EP1842364A1 - Mit unabhängigen authentifizierungsmitteln und inhaltsneuverteilungsverfahren ausgestattete inhaltsausführungsvorrichtung - Google Patents

Mit unabhängigen authentifizierungsmitteln und inhaltsneuverteilungsverfahren ausgestattete inhaltsausführungsvorrichtung

Info

Publication number
EP1842364A1
EP1842364A1 EP06715761A EP06715761A EP1842364A1 EP 1842364 A1 EP1842364 A1 EP 1842364A1 EP 06715761 A EP06715761 A EP 06715761A EP 06715761 A EP06715761 A EP 06715761A EP 1842364 A1 EP1842364 A1 EP 1842364A1
Authority
EP
European Patent Office
Prior art keywords
content
tool
server
target device
smart card
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP06715761A
Other languages
English (en)
French (fr)
Other versions
EP1842364A4 (de
Inventor
Beom Suk Choi
Sang Hyun Ju
Hye Ju Lee
Jin Su Choi
Jin Woo Hong
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Electronics and Telecommunications Research Institute ETRI
Original Assignee
Electronics and Telecommunications Research Institute ETRI
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from KR1020060007634A external-priority patent/KR100784688B1/ko
Application filed by Electronics and Telecommunications Research Institute ETRI filed Critical Electronics and Telecommunications Research Institute ETRI
Priority to EP10178156A priority Critical patent/EP2309731A1/de
Publication of EP1842364A1 publication Critical patent/EP1842364A1/de
Publication of EP1842364A4 publication Critical patent/EP1842364A4/de
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/16Analogue secrecy systems; Analogue subscription systems
    • H04N7/162Authorising the user terminal, e.g. by paying; Registering the use of a subscription channel, e.g. billing
    • H04N7/163Authorising the user terminal, e.g. by paying; Registering the use of a subscription channel, e.g. billing by receiver means only
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/254Management at additional data server, e.g. shopping server, rights management server
    • H04N21/2541Rights Management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/258Client or end-user data management, e.g. managing client capabilities, user preferences or demographics, processing of multiple end-users preferences to derive collaborative data
    • H04N21/25808Management of client data
    • H04N21/25816Management of client data involving client authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/80Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
    • H04N21/81Monomedia components thereof
    • H04N21/8166Monomedia components thereof involving executable data, e.g. software
    • H04N21/8193Monomedia components thereof involving executable data, e.g. software dedicated tools, e.g. video decoder software or IPMP tool
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/80Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
    • H04N21/83Generation or processing of protective or descriptive data associated with content; Content structuring
    • H04N21/835Generation of protective data, e.g. certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/80Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
    • H04N21/83Generation or processing of protective or descriptive data associated with content; Content structuring
    • H04N21/835Generation of protective data, e.g. certificates
    • H04N21/8355Generation of protective data, e.g. certificates involving usage data, e.g. number of copies or viewings allowed

Definitions

  • the present invention relates to a content providing service method
  • DRM digital rights management
  • a conventional conditional access system (CAS)
  • each of broadcasting station In a conventional broadcasting system, each of broadcasting station
  • servers (broadcasters) uses its own specific protection mechanism for a
  • STB set-top-box
  • the present invention is directed to strengthening of security and/or
  • the present invention is also directed to a content execution device for
  • the present invention is directed to a method of efficiently
  • the present invention is directed to a method of
  • the present invention is directed to a method of
  • One aspect of the present invention provides a content execution
  • an independent authentication unit for storing a tool
  • Another aspect of the present invention provides a content
  • method including the steps of: in the user device, requesting a broadcasting
  • Yet another aspect of the present invention provides a content
  • Yet another aspect of the present invention provides a method for re ⁇
  • target device the method including the steps of:
  • station server to the target device; in the target device, connecting to the
  • Yet another aspect of the present invention provides a method for re ⁇
  • method including the steps of: checking whether or not re-distribution of the
  • Yet another aspect of the present invention provides a method for re ⁇
  • the method including the steps of: checking whether or not re ⁇
  • Yet another aspect of the present invention provides a method for re ⁇
  • the method including the steps of: receiving the content, use tool
  • Yet another aspect of the present invention provides a method for
  • the method including the steps of:
  • the source device is permitted; requesting a tool server for transmission of a
  • portable tool (hereinafter, referred to as “portable tool”)
  • Yet another aspect of the present invention provides a method for
  • conversional re-distributing content from a source device to an external target device including the steps of: checking whether or not
  • invention employs the smart card for user authentication and/or content
  • broadcasting non-subscribers also can execute broadcast content within a
  • content protected by a copyright protection device can be executed in different multimedia devices such as a PDA, as well as a content
  • FIG. 1 illustrates a structure of a content broadcasting system capable
  • FIG. 2 is a block diagram illustrating a structure of a content execution
  • FIG. 3 is a block diagram illustrating a structure of a tool pack, which
  • FIG. 4 is a block diagram illustrating a content providing service
  • FIG. 5 is a block diagram illustrating a content service providing
  • FIG. 6 is a block diagram illustrating a content service providing
  • FIG. 7 is a block diagram illustrating a content re-distribution method
  • FIG. 8 is a block diagram illustrating a content re-distribution method
  • FIG. 9 is a block diagram illustrating a content re-distribution method
  • Content execution device 110 Authentication support module
  • Tool agent 130 Content execution unit
  • Tool storage unit 220 Authentication module
  • Authority storage unit 300 Broadcasting station server
  • the present invention can be used together with various types of digital content
  • a producer server of a content provider includes a producer server of a content provider; a transmission server 300-1
  • a clearing house 300-2 for authenticating the respective subscribers and/or content
  • a tool server 400 for managing tools for
  • the producer server which is a server for authoring information for
  • the producer server registers content to be broadcasted with the
  • clearing house 300-2 receives information (e.g. a content ID, a clearing
  • the producer server determines a tool to be applied to the content
  • tool information (a tool ID and a tool descriptor).
  • the producer server can
  • CP can be operated as CP or SP.
  • the transmission server 300-1 serves to receive the protection stream
  • domain controller content execution device 100 of the service subscriber.
  • the protection stream can be converted to have
  • the protection stream can be also converted by the tool registered with the tool
  • the tool server 400 for managing tools applied to the broadcast
  • the tool server 400 can include a server for registering the
  • the tool server 400 is for downloading the tools stored in a smart card of
  • the clearing house 300-2 a kind of a server system, takes charge of a
  • the clearing house 300-2 may be
  • integrally providing digital broadcasting may be an authentication system
  • the producer server the clearing house 300-2, the transmission server
  • the tool server 400 belong to a broadcasting server domain that is a
  • broadcasting sever 300 are collectively called a broadcasting sever.
  • domain system having a plurality of content execution devices and/or a
  • 300-2 can have device and/or user information included on a home domain-
  • an authentication execution module can perform a
  • the content execution device of this embodiment can be any one of the domain-by-home domain basis.
  • the content execution device of this embodiment can be any one of the domain-by-home domain basis.
  • the home domain refers to one home domain controller
  • One home domain controller defines one home domain, and each
  • home domain includes a plurality of users and devices. It can be embodied
  • controller combines one multimedia player by itself, and can also be embodied
  • domain controller performs an important role in defining each home domain
  • the content execution device of FIG. 2 is an exemplary embodiment
  • an independent authentication module is embodied as the smart card
  • an authentication support module 110 for providing a user authentication channel between the connected smart card 200 and the external
  • the connected smart card 200 and a content execution unit 130 for executing
  • the authentication smart card 200 connected to the content execution
  • device 100 of this embodiment is comprised of a smart chip having an
  • CPU embedded central processing unit
  • EEPROM storage memory
  • authentication smart card 200 includes a tool storage unit 210 for storing tools
  • an authority storage unit 230 for storing
  • authentication module 220 for performing mutual authentication for the
  • the smart card 200 can also be embodied as an RF card employing an
  • the authentication support module 110 can include a contact type
  • the content execution unit 130 and the tool agent 120 can be any type of smart card.
  • the content execution unit 130 and the tool agent 120 can be any type of smart card.
  • arithmetic memory such as a RAM for loading the program.
  • execution unit 130 has a similar structure and operation as a general
  • execution unit 130 can call the tool agent 120.
  • the tool agent 120 serves to
  • the content execution device 100 of this embodiment can further control
  • broadcasting station server 300 using a remote communication channel such as
  • the tool storage unit 210 and the authority storage unit 230 can be
  • the authentication module 220 can be embodied by a CPU core embedded in
  • the smart card one chip inside the smart card and a corresponding program.
  • serial communication interface capable of performing
  • the tool storage unit 210 is for storing
  • the authority storage unit 230 stores identification information of
  • information e.g. key information, and certificate
  • broadcasting station and having an issued smart card can execute broadcast
  • authentication module 220 can hold a security key (a symmetric key method
  • Mutual authentication refers to a
  • smart card authentication method including authentication of the broadcasting
  • Mutual authentication is a technology widely used in the
  • tool agent 120 is more useful in an embodiment
  • tool pack structure is a software and data package
  • tool pack ; a tool agent that is original data before being loaded as the tool agent of FIG. 2; and tool group possessing at least one tool program activated
  • type of content data providing service such as public broadcasting or Internet
  • tool pack structure may further include a tool pack signature value for
  • the tool pack information can include a tool server URL indicating a position
  • the content data is
  • the tool program is for a separate encoding/decoding process. While
  • the activated tool agent can call
  • the tool agent is called by the external device or the application program
  • tool pack data storage efficiency can be improved, though
  • broadcasters transmit their tool information and tool initialization information together with content.
  • the broadcasters "A” and “B” transmit their protection
  • the tool server of a tool registration authority (TRA).
  • TRA tool registration authority
  • a user registers, manages, and transmits a new tool to an end user (device).
  • the user "C” desires to subscribe to a new paid channel service from
  • the structure shown is embodied using the key information as a
  • the key information is used for generating
  • the smart card 200 a descrambling key in the smart card 200.
  • the smart card 200 the
  • structure may be more complex, and may use a certificate having a format
  • the smart card having the embedded subscription certificate to any device (e.g.
  • broadcaster "B" includes steps of, in the user device 100 connected with the
  • the broadcasting station server 300 requested to transmit the broadcast
  • the content by the user device 100 transmits the tool information including a tool version to the user device 100 together with the content.
  • the tool information may further include a seed number for
  • the user device 100 receiving the content data confirms whether or not there
  • the content is executed (played) using the suitable tool.
  • a user "C” receives the paid channel service from the
  • a content execution device including smart card
  • the tool information including a tool version
  • the user device connects to a broadcasting station server positioned at a
  • the tool or the tool link can be broadcast together
  • the tool transmission request procedure The tool transmission request procedure
  • the tool server 400 receiving the tool transmission request performs a
  • the tool transmission procedure includes
  • a user "C” subscribes to the broadcasting station "A" and a
  • the source device of the user "C" which applies to this scenario, includes steps of checking whether or not the content intended to be re-distributed are
  • the re-distribution permission checking step (S310) is performed such
  • the bibliographic information may not be encrypted.
  • target device 100-2 in the external broadcasting station server 300 may be any target device 100-2 in the external broadcasting station server 300.
  • inventions preferably have inherent identification values such as a media access
  • the content execution device can be any type of code (MAC).
  • MAC code
  • the inherent identification value for example, a MAC value or
  • the authenticating step of the target device 100-2 can include the steps
  • the requested tool server may
  • the tool can be used.
  • the step of requesting content execution permission (S330) is
  • target device 100-2 requests the broadcasting station server 300 of the broadcasting station holding rights to the content for
  • the broadcasting server 300 decides whether or not to
  • the target device 100-2 plays
  • the permission may
  • the scenario includes steps of checking whether or not the content intended to
  • the step of checking re-distribution permission (S410) can be
  • the bibliographic information is preferably encrypted.
  • the bibliographic information may not be encrypted.
  • the step of receiving authentication of the target device (S420) is a first step of receiving authentication of the target device (S420)
  • broadcasting system of the present invention preferably have inherent
  • identification values such as a media access code (MAC).
  • MAC media access code
  • the content execution device can be identified using the inherent identification
  • MAC value for example, a MAC value or an identification number allotted with
  • the step of receiving authentication of the target device (S420) can be any one of the target device (S420).
  • the authenticating step (S424) the
  • identification value of the target device may be searched for within the DB to
  • connection with the broadcasting server may be made to directly
  • target device 100-2 is information on the tool used for playing the
  • the target device 100-2 may
  • the source device 100-1 The source device 100-1.
  • the target device 100-2 plays the
  • the target device 100-2 may play the re-distributed content
  • broadcasting station registers a tool for playing the portable-device with the
  • the portable device generally has low performance in playing the
  • the content requires conversion to a suitable
  • a user "C” stores the broadcast
  • the device of the user "C”, applied to this scenario, includes steps of: checking
  • broadcasting station server 300 for permission to perform altered
  • the bibliographic information is preferably
  • any one of the service domains e.g. a home domain.
  • a list of devices including portable devices
  • the smart card and serving primarily to receive content from the broadcasting
  • the step of downloading the portable tool (S520) is performed in the
  • target device 100-3 is mostly used in an offline state.
  • the source device 100-1 In the content transmission step (S540), the source device 100-1
  • a wired/wireless communication means (generally,
  • the target device 100-3 may receive only the
  • the target device 100-3 executes the
  • the initially provided content in the source is the initially provided content in the source
  • device 100-1 may be converted into portable content in the broadcasting
  • the content is converted in the source device 100-1, less communication is required. In this case, the content

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Databases & Information Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Graphics (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
EP06715761A 2005-01-26 2006-01-26 Mit unabhängigen authentifizierungsmitteln und inhaltsneuverteilungsverfahren ausgestattete inhaltsausführungsvorrichtung Withdrawn EP1842364A4 (de)

Priority Applications (1)

Application Number Priority Date Filing Date Title
EP10178156A EP2309731A1 (de) 2005-01-26 2006-01-26 Inhaltsausführungsvorrichtung mit unabhängigen Authentisierungsmitteln und Verfahren zur Weiterverteilung von Inhalten

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
KR20050007143 2005-01-26
KR1020060007634A KR100784688B1 (ko) 2005-01-26 2006-01-25 독립 인증 수단을 가지는 콘텐츠 실행 디바이스 콘텐츠 실행 방법 및 콘텐츠 재배포 방법
PCT/KR2006/000308 WO2006080814A1 (en) 2005-01-26 2006-01-26 Contents execution device equipped with independent authentication means and contents re-distribution method

Publications (2)

Publication Number Publication Date
EP1842364A1 true EP1842364A1 (de) 2007-10-10
EP1842364A4 EP1842364A4 (de) 2010-02-03

Family

ID=36740769

Family Applications (1)

Application Number Title Priority Date Filing Date
EP06715761A Withdrawn EP1842364A4 (de) 2005-01-26 2006-01-26 Mit unabhängigen authentifizierungsmitteln und inhaltsneuverteilungsverfahren ausgestattete inhaltsausführungsvorrichtung

Country Status (2)

Country Link
EP (1) EP1842364A4 (de)
WO (1) WO2006080814A1 (de)

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6055314A (en) * 1996-03-22 2000-04-25 Microsoft Corporation System and method for secure purchase and delivery of video content programs
CA2284014A1 (en) * 1997-03-21 1998-10-01 Canal + Societe Anonyme Smartcard for use with a receiver of encrypted broadcast signals, and receiver
FR2834406A1 (fr) * 2001-12-28 2003-07-04 Thomson Licensing Sa Procede de mise a jour d'une liste de revocation de cles, d'appareils ou de modules non-conformes dans un systeme de diffusion securise de contenu
KR100467929B1 (ko) * 2002-02-28 2005-01-24 주식회사 마크애니 디지털 컨텐츠의 보호 및 관리를 위한 시스템

Also Published As

Publication number Publication date
WO2006080814A1 (en) 2006-08-03
EP1842364A4 (de) 2010-02-03

Similar Documents

Publication Publication Date Title
US7299362B2 (en) Apparatus of a baseline DVB-CPCM
US8151342B2 (en) Contents execution device equipped with independent authentication means and contents re-distribution method
JP4854753B2 (ja) Mpegipmpコンテンツにおける権利の分配形ipmp装置メッセージングおよび多重化の方法
CN1278558C (zh) 用于条件使用的方法和系统
US20040139312A1 (en) Categorization of host security levels based on functionality implemented inside secure hardware
US20030140009A1 (en) License management system, license management device, relay device and terminal device
US20110239287A1 (en) Method for sharing content
KR20110004333A (ko) 스트림에서의 레코딩가능한 콘텐트의 프로세싱
JP4856168B2 (ja) ツールパック構造及びコンテンツ実行デバイス
KR101705010B1 (ko) 스트림에서의 레코딩가능한 콘텐트의 프로세싱
CN1610914A (zh) 用于数字权限管理的方法和设备
WO2006071495A2 (en) Flexible pricing model for persistent content
CN101123503A (zh) 一种电子文件在通讯网络中传播时的加解密方法
CN101584212B (zh) 用于控制对加密的数字内容进行访问的方法
US20090044241A1 (en) Broadcasting content protection/management system
US20060107045A1 (en) Method for verifying validity of domestic digital network key
JP4252280B2 (ja) ベースラインdvb−cpcmの装置
KR101073836B1 (ko) 저작권보호 시스템에서의 효율적인 디지털콘텐츠 라이센스관리 및 운영방법
EP1842364A1 (de) Mit unabhängigen authentifizierungsmitteln und inhaltsneuverteilungsverfahren ausgestattete inhaltsausführungsvorrichtung
CN109005427B (zh) 加密视频播放方法、装置及设备、存储介质
WO2008031292A1 (en) Encrypting method for hard disk in set top box of cable television system
CN107547946B (zh) 在互联网数据通信网络上传输流媒体数字内容的方法及介质
CN102414693B (zh) 导入内容的方法和设备
KR20090006055A (ko) 콘텐트 보호 방법

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20070820

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU LV MC NL PL PT RO SE SI SK TR

DAX Request for extension of the european patent (deleted)
A4 Supplementary search report drawn up and despatched

Effective date: 20100107

RIC1 Information provided on ipc code assigned before grant

Ipc: H04N 5/00 20060101ALI20091229BHEP

Ipc: H04N 5/44 20060101AFI20060809BHEP

17Q First examination report despatched

Effective date: 20100416

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20101027