复合运算包括: 循环冗余校验 CRC、 哈希 Hash运算、 分组加密运算、 流式力。密运算或异或运算。
5、 根据权利要求 2-4任一项所述的方法, 其特征在于, 所述虚拟频道 表为扩展虚拟频道表, 所述扩展虚拟频道表包括公共广播频道信息, 以及 除了所述公共广播频道信息之外的分组广播频道信息。
6、 根据权利要求 1所述的方法, 其特征在于, 所述虚拟频道表包括基 本虚拟频道表和扩展虚拟频道表, 所述基本虚拟频道表包括公共广播频道 信息, 所述扩展虚拟频道表包括除了所述公共广播频道信息之外的分组广 播频道信息, 所述基本虚拟频道表和所述扩展虚拟频道表采用保留字段进 行标识; 则所述采用预置的广播业务分组标识和所述虚拟频道表的数据对 象获取两者的第二校验和, 具体包括:
提取所述虚拟频道表中的数据对象;
根据所述虚拟频道表中的保留字段判断所述虚拟频道表是否是基本虚 拟频道表, 如果是, 直接获取所述基本虚拟频道表的校验和, 作为第二校 验和;
如果否, 则采用预置的广播业务分组标识和所述扩展提取的数据对象 获取两者的第二校验和;
所述从所述至少一个虚拟频道表中获得校验通过的虚拟频道表, 具体 包括:
从所述至少一个虚拟频道表中获得校验通过的基本虚拟频道表和扩展 虚拟频道表。
7、 根据权利要求 1所述的方法, 其特征在于, 所述第一校验和为加密 的频道属性描述子和广播业务分组密钥索引, 所述采用预置的广播业务分 组标识和所述虚拟频道表的数据对象获取两者的第二校验和, 具体包括: 依据预置的广播业务分组标识和所述分组密钥索引, 对所述虚拟频道 表中加密的频道属性描述子进行解密;
提取所述解密后合法的频道属性描述子;
则所述从所述至少一个虚拟频道表中获得校验通过的虚拟频道表, 具 体包括:
组合所述合法的频道属性描述子, 以获取自身能够接收的广播频道信 息。
8、 一种广播业务分组的实现方法, 其特征在于, 包括:
针对不同分组的广播频道信息, 采用对应的广播业务分组标识和虚拟 频道表获取两者的第一校验和;
将包括所述第一校验和和数据对象的虚拟频道表下发至终端, 以实现 广播业务分组, 所述数据对象包括频道信息。
9、 根据权利要求 8所述的方法, 其特征在于, 所述采用对应的广播业 务分组标识和虚拟频道表获取两者的第一校验和, 具体包括:
将所述广播业务分组标识和所述虚拟频道表的数据对象进行数据拼 接;
将拼接后的数据作为源数据进行 CRC运算。
10、 根据权利要求 8所述的方法, 其特征在于, 所述采用对应的广播 业务分组标识和虚拟频道表作为源数据, 并获取两者的第一校验和, 具体 包括:
将所述虚拟频道表的数据对象作为源数据进行校验和的计算; 将预置的业务分组标识和所述校验和的计算的结果作为源数据进行复 合运算;
从所述复合运算的结果中截取一定长度的数值作为第一校验和。
11、 根据权利要求 10所述的方法, 其特征在于, 所述校验和的计算方 式、 或者所述复合运算包括: 循环冗余校验 CRC、 哈希 Hash运算、 分组 力口密运算、 流式力口密运算或异或运算。
12、 根据权利要求 8-11任一项所述的方法, 其特征在于, 所述虚拟频 道表为扩展虚拟频道表, 所述扩展虚拟频道表包括公共广播频道信息, 以 及除了所述公共广播频道信息之外的分组广播频道信息。
13、 根据权利要求 8所述的方法, 其特征在于, 所述虚拟频道表包括 基本虚拟频道表和扩展虚拟频道表, 所述方法还包括:
采用虚拟频道表中的保留字段标识基本虚拟频道表和扩展虚拟频道 表, 所述基本虚拟频道表包括公共广播频道信息, 所述扩展虚拟频道表包 括除了所述公共广播频道信息之外的分组广播频道信息;
则所述采用对应的广播业务分组标识和虚拟频道表作为源数据, 并获 取两者的第一校验和, 具体为:
采用对应的广播业务分组标识和基本虚拟频道表进行循环冗余校验 CRC, 将结果作为第一校验和; 或者,
采用对应的广播业务分组标识和扩展虚拟频道表进行循环冗余校验 CRC, 将结果作为第一校验和。
14、 根据权利要求 8所述的方法, 其特征在于, 所述从所述至少一个 虚拟频道表中获得两者的第一校验和, 具体包括:
将频道属性描述子按照预置规则进行分组, 并对每一组频道属性描述 子采用对应的密钥进行加密;
将所述加密的频道属性描述子组合作为第一校验和添加到虚拟频道表 中, 并将所述虚拟频道表和广播业务分组密钥索引发送至终端。
15、 一种获取虚拟频道表的实现装置, 其特征在于, 包括:
接收模块, 用于接收网络侧下发的虚拟频道表, 所述虚拟频道表包括 网络侧生成的第一校验和及数据对象, 所述数据对象包括频道信息;
第一校验模块, 用于采用预置的广播业务分组标识和所述虚拟频道表 的数据对象获取两者的第二校验和;
获取模块, 用于当所述第一校验和与所述第二校验和匹配时, 从所述 至少一个虚拟频道表中获得校验通过的虚拟频道表。
16、 根据权利要求 15所述的装置, 其特征在于, 所述第一校验模块具 体包括:
提取子模块, 用于提取所述虚拟频道表中的数据对象;
第一拼接子模块, 用于将所述广播业务分组标识和所述提取的数据对 象进行数据拼接;
第一校验子模块, 用于将拼接后的数据作为源数据进行循环冗余校验
CRC, 则所述 CRC的结果即为所述第二校验和。
17、 根据权利要求 15所述的装置, 其特征在于, 所述第一校验模块具 体包括:
提取子模块, 用于提取所述虚拟频道表中的数据对象;
第二校验子模块, 用于将所述提取的数据对象作为源数据进行校验和 的计算;
复合运算子模块, 用于将预置的业务分组标识和所述校验和的计算的 结果作为源数据进行复合运算;
获取 CRC数值子模块,用于从所述复合运算的结果中截取一定长度的 数值作为第二校验和。
18、 根据权利要求 15所述的装置, 其特征在于, 所述第一校验模块具 体包括:
提取子模块, 用于提取所述虚拟频道表中的数据对象;
判断子模块, 用于根据所述虚拟频道表中的保留字段判断所述虚拟频 道表是否是基本虚拟频道表;
第三校验子模块, 用于当所述判断子模块的结果为是时, 直接获取所 述基本虚拟频道表的校验和, 并作为第二校验和;
第四校验子模块, 用于当所述判断子模块的结果为否时, 则采用预置 的广播业务分组标识和所述提取的数据对象获取两者的第二校验和;
则所述获取模块具体用于当所述第一校验和与所述第二校验和匹配 时, 从所述至少一个虚拟频道表中获得校验通过的对应基本虚拟频道表和 扩展虚拟频道表。
19、 根据权利要求 15所述的装置, 其特征在于, 所述第一校验模块具 体包括:
解密子模块,用于依据预置的广播业务分组标识和所述分组密钥索引, 对所述虚拟频道表中加密的频道属性描述子进行解密;
提取描述子子模块, 用于提取所述解密后合法的频道属性描述子; 则所述获取模块, 具体用于: 组合所述合法的频道属性描述子, 以获 取自身能够接收的广播频道信息。
20、 一种广播业务分组的实现装置, 其特征在于, 包括:
第二校验模块, 用于针对不同分组的广播频道信息, 采用对应的广播 业务分组标识和虚拟频道表获取两者的第一校验和;
发送模块, 用于将包括所述第一校验和及数据对象的虚拟频道表下发 至终端, 以实现广播业务分组, 所述数据对象包括频道信息。
21、 根据权利要求 20所述的装置, 其特征在于, 所述第二校验模块具 体包括:
第二拼接子模块, 用于将所述广播业务分组标识和所述提取的数据对 象进行数据拼接; 第五校验子模块, 用于将拼接后的数据作为源数据进行 CRC运算。
22、 根据权利要求 20所述的装置, 其特征在于, 所述第二校验模块具 体包括:
第六校验子模块, 用于将所述虚拟频道表的数据对象作为源数据进行 校验和的计算;
复合运算子模块, 用于将预置的业务分组标识和所述校验和的计算的 结果作为源数据进行复合运算;
第二截取子模块, 用于从所述复合运算的结果中截取一定长度的数值 作为第一校验和。
23、 根据权利要求 20所述的装置, 其特征在于, 所述装置还包括: 标识模块, 用于采用虚拟频道表中的保留字段标识基本虚拟频道表和 扩展虚拟频道表, 所述基本虚拟频道表包括公共广播频道信息, 所述扩展 虚拟频道表包括除了所述公共广播频道信息之外的分组广播频道信息; 则所述第二校验模块, 具体用于采用对应的广播业务分组标识和基本 虚拟频道表进行循环冗余校验 CRC , 将结果作为第一校验和; 或者,
采用对应的广播业务分组标识和扩展虚拟频道表进行循环冗余校验 CRC, 将结果作为第一校验和。
24、 根据权利要求 20所述的装置, 其特征在于, 第二校验模块具体包 括:
分组加密子模块, 用于将频道属性描述子按照预置规则进行分组, 并 对每一组频道属性描述子采用对应的密钥进行加密;
添加校验和子模块, 用于将所述加密的频道属性描述子组合作为第一 校验和添加到虚拟频道表中。
25、 一种广播业务分组的实现系统, 其特征在于, 包括:
网络侧设备, 用于针对不同分组的广播频道信息, 采用对应的广播业 务分组标识和虚拟频道表获取两者的第一校验和; 将包括所述第一校验和 和数据对象的虚拟频道表下发至终端, 以实现广播业务分组;
终端, 用于接收网络侧下发的虚拟频道表, 所述虚拟频道表包括网络 侧生成的第一校验和; 采用预置的广播业务分组标识和所述虚拟频道表的 数据对象作为源数据, 获取两者的第二校验和; 当所述第一校验和与所述 第二校验和匹配时, 从所述至少一个虚拟频道表中获得校验通过的虚拟频 道表。
PCT/CN2009/074131 2009-09-23 2009-09-23 广播业务分组的实现方法、装置和系统 WO2011035468A1 (zh)

Priority Applications (4)

Application Number Priority Date Filing Date Title
EP09849656.5A EP2482551B1 (en) 2009-09-23 2009-09-23 Method, device and system for implementing the grouping of broadcast services
CN200980106656.9A CN102648625B (zh) 2009-09-23 2009-09-23 广播业务分组的实现方法、装置和系统
PCT/CN2009/074131 WO2011035468A1 (zh) 2009-09-23 2009-09-23 广播业务分组的实现方法、装置和系统
US13/425,917 US9351022B2 (en) 2009-09-23 2012-03-21 Realization method, device, and system for broadcast service grouping

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2009/074131 WO2011035468A1 (zh) 2009-09-23 2009-09-23 广播业务分组的实现方法、装置和系统

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US13/425,917 Continuation US9351022B2 (en) 2009-09-23 2012-03-21 Realization method, device, and system for broadcast service grouping

Publications (1)

Publication Number Publication Date
WO2011035468A1 true WO2011035468A1 (zh) 2011-03-31

Family

ID=43795277

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2009/074131 WO2011035468A1 (zh) 2009-09-23 2009-09-23 广播业务分组的实现方法、装置和系统

Country Status (4)

Country Link
US (1) US9351022B2 (zh)
EP (1) EP2482551B1 (zh)
CN (1) CN102648625B (zh)
WO (1) WO2011035468A1 (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102790949A (zh) * 2011-05-17 2012-11-21 中兴通讯股份有限公司 一种移动广告业务实现方法及系统
US9351022B2 (en) 2009-09-23 2016-05-24 Huawei Technologies Co., Ltd. Realization method, device, and system for broadcast service grouping

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2978226A1 (en) * 2014-07-21 2016-01-27 Thomson Licensing Method of acquiring of electronic program guide information and corresponding apparatus
ES2788903T3 (es) 2015-01-28 2020-10-23 Huawei Tech Co Ltd Dispositivo terminal, dispositivo de red y método de comunicación grupal
US10459922B2 (en) * 2016-11-08 2019-10-29 At&T Intellectual Property I, L.P. Unique identification generation for records in a data streaming processing system
US11190827B2 (en) * 2018-04-30 2021-11-30 Qualcomm Incorporated Method for broadcast service signaling
JP7164272B2 (ja) * 2018-05-15 2022-11-01 株式会社デンソーテン 周波数リストの異常判定方法、異常判定プログラム、及びデジタル放送の受信機
CN113873486B (zh) * 2021-09-23 2022-07-12 上海山景集成电路股份有限公司 蓝牙通信方法、通信设备及系统

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1770838A (zh) * 2004-09-08 2006-05-10 Lg电子株式会社 有线节目接收机及其服务信息处理方法

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7210159B2 (en) * 1994-02-18 2007-04-24 Starsight Telecast, Inc. System and method for transmitting and utilizing electronic programs guide information
US6807585B2 (en) * 2001-02-22 2004-10-19 Ati Technologies, Inc. Method and system for parsing section data
JP4839554B2 (ja) * 2000-10-19 2011-12-21 ソニー株式会社 無線通信システム、クライアント装置、サーバ装置および無線通信方法
JP2002247543A (ja) * 2001-02-21 2002-08-30 Sony Corp 送信装置および方法、受信装置および方法、記録媒体、並びにプログラム
KR100657260B1 (ko) * 2002-12-02 2006-12-14 삼성전자주식회사 방송 테이블 변경 판단 방법
KR101121778B1 (ko) * 2004-01-06 2012-03-23 삼성전자주식회사 무선으로 영상기기 주변의 기기를 제어하는 방법 및 장치
US8977859B2 (en) * 2004-05-04 2015-03-10 Elsevier, Inc. Systems and methods for data compression and decompression
KR100662918B1 (ko) * 2004-09-20 2007-01-02 삼성전자주식회사 오픈케이블 및 상기 오픈케이블에서 서비스 정보 갱신 방법
EP1750454A1 (en) * 2005-08-05 2007-02-07 Dibcom Method, device and program for receiving and verifying payload data of a transport stream
KR100809757B1 (ko) * 2006-05-24 2008-03-04 엘지전자 주식회사 디지털 케이블 방송 수신이 가능한 영상표시기기의 채널제어장치 및 방법
CN101889272B (zh) * 2008-02-28 2013-02-27 日立民用电子株式会社 内容传输系统、传输服务器、接收终端和内容传输方法
CA2743997C (en) * 2008-11-18 2013-06-11 Lg Electronics Inc. Method for receiving a broadcast signal
CN102648625B (zh) 2009-09-23 2014-08-20 华为技术有限公司 广播业务分组的实现方法、装置和系统

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1770838A (zh) * 2004-09-08 2006-05-10 Lg电子株式会社 有线节目接收机及其服务信息处理方法

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9351022B2 (en) 2009-09-23 2016-05-24 Huawei Technologies Co., Ltd. Realization method, device, and system for broadcast service grouping
CN102790949A (zh) * 2011-05-17 2012-11-21 中兴通讯股份有限公司 一种移动广告业务实现方法及系统

Also Published As

Publication number Publication date
EP2482551A1 (en) 2012-08-01
EP2482551A4 (en) 2012-08-01
EP2482551B1 (en) 2015-04-15
US9351022B2 (en) 2016-05-24
CN102648625A (zh) 2012-08-22
CN102648625B (zh) 2014-08-20
US20120180102A1 (en) 2012-07-12

Similar Documents

Publication Publication Date Title
CN109559122B (zh) 区块链数据传输方法及区块链数据传输系统
WO2011035468A1 (zh) 广播业务分组的实现方法、装置和系统
RU2341028C2 (ru) Эффективная передача криптографической информации в протоколе безопасности реального времени
KR100965886B1 (ko) 메타데이터 관리 방법
US8930688B2 (en) Apparatus and method for providing security service of user interface
US20080065548A1 (en) Method of Providing Conditional Access
WO2013056622A1 (zh) 验证机顶盒接入身份的方法和认证服务器
CN102088441B (zh) 消息中间件的数据加密传输方法和系统
WO2007095803A1 (fr) Procédé et système de chiffrement et de déchiffrement de données multimédias en continu sur demande en format wmv
CN110213669B (zh) 一种基于ts切片的视频内容防盗系统和方法
CN104243439B (zh) 文件传输处理方法、系统及终端
CA3077829A1 (en) Mutual secure communications
WO2006024233A1 (fr) Procede de protection d&#39;un contenu audio-video radiodiffuse a bande large
KR19990014887A (ko) 데이터 송신 장치, 데이터 송신 방법, 데이터 수신 장치, 데이터 수신 방법, 데이터 전송 장치, 및 데이터 전송 방법
Ullah et al. A secure NDN framework for Internet of Things enabled healthcare
CN103747039B (zh) 数字电影拷贝分发系统
WO2011113227A1 (zh) 一种适合集群系统的组播密钥协商方法及系统
CN1864386A (zh) 为允许支持多个广播和多播域而对802.11群组密钥的命名
JP4740923B2 (ja) メタデータの管理方法
WO2023078106A1 (zh) 加密流量的访问控制方法、装置及系统
WO2022204892A1 (zh) 一种数据传输方法及装置
Liu et al. A DRM architecture for manageable P2P based IPTV system
US8774414B2 (en) Method and apparatus for transmitting/receiving encryption information in a mobile broadcast system
CN118157859B (zh) 一种基于国密安全芯片的设备安全通信方法和设备
US20240250803A1 (en) Cryptographic communication system, cryptographic communication device, cryptographic communication method, and cryptographic communication program

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 200980106656.9

Country of ref document: CN

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 09849656

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 2009849656

Country of ref document: EP