FIELD OF INVENTION
[0001] This invention relates to wireless broadcast services. In particular, the present
invention relates to parental control of such wireless broadcast services.
BACKGROUND OF THE INVENTION
[0002] This section is intended to provide a background or context to the invention that
is recited in the claims. The description herein may include concepts that could be
pursued, but are not necessarily ones that have been previously conceived or pursued.
Therefore, unless otherwise indicated herein, what is described in this section is
not prior art to the description and claims in this application and is not admitted
to be prior art by inclusion in this section.
[0003] The Open Mobile Alliance Mobile Broadcast Services (OMA BCAST) Enabler 1.0 addresses
functional areas which are generic enough to be common to many broadcast services,
and which can be defined and implemented in a bearer-independent way. These functional
areas include service guide, file distribution, stream distribution, service protection,
content protection, service interaction, service provisioning, terminal provisioning
and notification, and jointly enable mobile broadcast services.
[0004] The OMA Service and Content Protection for Mobile Broadcast Services specification,
which is hereby incorporated by reference, specifies how the parental control requesting
and processing should be done. In case of a smartcard profile, a pincode is asked
when entering a pincode-protected service. Zapping between multiple services should
result in a re-entering of such pincode.
[0005] The document entitled "Bug fix for parental control in SCP", which was submitted
to the OMA on 9 August 2008, proposes changes to the OMA Service and Content Protection
for Mobile Broadcast Services specification so as to take into account specific parental
control restraints that exist in certain jurisdictions (e.g. France).
SUMMARY OF THE INVENTION
[0006] In one aspect of the invention, a method comprises detecting zapping to or from one
or more services; determining whether the zapping includes termination of a password-protected
service; and sending a trigger message only if the zapping includes termination of
a password-protected service. In one embodiment, the trigger message is sent to a
smartcard. In one embodiment, the password-protected service is password-protected
for parental control. In one embodiment, the method further includes requesting a
password when the zapping includes zapping to a password-protected service. In a further
embodiment, the password-protected service is a pincode-protected service. In one
embodiment, an instance of each service is running on one or more applications. A
trigger message may be sent only if the zapping includes termination of all instances
of the password-protected service.
[0007] In one aspect of the invention, a method comprises receiving a trigger message only
when a zapping includes termination of a password-protected service; and causing a
password to be requested upon detecting a zapping to a password-protected service.
In one embodiment, the trigger message is received from a user terminal application.
In one embodiment, the password-protected service is password-protected for parental
control.. In a further embodiment, the password-protected service is a pincode-protected
service. In one embodiment, an instance of each service is running on one or more
applications. A trigger message may be received only if the zapping includes termination
of all instances of the password-protected service.
[0008] In another aspect, an apparatus comprises a processor and a memory unit communicatively
connected to the processor. The memory unit includes computer code for detecting zapping
to or from one or more services; computer code for determining whether the zapping
includes termination of a password-protected service; and computer code for sending
a trigger message only if the zapping includes termination of a password-protected
service. In one embodiment, the password-protected service is a pincode-protected
service.
[0009] In another aspect, an apparatus comprises a processor and a memory unit communicatively
connected to the processor. The memory unit includes computer code for receiving a
trigger message only when a zapping includes termination of a password-protected service;
and computer code for causing a password to be requested upon detecting a zapping
to a password-protected service. In one embodiment, the password-protected service
is a pincode-protected service.
[0010] In another aspect, the invention relates to a computer program product embodied on
a computer-readable medium. The computer program product comprises computer code for
detecting zapping to or from one or more services; computer code for determining whether
the zapping includes termination of a password-protected service; and computer code
for sending a trigger message only if the zapping includes termination of a password-protected
service. In one embodiment, the password-protected service is a pincode-protected
service.
[0011] In another aspect, the invention relates to a computer program product embodied on
a computer-readable medium. The computer program product comprises computer code for
receiving a trigger message only when a zapping includes termination of a password-protected
service; and computer code for causing a password to be requested upon detecting a
zapping to a password-protected service. In one embodiment, the password-protected
service is a pincode-protected service.
[0012] These and other advantages and features of various embodiments of the present invention,
together with the organization and manner of operation thereof, will become apparent
from the following detailed description when taken in conjunction with the accompanying
drawings.
BRIEF DESCRIPTION OF THE DRAWINGS
[0013] Example embodiments of the invention are described by referring to the attached drawings,
in which:
Figure 1 is an illustration of a BCAST client receiving content and key stream;
Figure 2 is an illustration of the STKM processing by the BCAST client;
Figure 3 illustrates the signaling for the example case in accordance with embodiments
of the present invention;
Figure 4 is an overview diagram of a system within which various embodiments of the
present invention may be implemented;
Figure 5 illustrates a perspective view of an example electronic device which may
be utilized in accordance with the various embodiments of the present invention; and
Figure 6 is a schematic representation of the circuitry which may be included in the
electronic device of Figure 5.
DETAILED DESCRIPTION OF THE VARIOUS EMBODIMENTS
[0014] In the following description, for purposes of explanation and not limitation, details
and descriptions are set forth in order to provide a thorough understanding of the
present invention. However, it will be apparent to those skilled in the art that the
present invention may be practiced in other embodiments that depart from these details
and descriptions.
[0015] As noted above, the Open Mobile Alliance (OMA) BCAST Enabler 1.0 addresses functional
areas which are generic enough to be common to many broadcast services, and which
can be defined and implemented in a bearer-independent way. These functional areas
include service guide, file distribution, stream distribution, service protection,
content protection, service interaction, service provisioning, terminal provisioning
and notification, and jointly enable mobile broadcast services.
[0016] The service protection and content protection systems, and affiliated mechanisms,
which support various business models of OMA BCAST enabled mobile broadcast services
delivery are specified in the OMA BCAST specification. On behalf of broadcast service
providers and content providers, means are provided to protect the access to, and
control the consumption of, broadcast content in either streaming or file delivery
format. Two main systems can be used to provide service protection and/or content
protection: the DRM Profile and the smartcard profile. Both profiles are based on
the 4-layer Model.
[0017] The 4-layer model key hierarchy is as follows. Layer 1 relates to authentication
and registration. In Layer 1, a user device is authenticated and registered for a
service. The authentication is based on shared secret key or on public key certificate
unique to device.
[0018] Layer 2 relates to access authorization. A service-specific, but not device-specific,
access key is delivered to each authorized device. The access key is encrypted for
each device separately using device-specific keys. Systems supporting content protection
specify rules controlling content usage and distribution after delivery.
[0019] Layer 3 relates to protection of content encryption keys. Devices receive data from
which content encryption keys can be derived. Only devices in possession of a service
access key are able to derive content encryption keys.
[0020] Layer 4 relates to delivery of encrypted content. Service content is delivered to
the devices and is encrypted by content encryption keys. Typically, content encryption
keys change frequently.
[0021] Figure 1 illustrates an exemplary arrangement 200 for communication of broadcast
content. In accordance with the example of Figure 1, an OMA-compliant terminal 202
includes an OMA BCAST-compliant client 204 configured to receive a content stream
203 and a key stream 205. The BCAST client 204 is configured to communicate with either
a smartcard 206 (in case of a smartcard profile being used) or a digital rights management
(DRM) agent 208 (in case of a DRM profile being used).
[0022] If the OMA compliant terminal 202 receives the key stream 205, depending on which
profile is used, the processing takes place between the BCAST client 204 and the DRM
agent 208 (in the case of a DRM profile) or between the BCAST client 204 and the smartcard
206 (in the case of a smartcard profile).
[0023] Fundamental components of the service and content protection systems comprise various
content encryption mechanisms, protection signaling, and key management related messages
which may carry rights objects, other post-reception consumption attributes (such
as recording permission), key material, and parental rating criteria. In addition
to server-client (or network-to-terminal) interactions, the server-side interfaces
pertaining to service and content protection may also be specified.
[0024] Certain embodiments of the present invention relate to the use of a smartcard profile.
Smartcard-based technologies and mechanisms, which provide key establishment and key
management, as well as permission and token handling for the service and content protection
solution for BCAST terminals may be used. In particular, subscriber key establishment
and both short- and long-term key management may be based on Generic Bootstrapping
Architecture (GBA) mechanisms and a smartcard.
[0025] The smartcard profile is based on an existing security framework for service protection
defined for broadcast/multicast services based on smartcards defined by Third Generation
Partnership Project (3GPP) Multimedia Broadcast Multicast Service (MBMS) and may include
the key provisioning mechanism defined for 3GPP2 Broadcast and Multicast Service (BCMCS).
The solution requires an interactive channel to obtain key material.
[0026] Variants of the smartcard profile include the (U) SIM Smartcard Profile and the (R)
UIM/CSIM Smartcard profile. The two variants differ in the way that the Layer 1 key(s)
are established but are otherwise the same (Layers 2, 3 and 4).
[0027] Certain embodiments of the present invention are related to Layer 3 and Layer 4 issues.
In this regard, Figure 2 illustrates an exemplary arrangement 220 for key processing.
In accordance with the illustration of Figure 2, Short Term Key Message (STKM) 223
is processed by a BCAST client 224 in order to get a traffic encryption key (TEK)
from a smartcard 226. The terminal 222 receives a Multimedia Internet KEYing (MIKEY)
STKM message 223, processes traffic key message (TKM) extensions and forwards the
STKM message to the smartcard 226. When the smartcard 226 receives a MIKEY message
227, the smartcard 226 first determines the type of message by examining the MIKEY
General Extension payload(s) present in the message. In one embodiment, upon reception
of the STKM, a secure function in the smartcard 226 first retrieves, from the EXT
MBMS payload, a Key Domain ID and the Service Encryption Key/Program Encryption Key
identification (SEK/PEK ID), which are used to retrieve the SEK/PEK that is required
to process the STKM. A corresponding procedure may be provided for use with a DRM
profile 225.
[0028] Among other checks, the secure function in the smart card 226 may check the presence
of access criteria in the message and may check whether the access criteria conditions
are met using internal information. The internal information may depend on the type
of the access criteria. For example, the current version of the OMA BCAST specification
defines access criteria for parental control and location-based restriction.
[0029] If the STKM has been successfully processed, the smartcard may return the TEK to
the terminal (reference 229). The TEK may be used to decrypt the TEK-encrypted audiovisual
or multimedia content broadcast by the service provider.
[0030] Embodiments of the present invention improve behavior in cases where parental-controlled
access is necessary, as may be the case for adult-only content or content directed
at individuals above a certain age limit.
[0031] In one embodiment, if a user wants to access a parental-control, password-protected
service, parental control access criteria may be set. The password is, in one embodiment,
a pincode. The enforcement of the parental control may be divided into several processing
phases, such as the following exemplary phases:
- Check the rating_value transmitted in the STKM against the level_granted stored in
the smartcard for the rating_type;
- Check if the PINCODE has been verified;
- Request a PINCODE if necessary (a PINCODE provided by the user may be checked against
the PINCODE stored in the smartcard); and
- Unblock a locked Parental Control PINCODE, if applicable.
[0032] If the parental_control access criteria are transmitted in the STKM and if the secure
function is in the smartcard, parental-control enforcement may be performed by the
smartcard.
[0033] The OMA BCAST specification specifies how the parental control requesting and processing
should be done. In the case of a smartcard profile, a pincode must be requested when
entering a pincode-protected service. Zapping between two or more services should
result in a re-entering of any pincode. As used herein, "zapping" includes switching
between various broadcast services. In OMA "zapping to" refers to switching to a service,
while "zapping from" or "zapping out of' refers to switching from a service.
[0034] Various solution have been proposed to address issues related to switching between
two or more services. One particular proposed solution allows a user to select a PIN-protected
channel (Channel X) by entering a PIN. The user may then switch to a "free" channel
where no PIN is required. The user may then zap back to Channel X without entering
a PIN. In accordance with the OMA BCAST specification, zapping is a function on the
terminal, while the parental control function is located on the smartcard. Thus, the
smartcard does not know when the terminal zaps to another service. While regulations
in some countries (e.g., France) require that the PIN be requested at this point,
this solution bypasses this requirement, since the smartcard is not made aware of
the change to a non-protected channel.
[0035] However, this proposed solution is only applicable to cases in which the terminal
is incapable of receiving multiple services simultaneously. For a good user experience,
zapping signaling should be service-specific. In some cases, a terminal may have several
services open at once. For example, a user may be recording one service Z (application
2) and, at the same time, be watching a different service Y (application 1), where
both services are protected by parental control. If this context information is not
signaled to the smartcard together with a trigger, then the smartcard may not know
which service should be continued to be decrypted and which to challenge when the
next STKM arrives.
[0036] Other use cases with simultaneous use of multiple services include the case where
the terminal is a hub providing services to a number of devices, which in one embodiment
may be connected to the terminal via a local network. The local network may be in
various embodiments wireless, wired or a combination of these. For example, one service
may be consumed on the terminal, while another service, for example a television program
is forwarded to a rendering device, and still another service, for example an audio
program is forwarded to a storing device.
[0037] Embodiments of the present invention provide manners for making a smartcard request
the PIN when the user zaps between a protected service and a free-to-air channel in
the context where the terminal is receiving multiple services simultaneously. In particular,
embodiments of the present invention facilitate the smartcard to request the PIN only
when entering to a protected service, and to avoid requesting a PIN if the reception
of a protected service was stopped, while the reception of another protected service
still continues.
[0038] In accordance with the above-noted proposed solution, the terminal can signal to
the smartcard that a zapping has occurred. This is done by introducing a new submode
of the BCAST command to send a message (referred to herein as a "trigger") to the
smartcard, by which the smartcard then knows, that an encrypted channel was exited
and, if returning to this channel, the parental control pincode needs to be re-entered.
[0039] The above-noted proposed solution proposes a way for the terminal to signal the smartcard
parental control function that a zapping has occurred. Specifically, a BCAST COMMAND
is proposed to implement this feature. The command, as in the current OMA BCAST specification,
has three modes: SPE audit mode, SPE record signaling mode, and recording audit mode.
The above-noted proposed solution proposes the addition of a fourth mode: Zapping
signaling mode. This fourth mode allows the terminal to inform the smartcard parental
control function that a zapping has occurred. It is implemented as a trigger when
the information is sent from the terminal to the smartcard with no input or output
data.
[0040] Another issue may occur with parental control functionality when a user zaps quickly.
Specifically, if the user is quick enough, he may come back to the first channel before
the end of the crypto-period. In this case, as the smartcard would refuse the STKM
(due to anti-replay mechanism), the terminal would have to use the TEK from the previously
submitted STKM. But doing so, it would not ask the pin-code. This would imply that
the content would be displayed with no pin-code verification during the remaining
duration of the crypto-period. In accordance with the proposed solution, in this specific
case, handsets must submit
twice the same STKM. Thus, a smartcard must authorize an STKM TS that is equal to the previous
one.
[0041] The above-noted proposed solution has many shortcomings. It does not consider the
use case of supporting multiple services usage at the same time. Further, with quick
zapping, ambiguous behavior is introduced, because if no zapping occurred, but rather
an attack, the introduced "equal" will give the wrong result.
[0042] In accordance with embodiments of the present invention, an input parameter in a
trigger message is provided, and the use case of quick-zapping is captured.
[0043] In one embodiment of the present invention, it is only necessary to send the trigger
message when leaving a password-protected channel, but not when leaving a free-to-air
channel that is not password protected. Use of the trigger message indicates that
the next time the user zaps to this channel (switches back to this service), the smartcard
has to request a password, which may be, in one embodiment, a pincode.
[0044] In one embodiment of the present invention, the input for the trigger message is
an MBMS Service Key (MSK) identifier (ID). The MSK ID may be sent to the terminal
only if a pincode-protected STKM stream is received.
[0045] Thus, in one example, a server broadcasts multiple pincode-protected services (e.g.
X,Y,Z) and other free services (e.g. A,B) for receipt by a terminal, such as a handset.
The MSK IDs for the different services may be as indicated in Table 1 below, which
provides an exemplary mapping of encrypted services X,Y,Z to MSK IDs:
Table 1
Service name |
Indication, if applicable |
Service X |
MSK ID 18 |
Service Y |
MSK ID 10 |
Service Z |
MSK ID 40 |
Service A |
None (free to air service) |
Service B |
None (free to air service) |
[0046] An example implementation of an embodiment of the present invention will be described
with reference to Figure 3, which illustrates the signaling for the example case in
accordance with embodiments of the present invention. At Step 1, a user on a terminal,
such as mobile equipment (ME), initiates the terminal to record service Z (242), being
run on Application 2, and to receive service Y, being run on Application 1, for viewing
(244) at the same time. The user is required to enter pincode information for both
channels since both are pincode-protected. While service Z is being recorded, service
Y is being viewed.
[0047] At step 2, the user decides to zap from service Y to the free-to-air channel A (246).
The terminal sends a trigger message 10 to the smartcard (SC) (248) to indicate that
the pincode-protected channel Y has been exited. Since A is a free channel, no pincode
is required. Application 2, on which service Z is not touched, also does not require
entering of a pincode.
[0048] At step 3, the user decides to zap from channel A back to the pincode-protected service
Y (250). The terminal does not send any trigger message. As noted above, in accordance
with embodiments of the present invention, a trigger message is only sent when a pincode-protected
service is exited. As step 3, the smartcard detects the start of the service Y, as
the terminal starts sending STKM messages of service Y. Since service Y is PIN protected,
the smartcard directs the terminal to request that the user enter a PIN (252). Service
Z is not touched and, therefore, no pincode is required for service Z.
[0049] At step 4, the user zaps from service Y to service X (254), both of which are pincode-protected
services. A trigger message 10 is sent to the smartcard (256). Since service X is
PIN protected, as soon as the smartcard receives STKMs of service X, it requests that
a PIN to be entered (258). Again, since service Z is not touched, no pincode is requested
for that service.
[0050] At step 5, the user decides to see how far the Z program recording has progressed
and zaps, on application 1, from service X to service Z (260). Since pincode-protected
service X is being exited, a trigger message 18 is sent to the smartcard (262), indicating
that the reception of service X was stopped. The smartcard determines that service
Z has not been stopped and that a pincode was already provided for service Z at step
1. Therefore, no pincode is requested for service Z.
[0051] At step 6, after checking the progress of recording service Z, the user switches,
in application 1, from service Z to service X (264). A pincode for watching X is requested
to be entered since service X was exited at step 5. For service Z, depending on the
terminal behavior, there are two possibilities.
[0052] In a first possibility the terminal does not send a trigger message since the reception
of service Z was not exited or stopped. Specifically, only application 1 exited service
Z, while application 2 continued to receive and record service Z. The pincode to Z
needs not be entered because zapping from X to Z was done in application 1. Application
2 did not change.
[0053] In a second possibility, the terminal sends a trigger message 40, and the smartcard
understands that the service Z was stopped. However, as the application 2 continues
reception of service Z, the terminal continues sending STKMs of service Z to the smartcard.
As soon as the next STKM of service Z is sent to the smartcard, the smartcard requests
the pincode for the service Z.
[0054] This behavior depends on the implementation by the terminal and/or the requirements
in the standard. An intelligent terminal may be configured to decide that, though
the application 1 stopped the reception of service Z, there still is another application
(application 2) which continues the reception of service Z. As a result, the terminal
would not send any trigger message for service Z.
[0055] Table 2 below summarizes the state of each application and the pincode requirements
at each step of Figure 3.
Table 2
Step |
Service (application 1) |
Enter pincode |
Service (application 2) |
Enter pincode |
1 |
Y |
Yes |
Z |
Yes |
2 |
A |
No |
Z |
No |
3 |
Y |
Yes |
Z |
No |
4 |
X |
Yes |
Z |
No |
5 |
Z |
No |
Z |
No |
6 |
X |
Yes |
Z |
Yes/No |
[0056] In various embodiments of the present invention, implementation may take place by
a message sent between the terminal and the smartcard. This message may be the message
referred to as BCAST command and is already available in the OMA BCAST specification.
The submode 0x04 is enhanced in accordance with embodiments of the present invention,
including the MSK ID (in the tables called SEK/PEK ID Key Number Part) as input data.
The processing behavior of the smartcard is described below. The terminal and the
smartcard process the request and answer accordingly. The following shows the details
to the BCAST command submode "Zapping signalling mode".
[0057] In accordance with an embodiment of the present invention, the terminal uses this
submode of the OMA BCAST command to notify the smartcard of the event of zapping from
a pincode-protected channel to another channel. The terminal sends the BCAST command
using the mechanisms described in section E.2.1 of the OMA BCAST specification.
[0058] In accordance with embodiments of the present invention, if the terminal is leaving
a protected channel, the terminal may send, as input data, the MSK ID of the protected
channel it is leaving. The smartcard terminates only the crypto session that is related
to the particular service indicated by the MSK ID (also referred to as SEK/PEK key
number part ID). In various embodiments, the terminal may keep track of the MSK IDs
that it sent to the smartcard. In case more than one pincode-protected application
exists with the same MSK ID, but only one of these services is terminated, the terminal
may decide not to send the MSK ID to the smartcard.
[0059] In accordance with embodiments of the present invention, if the terminal is leaving
a free-to-air channel, no MSK ID is available because of the free service. In this
case parameter P1 is set to 'FF', which is specified in section E.2.1 of the OMA BCAST
specification and represents "no input data".
[0060] At the reception, the MSK ID parameter, sent in the trigger message, indicates to
the smartcard, that a crypto period for one service has stopped. In case the smartcard
receives the MSK ID and the smartcard has not stored the MSK ID, the smartcard stores
the MSK ID. The parameter tells which service is stopped and returns the status code
"Successful".
[0061] In case the Smartcard receives the MSK ID and the Smartcard has already stored the
MSK ID, the smartcard returns the status code "Pincode required" tag (0x08) to the
terminal, which then initiates the parental access criteria process.
[0062] If P1 indicates "no input data", there is no input and no output (Le=0 is requested
in order to return a valid case 2 command).
[0063] If P1 indicates "First block of data", the input is the MSK ID (referred to as SEK/PEK
ID key number part), which may be carried in plain text part of the STKM header of
the service that the terminal is leaving (i.e., is zapping from). The output is OMA
BCAST Operation Response for Parental Control Operation (see table 72 of Annex E1.1.2
of the OMA BCAST specification).
[0064] If P1 indicates "First block of response data" or "Next block of response data, there
is no input, and the output is BCAST Operation Response for Parental Control Operation
(see table 72 of SPCP Annex E1.1.2 of the OMA BCAST specification).
[0065] If the P2 parameter in the OMA BCAST Command is '04': Zapping Signalling mode, the
command parameters may be coded as follows in one embodiment.
[0066] If P1 indicates "First block of response data" or "Next block of response data" or
"No input data", then the Input Data field is absent.
[0067] If P1 indicates "First block of data", then the coding provided in Table 3 below
holds.
Table 3: Coding when P1 indicates "First block of data"
Byte(s) |
Description |
Coding |
M/O |
Length |
1 |
Zapping Mode Data Object tag ('73') |
As defined in TS 31.101 [3GPP TS 31.101 v6] for BER-TLV data object |
M |
1 |
2 to 1+A bytes (A≤ 4) |
Zapping Mode Data Object length (L1) |
As defined in TS 31.101 [3GPP TS 31.101 v6] for BER-TLV data object |
M |
A |
A+2 to A+6 |
SEK/PEK ID Key Number part TLV (also called MSK ID) See Table 4 below |
See below |
M |
4 |
Table 4: Coding of SEK/PEK ID Key Number Part TLV
SEK/PEK ID Key Number part Tag |
'83' |
M |
1 |
Length |
2 |
M |
1 |
SEK/PEK ID Key Number part |
Coded as defined in 3GPP TS 33.246 [3GPP TS 33.246 v7] |
M |
2 |
[0068] If P1 indicates "First block of data", "First block of response data" or "Next block
of response data" the following holds for the OMA BCAST Operation Response: the same
coding as for the OMA BCAST Operation Response for Parental Control Operation (see
table 72 of SPCP Annex E1.1.2 of the OMA BCAST specification) applies.
[0069] Thus, embodiments of the present invention make the inclusion of a zapping trigger
user-friendly. Further, certain embodiments enable receiving pincode-protected services
in parallel. If zapping takes place at only one of the services, the pincode does
not need to be re-entered for the other services.
[0070] While "parental control" is referred to in describing various embodiments, those
skilled in the art will understand that embodiments are not limited to such applications
and that various other applications are contemplated within the scope of the present
invention. Similarly, while "pincode" and "pincode-protection" are referred to in
describing the various embodiments, those skilled in the art will understand that
embodiments are not limited to such applications.
[0071] Figure 4 shows a system 10 in which various embodiments can be utilized, comprising
multiple communication devices that can communicate through one or more networks.
The system 10 may comprise any combination of wired or wireless networks including,
but not limited to, a mobile telephone network, a wireless Local Area Network (LAN),
a Bluetooth personal area network, an Ethernet LAN, a token ring LAN, a wide area
network, the Internet, etc. The system 10 may include both wired and wireless communication
devices.
[0072] For exemplification, the system 10 shown in Figure 4 includes a mobile telephone
network 11 and the Internet 28. Connectivity to the Internet 28 may include, but is
not limited to, long range wireless connections, short range wireless connections,
and various wired connections including, but not limited to, telephone lines, cable
lines, power lines, and the like.
[0073] The example communication devices of the system 10 may include, but are not limited
to, an electronic device 12 in the form of a mobile telephone, a combination personal
digital assistant (PDA) and mobile telephone 14, a PDA 16, an integrated messaging
device (IMD) 18, a desktop computer 20, a notebook computer 22, etc. The communication
devices may be stationary or mobile as when carried by an individual who is moving.
The communication devices may also be located in a mode of transportation including,
but not limited to, an automobile, a truck, a taxi, a bus, a train, a boat, an airplane,
a bicycle, a motorcycle, etc. Some or all of the communication devices may send and
receive calls and messages and communicate with service providers through a wireless
connection 25 to a base station 24. The base station 24 may be connected to a network
server 26 that allows communication between the mobile telephone network 11 and the
Internet 28. The system 10 may include additional communication devices and communication
devices of different types. Further, the communication devices of the system may communicate
with service providers through digital broadcast networks.
[0074] The communication devices may communicate using various transmission technologies
including, but not limited to, Code Division Multiple Access (CDMA), Global System
for Mobile Communications (GSM), Universal Mobile Telecommunications System (UMTS),
Time Division Multiple Access (TDMA), Frequency Division Multiple Access (FDMA), Transmission
Control Protocol/Internet Protocol (TCP/IP), Short Messaging Service (SMS), Multimedia
Messaging Service (MMS), e-mail, Instant Messaging Service (IMS), Bluetooth, IEEE
802.11, etc. A communication device involved in implementing various embodiments of
the present invention may communicate using various media including, but not limited
to, radio, infrared, laser, cable connection, and the like.
[0075] Further, transmission technologies that utilize digital broadband broadcast technologies
are, for example DVB-H (or next generation DVB-H2) networks or DVB-T (or next generation
DVB-T2) networks. Examples of other digital broadcast standards include Digital Video
Broadcast - Terrestrial (DVB-T), Integrated Services Digital Broadcasting - Terrestrial
(ISDB-T), Advanced Television Systems Committee (ATSC) Data Broadcast Standard, Digital
Multimedia Broadcast-Terrestrial (DMB-T), Terrestrial Digital Multimedia Broadcasting
(T-DMB), Satellite Digital Multimedia Broadcasting (S-DMB), Forward Link Only (FLO),
Digital Audio Broadcasting (DAB), and Digital Radio Mondiale (DRM). Other digital
broadcasting standards and techniques, now known or later developed, may also be used
and are contemplated within the scope of the present invention. Various embodiments
of the present invention may also be applicable to other multicarrier digital broadcast
systems such as, for example, T-DAB, T/S-DMB, ISDB-T, and ATSC, proprietary systems
such as Qualcomm MediaFLO / FLO, and non-traditional systems such 3GPP MBMS (Multimedia
Broadcast/Multicast Services) and 3GPP2 BCMCS (Broadcast/Multicast Service).
[0076] Figures 5 and 6 show one representative electronic device 28 which may be used as
a network node in accordance to the various embodiments of the present invention.
It should be understood, however, that the scope of the present invention is not intended
to be limited to one particular type of device. The electronic device 28 of Figures
5 and 6 includes a housing 30, a display 32 in the form of a liquid crystal display,
a keypad 34, a microphone 36, an ear-piece 38, a battery 40, an infrared port 42,
an antenna 44, a smart card 46 in the form of a UICC according to one embodiment,
a card reader 48, radio interface circuitry 52, codec circuitry 54, a controller 56
and a memory 58. The above described components enable the electronic device 28 to
send/receive various messages to/from other devices that may reside on a network in
accordance with the various embodiments of the present invention. Individual circuits
and elements are all of a type well known in the art, for example in the Nokia range
of mobile telephones.
[0077] Various embodiments described herein are described in the general context of method
steps or processes, which may be implemented in one embodiment by a computer program
product, embodied in a computer-readable medium, including computer-executable instructions,
such as program code, executed by computers in networked environments. A computer-readable
medium may include removable and non-removable storage devices including, but not
limited to, Read Only Memory (ROM), Random Access Memory (RAM), compact discs (CDs),
digital versatile discs (DVD), etc. Generally, program modules may include routines,
programs, objects, components, data structures, etc. that perform particular tasks
or implement particular abstract data types. Computer-executable instructions, associated
data structures, and program modules represent examples of program code for executing
steps of the methods disclosed herein. The particular sequence of such executable
instructions or associated data structures represents examples of corresponding acts
for implementing the functions described in such steps or processes.
[0078] Embodiments of the present invention may be implemented in software, hardware, application
logic or a combination of software, hardware and application logic. The software,
application logic and/or hardware may reside, for example, on a chipset, a mobile
device, a desktop, a laptop or a server. Software and web implementations of various
embodiments can be accomplished with standard programming techniques with rule-based
logic and other logic to accomplish various database searching steps or processes,
correlation steps or processes, comparison steps or processes and decision steps or
processes. Various embodiments may also be fully or partially implemented within network
elements or modules. It should be noted that the words "component" and "module," as
used herein and in the following claims, is intended to encompass implementations
using one or more lines of software code, and/or hardware implementations, and/or
equipment for receiving manual inputs.
1. A method, comprising:
receiving a plurality of broadcast services at an open mobile alliance (OMA) compliant
terminal (202) comprising an OMA BCAST compliant client (204), the OMA compliant terminal
being capable of simultaneous decryption of different pincode-protected broadcast
services;
detecting zapping from one of the received broadcast services;
determining whether the zapping includes termination of a pincode-protected broadcast
service; and
only if the zapping includes termination of the pincode-protected broadcast service,
sending from the OMA BCAST compliant client of the terminal to a smartcard (206) a
trigger message as a submode of a BCAST command for indicating that the next time
zapping to the pincode-protected broadcast service occurs the smartcard has to request
a pincode, wherein the trigger message comprises a service encryption key identification
or a program encryption key identification indicating the pincode-protected broadcast
service.
2. The method of any of the previous claims, further comprising:
in response to direction from the smartcard, the terminal requesting a pincode when
the zapping includes zapping to a pincode-protected broadcast service.
3. The method of any of the previous claims, wherein an instance of each broadcast service
is running on one or more applications and wherein a trigger message is sent only
if the zapping includes termination of all instances of the pincode-protected broadcast
service.
4. A method, comprising:
only when a zapping includes termination of a pincode-protected broadcast service,
receiving at a smartcard (206) from an open mobile alliance (OMA) BCAST compliant
client (204) of an OMA compliant terminal (202) a trigger message as a submode of
a BCAST command for indicating that the next time zapping to the pincode-protected
broadcast service occurs the smartcard has to request a pincode, wherein the OMA compliant
terminal is capable of simultaneous decryption of different pincode-protected broadcast
services and wherein the trigger message comprises a service encryption key identification
or a program encryption key identification indicating the pincode-protected broadcast
service, and wherein the pincode-protected service is one of a plurality of broadcast
services received at the terminal; and
causing a pincode to be requested upon detecting occurrence of the next zapping to
the pincode-protected broadcast service.
5. The method of claim 1 or claim 4, wherein the pincode-protected broadcast service
is pincode-protected for parental control.
6. The method of any of claims 3 to 5, wherein an instance of each broadcast service
is running on one or more application; and wherein a trigger message is received only
if the zapping includes termination of all instances of the pincode-protected broadcast
service.
7. The method of any preceding claim, wherein the submode of the BCAST command has a
value of oxo4 and is used as a zapping signaling mode.
8. An apparatus, comprising:
a processor; and
a memory unit communicatively connected to the processor and including:
computer code for receiving a plurality of broadcast services at an open mobile alliance
(OMA) compliant terminal (202) comprising an OMA BCAST compliant client (204), the
OMA compliant terminal being capable of simultaneous decryption of different pincode-protected
broadcast services;
computer code detecting zapping from one of the received broadcast services;
computer code for determining whether the zapping includes termination of a pincode-protected
broadcast service; and
computer code for sending a trigger message as a submode of a BCAST command from the
OMA BCAST compliant client of the terminal to a smartcard (206) only if the zapping
includes termination of the pincode-protected broadcast service, the trigger message
being for indicating that the next time zapping to the pincode-protected broadcast
service occurs the smartcard has to request a pincode, wherein the trigger message
comprises a service encryption key identification or a program encryption key identification
indicating the pincode-protected broadcast service.
9. The apparatus of claim 8, wherein the pincode-protected broadcast service is pincode-protected
for parental control.
10. The apparatus of any of claims 8 to 9, wherein the memory unit further includes:
computer code for, in response to direction from the smartcard, requesting a pincode
when the zapping includes zapping to a pincode-protected broadcast service.
11. The apparatus of any of claims 8 to 10, wherein an instance of each broadcast service
is running on one or more applications; and
wherein the computer code for sending a trigger message includes computer code for
sending a trigger message only if the zapping includes termination of all instances
of the pincode-protected broadcast service.
12. An apparatus, comprising:
a processor; and
a memory unit communicatively connected to the processor and including:
computer code for receiving at a smartcard (206) from an open mobile alliance (OMA)
BCAST compliant client (204) of an OMA compliant terminal (202) a trigger message
as a submode of a BCAST command only when a zapping includes termination of a pincode-protected
broadcast service, the trigger message being for indicating that the next time zapping
to the pincode-protected broadcast service occurs the smartcard has to request a pincode,
wherein the OMA compliant terminal is capable of simultaneous decryption of different
pincode-protected broadcast services and wherein the trigger message comprises a service
encryption key identification or a program encryption key identification indicating
the pincode-protected broadcast service, and wherein the pincode-protected broadcast
service is one of a plurality of broadcast services received at the terminal; and
computer code for causing a pincode to be requested upon detecting occurrence of the
next zapping to the pincode-protected broadcast service.
13. The apparatus of any of claims 8 to 12, wherein the submode of the BCAST command has
a value of 0x04 and is used as a zapping signaling mode.
14. A computer program product, embodied on a computer-readable medium, comprising:
computer code for receiving a plurality of broadcast services at an open mobile alliance
(OMA) compliant terminal (202) comprising an OMA BCAST compliant client (204), wherein
the OMA compliant terminal is capable of simultaneous decryption of different pincode-protected
broadcast services and;
computer code detecting zapping from one of the received broadcast services;
computer code for determining whether the zapping includes termination of a pincode-protected
broadcast service; and
computer code for sending a trigger message as a submode of a BCAST command from the
OMA BCAST compliant client of the terminal to a smartcard (206) only if the zapping
includes termination of the pincode-protected broadcast service, the trigger message
being for indicating that the next time zapping to the pincode-protected broadcast
service occurs the smartcard has to request a pincode, wherein the trigger message
comprises a service encryption key identification or a program encryption key identification
indicating the pincode-protected broadcast service.
15. The computer program product of claims 14, wherein the submode of the BCAST command
has a value of 0x04 and is used as a zapping signaling mode.
1. Verfahren, das Folgendes umfasst:
Empfangen von mehreren Rundsendediensten in einem mit der offenen Mobilallianz-konformen
(OMA-konformen) Endgerät (202), das einen OMA-BCAST-konformen Client (204) umfasst,
wobei das OMA-konforme Endgerät zum gleichzeitigen Entschlüsseln unterschiedlicher
pincodegeschützter Rundsendedienste fähig ist;
Detektieren von Zapping von einem der empfangenen Rundsendedienste;
Bestimmen, ob das Zapping Beendigung eines pincodegeschützten Rundsendedienstes enthält;
und
nur dann, wenn das Zapping Beendigung eines pincodegeschützten Rundsendedienstes enthält,
Senden von dem OMA-BCAST-konformen Client des Endgeräts zu einer Smartcard (206) einer
Auslösenachricht als eine Unterbetriebsart eines BCAST-Befehls zum Angeben, dass die
Smartcard das nächste Mal, wenn Zapping zu dem pincodegeschützten Rundsendedienst
auftritt, einen Pincode anfordern muss, wobei die Auslösenachricht eine Dienstverschlüsselungsschlüsselidentifizierung
oder eine Programmverschlüsselungsschlüsselidentifizierung enthält, die den pincodegeschützten
Rundsendedienst angibt.
2. Verfahren nach einem der vorhergehenden Ansprüche, das ferner Folgendes umfasst:
in Reaktion auf Anweisung von der Smartcard fordert das Endgerät einen Pincode an,
wenn Zapping das Zapping zu einem pincodegeschützten Rundsendedienst enthält.
3. Verfahren nach einem der vorhergehenden Ansprüche, wobei eine Instanz jedes Rundsendedienstes
auf einer oder mehreren Anwendungen abläuft und wobei eine Auslösenachricht nur dann
gesendet wird, wenn das Zapping Beendigung aller Instanzen des pincodegeschützten
Rundsendedienstes enthält.
4. Verfahren, das Folgendes umfasst:
nur wenn ein Zapping Beendigung eines pincodegeschützten Rundsendedienstes enthält,
Empfangen an einer Smartcard (206) von einem mit der offenen Mobilallianz-BCAST-konformen
(OMA-BCAST-konformen) Client (204) eines OMA-konformen Endgeräts (202) einer Auslösenachricht
als eine Unterbetriebsart eines BCAST-Befehls zum Angeben, dass die Smartcard das
nächste Mal, wenn Zapping zu dem pincodegeschützten Rundsendedienst auftritt, einen
Pincode anfordern muss, wobei das OMA-konforme Endgerät zum gleichzeitigen Entschlüsseln
unterschiedlicher pincodegeschützter Rundsendedienstes fähig ist und wobei die Auslösenachricht
eine Dienstverschlüsselungsschlüsselidentifizierung oder eine Programmverschlüsselungsschlüsselidentifizierung
enthält, die den pincodegeschützten Rundsendedienst angibt, und wobei der pincodegeschützte
Dienst einer aus mehreren Rundsendediensten ist, die an dem Endgerät empfangen werden;
und
Veranlassen, dass nach dem Detektieren des Auftretens des nächsten Zapping zu dem
pincodegeschützten Rundsendedienst ein Pincode angefordert wird.
5. Verfahren nach Anspruch 1 oder 4, wobei der pincodegeschützte Rundsendedienst zur
elterlichen Aufsicht pincodegeschützt ist.
6. Verfahren nach einem der Ansprüche 3 bis 5, wobei eine Instanz jedes Rundsendedienstes
auf einer oder mehreren Anwendungen abläuft; und wobei eine Auslösenachricht nur dann
empfangen wird, wenn das Zapping Beendigung aller Instanzen des pincodegeschützten
Rundsendedienstes enthält.
7. Verfahren nach einem der vorhergehenden Ansprüche, wobei die Unterbetriebsart des
BCAST-Befehls einen Wert von 0x04 aufweist und als eine Zapping-Signalbetriebsart
verwendet wird.
8. Vorrichtung, die Folgendes umfasst:
einen Prozessor; und
eine Speichereinheit, die mit dem Prozessor kommunikativ verbunden ist und Folgendes
enthält:
Computer-Code zum Empfangen von mehreren Rundsendediensten in einem mit der offenen
Mobilallianz konformen (OMA-konformen) Endgerät (202), das einen OMA-BCAST-konformen
Client (204) umfasst, wobei das OMA-konforme Endgerät zum gleichzeitigen Entschlüsseln
unterschiedlicher pincodegeschützter Rundsendedienste fähig ist;
Computer-Code, der Zapping von einem der empfangenen Rundsendedienste detektiert;
Computer-Code zum Bestimmen, ob das Zapping Beendigung eines pincodegeschützten Rundsendedienstes
enthält; und
Computer-Code zum Senden einer Auslösenachricht als eine Unterbetriebsart eines BCAST-Befehls
von dem OMA-BCAST-konformen Client des Endgeräts zu einer Smartcard (206) nur dann,
wenn Zapping Beendigung eines pincodegeschützten Rundsendedienstes enthält, wobei
die Auslösenachricht dazu dient anzugeben, dass die Smartcard das nächste Mal, wenn
Zapping zu dem pincodegeschützten Rundsendedienst auftritt, einen Pincode anfordern
muss, wobei die Auslösenachricht eine Dienstverschlüsselungsschlüsselidentifizierung
oder eine Programmverschlüsselungsschlüsselidentifizierung umfasst, die den pincodegeschützten
Rundsendedienst angibt.
9. Vorrichtung nach Anspruch 8, wobei der pincodegeschützte Rundsendedienst zur elterlichen
Aufsicht pincodegeschützt ist.
10. Vorrichtung nach einem der Ansprüche 8 bis 9, wobei die Speichereinheit ferner Folgendes
enthält:
Computer-Code zum Anfordern, in Reaktion auf Anweisung von der Smartcard, eines Pincodes,
wenn Zapping das Zapping zu einem pincodegeschützten Rundsendedienst enthält.
11. Vorrichtung nach einem der Ansprüche 8 bis 10, wobei eine Instanz jedes Rundsendedienstes
auf einer oder mehreren Anwendungen abläuft; und
wobei der Computer-Code zum Senden einer Auslösenachricht Computer-Code enthält zum
Senden einer Auslösenachricht nur dann, wenn das Zapping Beendigung aller Instanzen
des pincodegeschützten Rundsendedienstes enthält.
12. Vorrichtung, die Folgendes umfasst:
einen Prozessor; und
eine Speichereinheit, die mit dem Prozessor kommunikativ verbunden ist und Folgendes
enthält:
Computer-Code zum Empfangen an einer Smartcard (206) von einem mit der offenen Mobilallianz-BCAST-konformen
(OMA-BCAST-konformen) Client (204) eines OMA-konformen Endgeräts (202) einer Auslösenachricht
als eine Unterbetriebsart eines BCAST-Befehls nur dann, wenn Zapping Beendigung eines
pincodegeschützten Rundsendedienstes enthält, wobei die Auslösenachricht zum Angeben
dient, dass die Smartcard das nächste Mal, wenn Zapping zu dem pincodegeschützten
Rundsendedienst auftritt, einen Pincode anfordern muss, wobei das OMA-konforme Endgerät
zum gleichzeitigen Entschlüsseln unterschiedlicher pincodegeschützter Rundsendedienste
fähig ist und wobei die Auslösenachricht eine Dienstverschlüsselungsschlüsselidentifizierung
oder eine Programmverschlüsselungsschlüsselidentifizierung enthält, die den pincodegeschützten
Rundsendedienst angibt, und wobei der pincodegeschützte Rundsendedienst einer aus
mehreren Rundsendediensten ist, die in dem Endgerät empfangen werden; und
Computer-Code zum Veranlassen, dass ein Pincode nach dem Detektieren des Auftretens
des nächsten Zapping zu dem pincodegeschützten Rundsendedienst angefordert wird.
13. Vorrichtung nach einem der Ansprüche 8 bis 12, wobei die Unterbetriebsart des BCAST-Befehls
einen Wert von 0x04 aufweist und als eine Zapping-Signalbetriebsart verwendet wird.
14. Computerprogrammprodukt, das auf einem computerlesbaren Medium integriert ist, das
Folgendes umfasst:
Computer-Code zum Empfangen von mehreren Rundsendediensten in einem mit der offenen
Mobilallianz konformen (OMA-konformen) Endgerät (202), das einen OMA-BCAST-konformen
Client (204) umfasst, wobei das OMA-konforme Endgerät zum gleichzeitigen Entschlüsseln
unterschiedlicher pincodegeschützter Rundsendedienste fähig ist; und
Computer-Code, der Zapping von einem der empfangenen Rundsendedienste detektiert;
Computer-Code zum Bestimmen, ob das Zapping Beendigung eines pincodegeschützten Rundsendedienstes
enthält; und
Computer-Code zum Senden einer Auslösenachricht als eine Unterbetriebsart eines BCAST-Befehls
von dem OMA-BCAST-konformen Client des Endgeräts zu einer Smartcard (206) nur dann,
wenn Zapping Beendigung eines pincodegeschützten Rundsendedienstes enthält, wobei
die Auslösenachricht dazu dient anzugeben, dass die Smartcard das nächste Mal, wenn
Zapping zu dem pincodegeschützten Rundsendedienst auftritt, einen Pincode anfordern
muss, wobei die Auslösenachricht eine Dienstverschlüsselungsschlüsselidentifizierung
oder eine Programmverschlüsselungsschlüsselidentifizierung umfasst, die den pincodegeschützten
Rundsendedienst angibt.
15. Computerprogrammprodukt nach Anspruch 14, wobei die Unterbetriebsart des BCAST-Befehls
einen Wert von 0x04 aufweist und als eine Zapping-Signalbetriebsart verwendet wird.
1. Procédé comportant les étapes consistant à :
recevoir une pluralité de services de diffusion au niveau d'un terminal (202) compatible
avec l'alliance mobile ouverte (OMA) comportant un client (204) compatible avec un
BCAST d'OMA, le terminal compatible avec OMA étant capable de déchiffrer simultanément
différents services de diffusion protégés par code PIN ;
détecter un zapping à partir d'un des services de diffusion reçus ;
déterminer si le zapping comprend l'arrêt d'un service de diffusion protégé par code
PIN ; et
uniquement si le zapping comprend l'arrêt du service de diffusion protégé par code
PIN, envoyer du client compatible avec un BCAST d'OMA du terminal vers une carte (206)
à puce un message déclencheur en tant que sous-mode d'une commande BCAST pour indiquer
que la prochaine fois qu'un zapping vers le service de diffusion protégé par code
PIN a lieu, la carte à puce doit demander un code PIN, le message déclencheur comportant
une identification de clé de chiffrement de service ou une identification de clé de
chiffrement de programme indiquant le service de diffusion protégé par code PIN.
2. Procédé selon l'une quelconque des revendications précédentes, comportant en outre
l'étape suivants :
en réponse à une consigne provenant de la carte à puce, le terminal demande un code
PIN lorsque le zapping comprend un zapping vers un service de diffusion protégé par
code PIN.
3. Procédé selon l'une quelconque des revendications précédentes, une instance de chaque
service de diffusion étant en cours d'exécution sur une ou plusieurs applications
et un message déclencheur étant émis uniquement si le zapping comprend l'arrêt de
toutes les instances du service de diffusion protégé par code PIN.
4. Procédé comportant les étapes consistant :
uniquement lorsqu'un zapping comprend l'arrêt d'un service de diffusion protégé par
code PIN, à recevoir au niveau d'une carte (206) à puce, en provenance d'un client
(204) compatible avec un BCAST de l'alliance mobile ouverte (OMA) d'un terminal (202)
compatible avec OMA, un message déclencheur en tant que sous-mode d'une commande BCAST
pour indiquer que la prochaine fois qu'un zapping vers le service de diffusion protégé
par code PIN a lieu, la carte à puce doit demander un code PIN, le terminal compatible
avec OMA étant capable de déchiffrer simultanément différents services de diffusion
protégés par code PIN et le message déclencheur comportant une identification de clé
de chiffrement de service ou une identification de clé de chiffrement de programme
indiquant le service de diffusion protégé par code PIN, et le service protégé par
code PIN étant un service parmi une pluralité de services de diffusion reçus au niveau
du terminal ; et
à faire en sorte qu'un code PIN soit demandé suite à la détection de l'occurrence
du zapping suivant vers le service de diffusion protégé par code PIN.
5. Procédé selon la revendication 1 ou la revendication 4, le service de diffusion protégé
par code PIN étant protégé par code PIN pour un contrôle parental.
6. Procédé selon l'une quelconque des revendications 3 à 5, une instance de chaque service
de diffusion étant en cours d'exécution sur une ou plusieurs application ; et un message
déclencheur étant reçu uniquement si le zapping comprend l'arrêt de toutes les instances
du service de diffusion protégé par code PIN.
7. Procédé selon l'une quelconque des revendications précédentes, le sous-mode de la
commande BCAST présentant une valeur de 0x04 et étant utilisé en tant que mode de
signalisation de zapping.
8. Appareil comportant :
un processeur ; et
une unité de mémoire reliée de façon communicative au processeur et comprenant :
du code informatique servant à recevoir une pluralité de services de diffusion au
niveau d'un terminal (202) compatible avec l'alliance mobile ouverte (OMA) comportant
un client (204) compatible avec un BCAST d'OMA, le terminal compatible avec OMA étant
capable de déchiffrer simultanément différents services de diffusion protégés par
code PIN ;
du code informatique détectant un zapping à partir d'un des services de diffusion
reçus ;
du code informatique servant à déterminer si le zapping comprend l'arrêt d'un service
de diffusion protégé par code PIN ; et
du code informatique servant à émettre un message déclencheur en tant que sous-mode
d'une commande BCAST du client compatible avec un BCAST d'OMA du terminal vers une
carte (206) à puce uniquement si le zapping comprend l'arrêt du service de diffusion
protégé par code PIN, le message déclencheur servant à indiquer que la prochaine fois
qu'un zapping vers le service de diffusion protégé par code PIN a lieu, la carte à
puce doit demander un code PIN, le message déclencheur comportant une identification
de clé de chiffrement de service ou une identification de clé de chiffrement de programme
indiquant le service de diffusion protégé par code PIN.
9. Appareil selon la revendication 8, le service de diffusion protégé par code PIN étant
protégé par code PIN pour un contrôle parental.
10. Appareil selon l'une quelconque des revendications 8 à 9, l'unité de mémoire comprenant
en outre :
du code informatique servant, en réponse à une consigne provenant de la carte à puce,
à demander un code PIN lorsque le zapping comprend un zapping vers un service de diffusion
protégé par code PIN.
11. Appareil selon l'une quelconque des revendications 8 à 10, une instance de chaque
service de diffusion étant en cours d'exécution sur une ou plusieurs applications
; et
le code informatique qui sert à émettre un message déclencheur comprenant du code
informatique servant à émettre un message déclencheur uniquement si le zapping comprend
l'arrêt de toutes les instances du service de diffusion protégé par code PIN.
12. Appareil comportant :
un processeur ; et
une unité de mémoire reliée de façon communicative au processeur et comprenant :
du code informatique servant à recevoir au niveau d'une carte (206) à puce, en provenance
d'un client (204) compatible avec un BCAST de l'alliance mobile ouverte (OMA) d'un
terminal (202) compatible avec OMA, un message déclencheur en tant que sous-mode d'une
commande BCAST uniquement lorsqu'un zapping comprend l'arrêt d'un service de diffusion
protégé par code PIN, le message déclencheur servant à indiquer que la prochaine fois
qu'un zapping vers le service de diffusion protégé par code PIN a lieu, la carte à
puce doit demander un code PIN, le terminal compatible avec OMA étant capable de déchiffrer
simultanément différents services de diffusion protégés par code PIN et le message
déclencheur comportant une identification de clé de chiffrement de service ou une
identification de clé de chiffrement de programme indiquant le service de diffusion
protégé par code PIN, et le service de diffusion protégé par code PIN étant un service
parmi une pluralité de services de diffusion reçus au niveau du terminal ; et
du code informatique servant à faire en sorte qu'un code PIN soit demandé suite à
la détection de l'occurrence du zapping suivant vers le service de diffusion protégé
par code PIN.
13. Appareil selon l'une quelconque des revendications 8 à 12, le sous-mode de la commande
BCAST présentant une valeur de 0x04 et étant utilisé en tant que mode de signalisation
de zapping.
14. produit de programme informatique, concrétisé sur un support lisible par ordinateur,
comportant :
du code informatique servant à recevoir une pluralité de services de diffusion au
niveau d'un terminal (202) compatible avec l'alliance mobile ouverte (OMA) comportant
un client (204) compatible avec un BCAST d'OMA, le terminal compatible avec OMA étant
capable de déchiffrer simultanément différents services de diffusion protégés par
code PIN ; et
du code informatique détectant un zapping à partir d'un des services de diffusion
reçus ;
du code informatique servant à déterminer si le zapping comprend l'arrêt d'un service
de diffusion protégé par code PIN ; et
du code informatique servant à émettre un message déclencheur en tant que sous-mode
d'une commande BCAST du client compatible avec un BCAST d'OMA du terminal vers une
carte à puce (206) uniquement si le zapping comprend l'arrêt du service de diffusion
protégé par code PIN, le message déclencheur servant à indiquer que la prochaine fois
qu'un zapping vers le service de diffusion protégé par code PIN a lieu, la carte à
puce doit demander un code PIN, le message déclencheur comportant une identification
de clé de chiffrement de service ou une identification de clé de chiffrement de programme
indiquant le service de diffusion protégé par code PIN.
15. Produit de programme informatique selon la revendication 14, le sous-mode de la commande
BCAST présentant une valeur de 0x04 et étant utilisé en tant que mode de signalisation
de zapping.