Embodiments of the present invention relate to method of providing a radio service at a remote terminal. In particular, they relate to a method by which commercial radio stations may provide bespoke services.
Each terminal 12 converts at least some of the information received via the broadcast radio channel into audible sound. The user of a terminal is therefore able to listen to the audio content provided by the radio station to which the radio terminal is tuned.
The broadcast radio channel may also be used to communicate additional information by embedding it within the broadcast information. The additional information may be used to provide specified services such as traffic announcement TA and traffic programme TP or may be used to provide unspecified services such as open data applications (ODA).
According to the Radio Data Services (RDS) specification, the type 3A group conveys information about which Open Data Applications (ODA) are carried on a particular transmission and in which groups they will be found. The group 3A consists of two elements the Applications Identification (AID) code and the Application Group Type code used by the application. The Application Group Type code indicates the group type used, in the particular transmission, to carry the specified ODA information. The AID identifies which application the terminal needs to use. The identified application then uses the ODA information to provide a service at the terminal.
The inventor has realized that a problem may arise, if a malicious broadcaster masquerades as the radio station and provides unauthorized ODA information.
It would be desirable to enable a terminal to authenticate the received ODA information, but this is not straightforward in a broadcast or uni-directional radio channel.
According to one embodiment of the invention there is provided a method of providing a service at a remote terminal comprising: receiving information broadcast by a commercial radio station in a broadcast radio channel; discriminating an identifier of an application within the received broadcast information; initiating an authentication process for authenticating broadcast information received via the broadcast channel; and in response to a positive authentication, enabling use of information received via the broadcast radio channel by the identified application.
According to another embodiment of the invention there is provided a terminal comprising: a receiver for receiving information broadcast by a commercial radio station in a broadcast radio channel; means for discriminating an identifier of an application within the received broadcast information; authentication means for authenticating broadcast information received via the broadcast channel; and control means for enabling/disabling the use of information received via the broadcast radio channel by the identified application, wherein in response to a positive authentication of the broadcast information received via the broadcast channel the control means enables the use of information received via the broadcast channel by the identified application.
According to another embodiment of the invention there is provided a method of simultaneously providing a service to a plurality of remote terminals comprising: broadcasting information in a broadcast radio channel comprising an identifier of an application and information for use by the identified application; and providing a digital key, for authenticating the broadcast information, to each of the plurality of remote terminals separately from the broadcast radio channel.
For a better understanding of the present invention reference will now be made by way of example only to the accompanying drawings in which:
A commercial radio station is able to simultaneously provide a service to the plurality of remote terminals 12 by broadcasting information in a broadcast radio channel. This broadcast information comprises an identifier of an application (AID) and service information for use by the identified application in providing a service at the terminal.
The broadcast information includes a type 3A group comprising an Applications Identification (AID) code and an Application Group Type code. The AID identifies the application to be used. The Application Group Type code indicates the group type used, in the particular transmission, to carry the service information used by the identified application to provide the service.
Each terminal receiving the broadcast information is able to provide a service by performing the method illustrated in
In more detail, at step 20 the terminal receives the broadcast information including a type 3A group comprising an Applications Identification (AID) code and a Application Group Type code. The AID identifies the application to be used. The Application Group Type code indicates the group type used, in the particular transmission, to carry the service information used by the identified application. At step 22 the terminal discriminates the identifier of the application (AID).
The service information used by the identified application typically includes a signature used in the authentication process. The authentication process 30 comprises discriminating, at step 32, the signature within the broadcast information and verifying, at step 34, the signature using a digital key.
The verifying step 34 may in one embodiment comprise creating a signature and comparing the created signature with the received signature. A match produces a positive authentication result whereas the absence of a match produces a negative authentication result. The signature is created using a process that is secret and symmetric with the process used to create the signature before its inclusion within the service information. Typically the symmetric process scrambles data using a digital key according to an algorithm. At least one of the data, digital key and algorithm is secret.
For example, in one implementation, the signature is created by scrambling a Julien calendar day number using a digital key (e.g. application identifier). If the Julien day number is even, then the signature is created by exclusive ORing the Julien day number and the digital key. If the Julien day number is odd, then the signature is created by ANDing the Julien day number and the digital key. The algorithm/data is time varying so the signature advantageously changes with time.
As another example, the signature may be created by scrambling specific data using a digital key ( e.g. the application identifier). The specific data may, for example, be the programme identification (PI) code, a programme service (PS) name, or a programme type (PTY) code.
The verifying step 34 may, in another embodiment, comprise descrambling the received signature and attempting to use the descrambled signature as input data to the identified application. A positive authentication result is indicated if the identified application is able to use the input data whereas a negative authentication result is indicated if the identified application is unable to use the input data. The descrambled signature is created using a process that is secret and the reverse of the process used to create the signature before its inclusion within the service information. The signature is created by scrambling all or part of the service information using the digital key. The terminal descrambles the signature using the same digital key. At least one of the digital key and algorithm is secret.
In one example, the digital key is created by scrambling a Julien calendar day number using a digital key (e.g. application identifier). If the Julien calendar day number is even, then the signature is created by exclusive ORing the Julien calendar day number and the digital key. If the Julien calendar day number is odd, then the signature is created by ANDing the Julien calendar day number and the digital key. The algorithm/data is time varying so the digital key changes with time and the signature changes with time even if the service information is repeated.
As another example, the digital key is created by scrambling specific data using a digital key ( e.g. application identifier). The specific data may, for example, be the programme identification (PI) code, a programme service (PS) name, or a programme type (PTY) code.
The application that uses the service information is typically a JAVA application downloaded to the terminal within a secure MIDlet. The MIDlet comprises a Java Application resource (JAR) and a Java application descriptor (JAD). The JAD typically comprises the application identifier (AID) and a digital certificate that signs the JAR and enables authentication of the origin of the MIDlet. The JAD typically comprises data enabling or defining the authentication process including the digital key, and the application itself. The MIDlet is typically downloaded from a trusted source that is verified by the digital certificate. The MIDlet is downloaded separately to the broadcast radio channel and is typically downloaded via a secure bi-directional communications channel. It may, for example, be downloaded from a web-site or pulled via a cellular telecommunications network.
The same MIDlet may be downloaded separately to each of the terminals. The same broadcast information may be simultaneously provided to each of the terminals and the terminals may simultaneously provide the same service at each of the terminals.
The MIDlet may be updated by the broadcaster at an appropriate point in time. This could be regularly, for example every month, or to coincide with an event such as a fund raising event for a charity. The MIDlet may be updated anytime the broadcaster wishes to provide an additional service at the terminal. The terminal need only obtain the updated MIDlet.
A radio station may therefore offer a bespoke service to its clients by suitable choice of the application downloaded to the terminals and the service information broadcast to the terminals.
The service may for example, display additional information about the music being played. It may also or alternatively provide an option for the user to purchase and download the music to the terminal, or if the terminal is a mobile cellular telephone, to purchase and download a ring-tone for the mobile telephone. These services may be provided by supplying links to web-sites for making the download or telephone numbers which are called to pull a data file.
The authentication of broadcast information may re-occur periodically or it may occur whenever the broadcast radio channel used to broadcast information changes i.e. the terminal receives the broadcast information from another antenna operating at a different frequency.
The memory stores computer program instructions which when loaded into the processor 52 control the operation of the terminal and provide means for discriminating an identifier of an application within the received broadcast information; authentication means for authenticating broadcast information received via the broadcast channel; and control means for enabling/disabling the use of information received via the broadcast radio channel by the identified application. In response to a positive authentication, the control means enables the use of information received via the broadcast channel by the identified application. In response to a negative authentication, the control means disables the use of information received via the broadcast channel by the identified application.
Although embodiments of the present invention have been described in the preceding paragraphs with reference to various examples, it should be appreciated that modifications to the examples given can be made without departing from the scope of the invention as claimed. For example, although embodiments of the invention have been described with reference to RDS it should be appreciated that other embodiments use Digital Audio Broadcasting (DAB) radio. The application may be used to automatically launch other Java MIDlets in response to trigger data received from the radio station. For example, the applications may launch a stock tracker application to alert the user to a change in stock values in response to received broadcast information.
Although embodiments of the invention have been described with reference to the Radio Data Service (RDS), other embodiments of the invention use the Radio Broadcast Data System (RBDS).
Number | Date | Country | Kind |
---|---|---|---|
0414576.9 | Jun 2004 | GB | national |
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/IB2005/002088 | 6/27/2005 | WO | 00 | 8/1/2008 |
Publishing Document | Publishing Date | Country | Kind |
---|---|---|---|
WO2006/003511 | 1/12/2006 | WO | A |
Number | Name | Date | Kind |
---|---|---|---|
2469555 | Hitchcock | May 1949 | A |
4553262 | Coe | Nov 1985 | A |
4586081 | St. Arnaud et al. | Apr 1986 | A |
4709402 | Akerberg | Nov 1987 | A |
4721955 | Dunkerton et al. | Jan 1988 | A |
4856048 | Yamamoto et al. | Aug 1989 | A |
4955083 | Phillips et al. | Sep 1990 | A |
4977399 | Price et al. | Dec 1990 | A |
5164904 | Sumner | Nov 1992 | A |
5182555 | Sumner | Jan 1993 | A |
5379345 | Greenberg | Jan 1995 | A |
5418787 | Tiuraniemi et al. | May 1995 | A |
5508731 | Kohorn | Apr 1996 | A |
5574966 | Barzegar et al. | Nov 1996 | A |
5592469 | Szabo | Jan 1997 | A |
5625693 | Rohatgi et al. | Apr 1997 | A |
5734986 | Helders | Mar 1998 | A |
5805573 | Umeda | Sep 1998 | A |
5857149 | Suzuki | Jan 1999 | A |
5903617 | Kamalski | May 1999 | A |
6009096 | Jaisingh et al. | Dec 1999 | A |
6154456 | Rakib et al. | Nov 2000 | A |
6360106 | Besson | Mar 2002 | B1 |
6622007 | Linden | Sep 2003 | B2 |
6671509 | Tanaka et al. | Dec 2003 | B1 |
6795413 | Uhlik | Sep 2004 | B1 |
6977957 | Sarkar et al. | Dec 2005 | B2 |
7020165 | Rakib et al. | Mar 2006 | B2 |
7158493 | Uhlik et al. | Jan 2007 | B1 |
7360078 | Lebouill | Apr 2008 | B1 |
7409205 | Mittal | Aug 2008 | B2 |
7519106 | Sarkar et al. | Apr 2009 | B2 |
7630346 | Schein et al. | Dec 2009 | B2 |
7751367 | Gaal et al. | Jul 2010 | B2 |
7796676 | Barclay | Sep 2010 | B2 |
7853664 | Wang et al. | Dec 2010 | B1 |
20020049037 | Christensen et al. | Apr 2002 | A1 |
20020106987 | Linden | Aug 2002 | A1 |
20030012164 | Mizoguchi et al. | Jan 2003 | A1 |
20030032399 | Slupe | Feb 2003 | A1 |
20030039361 | Hawkes et al. | Feb 2003 | A1 |
20030070179 | Ritz et al. | Apr 2003 | A1 |
20030092376 | Syed | May 2003 | A1 |
20040001452 | Day et al. | Jan 2004 | A1 |
20040091022 | Sarkar et al. | May 2004 | A1 |
20040098715 | Aghera et al. | May 2004 | A1 |
20040101063 | Sipila | May 2004 | A1 |
20040199387 | Wang et al. | Oct 2004 | A1 |
20050097052 | Systa et al. | May 2005 | A1 |
20050181818 | Itaba et al. | Aug 2005 | A1 |
20060031941 | Xiao et al. | Feb 2006 | A1 |
20060168651 | Araki et al. | Jul 2006 | A1 |
20060179306 | Kikkoji et al. | Aug 2006 | A1 |
20060190980 | Kikkoji et al. | Aug 2006 | A1 |
20060259931 | Kikkoji et al. | Nov 2006 | A1 |
20060292980 | Marcos Alba | Dec 2006 | A1 |
20060294562 | Kikkoji et al. | Dec 2006 | A1 |
20070071418 | Kikkoji et al. | Mar 2007 | A1 |
20070074262 | Kikkoji et al. | Mar 2007 | A1 |
20070112862 | Iwatsu et al. | May 2007 | A1 |
20070130598 | Choi et al. | Jun 2007 | A1 |
20080282357 | Sharpe | Nov 2008 | A1 |
20090015370 | Rowse | Jan 2009 | A1 |
Number | Date | Country |
---|---|---|
0 347 401 | Dec 1989 | EP |
0961193 | Dec 1999 | EP |
2227143 | Jul 1990 | GB |
01161925 | Jun 1989 | JP |
WO 0211324 | Feb 2002 | WO |
Entry |
---|
“Digital Audio Broadcasting (DAB); VHF/FM Broadcasting; cross-referencing to simulcast DAB services by RDS-ODA 147”, ETSI EN 301 700 V1.1.1, Mar. 2000, 14 pgs. |
“Specification of the radio data system (RDS) for VHF/FM sound broadcasting in the frequency range from 87.5 to 108.0 MHz”, European Standard EN 50067, Apr. 1998, 132 pgs. |
Number | Date | Country | |
---|---|---|---|
20090015370 A1 | Jan 2009 | US |