Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for processing service key

A technology of service key and processing method, which is applied in the field of service key processing, can solve problems such as attacks, different user identities, and illegal viewing of TV programs, and achieve the effect of preventing attacks and ensuring user experience

Inactive Publication Date: 2013-10-23
CHINA MOBILE COMM GRP CO LTD
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, when the SIM card is separated from the service key storage chip (for example, in the mobile TV service, the service key storage chip is separated from the SIM / USIM card), the user identity when obtaining the service key may be different from that of using the service different user identities at the time of the key, resulting in a possible attack
[0008] Specifically, a malicious user may use a single SIM card to obtain the service key multiple times and store the obtained service key in multiple terminals, so that multiple terminals can use the service key to illegally watch TV programs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for processing service key
  • Method and device for processing service key
  • Method and device for processing service key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] In the embodiment of the present invention, when the terminal is powered on, the service key stored in the service key storage module is deleted, thereby making up for the service security loophole caused when the service key storage chip is separated from the user authentication module, and preventing illegal users from Attack behavior, to ensure the user experience of legitimate users as much as possible. Moreover, only a small amount of modification is required to the service key storage chip in the present invention, which does not affect the business process and business logic of the terminal and platform, thereby ensuring the security requirements of the service key at a relatively small cost.

[0048]The technical solution in the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the present invention. Obviously, what is described is only a part of the present invention, not the whole. Based on the pr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses a method for processing a service key. By deleting the service key after power on reset of a device, service security breaches caused by separation between a service key memory chip and a user authentication module are made up, and attack behaviors of invalid users are prevented, so that user experiences of valid users are ensured as much as possible. In addition, according to the method in the present invention, only a few changes are needed to perform on the service key memory chip, and service flow and service logic of a terminal and a platform are not influenced, thereby ensuring safety requirements of the service key with a small cost.

Description

technical field [0001] The invention relates to the technical field of communication, in particular to a method and equipment for processing a service key. Background technique [0002] With the rapid development of mobile communication technology, more and more mobile TV services have been used. People can watch TV programs through terminals such as mobile phones; Watch TV programs on your phone. [0003] Specifically, in broadcast-based mobile TV services (for example, the multimedia broadcast multicast service MBMS of the 3rd Generation Partnership Project 3GPP, the BCAST of the Open Mobile Alliance OMA, etc.), the related operations of ordering and management are all performed through encryption and decryption. method to achieve. That is, it is first necessary to encrypt the broadcast program, and send the service key to the terminal that has subscribed the service in various ways. If the user wants to watch the TV program through the terminal, he first needs to subscr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/06H04L9/08H04W12/0433H04W12/122
Inventor 路晓明曾海涛罗红
Owner CHINA MOBILE COMM GRP CO LTD