Key management-based access control method suitable for pay television system

An access control and key management technology, applied in the field of access control based on key management, can solve problems such as not supporting subscription behavior well

Active Publication Date: 2019-07-12
NANJING UNIV OF INFORMATION SCI & TECH
View PDF8 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The access control scheme based on the key tree structure can flexibly support the dynamic subscription behavior of service providers and users, but each user's behavior changes will cause an average of O(logn) keys to be updated, giving users and service providers Brings huge overhead; the access control scheme based on key agreement technology is superior to the access control scheme based on the key tree structure in terms of communication overhead, but it cannot support all subscription behaviors well

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key management-based access control method suitable for pay television system
  • Key management-based access control method suitable for pay television system
  • Key management-based access control method suitable for pay television system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] In order to better understand the technical content of the present invention, specific embodiments are given together with the attached drawings for description as follows.

[0061] The present invention refers to an access control method based on key management suitable for a pay television system, and the access control method includes:

[0062] S1: Receive a subscription request sent by a user, where the subscription request includes encrypted user identity information and an index of the TV program that the user requests to subscribe to.

[0063] S2: Classify the users according to the TV program information requested by the users to subscribe, and generate a request summary table. The request summary table includes several user subsets, and each user subset includes at least one user identity information.

[0064] S3: Generate a unique session key for each user subset.

[0065] S4: Use the group encryption key negotiated by the users to encrypt the session key of ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a key management-based access control method suitable for a pay television system, which comprises the following steps of: forming a group by all users of the same video website, dividing the users into different user subsets according to the preferences of the users, wherein television programs subscribed by the users in the same user subset are the same. And the website manager encrypts the television program and the session key, and sends the ciphertext of the program and the ciphertext of the session key to the cloud server and the corresponding user respectively. And the cloud server updates the data storage table according to the data uploaded by the website manager and judges whether the request of the user is legal or not according to the data storage table.Only legal users can obtain the session key and the ciphertext of the television program at the same time, and the plaintext of the television program is further obtained through decryption. According to the invention, the privacy data of the user can be ensured not to be stolen, and the dynamic operation of the user and the service provider on the television program is supported; and computing and communication overheads of the user and the service provider are saved.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to an access control method based on key management suitable for a pay TV system. Background technique [0002] With the development of wireless technology and the popularization of smart devices, pay TV is quickly accepted by the public as a new business model. As one of the most common service models in the pay TV system, subscription-based services can support users to subscribe to any number of TV programs, and at the same time allow service providers (such as video website managers) to charge users a certain amount based on the services provided. Fees, in order to achieve the effect of users obtaining services and service parties making profits. In order to protect the interests of the service provider and the user's private data (such as religious beliefs, hobbies, etc.), the content subscribed by the user must not be transmitted on the channel in plain text. The service p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04N21/2347H04N21/254H04N21/258H04N21/266H04N21/4405H04N21/45H04N21/4623H04N21/4627
CPCH04N21/2347H04N21/2541H04N21/25866H04N21/26606H04N21/26613H04N21/4405H04N21/4508H04N21/4623H04N21/4627
Inventor 沈剑苗田田冯孟董昳晖戚荣鑫蒋玲红刘帅
Owner NANJING UNIV OF INFORMATION SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products