Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for processing service key

A technology of service key and processing method, which is applied in the field of service key processing, can solve problems such as different user identities, attacks, and illegal viewing of TV programs, and achieve the effect of ensuring user experience and preventing attacks

Inactive Publication Date: 2011-06-29
CHINA MOBILE COMM GRP CO LTD
View PDF2 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, when the SIM card is separated from the service key storage chip (for example, in the mobile TV service, the service key storage chip is separated from the SIM / USIM card), the user identity when obtaining the service key may be different from that of using the service different user identities at the time of the key, resulting in a possible attack
[0008] Specifically, a malicious user may use a single SIM card to obtain the service key multiple times and store the obtained service key in multiple terminals, so that multiple terminals can use the service key to illegally watch TV programs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for processing service key
  • Method and device for processing service key
  • Method and device for processing service key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] In the embodiment of the present invention, when the terminal is powered on, the service key stored in the service key storage module is deleted, thereby making up for the service security loophole caused when the service key storage chip is separated from the user authentication module, and preventing illegal users The attack behavior, as far as possible to ensure the user experience of legitimate users. Moreover, the present invention only needs to make a small amount of changes to the service key storage chip, and does not affect the service process and service logic of the terminal and the platform, thereby ensuring the service key security requirements at a relatively small cost.

[0048] The technical solutions of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the present invention. Obviously, what is described is only a part of the present invention, but not all of it. Based on the present invent...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses a method for processing a service key. By deleting the service key after power on reset of a device, service security breaches caused by separation between a service key memory chip and a user authentication module are made up, and attack behaviors of invalid users are prevented, so that user experiences of valid users are ensured as much as possible. In addition, according to the method in the present invention, only a few changes are needed to perform on the service key memory chip, and service flow and service logic of a terminal and a platform are not influenced, thereby ensuring safety requirements of the service key with a small cost.

Description

Technical field [0001] The present invention relates to the field of communication technology, in particular to a method and equipment for processing service keys. Background technique [0002] With the rapid development of mobile communication technology, mobile TV services have also received more and more applications. People can watch TV programs through mobile phones and other terminals; in the existing mobile TV services, you need to subscribe to mobile TV services before you can Watch TV shows on your mobile phone. [0003] Specifically, in broadcast-based mobile TV services (for example, the multimedia broadcast multicast service MBMS of the 3rd Generation Partnership Project 3GPP, the BCAST of the Open Mobile Alliance OMA, etc.), the related operations of subscription and management are all encrypted and decrypted. Method to achieve. That is, the broadcast program needs to be encrypted first, and the service key is sent to the terminal that has subscribed to the service i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04L9/08H04W12/0433H04W12/122
Inventor 路晓明曾海涛罗红
Owner CHINA MOBILE COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products