Method and system for on-line distributing authentication information

A technology of authorization information and signature information, which is applied in transmission systems, wireless communications, and broadcast-related systems. It can solve problems such as heavy computing loads, limited computing resources, and decryption of ciphertexts, so as to reduce computing loads, reduce costs, and ensure security. sexual effect

Inactive Publication Date: 2010-12-22
POTEVIO INFORMATION TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

On the one hand, the computing resources on the terminal side are very limited, and the decryption of authorization information usually requires a large number of calculations, resulting in a large calculation load on the terminal side; on the other hand, although the authorization information is encrypted, there is still the possibility of ciphertext The risk of being decrypted, thereby authorizing the information to be tampered with
For example, mobile terminals may not be developed according to the prescribed process
[0019] In addition, because the mobile terminal must be able to provide a trusted operating environment, the cost of the mobile terminal is high; otherwise, if the mobile terminal cannot provide a feasible operating environment, the authorization information is easily cracked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for on-line distributing authentication information
  • Method and system for on-line distributing authentication information
  • Method and system for on-line distributing authentication information

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment approach

[0072] The operator has a pair of keys: a public key and a private key. The operator stores the public key in the smart memory card and sends it to legitimate users. The operator uses its own private key to sign the authorization information, and sends it to the user's mobile terminal through the broadcast channel, and the mobile terminal sends the signed authorization information to the smart memory card. The smart memory card uses the internally stored public key to verify the integrity of the signature authorization information. If the authentication is passed, the authorization information is considered safe and complete, and the authorization information can be written into the card; if the authentication fails, the information will not be verified. deal with,.

[0073] On the basis of the above technical solution, in order to realize charging, a service authentication process can be introduced. Specifically, after the smart memory card receives the conditional access in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method used for online issuing authentication information; the method is used for issuing the authorization information to a condition accepting (CA) mobile terminal; the CA mobile terminal comprises a mobile terminal and a card which are connected with each other by an interface; the method comprises the steps as follows: firstly, the CA system signs the authorization information, gains the signature information of the authorization information, and issues the signature information and the authentication information to the mobile terminal; subsequently, the mobile terminal sends the signature information and the authentication information to the card; finally, the card verifies the signature information; if the verification is successful, the authentication information is memorized in the safety area of the card, thus ensuring the safety of the authentication information. The invention also discloses a system used for online issuing of the authorization information corresponding to the method. The method and the system can ensure the safety of the authorization, information, reduce the operation charges of the terminal side and the cost of the mobile terminal.

Description

technical field [0001] The invention relates to mobile multimedia broadcasting technology, in particular to a method and system for sending authorization information online. Background technique [0002] In the mobile multimedia broadcasting system, multimedia programs are delivered to mobile terminals in the form of broadcasting. For billable multimedia programs, in order to protect the interests of service providers, the mobile terminal is required to have the conditional access function, that is, the billable multimedia program data is transmitted after being scrambled by the CA system, and the mobile terminal must first successfully descramble the multimedia program data. to watch normally. [0003] Specifically, the process of realizing conditional access is as follows: multi-channel scrambled multimedia program data and corresponding conditional access information are multiplexed into the channel for transmission, and after the mobile terminal receives the data, the d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/06H04W12/04H04H60/91H04L9/32H04L29/06H04W12/041
Inventor 刘道斌廖剑曹会扬王晨阳岳维松杨光敏
Owner POTEVIO INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products