The present invention relates in general to digital rights management, and in particular to digital rights management for data content and applications in devices connected to cellular networks.
Software applications and data files representing video signals or sound tracks are today often transmitted between a service provider and an end user. Since many of these applications and data files are associated with an authorization to use the application or file, e.g. connected to payments, there are many different kinds of digital rights management systems available. Digital rights management solutions are being standardized (e.g. in OMA) and several are already used in media formats such as video and music. The present development in mobile phones tends to incorporate more and more alternative communication systems, such as Internet connections, IR or Bluetooth connections, receivers of radio and/or TV signals etc. Digital rights management is therefore also introduced in mobile phones, controlling how applications and media files can be used in mobile phones.
Prior art solutions of digital rights management are typically based on encryption and decryption of the digital entity in question, using a key that is known exclusively by the authorized parties. Such keys can be distributed in many different ways, e.g. by ordinary mail, secure e-mail or other secure signalling. The keys are typically changed intermittently, either to provide a tool to restrict the authorization in time or to prevent unauthorized parties to break the codes.
In non-cellular communications systems, such as wired and/or wide or local network communications systems, the users and the connection configuration are typically known, at least by a server controlling the system or part thereof. In a typical case, members may join and leave a group of identified users, i.e. users connect to different sessions. The connection to a session is typically performed by sending control messages between the server and the user equipment. The users may then have their individual keys already upon connection, or they may be provided by an individual key during that session.
One example of such a keys distribution in a wide area network system is disclosed in U.S. Pat. No. 6,684,331, where efficient distribution of group session keys and private keys is achieved by means of a tree structure. This solution, and similar solutions referred to therein, are session based and are dependent on that an actual tree structure is both present and known. Such solutions are therefore obviously not applicable in cellular communications systems.
A general problem with prior art digital rights management for devices connected to cellular communications networks is that key handling is slow and/or requires extensive signalling. A subsidiary problem is that downloading of applications and/or media files occupies relatively large resources in a cellular communications system.
An object of the present invention is to provide improved methods and devices for handling of secure data entities for use in devices connected to a cellular communications system. A further object of the present invention is to reduce the amount of signalling required for key handling and/or downloading of secure data entities.
The above objects are achieved by methods and devices according to the enclosed claims. In general words, at least parts of broadcast control messages used by a cellular communications system to which an intended user is connected are used for obtaining keys for encoding and decoding secure data entities. Since the broadcast control messages are sent continuously, the invention works without additional signalling when the application or content is actually used. The broadcast control messages can also be different from time to time and/or from cell to cell, which opens up for usage restrictions both in space and in time. The present invention can also be operable on secure data entities provided in any transmission format supported by the user device, not only for secure data entities provided through the cellular communications system itself. The present invention is also possible to implement on systems, where the actual decoding is performed in a unit, separate from but connected to the cellular network user device.
One main advantage with the present invention is that no additional user specific signalling is necessary at the occasion for accessing the secure data entity. Moreover, the authorization for access to the secure data entity can be time and/or position dependent. Furthermore, since the method can be made operable on data entities transferred to the user device, or any device in connection therewith, using any communication technology, download utilization of radio resources in the cellular communications network may be avoided.
The invention, together with further objects and advantages thereof, may best be understood by making reference to the following description taken together with the accompanying drawings, in which:
FIGS. 9A-D are schematic illustrations of embodiments of hierarchical content structures in broadcast control signals that can be used in the present invention;
In the present disclosure, “Mobile Station” (MS), “Mobile Phone”, “Mobile Terminal” and “Handset” all refers to the device connected to the cellular communications system. This device is typically a mobile telephone, hand held computer (PDA) or other device/apparatus equipped with a radio receiver for cellular/mobile network.
The term “position” means in the present disclosure a geographical position given as coordinates or degrees (e.g. the WGS-84 datum). It may also contain orientation and/or heading, speed, acceleration etc. A position may also be given as a relative measure.
The term “location” is a more subjective position defined by the type of (or relation to) facility or place. Examples of locations are: “military area/facility”, “hospital”, “office”, “theatre”, “near emergency exit”.
In cellular communications systems, the conditions are completely different compared with wired systems or systems having a defined network structure. A configuration of a network as e.g. a tree structure is impossible to achieve in cellular communications systems, since communications in a cellular structure is based on communication between a number of user equipments and a central base station. Furthermore, since the transmissions are made in a publicly available medium, the radio ether, the signals may be available for users that are unknown by the base station. In other words, “broadcasting” of signals in a wired system has completely different characteristics than broadcasting of signals in a wireless system. In a wired system or defined network based system, even a “broadcast” signal is known to reach only a limited number of identified users, whereas in a wireless system a broadcast signal can be received by virtually any user within signal range. This difference in broadcast properties has advantages as well as disadvantages. A main disadvantage of cellular broadcasting is that also unauthorized users may detect the signal. In order to restrain unauthorized use, the content has to be arranged in such a way that it is unusable for any unauthorized party. A main advantage of cellular broadcasting is instead that there is a possibility to distribute information to a user without the need for the user to be actually actively connected in a running session with the communications system, but can instead just be passively residing in the cell area of a base station.
In the present invention, an important part is that a broadcasted control message in a cellular system is used as a lock or for authorization control purposes when distributing application or media files to a mobile phone user. By “blending” a SMSCB message (in GSM embodiments), or a function of the message, with the content file sent to the mobile phone, the SMSCB message received by the phone can be used as a key to unlock the content. The content can also be built in such way that it differs depending on the current SMSCB message. This means that it is possible to create e.g. coupons where the coupon is unique for the user, the time it is used and/or the location. All this is possible to achieve without having to make any dedicated signalling when the data content or application is opened or executed.
In
A service provider 28 at the Internet 26 produces data entities, which are intended for the user 10, to be opened or used under certain agreements. An encoding unit 27 has a connection 25 to the broadcast message control node 21 in the core network 18, and is provided with information about which broadcast messages that are going to be used when and where. Depending on the agreement between the service provider 28 and the user 10, a broadcast message is selected and at least a part of this message is used as a part of the encoding procedure, to produce a secure data entity that can not be freely accessed, i.e. at least not opened, executed or properly decoded. The encoders thereby “blends” the original content with a function of the broadcast message. The encoded data entity is communicated to the intended end user 10, in this embodiment by using the ordinary data transferring capacities in the communications system. The last part of this transfer takes e.g. place over a dedicated downlink user data signalling 12 from the base station antenna 14 to the user terminal 10. The encoded data entity is received in an application 8 in a user plane of the mobile terminal 10.
In order to be entitled to access the real content of the data entity, the encoded data entity has to be decoded. The decoding is at least partially based on a data representing the broadcast message, provided by the broadcast message receiver 6 in the mobile terminal 10 control plane. In this way, the content can not be accessed, i.e. not opened, executed or properly decoded, unless the mobile terminal 10 receives a broadcast messages that is compatible with the data entity coding. If the data entity is a link in e.g. a browser, the actual access for the associated data file is prohibited, unless the broadcast message is compatible. Since the broadcast messages can be changed with time and/or cell, the access to the data entity can be controlled in the same aspects.
The broadcast control message is thus used to provide an authorization key for the secure data entity. Such an authorization key may also be based on an identity associated with the user terminal. In such a way, the use is restricted to a particular user.
A typical signalling sequence is shown in
At a certain occasion 32, a user decides to request an access to an data entity from the service provider 28. A request message 34 is sent from the user plane 9 of the mobile terminal 10 to the service provider. The black arrow represents signalling on a user channel, e.g. GPRS, WAP or a UMTS data transport channel. The service provider 28 receives the request and determines an intended validity, in time and space, of access to the requested data entity. In this embodiment, a request 36 for information about future broadcast messages is sent from the service provider 28 to the cellular network 18. The cellular network 18 responds with information 38 about broadcast control messages that will appear at the requested times and locations. The service provider 28 uses this information and encodes 40 the data entity into a coded data entity. This coded data entity is returned 41 to the user terminal 10. The user can now store the received encoded data entity, temporarily or more permanent, or may access it right away. At occasion 42, the user makes an attempt to access the encoded data entity. A request 44 is put from the user plane application supporting the access attempt to the control plane 7 of the user terminal 10. The functionality keeping track of broadcast control messages replies 46 by providing the presently valid broadcast message. The data entity is decoded 48 using at least a part of the broadcast message in the decoding procedure, and at occasion 50, the user may make use of the content of the data entity.
The secure data entity is in one embodiment a data file. This data file may e.g. represent a video sequence, a sound recording, a database etc. The secure digital entity can also be e.g. an application software.
In the embodiment of
In
In
The embodiment of
In an alternative embodiment, illustrated in
In such a way, one may bring the pay-TV subscription by the mobile terminal, without any need for providing any decoder cards or decoder units. As an example, if a subscriber rents a hotel room having a TV set according to the above ideas, the “home” subscription may follow the user. A stream of media channels to the TV set could be coded according to the above principles. A guest may use the mobile terminal to “log on” to the TV set and supply a valid decryption code or suitable parts of the broadcast message.
The actual decoding or authorization can thus be performed in a device, separate from but connected to a mobile terminal 10. The mobile terminal 10 provides in such a case only the necessary broadcast information while the actual decoding is performed elsewhere. Anyone skilled in the art realizes that even if the device 11′ in the embodiment above is a TV set, any device capable of accessing data entities may be used as well, such as different types of media players, computers etc.
The provision of the actual data entity can be performed in any possible manner. The data entity could even be stored in a data memory, e.g. a compact disc or memory card, and be physically transported to the end user, where it is made accessible to the user terminal. The content can still be protected against unauthorized use, since an appropriate broadcast message has to be provided to admit access to the content.
The advantage with such an embodiment, is that if the data entity itself is large, the cellular network does not have to be loaded by transferring the data entity. Instead, more efficient transferring methods can be used. Nevertheless, when accessing the data entity, the access rights are still managed by the cellular network, and does not cause any additional signalling at all, since the broadcast message is a standard part of the control messages, that are always transmitted.
A block scheme of an embodiment of an encoder according to the present invention is illustrated in
The secure data entity is communicated in any manner to the intended user terminal and the user terminal experiences the broadcast control messages from its cellular communications network.
In other words, the encoded file is sent to the users mobile phone. In the phone, a media player or execution environment reads the message sent on the SMSCB channel, and decodes the encoded file using this. If the received SMSCB message, or at least the parts used for encoding, differs from the SMSCB message used when encoding the media, the decoding will fail. The encoding can also be performed in such a way that more than one SMSCB message can be used for opening the encoded file.
The encoders do not necessary use the entire SMSCB message as it is. It can provide the necessary symbol sequence as encrypted variants of the message, perhaps also including other information, such as user unique ID. It can also use only selected parts of the message.
In particular embodiments, e.g. where the secure encoded data file is provided through broadcast signalling of any kind, additional security may be obtained if the decoder 91 further need information 93 about the decoding function f−1 itself. This is indicated by the dashed arrow in
The solution has some aspects in common with cable television services with a receiver box and a subscriber card. In such cable TV systems, the broadcast content is encoded with a unique code. In the decoder box, the subscriber puts a card with one or several codes used to decode the broadcast signal. Hence, the encoding-decoding procedure is similar. The difference here is that the code used to decode the media, is at least partly broadcast on a control channel. This makes it possible to have a content or application protecting system without distributing codes on cards. It is also possible to have a geographical dimension, and one can allow the user to store the encoded content/application and even share it with his or her friends, e.g. with memory cards, Bluetooth, IR or a P2P network, and still have full control over how, when and where and by whom, it can be used.
A block scheme of an embodiment of a device receiving and decoding secure data entities according to the present invention is illustrated in
Control plane routines in a mobile terminal are very difficult to manipulate. In most cases, software is securely locked for unauthorized manipulation. The decoding part of the present invention is based on a symbol sequence obtained directly from a certain well-defined register in the control plane part of the mobile terminal. In this way, it is believed that manipulation of a device according to the present invention is prevented, at least to a certain degree. The user has no possibility to manipulate the register containing the broadcast message or any symbol sequence deduced therefrom. Even though the broadcast control message is publicly available for anyone connected to the cellular network, such information is anyway difficult to utilize for unauthorized use.
In GSM the SMSBC message consists of 88 octets segmented into four 22 octet blocks. The message header consists of six octets used to signal if the message is a new one or not. If the number is the same as the number of the already decoded message, the message is the same and the terminal will not decode the message again. If the number is a new one, it is a new message and the terminal will decode it. The majority of the remaining parts of the SMSBC message corresponds to the actual broadcast control message.
It is possible to construct a hierarchical structure of the SMSBC, which determines time duration and spatial position. This can be used to decide where and when the content of a secure data entity should be “decodeable” by the user. The examples below are shown for an intended use in GSM, but similar hierarchical structures can be constructed for any cellular communication systems having broadcast control messages.
In a hierarchical SMSCB structure 100, the 66 octets in the message are varied in a scalable way, with reference to
In a similar way, as shown by
In
In
Above, the time and spatial dependencies are restricted to one octet each. One may realize that such dependencies may be built by smaller and/or larger building blocks, comprising e.g. parts of octets or a multitude of octets.
As indicated further above, a certain service may use certain parts of the 88 octets. In such a way, a broadcast message may serve as key to different services at the same time. More than one set of structures according to the FIGS. 9A-D can thus be present in different configurations in one and the same broadcast message.
The present invention presents a solution to add a media an/or application lock based on existing 3GPP radio network standards, making it possible to restrict media content and applications where and when to be used based at least on the users position, and/or time. Once the data is transferred to the final user, the invention operates without any additional signalling at the occasion when the application or data content is to be used. Hence, the lock works perfectly on mobile phones also in idle mode. There is no need to go to dedicated mode for signalling with authorization servers in the network. Instead of application layer signalling between terminal clients and content servers, the control layer features of the mobile network is used as a secure channel for enabling or disabling of media and applications.
It can be used in applications such as video and audio distribution on certain locations and during certain times and it can be used to disable applications when the user is not at the location it is supposed to be used or during a time when it shall be used. It can also be used for creating tickets or coupons (e.g. Bluetooth, IR, RFID or “display barcode”) and make them work on particular locations, again without signalling with the network. It can also without extra signalling be used to make an already downloaded file only executable or playable in a phone with a particular operator subscription in it. This means that files downloaded when having an operator A subscription will not be usable if the user change the subscription to operator B.
The embodiments described above are to be understood as a few illustrative examples of the present invention. It will be understood by those skilled in the art that various modifications, combinations and changes may be made to the embodiments without departing from the scope of the present invention. In particular, different part solutions in the different embodiments can be combined in other configurations, where technically possible. The scope of the present invention is, however, defined by the appended claims.
Number | Date | Country | Kind |
---|---|---|---|
0403114-2 | Dec 2004 | SE | national |
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/SE05/01736 | 11/18/2005 | WO | 6/15/2007 |