CN100588244C - Method and system for implementing broadcasting network condition receiving - Google Patents

Method and system for implementing broadcasting network condition receiving Download PDF

Info

Publication number
CN100588244C
CN100588244C CN200710062726A CN200710062726A CN100588244C CN 100588244 C CN100588244 C CN 100588244C CN 200710062726 A CN200710062726 A CN 200710062726A CN 200710062726 A CN200710062726 A CN 200710062726A CN 100588244 C CN100588244 C CN 100588244C
Authority
CN
China
Prior art keywords
module
receiver
network
key
service
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN200710062726A
Other languages
Chinese (zh)
Other versions
CN101227586A (en
Inventor
杜聚龙
范波
鲍海兵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING BAUSTEM INFORMATION TECHNOLOGY Co Ltd
Original Assignee
BEIJING BAUSTEM INFORMATION TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING BAUSTEM INFORMATION TECHNOLOGY Co Ltd filed Critical BEIJING BAUSTEM INFORMATION TECHNOLOGY Co Ltd
Priority to CN200710062726A priority Critical patent/CN100588244C/en
Publication of CN101227586A publication Critical patent/CN101227586A/en
Application granted granted Critical
Publication of CN100588244C publication Critical patent/CN100588244C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

The invention discloses a method and a system of realizing conditional reception of broadcasting network, wherein the system comprises a server 1, a server 2, a server3, a multiplexer, a scrambler, anetwork and a receiver. The method comprises the following steps: scrambling service data and encrypting control words; producing a module 1 and a module 2; using the receiver to download the module 1; the module 1 operates on the receiver and checks the legitimacy of the receiver, and then downloads corresponding module 2 to the legal receiver; the module 2 deciphers the control words; the control words are used to descramble corresponding service data after the receiver receives the service data. After adopting the technical proposal of the invention, the authorization situation of users canbe validated to realize conditional reception without using additional hardware safety media to preserve private keys of users, and the transmission of keys in the network is not easily tracked and decoded.

Description

A kind of method and system of realizing that broadcasting network condition receives
Technical field
The present invention relates to radio network, be specifically related to a kind of method and system of realizing that broadcasting network condition receives.
Background technology
The management that is digitized as each user of television broadcasting provides condition.In the access control to user's service, the method that adopts usually is to utilize condition receiving system to manage in the world.
Condition receiving system realized by three grades of key code systems usually, as shown in Figure 1.The data flow Be Controlled word CW (control word) of service is with general cipher mode scrambling.In order to improve the fail safe of system, control word can onlinely be changed, and new control word forms ECM (EntitleControl Message Entitlement Control Message) after by symmetric key encryption, and the data along with service in code stream send to receiver together.The key that is used for encrypting control word is called as service key SK (Service Key).SK also can be updated in code stream.SK joins among the EMM (Entitle Manage Message Entitlement Management Message) after the front end of network is by the public key encryption of a pair of unsymmetrical key, broadcasts in network.At receiving terminal, only had this receiver and just can untie this SK private key in the key, thus the CW that is served accordingly, the data of the corresponding service of descrambling, the normal reception served.So can be at front end at the authorization conditions of each receiver, the deserved SK of this receiver of public key encryption with this receiver private key sends in the network.Because CW and SK can upgrade in network, generally concentrate in the decoding to the private key of receiver for the attack of condition receiving system.
In the condition receiving system of traditional radio network, terminal use's encryption authorization is adopted the smart card authorization usually, guarantee the fail safe of the propagation of SK with smart card.At user's receiving terminal, each receiver is furnished with one and receives smart card.Receive an in store private key in the control smart card.The SK of the service that the network head end can receive this receiver with the public key encryption that this receiver mated, sends in the network.At receiving terminal, the private key in the smart card utilization card solves the SK that encrypts in the code stream, and solves CW with SK, gives receiver with CW, by the data of receiver by the corresponding service of CW descrambling.
The safety of private key is guaranteed by the technology of smart card.Utilize the physical characteristic and the calculation function of smart card, the decrypt operation that makes SK and CW moves in card, guaranteed that secret do not learned by the external world, thereby fail safe is guaranteed.The uniqueness that private key in the smart card has and be difficult for replicability, this private key should be read out and duplicate in smart card, has guaranteed the safety of private key, make smart card can be in radio network unique information that obtains sending to this sheet smart card from front end.
Duplicate smart card and become possibility but some present technology make.Smart card after duplicating can use on clone's receiver, steals service.And this usurping can be propagated by the propagation of duplicating smart card.
Summary of the invention
At above deficiency, the present invention proposes a kind of method and system of realizing that broadcasting network condition receives, can not rely on storage medium to preserve realization condition reception under the situation of private key for user.
The technical solution used in the present invention is:
A kind of method that realizes the condition reception of radio network is characterized in that, comprising:
(a) data of each service send in the network after with the control word scrambling;
(b) generation module 1 and module 2 and send in the network;
Above step is not subjected to sequence limit, and following steps are carried out in order:
(c) after the control word encryption with each service correspondence, form control information, send in the network;
(d) receiver obtains in network and download module 1;
(e) module 1 is moved on receiver, the legitimacy of the described receiver of verification; If described receiver is verified as legitimate receiver, execution in step (f);
(f) module 1 is downloaded corresponding module 2 for described receiver according to the authorization of service situation of described receiver in network;
(g) module 2 is moved on receiver, deciphers the controlled word of control information in the network, and control word is exported to described receiver; After receiver receives the data of service, utilize the data of the service of described control word descrambling correspondence.
Further, in the described step (b), will be kept at after the secret key encryption in the corresponding module 2; Each key has corresponding module 2; Described key is dispersed in the program of module 2;
In the described step (c), with the described secret key encryption of control word;
In the described step (g), decrypt key earlier after module 2 operations, then according to the controlled word of this secret key decryption control information.
Further, in the described step (e), the method of module 1 verification receiver legitimacy is: calculate the digital signature of receiver unique identifier with the certificate that stores in the receiver, if the digital signature that calculates be stored in receiver in consistent, think that this receiver is legal.
Further, also comprise in described step (d) arbitrary step before: the authorization of service situation structure authorization message according to each receiver sends in the network;
In the described step (f), module 1 is resolved the authorization message in the network, obtains the authorization of service situation of described receiver.
Further, in the described step (f), module 1 obtains the authorization of service situation of this receiver from described authorization message according to the unique identifier of described receiver.
The present invention also provides a kind of system that realizes the condition reception of radio network, it is characterized in that, comprises server 1, server 2, server 3, multiplexer, scrambler, network, receiver;
Described server 1 generation module 1 and module 2 also send to multiplexer;
Described server 2 is encrypted the formation control information with control word and is sent to multiplexer from the controlled word of scrambler;
Described server 3 is from constructing authorization message and send to multiplexer according to the authorization of service situation of each receiver;
Described scrambler utilizes control word that the data of service are carried out sending it to multiplexer after the scrambling;
Described multiplexer is control information, and authorization message and module 1, module 2 are inserted in the data of the service after the scrambling and send in the network;
Described module 1 is downloaded the back receiver is carried out legitimate verification, and by resolving the authorization message in the network, for legitimate receiver is downloaded from network and the corresponding module 2 of its authorization of service situation;
Described module 2 is downloaded the control information in the back deciphering network, and the control word that obtains is exported to receiver;
Described receiver is acquisition module 1 from network; And receive the data of service by network, according to the data of the control word descrambling service of module 2 outputs.
Further, the key after described server 1 will be encrypted is kept in the module 2, and module 2 is passed to server 2; Described key is dispersed in the program of module 2;
After being downloaded to receiver, described module 2 decrypts key, and according to the control information in the described secret key decryption network;
Described server 2 runtime servers 1 transmit the module 2 of coming and obtain key, with this secret key encryption control word.
Further, storage has unique identifier, certificate and this certificate digital signature to unique identifier in the described receiver;
Described module 1 is carried out legitimate verification by calculate the digital signature of described unique identifier with described certificate to receiver: if the digital signature that calculates be stored in receiver in consistent, think that this receiver is legal;
Described module 1 obtains the authorization of service situation of receiver from authorization message according to described unique identifier.
Further, described server 1 regularly or according to operator's requirement upgrades described key, generates corresponding new module 2 and sends to server 2 and multiplexer; Then by signaling receiver download module 2 again; Described server 2 is encrypted control word according to the new key in the new module 2, forms new control information and sends to multiplexer; Multiplexing machine sends to new module 2 and new control information in the network.
Further, described server 1 regularly or according to operator's requirement upgrades the method for encrypting described key, simultaneously according to new encryption method encryption key, and the new module 2 of corresponding generation sends to server 2 and multiplexer, then by signaling receiver download module 2 again; Multiplexing machine sends to new module 2 in the network.
Technical scheme of the present invention need not use secure storage mediums such as smart card to preserve private key for user, utilize the unique identifier of receiver just can verify to user's authorization conditions, send legitimate receiver to the control word safety and precise that thereby the data of descrambling service can be used, receive with realization condition; And the encrypting and decrypting method of encrypting the key of described control word also can upgrade, and it is tracked and crack that the transmission of this key in network is difficult for.
Description of drawings
Fig. 1 is three grades of key code system schematic diagrames of condition receiving system in the prior art;
Fig. 2 is the concrete implementing procedure figure that the present invention realizes the method that broadcasting network condition receives;
Fig. 3 is the concrete enforcement block diagram that the present invention realizes the system that broadcasting network condition receives.
Embodiment
Below in conjunction with the drawings and specific embodiments the present invention is set forth in more detail.
A kind of method that realizes that broadcasting network condition receives as shown in Figure 2, may further comprise the steps:
The data of a, each service send in the network after with identical or different control word CW scrambling;
B, the concurrent two sections programs that can in receiver, move of network of sending to of generation: be called module 1 and module 2; Be kept in the module 2 after the key used of deciphering control information encrypted again, wherein said key is dispersed in the program of module 2, is hidden in other words in the module 2.Each key has corresponding module 2.
Above step is not subjected to sequence limit, and following steps are carried out in order:
C, control word CW that each service is corresponding with identical or different secret key encryption after, the formation control information, the data code flow with the service of scrambling sends in the network.Each service has corresponding control word, and corresponding key is also just arranged, so each service has corresponding module 2.
Before carrying out steps d, also to send in the network according to the authorization of service situation structure authorization message of each receiver; Structure and send authorization message so long as before steps d, finish and get final product, it is all right in any one step in the c to be placed on a; Such as in the specific implementation, can but be not limited to be placed among the step c.
D, receiver obtain in network and download module 1; Can set by front network equipment and in network, issue signaling, after the receiver start, listen to the signaling in the network, obtain and download module 1.
E, module 1 are utilized UID (unique identifier) and its legitimacy of digital signature verification in the described receiver hardware after operation on this receiver.Each receiver has stored the legal certificate of an approval and this certificate digital signature to the UID of this receiver before dispatching from the factory.Module 1 is read the UID of this receiver after being downloaded to receiver, with the certificate that stores this UID that reads is calculated digital signature.If this digital signature that calculates is identical with the signature of the time storage of dispatching from the factory, this receiver just is considered to legitimate receiver, carries out step f.
The authorization message that f, module 1 resolves in the network, obtain according to the UID of receiver this receiver the authorization of service situation--promptly which service this receiver has the right to receive; In the networking, find i.e. this receiver pairing module 2 of service of having the right to receive then, and module 2 is downloaded on this receiver with the corresponding module 2--of authorization of service situation of this receiver.
G, module 2 are after operation on this receiver, and deciphering draws key.According to the control information in this secret key decryption network, obtain CW and export to receiver; After receiver receives the data of service, utilize the data of the service of described CW descrambling correspondence, thereby the condition that realizes radio network receives.
A kind of system that realizes that broadcasting network condition receives does not need extra hardware medium to preserve private key, as shown in Figure 3, comprises server 1, server 2, server 3, multiplexer, scrambler, network, receiver.
Described server 1 produces key, and with being hidden in after the secret key encryption in the module 2, module 2 is passed to server 2 and multiplexer; Described server 1 is gone back generation module 1 and is passed to multiplexer.
Described server 2 obtains module 2 from server 1, and operation module 2 obtains encryption key; Obtain CW from scrambler, CW is transmitted the secret key encryption of coming with server 1, form control information and send to multiplexer.
Described server 3 obtains the authorization of service situation of each receiver, i.e. the TV programme that can watch at present of each receiver; According to this authorization of service situation structure authorization message, and send to multiplexer, the content of described information comprises the situation of the authorization of service of each receiver.
Described scrambler utilizes CW that the data of service are carried out sending it to multiplexer after the scrambling.
Described multiplexer is control information, and authorization message and module 1, module 2 are inserted in the data of the service after the scrambling and send in the network.
Storage has unique identifier UID, certificate and this certificate digital signature to UID in the described receiver; After described receiver received signaling in the network, acquisition module 1 from network; Receive the data of service by network, and according to the data of the CW descrambling service of module 2 outputs.
Described module 1 is received to be moved on receiver after machine is downloaded, UID, certificate and the digital signature of utilizing receiver carried out legitimate verification to the receiver at place, and by resolving the authorization message in the network, for legitimate receiver is downloaded from network and the corresponding module 2 of its authorization of service situation.Module 1 is to utilize the hardware UID in the receiver to obtain corresponding authorization of service situation in authorization message, thereby downloads corresponding module 2 for receiver.
Preserve the key after the encryption in the described module 2, it moves after being downloaded the band receiver, and deciphering obtains key, and will export to receiver according to the CW that the deciphering of the control information in described key and the network obtains.
In system of the present invention, the data flow of each service is by the CW scrambling, and the CW of a plurality of services inserts data flow after by identical or different secret key encryption and goes into network and propagate.The server 1 of front end for each key of encrypting CW produces corresponding module 2, is transferred in the network in network, and regularly or by the operator--as ISP's the requirement more new key and the module 2 of correspondence with it.
The function that the former cause smart card of receiving terminal is finished, in the present invention by two functional modules--module 1 and module 2 common realizations.1 pair of receiver of module carries out legitimate verification; And instruction in the parsing network and authorization message, download the module 2 of appointment for legitimate receiver; The CW that transmits in the module 2 deciphering networks, thus make receiver can receive the service of mandate.These two modules are all produced and are stored in wherein by server 1, send in the network by server 1 and multiplexer, and are downloaded in the receiver and move.
Module 1 need guarantee to download into legitimate receiver the module 2 of appointment, and can not be receiver the download module 2 imitated or clone.This is to utilize UID to have uniqueness, the characteristics that can't duplicate, and the method by digital signature guarantees.Module 1 need be verified the legitimacy of receiver before beginning to download.Have only on the receiver that has passed through legitimate verification, module 1 just brings into operation and downloads the program of part.So just avoided defrauding of the possibility of module 1 download module 2 with clone or imitated receiver.
Module 1 is resolved the authorization message in the network, obtains the authorization of service situation of current receiver.The mapping of this authorization message realizes by UID.The module 2 that the service that module 1 is sought in network and receiver is authorized to is complementary downloads to receiver.The operation of module 2 is activated by module 1.The checking of the legitimacy by 1 pair of receiver of module, module 2 also can only be receiver service legal and that obtain the authorization.
Module 2 comprises the key after the encryption, and the function of module 2 is from self extracting this key, and uses this key-parsing to go out CW.Key is dispersed in the program code, even module 2 is intercepted and captured, also is difficult to extract key from the module of intercepting and capturing 2.Simultaneously can be by to the control logic of program and sequential complicated, or realize decrypted program with the mode of multithreading by operating system, make the tracking difficulty raising of program itself.
In addition, module 2 is transmitted in network rather than is stored in the storage medium, and this system that makes not only can upgrade the key of encrypting CW, also can upgrade the method for encryption key.
More the performing step of new key is: server 1 produces new key and the new module 2 of corresponding generation sends to server 2 and multiplexer, then by signaling receiver download module 2 again; Server 2 forms new control information according to new module 2, and sends to multiplexer; Multiplexing machine sends to new module 2 and new control information in the network; Include new key in the new module 2, the function of module 2 is supported decruption key and deciphering CW.
The performing step that upgrades the method for encryption key is: according to new encryption method encryption key, and the new module 2 of corresponding generation sends to multiplexing machine, then by signaling receiver download module 2 again; Multiplexing machine sends to new module 2 in the network; Include in the new module 2 with the key after the new key encryption, the function support of module 2 is with new method decruption key and decipher CW.
After receiver received signaling, first download module 1 was downloaded new module 2 by module 1 then.
Further specify technical scheme of the present invention with an application example below.
This exemplary application is in HFC (Hybrid Fiber-Coaxial optical fiber/coaxial cable mixes) network.The system that realizes the condition reception of radio network forms by HFC front end system and the set-top box that includes the receiving terminal module are common.In this system, relevant with the program stream condition receiving system have two data flow: control information and authorization message.Transmit in control information by the CW after the service key encryption.Comprise authorized user message in the authorization message to each set-top box.Server 1 is also propagated in network with the form of data flow for module 1 and module 2 that set-top box produces.
As shown in Figure 3, this system comprises server 2, server 3, multiplexer, scrambler, QAM (quadrature amplitude modulation device), hfc plant, server 1.
Described server 1 produces service key, and produces the module 2 of correspondence for each service key; Server 1 encrypted service key is dispersed in the service key after encrypting in the program code of module 2 and with module 2 and passes to server 2 and multiplexer; The function of module 2 comprises decryption services key and deciphering CW; Described server 1 is gone back generation module 1 and is sent to multiplexer.Server 1 can be regularly or by operator's the requirement update service key and the module 2 of correspondence with it; The performing step that upgrades is: server 1 produces new service key, and encrypt this new key according to new encryption method, produce the new key that new module 2 is preserved after encrypting, support new decryption method, new module 2 is sent to server 2 and multiplexer, then by signaling set-top box download module 2 again; Server 2 is encrypted CW according to new service key and is formed new control information, and sends to multiplexer.
Described module 1 is downloaded the back and moves in set-top box, and the set-top box at place is carried out legitimate verification, and by resolving the authorization message in the network, for legal set-top box is downloaded in hfc plant and the corresponding module 2 of its authorization of service situation.Module 1 is hardware UID, certificate and the digital signature of utilizing in the set-top box, and set-top box is carried out legitimate verification; And utilize UID to seek corresponding module 2.
Described module 2 is preserved the service key after the encryption, function is supported the method for decryption services key and CW, and it is downloaded the back and moves in set-top box, and deciphering obtains service key, and obtain CW according to the control information in service key and hfc plant deciphering, then CW is exported to set-top box.
Described server 2 obtains CW from scrambler, CW is transmitted the service key that parses in the module 2 of coming with server 1 and encrypts, and forms control information and also sends to multiplexer.
Described server 3 obtains the authorization of service situation of each set-top box from the user management database, i.e. the TV programme that can watch at present by set-top box of user; Construct authorization message and send to multiplexer according to this authorization of service situation, the content of described information comprises the situation of the authorization of service of each set-top box.
Described scrambler utilizes CW that the data of service are carried out sending it to multiplexer after the scrambling.
Described multiplexer is inserted into control information, authorization message and module 1, module 2 in the data of the service after the scrambling, and the data that will serve send in the hfc plant after modulating by QAM then.
Storage has unique identifier UID, certificate and this certificate digital signature to UID in the described set-top box; After described set-top box received signaling in the hfc plant, download module 1 from hfc plant; Receive the data of service then by hfc plant, and according to the data of the CW descrambling service of module 2 outputs.
After the mandate that has obtained as the user some program, in authorization message, will include these programs in the pairing authorization message of UID of the employed set-top box of this user; Module 1 learns by resolving authorization message which program is set-top box have the right to watch, and will download in the set-top box corresponding to the module 2 of these programs then, makes set-top box can descrambling obtain the TV programme of mandate.
Certainly; the present invention also can have other various embodiments; under the situation that does not deviate from spirit of the present invention and essence thereof; those of ordinary skill in the art work as can make various corresponding changes and distortion according to the present invention, but these corresponding changes and distortion all should belong to the protection range of the appended claim of the present invention.

Claims (10)

1, a kind of method that realizes the condition reception of radio network is characterized in that, comprising:
(a) data of each service send in the network after with the control word scrambling;
(b) generation module 1 and module 2 and send in the network;
Above step is not subjected to sequence limit, and following steps are carried out in order:
(c) after the control word encryption with each service correspondence, form control information, send in the network;
(d) receiver obtains in network and download module 1;
(e) module 1 is moved on receiver, the legitimacy of the described receiver of verification; If described receiver is verified as legitimate receiver, execution in step (f);
(f) module 1 is downloaded corresponding module 2 for described receiver according to the authorization of service situation of described receiver in network;
(g) module 2 is moved on receiver, deciphers the controlled word of control information in the network, and control word is exported to described receiver; After receiver receives the data of service, utilize the data of the service of described control word descrambling correspondence.
2, the method for claim 1 is characterized in that, in the described step (b), will be kept at after the secret key encryption in the corresponding module 2; Each key has corresponding module 2; Described key is dispersed in the program of module 2;
In the described step (c), with the described secret key encryption of control word;
In the described step (g), decrypt key earlier after module 2 operations, then according to the controlled word of this secret key decryption control information.
3, the method for claim 1, it is characterized in that, in the described step (e), the method of module 1 verification receiver legitimacy is: the digital signature of calculating the receiver unique identifier with the certificate that stores in the receiver, if the digital signature that calculates be stored in receiver in consistent, think that this receiver is legal.
4, as each described method in the claim 1 to 3, it is characterized in that, also comprise in described step (d) arbitrary step before: the authorization of service situation structure authorization message according to each receiver sends in the network;
In the described step (f), module 1 is resolved the authorization message in the network, obtains the authorization of service situation of described receiver.
5, method as claimed in claim 4 is characterized in that, in the described step (f), module 1 obtains the authorization of service situation of this receiver from described authorization message according to the unique identifier of described receiver.
6, a kind of system that realizes the condition reception of radio network is characterized in that, comprises server 1, server 2, server 3, multiplexer, scrambler, network, receiver;
Described server 1 generation module 1 and module 2 also send to multiplexer;
Described server 2 is encrypted the formation control information with control word and is sent to multiplexer from the controlled word of scrambler;
Described server 3 is from constructing authorization message and send to multiplexer according to the authorization of service situation of each receiver;
Described scrambler utilizes control word that the data of service are carried out sending it to multiplexer after the scrambling;
Described multiplexer is control information, and authorization message and module 1, module 2 are inserted in the data of the service after the scrambling and send in the network;
Described module 1 is downloaded the back receiver is carried out legitimate verification, and by resolving the authorization message in the network, for legitimate receiver is downloaded from network and the corresponding module 2 of its authorization of service situation;
Described module 2 is downloaded the control information in the back deciphering network, and the control word that obtains is exported to receiver;
Described receiver is acquisition module 1 from network; And receive the data of service by network, according to the data of the control word descrambling service of module 2 outputs.
7, system as claimed in claim 6 is characterized in that, the key after described server 1 will be encrypted is kept in the module 2, and module 2 is passed to server 2; Described key is dispersed in the program of module 2;
After being downloaded to receiver, described module 2 decrypts key, and according to the control information in the described secret key decryption network;
Described server 2 runtime servers 1 transmit the module 2 of coming and obtain key, with this secret key encryption control word.
8, system as claimed in claim 6 is characterized in that: storage has unique identifier, certificate and this certificate digital signature to unique identifier in the described receiver;
Described module 1 is carried out legitimate verification by calculate the digital signature of described unique identifier with described certificate to receiver: if the digital signature that calculates be stored in receiver in consistent, think that this receiver is legal;
Described module 1 obtains the authorization of service situation of receiver from authorization message according to described unique identifier.
9, system as claimed in claim 7 is characterized in that, described server 1 regularly or according to operator's requirement upgrades described key, generates corresponding new module 2 and sends to server 2 and multiplexer; Then by signaling receiver download module 2 again; Described server 2 is encrypted control word according to the new key in the new module 2, forms new control information and sends to multiplexer; Multiplexing machine sends to new module 2 and new control information in the network.
10, system as claimed in claim 7, it is characterized in that, described server 1 regularly or according to operator's requirement upgrades the method for encrypting described key, simultaneously according to new encryption method encryption key, and the new module 2 of corresponding generation sends to server 2 and multiplexer, then by signaling receiver download module 2 again; Multiplexing machine sends to new module 2 in the network.
CN200710062726A 2007-01-15 2007-01-15 Method and system for implementing broadcasting network condition receiving Expired - Fee Related CN100588244C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN200710062726A CN100588244C (en) 2007-01-15 2007-01-15 Method and system for implementing broadcasting network condition receiving

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN200710062726A CN100588244C (en) 2007-01-15 2007-01-15 Method and system for implementing broadcasting network condition receiving

Publications (2)

Publication Number Publication Date
CN101227586A CN101227586A (en) 2008-07-23
CN100588244C true CN100588244C (en) 2010-02-03

Family

ID=39859312

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200710062726A Expired - Fee Related CN100588244C (en) 2007-01-15 2007-01-15 Method and system for implementing broadcasting network condition receiving

Country Status (1)

Country Link
CN (1) CN100588244C (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101651507B (en) * 2008-08-15 2013-05-29 威盛电子(中国)有限公司 Method and system for securely playing multimedia broadcast content and multimedia broadcast system
CN102769776B (en) * 2012-07-30 2016-09-07 山东泰信电子股份有限公司 A kind of CAS of realization terminal obtains the system and method for mandate in time

Also Published As

Publication number Publication date
CN101227586A (en) 2008-07-23

Similar Documents

Publication Publication Date Title
EP2461539B1 (en) Control word protection
RU2433548C2 (en) Method of descrambling scrambled content data object
KR100969668B1 (en) Method for Downloading CAS in IPTV
US9385997B2 (en) Protection of control words employed by conditional access systems
KR20100072909A (en) Method and apparatus for mutual authentication in downloadable conditional access system
CN102164320A (en) Improved terminal based on conditional access technology
EP2724546B1 (en) Receiver software protection
GB2489672A (en) Authentication certificate distribution to set top boxes
CN102802036A (en) System and method for identifying digital television
CN101207794B (en) Method for enciphering and deciphering number copyright management of IPTV system
CN106803980B (en) Guard method, hardware security module, master chip and the terminal of encrypted control word
CN101640785A (en) Encrypting/decrypting system and encrypting/decrypting method for interactive network television
CN101202883B (en) System for numeral copyright management of IPTV system
CN100521771C (en) A conditional reception system merging Internet and cable television network environments
CN102917252A (en) IPTV (internet protocol television) program stream content protection system and method
CN100588244C (en) Method and system for implementing broadcasting network condition receiving
CN101521668A (en) Method for authorizing multimedia broadcasting content
CN101505400A (en) Bi-directional set-top box authentication method, system and related equipment
CN103546767A (en) Content protection method and system of multimedia service
KR20130096575A (en) Apparatus and method for distributing group key based on public-key
CN103747300B (en) A kind of condition receiving system for supporting mobile terminal
KR100947326B1 (en) Downloadable conditional access system host apparatus and method for reinforcing secure of the same
CN102238422B (en) Digital television broadcasting conditional access system
US20100235626A1 (en) Apparatus and method for mutual authentication in downloadable conditional access system
KR101281928B1 (en) Apparatus and method for mutual authentication in downloadable conditional access system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20100203