CN102681844B - Method for identifying legality of terminal software of set-top box - Google Patents

Method for identifying legality of terminal software of set-top box Download PDF

Info

Publication number
CN102681844B
CN102681844B CN201210063610.7A CN201210063610A CN102681844B CN 102681844 B CN102681844 B CN 102681844B CN 201210063610 A CN201210063610 A CN 201210063610A CN 102681844 B CN102681844 B CN 102681844B
Authority
CN
China
Prior art keywords
top box
terminal software
authentication module
legality
calling interface
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201210063610.7A
Other languages
Chinese (zh)
Other versions
CN102681844A (en
Inventor
唐文东
周旭辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
GEEYA SCIENCE & TECHNOLOGY CO., LTD.
Original Assignee
CHENGDU GEEYA TECHNOLOGY CO LTD
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CHENGDU GEEYA TECHNOLOGY CO LTD filed Critical CHENGDU GEEYA TECHNOLOGY CO LTD
Priority to CN201210063610.7A priority Critical patent/CN102681844B/en
Publication of CN102681844A publication Critical patent/CN102681844A/en
Application granted granted Critical
Publication of CN102681844B publication Critical patent/CN102681844B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention discloses a method for identifying the legality of the terminal software of a set-top box and belongs to a software identification method for the set-top box. The method comprises the following steps of: A, sending a verification code which is used for identifying the legality of the terminal software of the set-top box from the front end of a system to a verification module in the terminal software of the set-top box; and B, by using a symbol address of an external calling interface as set-top box terminal software characteristic information, generating an identification code by the verification module in the terminal software of the set-top box. The method for identifying the legality of the terminal software of the set-top box provided by the invention has simple steps and can be applied to the terminal software of various types of set-top boxes. A technical means of ensuring the legality of the terminal software is provided for a set-top box manufacturer, and a technical means of normatively managing a terminal in an operating network is provided for an operator.

Description

A kind of recognition methods of legality of terminal software of set-top box
Technical field
The present invention relates to a kind of set-top box software recognition methods, in particular, the present invention relates generally to a kind of recognition methods of legality of terminal software of set-top box.
Background technology
Along with popularizing of China's Digital Television, the application of Set Top Box is also more and more general, and Set Top Box, also referred to as digital video switching box, is a kind of home appliance relying on television terminal to provide integrated information business.Make user can watch digital television program on existing televisor, and carry out interactive digital amusement, education and commercialization activity by network.And be integrated with various software in terminal set top box and make user can obtain various viewing experience, be meet the growing user demand of user with set-top box production firm, for terminal software of set-top box exploitation input by cost also increasing, therefore the higher requirement that the legitimacy monitoring used for terminal software of set-top box proposes, traditional set-top box software sets mainly through user right, and the form of registration sequence number or key file forbids third party's use without compensation, but in today of computer software industry develop rapidly day by day, major part software can be cracked by means such as decoding or algorithm register machines, therefore in today of software science and technology great development, for the problem that aforementioned set-top box software legitimacy uses, be necessary to be improved further and to study.
Summary of the invention
An object of the present invention is to solve above-mentioned deficiency, provides a kind of recognition methods using more efficiently legality of terminal software of set-top box.
For solving above-mentioned technical matters, the present invention by the following technical solutions:
The recognition methods of a kind of legality of terminal software of set-top box provided by the present invention, is characterized in that: described recognition methods operates in accordance with the following steps:
Steps A, system front end send for identifying that the identifying code of legality of terminal software of set-top box is to the authentication module in terminal software of set-top box;
Authentication module in step B, terminal software of set-top box utilizes external calling interface, and authentication module uses the symbolic address of calling interface as terminal software of set-top box characteristic information and generates identification code;
The identification code that step C, authentication module are generated compared with it receives the identifying code that system front end sends, as identification code mutually mate with identifying code time, then think that terminal software is legal in Set Top Box, Set Top Box realizes normal function; Otherwise authentication module then stops the normal function of terminal software of set-top box or carries out alarm.
Further technical scheme is: the identifying code of system front end in described steps A, is by the artificial or extra application system identification code that authentication module generates from the terminal software that Set Top Box output interface obtains automatically.
Further technical scheme is: described recognition methods also comprises step C-1, when the identifying code that the identification code that authentication module generates and system front end send does not mate mutually, authentication module refusal enforcement division divides STB terminal software simulating normal function necessary interface interchange.
Further technical scheme is: described authentication module provides in the mode of file destination or C/C++ static library, linked the part becoming terminal software of set-top box by C/C++ linker when generating final application program, and authentication module provides or has software in Set Top Box and normally to work indispensable function.
Further technical scheme is: the authentication module in described step B outwards provides one or more calling interface with the form of function or variable, the symbolic address of one or more calling interface is by after C/C++ linker or the reorientation of program loading bin, and authentication module uses the symbolic address of calling interface as the ingredient of terminal software of set-top box characteristic information and generates real identification code.
Further technical scheme is: the authentication module in described step B needs to use one or more calling interface provided by other program module, the symbolic address of one or more calling interface is by after C/C++ linker or the reorientation of program loading bin, and authentication module uses the symbolic address of calling interface as the ingredient of terminal software of set-top box characteristic information and generates real identification code.
Further technical scheme is: described reorientation is that the calling interface that C/C++ linker or program loading bin are chosen as terminal software of set-top box characteristic information to authentication module distributes a symbolic address, utilize the raw data list of the part or all of composition of calling interface symbolic address, as the identification code that authentication module generates.
Further technical scheme is: described reorientation is that C/C++ linker or program loading bin distribute a symbolic address to each calling interface, utilize one-way hash algorithm that the part or all of raw data list formed by calling interface symbolic address is converted to byte stream, using byte stream as the identification code generated.
Further technical scheme is: it is reported to the police by the form of sound or image within the unit interval that described authentication module carries out alarm; Described C/C++ static library is the set of multiple file destination.
Further technical scheme is: the authentication module reorientation function of described C/C++ linker or program loading bin is identical; And described reorientation carries out assignment again by C/C++ linker or program loading bin to the function of file destination in file destination or C/C++ static library or the symbolic address of variable.
Compared with prior art, one of beneficial effect of the present invention is: the calling interface symbol reorientation function that when utilizing set-top box software developing instrument to generate final executable code, C/C++ linker or program loading bin have, when program code changes, during the reorientation of calling interface symbol, the symbolic address that C/C++ linker distributes for calling interface symbol can change, the part or all of formation raw data list of the calling interface address now chosen or be converted to byte stream, just can produce different identification codes.During using this identification code as the necessary condition that Set Top Box normally works, just can realize the legitimacy identification to terminal software of set-top box.And the recognition methods step of a kind of legality of terminal software of set-top box provided by the present invention is simple, can apply in the terminal software of all kinds Set Top Box, for manufacturer in the middle of Set Top Box provides a kind of technological means ensureing the legal use of terminal software, simultaneously for operator provides a kind of technological means of the terminal in Operation Network being carried out to standardized administration.
Embodiment
Before elaborating the specific embodiment of the present invention, first the several concepts repeatedly mentioned in the present invention are described:
C/C++ compiler and linker:
C/C++ compiler and linker are a kind of SDK (Software Development Kit), are widely used in the software development of computer software, embedded type terminal equipment, can be described as the SDK (Software Development Kit) be most widely used in the world.
Again embedded platform use C/C++ to carry out having in software development process two important steps to generate the executable code that finally may operate on corresponding hardware platform.
compiler is used to compile source code, generating object file.
use linker to link intermediate file, generate executable code.
The reorientation function of C/C++ linker and program loading bin:
File destination contains codes all in compilation unit and data with the form of machine code, if there is multiple file destination, then file destination also at least provides 3 tables (unresolved symbol table, derivation symbol table, address re-direction table) to tell that what linker oneself need and can what provide.
Linker scans all file destinations, for the unresolved symbol table in each file destination searches derivation symbol table from other file destination, and is filled up in unresolved symbol table; The set-top box platform of some supporting document system, needs service routine loading bin loading application programs, for the function of symbol table assignment has been come by program loading bin.
So-called symbol table, it is exactly the entry address table of C/C++ function or variable in essence.Because compiler is when compiling generating object file, usually all use zero-based relative address.But, in link process, linker by the address of specifying from, according to the order of the file destination of input in units of section by they one by one assembled, so linker can have the process of a reorientation to each file destination.Except file destination assembled except, in the process of reorientation, also complete two tasks: one is generate final symbol table; Two is modify to some position in code segment, and all relocation tables needing the position of amendment all to be generated by compiler are pointed out.
C/C++ static library:
C/C++ static library can be regarded as the set of multiple obj file, and essence is identical with .obj file is the set of multiple file destination.C/C++ linker, when connecting, only splices the code wherein can used by alternative document, and same needs carries out reorientation existence to symbol wherein.
One-way hash algorithm:
One-way hash algorithm is hash algorithm again, comes from cryptography.Its meaning is, carries out certain computing to one piece of data, and its result obtained is unique, has that can repeat can reproducing characteristic.And this computing is carried out to different data, consequently different, the probability especially repeated is very little, and for 128 MD5 algorithms, the probability naturally repeated is 128 power/mono-of 2.
Below in conjunction with instantiation, the present invention is further elaborated.
Wherein a kind of embodiment of the present invention is the recognition methods that will provide a kind of legality of terminal software of set-top box, and described recognition methods operates in accordance with the following steps:
Steps A, system front end send for identifying that the identifying code of legality of terminal software of set-top box is to the authentication module in terminal software of set-top box;
And the identifying code of the system front end mentioned in this step, be by the artificial or extra application system identification code that authentication module generates first from the terminal software that Set Top Box output interface obtains automatically.
Authentication module in step B, terminal software of set-top box utilizes external calling interface, and authentication module uses the symbolic address of calling interface as terminal software of set-top box characteristic information and generates identification code;
The identification code that step C, authentication module are generated compared with it receives the identifying code that system front end sends, as identification code mutually mate with identifying code time, then think that terminal software is legal in Set Top Box, Set Top Box realizes normal function; Otherwise authentication module then stops the normal function of terminal software of set-top box or carries out alarm.
It should be noted that, the comparative approach mentioned in this step carries out binary data according to identifying code with the content of identification code to compare herein, as long as the two has a bit difference just to write off; Because the source of the identifying code of system front end transmission is in step exactly the identification code generated first by the authentication module in terminal software of set-top box in stepb, as long as so front end input is correct, just can ensure that the identifying code that system front end sends and the identification code that authentication module generates are same data or encoded radio, therefore identifying code and identification code can regard as is same data or encoded radio.
Step C-1, when the identifying code that the identification code that authentication module generates and system front end send does not mate mutually, authentication module refusal enforcement division divide STB terminal software simulating normal function necessary interface interchange.
It should be noted that at this, the above-mentioned step C-1 of the present invention has been a branch of terminal software of set-top box identification verification step C, or wherein a kind of situation of step C, those of ordinary skill in the art can utilize the mode of operation of above-mentioned steps A to step C to solve one of clear and definite technical matters of the present invention completely, and step C-1 also can be combined into a new embodiment with above-mentioned steps A and step B.
The present inventor thinks, above-mentioned technical scheme implements metapedes to solve at least one technical matters mentioned in the present invention, therefore in conjunction with the present invention based on background technology, invention common embodiment can be regarded as, and inventor is also with reference to prior art, on the basis of above-described embodiment technical scheme, further improvement is done to the present invention:
The authentication module repeatedly mentioned in above-mentioned operation steps is a virtual module in terminal software of set-top box, can be considered as a ripe code cluster, authentication module provides in the mode of file destination or C/C++ static library, linked the part becoming software in Set Top Box by C/C++ linker when generating final application program, and authentication module provides or has software in Set Top Box and normally to work indispensable function.It should be noted that, aforesaid C/C++ static library is the set of multiple file destination, therefore the file destination of structure authentication module can be regarded as with C/C++ static library and be equal to.
And authentication module generates the method for identification code for outwards providing one or more calling interface with the form of function or variable in above-mentioned steps B, the symbolic address of one or more calling interface is by after C/C++ linker or the reorientation of program loading bin, and authentication module uses the symbolic address of calling interface as the ingredient of terminal software of set-top box characteristic information and generates real identification code.
The extension of identification code mode is generated as authentication module in above-mentioned steps B, inventor also proposed the another kind of technical scheme mutually arranged side by side with above-mentioned identification code generating mode at this, similar with above-mentioned identification code generating mode, and with above-mentioned steps A to step C, or steps A combines to step C-1, composition another embodiment of the present invention, which is specially: the authentication module in described step B needs to use one or more calling interface provided by other program module, the symbolic address of one or more calling interface is by after C/C++ linker or the reorientation of program loading bin, authentication module uses the symbolic address of calling interface as the ingredient of terminal software of set-top box characteristic information and generates real identification code.
Above-mentioned relocation loading mode inventor is through repeatedly testing, show that two kinds of comparatively preferred reorientations generate the mode of identification code, can according to the relocation loading mode of these two kinds of authentication module calling interfaces, in conjunction with above-mentioned technology contents, the present invention is transformed to two embodiments be more preferably, and a kind of calling interface being C/C++ linker or program loading bin are chosen as terminal software of set-top box characteristic information to authentication module in the middle of aforementioned two kinds of mentioned relocation loading modes distributes a symbolic address, utilize the raw data list of the part or all of composition of calling interface symbolic address, as the identification code that authentication module generates.
And in fact the authentication module calling interface symbolic address after reorientation is exactly a round values, this value has pointed to the value of the calling interface program pointer when the microprocessor system of Set Top Box is called on authentication module, authentication module, when designing, can be designed to using part or all of authentication module calling interface symbolic address as variable to calculate final identification code.The aforementioned identification code mentioned can be calculated as variable by interface symbol address, and this has just drawn the mode of the another kind of reorientation generation identifying code that inventor's experiment draws, namely to be C/C++ linker or program loading bin distribute a symbolic address to each calling interface of authentication module in described reorientation, utilize one-way hash algorithm that the part or all of raw data list formed by calling interface symbolic address is converted to byte stream, using byte stream as the identification code generated.
And the authentication module reorientation function of above-mentioned mentioned C/C++ linker or program loading bin is identical, in conjunction with the introduction of the above-mentioned relocation loading mode to authentication module calling interface symbolic address, more specifically the reorientation of authentication module calling interface address carries out assignment again by C/C++ linker or program loading bin to the function of file destination in file destination or C/C++ static library or the address of variable.
Also it should be noted that, provided by the present inventionly a kind ofly use the recognition methods of more efficiently legality of terminal software of set-top box from steps A to step C, or from steps A to step C-1, it is all the instantaneous completing steps when verifying that whether terminal software of set-top box is legal, only instantaneous stopping can be had between each step, or not have the mode of pausing to complete continuously.In addition, spoken of in this manual " embodiment ", " another embodiment ", " embodiment ", etc., refer to the specific features, structure or the feature that describe in conjunction with this embodiment and be included at least one embodiment of the application's generality description.Multiple place occurs that statement of the same race is not necessarily refer to same embodiment in the description.Furthermore, when describing specific features, structure or a feature in conjunction with any embodiment, what advocate is also fall within the scope of the invention to realize this feature, structure or feature in conjunction with other embodiments.
Although with reference to multiple explanatory embodiment of the present invention, invention has been described here, but, should be appreciated that, those skilled in the art can design a lot of other amendment and embodiment, these amendments and embodiment will drop within spirit disclosed in the present application and spirit.More particularly, in scope disclosed in the present application, multiple modification and improvement can be carried out to the building block of subject combination layout and/or layout.Except the modification of carrying out building block and/or layout is with except improvement, to those skilled in the art, other purposes also will be obvious.

Claims (8)

1. a recognition methods for legality of terminal software of set-top box, is characterized in that: described recognition methods operates in accordance with the following steps:
Steps A, system front end send for identifying that the identifying code of legality of terminal software of set-top box is to the authentication module in terminal software of set-top box;
Authentication module in step B, terminal software of set-top box utilizes external calling interface, and authentication module uses the symbolic address of calling interface as terminal software of set-top box characteristic information and generates identification code; Described authentication module outwards provides one or more calling interface with the form of function or variable, or authentication module uses one or more calling interface provided by other program module; The symbolic address of described one or more calling interface is by after C/C++ linker or the reorientation of program loading bin, and authentication module uses the symbolic address of calling interface as the ingredient of terminal software of set-top box characteristic information and generates real identification code;
The identification code that step C, authentication module are generated compared with it receives the identifying code that system front end sends, as identification code mutually mate with identifying code time, then think that terminal software is legal in Set Top Box, Set Top Box realizes normal function; Otherwise authentication module then stops the normal function of terminal software of set-top box or carries out alarm.
2. the recognition methods of legality of terminal software of set-top box according to claim 1, it is characterized in that: the identifying code of system front end in described steps A, is by the artificial or extra application system identification code that authentication module generates from the terminal software that Set Top Box output interface obtains automatically.
3. the recognition methods of legality of terminal software of set-top box according to claim 1, it is characterized in that: described recognition methods also comprises step C-1, when the identifying code that the identification code that authentication module generates and system front end send does not mate mutually, authentication module refusal enforcement division divides STB terminal software simulating normal function necessary interface interchange.
4. the recognition methods of legality of terminal software of set-top box according to claim 1, it is characterized in that: described authentication module provides in the mode of file destination or C/C++ static library, linked the part becoming terminal software of set-top box by C/C++ linker when generating final application program, and authentication module provides or has software in Set Top Box and normally to work indispensable function.
5. the recognition methods of legality of terminal software of set-top box according to claim 1, it is characterized in that: described reorientation is that the calling interface that C/C++ linker or program loading bin are chosen as terminal software of set-top box characteristic information to authentication module distributes a symbolic address, utilize the raw data list of the part or all of composition of calling interface symbolic address, as the identification code that authentication module generates.
6. the recognition methods of legality of terminal software of set-top box according to claim 1, it is characterized in that: described reorientation is that C/C++ linker or program loading bin distribute a symbolic address to each calling interface, utilize one-way hash algorithm that the part or all of raw data list formed by calling interface symbolic address is converted to byte stream, using byte stream as the identification code generated.
7. the recognition methods of legality of terminal software of set-top box according to claim 4, is characterized in that: it is reported to the police by the form of sound or image within the unit interval that described authentication module carries out alarm; Described C/C++ static library is the set of multiple file destination.
8. the recognition methods of the legality of terminal software of set-top box according to any claim of claim 1,5,6, is characterized in that: the authentication module reorientation function of described C/C++ linker or program loading bin is identical; And described reorientation carries out assignment again by C/C++ linker or program loading bin to the function of file destination in file destination or C/C++ static library or the symbolic address of variable.
CN201210063610.7A 2012-03-12 2012-03-12 Method for identifying legality of terminal software of set-top box Expired - Fee Related CN102681844B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210063610.7A CN102681844B (en) 2012-03-12 2012-03-12 Method for identifying legality of terminal software of set-top box

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210063610.7A CN102681844B (en) 2012-03-12 2012-03-12 Method for identifying legality of terminal software of set-top box

Publications (2)

Publication Number Publication Date
CN102681844A CN102681844A (en) 2012-09-19
CN102681844B true CN102681844B (en) 2015-04-22

Family

ID=46813821

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210063610.7A Expired - Fee Related CN102681844B (en) 2012-03-12 2012-03-12 Method for identifying legality of terminal software of set-top box

Country Status (1)

Country Link
CN (1) CN102681844B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111610732B (en) * 2020-04-28 2021-09-24 同方泰德国际科技(北京)有限公司 Method, device and equipment for replacing configurable input/output module

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1866870A (en) * 2006-02-23 2006-11-22 华为技术有限公司 Software validity checking system and method based on device management protocol
CN101399666A (en) * 2007-09-28 2009-04-01 中国银联股份有限公司 Safety control method and system for digital certificate of file
CN101521735A (en) * 2009-03-31 2009-09-02 深圳创维数字技术股份有限公司 Set-top box software encipherment protection method and system and set-top box
CN101588440A (en) * 2009-07-09 2009-11-25 山东泰信电子有限公司 Software security authentication method used for digital set top box

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1866870A (en) * 2006-02-23 2006-11-22 华为技术有限公司 Software validity checking system and method based on device management protocol
CN101399666A (en) * 2007-09-28 2009-04-01 中国银联股份有限公司 Safety control method and system for digital certificate of file
CN101521735A (en) * 2009-03-31 2009-09-02 深圳创维数字技术股份有限公司 Set-top box software encipherment protection method and system and set-top box
CN101588440A (en) * 2009-07-09 2009-11-25 山东泰信电子有限公司 Software security authentication method used for digital set top box

Also Published As

Publication number Publication date
CN102681844A (en) 2012-09-19

Similar Documents

Publication Publication Date Title
CN112837160B (en) Block chain-based cross-chain transaction method and device and computer-readable storage medium
CN108197891B (en) Electronic signing device and method based on block chain
CN111382174B (en) Multi-party data joint query method, device, server and storage medium
CN1490736B (en) Method and system for establishing and verifying digital sign sub-object
US11924524B2 (en) Metadata distribution and management via transactional blockchain technology
CN108881312A (en) Intelligent contract upgrade method, system and relevant device and storage medium
US8769300B2 (en) Technique for content management using group rights
EP2962193A1 (en) Compiler based obfuscation
CN105027478A (en) Metadata transcoding
US20200233904A1 (en) Method and system for converting one type of data schema to another type of data schema
CN109802967A (en) Block chain information method for tracing and system
CN103561006A (en) Application authentication method and device and application authentication server based on Android
US11716516B2 (en) Validating parameters on discrete computing applications to grant access control to content or commands
KR101255137B1 (en) Contents Testing Policy and Distribution Method
CN102648625B (en) Method, device and system for implementing the grouping of broadcast services
CN102984547A (en) Self-adaption cloud playback system
CN102681844B (en) Method for identifying legality of terminal software of set-top box
CN109446751A (en) Generate the method, apparatus and storage medium of the data set including multiple subfiles
CN114095781A (en) Multimedia data processing method and device, electronic equipment and storage medium
CN103514407A (en) Method and system for killing viruses of audio/video files transmitted from office network to production network
CN106878266A (en) A kind of unstructured data Transmission system
CN111324271B (en) Multimedia information processing method and device, electronic equipment and storage medium
CN103631983A (en) Method and system for simulating tactical data messages
CN106156625A (en) The method of a kind of plug-in unit signature and electronic equipment
CN113792093A (en) Signal system interface service creating and executing method, device and electronic equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C56 Change in the name or address of the patentee
CP03 Change of name, title or address

Address after: 610000 No. 50 Shu West Road, Sichuan, Chengdu

Patentee after: GEEYA SCIENCE & TECHNOLOGY CO., LTD.

Address before: 610041 No. 50 Shu West Road, Sichuan, Chengdu

Patentee before: Chengdu Geeya Technology Co.,Ltd.

CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20150422

Termination date: 20200312