Method and system for distributing service secret keys

A service key and service technology, which is applied to key distribution, can solve the problems of prolonging the delay of users waiting for service keys, increasing the burden on the server, and the huge amount of service keys. Effects of performance requirements

Inactive Publication Date: 2009-10-21
POTEVIO INFORMATION TECH CO LTD
View PDF0 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] 1) When the number of users reaches a certain level, the amount of encrypted service keys that need to be broadcast will be very large, which increases the burden on the server, wastes precious channel resources, and lengthens the delay for users to wait for the service key
[0009] 2) The hierarchical key system is based on a two-way communication network, which requires users to upload their user keys to verify the legitimacy of users, therefore, it is not suitable for one-way broadcast networks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for distributing service secret keys
  • Method and system for distributing service secret keys
  • Method and system for distributing service secret keys

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below with reference to the accompanying drawings and examples.

[0057] The main idea of ​​the present invention is: set the key seed group corresponding to each service in advance, and store the corresponding relationship between the service and the key seed group in the security area of ​​the conditional access card; Randomly select a key seed from the corresponding key seed group when keying, and include the identifier of the selected key seed in the EMM and send it to the terminal. The terminal sends the EMM to the conditional access card, and the conditional access card The corresponding relationship between the stored service and the key seed group, and the identifier of the key seed selected when the network side generates the service key determine which key seed is used to generate the service key, so that the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for distributing service secret keys; the method sets a corresponding secret key seed set aiming at each service and stores a corresponding relation between the service and the secret key seed set in a safety region of a condition receiving card; when service information needs to be broadcast, the network side selects a secret key seed from the corresponding secret key seed set to generate a service secret key; a corresponding identifier of the secret key seed contained in EMM is issued to the terminal through a broadcasting channel; the terminal sends the received EMM to the condition receiving card; the condition receiving card obtains the identifier of the secret key seed from the EMM and determines the corresponding secret key seed; and according to the secret key seed, a mode which is the same as the network side is adopted to generate the service secret key. The invention also discloses a system and the method for distributing the service secret keys. The invention is applied, can realize the user authentication and the secret key distribution in a unidirectional broadcasting network, and can reduce the broadcasting amount of the service secret key, save the channel resource and reduce the time delay for a user to wait the service secret key.

Description

technical field [0001] The invention relates to multimedia broadcasting technology, in particular to a service key distribution method and system, and a key distribution method. Background technique [0002] In the current multimedia broadcasting system, the conditional access method based on the hierarchical key system is widely used for conditional access, that is, the user key (UK) is used to encrypt the service key (SK), and the service key (SK) is used to encrypt the program stream key (CW), and use the program stream key CW to encrypt the program stream. figure 1 It is a schematic structural diagram of the hierarchical key system of the existing multimedia broadcasting system. see figure 1 , the existing hierarchical key system is divided into four layers, and the key distribution scheme based on the hierarchical key system includes the following four levels of interaction: [0003] The first layer: authentication. Through the authentication process, the mobile TV ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/32H04L12/18
Inventor 廖剑刘道斌姜涌曹会扬王晨阳杨光敏
Owner POTEVIO INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products