WO2010050729A2 - Method and apparatus for acquiring encryption key to provide pay channel - Google Patents

Method and apparatus for acquiring encryption key to provide pay channel Download PDF

Info

Publication number
WO2010050729A2
WO2010050729A2 PCT/KR2009/006230 KR2009006230W WO2010050729A2 WO 2010050729 A2 WO2010050729 A2 WO 2010050729A2 KR 2009006230 W KR2009006230 W KR 2009006230W WO 2010050729 A2 WO2010050729 A2 WO 2010050729A2
Authority
WO
WIPO (PCT)
Prior art keywords
encryption key
value
identification value
key identification
mtk
Prior art date
Application number
PCT/KR2009/006230
Other languages
French (fr)
Other versions
WO2010050729A3 (en
Inventor
Young-Jin Choi
Jeong-Sik Cho
Young-Jip Kim
Joon-Ho Park
Byoung-Dai Lee
Tae-Soo Lee
Original Assignee
Samsung Electronics Co., Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Samsung Electronics Co., Ltd. filed Critical Samsung Electronics Co., Ltd.
Publication of WO2010050729A2 publication Critical patent/WO2010050729A2/en
Publication of WO2010050729A3 publication Critical patent/WO2010050729A3/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/41Structure of client; Structure of client peripherals
    • H04N21/418External card to be used in combination with the client device, e.g. for conditional access
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/322Aspects of commerce using mobile devices [M-devices]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • G06Q20/367Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
    • G06Q20/3674Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes involving authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3823Payment protocols; Details thereof insuring higher security of transaction combining multiple encryption tools for a transaction
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • H04L9/0897Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage involving additional devices, e.g. trusted platform module [TPM], smartcard or USB
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/436Interfacing a local distribution network, e.g. communicating with another STB or one or more peripheral devices inside the home
    • H04N21/4367Establishing a secure communication between the client and a peripheral device or smart card
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • H04L2209/601Broadcast encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless

Definitions

  • the present invention relates to a pay channel service in a Multimedia Broadcast/Multicast Service (MBMS) mobile broadcast system. More particularly, the present invention relates to a method and apparatus for acquiring an encryption key to provide a received pay channel to a user in a mobile terminal.
  • MBMS Multimedia Broadcast/Multicast Service
  • portable terminals or mobile terminals
  • PDAs Personal Digital Assistants
  • DVD-H CBMS Digital Video Broadcast - Handheld Convergence of Broadcast and Mobile Services
  • OAI Open Air Interface
  • mobile broadcast service-related standards such as Satellite/Terrestrial Digital multimedia Broadcasting (S/T-DMB), DVB-Satellite services to Handheld (DVB-SH), Open Mobile Alliance Mobile Broadcast (OMA-BCAST), and Multimedia Broadcast/Multicast Service (MBMS).
  • S/T-DMB Satellite/Terrestrial Digital multimedia Broadcasting
  • DVD-SH DVB-Satellite services to Handheld
  • OMA-BCAST Open Mobile Alliance Mobile Broadcast
  • MBMS Multimedia Broadcast/Multicast Service
  • Mobile broadcast service offers a broadband television broadcasting service to a plurality of specified or unspecified mobile terminals.
  • the mobile broadcast service in which a mobility concept is added to the existing broadcast service, provides useful value-added services that users can conveniently use, including web broadcasting, games and software distribution, as well as television broadcasting.
  • Some of diverse service contents offer pay services that provide the service contents only to the users who purchased them by paying.
  • MBMS is a technology capable of providing broadcasting using a Wideband Code Division Multiple Access (WCDMA) communication network.
  • WCDMA Wideband Code Division Multiple Access
  • a Service and Content Protection (SCP) technology is also defined in MBMS to protect mobile broadcast contents regarding pay services.
  • SCP Service and Content Protection
  • MBMS SCP is a technology for encrypting broadcast contents using a specific key so that only the users authorized for a specific broadcast content may access the content.
  • MBMS SCP can be divided into two different types of profiles - a Digital Right Management (DRM) profile and a smartcard profile - according to an encryption key management method.
  • DRM Digital Right Management
  • the DRM profile uses the OMA-DRM standard
  • the smartcard profile uses a key management standard contained in a smartcard installed in a mobile terminal.
  • a broadcast server which employs the smartcard profile, encrypts a broadcast stream for a pay channel with an encryption key, i.e., an MBMS Traffic Key (MTK), before broadcasting the broadcast stream in order that only the users who purchased the pay channel may view the channel.
  • the broadcast server broadcasts the encrypted broadcast stream together with a Short Term Key Message (STKM) including an encryption key needed for decrypting the encrypted stream.
  • STKM Short Term Key Message
  • an STKM includes a Common Header (HDR) field 100, an Extension (EXT) field 110 in which an MTK value is stored, a Time Stamp (TS) field 120 in which a TS value is stored, and a KEMAC field 130.
  • the EXT field 110 includes a Key Domain ID field 101, and Key Type ID fields 102 and 103 including an MBMS Service Key (MSK) ID and an MTK ID, respectively.
  • MSK MBMS Service Key
  • An MTK ID value which is an identification value of an MTK, is used to allow only the mobile terminal that purchased a pay channel through a proper procedure among mobile terminals that received the above STKM, to extract the MTK from the received STKM.
  • the mobile terminal Upon purchase of a pay channel, the mobile terminal acquires a range of a valid MTK ID value, or a valid MTK ID range, from a pay channel provider, and stores the acquired data.
  • the valid MTK ID range stored in the mobile terminal is determined as "SEQ l ⁇ MTK_ID ⁇ SEQ u ", where SEQ l and SEQ u denote the minimum value and the maximum value of the valid MTK ID range, respectively.
  • the mobile terminal When a user of the mobile terminal selects a pay channel later on, the mobile terminal extracts an MTK ID value from the received STKM in real-time.
  • the mobile terminal compares the valid MTK ID range stored therein with the extracted MTK ID value, and extracts an MTK from the STKM only when the extracted MTK ID value falls within the valid MTK ID range. If the extracted MTK ID value does not fall within the valid MTK ID range, or no valid MTK ID range is stored, the mobile terminal cannot acquire an MTK even though it has received the STKM.
  • an MTK is changed at stated periods in order to increase its security.
  • FIGURE 2 Such an example is illustrated in FIGURE 2.
  • an encrypted stream 200 corresponding to a pay channel is transmitted, an MTK transmitted through a key stream 210 is changed to MTK_ID (1), MTK_ID (2), MTK_ID (3) and MTK_ID (4) at every predetermined crypto period.
  • an STKM includes the MTK that periodically changes as stated above, the STKM is broadcasted at a period shorter than a change period of the MTK. If a mobile terminal normally acquires an encryption key for a pay channel from the STKM as its user selects the pay channel, the mobile terminal changes the minimum value SEQ l of a valid MTK ID range stored therein to an MTK ID value extracted from the STKM.
  • the mobile terminal may not acquire the MTK before expiration of the same crypto period.
  • an aspect of the present invention provides a method and apparatus for allowing a user to view a purchased specific pay channel anytime before expiry of its lifetime when the user purchased the pay channel through a normal purchase procedure.
  • Another aspect of the present invention provides a method and apparatus capably of normally acquiring an encryption key.
  • a method for acquiring an encryption key to decrypt a pay channel encrypted with a smartcard profile by a mobile terminal in a Multimedia Broadcast/Multicast Service (MBMS) mobile broadcast system includes purchasing a specific pay channel, receiving a minimum encryption key identification value SEQ l and a maximum encryption key identification value SEQ u used to determine validity of an encryption key, storing a range of a valid encryption key identification value, defined by an equation of SEQ l ⁇ encryption key identification value ⁇ SEQ u , and initializing a reference Time Stamp (TS) value; extracting an encryption key identification value and a TS value from a last received Short Term Key Message (STKM), when a view request for the specific pay channel is created; and determining that an encryption key included in the STKM is valid, when the extracted TS value satisfies the reference TS and the extracted encryption key identification value falls within a range of the valid encryption key identification value, and extracting and acquiring an encryption key from the ST
  • a mobile terminal apparatus for acquiring an encryption key to decrypt a pay channel encrypted with a smartcard profile by a mobile terminal in a Multimedia Broadcast/Multicast Service (MBMS) mobile broadcast system.
  • the mobile terminal apparatus includes a terminal configured to purchase a specific pay channel, deliver, to a smartcard, a minimum encryption key identification value SEQ l and a maximum encryption key identification value SEQ u used to determine validity of an encryption key, extract an encryption identification value and a Time Stamp (TS) value from a last received Short Term Key Message (STKM) when a view request for the pay channel is created, deliver the extracted values to the smartcard, and extract and acquire an encryption key from the STKM when a validity notification is provided from the smartcard; and the smartcard configured to store a range of a valid encryption key identification value, defined by an equation of SEQ l ⁇ encryption key identification value ⁇ SEQ u , use the minimum encryption key identification value SEQ l and the maximum encryption key identification value SEQ u
  • the user may normally acquire an encryption key and view the purchased pay channel with the acquired encryption key anytime before a lifetime of the purchased pay channel expires.
  • FIGURES 1 illustrates a general structure of a Short Term Key Message (STKM);
  • FIGURE 2 illustrates a periodic change of an MBMS Traffic Key (MTK)
  • FIGURE 3 illustrates a conventional process of determining validity of an MTK
  • FIGURE 4 illustrates a configuration of a mobile broadcast system to which the present invention is applied
  • FIGURE 5 illustrates an operation of a mobile terminal according to an exemplary embodiment of the present invention.
  • FIGURE 6 illustrates a process of determining validity of an MTK according to an exemplary embodiment of the present invention.
  • An STKM includes the MTK that periodically changes, the STKM is broadcasted at a period shorter than a change period of the MTK. If a mobile terminal normally acquires an encryption key for a pay channel from the STKM as its user selects the pay channel, the mobile terminal changes the minimum value SEQ l of a valid MTK ID range stored therein to an MTK ID value extracted from the STKM.
  • the mobile terminal may not acquire the MTK before expiration of the same crypto period.
  • FIGURE 3 An example of this case is illustrated in FIGURE 3.
  • the mobile terminal when a mobile terminal selects a pay channel at a time “a” in a first crypto period for which an MTK_ID (1) is maintained as a valid MTK, the mobile terminal extracts the MTK_ID (1) from the last received STKM as an MTK_ID.
  • the MTK_ID (1) means that an MTK_ID value is “1.”
  • an MTK_ID value included in the STKM is also an MTK_ID (1) since the MTK_ID (1) is still valid.
  • the extracted MTK_ID value does not fall within the valid MTK_ID range.
  • the mobile terminal cannot extract an MTK from the STKM.
  • the STKM received with the same MTK_ID is determined invalid for the first crypto period, so that the user may not view the channel in this period.
  • FIGURES 4 through 6, discussed below, and the various embodiments used to describe the principles of the present disclosure in this patent document are by way of illustration only and should not be construed in any way to limit the scope of the disclosure. Those skilled in the art will understand that the principles of the present disclosure may be implemented in any suitably arranged system.
  • the mobile broadcast system includes a communication network 30, a broadcast network 40, a mobile terminal(s) 10, and a broadcast server 20.
  • the communication network 30 provides broadcast services based on a wire communication service, a mobile communication service and a mobile broadcast service, while the broadcast network 40 provides broadcast services based on a mobile broadcast service.
  • the broadcast server 20 provides a variety of broadcast contents and broadcast guide information to the mobile terminals 10 over the communication network 30 and the broadcast network 40 according to a standard for the mobile broadcast service.
  • the broadcast server 20 encrypts a specific channel with an encryption key and provides it as a pay channel.
  • the broadcast server 20 delivers a range of a valid identification value for identifying an encryption key, to the mobile terminal 10. As a result, the mobile terminal 10 can use only the encryption key that includes the valid identification value.
  • an encryption key represents an MBMS Traffic Key (MTK) and an identification value for the MTK is indicated by MTK_ID. Therefore, the mobile terminal 10 is provided with the minimum MTK_ID value and the maximum MTK_ID value as a valid MTK_ID value from the broadcast server 20.
  • MTK MBMS Traffic Key
  • the mobile terminal 10 which can be a portable terminal such as a mobile phone and a Personal Digital Assistant (PDA), carries out a mobile broadcast service provided from the communication network 30 and the broadcast network 40, provides the mobile broadcast service to the user, and performs a communication service such as mobile communication.
  • the mobile terminal 10 can purchase a pay channel according to an exemplary embodiment of the present invention, and stores an identification value range of a valid encryption key, i.e., a valid MTK_ID range, using the minimum MTK_ID value and the maximum MTK_ID value provided from the broadcast server 20 during the purchase of a pay channel.
  • a reference TS can be used together with the valid MTK_ID range as a criterion for determining a valid MTK, according to the present invention.
  • the mobile terminal 10 which is a terminal supporting a smartcard profile, includes a smartcard, in which the valid MTK_ID range and reference TS received from the broadcast server 20 are stored.
  • the stored valid MTK_ID range is given in Equation 1:
  • SEQ l denotes the minimum MTK_ID value
  • SEQ u the maximum MTK_ID value
  • MTK_ID an MTK_ID value extracted from an STKM.
  • the reference TS indicated by TS_ old has a range defined by Equation 2:
  • TS denotes a value extracted from the STKM.
  • the reference TS is initialized to the least value, e.g. ‘0’, during the purchase of a pay channel.
  • the mobile terminal 10 Upon receipt of a view request for a pay channel, the mobile terminal 10 extracts an MTK_ID and a TS value from the last received STKM, determines if the extracted MTK_ID satisfies (falls within) the valid MTK_ID range and the extracted TS value satisfies the reference TS, and determines that the STKM is valid, if they satisfy the valid MTK_ID range and the reference TS.
  • the mobile terminal 10 extracts an MTK from the STKM depending on the determination result, decrypts the pay channel with the extracted MTK, decodes the decrypted pay channel, and provides the decoded channel to the user.
  • the mobile terminal 10 changes the SEQ l value to the MTK_ID value extracted from the STKM, and also changes the TS_ old value to the extracted TS value.
  • FIGURE 5 illustrates an operation of a mobile terminal 10 according to an exemplary embodiment of the present invention.
  • the mobile terminal 10 includes a smartcard 320 and a Terminal (TE) 310, and the TE 310 equipped with the smartcard 320 is referred to as the mobile terminal 10.
  • the TE 310 includes a controller configured to control the overall operation of the TE 310 and accessing the smartcard 320, a memory unit used as a working memory of the controller, for store program data and received data associated with a function of the TE 310, a display configured to display broadcast data and various other data, a key input unit, a Radio Frequency (RF) communication unit configured to perform RF communication, and a broadcast receiver configured to receive and handle a broadcast stream.
  • RF Radio Frequency
  • the mobile terminal 10 Upon purchase of a pay channel, the mobile terminal 10 is provided with information SEQ l and SEQ u necessary for pay channel decryption from a broadcast server 20 in step 401.
  • the TE 310 delivers the SEQ l and SEQ u to the smartcard 320 in step 403, and the smartcard 320 stores a valid MTK_ID range of Equation 1 using the provided SEQ l and SEQ u , and initializes the reference TS value TS_ old in step 405.
  • the TE 310 selects the pay channel in step 407, and extracts an MTK_ID and a TS value from the last received STKM in step 409.
  • the TE 310 delivers the extracted MTK_ID value and TS value to the smartcard 320 in step 411.
  • the smartcard 320 determines, in step 413, if the provided MTK_ID value and TS value fall within a valid MTK_ID range and a reference TS range, respectively, and determines that the MTK included in the last received STKM is valid, if they fall within the valid MTK_ID range and the reference TS range. Then, in step 417, the smartcard 320 changes the SEQ l to the MTK_ID value extracted in step 409, and also changes the TS_ old to the TS value extracted in step 409. The smartcard 320 notifies the TE 310 that the MTK is valid, in step 419.
  • the smartcard 320 determines that the MTK included in the STKM is invalid, and fails in MTK acquisition in step 415.
  • the TE 310 Upon receiving a notification from the smartcard 320, indicating that the MTK is valid, in step 421 the TE 310 acquires the MTK from the STKM used in step 409 and may provide a pay channel stream to the user in step 423.
  • the mobile terminal can seamlessly provide broadcast on the pay channel to the user even when it selects the pay channel twice or more times for the same crypto period.
  • FIGURE 6 Such an example is illustrated in FIGURE 6.
  • the mobile terminal when a mobile terminal selects a pay channel at a time “a” in a first crypto period for which an MTK_ID (1) is maintained as a valid MTK, the mobile terminal extracts the MTK_ID (1) from the last received first STKM as an MTK_ID value. Further, the mobile terminal extracts a TS (1) from the first STKM as a TS value.
  • the MTK_ID (1) and TS (1) mean that their values are “1.”
  • an MTK_ID value included in the second STKM is an MTK_ID (1), because the MTK_ID (1) is still valid.
  • a TS value included in the second STKM is TS (2).
  • the mobile terminal 10 can extract an MTK from the STKM.
  • the user may normally acquire an encryption key and view the purchased pay channel with the acquired encryption key anytime before a lifetime of the purchased pay channel expires.

Abstract

A mobile terminal is configured to acquire an encryption key to decrypt a pay channel encrypted with a smartcard profile by the mobile terminal in a Multimedia Broadcast/Multicast Service (MBMS) mobile broadcast system. The mobile terminal is configured to purchase a specific pay channel, determine validity of an encryption key, store a range of a valid encryption key identification value, and initialize a reference Time Stamp (TS) value. The mobile terminal also; extracts an encryption key identification value and a TS value from a last received Short Term Key Message (STKM), when a view request for the specific pay channel is created; and determines that an encryption key is valid, when the extracted TS value satisfies the reference TS and the extracted encryption key identification value falls within a range of the valid encryption key identification value, and extracts and acquires an encryption key from the STKM.

Description

METHOD AND APPARATUS FOR ACQUIRING ENCRYPTION KEY TO PROVIDE PAY CHANNEL
The present invention relates to a pay channel service in a Multimedia Broadcast/Multicast Service (MBMS) mobile broadcast system. More particularly, the present invention relates to a method and apparatus for acquiring an encryption key to provide a received pay channel to a user in a mobile terminal.
The mobile communication market continuously requires creation of new services through recombination or integration of the existing technologies. Current development of communication and broadcast technologies has allowed the conventional broadcasting systems and mobile communication systems to provide broadcast services through portable terminals (or mobile terminals), such as mobile phones and Personal Digital Assistants (PDAs). A mobile broadcast service that provides broadcast services to mobile terminals is also under commercialization and standardization.
For example, commercial services based on Digital Video Broadcast - Handheld Convergence of Broadcast and Mobile Services (DVB-H CBMS) are now available in Italy, while Vietnam has started to provide commercial services based on Open Air Interface (OAI) led by Nokia. In addition, there are various mobile broadcast service-related standards such as Satellite/Terrestrial Digital multimedia Broadcasting (S/T-DMB), DVB-Satellite services to Handheld (DVB-SH), Open Mobile Alliance Mobile Broadcast (OMA-BCAST), and Multimedia Broadcast/Multicast Service (MBMS).
Mobile broadcast service offers a broadband television broadcasting service to a plurality of specified or unspecified mobile terminals. The mobile broadcast service, in which a mobility concept is added to the existing broadcast service, provides useful value-added services that users can conveniently use, including web broadcasting, games and software distribution, as well as television broadcasting. Some of diverse service contents offer pay services that provide the service contents only to the users who purchased them by paying.
Unlike other mobile broadcast services such as S/T-DMB and DVB-SH that separately require broadcasting frequencies in addition to the communication frequencies, MBMS is a technology capable of providing broadcasting using a Wideband Code Division Multiple Access (WCDMA) communication network. This technology services both of communication and broadcasting by upgrading the WCDMA communication network without additional investment such as installation of base stations.
A Service and Content Protection (SCP) technology is also defined in MBMS to protect mobile broadcast contents regarding pay services. MBMS SCP is a technology for encrypting broadcast contents using a specific key so that only the users authorized for a specific broadcast content may access the content.
MBMS SCP can be divided into two different types of profiles - a Digital Right Management (DRM) profile and a smartcard profile - according to an encryption key management method. The DRM profile uses the OMA-DRM standard, while the smartcard profile uses a key management standard contained in a smartcard installed in a mobile terminal.
A broadcast server, which employs the smartcard profile, encrypts a broadcast stream for a pay channel with an encryption key, i.e., an MBMS Traffic Key (MTK), before broadcasting the broadcast stream in order that only the users who purchased the pay channel may view the channel. The broadcast server broadcasts the encrypted broadcast stream together with a Short Term Key Message (STKM) including an encryption key needed for decrypting the encrypted stream.
Structures of the STKM are illustrated in FIGURES 1A and 1B. Referring to FIGURE 1A, an STKM includes a Common Header (HDR) field 100, an Extension (EXT) field 110 in which an MTK value is stored, a Time Stamp (TS) field 120 in which a TS value is stored, and a KEMAC field 130. Referring to FIGURE 1B, the EXT field 110 includes a Key Domain ID field 101, and Key Type ID fields 102 and 103 including an MBMS Service Key (MSK) ID and an MTK ID, respectively.
An MTK ID value, which is an identification value of an MTK, is used to allow only the mobile terminal that purchased a pay channel through a proper procedure among mobile terminals that received the above STKM, to extract the MTK from the received STKM.
Upon purchase of a pay channel, the mobile terminal acquires a range of a valid MTK ID value, or a valid MTK ID range, from a pay channel provider, and stores the acquired data. The valid MTK ID range stored in the mobile terminal is determined as "SEQl < MTK_ID ≤ SEQu", where SEQl and SEQu denote the minimum value and the maximum value of the valid MTK ID range, respectively.
When a user of the mobile terminal selects a pay channel later on, the mobile terminal extracts an MTK ID value from the received STKM in real-time. The mobile terminal compares the valid MTK ID range stored therein with the extracted MTK ID value, and extracts an MTK from the STKM only when the extracted MTK ID value falls within the valid MTK ID range. If the extracted MTK ID value does not fall within the valid MTK ID range, or no valid MTK ID range is stored, the mobile terminal cannot acquire an MTK even though it has received the STKM.
Meanwhile, an MTK is changed at stated periods in order to increase its security. Such an example is illustrated in FIGURE 2. Referring to FIGURE 2, while an encrypted stream 200 corresponding to a pay channel is transmitted, an MTK transmitted through a key stream 210 is changed to MTK_ID (1), MTK_ID (2), MTK_ID (3) and MTK_ID (4) at every predetermined crypto period.
Though an STKM includes the MTK that periodically changes as stated above, the STKM is broadcasted at a period shorter than a change period of the MTK. If a mobile terminal normally acquires an encryption key for a pay channel from the STKM as its user selects the pay channel, the mobile terminal changes the minimum value SEQl of a valid MTK ID range stored therein to an MTK ID value extracted from the STKM.
Therefore, if the mobile terminal selects a pay channel twice within the same crypto period, the mobile terminal may not acquire the MTK before expiration of the same crypto period.
To address the above-discussed deficiencies of the prior art, it is a primary object to provide to provide at least the advantages described below. Accordingly, an aspect of the present invention provides a method and apparatus for allowing a user to view a purchased specific pay channel anytime before expiry of its lifetime when the user purchased the pay channel through a normal purchase procedure.
Another aspect of the present invention provides a method and apparatus capably of normally acquiring an encryption key.
According to one aspect of the present invention, there is provided a method for acquiring an encryption key to decrypt a pay channel encrypted with a smartcard profile by a mobile terminal in a Multimedia Broadcast/Multicast Service (MBMS) mobile broadcast system. The method includes purchasing a specific pay channel, receiving a minimum encryption key identification value SEQl and a maximum encryption key identification value SEQu used to determine validity of an encryption key, storing a range of a valid encryption key identification value, defined by an equation of SEQl ≤ encryption key identification value ≤ SEQu, and initializing a reference Time Stamp (TS) value; extracting an encryption key identification value and a TS value from a last received Short Term Key Message (STKM), when a view request for the specific pay channel is created; and determining that an encryption key included in the STKM is valid, when the extracted TS value satisfies the reference TS and the extracted encryption key identification value falls within a range of the valid encryption key identification value, and extracting and acquiring an encryption key from the STKM.
According to another aspect of the present invention, there is provided a mobile terminal apparatus for acquiring an encryption key to decrypt a pay channel encrypted with a smartcard profile by a mobile terminal in a Multimedia Broadcast/Multicast Service (MBMS) mobile broadcast system. The mobile terminal apparatus includes a terminal configured to purchase a specific pay channel, deliver, to a smartcard, a minimum encryption key identification value SEQl and a maximum encryption key identification value SEQu used to determine validity of an encryption key, extract an encryption identification value and a Time Stamp (TS) value from a last received Short Term Key Message (STKM) when a view request for the pay channel is created, deliver the extracted values to the smartcard, and extract and acquire an encryption key from the STKM when a validity notification is provided from the smartcard; and the smartcard configured to store a range of a valid encryption key identification value, defined by an equation of SEQl ≤ encryption key identification value ≤ SEQu, use the minimum encryption key identification value SEQl and the maximum encryption key identification value SEQu, initialize a reference TS value, determine that an encryption key included in the STKM is valid, when the extracted TS value satisfies the reference TS and the extracted encryption key identification value falls within the range of the valid encryption key identification value, and deliver a notification indicating the validity to the terminal.
Other aspects, advantages, and salient features of the invention will become apparent to those skilled in the art from the following detailed description, which, taken in conjunction with the annexed drawings, discloses exemplary embodiments of the invention.
Before undertaking the DETAILED DESCRIPTION OF THE INVENTION below, it may be advantageous to set forth definitions of certain words and phrases used throughout this patent document: the terms “include” and “comprise,” as well as derivatives thereof, mean inclusion without limitation; the term “or,” is inclusive, meaning and/or; the phrases “associated with” and “associated therewith,” as well as derivatives thereof, may mean to include, be included within, interconnect with, contain, be contained within, connect to or with, couple to or with, be communicable with, cooperate with, interleave, juxtapose, be proximate to, be bound to or with, have, have a property of, or the like; and the term “controller” means any device, system or part thereof that controls at least one operation, such a device may be implemented in hardware, firmware or software, or some combination of at least two of the same. It should be noted that the functionality associated with any particular controller may be centralized or distributed, whether locally or remotely. Definitions for certain words and phrases are provided throughout this patent document, those of ordinary skill in the art should understand that in many, if not most instances, such definitions apply to prior, as well as future uses of such defined words and phrases.
According to exemplary embodiments of the present invention, if a user purchased a specific pay channel through a proper purchase procedure, the user may normally acquire an encryption key and view the purchased pay channel with the acquired encryption key anytime before a lifetime of the purchased pay channel expires.
FIGURES 1 illustrates a general structure of a Short Term Key Message (STKM);
FIGURE 2 illustrates a periodic change of an MBMS Traffic Key (MTK);
FIGURE 3 illustrates a conventional process of determining validity of an MTK;
FIGURE 4 illustrates a configuration of a mobile broadcast system to which the present invention is applied;
FIGURE 5 illustrates an operation of a mobile terminal according to an exemplary embodiment of the present invention; and
FIGURE 6 illustrates a process of determining validity of an MTK according to an exemplary embodiment of the present invention.
An STKM includes the MTK that periodically changes, the STKM is broadcasted at a period shorter than a change period of the MTK. If a mobile terminal normally acquires an encryption key for a pay channel from the STKM as its user selects the pay channel, the mobile terminal changes the minimum value SEQl of a valid MTK ID range stored therein to an MTK ID value extracted from the STKM.
Therefore, if the mobile terminal selects a pay channel twice within the same crypto period, the mobile terminal may not acquire the MTK before expiration of the same crypto period.
An example of this case is illustrated in FIGURE 3. In this example, it is assumed that initial values of a valid TS range stored in the mobile terminal that purchased a pay channel are SEQl = 0 and SEQu = 100. Referring to FIGURE 3, when a mobile terminal selects a pay channel at a time “a” in a first crypto period for which an MTK_ID (1) is maintained as a valid MTK, the mobile terminal extracts the MTK_ID (1) from the last received STKM as an MTK_ID. The MTK_ID (1) means that an MTK_ID value is “1.” The extracted MTK_ID value satisfies a valid MTK_ID range of "SEQl = 0 < MTK ID = 1 ≤ SEQu = 100." Accordingly, the mobile terminal can extract an MTK from the STKM. Then the mobile terminal adjusts the valid MTK_ID range by changing SEQl to “1.”
Thereafter, if a user of the mobile terminal reselects the pay channel at a time “b,” for example, if the user reselects the pay channel after zapping to another channel or the user intends to re-view the pay channel after ending viewing the pay channel, an MTK_ID value included in the STKM is also an MTK_ID (1) since the MTK_ID (1) is still valid. However, because the valid MTK_ID range is "SEQl = 1 < MTK_ID ≤ SEQu = 100," the extracted MTK_ID value does not fall within the valid MTK_ID range. Hence, the mobile terminal cannot extract an MTK from the STKM.
In this case, even though a user has normally purchased a pay channel, the STKM received with the same MTK_ID is determined invalid for the first crypto period, so that the user may not view the channel in this period.
FIGURES 4 through 6, discussed below, and the various embodiments used to describe the principles of the present disclosure in this patent document are by way of illustration only and should not be construed in any way to limit the scope of the disclosure. Those skilled in the art will understand that the principles of the present disclosure may be implemented in any suitably arranged system.
A mobile broadcast system to which the present invention is applied will now be described with reference to FIGURE 4. Referring to FIGURE 4, the mobile broadcast system includes a communication network 30, a broadcast network 40, a mobile terminal(s) 10, and a broadcast server 20.
The communication network 30 provides broadcast services based on a wire communication service, a mobile communication service and a mobile broadcast service, while the broadcast network 40 provides broadcast services based on a mobile broadcast service.
The broadcast server 20 provides a variety of broadcast contents and broadcast guide information to the mobile terminals 10 over the communication network 30 and the broadcast network 40 according to a standard for the mobile broadcast service. The broadcast server 20 encrypts a specific channel with an encryption key and provides it as a pay channel.
If the mobile terminal 10 requests purchase of the pay channel over the communication network 30, and normally performs a procedure for purchasing a pay channel, such as accounting, then the broadcast server 20 delivers a range of a valid identification value for identifying an encryption key, to the mobile terminal 10. As a result, the mobile terminal 10 can use only the encryption key that includes the valid identification value.
In an exemplary embodiment of the present invention, an encryption key represents an MBMS Traffic Key (MTK) and an identification value for the MTK is indicated by MTK_ID. Therefore, the mobile terminal 10 is provided with the minimum MTK_ID value and the maximum MTK_ID value as a valid MTK_ID value from the broadcast server 20.
The mobile terminal 10, which can be a portable terminal such as a mobile phone and a Personal Digital Assistant (PDA), carries out a mobile broadcast service provided from the communication network 30 and the broadcast network 40, provides the mobile broadcast service to the user, and performs a communication service such as mobile communication. The mobile terminal 10 can purchase a pay channel according to an exemplary embodiment of the present invention, and stores an identification value range of a valid encryption key, i.e., a valid MTK_ID range, using the minimum MTK_ID value and the maximum MTK_ID value provided from the broadcast server 20 during the purchase of a pay channel. A reference TS can be used together with the valid MTK_ID range as a criterion for determining a valid MTK, according to the present invention.
The mobile terminal 10, which is a terminal supporting a smartcard profile, includes a smartcard, in which the valid MTK_ID range and reference TS received from the broadcast server 20 are stored. In accordance with the present invention, the stored valid MTK_ID range is given in Equation 1:
SEQl ≤ MTK_ID ≤ SEQu
where SEQl denotes the minimum MTK_ID value, SEQu the maximum MTK_ID value, and MTK_ID an MTK_ID value extracted from an STKM.
The reference TS indicated by TS_old has a range defined by Equation 2:
TS_old < TS
where TS denotes a value extracted from the STKM.
The reference TS is initialized to the least value, e.g. ‘0’, during the purchase of a pay channel.
Upon receipt of a view request for a pay channel, the mobile terminal 10 extracts an MTK_ID and a TS value from the last received STKM, determines if the extracted MTK_ID satisfies (falls within) the valid MTK_ID range and the extracted TS value satisfies the reference TS, and determines that the STKM is valid, if they satisfy the valid MTK_ID range and the reference TS. The mobile terminal 10 extracts an MTK from the STKM depending on the determination result, decrypts the pay channel with the extracted MTK, decodes the decrypted pay channel, and provides the decoded channel to the user. The mobile terminal 10 changes the SEQl value to the MTK_ID value extracted from the STKM, and also changes the TS_old value to the extracted TS value.
FIGURE 5 illustrates an operation of a mobile terminal 10 according to an exemplary embodiment of the present invention. Referring to FIGURE 5, the mobile terminal 10 includes a smartcard 320 and a Terminal (TE) 310, and the TE 310 equipped with the smartcard 320 is referred to as the mobile terminal 10. Although not illustrated, the TE 310 includes a controller configured to control the overall operation of the TE 310 and accessing the smartcard 320, a memory unit used as a working memory of the controller, for store program data and received data associated with a function of the TE 310, a display configured to display broadcast data and various other data, a key input unit, a Radio Frequency (RF) communication unit configured to perform RF communication, and a broadcast receiver configured to receive and handle a broadcast stream.
Upon purchase of a pay channel, the mobile terminal 10 is provided with information SEQl and SEQu necessary for pay channel decryption from a broadcast server 20 in step 401. The TE 310 delivers the SEQl and SEQu to the smartcard 320 in step 403, and the smartcard 320 stores a valid MTK_ID range of Equation 1 using the provided SEQl and SEQu, and initializes the reference TS value TS_old in step 405.
Thereafter, upon receipt of a view request for a pay channel from a user, the TE 310 selects the pay channel in step 407, and extracts an MTK_ID and a TS value from the last received STKM in step 409. The TE 310 delivers the extracted MTK_ID value and TS value to the smartcard 320 in step 411.
The smartcard 320 determines, in step 413, if the provided MTK_ID value and TS value fall within a valid MTK_ID range and a reference TS range, respectively, and determines that the MTK included in the last received STKM is valid, if they fall within the valid MTK_ID range and the reference TS range. Then, in step 417, the smartcard 320 changes the SEQl to the MTK_ID value extracted in step 409, and also changes the TS_old to the TS value extracted in step 409. The smartcard 320 notifies the TE 310 that the MTK is valid, in step 419.
If the provided MTK_ID value or TS value does not fall within the valid MTK_ID range or does not satisfy the reference TS, the smartcard 320 determines that the MTK included in the STKM is invalid, and fails in MTK acquisition in step 415.
Upon receiving a notification from the smartcard 320, indicating that the MTK is valid, in step 421 the TE 310 acquires the MTK from the STKM used in step 409 and may provide a pay channel stream to the user in step 423.
According to the present invention, as the mobile terminal acquires the MTK as described above, the mobile terminal can seamlessly provide broadcast on the pay channel to the user even when it selects the pay channel twice or more times for the same crypto period.
Such an example is illustrated in FIGURE 6. In this example, it is assumed that initial values of a valid MTK_ID range stored in the mobile terminal that purchased a pay channel are SEQl = 0 and SEQu = 100. Referring to FIGURE 6, when a mobile terminal selects a pay channel at a time “a” in a first crypto period for which an MTK_ID (1) is maintained as a valid MTK, the mobile terminal extracts the MTK_ID (1) from the last received first STKM as an MTK_ID value. Further, the mobile terminal extracts a TS (1) from the first STKM as a TS value. The MTK_ID (1) and TS (1) mean that their values are “1.”
The extracted MTK_ID value satisfies a valid MTK_ID range of "SEQl = 0 ≤ MTK_ID = 1 ≤ SEQu = 100," and the extracted TS value satisfies a reference TS range of "TS_old = 0 < TS = 1." Accordingly, the mobile terminal can extract an MTK from the first STKM. Then the mobile terminal 10 adjusts the valid MTK_ID range by changing SEQl to “1,” and adjusts the reference TS by changing TS_old to “1.”
Thereafter, if a user of the mobile terminal reselects the pay channel at a time “b,” for example, if the user reselects the pay channel after zapping to another channel or the user intends to re-view the pay channel after ending viewing the pay channel, even though a second STKM, or a new STKM, is received at the time “b,” an MTK_ID value included in the second STKM is an MTK_ID (1), because the MTK_ID (1) is still valid. However, a TS value included in the second STKM is TS (2).
However, because the valid MTK_ID range and the reference TS stored in the mobile terminal 10 at the time “b” are "SEQl = 1 ≤ MTK_ID ≤ SEQu = 100" and "TS_old = 1 < TS", respectively, the extracted MTK_ID (1) value falls within the valid MTK_ID range and the extracted TS (2) also satisfies the reference TS. Hence, the mobile terminal can extract an MTK from the STKM.
As is apparent from the foregoing description, according to exemplary embodiments of the present invention, if a user purchased a specific pay channel through a proper purchase procedure, the user may normally acquire an encryption key and view the purchased pay channel with the acquired encryption key anytime before a lifetime of the purchased pay channel expires.
Although the present disclosure has been described with an exemplary embodiment, various changes and modifications may be suggested to one skilled in the art. It is intended that the present disclosure encompass such changes and modifications as fall within the scope of the appended claims.

Claims (12)

  1. A method for acquiring an encryption key to decrypt a pay channel encrypted with a smartcard profile by a mobile terminal in a Multimedia Broadcast/Multicast Service (MBMS) mobile broadcast system, comprising:
    purchasing(401) a specific pay channel;
    obtaining(407) an encryption key identification value and a Time Stamp(TS) value from a last received Short Term Key Message (STKM);and
    determining(413) that an encryption key included in a STKM is valid, when the obtained TS value satisfies a reference TS and the obtained encryption key identification value falls within a range of a valid encryption key identification value, and extracting and acquiring(421) an encryption key from the STKM.
  2. The method of claim 1, wherein obtaining comprises:
    extracting the encryption key identification value and the TS value from the last received Short Term Key Message (STKM), when a view request for the specific pay channel is created.
  3. The method of claim 2, wherein obtaining further comprises:
    receiving a minimum encryption key identification value SEQl and a maximum encryption key identification value SEQu used to determine validity of an encryption key;
    storing a range of a valid encryption key identification value defined by an equation of SEQl ≤ encryption key identification value ≤ SEQu; and
    initializing a reference Time Stamp (TS) value.
  4. The method of claim 3, wherein the reference TS is defined by the following equation,
    TS_old < TS
    where TS_old denotes a reference TS value, and TS denotes the extracted TS value.
  5. The method of claim 4, further comprising changing the minimum encryption key identification value SEQl to the extracted encryption key identification value within the range of the valid encryption key identification value, when the extracted encryption key identification value falls within the range of the valid encryption key identification value.
  6. The method of claim 5, further comprising decrypting a broadcast stream corresponding to the pay channel with use of the acquired encryption key, decoding the decrypted broadcast stream, and providing the decoded broadcast stream to a user.
  7. The method of claim 5, wherein the acquired encryption key is an MBMS Traffic Key (MTK).
  8. A mobile terminal apparatus (10) configured to acquire an encryption key to decrypt a pay channel encrypted with a smartcard profile by a mobile terminal in a mobile broadcast system, comprising:
    a terminal (310) configured to purchase a specific pay channel, delivering, to a smartcard (320), a minimum encryption key identification value SEQl and a maximum encryption key identification value SEQu used to determine validity of an encryption key, extracting an encryption identification value and a Time Stamp (TS) value from a last received Short Term Key Message (STKM) when a view request for the pay channel is created, delivering the extracted values to the smartcard, and extracting and acquiring an encryption key from the STKM when a validity notification is provided from the smartcard; and
    the smartcard (320) configured to store a range of a valid encryption key identification value, defined by an equation of SEQl ≤ encryption key identification value ≤ SEQu, using the minimum encryption key identification value SEQl and the maximum encryption key identification value SEQu, initializing a reference TS value, determining that an encryption key included in the STKM is valid, when the extracted TS value satisfies the reference TS and the extracted encryption key identification value falls within the range of the valid encryption key identification value, and delivering a notification indicating the validity to the terminal.
  9. The mobile terminal apparatus (10) of claim 8, wherein the reference TS is defined by the following equation,
    TS_old < TS
    where TS_old denotes a reference TS value, and TS denotes the extracted TS value.
  10. The mobile terminal apparatus (10) of claim 9, wherein the smartcard (320) changes the minimum encryption key identification value SEQl to the extracted encryption key identification value within the range of the valid encryption key identification value, when the extracted encryption key identification value falls within the range of the valid encryption key identification value.
  11. The mobile terminal apparatus (10) of claim 10, wherein the terminal (310) decrypts a broadcast stream corresponding to the pay channel with use of the acquired encryption key, decodes the decrypted broadcast stream, and provides the decoded broadcast stream to a user.
  12. The mobile terminal apparatus (10) of claim 11, wherein the acquired encryption key is an MBMS Traffic Key (MTK).
PCT/KR2009/006230 2008-10-29 2009-10-27 Method and apparatus for acquiring encryption key to provide pay channel WO2010050729A2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
KR10-2008-0106635 2008-10-29
KR1020080106635A KR20100047651A (en) 2008-10-29 2008-10-29 Method and apparatus for acquiring encryption key for providing premium channel

Publications (2)

Publication Number Publication Date
WO2010050729A2 true WO2010050729A2 (en) 2010-05-06
WO2010050729A3 WO2010050729A3 (en) 2010-07-29

Family

ID=42118453

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/KR2009/006230 WO2010050729A2 (en) 2008-10-29 2009-10-27 Method and apparatus for acquiring encryption key to provide pay channel

Country Status (3)

Country Link
US (1) US20100106648A1 (en)
KR (1) KR20100047651A (en)
WO (1) WO2010050729A2 (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101586316B1 (en) * 2009-11-10 2016-01-18 엘지전자 주식회사 Mobile terminal and method for controlling broadcast thereof
RU2614369C2 (en) * 2012-09-17 2017-03-24 Нокиа Текнолоджиз Ой Protection under provision of mobility between mbms servers
US10171435B1 (en) 2017-06-12 2019-01-01 Ironclad Encryption Corporation Devices that utilize random tokens which direct dynamic random access
WO2018231753A1 (en) * 2017-06-12 2018-12-20 Daniel Maurice Lerner Devices that utilize random tokens which direct dynamic random access
US10616192B2 (en) 2017-06-12 2020-04-07 Daniel Maurice Lerner Devices that utilize random tokens which direct dynamic random access

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060206708A1 (en) * 2005-01-14 2006-09-14 Lg Electronics Inc. Method for managing digital rights in broadcast/multicast service
US20070259647A1 (en) * 2006-02-27 2007-11-08 Samsung Electronics Co. Ltd. Method and system for protecting broadcast service/content in a mobile broadcast system, and method for generating short term key message therefor
US20070274526A1 (en) * 2006-02-03 2007-11-29 Qualcomm Incorporated Method and apparatus for content protection in wireless communications
KR100916228B1 (en) * 2006-02-28 2009-09-08 엘지전자 주식회사 Method of managing a sek and a pek for a pay-per view based and service based broadcast subscriber and communication system thereof

Family Cites Families (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5222137A (en) * 1991-04-03 1993-06-22 Motorola, Inc. Dynamic encryption key selection for encrypted radio transmissions
US5646992A (en) * 1993-09-23 1997-07-08 Digital Delivery, Inc. Assembly, distribution, and use of digital information
DE69535935D1 (en) * 1994-02-24 2009-05-28 Comcast Cable Holdings Llc Method and device for creating a cryptographic connection between elements of a system
US5805719A (en) * 1994-11-28 1998-09-08 Smarttouch Tokenless identification of individuals
JP3507594B2 (en) * 1995-07-31 2004-03-15 株式会社東芝 Computer
JP3627384B2 (en) * 1996-01-17 2005-03-09 富士ゼロックス株式会社 Information processing apparatus with software protection function and information processing method with software protection function
WO1999013398A1 (en) * 1997-09-11 1999-03-18 Digital Square, Inc. Digital content vending, delivery, and maintenance system
US7313236B2 (en) * 2003-04-09 2007-12-25 International Business Machines Corporation Methods and apparatus for secure and adaptive delivery of multimedia content
US7421079B2 (en) * 2003-12-09 2008-09-02 Northrop Grumman Corporation Method and apparatus for secure key replacement
US20060233368A1 (en) * 2005-03-30 2006-10-19 Gordon Thompson Method for conditional access in a DMTS/DOCSIS enabled set top box environment
US20070223703A1 (en) * 2005-10-07 2007-09-27 Sanjeev Verma Method and apparatus for providing service keys within multiple broadcast networks
US8619993B2 (en) * 2006-06-29 2013-12-31 Nokia Corporation Content protection for OMA broadcast smartcard profiles
US8948395B2 (en) * 2006-08-24 2015-02-03 Qualcomm Incorporated Systems and methods for key management for wireless communications systems
DE102006042554B4 (en) * 2006-09-11 2009-04-16 Siemens Ag Method and system for continuously transmitting encrypted data of a broadcast service to a mobile terminal
DE102007005636B4 (en) * 2007-02-05 2008-11-13 Infineon Technologies Ag A method for generating a traffic encryption key, method for transmitting data, means for generating a traffic encryption key, data transmission arrangement

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060206708A1 (en) * 2005-01-14 2006-09-14 Lg Electronics Inc. Method for managing digital rights in broadcast/multicast service
US20070274526A1 (en) * 2006-02-03 2007-11-29 Qualcomm Incorporated Method and apparatus for content protection in wireless communications
US20070259647A1 (en) * 2006-02-27 2007-11-08 Samsung Electronics Co. Ltd. Method and system for protecting broadcast service/content in a mobile broadcast system, and method for generating short term key message therefor
KR100916228B1 (en) * 2006-02-28 2009-09-08 엘지전자 주식회사 Method of managing a sek and a pek for a pay-per view based and service based broadcast subscriber and communication system thereof

Also Published As

Publication number Publication date
KR20100047651A (en) 2010-05-10
WO2010050729A3 (en) 2010-07-29
US20100106648A1 (en) 2010-04-29

Similar Documents

Publication Publication Date Title
JP3742282B2 (en) Broadcast receiving method, broadcast receiving apparatus, information distribution method, and information distribution apparatus
RU2547446C2 (en) Method of access to services provided by subscriber module
US8190896B2 (en) Conditional access for a multimedia broadcast service using a wireless terminal
US8031870B2 (en) Conditional access system for each transmitter in single frequency network, and a method thereof
EP1686711A2 (en) Method and system for conditional access in digital multimedia broadcasting
KR100709318B1 (en) Method and system for CAS key assignment in digital broadcast service
KR20070037920A (en) Digital broadcasting conditional access terminal and method thereof
US20070189535A1 (en) Method and apparatus for protecting contents supporting broadcast service between service provider and a plurality of mobile stations
WO2010050729A2 (en) Method and apparatus for acquiring encryption key to provide pay channel
US20050013440A1 (en) Reception management apparatus, broadcasting receiving device, information distributing device, and information distributing method and reception management program
EP1878159A1 (en) A conditional access system in digital multimedia broadcasting system and method thereof
CN101321261B (en) Front-end system, user terminal and authorization management information distribution method
WO2011112048A4 (en) Method and apparatus for reporting audience measurement in content transmission system
JP2006333350A (en) Digital broadcasting system, digital broadcast receiver, broadcasting apparatus, and management apparatus
KR100777405B1 (en) Method for the provision of charged contents of digital multimedia broadcasting
JP4266220B2 (en) Information distribution method and information distribution apparatus
KR20070089582A (en) Method of managing a sek and a pek for a pay-per view based and service based broadcast subscriber and communication system thereof
JP2007181224A (en) Digital broadcast receiving method
KR20100046428A (en) Method and apparatus for acquiring encryption key for providing premium channel
KR100646230B1 (en) Method for Controlling Call-Back Threshold Value in a Mobile Communication Terminal for Pay-Per-View Program and Mobile Communication Terminal therefor
KR20070047083A (en) System and method for subscriber authentication of dmb using cave algorithm in mobile terminal
KR20110107008A (en) Apparatus and method for supporting smartcard profile in mobile broadcating system

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 09823809

Country of ref document: EP

Kind code of ref document: A2

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 09823809

Country of ref document: EP

Kind code of ref document: A2