Movatterモバイル変換


[0]ホーム

URL:


CN101110671A - Multimedia business protection and key management method based on mobile terminal - Google Patents

Multimedia business protection and key management method based on mobile terminal
Download PDF

Info

Publication number
CN101110671A
CN101110671ACNA2007101451130ACN200710145113ACN101110671ACN 101110671 ACN101110671 ACN 101110671ACN A2007101451130 ACNA2007101451130 ACN A2007101451130ACN 200710145113 ACN200710145113 ACN 200710145113ACN 101110671 ACN101110671 ACN 101110671A
Authority
CN
China
Prior art keywords
key
user
portable terminal
business cipher
multimedia service
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA2007101451130A
Other languages
Chinese (zh)
Other versions
CN100589377C (en
Inventor
肖龙安
吴飞
陈刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE CorpfiledCriticalZTE Corp
Priority to CN200710145113ApriorityCriticalpatent/CN100589377C/en
Publication of CN101110671ApublicationCriticalpatent/CN101110671A/en
Application grantedgrantedCritical
Publication of CN100589377CpublicationCriticalpatent/CN100589377C/en
Expired - Fee Relatedlegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Images

Landscapes

Abstract

The present invention discloses a multimedia service protection and key management method based on a mobile terminal. Wherein, user keys are stored in an intelligent card. Information except for user key and the user key are stored into a storage area. The method includes procedures below: A mobile terminal reads a user identification in the intelligent card and verifies whether a user key corresponding to the user identification is saved. If the user key is saved, the user selects one multimedia service. If the user key is not saved, the mobile terminal obtains the user key. Upon successful acquisition, the user selects one multimedia service. The mobile terminal verifies whether a service key corresponding to a multimedia service selected by a user is saved according to a user identification. If the service key is saved, the user utilizes the selected multimedia service with the service key. If not, the mobile terminal obtains the service key. Upon successful acquisition, the user is authorized to use the selected multimedia service with the service key.

Description

Multimedia business protection and key management method based on portable terminal
Technical field
The present invention relates to the communications field, particularly, relate to that a kind of (MobileEquipment, multimedia business protection ME) and key management method are used to realize the service protection and the key management of multimedia service distribution based on portable terminal.
Background technology
At present, the service protection of mobile multi-media service is based on hierarchical encryption system shown in Figure 1.As shown in Figure 1, each layer and relevant treatment thereof are described below:
Ground floor: authentication management.Authenticate mutually between user and the network, authentication obtains to share key by the back, share key thus and generate login key and user key in terminal and network, terminal authenticates to multi-media broadcasting service control centre by login key, after authentication was passed through, user key was used for the business cipher key encrypted transmission of carrying out subsequently.
The second layer: business cipher key management.Network based user's order relations sends business cipher key to user by cipher mode, will use user key when network is encrypted business cipher key, and terminal will be used the local user key that generates during to the business cipher key decrypt messages.
The 3rd layer: the multimedia data stream key management, data stream key is used for the ciphering multimedia data, to use business cipher key data encrypted stream secrete key on radio network or bilateral network, to transmit, and after terminal receives, use the corresponding business key that it is decrypted and promptly obtain data stream key.
The 4th layer: the multi-medium data flow management.Distribute by network after using the multi-medium data stream secrete key to multimedia data encryption, terminal uses the data stream key of deciphering to be decrypted, and can obtain multi-medium data.
In the authentication and key management of multimedia service, dual mode is arranged: a kind of key management system that is based on smart card Smart Card Profile, a kind of key management system that is based on portable terminal ME.Its mirror wooden fork and key management are respectively as shown in Figure 2.
In authentication and key management based on terminal, user terminal (UE) includes special secure storage areas, be called MGV-S (MBMS key Generation and ValidationStorage), and include key and generate and management function module MGV-F (MBMS keyGeneration and Validation Function), be used to be implemented in terminal and prevent responsive security information (as the MBMS key) leakage.The various keys of MGV-S store M BMS, MGV-F realize that the relevant various keys of multimedia service are not exposed to part not protected among the ME.
In authentication and cryptographic key protection based on ME, between user and network, authenticate mutually, authentication obtains to share key (being commonly referred to user key) by the back, and user key is kept in the smart card.When the user used multimedia service, terminal read user key from card, then at UE during to network platform requested service key, by with the mirror wooden fork flow process of network, obtain the business cipher key packets of information of encrypting, use user key to decipher, obtain business cipher key.Use business cipher key, can carry out decryption processing the multimedia service data stream of encrypting.Certainly, in some cases, need derive login key or KI through certain key algorithm in terminal, use the key of deriving to be used for to business platform requested service key the time, carrying out terminal authentication then from blocking the user key that directly obtains.
When the user had changed a different smart card, general processing method was that the original subscriber that will preserve in terminal blocks corresponding all keys (user key, registration or KI, business cipher key etc.) and deletes.Like this when the user changes card, all these user's corresponding service keys all need again to the application of multimedia service management platform, and the management method of this key uses multimedia service to make troubles to the user, and efficient is lower.
Summary of the invention
Consider the above-mentioned problems in the prior art and propose the present invention.For this reason, the present invention aims to provide a kind of multimedia business protection and key management method based on portable terminal, and it can realize the authentication of different user and the key management in the multimedia service distribution on same terminal.
In the multimedia business protection and key management method based on portable terminal according to the present invention, user key is kept in the smart card, in the memory block that the information beyond the user key and key are kept at portable terminal.
Wherein, above-mentioned user key information and key in addition comprises: the user ID of smart card, user key relevant information, business cipher key, business cipher key relevant information.The user key relevant information further comprises: the term of validity of user key, the login key of being derived by user key or mirror wooden fork key; The business cipher key relevant information further comprises: the term of validity of business cipher key.
In addition, in the memory block of portable terminal, preserve user key information and key in addition with tabular form.Like this, in the memory block corresponding, preserve user key relevant information, business cipher key and the business cipher key relevant information corresponding with the user ID of smart card with the user ID of smart card.
In the method, when mobile terminal user was used multimedia service, specifically comprise following processing: portable terminal read the user ID of smart card; Portable terminal judges whether it has preserved the user key of user ID correspondence; In judged result is under the situation that is, the user selects a certain multimedia service, judged result for situation not under, portable terminal obtains user key to the multimedia service network platform, obtain successfully after, the user selects a certain multimedia service; Portable terminal judges whether to have preserved the multimedia service corresponding service key of selecting with the user according to user ID; In judged result is under the situation that is, the user uses the multimedia service of selecting by business cipher key, is that portable terminal obtains business cipher key to multimedia service platform under the situation not in judged result, after obtaining successfully, the user uses the multimedia service of selecting by business cipher key.
In aforesaid operations, the processing that portable terminal obtains user key is specially: portable terminal and multimedia service network platform carry out the user key arrangement flow process, obtain user key, and it is stored in the smart card; Preserved under the situation of user ID in the memory block of portable terminal, the relevant information of user key has been saved in the memory block of user ID correspondence; Do not preserve under the situation of user ID in the memory block of portable terminal, add user ID, and the relevant information of user key is saved in the memory block of user ID correspondence in the memory block of portable terminal.
In addition, in aforesaid operations, the processing of mobile terminal to obtain business cipher key is specially: portable terminal reads user key, initiates the business cipher key request to network side, with the multimedia service corresponding service key of request user selection; After passing through the service authentication of network side, the multimedia service network platform obtains the business cipher key of encryption; Portable terminal obtains the business cipher key of the encryption of multimedia service network platform transmission, and uses user key that it is decrypted, and obtains business cipher key; Preserve business cipher key in the memory block corresponding with user ID.
Wherein, at network side, the login key or the mirror wooden fork key that use user key or user key to derive carry out authentication.
By the present invention, realized the key management of the service protection of multimedia distribution, make when many subscriber cards use that can effectively solve user terminal needs again problem to network authentication request miscellaneous service key on same terminal.
Other features and advantages of the present invention will be set forth in the following description, and, partly from specification, become apparent, perhaps understand by implementing the present invention.Purpose of the present invention and other advantages can realize and obtain by specifically noted structure in the specification of being write, claims and accompanying drawing.
Description of drawings
Accompanying drawing is used to provide further understanding of the present invention, and constitutes the part of specification, is used from explanation the present invention with embodiments of the invention one, is not construed as limiting the invention.In the accompanying drawings:
Fig. 1 is the schematic diagram according to the hierarchical encryption management system of prior art;
Fig. 2 is according to the authentication of prior art and the schematic diagram of key management;
Fig. 3 be according to the embodiment of the invention based on the multimedia business protection of portable terminal and the flow chart of key management method; And
Fig. 4 is the detailed process flow chart of method shown in Figure 3.
Embodiment
Below in conjunction with accompanying drawing the preferred embodiments of the present invention are described, should be appreciated that preferred embodiment described herein only is used for description and interpretation the present invention, and be not used in qualification the present invention.
According to the embodiment of the invention, a kind of multimedia business protection and key management method based on ME is provided, it can realize the authentication of different user and the key management in the multimedia service distribution on same terminal.
In multimedia business protection and key management method based on ME according to the embodiment of the invention; user key is kept in the smart card; information beyond the user key and key (for example, the user ID of smart card, user key relevant information, business cipher key, the business cipher key relevant information corresponding with user ID) are kept in the memory block of portable terminal.
Promptly; in this side; the protection and the key management of this multimedia service are based on ME's; after UE and multimedia service platform are finished registration and subscription authentication; flow process obtains user key through consultation; and user key is stored in the smart card (subscriber card), and all being stored in ME, remaining key and information carries out computing acquisition and storage administration.
Wherein, the user key relevant information further comprises: the term of validity of user key, the login key or the KI of being derived by user key; The business cipher key relevant information further comprises: the term of validity of business cipher key.Like this, when the user uses a certain multimedia service, can judge whether corresponding key is effective earlier, if effectively be edible,, then can delete this business cipher key, and ask this key to upgrade again if invalid according to the term of validity.
Preferably, in the memory block of ME, preserve user key information and key in addition with tabular form.Like this, in the memory block corresponding, preserve user key relevant information, business cipher key and the business cipher key relevant information corresponding with the user ID of smart card with the user ID of smart card.Following form shows an example of storage mode.
ID1The relevant information of user keyThe business cipher key tabulation of obtaining
ID2The relevant information of user keyThe business cipher key tabulation of obtaining
......
IDnThe relevant information of user keyThe business cipher key tabulation of obtaining
In ME, the maximum number of user that can preserve (promptly storing the quantity of the key information of subscriber card sign ID and correspondence thereof), and the quantity of preserving in user key information list and the business cipher key tabulation in each subscriber card sign corresponding storage can decide according to the ME actual conditions, and the present invention is not particularly limited this.
When the user used business cipher key deciphering multimedia service data stream, ME can find this user's corresponding service key of storage according to the sign of current smart card, is decrypted multimedia service data with it then.As shown in Figure 3, specifically can be described as following operation:
Step S302, ME read the user ID of smart card; ME judges whether it has preserved the user key of user ID correspondence;
Step S304, in judged result is under the situation that is, be directly to step S306, in judged result is under the situation not, ME obtains user key (this operation will be described in detail hereinafter) to network side business platform (multimedia service network platform), obtain under the case of successful, proceed to step S306;
Step S306, user select a certain multimedia service;
Step S308, ME judges whether to have preserved the multimedia service corresponding service key of selecting with the user according to user ID;
Step S310, in judged result is under the situation that is, the user uses the multimedia service of selecting by business cipher key, in judged result is under the situation not, ME obtains business cipher key (this operation will be described in detail hereinafter) to network side business platform (multimedia service network platform), after obtaining successfully, the user can use the multimedia service of selecting by business cipher key.
Show in detail the process that above-mentioned ME obtains user key and business cipher key among Fig. 4.As shown in Figure 4:
The processing that ME obtains user key is specially (processing 4,5 among Fig. 4): ME and multimedia service network platform carry out the user key arrangement flow process, obtain user key, and it is stored in the smart card; Afterwards, preserved under the situation of user ID, the relevant information (for example, the relevant information of the user key term of validity, derive login key or KI) of user key has been saved in the memory block of user ID correspondence in the memory block of ME; Do not preserve under the situation of user ID in the memory block of ME, add user ID, and the relevant information of user key is saved in the memory block (can be understood as) of user ID correspondence user key and user ID binding in the memory block of ME.
In addition, in aforesaid operations, the processing that ME obtains business cipher key is specially (processing 8,9 among Fig. 4): ME reads user key, initiates the business cipher key request to network side, with the multimedia service corresponding service key of request user selection; Behind the business mirror wooden fork by network side, the multimedia service network platform obtains the business cipher key of encryption, if do not pass through, then informs the user; ME obtains the business cipher key of the encryption of multimedia service network platform transmission, and uses user key that it is decrypted, and obtains business cipher key; Preserve business cipher key (can be understood as) with business cipher key and user ID binding in the memory block corresponding with user ID.
Under some particular case, ME can not directly use the user key that reads to carry out authentication, needs ME to pass through the specific key algorithm, derives login key or KI and carry out authentication with the multimedia service network platform from user key.
By the present invention, realized the key management of the service protection of multimedia distribution, make when many subscriber cards use on same terminal, can effectively solve the problem that user terminal need reflect wooden fork request miscellaneous service key to network again.
The above is the preferred embodiments of the present invention only, is not limited to the present invention, and for a person skilled in the art, the present invention can have various changes and variation.Within the spirit and principles in the present invention all, any modification of being done, be equal to replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (9)

CN200710145113A2007-08-222007-08-22 Multimedia Service Protection and Key Management Method Based on Mobile TerminalExpired - Fee RelatedCN100589377C (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN200710145113ACN100589377C (en)2007-08-222007-08-22 Multimedia Service Protection and Key Management Method Based on Mobile Terminal

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN200710145113ACN100589377C (en)2007-08-222007-08-22 Multimedia Service Protection and Key Management Method Based on Mobile Terminal

Publications (2)

Publication NumberPublication Date
CN101110671Atrue CN101110671A (en)2008-01-23
CN100589377C CN100589377C (en)2010-02-10

Family

ID=39042582

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN200710145113AExpired - Fee RelatedCN100589377C (en)2007-08-222007-08-22 Multimedia Service Protection and Key Management Method Based on Mobile Terminal

Country Status (1)

CountryLink
CN (1)CN100589377C (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
WO2010148880A1 (en)*2009-11-232010-12-29中兴通讯股份有限公司Method and terminal for implementing hot-plug of smart card
US8737616B2 (en)2008-11-132014-05-27Huawei Technologies Co., Ltd.Method and apparatus for identifying CGA public key, and method, apparatus, and system for determining CGA public key
WO2014194856A1 (en)*2013-06-082014-12-11安徽量子通信技术有限公司Method for allocating communication key based on android intelligent mobile terminal
CN105515764A (en)*2015-12-082016-04-20北京元心科技有限公司Method and device for protecting security of secret key in mobile terminal
CN109327313A (en)*2018-11-072019-02-12西安电子科技大学 A two-way identity authentication method and server with privacy protection feature
CN110740036A (en)*2019-10-312020-01-31广州知弘科技有限公司Anti-attack data confidentiality method based on cloud computing

Cited By (13)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US8737616B2 (en)2008-11-132014-05-27Huawei Technologies Co., Ltd.Method and apparatus for identifying CGA public key, and method, apparatus, and system for determining CGA public key
WO2010148880A1 (en)*2009-11-232010-12-29中兴通讯股份有限公司Method and terminal for implementing hot-plug of smart card
US8428266B2 (en)2009-11-232013-04-23Zte CorporationMethod and terminal for implementing hot-plug of smart card
US9668127B2 (en)2013-06-082017-05-30Quantumctek Co., Ltd.Method for allocating communication key based on android intelligent mobile terminal
CN104243144A (en)*2013-06-082014-12-24安徽量子通信技术有限公司 A communication key distribution method based on Android smart mobile terminal
WO2014194856A1 (en)*2013-06-082014-12-11安徽量子通信技术有限公司Method for allocating communication key based on android intelligent mobile terminal
CN104243144B (en)*2013-06-082018-03-13科大国盾量子技术股份有限公司 A communication key distribution method based on Android smart mobile terminal
CN108156180A (en)*2013-06-082018-06-12科大国盾量子技术股份有限公司A kind of communication key distribution method based on Android intelligent mobile terminal
CN108156180B (en)*2013-06-082021-04-09科大国盾量子技术股份有限公司Communication key distribution method based on Android intelligent mobile terminal
CN105515764A (en)*2015-12-082016-04-20北京元心科技有限公司Method and device for protecting security of secret key in mobile terminal
CN105515764B (en)*2015-12-082019-06-07北京元心科技有限公司A kind of method and apparatus for protecting key safety in the terminal
CN109327313A (en)*2018-11-072019-02-12西安电子科技大学 A two-way identity authentication method and server with privacy protection feature
CN110740036A (en)*2019-10-312020-01-31广州知弘科技有限公司Anti-attack data confidentiality method based on cloud computing

Also Published As

Publication numberPublication date
CN100589377C (en)2010-02-10

Similar Documents

PublicationPublication DateTitle
US10565400B2 (en)Implementation of an integrity-protected secure storage
CN102196425B (en)Quantum-key-distribution-network-based mobile encryption system and communication method thereof
CN102196422B (en)Method for preventing leakage of lost file of handheld communication terminal
CN101350718B (en) A protection method for playing content authority range based on user identification module
CN103533539A (en) Virtual SIM card parameter management method and device
CN102065148A (en)Memory system access authorizing method based on communication network
US20090254997A1 (en)Method and apparatus for content rights management
CN108683510A (en)A kind of user identity update method of encrypted transmission
CN101903889A (en)Device and method for digital right management
CN104966023A (en)Data protection system, method and apparatus
CN101562520B (en) Service key distribution method and system, and key distribution method
CN101110671A (en)Multimedia business protection and key management method based on mobile terminal
CN101711028B (en)Method for automatically protecting user data on mobile terminal
CN104123506A (en)Data access method and device and data encryption storage and access method and device
JP2008535427A (en) Secure communication between data processing device and security module
CN112507296B (en)User login verification method and system based on blockchain
CN101656583B (en)Key management system and key management method
CN107333263A (en)A kind of follow-on SIM card and mobile communication personal identification method and system
CN101415185A (en)Mobile terminal, method and system for keeping secret of platform-striding information
CN112632587B (en)Method and device for processing data by service center
CN105701390A (en)Encryption terminal remote management method, encryption terminal and manager
CN112054905B (en)Secure communication method and system of mobile terminal
CN100499470C (en)System and method for implementing prepaid services in mobile multimedia broadcast
CN101917671B (en)Method for managing authentication parameters and terminal
US7933597B2 (en)Method of registering a network, and mobile station and communication system using the same

Legal Events

DateCodeTitleDescription
C06Publication
PB01Publication
C10Entry into substantive examination
SE01Entry into force of request for substantive examination
C14Grant of patent or utility model
GR01Patent grant
CF01Termination of patent right due to non-payment of annual fee
CF01Termination of patent right due to non-payment of annual fee

Granted publication date:20100210

Termination date:20170822


[8]ページ先頭

©2009-2025 Movatter.jp