CN102065092A - Method and system for authorizing digital signature of application program of set top box - Google Patents

Method and system for authorizing digital signature of application program of set top box Download PDF

Info

Publication number
CN102065092A
CN102065092A CN2010106178014A CN201010617801A CN102065092A CN 102065092 A CN102065092 A CN 102065092A CN 2010106178014 A CN2010106178014 A CN 2010106178014A CN 201010617801 A CN201010617801 A CN 201010617801A CN 102065092 A CN102065092 A CN 102065092A
Authority
CN
China
Prior art keywords
top box
sequence
signature
information
service end
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2010106178014A
Other languages
Chinese (zh)
Other versions
CN102065092B (en
Inventor
王亚骞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Unionman Technology Co Ltd
Original Assignee
Guangdong Unionman Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Unionman Technology Co Ltd filed Critical Guangdong Unionman Technology Co Ltd
Priority to CN 201010617801 priority Critical patent/CN102065092B/en
Publication of CN102065092A publication Critical patent/CN102065092A/en
Application granted granted Critical
Publication of CN102065092B publication Critical patent/CN102065092B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention relates to the relevant technical field of set top boxes, in particular to a method and system for authorizing a digital signature of an application program of a set top box. The method comprises the steps of: carrying out safe symmetrical encryption on a signature information sequence by a service end by using safe symmetrically encrypted secret keys; encrypting a signature sequence by using asymmetrically encrypted secrete keys to obtain an encrypted signature sequence, wherein a public key and the encrypted signature sequence are used as certificates; obtaining a signed application program of the set top box by the set top box, decrypting the encrypted signature sequence of the certificates by using the public key, sending verification information to the service end through safe communication; and verifying the verification information by the service end, sending the symmetrically encrypted secret keys to the set top box, decrypting the encrypted signature information sequence by the set top box by using the symmetrically encrypted secret keys to obtain the signature information sequence and installing after verifying. The technical scheme provided by the invention is more flexible compared with a PKI (Public Key Infrastructure) digital certificate technology, and the processing mechanism is simpler.

Description

A kind of set-top box application progressive number signature authentication method and system thereof
Technical field
The present invention relates to the set-top box correlative technology field, particularly a kind of set-top box application progressive number signature authentication method and system thereof.
Background technology
Existing set-top box application progressive number signature authentication method as shown in Figure 1, (Public Key Infrastructure, PKI) digital certificate technique adopt the asymmetrical encryption system of RSA to the PKIX of employing, relatively safety.But the existing signature authentication method real free time is long, between set-top box developer and software developer, increased simultaneously third-party certification authority (CA, Certificate Authority) mechanism, system are complicated, and have increased cost.
Summary of the invention
First goal of the invention of the present invention is to provide a kind of set-top box application progressive number signature authentication method, with the set-top box application progressive number signature authentication method that solves prior art complicated technology problem comparatively.
In order to realize first goal of the invention of the present invention, the technical scheme of employing is as follows:
A kind of set-top box application progressive number signature authentication method, described method comprises:
Signature step:
Service end symmetric cryptographic key safe in utilization carries out safe symmetric cryptography to the signing messages sequence that comprises set-top box identifying information tract, and described set-top box identifying information tract is used to identify the set-top box scope that the set-top box application program is suitable for;
Service end is preserved software information software developer information sequence section and the corresponding symmetric cryptographic key thereof that is used to identify software information and software developer;
With software information software developer information sequence section, through the signing messages sequence of symmetric cryptography as signature sequence;
Asymmetry cryptographic algorithm safe in utilization generates one group of effective asymmetric cryptographic key and PKI, use asymmetric cryptographic key that signature sequence is encrypted and obtain the ciphering signature sequence, with PKI and ciphering signature sequence as certificate;
Set-top box application program and certificate are carried out the set-top box application program that amalgamation obtains the process signature, finish the digital signature step;
The certifying signature step:
Set-top box obtains the set-top box application program through signature, and the ciphering signature sequence that uses public-key to certificate is decrypted, and obtains comprising software information software developer information sequence section and through the signature sequence of the signing messages sequence of symmetric cryptography;
Send authorization information by secure communication to service end;
Service end is verified authorization information, if satisfy the service end proof rule, then sends the symmetric cryptographic key corresponding with authorization information to set-top box, otherwise, to the set-top box feedback error;
If set-top box receives service end end feedback error, then withdraw from, otherwise use the symmetric cryptographic key that receives that the signing messages sequence through symmetric cryptography is decrypted, obtain comprising the signing messages sequence of set-top box identifying information tract;
If the signing messages sequence satisfies the set-top box proof rule, set-top box fitting machine top box application program then, otherwise withdraw from.
As a kind of preferred version, described authorization information is the software information software developer information sequence section after deciphering, and described service end proof rule is:
Service end is searched according to software information software developer information sequence section, if preserve software information software developer information sequence section, then is judged as and satisfies the service end proof rule, does not satisfy the service end proof rule otherwise be judged as.
As a kind of preferred version, described set-top box proof rule is: if set-top box is in the set-top box scope that the set-top box application program that set-top box identifying information tract is identified is suitable for, then be judged as and satisfy proof rule, do not satisfy proof rule otherwise be judged as.
As a kind of preferred version, described signing messages sequence also comprises uses digest algorithm to extract the first unique program digest tract from the set-top box application program.
As further preferred version, described set-top box proof rule is:
If in the set-top box scope that the set-top box application program that set-top box is identified at set-top box identifying information tract is suitable for, and;
The first program digest tract is consistent from the second program digest tract that the extraction of set-top box application program obtains by digest algorithm with set-top box, then is judged as and satisfies proof rule;
Do not satisfy proof rule otherwise be judged as.
As further preferred version, in the described signature step, service end is also preserved the first program digest tract;
Described authorization information comprises the software information software developer information sequence section after the deciphering and passes through the signature sequence of the signing messages sequence of symmetric cryptography;
Described service end proof rule is:
Service end is searched according to software information software developer information sequence section, if preserve software information software developer information sequence section, then adopt corresponding symmetric cryptographic key that the signing messages sequence through symmetric cryptography is decoded, obtain set-top box identifying information tract and the 3rd program digest tract, if the first program digest tract is consistent with the 3rd program digest tract, then be judged as and satisfy the service end proof rule, do not satisfy the service end proof rule otherwise be judged as.
Second goal of the invention of the present invention is to provide a kind of set-top box application progressive number signature authentication system, to use the digital signature authentication method that first goal of the invention of the present invention is provided.
In order to realize second goal of the invention of the present invention, the technical scheme of employing is as follows:
A kind of set-top box application progressive number signature authentication system, described system comprises:
Be arranged on the signature blocks of signature service end, comprise:
Symmetric cryptographic key safe in utilization carries out the service end symmetric cryptography module of safe symmetric cryptography to the signing messages sequence that comprises set-top box identifying information tract;
Preservation is used to identify software information and software developer's the software information software developer information sequence section and the service end memory module of corresponding symmetric cryptographic key thereof;
Asymmetry cryptographic algorithm safe in utilization generates one group of effective asymmetric cryptographic key and PKI, uses asymmetric cryptographic key to comprising software information software developer information sequence section and encrypting the asymmetric encryption module that obtains the ciphering signature sequence through the signature sequence of the signing messages sequence of symmetric cryptography;
With PKI and ciphering signature sequence certificate generation module as certificate;
Set-top box application program and certificate are carried out the die section that amalgamation obtains the set-top box application program of process signature;
Be arranged on the set-top box authentication module of set-top box, comprise:
The ciphering signature sequence that uses public-key to certificate is decrypted, and obtains comprising software information software developer information sequence section and through the asymmetric deciphering module of set-top box of the signature sequence of the signing messages sequence of symmetric cryptography;
Send the set-top box transport module of authorization information to service end by secure communication;
If receive service end end feedback error, then withdraw from, otherwise use the symmetric cryptographic key receive that the signing messages sequence through symmetric cryptography is decrypted, obtain comprising the set-top box symmetry deciphering module of the signing messages sequence of set-top box identifying information tract;
The set-top box authentication module of the signing messages sequence being verified according to the set-top box proof rule;
When the signing messages sequence satisfies the set-top box proof rule, the set-top box set up applications module of fitting machine top box application program;
Be arranged on the service end authentication module of service end, described service end authentication module is used for the authorization information that receives is verified, if satisfy the service end proof rule, then sends the symmetric cryptographic key corresponding with authorization information to set-top box, otherwise, to the set-top box feedback error;
Service end is connected by closing optical fibre-coaxial cable net or Ethernet with set-top box.
As a kind of preferred version, described signature blocks also comprises uses the extraction module of digest algorithm from the unique program digest tract of set-top box application program extraction, and described signing messages sequence also comprises the program digest tract that obtains by extraction module.
Technical scheme of the present invention, owing to rely on front end and service end to carry out signature verification, so flexibility can be more flexible with respect to the PKI digital certificate technique, treatment mechanism is also simpler.
Description of drawings
Fig. 1 is the signature schematic diagram of the embodiment of the invention;
Fig. 2 is the authentication schematic diagram of the embodiment of the invention.
Embodiment
The present invention will be further described in detail below in conjunction with the drawings and specific embodiments.
Set-top box application progressive number certificate is mainly realized three functions:
1, determines that this application program can operate on the machine of what model, i.e. the top-set hardware characteristic.
2, determine whether this application program is legal, whether this application program is in the registration of set-top box manufacturer, the i.e. fail safe of application program.
3, determine that the pairing application program of digital certificate in this application program is exactly this application program, be equivalent to the identity card of application program.
The segmentation of digital certificate and description:
1, software information software developer information sequence section.The main descriptor of describing software, developer's information.
2, program digest tract.Utilize traditional digest algorithm to extract the summary of software, and extract the software identity card.
3, set-top box identifying information tract.The main suitable top-set hardware version of software of describing, area etc. are with the relevant information of set-top box.
Be illustrated in figure 1 as certificate manufacturing process:
1, the software developer submits to set-top box manufacturer with set-top box identifying information tract, software information software developer information sequence section and set-top box application program and carries out testing authentication.
If 2 software tests checking is passed through, the signature system of set-top box manufacturer uses digest algorithm to extract unique program digest tract of this software, and generate the key of the symmetric cryptography of a safety according to certain rules, and with set-top box identifying information tract and program digest tract behind the symmetric cryptography via safety, data are fed back to the software developer, and software and software developer's information sequence section and program digest tract left in the online verification system, and generate counterpart keys.
Above-mentioned digest algorithm can be existing various program digest algorithms, only need extract one section unique tract from application program and get final product.
3, afterwards, software developer's signature system asymmetry cryptographic algorithm safe in utilization generates one group of effective key and PKI, and with key amalgamation software information software developer information sequence section, program digest tract (symmetric cryptography), set-top box identifying information tract (symmetric cryptography) data is afterwards carried out asymmetric encryption.Encrypt the back data with PKI amalgamation be in the same place, as certificate, be attached to set-top box application program head, be distributed to the user and use.
Among the embodiment, the signature system of software developer's signature system, online verification system and set-top box manufacturer constitutes service end jointly, and described online verification system and signature system can be arranged for unified setting also can divide.
During install software (being the set-top box application program), as shown in Figure 2 to the processing of certificate:
1, utilize PKI to other part deciphering of certificate beyond the PKI.
2, the software information software developer information sequence section after will deciphering is sent out by secure communication and is sent to server end.
3, server end is searched this information of software, if find, just sends key to set-top box, if can not find, also to the set-top box feedback error.
If 4 receive server-side error, installation procedure not then.If receive the key that server sends, then set-top box identifying information tract and program digest tract be decrypted with key.
If 5 set-top box identifying information tracts can not adapt to this type, or some authorization informations of service routine summary tract unmatch the needs installed software, then withdraw from installation.The person does not continue.
6, extract the summary that needs installed software with digest algorithm,, then withdraw from installation if summary and deciphering back program digest tract relevant information are not wanted to meet.It deny person's install software.

Claims (8)

1. set-top box application progressive number signature authentication method is characterized in that described method comprises:
Signature step:
Service end symmetric cryptographic key safe in utilization carries out safe symmetric cryptography to the signing messages sequence that comprises set-top box identifying information tract, and described set-top box identifying information tract is used to identify the set-top box scope that the set-top box application program is suitable for;
Service end is preserved software information software developer information sequence section and the corresponding symmetric cryptographic key thereof that is used to identify software information and software developer;
With software information software developer information sequence section, through the signing messages sequence of symmetric cryptography as signature sequence;
Asymmetry cryptographic algorithm safe in utilization generates one group of effective asymmetric cryptographic key and PKI, use asymmetric cryptographic key that signature sequence is encrypted and obtain the ciphering signature sequence, with PKI and ciphering signature sequence as certificate;
Set-top box application program and certificate are carried out the set-top box application program that amalgamation obtains the process signature, finish the digital signature step;
The certifying signature step:
Set-top box obtains the set-top box application program through signature, and the ciphering signature sequence that uses public-key to certificate is decrypted, and obtains comprising software information software developer information sequence section and through the signature sequence of the signing messages sequence of symmetric cryptography;
Send authorization information by secure communication to service end;
Service end is verified authorization information, if satisfy the service end proof rule, then sends the symmetric cryptographic key corresponding with authorization information to set-top box, otherwise, to the set-top box feedback error;
If set-top box receives service end end feedback error, then withdraw from, otherwise use the symmetric cryptographic key that receives that the signing messages sequence through symmetric cryptography is decrypted, obtain comprising the signing messages sequence of set-top box identifying information tract;
If the signing messages sequence satisfies the set-top box proof rule, set-top box fitting machine top box application program then, otherwise withdraw from.
2. signature authentication method according to claim 1 is characterized in that, described authorization information is the software information software developer information sequence section after deciphering, and described service end proof rule is:
Service end is searched according to software information software developer information sequence section, if preserve software information software developer information sequence section, then is judged as and satisfies the service end proof rule, does not satisfy the service end proof rule otherwise be judged as.
3. signature authentication method according to claim 1, it is characterized in that, described set-top box proof rule is: if set-top box is in the set-top box scope that the set-top box application program that set-top box identifying information tract is identified is suitable for, then be judged as and satisfy proof rule, do not satisfy proof rule otherwise be judged as.
4. signature authentication method according to claim 1 is characterized in that, described signing messages sequence also comprises uses digest algorithm to extract the first unique program digest tract from the set-top box application program.
5. signature authentication method according to claim 4 is characterized in that, described set-top box proof rule is:
If in the set-top box scope that the set-top box application program that set-top box is identified at set-top box identifying information tract is suitable for, and;
The first program digest tract is consistent from the second program digest tract that the extraction of set-top box application program obtains by digest algorithm with set-top box, then is judged as and satisfies proof rule;
Do not satisfy proof rule otherwise be judged as.
6. signature authentication method according to claim 4 is characterized in that, in the described signature step, service end is also preserved the first program digest tract;
Described authorization information comprises the software information software developer information sequence section after the deciphering and passes through the signature sequence of the signing messages sequence of symmetric cryptography;
Described service end proof rule is:
Service end is searched according to software information software developer information sequence section, if preserve software information software developer information sequence section, then adopt corresponding symmetric cryptographic key that the signing messages sequence through symmetric cryptography is decoded, obtain set-top box identifying information tract and the 3rd program digest tract, if the first program digest tract is consistent with the 3rd program digest tract, then be judged as and satisfy the service end proof rule, do not satisfy the service end proof rule otherwise be judged as.
7. set-top box application progressive number signature authentication system, application rights requires 1~6 each described digital signature authentication method, it is characterized in that described system comprises:
Be arranged on the signature blocks of signature service end, comprise:
Symmetric cryptographic key safe in utilization carries out the service end symmetric cryptography module of safe symmetric cryptography to the signing messages sequence that comprises set-top box identifying information tract;
Preservation is used to identify software information and software developer's the software information software developer information sequence section and the service end memory module of corresponding symmetric cryptographic key thereof;
Asymmetry cryptographic algorithm safe in utilization generates one group of effective asymmetric cryptographic key and PKI, uses asymmetric cryptographic key to comprising software information software developer information sequence section and encrypting the asymmetric encryption module that obtains the ciphering signature sequence through the signature sequence of the signing messages sequence of symmetric cryptography;
With PKI and ciphering signature sequence certificate generation module as certificate;
Set-top box application program and certificate are carried out the die section that amalgamation obtains the set-top box application program of process signature;
Be arranged on the set-top box authentication module of set-top box, comprise:
The ciphering signature sequence that uses public-key to certificate is decrypted, and obtains comprising software information software developer information sequence section and through the asymmetric deciphering module of set-top box of the signature sequence of the signing messages sequence of symmetric cryptography;
Send the set-top box transport module of authorization information to service end by secure communication;
If receive service end end feedback error, then withdraw from, otherwise use the symmetric cryptographic key receive that the signing messages sequence through symmetric cryptography is decrypted, obtain comprising the set-top box symmetry deciphering module of the signing messages sequence of set-top box identifying information tract;
The set-top box authentication module of the signing messages sequence being verified according to the set-top box proof rule;
When the signing messages sequence satisfies the set-top box proof rule, the set-top box set up applications module of fitting machine top box application program;
Be arranged on the service end authentication module of service end, described service end authentication module is used for the authorization information that receives is verified, if satisfy the service end proof rule, then sends the symmetric cryptographic key corresponding with authorization information to set-top box, otherwise, to the set-top box feedback error;
Service end is connected by closing optical fibre-coaxial cable net or Ethernet with set-top box.
8. application program digital signature identification according to claim 7 system, it is characterized in that, described signature blocks also comprises uses the extraction module of digest algorithm from the unique program digest tract of set-top box application program extraction, and described signing messages sequence also comprises the program digest tract that obtains by extraction module.
CN 201010617801 2010-12-31 2010-12-31 Method and system for authorizing digital signature of application program of set top box Active CN102065092B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 201010617801 CN102065092B (en) 2010-12-31 2010-12-31 Method and system for authorizing digital signature of application program of set top box

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 201010617801 CN102065092B (en) 2010-12-31 2010-12-31 Method and system for authorizing digital signature of application program of set top box

Publications (2)

Publication Number Publication Date
CN102065092A true CN102065092A (en) 2011-05-18
CN102065092B CN102065092B (en) 2013-03-06

Family

ID=44000193

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 201010617801 Active CN102065092B (en) 2010-12-31 2010-12-31 Method and system for authorizing digital signature of application program of set top box

Country Status (1)

Country Link
CN (1) CN102065092B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103402141A (en) * 2013-08-06 2013-11-20 江苏省广电有线信息网络股份有限公司南京分公司 Ukey-based secure television payment method
CN104796745A (en) * 2015-03-26 2015-07-22 成都市斯达鑫辉视讯科技有限公司 Safety protection method for set top box
CN106452786A (en) * 2013-09-30 2017-02-22 华为技术有限公司 Encryption and decryption processing method, apparatus and device
CN108280917A (en) * 2018-03-21 2018-07-13 首创置业股份有限公司 A kind of access control system and equipment based on Internet of Things public service platform
CN110176985A (en) * 2019-05-08 2019-08-27 重庆八戒电子商务有限公司 A kind of information ciphering method, device and storage medium
CN112106376A (en) * 2018-06-03 2020-12-18 苹果公司 Universal streaming media device configured as a set-top box
CN114785514A (en) * 2022-03-23 2022-07-22 国网上海能源互联网研究院有限公司 Method and system for authorizing application permission of industrial Internet of things terminal

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2006031203A1 (en) * 2005-01-06 2006-03-23 Measat Broadcast Network Systems Sdn. Bhd. An interactive television system
CN101247507A (en) * 2008-03-17 2008-08-20 浪潮电子信息产业股份有限公司 Digital copyright managing method of distributed television broadcast station and broadcast and television network operator

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2006031203A1 (en) * 2005-01-06 2006-03-23 Measat Broadcast Network Systems Sdn. Bhd. An interactive television system
CN101247507A (en) * 2008-03-17 2008-08-20 浪潮电子信息产业股份有限公司 Digital copyright managing method of distributed television broadcast station and broadcast and television network operator

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103402141A (en) * 2013-08-06 2013-11-20 江苏省广电有线信息网络股份有限公司南京分公司 Ukey-based secure television payment method
CN106452786A (en) * 2013-09-30 2017-02-22 华为技术有限公司 Encryption and decryption processing method, apparatus and device
CN104796745A (en) * 2015-03-26 2015-07-22 成都市斯达鑫辉视讯科技有限公司 Safety protection method for set top box
CN108280917A (en) * 2018-03-21 2018-07-13 首创置业股份有限公司 A kind of access control system and equipment based on Internet of Things public service platform
CN112106376A (en) * 2018-06-03 2020-12-18 苹果公司 Universal streaming media device configured as a set-top box
CN110176985A (en) * 2019-05-08 2019-08-27 重庆八戒电子商务有限公司 A kind of information ciphering method, device and storage medium
CN114785514A (en) * 2022-03-23 2022-07-22 国网上海能源互联网研究院有限公司 Method and system for authorizing application permission of industrial Internet of things terminal
CN114785514B (en) * 2022-03-23 2023-11-14 国网上海能源互联网研究院有限公司 Method and system for application license authorization of industrial Internet of things terminal

Also Published As

Publication number Publication date
CN102065092B (en) 2013-03-06

Similar Documents

Publication Publication Date Title
US20240007308A1 (en) Confidential authentication and provisioning
US9912485B2 (en) Method and apparatus for embedding secret information in digital certificates
US10015159B2 (en) Terminal authentication system, server device, and terminal authentication method
CN101828357B (en) Credential provisioning method and device
US6839841B1 (en) Self-generation of certificates using secure microprocessor in a device for transferring digital information
US8130961B2 (en) Method and system for client-server mutual authentication using event-based OTP
CN102065092B (en) Method and system for authorizing digital signature of application program of set top box
CN101212293B (en) Identity authentication method and system
CN102802036B (en) System and method for identifying digital television
CN111372247A (en) Terminal secure access method and terminal secure access system based on narrowband Internet of things
CN110891061B (en) Data encryption and decryption method and device, storage medium and encrypted file
CN111614621B (en) Internet of things communication method and system
CN104424446A (en) Safety verification and transmission method and system
CN103684798A (en) Authentication system used in distributed user service
CN111435390A (en) Safety protection method for operation and maintenance tool of power distribution terminal
CN114697040A (en) Electronic signature method and system based on symmetric key
CN112448810B (en) Authentication method and device
CN108933659A (en) A kind of authentication system and verification method of smart grid
CN104883260B (en) Certificate information processing and verification method, processing terminal and authentication server
CN110855442A (en) PKI (public key infrastructure) technology-based inter-device certificate verification method
CN113676330B (en) Digital certificate application system and method based on secondary secret key
KR20200043855A (en) Method and apparatus for authenticating drone using dim
WO2014187209A1 (en) Method and system for backing up information in electronic signature token
WO2017109058A1 (en) Security management system for securing a communication between a remote server and an electronic device
CN215010302U (en) Safety certification equipment of power distribution internet of things based on block chain

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant