| Along with the mobile communication technology progress and the development of Smartphone’s operating system, MobileTV was born, and the omnipresent, the ever-present audio-visual of Mobile TV enjoy more users. So, content providers, network operators, terminal equipment providers have joined in Mobile TV industry, they promoted the development of Mobile TV industry, and introduced a variety of Mobile TV standards. Meanwhile, mobile TV industry is facing many problems, one of them is that weak awareness of people of copyright protection, piracy seriously, to the detriment of the legitimate interests of content providers. In order to avoid repeating the Internet in the field due to lack of effective regulatory measures and means of security issues resulting from problems of the information security, so the study of Mobile TV’s copyright protection method and service protection technology is imminent. This study focused on the current domestic with independent intellectual property rights and the application range of the most widely CMMB Mobile TV standards and service protection technology design scheme, combining the actual project of product development, implemented the protection for CMMB Moblie TV service.The crux of CMMB Mobile TV service protection technology is the network authentication between terminal and server and the design of the whole key management system. In this study, the network authentication uses HTTP Digest Authentication method, and key management base on MIKEY protocol by the way of Pre-shared Key pattern. Our system makes the terminal and MBBMS share user key through GBA. Before request MSK, the terminal need uses MRK as a parameter to do HTTP Digest Authentication towards MBBMS platform, if the authentication is successful, MBBMS platform returns MSK with MIKEY message form to the terminal. Then, the terminal send the MIKEY message to UAM(User Authentication Module), UAM uses the shared MUK and the shared user key from SARFT(The State Administration of Radio Film and Television) to decrypt the MIKEY message and stores the unencrypted MSK to the UAM-chip memory. MTK is also in the form of MIKEY message together with the audio and video streams distributed to the terminal, the terminal send it to UAM, and UAM use MSK corresponding to the same channel to decrypt the MIKEY message and return unencrypted MTK to the terminal, and the terminal can use the MTK to decrypt the encrypted audio and video streams, and play the channel at last. |