CN101977113B - Method for equipment identification in digital copyright management - Google Patents

Method for equipment identification in digital copyright management Download PDF

Info

Publication number
CN101977113B
CN101977113B CN 201010533922 CN201010533922A CN101977113B CN 101977113 B CN101977113 B CN 101977113B CN 201010533922 CN201010533922 CN 201010533922 CN 201010533922 A CN201010533922 A CN 201010533922A CN 101977113 B CN101977113 B CN 101977113B
Authority
CN
China
Prior art keywords
certificate
server
terminal equipment
device authentication
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN 201010533922
Other languages
Chinese (zh)
Other versions
CN101977113A (en
Inventor
胡皓
刘贤洪
张新法
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sichuan Changhong Electric Co Ltd
Original Assignee
Sichuan Changhong Electric Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sichuan Changhong Electric Co Ltd filed Critical Sichuan Changhong Electric Co Ltd
Priority to CN 201010533922 priority Critical patent/CN101977113B/en
Publication of CN101977113A publication Critical patent/CN101977113A/en
Application granted granted Critical
Publication of CN101977113B publication Critical patent/CN101977113B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention relates to a technique of digital copyright management. The invention solves the problem of unidirectional identification of an on-line identification mode for equipment identification in the traditional digital copyright management technique and provides a method for the equipment identification in the digital copyright management, which comprises the steps of storing various certificates and private keys of terminal equipment in the terminal equipment; storing various certificates and private keys of an equipment identification server in the equipment identification server; and adopting a bidirectional identification mode of the terminal equipment and the equipment identification server to identify the terminal equipment. The invention has the advantages that potential safety hazards can be avoided, and the method is suitable for the equipment identification in the digital copyright management.

Description

The method of equipment identification in digital copyright management
Technical field
The present invention relates to the technology of digital copyright management, particularly the technology of device authentication in digital copyright management.
Background technology
characteristics based on digital information have determined to have another kind of unique technology, come the copyright of these digitized audio/video program contents of more protection, this technology is exactly Digital Rights Management Technology---DRM (digital right management), the operation principle of DRM technology is: model digital program authorization center, compression coding digital program content, utilize the digital program content of key (key) after can encipherment protection (lock) compression coding, digital program head after the compression coding of encrypting is being deposited the URL of KeyID and digital program authorization center, the user is in a sowing time, KeyID and the URL information deposited according to the digital program head after the compression coding of encrypting, the association key of sending after just can the checking mandate by the digital program authorization center is decrypted (unlock), program can be play, because the program that needs protection is encrypted, even therefore downloaded preservation by the user, if not obtaining the checking mandate of digital program authorization center also can't play, thereby tight protection the copyright of program, but the emphasis of present DRM technology mainly concentrates on the aspects such as user's authentication and authorization, mainly contain following problem aspect device authentication: 1) equipment is not authenticated, the equipment personation of non-this DRM system may appear, thereby the potential safety hazard of staying, 2) adopt the mode of offline authentication, in advance the device authentication desired data is stored on subscriber computer, equipment is completed authentication by subscriber computer, may cause authentication result incorrect because verify data can't upgrade in time or be tampered like this, 3) adopt the mode of on-line authentication, its step is mainly at first by root certificate verification terminal equipment secondary CA certificate and terminal equipment certificate, by rear use terminal equipment certificate encrypted random number, again with the deciphering of terminal equipment certificate private key, if the result that obtains authentication success identical with former random number, so just the device authentication server authenticates terminal equipment, and terminal equipment does not authenticate the device authentication server, the device authentication server might be counterfeiting, thereby the potential safety hazard of staying, and need the extra smart card that adopts, the external agencys such as USBKey, increase cost.
Summary of the invention
The objective of the invention is to overcome in present Digital Rights Management Technology device authentication on-line authentication mode and only carry out the shortcoming of unilateral authentication, a kind of method of equipment identification in digital copyright management is provided.
The present invention solves its technical problem, and the technical scheme of employing is: the method for equipment identification in digital copyright management, it is characterized in that, and comprise the following steps:
A. by the certificate management system issue root certificate of DRM system, with this root certificates constructing equipment secondary CA (digital certificate authentication center) certificate and server secondary CA certificate, use equipment secondary CA certificate and server secondary CA certificate to generate respectively terminal equipment certificate and device authentication server certificate;
B. root certificate, equipment secondary CA certificate, terminal equipment certificate and private key thereof are stored in terminal equipment;
C. root certificate, server secondary CA certificate, device authentication server certificate and private key thereof are stored in the device authentication server;
D. during device authentication, terminal equipment is set up network with the device authentication server and is connected, and terminal equipment is initiated authentication request to the device authentication server, and this authentication request comprises terminal equipment ID, terminal equipment certificate serial number;
E. the device authentication server is received the authentication request that terminal equipment sends, reverting equipment certificate server ID;
F. terminal equipment is to device authentication server transmitting terminal secondary CA certificate and terminal equipment certificate;
G. the terminal equipment certificate and the terminal secondary CA certificate that receive of device authentication server authentication obtains the server authentication result, and sends server secondary CA certificate and device authentication server certificate to terminal equipment;
H. terminal equipment verifies that the server secondary CA certificate and the device authentication server certificate that receive obtain the terminal the result, and generate a random number N A, with after the public key encryption of device authentication server certificate, the terminal the result being sent to the device authentication server together;
I. the device authentication server generates a random number N B, with after the public key encryption of terminal equipment certificate, the server authentication result being sent to terminal equipment together;
J. terminal equipment judges that according to the server authentication result that receives whether terminal equipment certificate and terminal secondary CA certificate are by checking, if not authentication failed, finish authentication, if use the random number N B after the encryption that the private key deciphering of terminal equipment certificate receives to obtain NB ', and carry out certain computing with random number N A and obtain a Transaction Identification Number f (NA, NB '), and with this Transaction Identification Number f (NA, NB ') send to the device authentication server, enter next step;
k. the device authentication server judges that according to the terminal the result that receives whether server secondary CA certificate and device authentication server certificate are by checking, if not send authentication failed to terminal equipment, finish authentication, if use the random number N A after the encryption that the private key deciphering of device authentication server certificate receives to obtain NA ', and with random number N B carry out described certain computing of j step obtain a server Transaction Identification Number f (NA ', NB), Transaction Identification Number f (the NA that relatively receives, NB ') with server Transaction Identification Number f (NA ', NB) whether identical, if device authentication success, and comparative result is sent to terminal equipment, enter next step, if not device authentication is unsuccessful, and comparative result is sent to terminal equipment, enter next step,
L. terminal equipment receives comparative result, disconnect and being connected with the network of device authentication server, according to the comparative result judgement Transaction Identification Number f (NA that receives, NB ') with server Transaction Identification Number f (NA ', NB) whether identical, if think the device authentication success, if not think that device authentication is unsuccessful.
Concrete, step b comprises the following steps:
B1. judge whether this DRM system has CRL, if enter the b2 step, if not enter the b3 step;
B2. this CRL is stored in terminal equipment together with root certificate, equipment secondary CA certificate, terminal equipment certificate and private key thereof as the terminal revocation list, enters the c step;
B3. root certificate, equipment secondary CA certificate, terminal equipment certificate and private key thereof are stored in terminal equipment, enter the c step;
Step c comprises the following steps:
C1. judge whether this DRM system has CRL, if enter the c2 step, if not enter the c3 step;
C2. this CRL is stored in the device authentication server together with root certificate, server secondary CA certificate, device authentication server certificate and private key thereof as the server revocation list, and the server revocation list enters the d step according to upgrading the time of running of this DRM system;
C3. root certificate, server secondary CA certificate, device authentication server certificate and private key thereof are stored in the device authentication server, enter the d step;
Steps d comprises the following steps:
D1. during device authentication, terminal equipment is set up network with the device authentication server and is connected;
D2. terminal equipment is initiated authentication request to the device authentication server, this authentication request comprises terminal equipment ID, terminal equipment certificate serial number and terminal revocation list version number, if endless revocation list version number can not send or terminal revocation list version number is set to 0;
Step e comprises the following steps:
E1. the device authentication server is received the authentication request that terminal equipment sends, reverting equipment certificate server ID and server revocation list version number, if serverless backup revocation list version number, can not send or server revocation list version number is set to 0, whether the terminal revocation list version number that judgement receives is less than server revocation list version number, if send this server revocation list to terminal equipment, enter the e2 step, directly do not enter the f step if not do not process;
E2. terminal equipment is changed terminal revocation list version number and the terminal revocation list of storage before according to the server revocation list version number that receives and server revocation list as new terminal revocation list version number and terminal revocation list, enters the f step;
Step g comprises the following steps:
G1. the terminal equipment certificate and the terminal secondary CA certificate that receive of device authentication server authentication obtains the server authentication result, and obtain the terminal equipment certificate serial number from the terminal equipment certificate, judge whether this terminal equipment certificate serial number is present in the server revocation list, if enter the g2 step, if not enter the g3 step;
G2. send the information that certificate has been revoked, device authentication fails to terminal equipment;
G3. send server secondary CA certificate and device authentication server certificate to terminal equipment.
Further, described certain computing of step j is Hash operation or MD5 computing or SHA128 computing or SHA256 computing.
The invention has the beneficial effects as follows, method by above-mentioned equipment identification in digital copyright management, in the time of due to each device authentication all by the device authentication server, can guarantee that the device authentication data are up-to-date and correct, the needed number certificate is fired in advance in terminal equipment, does not need additionally to increase equipment, can not increase cost, and adopt the mode of two-way authentication between terminal equipment and device authentication server, avoid potential safety hazard.
Embodiment
Below in conjunction with embodiment, describe technical scheme of the present invention in detail.
the method of equipment identification in digital copyright management of the present invention is: at first by the certificate management system issue root certificate of DRM system, with this root certificates constructing equipment secondary CA (digital certificate authentication center) certificate and server secondary CA certificate, use equipment secondary CA certificate and server secondary CA certificate generate respectively terminal equipment certificate and device authentication server certificate, again with the root certificate, equipment secondary CA certificate, terminal equipment certificate and private key thereof are stored in terminal equipment, with the root certificate, server secondary CA certificate, device authentication server certificate and private key thereof are stored in the device authentication server, when device authentication, terminal equipment is set up network with the device authentication server and is connected, at first terminal equipment initiates authentication request to the device authentication server, this authentication request comprises terminal equipment ID, the terminal equipment certificate serial number, then after the device authentication server is received the authentication request that terminal equipment sends, reverting equipment certificate server ID, terminal equipment is again to device authentication server transmitting terminal secondary CA certificate and terminal equipment certificate, the terminal equipment certificate that the device authentication server authentication receives and terminal secondary CA certificate obtain the server authentication result, and send server secondary CA certificate and device authentication server certificate to terminal equipment, then terminal equipment verifies that the server secondary CA certificate and the device authentication server certificate that receive obtain the terminal the result, and generate a random number N A, with after the public key encryption of device authentication server certificate, the terminal the result being sent to the device authentication server together, the device authentication server generates a random number N B simultaneously, with after the public key encryption of terminal equipment certificate, the server authentication result being sent to terminal equipment together, then terminal equipment judges that according to the server authentication result that receives whether terminal equipment certificate and terminal secondary CA certificate are by checking, if not authentication failed, finish authentication, if use the random number N B after the encryption that the private key deciphering of terminal equipment certificate receives to obtain NB ', and carry out certain computing with random number N A and obtain a Transaction Identification Number f (NA, NB '), and with this Transaction Identification Number f (NA, NB ') send to the device authentication server, the device authentication server judges that according to the terminal the result that receives whether server secondary CA certificate and device authentication server certificate are by checking, if not send authentication failed to terminal equipment, finish authentication, if use the random number N A after the encryption that the private key deciphering of device authentication server certificate receives to obtain NA ', and with random number N B carry out the identical computing of certain computing of using with terminal equipment obtain a server Transaction Identification Number f (NA ', NB), Transaction Identification Number f (the NA that relatively receives, NB ') with server Transaction Identification Number f (NA ', NB) whether identical, if device authentication success, and comparative result is sent to terminal equipment, if not device authentication is unsuccessful, and comparative result is sent to terminal equipment, terminal equipment receives comparative result, disconnect and being connected with the network of device authentication server, according to the comparative result judgement Transaction Identification Number f (NA that receives, NB ') with server Transaction Identification Number f (NA ', NB) whether identical, if think the device authentication success, if not think that device authentication is unsuccessful.
Embodiment
Certain computing that this example adopts is Hash operation or MD5 computing or SHA128 computing or SHA256 computing.
at first by the certificate management system issue root certificate of DRM system, with this root certificates constructing equipment secondary CA (digital certificate authentication center) certificate and server secondary CA certificate, use equipment secondary CA certificate and server secondary CA certificate generate respectively terminal equipment certificate and device authentication server certificate, judge again whether this DRM system has CRL, if with this CRL as terminal revocation list and root certificate, equipment secondary CA certificate, terminal equipment certificate and private key thereof are stored in terminal equipment together, and with this CRL as server revocation list and root certificate, server secondary CA certificate, device authentication server certificate and private key thereof are stored in the device authentication server together, and the server revocation list is according to upgrading the time of running of this DRM system, if not with the root certificate, equipment secondary CA certificate, terminal equipment certificate and private key thereof are stored in terminal equipment, with the root certificate, server secondary CA certificate, device authentication server certificate and private key thereof are stored in the device authentication server, when device authentication, terminal equipment is set up network with the device authentication server and is connected, at first terminal equipment initiates authentication request to the device authentication server, this authentication request comprises terminal equipment ID, terminal equipment certificate serial number and terminal revocation list version number, if endless revocation list version number, can not send or terminal revocation list version number is set to 0, the device authentication server is received the authentication request that terminal equipment sends, reverting equipment certificate server ID and server revocation list version number, if serverless backup revocation list version number, can not send or server revocation list version number is set to 0, whether the terminal revocation list version number that judgement receives is less than server revocation list version number, if send this server revocation list to terminal equipment, terminal equipment is changed terminal revocation list version number and the terminal revocation list of storage before according to the server revocation list version number that receives and server revocation list as new terminal revocation list version number and terminal revocation list, if not do not process, then terminal equipment is again to device authentication server transmitting terminal secondary CA certificate and terminal equipment certificate, the terminal equipment certificate that the device authentication server authentication receives and terminal secondary CA certificate obtain the server authentication result, and when having the server revocation list, obtain the terminal equipment certificate serial number from the terminal equipment certificate, judge whether this terminal equipment certificate serial number is present in the server revocation list, if send to terminal equipment the information that certificate has been revoked, device authentication fails, if not send server secondary CA certificate and device authentication server certificate to terminal equipment, then terminal equipment verifies that the server secondary CA certificate and the device authentication server certificate that receive obtain the terminal the result, and generate a random number N A, with after the public key encryption of device authentication server certificate, the terminal the result being sent to the device authentication server together, the device authentication server generates a random number N B simultaneously, with after the public key encryption of terminal equipment certificate, the server authentication result being sent to terminal equipment together, then terminal equipment judges that according to the server authentication result that receives whether terminal equipment certificate and terminal secondary CA certificate are by checking, if not authentication failed, finish authentication, if use the random number N B after the encryption that the private key deciphering of terminal equipment certificate receives to obtain NB ', and carry out certain computing (Hash operation or MD5 computing or SHA128 computing or SHA256 computing with random number N A, these compute modes are cryptographic calculation mode commonly used) obtain a Transaction Identification Number f (NA, NB '), and with this Transaction Identification Number f (NA, NB ') send to the device authentication server, the device authentication server judges that according to the terminal the result that receives whether server secondary CA certificate and device authentication server certificate are by checking, if not send authentication failed to terminal equipment, finish authentication, if use the random number N A after the encryption that the private key deciphering of device authentication server certificate receives to obtain NA ', and carry out the computing identical with certain computing of terminal equipment use with random number N B and (namely use identical Hash operation or MD5 computing or SHA128 computing or SHA256 computing with terminal equipment, if for example terminal equipment uses Hash operation, this moment, the device authentication server also adopted identical Hash operation) obtain a server Transaction Identification Number f (NA ', NB), Transaction Identification Number f (the NA that relatively receives, NB ') with server Transaction Identification Number f (NA ', NB) whether identical, if device authentication success, and comparative result is sent to terminal equipment, if not device authentication is unsuccessful, and comparative result is sent to terminal equipment, terminal equipment receives comparative result, disconnect and being connected with the network of device authentication server, according to the comparative result judgement Transaction Identification Number f (NA that receives, NB ') with server Transaction Identification Number f (NA ', NB) whether identical, if think the device authentication success, if not think that device authentication is unsuccessful.

Claims (4)

1. the method for equipment identification in digital copyright management, is characterized in that, comprises the following steps:
A. by the certificate management system issue root certificate of DRM system, with this root certificates constructing equipment secondary CA certificate and server secondary CA certificate, use equipment secondary CA certificate and server secondary CA certificate to generate respectively terminal equipment certificate and device authentication server certificate;
B. root certificate, equipment secondary CA certificate, terminal equipment certificate and private key thereof are stored in terminal equipment;
C. root certificate, server secondary CA certificate, device authentication server certificate and private key thereof are stored in the device authentication server;
D. during device authentication, terminal equipment is set up network with the device authentication server and is connected, and terminal equipment is initiated authentication request to the device authentication server, and this authentication request comprises terminal equipment ID, terminal equipment certificate serial number;
E. the device authentication server is received the authentication request that terminal equipment sends, reverting equipment certificate server ID;
F. terminal equipment is to device authentication server transmitting terminal secondary CA certificate and terminal equipment certificate;
G. the terminal equipment certificate and the terminal secondary CA certificate that receive of device authentication server authentication obtains the server authentication result, and sends server secondary CA certificate and device authentication server certificate to terminal equipment;
H. terminal equipment verifies that the server secondary CA certificate and the device authentication server certificate that receive obtain the terminal the result, and generate a random number N A, with sending to the device authentication server after the public key encryption in the device authentication server certificate together with the terminal the result;
I. the device authentication server generates a random number N B, with sending to terminal equipment after the public key encryption in the terminal equipment certificate together with the server authentication result;
J. terminal equipment judges that according to the server authentication result that receives whether terminal equipment certificate and terminal secondary CA certificate are by checking, if not authentication failed, finish authentication, if use the random number N B after the encryption that the private key deciphering in the terminal equipment certificate receives to obtain NB ', and carry out certain computing with random number N A and obtain a Transaction Identification Number f (NA, NB '), and with this Transaction Identification Number f (NA, NB ') send to the device authentication server, enter next step;
k. the device authentication server judges that according to the terminal the result that receives whether server secondary CA certificate and device authentication server certificate are by checking, if not send authentication failed to terminal equipment, finish authentication, if use the random number N A after the encryption that the private key deciphering in the device authentication server certificate receives to obtain NA ', and with random number N B carry out described certain computing of j step obtain a server Transaction Identification Number f (NA ', NB), Transaction Identification Number f (the NA that relatively receives, NB ') with server Transaction Identification Number f (NA ', NB) whether identical, if device authentication success, and comparative result is sent to terminal equipment, enter next step, if not device authentication is unsuccessful, and comparative result is sent to terminal equipment, enter next step,
L. terminal equipment receives comparative result, disconnect and being connected with the network of device authentication server, according to the comparative result judgement Transaction Identification Number f (NA that receives, NB ') with server Transaction Identification Number f (NA ', NB) whether identical, if think the device authentication success, if not think that device authentication is unsuccessful.
2. the method for equipment identification in digital copyright management according to claim 1, is characterized in that, step b comprises the following steps:
B1. judge whether this DRM system has CRL, if enter the b2 step, if not enter the b3 step;
B2. this CRL is stored in terminal equipment together with root certificate, equipment secondary CA certificate, terminal equipment certificate and private key thereof as the terminal revocation list, enters the c step;
B3. root certificate, equipment secondary CA certificate, terminal equipment certificate and private key thereof are stored in terminal equipment, enter the c step;
Step c comprises the following steps:
C1. judge whether this DRM system has CRL, if enter the c2 step, if not enter the c3 step;
C2. this CRL is stored in the device authentication server together with root certificate, server secondary CA certificate, device authentication server certificate and private key thereof as the server revocation list, and the server revocation list upgrades according to the operation of this DRM system constantly, enters the d step;
C3. root certificate, server secondary CA certificate, device authentication server certificate and private key thereof are stored in the device authentication server, enter the d step;
Steps d comprises the following steps:
D1. during device authentication, terminal equipment is set up network with the device authentication server and is connected;
D2. terminal equipment is initiated authentication request to the device authentication server, this authentication request comprises terminal equipment ID, terminal equipment certificate serial number and terminal revocation list version number, if endless revocation list version number does not send or terminal revocation list version number is set to 0;
Step e comprises the following steps:
E1. the device authentication server is received the authentication request that terminal equipment sends, reverting equipment certificate server ID and server revocation list version number, if serverless backup revocation list version number, do not send or server revocation list version number is set to 0, whether the terminal revocation list version number that judgement receives is less than server revocation list version number, if send this server revocation list to terminal equipment, enter the e2 step, directly do not enter the f step if not do not process;
E2. terminal equipment according to the server revocation list version number that receives and server revocation list as new terminal revocation list version number and terminal revocation list, before being used for changing, terminal revocation list version number and the terminal revocation list of storage, enter the f step;
Step g comprises the following steps:
G1. the terminal equipment certificate and the terminal secondary CA certificate that receive of device authentication server authentication obtains the server authentication result, and obtain the terminal equipment certificate serial number from the terminal equipment certificate, judge whether this terminal equipment certificate serial number is present in the server revocation list, if enter the g2 step, if not enter the g3 step;
G2. send the information that certificate has been revoked, device authentication fails to terminal equipment;
G3. send server secondary CA certificate and device authentication server certificate to terminal equipment.
3. the method for described equipment identification in digital copyright management according to claim 1 and 2, is characterized in that, described certain computing of step j is Hash operation.
4. the method for equipment identification in digital copyright management according to claim 3, is characterized in that, described Hash operation is MD5 computing or SHA128 computing or SHA256 computing.
CN 201010533922 2010-11-05 2010-11-05 Method for equipment identification in digital copyright management Active CN101977113B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 201010533922 CN101977113B (en) 2010-11-05 2010-11-05 Method for equipment identification in digital copyright management

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 201010533922 CN101977113B (en) 2010-11-05 2010-11-05 Method for equipment identification in digital copyright management

Publications (2)

Publication Number Publication Date
CN101977113A CN101977113A (en) 2011-02-16
CN101977113B true CN101977113B (en) 2013-05-08

Family

ID=43576962

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 201010533922 Active CN101977113B (en) 2010-11-05 2010-11-05 Method for equipment identification in digital copyright management

Country Status (1)

Country Link
CN (1) CN101977113B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103634266B (en) * 2012-08-21 2017-05-24 上海凌攀信息科技有限公司 A bidirectional authentication method for a server and a terminal
CN102868687B (en) * 2012-09-05 2015-07-15 四川长虹电器股份有限公司 Method for improving security of intelligent street lamp control system
EP3276874B1 (en) * 2015-03-25 2021-03-03 Mitsubishi Electric Corporation Server, certificate generation instruction method, and program
CN108234126B (en) * 2016-12-21 2021-04-09 金联汇通信息技术有限公司 System and method for remote account opening

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101094062A (en) * 2006-06-21 2007-12-26 普天信息技术研究院 Method for implementing safe distribution and use of digital content by using memory card
CN101252432A (en) * 2007-12-19 2008-08-27 北大方正集团有限公司 Field managing server and system, digital authority managing method based on field

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100925329B1 (en) * 2007-12-03 2009-11-04 한국전자통신연구원 Method and apparatus of mutual authentication and key distribution for downloadable conditional access system in digital cable broadcasting network

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101094062A (en) * 2006-06-21 2007-12-26 普天信息技术研究院 Method for implementing safe distribution and use of digital content by using memory card
CN101252432A (en) * 2007-12-19 2008-08-27 北大方正集团有限公司 Field managing server and system, digital authority managing method based on field

Also Published As

Publication number Publication date
CN101977113A (en) 2011-02-16

Similar Documents

Publication Publication Date Title
CN106656488B (en) Key downloading method and device for POS terminal
US7797532B2 (en) Device authentication system
CN101005361B (en) Server and software protection method and system
CN103067333B (en) The method of proof machine top box access identity and certificate server
US8806206B2 (en) Cooperation method and system of hardware secure units, and application device
CN111538784B (en) Digital asset transaction method, device and storage medium based on blockchain
CN109560931B (en) Equipment remote upgrading method based on certificate-free system
US20220038287A1 (en) Protection device and dongle and method for using the same
JP2003085321A (en) System and method for contents use authority control, information processing device, and computer program
CN103001936B (en) A kind of third party's application interface authorization method and system
CN112565265B (en) Authentication method, authentication system and communication method between terminal devices of Internet of things
WO2014187206A1 (en) Method and system for backing up private key in electronic signature token
CN101977113B (en) Method for equipment identification in digital copyright management
CN101227276B (en) Method and system for public key safety transfer of digital mobile certificate
US8307457B2 (en) Method and terminal for receiving rights object for content on behalf of memory card
CN104125239A (en) Network authentication method and system based on data link encryption transmission
CN106961326A (en) POS terminal remote cipher key more new system and update method
JP2007206961A (en) Authentication system and authentication information transfer method in the same system and security device
CN101741561A (en) Method and system for authenticating two-way hardware
WO2011150650A1 (en) Method and device for key authorization information management
CN111131211A (en) Anti-tampering method for sharing washing machine safety
CN102882882B (en) A kind of user resources authorization method
US20090282245A1 (en) Security method and system for media playback devices
JP2003085048A (en) Backup data management system, backup data management method, and information processing device, and computer program
WO2014187209A1 (en) Method and system for backing up information in electronic signature token

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant