WO2010050729A2 - Method and apparatus for acquiring encryption key to provide pay channel - Google Patents
Method and apparatus for acquiring encryption key to provide pay channel Download PDFInfo
- Publication number
- WO2010050729A2 WO2010050729A2 PCT/KR2009/006230 KR2009006230W WO2010050729A2 WO 2010050729 A2 WO2010050729 A2 WO 2010050729A2 KR 2009006230 W KR2009006230 W KR 2009006230W WO 2010050729 A2 WO2010050729 A2 WO 2010050729A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- encryption key
- value
- identification value
- key identification
- mtk
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims description 21
- 239000000284 extract Substances 0.000 abstract description 16
- 238000004891 communication Methods 0.000 description 14
- 238000005516 engineering process Methods 0.000 description 6
- 238000010295 mobile communication Methods 0.000 description 4
- 230000008859 change Effects 0.000 description 3
- 238000007726 management method Methods 0.000 description 3
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 230000007812 deficiency Effects 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 230000015654 memory Effects 0.000 description 1
- 230000000737 periodic effect Effects 0.000 description 1
- 238000005215 recombination Methods 0.000 description 1
- 230000006798 recombination Effects 0.000 description 1
- 230000003936 working memory Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/41—Structure of client; Structure of client peripherals
- H04N21/418—External card to be used in combination with the client device, e.g. for conditional access
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/322—Aspects of commerce using mobile devices [M-devices]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/36—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
- G06Q20/367—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
- G06Q20/3674—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes involving authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3823—Payment protocols; Details thereof insuring higher security of transaction combining multiple encryption tools for a transaction
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
- H04L9/0897—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage involving additional devices, e.g. trusted platform module [TPM], smartcard or USB
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/436—Interfacing a local distribution network, e.g. communicating with another STB or one or more peripheral devices inside the home
- H04N21/4367—Establishing a secure communication between the client and a peripheral device or smart card
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
- H04L2209/601—Broadcast encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
Definitions
- the present invention relates to a pay channel service in a Multimedia Broadcast/Multicast Service (MBMS) mobile broadcast system. More particularly, the present invention relates to a method and apparatus for acquiring an encryption key to provide a received pay channel to a user in a mobile terminal.
- MBMS Multimedia Broadcast/Multicast Service
- portable terminals or mobile terminals
- PDAs Personal Digital Assistants
- DVD-H CBMS Digital Video Broadcast - Handheld Convergence of Broadcast and Mobile Services
- OAI Open Air Interface
- mobile broadcast service-related standards such as Satellite/Terrestrial Digital multimedia Broadcasting (S/T-DMB), DVB-Satellite services to Handheld (DVB-SH), Open Mobile Alliance Mobile Broadcast (OMA-BCAST), and Multimedia Broadcast/Multicast Service (MBMS).
- S/T-DMB Satellite/Terrestrial Digital multimedia Broadcasting
- DVD-SH DVB-Satellite services to Handheld
- OMA-BCAST Open Mobile Alliance Mobile Broadcast
- MBMS Multimedia Broadcast/Multicast Service
- Mobile broadcast service offers a broadband television broadcasting service to a plurality of specified or unspecified mobile terminals.
- the mobile broadcast service in which a mobility concept is added to the existing broadcast service, provides useful value-added services that users can conveniently use, including web broadcasting, games and software distribution, as well as television broadcasting.
- Some of diverse service contents offer pay services that provide the service contents only to the users who purchased them by paying.
- MBMS is a technology capable of providing broadcasting using a Wideband Code Division Multiple Access (WCDMA) communication network.
- WCDMA Wideband Code Division Multiple Access
- a Service and Content Protection (SCP) technology is also defined in MBMS to protect mobile broadcast contents regarding pay services.
- SCP Service and Content Protection
- MBMS SCP is a technology for encrypting broadcast contents using a specific key so that only the users authorized for a specific broadcast content may access the content.
- MBMS SCP can be divided into two different types of profiles - a Digital Right Management (DRM) profile and a smartcard profile - according to an encryption key management method.
- DRM Digital Right Management
- the DRM profile uses the OMA-DRM standard
- the smartcard profile uses a key management standard contained in a smartcard installed in a mobile terminal.
- a broadcast server which employs the smartcard profile, encrypts a broadcast stream for a pay channel with an encryption key, i.e., an MBMS Traffic Key (MTK), before broadcasting the broadcast stream in order that only the users who purchased the pay channel may view the channel.
- the broadcast server broadcasts the encrypted broadcast stream together with a Short Term Key Message (STKM) including an encryption key needed for decrypting the encrypted stream.
- STKM Short Term Key Message
- an STKM includes a Common Header (HDR) field 100, an Extension (EXT) field 110 in which an MTK value is stored, a Time Stamp (TS) field 120 in which a TS value is stored, and a KEMAC field 130.
- the EXT field 110 includes a Key Domain ID field 101, and Key Type ID fields 102 and 103 including an MBMS Service Key (MSK) ID and an MTK ID, respectively.
- MSK MBMS Service Key
- An MTK ID value which is an identification value of an MTK, is used to allow only the mobile terminal that purchased a pay channel through a proper procedure among mobile terminals that received the above STKM, to extract the MTK from the received STKM.
- the mobile terminal Upon purchase of a pay channel, the mobile terminal acquires a range of a valid MTK ID value, or a valid MTK ID range, from a pay channel provider, and stores the acquired data.
- the valid MTK ID range stored in the mobile terminal is determined as "SEQ l ⁇ MTK_ID ⁇ SEQ u ", where SEQ l and SEQ u denote the minimum value and the maximum value of the valid MTK ID range, respectively.
- the mobile terminal When a user of the mobile terminal selects a pay channel later on, the mobile terminal extracts an MTK ID value from the received STKM in real-time.
- the mobile terminal compares the valid MTK ID range stored therein with the extracted MTK ID value, and extracts an MTK from the STKM only when the extracted MTK ID value falls within the valid MTK ID range. If the extracted MTK ID value does not fall within the valid MTK ID range, or no valid MTK ID range is stored, the mobile terminal cannot acquire an MTK even though it has received the STKM.
- an MTK is changed at stated periods in order to increase its security.
- FIGURE 2 Such an example is illustrated in FIGURE 2.
- an encrypted stream 200 corresponding to a pay channel is transmitted, an MTK transmitted through a key stream 210 is changed to MTK_ID (1), MTK_ID (2), MTK_ID (3) and MTK_ID (4) at every predetermined crypto period.
- an STKM includes the MTK that periodically changes as stated above, the STKM is broadcasted at a period shorter than a change period of the MTK. If a mobile terminal normally acquires an encryption key for a pay channel from the STKM as its user selects the pay channel, the mobile terminal changes the minimum value SEQ l of a valid MTK ID range stored therein to an MTK ID value extracted from the STKM.
- the mobile terminal may not acquire the MTK before expiration of the same crypto period.
- an aspect of the present invention provides a method and apparatus for allowing a user to view a purchased specific pay channel anytime before expiry of its lifetime when the user purchased the pay channel through a normal purchase procedure.
- Another aspect of the present invention provides a method and apparatus capably of normally acquiring an encryption key.
- a method for acquiring an encryption key to decrypt a pay channel encrypted with a smartcard profile by a mobile terminal in a Multimedia Broadcast/Multicast Service (MBMS) mobile broadcast system includes purchasing a specific pay channel, receiving a minimum encryption key identification value SEQ l and a maximum encryption key identification value SEQ u used to determine validity of an encryption key, storing a range of a valid encryption key identification value, defined by an equation of SEQ l ⁇ encryption key identification value ⁇ SEQ u , and initializing a reference Time Stamp (TS) value; extracting an encryption key identification value and a TS value from a last received Short Term Key Message (STKM), when a view request for the specific pay channel is created; and determining that an encryption key included in the STKM is valid, when the extracted TS value satisfies the reference TS and the extracted encryption key identification value falls within a range of the valid encryption key identification value, and extracting and acquiring an encryption key from the ST
- a mobile terminal apparatus for acquiring an encryption key to decrypt a pay channel encrypted with a smartcard profile by a mobile terminal in a Multimedia Broadcast/Multicast Service (MBMS) mobile broadcast system.
- the mobile terminal apparatus includes a terminal configured to purchase a specific pay channel, deliver, to a smartcard, a minimum encryption key identification value SEQ l and a maximum encryption key identification value SEQ u used to determine validity of an encryption key, extract an encryption identification value and a Time Stamp (TS) value from a last received Short Term Key Message (STKM) when a view request for the pay channel is created, deliver the extracted values to the smartcard, and extract and acquire an encryption key from the STKM when a validity notification is provided from the smartcard; and the smartcard configured to store a range of a valid encryption key identification value, defined by an equation of SEQ l ⁇ encryption key identification value ⁇ SEQ u , use the minimum encryption key identification value SEQ l and the maximum encryption key identification value SEQ u
- the user may normally acquire an encryption key and view the purchased pay channel with the acquired encryption key anytime before a lifetime of the purchased pay channel expires.
- FIGURES 1 illustrates a general structure of a Short Term Key Message (STKM);
- FIGURE 2 illustrates a periodic change of an MBMS Traffic Key (MTK)
- FIGURE 3 illustrates a conventional process of determining validity of an MTK
- FIGURE 4 illustrates a configuration of a mobile broadcast system to which the present invention is applied
- FIGURE 5 illustrates an operation of a mobile terminal according to an exemplary embodiment of the present invention.
- FIGURE 6 illustrates a process of determining validity of an MTK according to an exemplary embodiment of the present invention.
- An STKM includes the MTK that periodically changes, the STKM is broadcasted at a period shorter than a change period of the MTK. If a mobile terminal normally acquires an encryption key for a pay channel from the STKM as its user selects the pay channel, the mobile terminal changes the minimum value SEQ l of a valid MTK ID range stored therein to an MTK ID value extracted from the STKM.
- the mobile terminal may not acquire the MTK before expiration of the same crypto period.
- FIGURE 3 An example of this case is illustrated in FIGURE 3.
- the mobile terminal when a mobile terminal selects a pay channel at a time “a” in a first crypto period for which an MTK_ID (1) is maintained as a valid MTK, the mobile terminal extracts the MTK_ID (1) from the last received STKM as an MTK_ID.
- the MTK_ID (1) means that an MTK_ID value is “1.”
- an MTK_ID value included in the STKM is also an MTK_ID (1) since the MTK_ID (1) is still valid.
- the extracted MTK_ID value does not fall within the valid MTK_ID range.
- the mobile terminal cannot extract an MTK from the STKM.
- the STKM received with the same MTK_ID is determined invalid for the first crypto period, so that the user may not view the channel in this period.
- FIGURES 4 through 6, discussed below, and the various embodiments used to describe the principles of the present disclosure in this patent document are by way of illustration only and should not be construed in any way to limit the scope of the disclosure. Those skilled in the art will understand that the principles of the present disclosure may be implemented in any suitably arranged system.
- the mobile broadcast system includes a communication network 30, a broadcast network 40, a mobile terminal(s) 10, and a broadcast server 20.
- the communication network 30 provides broadcast services based on a wire communication service, a mobile communication service and a mobile broadcast service, while the broadcast network 40 provides broadcast services based on a mobile broadcast service.
- the broadcast server 20 provides a variety of broadcast contents and broadcast guide information to the mobile terminals 10 over the communication network 30 and the broadcast network 40 according to a standard for the mobile broadcast service.
- the broadcast server 20 encrypts a specific channel with an encryption key and provides it as a pay channel.
- the broadcast server 20 delivers a range of a valid identification value for identifying an encryption key, to the mobile terminal 10. As a result, the mobile terminal 10 can use only the encryption key that includes the valid identification value.
- an encryption key represents an MBMS Traffic Key (MTK) and an identification value for the MTK is indicated by MTK_ID. Therefore, the mobile terminal 10 is provided with the minimum MTK_ID value and the maximum MTK_ID value as a valid MTK_ID value from the broadcast server 20.
- MTK MBMS Traffic Key
- the mobile terminal 10 which can be a portable terminal such as a mobile phone and a Personal Digital Assistant (PDA), carries out a mobile broadcast service provided from the communication network 30 and the broadcast network 40, provides the mobile broadcast service to the user, and performs a communication service such as mobile communication.
- the mobile terminal 10 can purchase a pay channel according to an exemplary embodiment of the present invention, and stores an identification value range of a valid encryption key, i.e., a valid MTK_ID range, using the minimum MTK_ID value and the maximum MTK_ID value provided from the broadcast server 20 during the purchase of a pay channel.
- a reference TS can be used together with the valid MTK_ID range as a criterion for determining a valid MTK, according to the present invention.
- the mobile terminal 10 which is a terminal supporting a smartcard profile, includes a smartcard, in which the valid MTK_ID range and reference TS received from the broadcast server 20 are stored.
- the stored valid MTK_ID range is given in Equation 1:
- SEQ l denotes the minimum MTK_ID value
- SEQ u the maximum MTK_ID value
- MTK_ID an MTK_ID value extracted from an STKM.
- the reference TS indicated by TS_ old has a range defined by Equation 2:
- TS denotes a value extracted from the STKM.
- the reference TS is initialized to the least value, e.g. ‘0’, during the purchase of a pay channel.
- the mobile terminal 10 Upon receipt of a view request for a pay channel, the mobile terminal 10 extracts an MTK_ID and a TS value from the last received STKM, determines if the extracted MTK_ID satisfies (falls within) the valid MTK_ID range and the extracted TS value satisfies the reference TS, and determines that the STKM is valid, if they satisfy the valid MTK_ID range and the reference TS.
- the mobile terminal 10 extracts an MTK from the STKM depending on the determination result, decrypts the pay channel with the extracted MTK, decodes the decrypted pay channel, and provides the decoded channel to the user.
- the mobile terminal 10 changes the SEQ l value to the MTK_ID value extracted from the STKM, and also changes the TS_ old value to the extracted TS value.
- FIGURE 5 illustrates an operation of a mobile terminal 10 according to an exemplary embodiment of the present invention.
- the mobile terminal 10 includes a smartcard 320 and a Terminal (TE) 310, and the TE 310 equipped with the smartcard 320 is referred to as the mobile terminal 10.
- the TE 310 includes a controller configured to control the overall operation of the TE 310 and accessing the smartcard 320, a memory unit used as a working memory of the controller, for store program data and received data associated with a function of the TE 310, a display configured to display broadcast data and various other data, a key input unit, a Radio Frequency (RF) communication unit configured to perform RF communication, and a broadcast receiver configured to receive and handle a broadcast stream.
- RF Radio Frequency
- the mobile terminal 10 Upon purchase of a pay channel, the mobile terminal 10 is provided with information SEQ l and SEQ u necessary for pay channel decryption from a broadcast server 20 in step 401.
- the TE 310 delivers the SEQ l and SEQ u to the smartcard 320 in step 403, and the smartcard 320 stores a valid MTK_ID range of Equation 1 using the provided SEQ l and SEQ u , and initializes the reference TS value TS_ old in step 405.
- the TE 310 selects the pay channel in step 407, and extracts an MTK_ID and a TS value from the last received STKM in step 409.
- the TE 310 delivers the extracted MTK_ID value and TS value to the smartcard 320 in step 411.
- the smartcard 320 determines, in step 413, if the provided MTK_ID value and TS value fall within a valid MTK_ID range and a reference TS range, respectively, and determines that the MTK included in the last received STKM is valid, if they fall within the valid MTK_ID range and the reference TS range. Then, in step 417, the smartcard 320 changes the SEQ l to the MTK_ID value extracted in step 409, and also changes the TS_ old to the TS value extracted in step 409. The smartcard 320 notifies the TE 310 that the MTK is valid, in step 419.
- the smartcard 320 determines that the MTK included in the STKM is invalid, and fails in MTK acquisition in step 415.
- the TE 310 Upon receiving a notification from the smartcard 320, indicating that the MTK is valid, in step 421 the TE 310 acquires the MTK from the STKM used in step 409 and may provide a pay channel stream to the user in step 423.
- the mobile terminal can seamlessly provide broadcast on the pay channel to the user even when it selects the pay channel twice or more times for the same crypto period.
- FIGURE 6 Such an example is illustrated in FIGURE 6.
- the mobile terminal when a mobile terminal selects a pay channel at a time “a” in a first crypto period for which an MTK_ID (1) is maintained as a valid MTK, the mobile terminal extracts the MTK_ID (1) from the last received first STKM as an MTK_ID value. Further, the mobile terminal extracts a TS (1) from the first STKM as a TS value.
- the MTK_ID (1) and TS (1) mean that their values are “1.”
- an MTK_ID value included in the second STKM is an MTK_ID (1), because the MTK_ID (1) is still valid.
- a TS value included in the second STKM is TS (2).
- the mobile terminal 10 can extract an MTK from the STKM.
- the user may normally acquire an encryption key and view the purchased pay channel with the acquired encryption key anytime before a lifetime of the purchased pay channel expires.
Abstract
A mobile terminal is configured to acquire an encryption key to decrypt a pay channel encrypted with a smartcard profile by the mobile terminal in a Multimedia Broadcast/Multicast Service (MBMS) mobile broadcast system. The mobile terminal is configured to purchase a specific pay channel, determine validity of an encryption key, store a range of a valid encryption key identification value, and initialize a reference Time Stamp (TS) value. The mobile terminal also; extracts an encryption key identification value and a TS value from a last received Short Term Key Message (STKM), when a view request for the specific pay channel is created; and determines that an encryption key is valid, when the extracted TS value satisfies the reference TS and the extracted encryption key identification value falls within a range of the valid encryption key identification value, and extracts and acquires an encryption key from the STKM.
Description
The present invention relates to a pay channel service in a Multimedia Broadcast/Multicast Service (MBMS) mobile broadcast system. More particularly, the present invention relates to a method and apparatus for acquiring an encryption key to provide a received pay channel to a user in a mobile terminal.
The mobile communication market continuously requires creation of new services through recombination or integration of the existing technologies. Current development of communication and broadcast technologies has allowed the conventional broadcasting systems and mobile communication systems to provide broadcast services through portable terminals (or mobile terminals), such as mobile phones and Personal Digital Assistants (PDAs). A mobile broadcast service that provides broadcast services to mobile terminals is also under commercialization and standardization.
For example, commercial services based on Digital Video Broadcast - Handheld Convergence of Broadcast and Mobile Services (DVB-H CBMS) are now available in Italy, while Vietnam has started to provide commercial services based on Open Air Interface (OAI) led by Nokia. In addition, there are various mobile broadcast service-related standards such as Satellite/Terrestrial Digital multimedia Broadcasting (S/T-DMB), DVB-Satellite services to Handheld (DVB-SH), Open Mobile Alliance Mobile Broadcast (OMA-BCAST), and Multimedia Broadcast/Multicast Service (MBMS).
Mobile broadcast service offers a broadband television broadcasting service to a plurality of specified or unspecified mobile terminals. The mobile broadcast service, in which a mobility concept is added to the existing broadcast service, provides useful value-added services that users can conveniently use, including web broadcasting, games and software distribution, as well as television broadcasting. Some of diverse service contents offer pay services that provide the service contents only to the users who purchased them by paying.
Unlike other mobile broadcast services such as S/T-DMB and DVB-SH that separately require broadcasting frequencies in addition to the communication frequencies, MBMS is a technology capable of providing broadcasting using a Wideband Code Division Multiple Access (WCDMA) communication network. This technology services both of communication and broadcasting by upgrading the WCDMA communication network without additional investment such as installation of base stations.
A Service and Content Protection (SCP) technology is also defined in MBMS to protect mobile broadcast contents regarding pay services. MBMS SCP is a technology for encrypting broadcast contents using a specific key so that only the users authorized for a specific broadcast content may access the content.
MBMS SCP can be divided into two different types of profiles - a Digital Right Management (DRM) profile and a smartcard profile - according to an encryption key management method. The DRM profile uses the OMA-DRM standard, while the smartcard profile uses a key management standard contained in a smartcard installed in a mobile terminal.
A broadcast server, which employs the smartcard profile, encrypts a broadcast stream for a pay channel with an encryption key, i.e., an MBMS Traffic Key (MTK), before broadcasting the broadcast stream in order that only the users who purchased the pay channel may view the channel. The broadcast server broadcasts the encrypted broadcast stream together with a Short Term Key Message (STKM) including an encryption key needed for decrypting the encrypted stream.
Structures of the STKM are illustrated in FIGURES 1A and 1B. Referring to FIGURE 1A, an STKM includes a Common Header (HDR) field 100, an Extension (EXT) field 110 in which an MTK value is stored, a Time Stamp (TS) field 120 in which a TS value is stored, and a KEMAC field 130. Referring to FIGURE 1B, the EXT field 110 includes a Key Domain ID field 101, and Key Type ID fields 102 and 103 including an MBMS Service Key (MSK) ID and an MTK ID, respectively.
An MTK ID value, which is an identification value of an MTK, is used to allow only the mobile terminal that purchased a pay channel through a proper procedure among mobile terminals that received the above STKM, to extract the MTK from the received STKM.
Upon purchase of a pay channel, the mobile terminal acquires a range of a valid MTK ID value, or a valid MTK ID range, from a pay channel provider, and stores the acquired data. The valid MTK ID range stored in the mobile terminal is determined as "SEQl < MTK_ID ≤ SEQu", where SEQl and SEQu denote the minimum value and the maximum value of the valid MTK ID range, respectively.
When a user of the mobile terminal selects a pay channel later on, the mobile terminal extracts an MTK ID value from the received STKM in real-time. The mobile terminal compares the valid MTK ID range stored therein with the extracted MTK ID value, and extracts an MTK from the STKM only when the extracted MTK ID value falls within the valid MTK ID range. If the extracted MTK ID value does not fall within the valid MTK ID range, or no valid MTK ID range is stored, the mobile terminal cannot acquire an MTK even though it has received the STKM.
Meanwhile, an MTK is changed at stated periods in order to increase its security. Such an example is illustrated in FIGURE 2. Referring to FIGURE 2, while an encrypted stream 200 corresponding to a pay channel is transmitted, an MTK transmitted through a key stream 210 is changed to MTK_ID (1), MTK_ID (2), MTK_ID (3) and MTK_ID (4) at every predetermined crypto period.
Though an STKM includes the MTK that periodically changes as stated above, the STKM is broadcasted at a period shorter than a change period of the MTK. If a mobile terminal normally acquires an encryption key for a pay channel from the STKM as its user selects the pay channel, the mobile terminal changes the minimum value SEQl of a valid MTK ID range stored therein to an MTK ID value extracted from the STKM.
Therefore, if the mobile terminal selects a pay channel twice within the same crypto period, the mobile terminal may not acquire the MTK before expiration of the same crypto period.
To address the above-discussed deficiencies of the prior art, it is a primary object to provide to provide at least the advantages described below. Accordingly, an aspect of the present invention provides a method and apparatus for allowing a user to view a purchased specific pay channel anytime before expiry of its lifetime when the user purchased the pay channel through a normal purchase procedure.
Another aspect of the present invention provides a method and apparatus capably of normally acquiring an encryption key.
According to one aspect of the present invention, there is provided a method for acquiring an encryption key to decrypt a pay channel encrypted with a smartcard profile by a mobile terminal in a Multimedia Broadcast/Multicast Service (MBMS) mobile broadcast system. The method includes purchasing a specific pay channel, receiving a minimum encryption key identification value SEQl and a maximum encryption key identification value SEQu used to determine validity of an encryption key, storing a range of a valid encryption key identification value, defined by an equation of SEQl ≤ encryption key identification value ≤ SEQu, and initializing a reference Time Stamp (TS) value; extracting an encryption key identification value and a TS value from a last received Short Term Key Message (STKM), when a view request for the specific pay channel is created; and determining that an encryption key included in the STKM is valid, when the extracted TS value satisfies the reference TS and the extracted encryption key identification value falls within a range of the valid encryption key identification value, and extracting and acquiring an encryption key from the STKM.
According to another aspect of the present invention, there is provided a mobile terminal apparatus for acquiring an encryption key to decrypt a pay channel encrypted with a smartcard profile by a mobile terminal in a Multimedia Broadcast/Multicast Service (MBMS) mobile broadcast system. The mobile terminal apparatus includes a terminal configured to purchase a specific pay channel, deliver, to a smartcard, a minimum encryption key identification value SEQl and a maximum encryption key identification value SEQu used to determine validity of an encryption key, extract an encryption identification value and a Time Stamp (TS) value from a last received Short Term Key Message (STKM) when a view request for the pay channel is created, deliver the extracted values to the smartcard, and extract and acquire an encryption key from the STKM when a validity notification is provided from the smartcard; and the smartcard configured to store a range of a valid encryption key identification value, defined by an equation of SEQl ≤ encryption key identification value ≤ SEQu, use the minimum encryption key identification value SEQl and the maximum encryption key identification value SEQu, initialize a reference TS value, determine that an encryption key included in the STKM is valid, when the extracted TS value satisfies the reference TS and the extracted encryption key identification value falls within the range of the valid encryption key identification value, and deliver a notification indicating the validity to the terminal.
Other aspects, advantages, and salient features of the invention will become apparent to those skilled in the art from the following detailed description, which, taken in conjunction with the annexed drawings, discloses exemplary embodiments of the invention.
Before undertaking the DETAILED DESCRIPTION OF THE INVENTION below, it may be advantageous to set forth definitions of certain words and phrases used throughout this patent document: the terms “include” and “comprise,” as well as derivatives thereof, mean inclusion without limitation; the term “or,” is inclusive, meaning and/or; the phrases “associated with” and “associated therewith,” as well as derivatives thereof, may mean to include, be included within, interconnect with, contain, be contained within, connect to or with, couple to or with, be communicable with, cooperate with, interleave, juxtapose, be proximate to, be bound to or with, have, have a property of, or the like; and the term “controller” means any device, system or part thereof that controls at least one operation, such a device may be implemented in hardware, firmware or software, or some combination of at least two of the same. It should be noted that the functionality associated with any particular controller may be centralized or distributed, whether locally or remotely. Definitions for certain words and phrases are provided throughout this patent document, those of ordinary skill in the art should understand that in many, if not most instances, such definitions apply to prior, as well as future uses of such defined words and phrases.
According to exemplary embodiments of the present invention, if a user purchased a specific pay channel through a proper purchase procedure, the user may normally acquire an encryption key and view the purchased pay channel with the acquired encryption key anytime before a lifetime of the purchased pay channel expires.
FIGURES 1 illustrates a general structure of a Short Term Key Message (STKM);
FIGURE 2 illustrates a periodic change of an MBMS Traffic Key (MTK);
FIGURE 3 illustrates a conventional process of determining validity of an MTK;
FIGURE 4 illustrates a configuration of a mobile broadcast system to which the present invention is applied;
FIGURE 5 illustrates an operation of a mobile terminal according to an exemplary embodiment of the present invention; and
FIGURE 6 illustrates a process of determining validity of an MTK according to an exemplary embodiment of the present invention.
An STKM includes the MTK that periodically changes, the STKM is broadcasted at a period shorter than a change period of the MTK. If a mobile terminal normally acquires an encryption key for a pay channel from the STKM as its user selects the pay channel, the mobile terminal changes the minimum value SEQl of a valid MTK ID range stored therein to an MTK ID value extracted from the STKM.
Therefore, if the mobile terminal selects a pay channel twice within the same crypto period, the mobile terminal may not acquire the MTK before expiration of the same crypto period.
An example of this case is illustrated in FIGURE 3. In this example, it is assumed that initial values of a valid TS range stored in the mobile terminal that purchased a pay channel are SEQl = 0 and SEQu = 100. Referring to FIGURE 3, when a mobile terminal selects a pay channel at a time “a” in a first crypto period for which an MTK_ID (1) is maintained as a valid MTK, the mobile terminal extracts the MTK_ID (1) from the last received STKM as an MTK_ID. The MTK_ID (1) means that an MTK_ID value is “1.” The extracted MTK_ID value satisfies a valid MTK_ID range of "SEQl = 0 < MTK ID = 1 ≤ SEQu = 100." Accordingly, the mobile terminal can extract an MTK from the STKM. Then the mobile terminal adjusts the valid MTK_ID range by changing SEQl to “1.”
Thereafter, if a user of the mobile terminal reselects the pay channel at a time “b,” for example, if the user reselects the pay channel after zapping to another channel or the user intends to re-view the pay channel after ending viewing the pay channel, an MTK_ID value included in the STKM is also an MTK_ID (1) since the MTK_ID (1) is still valid. However, because the valid MTK_ID range is "SEQl = 1 < MTK_ID ≤ SEQu = 100," the extracted MTK_ID value does not fall within the valid MTK_ID range. Hence, the mobile terminal cannot extract an MTK from the STKM.
In this case, even though a user has normally purchased a pay channel, the STKM received with the same MTK_ID is determined invalid for the first crypto period, so that the user may not view the channel in this period.
FIGURES 4 through 6, discussed below, and the various embodiments used to describe the principles of the present disclosure in this patent document are by way of illustration only and should not be construed in any way to limit the scope of the disclosure. Those skilled in the art will understand that the principles of the present disclosure may be implemented in any suitably arranged system.
A mobile broadcast system to which the present invention is applied will now be described with reference to FIGURE 4. Referring to FIGURE 4, the mobile broadcast system includes a communication network 30, a broadcast network 40, a mobile terminal(s) 10, and a broadcast server 20.
The communication network 30 provides broadcast services based on a wire communication service, a mobile communication service and a mobile broadcast service, while the broadcast network 40 provides broadcast services based on a mobile broadcast service.
The broadcast server 20 provides a variety of broadcast contents and broadcast guide information to the mobile terminals 10 over the communication network 30 and the broadcast network 40 according to a standard for the mobile broadcast service. The broadcast server 20 encrypts a specific channel with an encryption key and provides it as a pay channel.
If the mobile terminal 10 requests purchase of the pay channel over the communication network 30, and normally performs a procedure for purchasing a pay channel, such as accounting, then the broadcast server 20 delivers a range of a valid identification value for identifying an encryption key, to the mobile terminal 10. As a result, the mobile terminal 10 can use only the encryption key that includes the valid identification value.
In an exemplary embodiment of the present invention, an encryption key represents an MBMS Traffic Key (MTK) and an identification value for the MTK is indicated by MTK_ID. Therefore, the mobile terminal 10 is provided with the minimum MTK_ID value and the maximum MTK_ID value as a valid MTK_ID value from the broadcast server 20.
The mobile terminal 10, which can be a portable terminal such as a mobile phone and a Personal Digital Assistant (PDA), carries out a mobile broadcast service provided from the communication network 30 and the broadcast network 40, provides the mobile broadcast service to the user, and performs a communication service such as mobile communication. The mobile terminal 10 can purchase a pay channel according to an exemplary embodiment of the present invention, and stores an identification value range of a valid encryption key, i.e., a valid MTK_ID range, using the minimum MTK_ID value and the maximum MTK_ID value provided from the broadcast server 20 during the purchase of a pay channel. A reference TS can be used together with the valid MTK_ID range as a criterion for determining a valid MTK, according to the present invention.
The mobile terminal 10, which is a terminal supporting a smartcard profile, includes a smartcard, in which the valid MTK_ID range and reference TS received from the broadcast server 20 are stored. In accordance with the present invention, the stored valid MTK_ID range is given in Equation 1:
SEQl ≤ MTK_ID ≤ SEQu
where SEQl denotes the minimum MTK_ID value, SEQu the maximum MTK_ID value, and MTK_ID an MTK_ID value extracted from an STKM.
The reference TS indicated by TS_old has a range defined by Equation 2:
TS_old < TS
where TS denotes a value extracted from the STKM.
The reference TS is initialized to the least value, e.g. ‘0’, during the purchase of a pay channel.
Upon receipt of a view request for a pay channel, the mobile terminal 10 extracts an MTK_ID and a TS value from the last received STKM, determines if the extracted MTK_ID satisfies (falls within) the valid MTK_ID range and the extracted TS value satisfies the reference TS, and determines that the STKM is valid, if they satisfy the valid MTK_ID range and the reference TS. The mobile terminal 10 extracts an MTK from the STKM depending on the determination result, decrypts the pay channel with the extracted MTK, decodes the decrypted pay channel, and provides the decoded channel to the user. The mobile terminal 10 changes the SEQl value to the MTK_ID value extracted from the STKM, and also changes the TS_old value to the extracted TS value.
FIGURE 5 illustrates an operation of a mobile terminal 10 according to an exemplary embodiment of the present invention. Referring to FIGURE 5, the mobile terminal 10 includes a smartcard 320 and a Terminal (TE) 310, and the TE 310 equipped with the smartcard 320 is referred to as the mobile terminal 10. Although not illustrated, the TE 310 includes a controller configured to control the overall operation of the TE 310 and accessing the smartcard 320, a memory unit used as a working memory of the controller, for store program data and received data associated with a function of the TE 310, a display configured to display broadcast data and various other data, a key input unit, a Radio Frequency (RF) communication unit configured to perform RF communication, and a broadcast receiver configured to receive and handle a broadcast stream.
Upon purchase of a pay channel, the mobile terminal 10 is provided with information SEQl and SEQu necessary for pay channel decryption from a broadcast server 20 in step 401. The TE 310 delivers the SEQl and SEQu to the smartcard 320 in step 403, and the smartcard 320 stores a valid MTK_ID range of Equation 1 using the provided SEQl and SEQu, and initializes the reference TS value TS_old in step 405.
Thereafter, upon receipt of a view request for a pay channel from a user, the TE 310 selects the pay channel in step 407, and extracts an MTK_ID and a TS value from the last received STKM in step 409. The TE 310 delivers the extracted MTK_ID value and TS value to the smartcard 320 in step 411.
The smartcard 320 determines, in step 413, if the provided MTK_ID value and TS value fall within a valid MTK_ID range and a reference TS range, respectively, and determines that the MTK included in the last received STKM is valid, if they fall within the valid MTK_ID range and the reference TS range. Then, in step 417, the smartcard 320 changes the SEQl to the MTK_ID value extracted in step 409, and also changes the TS_old to the TS value extracted in step 409. The smartcard 320 notifies the TE 310 that the MTK is valid, in step 419.
If the provided MTK_ID value or TS value does not fall within the valid MTK_ID range or does not satisfy the reference TS, the smartcard 320 determines that the MTK included in the STKM is invalid, and fails in MTK acquisition in step 415.
Upon receiving a notification from the smartcard 320, indicating that the MTK is valid, in step 421 the TE 310 acquires the MTK from the STKM used in step 409 and may provide a pay channel stream to the user in step 423.
According to the present invention, as the mobile terminal acquires the MTK as described above, the mobile terminal can seamlessly provide broadcast on the pay channel to the user even when it selects the pay channel twice or more times for the same crypto period.
Such an example is illustrated in FIGURE 6. In this example, it is assumed that initial values of a valid MTK_ID range stored in the mobile terminal that purchased a pay channel are SEQl = 0 and SEQu = 100. Referring to FIGURE 6, when a mobile terminal selects a pay channel at a time “a” in a first crypto period for which an MTK_ID (1) is maintained as a valid MTK, the mobile terminal extracts the MTK_ID (1) from the last received first STKM as an MTK_ID value. Further, the mobile terminal extracts a TS (1) from the first STKM as a TS value. The MTK_ID (1) and TS (1) mean that their values are “1.”
The extracted MTK_ID value satisfies a valid MTK_ID range of "SEQl = 0 ≤ MTK_ID = 1 ≤ SEQu = 100," and the extracted TS value satisfies a reference TS range of "TS_old = 0 < TS = 1." Accordingly, the mobile terminal can extract an MTK from the first STKM. Then the mobile terminal 10 adjusts the valid MTK_ID range by changing SEQl to “1,” and adjusts the reference TS by changing TS_old to “1.”
Thereafter, if a user of the mobile terminal reselects the pay channel at a time “b,” for example, if the user reselects the pay channel after zapping to another channel or the user intends to re-view the pay channel after ending viewing the pay channel, even though a second STKM, or a new STKM, is received at the time “b,” an MTK_ID value included in the second STKM is an MTK_ID (1), because the MTK_ID (1) is still valid. However, a TS value included in the second STKM is TS (2).
However, because the valid MTK_ID range and the reference TS stored in the mobile terminal 10 at the time “b” are "SEQl = 1 ≤ MTK_ID ≤ SEQu = 100" and "TS_old = 1 < TS", respectively, the extracted MTK_ID (1) value falls within the valid MTK_ID range and the extracted TS (2) also satisfies the reference TS. Hence, the mobile terminal can extract an MTK from the STKM.
As is apparent from the foregoing description, according to exemplary embodiments of the present invention, if a user purchased a specific pay channel through a proper purchase procedure, the user may normally acquire an encryption key and view the purchased pay channel with the acquired encryption key anytime before a lifetime of the purchased pay channel expires.
Although the present disclosure has been described with an exemplary embodiment, various changes and modifications may be suggested to one skilled in the art. It is intended that the present disclosure encompass such changes and modifications as fall within the scope of the appended claims.
Claims (12)
- A method for acquiring an encryption key to decrypt a pay channel encrypted with a smartcard profile by a mobile terminal in a Multimedia Broadcast/Multicast Service (MBMS) mobile broadcast system, comprising:purchasing(401) a specific pay channel;obtaining(407) an encryption key identification value and a Time Stamp(TS) value from a last received Short Term Key Message (STKM);anddetermining(413) that an encryption key included in a STKM is valid, when the obtained TS value satisfies a reference TS and the obtained encryption key identification value falls within a range of a valid encryption key identification value, and extracting and acquiring(421) an encryption key from the STKM.
- The method of claim 1, wherein obtaining comprises:extracting the encryption key identification value and the TS value from the last received Short Term Key Message (STKM), when a view request for the specific pay channel is created.
- The method of claim 2, wherein obtaining further comprises:receiving a minimum encryption key identification value SEQl and a maximum encryption key identification value SEQu used to determine validity of an encryption key;storing a range of a valid encryption key identification value defined by an equation of SEQl ≤ encryption key identification value ≤ SEQu; andinitializing a reference Time Stamp (TS) value.
- The method of claim 3, wherein the reference TS is defined by the following equation,TS_old < TSwhere TS_old denotes a reference TS value, and TS denotes the extracted TS value.
- The method of claim 4, further comprising changing the minimum encryption key identification value SEQl to the extracted encryption key identification value within the range of the valid encryption key identification value, when the extracted encryption key identification value falls within the range of the valid encryption key identification value.
- The method of claim 5, further comprising decrypting a broadcast stream corresponding to the pay channel with use of the acquired encryption key, decoding the decrypted broadcast stream, and providing the decoded broadcast stream to a user.
- The method of claim 5, wherein the acquired encryption key is an MBMS Traffic Key (MTK).
- A mobile terminal apparatus (10) configured to acquire an encryption key to decrypt a pay channel encrypted with a smartcard profile by a mobile terminal in a mobile broadcast system, comprising:a terminal (310) configured to purchase a specific pay channel, delivering, to a smartcard (320), a minimum encryption key identification value SEQl and a maximum encryption key identification value SEQu used to determine validity of an encryption key, extracting an encryption identification value and a Time Stamp (TS) value from a last received Short Term Key Message (STKM) when a view request for the pay channel is created, delivering the extracted values to the smartcard, and extracting and acquiring an encryption key from the STKM when a validity notification is provided from the smartcard; andthe smartcard (320) configured to store a range of a valid encryption key identification value, defined by an equation of SEQl ≤ encryption key identification value ≤ SEQu, using the minimum encryption key identification value SEQl and the maximum encryption key identification value SEQu, initializing a reference TS value, determining that an encryption key included in the STKM is valid, when the extracted TS value satisfies the reference TS and the extracted encryption key identification value falls within the range of the valid encryption key identification value, and delivering a notification indicating the validity to the terminal.
- The mobile terminal apparatus (10) of claim 8, wherein the reference TS is defined by the following equation,TS_old < TSwhere TS_old denotes a reference TS value, and TS denotes the extracted TS value.
- The mobile terminal apparatus (10) of claim 9, wherein the smartcard (320) changes the minimum encryption key identification value SEQl to the extracted encryption key identification value within the range of the valid encryption key identification value, when the extracted encryption key identification value falls within the range of the valid encryption key identification value.
- The mobile terminal apparatus (10) of claim 10, wherein the terminal (310) decrypts a broadcast stream corresponding to the pay channel with use of the acquired encryption key, decodes the decrypted broadcast stream, and provides the decoded broadcast stream to a user.
- The mobile terminal apparatus (10) of claim 11, wherein the acquired encryption key is an MBMS Traffic Key (MTK).
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR10-2008-0106635 | 2008-10-29 | ||
KR1020080106635A KR20100047651A (en) | 2008-10-29 | 2008-10-29 | Method and apparatus for acquiring encryption key for providing premium channel |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2010050729A2 true WO2010050729A2 (en) | 2010-05-06 |
WO2010050729A3 WO2010050729A3 (en) | 2010-07-29 |
Family
ID=42118453
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/KR2009/006230 WO2010050729A2 (en) | 2008-10-29 | 2009-10-27 | Method and apparatus for acquiring encryption key to provide pay channel |
Country Status (3)
Country | Link |
---|---|
US (1) | US20100106648A1 (en) |
KR (1) | KR20100047651A (en) |
WO (1) | WO2010050729A2 (en) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101586316B1 (en) * | 2009-11-10 | 2016-01-18 | 엘지전자 주식회사 | Mobile terminal and method for controlling broadcast thereof |
RU2614369C2 (en) * | 2012-09-17 | 2017-03-24 | Нокиа Текнолоджиз Ой | Protection under provision of mobility between mbms servers |
US10171435B1 (en) | 2017-06-12 | 2019-01-01 | Ironclad Encryption Corporation | Devices that utilize random tokens which direct dynamic random access |
WO2018231753A1 (en) * | 2017-06-12 | 2018-12-20 | Daniel Maurice Lerner | Devices that utilize random tokens which direct dynamic random access |
US10616192B2 (en) | 2017-06-12 | 2020-04-07 | Daniel Maurice Lerner | Devices that utilize random tokens which direct dynamic random access |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060206708A1 (en) * | 2005-01-14 | 2006-09-14 | Lg Electronics Inc. | Method for managing digital rights in broadcast/multicast service |
US20070259647A1 (en) * | 2006-02-27 | 2007-11-08 | Samsung Electronics Co. Ltd. | Method and system for protecting broadcast service/content in a mobile broadcast system, and method for generating short term key message therefor |
US20070274526A1 (en) * | 2006-02-03 | 2007-11-29 | Qualcomm Incorporated | Method and apparatus for content protection in wireless communications |
KR100916228B1 (en) * | 2006-02-28 | 2009-09-08 | 엘지전자 주식회사 | Method of managing a sek and a pek for a pay-per view based and service based broadcast subscriber and communication system thereof |
Family Cites Families (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5222137A (en) * | 1991-04-03 | 1993-06-22 | Motorola, Inc. | Dynamic encryption key selection for encrypted radio transmissions |
US5646992A (en) * | 1993-09-23 | 1997-07-08 | Digital Delivery, Inc. | Assembly, distribution, and use of digital information |
DE69535935D1 (en) * | 1994-02-24 | 2009-05-28 | Comcast Cable Holdings Llc | Method and device for creating a cryptographic connection between elements of a system |
US5805719A (en) * | 1994-11-28 | 1998-09-08 | Smarttouch | Tokenless identification of individuals |
JP3507594B2 (en) * | 1995-07-31 | 2004-03-15 | 株式会社東芝 | Computer |
JP3627384B2 (en) * | 1996-01-17 | 2005-03-09 | 富士ゼロックス株式会社 | Information processing apparatus with software protection function and information processing method with software protection function |
WO1999013398A1 (en) * | 1997-09-11 | 1999-03-18 | Digital Square, Inc. | Digital content vending, delivery, and maintenance system |
US7313236B2 (en) * | 2003-04-09 | 2007-12-25 | International Business Machines Corporation | Methods and apparatus for secure and adaptive delivery of multimedia content |
US7421079B2 (en) * | 2003-12-09 | 2008-09-02 | Northrop Grumman Corporation | Method and apparatus for secure key replacement |
US20060233368A1 (en) * | 2005-03-30 | 2006-10-19 | Gordon Thompson | Method for conditional access in a DMTS/DOCSIS enabled set top box environment |
US20070223703A1 (en) * | 2005-10-07 | 2007-09-27 | Sanjeev Verma | Method and apparatus for providing service keys within multiple broadcast networks |
US8619993B2 (en) * | 2006-06-29 | 2013-12-31 | Nokia Corporation | Content protection for OMA broadcast smartcard profiles |
US8948395B2 (en) * | 2006-08-24 | 2015-02-03 | Qualcomm Incorporated | Systems and methods for key management for wireless communications systems |
DE102006042554B4 (en) * | 2006-09-11 | 2009-04-16 | Siemens Ag | Method and system for continuously transmitting encrypted data of a broadcast service to a mobile terminal |
DE102007005636B4 (en) * | 2007-02-05 | 2008-11-13 | Infineon Technologies Ag | A method for generating a traffic encryption key, method for transmitting data, means for generating a traffic encryption key, data transmission arrangement |
-
2008
- 2008-10-29 KR KR1020080106635A patent/KR20100047651A/en not_active Application Discontinuation
-
2009
- 2009-10-27 US US12/589,650 patent/US20100106648A1/en not_active Abandoned
- 2009-10-27 WO PCT/KR2009/006230 patent/WO2010050729A2/en active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060206708A1 (en) * | 2005-01-14 | 2006-09-14 | Lg Electronics Inc. | Method for managing digital rights in broadcast/multicast service |
US20070274526A1 (en) * | 2006-02-03 | 2007-11-29 | Qualcomm Incorporated | Method and apparatus for content protection in wireless communications |
US20070259647A1 (en) * | 2006-02-27 | 2007-11-08 | Samsung Electronics Co. Ltd. | Method and system for protecting broadcast service/content in a mobile broadcast system, and method for generating short term key message therefor |
KR100916228B1 (en) * | 2006-02-28 | 2009-09-08 | 엘지전자 주식회사 | Method of managing a sek and a pek for a pay-per view based and service based broadcast subscriber and communication system thereof |
Also Published As
Publication number | Publication date |
---|---|
KR20100047651A (en) | 2010-05-10 |
WO2010050729A3 (en) | 2010-07-29 |
US20100106648A1 (en) | 2010-04-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP3742282B2 (en) | Broadcast receiving method, broadcast receiving apparatus, information distribution method, and information distribution apparatus | |
RU2547446C2 (en) | Method of access to services provided by subscriber module | |
US8190896B2 (en) | Conditional access for a multimedia broadcast service using a wireless terminal | |
US8031870B2 (en) | Conditional access system for each transmitter in single frequency network, and a method thereof | |
EP1686711A2 (en) | Method and system for conditional access in digital multimedia broadcasting | |
KR100709318B1 (en) | Method and system for CAS key assignment in digital broadcast service | |
KR20070037920A (en) | Digital broadcasting conditional access terminal and method thereof | |
US20070189535A1 (en) | Method and apparatus for protecting contents supporting broadcast service between service provider and a plurality of mobile stations | |
WO2010050729A2 (en) | Method and apparatus for acquiring encryption key to provide pay channel | |
US20050013440A1 (en) | Reception management apparatus, broadcasting receiving device, information distributing device, and information distributing method and reception management program | |
EP1878159A1 (en) | A conditional access system in digital multimedia broadcasting system and method thereof | |
CN101321261B (en) | Front-end system, user terminal and authorization management information distribution method | |
WO2011112048A4 (en) | Method and apparatus for reporting audience measurement in content transmission system | |
JP2006333350A (en) | Digital broadcasting system, digital broadcast receiver, broadcasting apparatus, and management apparatus | |
KR100777405B1 (en) | Method for the provision of charged contents of digital multimedia broadcasting | |
JP4266220B2 (en) | Information distribution method and information distribution apparatus | |
KR20070089582A (en) | Method of managing a sek and a pek for a pay-per view based and service based broadcast subscriber and communication system thereof | |
JP2007181224A (en) | Digital broadcast receiving method | |
KR20100046428A (en) | Method and apparatus for acquiring encryption key for providing premium channel | |
KR100646230B1 (en) | Method for Controlling Call-Back Threshold Value in a Mobile Communication Terminal for Pay-Per-View Program and Mobile Communication Terminal therefor | |
KR20070047083A (en) | System and method for subscriber authentication of dmb using cave algorithm in mobile terminal | |
KR20110107008A (en) | Apparatus and method for supporting smartcard profile in mobile broadcating system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 09823809 Country of ref document: EP Kind code of ref document: A2 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 09823809 Country of ref document: EP Kind code of ref document: A2 |