(54) INTEGRITY PROTECTION OF STREAMED CONTENT
(75) Inventor: Sami Pippuri, Espoo (Fl)
(73) Assignee: Nokia Corporation, Espoo (FI)
* Notice: Sub'ect to an disclaimer, the term of this J Y patent is extended or adjusted under 35 U.S.C. l54(b) by 783 days.
(21) Appl.No.: 12/283,622
(22) Filed: Sep. 12, 2008 (65) Prior Publication Data US 2009/0116646 A1 May 7,2009
Related U.S. Application Data
(63) Continuation of application No. 10/844,063, filed on May 12, 2004, now Pat. No. 7,477,749.
(51) Int. Cl.
H04L 9/00 (2006.01) (52) U.S. Cl. ....................... .. 380/284; 380/283; 380/278 (58) Field of Classification Search ................ .. 380/284,
380/283, 278 See application file for complete search history.
2002/0013772 A1 1/2002 Peinado 2002/0080969 A1 6/2002 Giobbi
FOREIGN PATENT DOCUMENTS WO WO 02/084980 10/2002 OTHER PUBLICATIONS
Request for Comments 1889, Network Working Group, Audio -Video Transport Working Group, “RT P.‘ A Transport Protocol for RealTime Applications,” by H. Schulzrinne et al., Jan. 1996, 75 pp.
Request for Comments 2326, Network Working Group, “Real Time Streaming Protocol (RT SP),” by H. Schulzrinne et al., Apr. 1998, 92 PP
Request for Comments 2543, Network Working Group, “SIP: Session Initiation Protocol,” by M. Handley et al., Mar. 1999, 153 pp. M. Baugher, et al; “RFC 37114The Secure Real-time Transport Protocol (SRTP)”; May 11, 2007; www.faqs.org/rfcs/rfc3711.html; whole document.
XEP-0200; Stanza Encryption; 2007; whole document. http://www.microsoft.com/technet/community/columns/cableguy/ cg1104.mspx; 2006.
A. Barba, et al.; “Key management in the handover. Application to third generation mobile systems”; Personal, Indoor and Mobile Radio Communications; 1995; PIMRC’95; Wireless: Merging onto the Information Superhighway; Sixth IEEE International Symposium; vol. 1, Sep. 27-29, 1995; pp. 300-305.
L. Chen, et al.; “Key Distribution without Individual Trusted Authentication Servers;” Computer Security Foundations Workshop; 1995; Eighth IEEE Proceedings; Jun. 13-15, 1995; pp. 30-36.
M. Badra, et al.; “Key-Exchange Authentication Using Shared Secrets;” IEEE Computer Society; vol. 39, Issue 3, Mar. 2006; pp. 58-66.
Primary Examiner 4 DavidY Jung (74) Attorney, Agent, or Firm 4Alfred A. Fressola; Ware, Fressola, Van Der Sluys & Adolphson LLP
The invention relates to a method, a system, an electronic device and a computer program for providing at least one content stream to an electronic device applying Digital Rights Management (DRM). In the method a master integrity key is obtained in a streaming node. An encrypted master integrity key is obtained in an electronic device. The encrypted master integrity key is decrypted in the electronic device. At least one session integrity key is formed in the streaming node and in the electronic device using at least the master integrity key and the integrity of at least one content stream is protected between the streaming node and the electronic device using the at least one session integrity key.
14 Claims, 4 Drawing Sheets
RECEIVE STREAM KJ
Em(s TREAM) PROTECTED