Method, device and terminal for processing service keys

A business key and terminal technology, applied in security devices, electrical components, wireless communications, etc., can solve problems such as unrealized user charges, and achieve the effect of avoiding being attacked and avoiding acquisition

Active Publication Date: 2014-01-29
CHINA MOBILE COMM GRP CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0016] However, there are attackable methods in this scheme. Illegal terminals can cache the MIKEY message containing the service key update. After the SD card or embedded chip is powered on and initialized, the MIKEY message is sent to the UAM, so that the UAM can A valid service key is stored, but the operator has not implemented charging for the user. This is what the operator does not want to see, and this problem must be solved technically

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and terminal for processing service keys
  • Method, device and terminal for processing service keys
  • Method, device and terminal for processing service keys

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] In order to make the technical problems, technical solutions and advantages to be solved by the present invention clearer, the following will describe in detail with reference to the drawings and specific embodiments.

[0056] The present invention aims at the problem in the prior art that the service key is easily attacked when using a pluggable storage device for mobile TV services, and provides a method that can prevent the service key from being attacked when using a pluggable storage device for mobile TV services. A method, device and terminal for processing business keys against the risk of attack.

[0057] Such as figure 2 As shown, the method for processing the service key in the embodiment of the present invention includes:

[0058] Step 21, after the smart storage device of the terminal is powered on, obtain the current service key update message sent by the service platform, the current service key update message includes: the service key and a message indi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method, device and terminal for processing service keys, wherein the method comprises the following step: after intelligent storage equipment of a terminal is electrified, acquiring a current service key updating message sent by a service platform, wherein the current service key updating message comprises a service key and an identification for representing the validity of the service key; and determining that the service key updating message is discarded when the service key is stored in the intelligent storage equipment according to the identification for representing the validity of the service key. In the scheme provided by the invention, the risk that the service key is attacked when pluggable storage equipment is used for the television service of a mobile phone can be avoided.

Description

technical field [0001] The invention relates to the field of mobile TV systems, in particular to a method, device and terminal for processing service keys of mobile TV services. Background technique [0002] In the mobile TV system, a four-layer key system is used to ensure the viewing of encrypted radio and TV programs. The implementation device on the terminal side may be a (U)SIM (Subscriber Identity Module, customer identification module) card, a pluggable storage device (eg, Secure Digital Memory Card, secure digital SD card) or an embedded chip. The implementation devices on the terminal side may be collectively referred to as: User Authentication Module (User Authentication Module, UAM for short). [0003] Such as figure 1 As shown, it is the key management system of the existing mobile TV service: [0004] The UAM on the terminal side can share the user key on the network side and the terminal side by running the GBA (Generic Bootstrapping Architecture) boot proce...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/04H04W12/06H04W12/0433
Inventor 罗红路晓明刘斐王健
Owner CHINA MOBILE COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products