CN101047829A - Mobile multimedia service implementing method and condition receiving system - Google Patents

Mobile multimedia service implementing method and condition receiving system Download PDF

Info

Publication number
CN101047829A
CN101047829A CN 200610066550 CN200610066550A CN101047829A CN 101047829 A CN101047829 A CN 101047829A CN 200610066550 CN200610066550 CN 200610066550 CN 200610066550 A CN200610066550 A CN 200610066550A CN 101047829 A CN101047829 A CN 101047829A
Authority
CN
China
Prior art keywords
key
bek
receiving terminal
information
cipher key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN 200610066550
Other languages
Chinese (zh)
Other versions
CN100551034C (en
Inventor
刘崇利
姚峻
吕林军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CNB2006100665509A priority Critical patent/CN100551034C/en
Publication of CN101047829A publication Critical patent/CN101047829A/en
Application granted granted Critical
Publication of CN100551034C publication Critical patent/CN100551034C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

This invention provides a realizing method for mobile multimedia service and a condition receiving system, which adds TBEK in an authorized encrypted layer on the basis of current four-layer encrypted structure and utilizes the TBEK to encrypt the key of a program flow and combines the transmission process with the mobile communication system to provide a new way of realizing mobile multimedia service for the condition receiving system, which can realize the real-time charging function of the mobile multimedia service based on the time-varying period of the TBEK to be set flexibly according to the accuracy of charges.

Description

A kind of mobile multi-media service implementation method and condition receiving system
Technical field
The present invention relates to the network communications technology field, be specifically related to a kind of mobile multi-media service implementation method and condition receiving system that receives based on condition.
Background technology
The development of cellular mobile communication has improved the mobility in people living space greatly, has expedited the emergence of increasing mobile phone thus and has used the crowd.Along with the development of digital multimedia technology, people more and more can not be satisfied with portable terminal and can only make a phone call, and send short messages, and a kind of like this situations such as simple upward online are more and more stronger for the demand of looking the audio frequency multimedia messages.People wish in any place, can watch or listen to news, various information, song, video frequency program etc. by handheld terminal any time.3G is a kind of selection, and still, 3G network does not solve bandwidth problem fully, and the user that 3G can carry is limited, and charge is expensive.
Multimedia messages has very strong asymmetry, and a lot of information is the popular information obtained wanted jointly, has very strong general character.Because broadcasting can use minimum resource to allow masses obtain these common information, so the mobile digital multi-media broadcast that has taken into full account terminal mobility arises at the historic moment.The DVB-H of Europe ETSI, the MediaFLO of the U.S., the S-DMB of Korea S belongs to such multi-media broadcasting system.
In broadcast system, in order to prevent disabled user's program receiving, common way is that program is encrypted, and is also referred to as scrambling in broadcast system.Be sent to user side through the program after encrypting, legal users can utilize the information of mandate that program is correctly deciphered, and unwarranted user is not owing to there is authorization message, and can not program correctly be deciphered, the flower point or the mosaic of just some chaotic of therefore, on display terminal, seeing.Condition that Here it is receives CA (Conditional Access).The related system that realization condition receives is called CAS (Conditional Access System, condition receiving system).
A typical condition receiving system mainly is made up of front end and receiving terminal system two parts.Front end mainly comprises: program management system, Subscriber Management System, Database Systems, CA core system, encryption device or module and scrambling equipment.And receiving terminal mainly is made up of the receiving and processing equipment of two separation, promptly is made up of set-top box and smart card.
Condition receiving system relates to two encryption systems, and one is the program encryption system, and another is the hierarchical encryption encryption system.
The program encryption system encrypts the programme content that broadcasts, and also can be called scrambling.The program encryption system carries out encrypted process as shown in Figure 1 to program stream.
Among Fig. 1, the program encryption system utilizes key by scrambling module program stream to be encrypted, and program stream is carried out encrypted secret key be called CW (Control Word, control word) traditionally, the effect of control word is to upset programme signal, thereby makes that undelegated user can not the watching encrypted program.
Because CW is along with TS stream transmits together, therefore, in case CW is cracked by the person of stealing secret information, encryption system has just collapsed.In order to prevent cracking of the person of stealing secret information, CW is change at random often.The period of change of CW is generally very short, is generally to change once several seconds, even may changes several times for 1 second, and need encrypt CW with key, and this key is exactly the SK in the hierarchical encryption encryption system.
SK is produced by the service provider, is used for controlling the service that it provides.The use of SK is relevant with the user charges condition, and generally speaking, the user can once be taken in a monthly payment, and SK also by monthly variation, is also referred to as a moon key in some particular system.The time limit of SK determined by service in the time limit, and in the special service that Virtual network operator provides, as PPV (Pay-per-View, single pay tv) etc., the time limit of SK may be a several hrs.
Though CW is encrypted by SK; but; this key still can allow anyone read; in case SK is cracked; just mean special services decide the consumer and the Fei Ding consumer will enjoy identical right, Virtual network operator is difficult to control to specific user, the fail safe of network still has problems; therefore, must carry out encipherment protection again to SK.This ciphering process need carry out according to each user's feature.
Each user terminal all have one can identify oneself, unique address code, in actual applications, often use and a ordered series of numbers that this address code is associated is encrypted SK.This ordered series of numbers is a key, because this ordered series of numbers determines that by personal characteristics therefore, this ordered series of numbers often is called as PDK (individual distributing key).
PDK is generally produced and strict control automatically by the CA system equipment.At the terminal equipment place, among the PROM of the burned descrambler of special equipment that this ordered series of numbers is generally provided by the CA system by Virtual network operator, can not read again.For different stage, dissimilar various services can be provided, a cover CA system often is that a user is distributed several PDK, to satisfy abundant business demand.
Above-mentioned ciphering process to CW, SK is realized that by the hierarchical encryption encryption system main purpose of hierarchical encryption encryption system is: carry out level and encrypt, to guarantee the fail safe of control word CW.The implementation procedure that hierarchical encryption is encrypted is shown in accompanying drawing 2, accompanying drawing 3 and accompanying drawing 4.
In Fig. 2, Fig. 3, Fig. 4, the CA system utilizes SK (Service Key, business cipher key) by certain cryptographic algorithm CW is encrypted, program information such as CW information after the encryption and program price are by ECMG (Entitle Control Message Generator, the Entitlement Control Message maker) generated ECM (EntitleControl Message, Entitlement Control Message) message.In order to transmit SK, utilize PDK (PersonalDistributed Key, personal key) by certain cryptographic algorithm SK is encrypted, SK information after the encryption and address, authorized user message etc. generate EMM (Entitle Manage Message, Entitlement Management Message) information by EMMG (Entitlement Management Message maker).The ECM of above-mentioned generation and EMM information are along with transmitting together through TS (program) stream of encrypting.
User's receiving terminal at first receives ECM and EMM when program receiving flows, and utilizes that the PDK key in the smart card is decrypted EMM on the terminal equipment, obtains business cipher key SK; Then, utilize SK that ECM is decrypted, obtain CW, utilize CW initialization scrambling module again, like this, user's receiving terminal just can be synchronous with transmitting terminal, thereby program is correctly deciphered.
In many cover CA of the actual operation in ground such as America and Europe system, operator has a variety of to terminal use's encryption authorization mode, as: artificial mandates, magnetic card mandate, IC-card mandate, smart card mandate promptly utilize IC constitute the analysis and judgement ability stick into that row mandate, center focused addressing mandate promptly do not need plug-in card but by the shared authorization of control centre's direct addressin mandate, smart card and central authority etc.Wherein, the smart card authorization is the main flow in market, also is defined as the standard fitting of China's log equipment by China General Bureau of Radio, Film and Television.
Above-mentioned CA system has become technical standard to the encryption method of program stream and user terminal to the decryption method of program stream.
Mobile TV has adopted above-mentioned ciphering process basically in the encryption of service layer; service layer adopts four infill layer structures usually, and typical encryption system such as the service protection model of DVB-H, the service protection model of OMA BCAST etc. all adopt four infill layer structures.
Four infill layer structures below in conjunction with 5 pairs in accompanying drawing abstract service layer of coming out from standard C A system describe.
In Fig. 5, ground floor is the registration encryption layer, mainly finishes registering functional, and produces REK (RegisterEncryption Key, login key).Login key is used for authorization message is encrypted.
The second layer is to authorize encryption layer, mainly is to finish the encryption of SEK/PEK (Service Encryption Key/Program Encryption Key, business cipher key/program key) and issue and to user's authorization function.Can use login key REK that business cipher key SEK/PEK is encrypted.Information after the encryption can issue by radio network, also can issue by mobile communications network.If what adopt is DRM (digital copyright management) scheme, key and relevant information issue in the mode of RO (right objects).
The 3rd layer is Business Stream cipher key delivery layer, and Business Stream cipher key delivery layer is mainly finished the encryption of TEK (TrafficEncryption Key, Business Stream key) and issued function.Can use SEK/PEK that TEK is encrypted, the information after the encryption issues by radio network.
The 4th layer is professional encryption layer, mainly finishes the encryption of business and issues function.Business datum adopts TEK to encrypt, and the information after the encryption issues by radio network.
At user side, the user obtains SEK/PEK according to the REK deciphering business cipher key information of having obtained, and utilizes SEK/PEK deciphering Business Stream key information again, obtains TEK, and last, the user utilizes TEK just can correctly decipher business datum.
In the existing mobile TV encryption system, operator generally by controlling authorizing of business cipher key, comes the user is charged.After user terminal and network side were set up login key, user terminal started to subscribe to flow process, and network side carries out respective handling, when authorizing the customer service key, and deduction user's expense.
If by realizing real time billing the effective time that shortens business cipher key, so, all users comprise that the user of monthly payment and packet access channel also needs frequently to apply for key, will certainly produce great impact to the resource of mobile communications network.
From foregoing description as can be seen, the CA system of existing DMB can provide more satisfactory security performance, can reach the purpose of differentiation charge by control SK and PDK, but, the means of this differentiation charge are limited, operator generally can only provide monthly payment charge, by channel charge, by charging means such as program chargings, real time billing can not be provided.
Summary of the invention
The objective of the invention is to, a kind of mobile multi-media service implementation method and condition receiving system that receives based on condition is provided, on the basis of existing four infill layer structures, become cipher key T BEK during by increase in authorizing encryption layer, for condition receiving system provides a kind of new mobile multi-media service implementation, make condition receiving system can realize the real time billing function of mobile multi-media service, thereby make the mobile multi-media service implementation of condition receiving system more flexible.
For achieving the above object, a kind of mobile multi-media service implementation method that receives based on condition provided by the invention comprises: registration encryption layer, mandate encryption layer, Business Stream cipher key delivery layer and professional encryption layer, and described method comprises:
A, transmitting terminal become cipher key T BEK when authorizing encryption layer to increase, transmitting terminal is encrypted the encryption key of program stream by TBEK, and the information after will encrypting sends with program stream;
The information that b, transmitting terminal will obtain TBEK by mobile communication system is sent to receiving terminal;
C, receiving terminal obtain TBEK according to the information of its reception, according to TBEK deciphering, obtain the encryption key of program stream, and watch mobile multi-media broadcast program according to the encryption key of the program stream of described acquisition;
D, transmitting terminal are controlled charge system according to the time variable period of cipher key T BEK the charging of receiving terminal are handled.Described step a comprises:
A1, transmitting terminal become key request when receiving the mandate encryption layer that receiving terminal sends after, when determining to allow receiving terminal to watch mobile multi-media broadcast program according to the restriction condition of watching, according to the time become cipher key T BEK the encryption key of program stream encrypted, and the information after will encrypting sends with program stream.
The restriction condition of watching among the described step a1 comprises: the account balance of receiving terminal and/or reception authority.
Transmitting terminal comprises by the step that TBEK encrypts the encryption key of program stream among the described step a1:
Transmitting terminal is encrypted the encryption key of program stream by the ECM maker according to cipher key T BEK.
Described step a1 comprises:
A11, when receiving terminal is opened and need to receive mobile multi-media broadcast program, receiving terminal transfers to transmitting terminal with authentication information;
A12, transmitting terminal when determining to allow receiving terminal to watch mobile multi-media broadcast program according to the restriction condition of watching, according to cipher key T BEK the encryption key of program stream is encrypted, and the information after will encrypting send with program stream after to the success of receiving terminal authentication.
Described step a11 comprises:
When receiving terminal is opened and needed to receive mobile multi-media broadcast program, and when determining that the cipher key T BEK of himself storage is invalid, authentication information is transferred to transmitting terminal.
Described step a11 comprises:
The key request that receiving terminal will carry authentication information is sent to transmitting terminal.
Described step a1 comprises:
Receiving terminal according to the term of validity of the cipher key T BEK of its acquisition, regularly is sent to transmitting terminal with key request by mobile communication system in watching the mobile multi-media broadcast program process;
When described transmitting terminal determines to allow receiving terminal to watch mobile multi-media broadcast program according to the restriction condition of watching, according to cipher key T BEK the encryption key of program stream is encrypted, and the information after will encrypting sends with program stream.
Described step a also comprises:
Transmitting terminal sends key refusal information by mobile communication system to the receiving terminal of failed authentication; Perhaps
Transmitting terminal forbids that to key the receiving terminal that receives key sends key refusal information by mobile communication system according to the restriction condition of watching; Perhaps
When transmitting terminal lost efficacy and do not receive the key request of receiving terminal once more at the cipher key T BEK of its transmission, send key refusal information to receiving terminal by mobile communication system.
Described step c comprises:
Receiving terminal judges whether receive the information of obtaining cipher key T BEK that transmitting terminal sends in the predetermined time interval;
If receive the information of obtaining cipher key T BEK that transmitting terminal sends, receiving terminal is according to the information acquisition cipher key T BEK that obtains cipher key T BEK of its reception, and according to cipher key T BEK deciphering, obtain the encryption key of program stream, then, watch mobile multi-media broadcast program according to the encryption key of described program stream;
If when not receiving the information of obtaining cipher key T BEK that transmitting terminal sends or key refusal information, send key request to transmitting terminal once more by mobile communication system.
The information of obtaining cipher key T BEK among the described step b comprises:
Information after cipher key T BEK being encrypted by the EMM maker according to the SIM card information of receiving terminal or registration encryption layer key information.
Described step b comprises:
The information that signaling method or the short message mode of transmitting terminal by mobile communication system will obtain cipher key T BEK is sent to receiving terminal.
The present invention also provides a kind of condition receiving system based on Mobile Multimedia Broadcasting, comprise: registration encryption layer, mandate encryption layer, Business Stream cipher key delivery layer and professional encryption layer, be provided with encrypting module, key sending module and charging control module in the transmitting terminal, be provided with receiver module in the receiving terminal;
Encrypting module: be used for the encryption key of program stream being encrypted, the information after encrypting is sent with program stream according at the change cipher key T BEK that authorizes encryption layer to increase, and output cipher key T BEK;
The key sending module: be used for after receiving cipher key T BEK, the information that will obtain cipher key T BEK by mobile communication system is sent to receiver module;
Receiver module: be used for obtaining cipher key T BEK, according to cipher key T BEK deciphering, obtain the encryption key of program stream, and watch mobile multi-media broadcast program according to the encryption key of program stream according to the information of its reception;
The charging control module: the time variable period control charge system that is used for the cipher key T BEK that sends according to the key sending module is handled the charging of receiving terminal.
Described receiver module comprises:
Key request submodule: send key request to transmitting terminal by mobile communication system;
Receive submodule: obtain cipher key T BEK according to the information of its reception, according to cipher key T BEK deciphering, obtain the encryption key of program stream, and watch mobile multi-media broadcast program according to the encryption key of program stream.
Described encrypting module comprises:
Sub module stored: be used for the storage restriction and watch condition;
Encrypt submodule: be used for after receiving the key request that receiving terminal sends, watch that according to the restriction of storing in the sub module stored condition is when determining to allow receiving terminal to watch mobile multi-media broadcast program, according to the cipher key T BEK that receives the encryption key of program stream is carried out encryption, and the information after will encrypting sends with program stream, when determining to forbid that receiving terminal is watched mobile multi-media broadcast program, notice key sending module sends key refusal information to receiving terminal.
Described receiver module also comprises:
Judge submodule: judge whether receiving terminal receives the information of obtaining cipher key T BEK that transmitting terminal sends in the interval at the fixed time, determine that receiving terminal receives that transmitting terminal sends obtain the information of cipher key T BEK the time, to obtain the message transmission of cipher key T BEK to receiving submodule, when determining not receive the information of obtaining cipher key T BEK that transmitting terminal sends or key refusal information, notice key request submodule carries out the key request processing procedure.
Described system also comprises:
Authentication module: the authentication information that sends according to transmitting terminal carries out authentication to receiving terminal, and when the authentication success, the notice encrypting module begins to carry out encryption process.
Description by technique scheme as can be known, the present invention is by on the basis of existing four infill layer structures, become cipher key T BEK when in authorizing encryption layer, increasing, becoming cipher key T BEK when utilizing encrypts the encryption key of program stream, and will the time become cipher key T BEK transmission course combine with mobile communication system, for condition receiving system provides a kind of new mobile multi-media service implementation, make condition receiving system can according to the time become cipher key T BEK time variable period realize the real time billing function of mobile multi-media service, the time variable period that becomes cipher key T BEK when of the present invention can be provided with flexibly according to the levels of precision that charges; The present invention does not change existing mobile multi-media service implementation method, only for receiving terminal once in a while, watch mobile multi-media program under the situation such as impromptu, but a kind of implementation is provided; The compatible existing CA of the present invention system, and, technical scheme of the present invention does not influence charging ways such as the original monthly payment of mobile multi-media service, packet access channel, like this, when receiving terminal is not in the time of can receiving the dual-mode terminal of mobile communications network signal and mobile video broadcast network signal simultaneously, still can charge to the receiving terminal program receiving by traditional charge method; And for dual-mode terminal, then not only can the receiving terminal program receiving be charged by traditional charge method, can also adopt technical scheme of the present invention that the receiving terminal program receiving is carried out real charging, strengthened the flexibility of charge method greatly; Thereby realized improving the purpose of the realization flexibility of mobile multi-media service by technical scheme of the present invention.
Description of drawings
Fig. 1 is the schematic diagram that the program encryption system encrypts program stream;
Fig. 2 is the implementation procedure schematic diagram one that the hierarchical encryption of prior art is encrypted;
Fig. 3 is the implementation procedure schematic diagram two that the hierarchical encryption of prior art is encrypted;
Fig. 4 is the implementation procedure schematic diagram three that the hierarchical encryption of prior art is encrypted;
Fig. 5 is four infill layer structural representations of the service layer of prior art;
Fig. 6 is four infill layer structural representations of the service layer of the embodiment of the invention;
Fig. 7 is the mobile multi-media service implementation method schematic diagram one of the embodiment of the invention;
Fig. 8 is the mobile multi-media service implementation method schematic diagram two of the embodiment of the invention;
Fig. 9 is the mobile multi-media service implementation method schematic diagram three of the embodiment of the invention;
Figure 10 is the mobile multi-media service implementation method schematic diagram four of the embodiment of the invention;
Figure 11 is the mobile multi-media service implementation method schematic diagram five of the embodiment of the invention;
Figure 12 is the mobile multi-media service implementation method schematic diagram six of the embodiment of the invention;
Figure 13 is the mobile multi-media service implementation method schematic diagram seven of the embodiment of the invention.
Embodiment
The present invention is to existing at present, the encryption system that relates to based on the condition receiving system of Mobile Multimedia Broadcasting improves, its main improvement as shown in Figure 6, among Fig. 6, the present invention becomes cipher key T BEK when the mandate encryption layer of four present infill layer structures increases, transmitting terminal is encrypted the encryption key of program stream by TBEK, and the information after will encrypting sends with program stream, transmitting terminal will the time become cipher key T BEK transmission combine with mobile communication system, that is to say, the present invention with transmitting terminal be network side to the encryption key of program stream encrypt the time become the acquired information of cipher key T BEK process of transmitting combine with mobile communication system, when can being received by mobile communication system, receiving terminal becomes the acquired information of cipher key T BEK, receiving terminal by the time become cipher key T BEK the information of obtaining become cipher key T BEK when obtaining, receiving terminal can be decrypted the encryption key of program stream by NSK, thereby watch mobile multi-media broadcast program.Among the present invention the time become cipher key T BEK and can carry out cyclic variation according to actual needs flexibly, thereby make network side can by the time become cipher key T BEK and realize real time billing function mobile multi-media service, and the period of change that network side can become cipher key T BEK when adjusting is adjusted the order of accuarcy of real time billing.
Mobile communications network among the present invention is two-way mobile communications network, as GSM, GPRS, EDGE, CDMA, WCDMA, CDMA2000, TD-SCDMA, WIMAX etc., promptly so long as two-way mobile communications network all can.
The main flow process of technical scheme provided by the invention as shown in Figure 7.
Among Fig. 7, at first, transmitting terminal according to the time become cipher key T BEK the encryption key of program stream encrypted, the encryption key of program stream is key such as cipher key T EK, the CW etc. that in the professional encryption layer business carried out, and the information that becomes when utilizing after cipher key T BEK encrypts the encryption key of program stream sends with program stream.Transmitting terminal can according to the time become cipher key T BEK and professional encryption layer keys such as the encryption key TEK of program stream or CW encrypted by the ECM maker.Set transmitting terminal according to the time to become cipher key T BEK be NECM (New Entitle Control Message, new Entitlement Control Message) by the ECM maker into the enciphered message of generations such as cipher key T EK or CW.The implementation procedure here can not change the encryption process of existing cipher key system, promptly also comprises with the information that program stream sends: ECM, the EMM etc. that utilize existing cipher key system to produce.
Then, the information that will become cipher key T BEK when transmitting terminal will obtain by mobile communication system is sent to receiving terminal, become when obtaining here the information of cipher key T BEK can be directly for the time become the information of cipher key T BEK, also can into to the time become information after the cipher key T BEK encryption.Here the SIM card information etc. that can utilize PDK, receiving terminal to the time become cipher key T BEK and encrypt, as transmitting terminal according to the SIM card information of PDK or receiving terminal etc. by the EMM maker to the time become cipher key T BEK and encrypt.Set and to become the enciphered message that cipher key T BEK generates when transmitting terminal according to the SIM card information of PDK or receiving terminal etc. by the EMM maker is and be NEMM.The NEMM here need be sent to receiving terminal by mobile communication system.Transmitting terminal can adopt signaling method or short message mode etc. that NEMM is sent to receiving terminal.When transmitting terminal adopts signaling method, between the receiving terminal of user side and transmitting terminal, need to set up link at network side.
After transmitting terminal sends NEMM, when can obtaining according to NEMM, receiving terminal becomes cipher key T BEK, then, receiving terminal according to the time become cipher key T BEK the NECM that sends with program stream of its reception be decrypted, obtain the encryption key of the professional encryption layers such as encryption key CW of program stream, thereby receiving terminal can be watched mobile multi-media broadcast program according to CW etc.
In above-mentioned implementation procedure, the information that transmitting terminal sends to receiving terminal as shown in Figure 8.Among Fig. 8, transmitting terminal comprises to the information that receiving terminal sends: the program stream after NECM, ECM, EMM, NEMM (New EntitleManage Message, new Entitlement Management Message) and the scrambling.NECM, ECM, EMM are sent to receiving terminal with program stream after multiplexing, and NEMM is sent to receiving terminal by mobile communications network.
The generation schematic diagram of the information that above-mentioned transmitting terminal sends to receiving terminal as shown in Figure 9.
In Fig. 9, become cipher key T BEK when transmitting terminal utilizes the encryption key of professional encryption layers such as CW is encrypted, the information after the encryption is NECM; Transmitting terminal utilizes SK that CW is encrypted, and the information after the encryption is ECM; Transmitting terminal utilizes PDK that SK is encrypted, and the information after the encryption is EMM; Transmitting terminal utilizes the SIM card information of PDK or receiving terminal that cipher key T BEK is encrypted, and the information after the encryption is NEMM.
Transmitting terminal among the present invention can be carried out the operating process of describing in the foregoing description when receiving the key request of receiving terminal.In order to guarantee that receiving terminal receives the legitimacy of mobile multi-media broadcast program stream, the present invention can carry out authentication process to receiving terminal, only carries out the operating process of describing in the foregoing description at the receiving terminal of authentication success.The present invention can also further identify the legitimacy that receiving terminal receives mobile multi-media broadcast program stream according to the predetermined restriction condition of watching, promptly at the authentication success and meet restriction and watch that the receiving terminal of condition carries out the operating process of describing in the foregoing description.The restriction condition of watching here can be provided with according to the actual needs of operator, the receiving terminal information of having no right to receive that can be provided with for: the account balance of receiving terminal, operator as the restriction condition of watching etc.
Be described below in conjunction with 10 pairs of implementation procedures that combine the mobile multi-media service of mobile communications network of the present invention of accompanying drawing.
Among Figure 10, at first, receiving terminal transfers to AUC with authentication information by mobile communications network, and receiving terminal can transfer to AUC with authentication information by key request, by AUC receiving terminal is carried out authentication process.After the authentication success, when service center promptly provides the service center of mobile multi-media service to determine that according to the restriction condition of watching receiving terminal is forbidden program receiving stream, can send key refusal information to receiving terminal, the implementation procedure of this mobile multi-media service finishes.When service center determines that according to the restriction condition of watching receiving terminal allows program receiving stream, service center utilizes professional encryption layer keys such as CW that program stream is encrypted, and use SK that professional encryption layer keys such as CW are encrypted, professional encryption layer key and out of Memory combinations such as the CW after the encryption form ECM; Simultaneously, service center utilization mandate encryption layer the time become cipher key T BEK CW encrypted, CW after the encryption and out of Memory combination form NECM (New Entitle ControlMessage, new Entitlement Control Message).Service center utilization mandate encryption layer key PDK encrypts SK, and SK after the encryption and out of Memory combination form EMM; Simultaneously, service center utilize PDK or SIM card information to the time become cipher key T BEK and encrypt, SK after the encryption and out of Memory combination form NEMM (New Entitle Manage Message, new Entitlement Management Message).Here, SIM card information includes but not limited to IMSI.
Then, ECM, NECM, EMM and transfer to receiving terminal by transmission network etc. together after multiplexing through the program stream of encrypting.Service center transfers to receiving terminal with NEMM by mobile communications network.
Receiving terminal becomes cipher key T BEK when obtaining according to its NEMM that receives by mobile communications network, and become cipher key T BEK when utilizing NECM is decrypted processing, obtain application encipher layer ciphering key W etc., receiving terminal is decrypted the program stream of its reception according to the CW of its acquisition, to watch mobile multi-media broadcast program.
Since the time to become cipher key T BEK be variable period life cycle sometimes, therefore, receiving terminal need according to the time become cipher key T BEK life cycle send key request by mobile communications network to transmitting terminal and obtain to become when new cipher key T BEK, with the mobile multi-media broadcast program of watching that guarantees that receiving terminal can continue.When receiving terminal once more by mobile communications network when transmitting terminal sends key request, can in key request, not carry authentication information.At this moment, service center can directly determine according to the restriction condition of watching whether receiving terminal can watch mobile multi-media broadcast program.
From the description of above step as can be seen, when having increased, the present invention becomes cipher key T BEK in original encryption system, and in time, becomes cipher key T BEK and changes according to the time, the time become cipher key T BEK period of change can determine according to the operation strategy of operator, as the time become the period of change of cipher key T BEK can be from tens seconds to dozens of minutes.User for key that does not have Business Stream cipher key delivery layer such as SK decryption capabilities, program receiving if desired, become cipher key T BEK in the time of just must obtaining, and become cipher key T BEK when utilizing and solve professional encryption layer key such as CW etc., then, utilize professional encryption layer keys such as CW that program is decrypted, thereby reach the purpose of correct program receiving.
Since the time to become the term of validity of cipher key T BEK shorter, therefore, operator becomes authorizing in real time of cipher key T BEK when by control receiving terminal being carried out, and just can control the receiving terminal program receiving, thus realization is to the real time billing of mobile multi-media service.The mode of authorizing of key is two-way and NEMM transmits in mobile communications network among the present invention.
Because the multimedia service of Mobile Multimedia Broadcasting and 3G network is compared, it is embodied as originally much lower, therefore, is complete acceptable according to minute chargeing, generally speaking, the time become cipher key T BEK period of change can be a few minutes.
The reason that the present invention does not directly utilize professional encryption layer key such as CW to carry out real time billing is: the cycle that CW changes is too fast, can occupy a large amount of mobile communications network resources.If painstakingly slow down the change frequency of professional encryption layer key in order to realize real time billing, can reduce confidentiality greatly again.
The present invention does not influence the charge method that charge system was carried out originally to the user become cipher key T BEK when increasing after.And just increased a kind of charging way more flexibly for mobile multi-media service: real time billing.
Mobile communications network among the present invention comprises PHS, GSM, and GPRS, EDGE, WCDMA, CDMA2000, TD-SCMDA, but be not limited to these networks.Every communication network of two-way interactive that can provide can.
Of particular note, technical scheme of the present invention and existing be diverse with the secret skill art, essence with the secret skill art is many CA system, and the essence of technical scheme of the present invention is many cipher key systems, that is to say, key in the Business Stream cipher key delivery layer among the present invention as SK and the time become cipher key T BEK and can produce by same CA system, this is and difference with the secret skill art.Certainly, in technical scheme of the present invention, the key in the Business Stream cipher key delivery layer with the time become cipher key T BEK and produce by different CA systems and also allow.The present invention be that with the another one difference of secret skill art the NEMM that the present invention produces does not transmit after multiplexing together with program stream, but transmits by mobile communications network.
Below in conjunction with accompanying drawing 11 and network side receiving terminal is received the charging process of mobile multi-media program, the complete implementation procedure of mobile multi-media service provided by the invention is elaborated.
In Figure 11, receiving terminal is that user terminal is opened the Mobile Multimedia Broadcasting receiving circuit, user terminal need receive mobile multi-media broadcast program, receiving terminal judges whether its TV programme that need receive needs decryption processing, if do not need program is decrypted, the program stream that the direct receiving end/sending end of receiving terminal sends; If need carrying out program, handles the program that receiving terminal need receive, then receiving terminal judge in its key memory block the time whether become cipher key T BEK effective, if in the key memory block the time to become cipher key T BEK invalid, then receiving terminal utilizes mobile communications network, send key request signaling Key Request, require to obtain key.Can add the reception situation of receiving terminal such as initial reception etc. in the key request.According to the requirement of network, also may attach the authentication information that receiving terminal is carried out authentication in the key request.Simultaneously, receiving terminal starts reception key timer T1, waits for the key that receiving end/sending end sends.
Transmitting terminal is after network side receives Key Request, according to the authentication information among the Key Request receiving terminal to be carried out authentication process; If the authentication success determines that receiving terminal is a validated user; At this moment, when transmitting terminal determine to allow receiving terminal program receiving stream according to the restriction condition of watching, as the remaining sum of determining receiving terminal when sufficient, reply Key ACK to receiving terminal, and will the time information after becoming cipher key T BEK and encrypting send to receiving terminal, simultaneously, transmitting terminal notice charge system begins to charge.If failed authentication to receiving terminal, when perhaps though the successful still transmitting terminal of authentication determines to forbid receiving terminal program receiving stream according to the restriction condition of watching, when having no right program receiving stream as the account balance deficiency of receiving terminal or owing to other reason, transmitting terminal sends Key REJ to receiving terminal, can carry Reason For Denial among the Key REJ.
If receiving terminal is when timer T1 is overtime, become the information after cipher key T BEK encrypts when not receiving, do not receive Key REJ information yet, then receiving terminal sends Key Request to network side again, require transmitting terminal to transmit key, at this moment, authentication information can be attached among the Key Request, reception situation such as initial reception etc. can be attached simultaneously.Receiving terminal restarts timer T1 when sending Key Request.
If receiving terminal is before timer T1 is overtime, receive that network side sends the time become information after cipher key T BEK encrypts, but, receiving terminal determine its acquisition the time become cipher key T BEK when incorrect, receiving terminal sends Key Request to network side again, require transmitting terminal to transmit key, at this moment, can the contributory cause value among the Key Request, as receiving cause value such as wrong cipher key, but, can attach authentication information again.Receiving terminal restarts T1 when sending Key Request.
Network side receives Key Request to it to be judged, if carry the cipher key delivery error message among the Key Request, then network side can carry out authentication process again, but replys Key ACK to receiving terminal again; If carry the information of timer expiry among the Key Request, then receiving terminal carries out authentication process, replys the processing procedure of foregoing descriptions such as Key ACK or KeyREJ to receiving terminal receiving terminal according to the authentication information among the KeyRequest, receives correct key or receives key refusal information up to receiving terminal.
In the foregoing description process, if receiving terminal receives Key REJ, then receiving terminal stops to send key request, and closes moving multimedia broadcasting receiving circuit.
In the foregoing description process, the time become cipher key T BEK the instant life cycle that becomes cipher key T BEK effective time can be n minute, for the receiving terminal of all real time billings, the value of n is identical, promptly transmitting terminal be different receiving terminals send the time become cipher key T BEK effective time be identical; Transmitting terminal sends to the life cycle TTL that becomes cipher key T BEK in the time of can carrying among user's the KeyACK.
At receiving terminal by above-mentioned processing procedures such as authentications, when being in the process that receives mobile multi-media program stream, receiving terminal for continue to receive mobile multi-media program stream need according to the time become cipher key T BEK life cycle regularly when transmitting terminal please be looked for novelty, become cipher key T BEK.
The acquisition process that becomes cipher key T BEK when new as shown in Figure 12.
Among Figure 12, step 1, network side the time become cipher key T BEK and be about to lose efficacy in, check user's remaining sum, and judge whether receiving terminal can continue to receive mobile multi-media program stream, if Sorry, your ticket has not enough value for receiving terminal, then network side stops to send new key to receiving terminal to the receiving terminal information that sends that Sorry, your ticket has not enough value, and sends the information that receiving terminal is chargeed of stopping to charge system; Otherwise, network side the time become cipher key T BEK and lost efficacy in, start timer T2 at this real time billing receiving terminal, wait for the new key demand signalling Next Key Request of receiving terminal.If when timer T2 is overtime, network side does not receive the Next Key Request that receiving terminal sends, and then network side sends the information that stops the receiving terminal charging to charge system, and stops to send key to this receiving terminal.
In step 2, for receiving terminal, receiving terminal is judged the time that key lost efficacy according to TTL, certain random time before key lost efficacy, if receiving terminal wishes to continue program receiving stream, then receiving terminal sends a new key demand signalling Next Key Request to transmitting terminal, and start reception key timer T1, wait for the new key that receiving end/sending end sends.
After step 3, network side receive new key demand signalling Next Key Request, the timing of termination timing device T2, if network side determines to allow receiving terminal to continue program receiving stream according to the restriction condition of watching, then network side is replied Next Key ACK to receiving terminal, and sends an information that becomes when new after cipher key T BEK encrypts to receiving terminal; If network side determines to forbid that according to the restriction condition of watching receiving terminal continues program receiving stream, then to refuse to send new key to receiving terminal, network side is replied Next Key REJ to receiving terminal, and carries Reason For Denial in Next Key REJ.
When if the timer T1 of receiving terminal is overtime, receiving terminal becomes cipher key T BEK or key refusal information when receiving never that transmitting terminal sends, then receiving terminal resends Next KeyRequest to network side, and on Next Key Request the additional condition information that receives, simultaneously, receiving terminal restarts timer T1; If receiving terminal becomes cipher key T BEK mistake when receiving, then receiving terminal resends Next Key Request to network side, and on Next Key Request the additional keys transmitting fault information.At this moment, network side carries out the description process of above-mentioned steps 3, receives up to receiving terminal to become cipher key T BEK or receive key refusal information when correct.
When receiving terminal receives new key or key refusal information, stop receiving the timing of key timer T1.
In the foregoing description, the cause value of network side rejection end new key request may be: timer T2 is overtime, stop to charge, receive receiving terminal because the account balance of receiving terminal is not enough resends the initialization request Key Request that comes etc.
When receiving terminal stopped program receiving, the handling process of receiving terminal and transmitting terminal as shown in Figure 13.
Among Figure 13, stop to receive mobile multi-media program at step 1, receiving terminal, when closing the Digital Television receiving circuit, receiving terminal sends to network side and stops to charge request Stop Billing Request.
To step 2, network side receive receiving terminal stop the request of chargeing after, the notice charge system stops to charge, and sends to stop to charge to receiving terminal and confirm Stop Billing ACK.
Certainly, receiving terminal also can be when closing the Digital Television receiving circuit, do not send to transmitting terminal and send out information any, like this, transmitting terminal the time become cipher key T BEK and lost efficacy after, can not receive the key request that receiving terminal sends again, thereby make network side can stop charging because of timer T2 is overtime.
If receiving terminal is in the program receiving process, cause receiving terminal to restart owing to changing battery or other reason, when then receiving terminal receives mobile multi-media program again, receiving terminal for real time billing, need at first to judge whether the key in the key memory block is still effective, if effectively, then can utilize the key of storing in the key memory block to continue to receive mobile multi-media program; If the key in the key memory block lost efficacy, become the information after cipher key T BEK encrypts when then receiving terminal can obtain by the flow process application of the initialization request described in the foregoing description.
In technical scheme of the present invention, network side to the levels of precision of the real time billing of receiving terminal program receiving by the time become cipher key T BEK life cycle decide, the time to become the life cycle of cipher key T BEK long more, the levels of precision that mobile multi-media program is carried out real time billing is then poor more.
From foregoing description as can be seen, the present invention is on the basis that does not change original standard C A system schema, added an other cover key, the transmission by the key that will add combines with mobile communications network, makes the present invention receive mobile multi-media program realization real time billing function to receiving terminal.The compatible existing CA of the present invention system, and, the original charging way of mobile multi-media service do not influenced.Like this, when receiving terminal be not in the time of can receiving the dual-mode terminal of mobile communications network signal and mobile video broadcast network signal simultaneously, still can charge to the receiving terminal program receiving by traditional charge method; And for dual-mode terminal, then not only can the receiving terminal program receiving be charged by traditional charge method, can also adopt technical scheme of the present invention that the receiving terminal program receiving is carried out real charging, strengthened the flexibility of charge method greatly.
A kind of condition receiving system based on mobile multi-media service broadcasting of the present invention, system of the present invention still is provided with the registration encryption layer, authorizes encryption layer, Business Stream cipher key delivery layer and professional encryption layer.Network side of the present invention is to be provided with encrypting module, key sending module, charging control module and authentication module in the transmitting terminal, is provided with receiver module in the receiving terminal.
Authentication module is mainly used in: the authentication information that sends according to transmitting terminal carries out authentication to receiving terminal, and when the authentication success, the notice encrypting module begins to carry out encryption process.
Encrypting module is mainly used in: according to authorize that encryption layer increases the time become cipher key T BEK, the encryption key of program stream is encrypted, the information after encrypting is sent with program stream, and output cipher key T BEK.Encrypting module can become cipher key T BEK the encryption key of program stream is encrypted when receive next key request Key Request of receiving terminal transmission or Next KeyRequest when utilizing.
The key sending module is mainly used in: become cipher key T BEK when receiving after, the information that becomes cipher key T BEK in the time of will obtaining by mobile communication system is sent to receiver module.The key sending module can with the time become cipher key T BEK and directly be sent to receiver module, also can with the time information that becomes after cipher key T BEK encrypts be sent to receiver module.
Receiver module is mainly used in: become cipher key T BEK when obtaining according to the information of its reception, and according to the time become cipher key T BEK deciphering, obtain the encryption key of program stream, then, the encryption key of the program stream that obtains according to deciphering is decrypted program stream so that receiving terminal can according to the time become cipher key T BEK and watch mobile multi-media broadcast program.
The charging control module is mainly used in: according to the key sending module send the time become cipher key T BEK time variable period control charge system the charging of receiving terminal is handled.The charging here is treated to real time billing and handles, the accuracy that real time billing is handled with the time to become the time variable period of cipher key T BEK relevant, as send the information chargeing, stop to charge of beginning to charge system.The charging control module is when receiving the Stop BillingRequest that receiving terminal sends, and the control charge system stops the receiving terminal processing of chargeing.Concrete as the description in the above-mentioned method.
Receiver module among the present invention is made up of key request submodule, judgement submodule and reception submodule.
Judge that submodule is mainly used in: in the key memory block of determining receiving terminal the time become cipher key T BEK when effective, will the time become cipher key T BEK and send to the reception submodule, make to receive submodule and can utilize the key of storing in the key memory block to receive mobile multi-media program; Judge that submodule can start reception key timer T1, waits for the key that receiving end/sending end sends.Judge that submodule also can be when timer T1 be overtime, receiving terminal becomes cipher key T BEK or key refusal information when receiving never that transmitting terminal sends, then notify the key request submodule to resend Next Key Request to the key sending module of transmitting terminal, and on Next Key Request the additional condition information that receives, simultaneously, judge that submodule restarts timer T1; If receiver module becomes cipher key T BEK mistake when receiving, judge that then submodule notice key request submodule resends Next Key Request to the key sending module of transmitting terminal, and on Next Key Request the additional keys transmitting fault information.When receiving terminal stops to receive mobile multi-media program, when closing the Digital Television receiving circuit, judges that submodule stops charging request Stop Billing Request to the key request submodule to the charging control module transmission of transmitting terminal.Concrete as the description in the above-mentioned method.
The key request submodule is mainly used in: when receiving the notice of judging submodule, send key request by mobile communication system to transmitting terminal, here, the key request that the key request submodule sends is KeyRequest or is Next Key Request.Can attach the authentication information that receiving terminal is carried out authentication in the key request.The key request submodule also needs according to judging the submodule signal transmitted, sends to the charging control module of transmitting terminal to stop to charge request Stop Billing Request.Concrete as the description in the above-mentioned method.
The reception submodule is mainly used in: the information of sending according to key request submodule or key sending module becomes cipher key T BEK when obtaining, and according to the time become cipher key T BEK deciphering, obtain the encryption key of program stream, then, watch mobile multi-media broadcast program according to the encryption key of program stream.Concrete as the description in the above-mentioned method.
Encrypting module is made up of sub module stored, encryption submodule.
Sub module stored is mainly used in: condition is watched in storage restriction, as storage allow receiving terminal program receiving stream minimum amount, receive claim information etc.
The encryption submodule is mainly used in: after receiving the key request that receiving terminal sends, watch that according to the restriction of storing in the sub module stored condition is when determining to allow receiving terminal to watch mobile multi-media broadcast program, according to the cipher key T BEK that receives the encryption key of program stream is carried out encryption, and the information after will encrypting sends with program stream, when determining to forbid that receiving terminal is watched mobile multi-media broadcast program, notice key sending module sends key refusal information to receiving terminal.Encrypt submodule the time become cipher key T BEK and be about to lose efficacy in, check user's remaining sum, and judge whether receiving terminal can continue to receive mobile multi-media program stream, if Sorry, your ticket has not enough value for receiving terminal, then to the receiving terminal information that sends that Sorry, your ticket has not enough value, stop to send new key, and send the information that stops the receiving terminal charging to the charging control module to receiving terminal; Otherwise, encrypt submodule the time become cipher key T BEK and lost efficacy in, start timer T2 at this real time billing receiving terminal, wait for the new key demand signalling Next Key Request of receiving terminal.If when timer T2 is overtime, encrypt submodule and do not receive the Next Key Request that receiving terminal sends, then send the information that stops the receiving terminal charging, and stop to send key to this receiving terminal to the charging control module.Concrete as the description in the above-mentioned method.
Though described the present invention by embodiment, those of ordinary skills know, the present invention has many distortion and variation and do not break away from spirit of the present invention, and the claim of application documents of the present invention comprises these distortion and variation.

Claims (17)

1, a kind of mobile multi-media service implementation method that receives based on condition comprises: registration encryption layer, mandate encryption layer, Business Stream cipher key delivery layer and professional encryption layer is characterized in that described method comprises:
A, transmitting terminal become cipher key T BEK when authorizing encryption layer to increase, transmitting terminal is encrypted the encryption key of program stream by TBEK, and the information after will encrypting sends with program stream;
The information that b, transmitting terminal will obtain TBEK by mobile communication system is sent to receiving terminal;
C, receiving terminal obtain TBEK according to the information of its reception, according to TBEK deciphering, obtain the encryption key of program stream, and watch mobile multi-media broadcast program according to the encryption key of the program stream of described acquisition;
D, transmitting terminal are controlled charge system according to the time variable period of cipher key T BEK the charging of receiving terminal are handled.
2, a kind of mobile multi-media service implementation method that receives based on condition as claimed in claim 1 is characterized in that described step a comprises:
A1, transmitting terminal become key request when receiving the mandate encryption layer that receiving terminal sends after, when determining to allow receiving terminal to watch mobile multi-media broadcast program according to the restriction condition of watching, according to the time become cipher key T BEK the encryption key of program stream encrypted, and the information after will encrypting sends with program stream.
3, a kind of mobile multi-media service implementation method that receives based on condition as claimed in claim 2 is characterized in that the restriction condition of watching among the described step a1 comprises: the account balance of receiving terminal and/or reception authority.
4, a kind of mobile multi-media service implementation method that receives based on condition as claimed in claim 2 is characterized in that transmitting terminal comprises by the step that TBEK encrypts the encryption key of program stream among the described step a1:
Transmitting terminal is encrypted the encryption key of program stream by the ECM maker according to cipher key T BEK.
5, a kind of mobile multi-media service implementation method that receives based on condition as claimed in claim 2 is characterized in that described step a1 comprises:
A11, when receiving terminal is opened and need to receive mobile multi-media broadcast program, receiving terminal transfers to transmitting terminal with authentication information;
A12, transmitting terminal when determining to allow receiving terminal to watch mobile multi-media broadcast program according to the restriction condition of watching, according to cipher key T BEK the encryption key of program stream is encrypted, and the information after will encrypting send with program stream after to the success of receiving terminal authentication.
6, a kind of mobile multi-media service implementation method that receives based on condition as claimed in claim 5 is characterized in that described step a11 comprises:
When receiving terminal is opened and needed to receive mobile multi-media broadcast program, and when determining that the cipher key T BEK of himself storage is invalid, authentication information is transferred to transmitting terminal.
7, a kind of mobile multi-media service implementation method that receives based on condition as claimed in claim 5 is characterized in that described step a11 comprises:
The key request that receiving terminal will carry authentication information is sent to transmitting terminal.
8, a kind of mobile multi-media service implementation method that receives based on condition as claimed in claim 2 is characterized in that described step a1 comprises:
Receiving terminal according to the term of validity of the cipher key T BEK of its acquisition, regularly is sent to transmitting terminal with key request by mobile communication system in watching the mobile multi-media broadcast program process;
When described transmitting terminal determines to allow receiving terminal to watch mobile multi-media broadcast program according to the restriction condition of watching, according to cipher key T BEK the encryption key of program stream is encrypted, and the information after will encrypting sends with program stream.
9, as the described a kind of mobile multi-media service implementation method that receives based on condition of arbitrary claim in the claim 2 to 8, it is characterized in that described step a also comprises:
Transmitting terminal sends key refusal information by mobile communication system to the receiving terminal of failed authentication; Perhaps
Transmitting terminal forbids that to key the receiving terminal that receives key sends key refusal information by mobile communication system according to the restriction condition of watching; Perhaps
When transmitting terminal lost efficacy and do not receive the key request of receiving terminal once more at the cipher key T BEK of its transmission, send key refusal information to receiving terminal by mobile communication system.
10, a kind of mobile multi-media service implementation method that receives based on condition as claimed in claim 9 is characterized in that described step c comprises:
Receiving terminal judges whether receive the information of obtaining cipher key T BEK that transmitting terminal sends in the predetermined time interval;
If receive the information of obtaining cipher key T BEK that transmitting terminal sends, receiving terminal is according to the information acquisition cipher key T BEK that obtains cipher key T BEK of its reception, and according to cipher key T BEK deciphering, obtain the encryption key of program stream, then, watch mobile multi-media broadcast program according to the encryption key of described program stream;
If when not receiving the information of obtaining cipher key T BEK that transmitting terminal sends or key refusal information, send key request to transmitting terminal once more by mobile communication system.
11, as the described a kind of mobile multi-media service implementation method that receives based on condition of arbitrary claim in the claim 1 to 8, it is characterized in that the information of obtaining cipher key T BEK among the described step b comprises:
Information after cipher key T BEK being encrypted by the EMM maker according to the SIM card information of receiving terminal or registration encryption layer key information.
12, as the described a kind of mobile multi-media service implementation method that receives based on condition of arbitrary claim in the claim 1 to 8, it is characterized in that described step b comprises:
The information that signaling method or the short message mode of transmitting terminal by mobile communication system will obtain cipher key T BEK is sent to receiving terminal.
13, a kind of condition receiving system based on mobile multi-media service broadcasting, comprise: registration encryption layer, mandate encryption layer, Business Stream cipher key delivery layer and professional encryption layer, it is characterized in that, be provided with encrypting module, key sending module and charging control module in the transmitting terminal, be provided with receiver module in the receiving terminal;
Encrypting module: be used for the encryption key of program stream being encrypted, the information after encrypting is sent with program stream according at the change cipher key T BEK that authorizes encryption layer to increase, and output cipher key T BEK;
The key sending module: be used for after receiving cipher key T BEK, the information that will obtain cipher key T BEK by mobile communication system is sent to receiver module;
Receiver module: be used for obtaining cipher key T BEK, according to cipher key T BEK deciphering, obtain the encryption key of program stream, and watch mobile multi-media broadcast program according to the encryption key of program stream according to the information of its reception;
The charging control module: the time variable period control charge system that is used for the cipher key T BEK that sends according to the key sending module is handled the charging of receiving terminal.
14, a kind of condition receiving system based on mobile multi-media service broadcasting as claimed in claim 13 is characterized in that described receiver module comprises:
Key request submodule: send key request to transmitting terminal by mobile communication system;
Receive submodule: obtain cipher key T BEK according to the information of its reception, according to cipher key T BEK deciphering, obtain the encryption key of program stream, and watch mobile multi-media broadcast program according to the encryption key of program stream.
15, a kind of condition receiving system based on mobile multi-media service broadcasting as claimed in claim 14 is characterized in that described encrypting module comprises:
Sub module stored: be used for the storage restriction and watch condition;
Encrypt submodule: be used for after receiving the key request that receiving terminal sends, watch that according to the restriction of storing in the sub module stored condition is when determining to allow receiving terminal to watch mobile multi-media broadcast program, according to the cipher key T BEK that receives the encryption key of program stream is carried out encryption, and the information after will encrypting sends with program stream, when determining to forbid that receiving terminal is watched mobile multi-media broadcast program, notice key sending module sends key refusal information to receiving terminal.
16, a kind of condition receiving system based on mobile multi-media service broadcasting as claimed in claim 15 is characterized in that described receiver module also comprises:
Judge submodule: judge whether receiving terminal receives the information of obtaining cipher key T BEK that transmitting terminal sends in the interval at the fixed time, determine that receiving terminal receives that transmitting terminal sends obtain the information of cipher key T BEK the time, to obtain the message transmission of cipher key T BEK to receiving submodule, when determining not receive the information of obtaining cipher key T BEK that transmitting terminal sends or key refusal information, notice key request submodule carries out the key request processing procedure.
17, as claim 13 or 14 or 15 or 16 described a kind of condition receiving systems, it is characterized in that described system also comprises based on mobile multi-media service broadcasting:
Authentication module: the authentication information that sends according to transmitting terminal carries out authentication to receiving terminal, and when the authentication success, the notice encrypting module begins to carry out encryption process.
CNB2006100665509A 2006-03-30 2006-03-30 A kind of mobile multi-media service implementation method and condition receiving system Expired - Fee Related CN100551034C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2006100665509A CN100551034C (en) 2006-03-30 2006-03-30 A kind of mobile multi-media service implementation method and condition receiving system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2006100665509A CN100551034C (en) 2006-03-30 2006-03-30 A kind of mobile multi-media service implementation method and condition receiving system

Publications (2)

Publication Number Publication Date
CN101047829A true CN101047829A (en) 2007-10-03
CN100551034C CN100551034C (en) 2009-10-14

Family

ID=38771988

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2006100665509A Expired - Fee Related CN100551034C (en) 2006-03-30 2006-03-30 A kind of mobile multi-media service implementation method and condition receiving system

Country Status (1)

Country Link
CN (1) CN100551034C (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009106007A1 (en) * 2008-02-27 2009-09-03 华为技术有限公司 Method, system and equipment for realizing media security of iptv multicast service
CN101953111A (en) * 2007-12-21 2011-01-19 科库数据控股有限公司 System and method for securing data
CN102056161A (en) * 2009-10-28 2011-05-11 上海摩波彼克半导体有限公司 Method for realizing layered key management in wireless mobile communication network
CN101605241B (en) * 2009-07-10 2012-02-08 中兴通讯股份有限公司 Method and mobile terminal for managing mobile multimedia radio program recording permission
CN103634624A (en) * 2013-11-15 2014-03-12 四川长虹电器股份有限公司 Digital television live broadcasting method and system based on IP (Internet protocol) network
CN103686251B (en) * 2012-09-05 2017-02-22 中国移动通信集团公司 System, method and device for playing program stream in multimedia broadcasting service

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101953111A (en) * 2007-12-21 2011-01-19 科库数据控股有限公司 System and method for securing data
US8806207B2 (en) 2007-12-21 2014-08-12 Cocoon Data Holdings Limited System and method for securing data
WO2009106007A1 (en) * 2008-02-27 2009-09-03 华为技术有限公司 Method, system and equipment for realizing media security of iptv multicast service
CN101521570B (en) * 2008-02-27 2012-09-19 华为技术有限公司 Method, system and device for realizing IPTV multicast service media safety
CN101605241B (en) * 2009-07-10 2012-02-08 中兴通讯股份有限公司 Method and mobile terminal for managing mobile multimedia radio program recording permission
CN102056161A (en) * 2009-10-28 2011-05-11 上海摩波彼克半导体有限公司 Method for realizing layered key management in wireless mobile communication network
CN102056161B (en) * 2009-10-28 2015-04-22 上海摩波彼克半导体有限公司 Method for realizing layered key management in wireless mobile communication network
CN103686251B (en) * 2012-09-05 2017-02-22 中国移动通信集团公司 System, method and device for playing program stream in multimedia broadcasting service
CN103634624A (en) * 2013-11-15 2014-03-12 四川长虹电器股份有限公司 Digital television live broadcasting method and system based on IP (Internet protocol) network

Also Published As

Publication number Publication date
CN100551034C (en) 2009-10-14

Similar Documents

Publication Publication Date Title
CN1258898C (en) Method for managing symmetrical secret key in communication network, and device for carrying out such method
KR100755435B1 (en) Digital broadcasting conditional access terminal and method thereof
CN1633794A (en) ECM and EMM distribution for multimedia multicast content
RU2433471C2 (en) Method and device for authorising access
US20110099364A1 (en) Method for accessing services by a user unit
CN1465159A (en) Secure packet-based data broadcasting architecture
WO2008046323A1 (en) Mobile telephone television service protect method, system and apparatus
CN101076109A (en) Two-way CA system of digital TV-set and method for ordering and cancelling programm based on it
CN1558676A (en) Multimedia information demanding system and demanding method
CN1549595A (en) Information transmitting method and apparatus for interactive digital broadcast television system
CN101061666A (en) Method for managing digital rights in broadcast/multicast service
CN1859084A (en) Enciphering and deenciphering method for request broadcast stream media data of mocro soft media format
CN1812416A (en) Method for managing consumption of digital contents within a client domain and devices implementing this method
CN101047829A (en) Mobile multimedia service implementing method and condition receiving system
CN101060613A (en) Digital TV broadcasting service receiving and deciphering method, master terminal and its slave terminal
CN100344160C (en) Method for realizing acquisition of user on-line information
US7995755B2 (en) Method for management of access means to conditional access data
CN1845599A (en) Method for obtaining and updating service key in mobile television service
WO2006012788A1 (en) Subscriber authorizating method and authorizating system
CN1867066A (en) Digital television program broadcasting system and method
US20100333130A1 (en) Systems and methods for verifying receipt of broadcast transmissions prior to billing
CN1909465A (en) Charging method and device and system for digital multimedia broadcast system
CN1833224A (en) Copy-protecting applications in a digital broadcasting system
CN1443421A (en) Secure digital content delivery system and method over broadcast network
CN100544429C (en) A kind of mobile phone TV services content protecting method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20091014

Termination date: 20130330