CN102724593B - Method for preventing pirating software of sample set top box and set top box - Google Patents
Method for preventing pirating software of sample set top box and set top box Download PDFInfo
- Publication number
- CN102724593B CN102724593B CN201210187852.7A CN201210187852A CN102724593B CN 102724593 B CN102724593 B CN 102724593B CN 201210187852 A CN201210187852 A CN 201210187852A CN 102724593 B CN102724593 B CN 102724593B
- Authority
- CN
- China
- Prior art keywords
- top box
- set top
- model machine
- box model
- software
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Landscapes
- Storage Device Security (AREA)
Abstract
The invention relates to a method for preventing pirating software of a sample set top box. Before delivery of the sample set top box, usage limit time of the software of the sample set top box is preset. The method for preventing pirating software of the set top box includes judging whether the sample set top box is used up to the limit time or not when starting to use the sample set top box, if not, letting the sample set top box work normally; if yes, sending and executing command of erasing software codes of the sample set top box so that the sample set top box can stop normal work; resetting the software codes by updating so that the sample set top box can work normally again; and executing the above steps to reset the software codes and erasing the limit time if the sample set top boxes are produced in batch. The invention further provides a set top box utilizing the method for preventing pirating software of the sample set top box. The method for preventing pirating software of the sample set top box is simple and easy to realize, low in cost and better in pirating preventing effect and has no effects on the equipment performance.
Description
Technical field
The present invention relates to set-top box technique field, more particularly, relate to a kind of Set Top Box model machine software anti-pirate method and Set Top Box.
Background technology
Along with popularizing gradually of Digital Television, set-top box technique is development also, and increasing people enjoy more tv services by Set Top Box.Set Top Box producer often will provide Set Top Box model machine to client when machine for selling top box, and model machine easily allows lawless person steal software directly to take away use when not adding protection, and pirate of going forward side by side version is produced, thus compromises the interests of Set Top Box manufacturer.Therefore need to protect Set Top Box model machine, get to prevent its software pirate.Existing software anti-pirate method mainly comprises:
By tab character method: so-called tab character method demonstrates special character or pattern mark television interfaces one jiao in other words, so just can play antitheft effect, because special pattern is just as having write your name, such software can not be utilized by others.The shortcoming of this scheme: the effect affecting vision viewing; Affect the test of performance index, as when the signal to noise ratio (S/N ratio) of test video, require test white level signal, this character may affect white level like this, thus have impact on test performance.
Password method: so-called password method needs to input specific password when start in other words just can enter normal system.The shortcoming of this scheme: loaded down with trivial details operation steps, each start all needs to input password, uses just inconvenient, tests very bad frequently especially to switching on and shutting down; Say from certain angle and do not have antitheft effect, as long as just everybody can use because be aware of this password, like this with regard to very easily usurped by others.
Summary of the invention
The technical problem to be solved in the present invention is, for the above-mentioned defect of prior art, provides a kind of Set Top Box model machine software anti-pirate method and Set Top Box.
The technical solution adopted for the present invention to solve the technical problems is: adopt time-critical process to carry out protection software, i.e. model machine normal operation in the use binding hours of regulation, and after exceeding the time limit, model machine software is scrapped with regard to oneself, and model machine can not normally use; And use this time-critical process to protect the Set Top Box of Set Top Box model machine software.
Set Top Box model machine software anti-pirate method of the present invention, the binding hours of this Set Top Box model machine software application that prestores before described Set Top Box model machine dispatches from the factory, this time, after dispatching from the factory, other users can not revise by Set Top Box supplier self-defined setting before dispatching from the factory.
Set Top Box model machine software anti-pirate method of the present invention comprises the steps:
When S1) opening use Set Top Box model machine, judge Set Top Box model machine uses whether reach binding hours;
S2) if do not reach binding hours, Set Top Box model machine normally works;
S3) if reach binding hours, send and perform the instruction of wiping Set Top Box model machine software code, Set Top Box model machine stops normal work, performs step S4);
S4) recover software code by the mode of upgrading, Set Top Box model machine normally works again;
S5) if when described Set Top Box model machine is used for large-scale production, above-mentioned steps S4 is performed) and cancel described binding hours.
Set Top Box model machine software anti-pirate method of the present invention, perform described step S1) by accumulative each time using Set Top Box model machine, and compare realization with binding hours, particularly, timing is carried out during normal use Set Top Box model machine, and the time at every turn used is added up, until the binding hours preset.
Set Top Box model machine software anti-pirate method of the present invention, perform described step S1) use the Time of Day of Set Top Box model machine and first time to use the difference between the Time of Day of Set Top Box model machine and binding hours to compare realization by each, particularly, preserve Time of Day during first time use Set Top Box model machine, when to use Set Top Box model machine searching programs next time, read this time date values, and do difference with primary Time of Day, see whether this difference reaches binding hours.
Set Top Box model machine software anti-pirate method of the present invention, performs described step S3) comprise software code data are all become 1.
Set Top Box model machine software anti-pirate method of the present invention, the mode of described upgrading comprises use USB, UART, OTA.
Set Top Box for Set Top Box model machine software anti-pirate of the present invention, comprise microprocessor, the storer of being accessed by described microcomputer reads, described storer comprises storage compartments for running Set Top Box model machine software and the authority setting unit corresponding with this software, the binding hours of this software of use that described authority setting unit presets before preserving and dispatching from the factory and remove the code of instruction of storer.
Set Top Box for Set Top Box model machine software anti-pirate of the present invention, described Set Top Box also comprises for accumulative each timer using the time of Set Top Box model machine.
Set Top Box for Set Top Box model machine software anti-pirate of the present invention, described microprocessor is after reaching binding hours the service time of described Set Top Box model machine, read and perform the instruction of removing storer, make to be stored in memory storage area section software code oneself to smash, Set Top Box model machine stops normal work.
Set Top Box for Set Top Box model machine software anti-pirate of the present invention, described Set Top Box model machine also comprises the interface of the software code smashed by upgrading restoring, described interface comprises JTAG, UART and USB interface, by above-mentioned interface, can read or transplanting program in Set Top Box model machine, but its read or transplant be all binary code, cannot revise it.
Implement Set Top Box model machine software anti-pirate method provided by the invention and Set Top Box, there is following beneficial effect: 1) can avoid bringing bad visual effect to interface; 2) test of performance index is not affected; 3) operate simply; 4) more not easily stolen; 5) technology implementation cost is low.
Accompanying drawing explanation
Below in conjunction with drawings and Examples, the invention will be further described, in accompanying drawing:
Fig. 1 is the program flow diagram of Set Top Box model machine method for preventing piracy embodiment of the present invention;
Fig. 2 is the program flow diagram of Set Top Box model machine software anti-pirate method first embodiment of the present invention;
Fig. 3 is the program flow diagram of Set Top Box model machine software anti-pirate method second embodiment of the present invention;
Fig. 4 is the functional block diagram of the present invention for the Set Top Box model machine of Set Top Box model machine software anti-pirate.
Embodiment
Set Top Box model machine software anti-pirate method of the present invention and Set Top Box, wherein, described Set Top Box comprises microprocessor 1, the storer 2 of being accessed by described microcomputer reads, described storer comprises storage compartments 3 for running Set Top Box model machine software and the authority setting unit 4 corresponding with this software, the code of the binding hours of this software of use that described authority setting unit 4 presets before preserving and dispatching from the factory and the instruction of removing storer, wherein binding hours is by Set Top Box supplier self-defined setting before dispatching from the factory, after dispatching from the factory, other users can not also cannot revise.
Consult shown in Fig. 1, be the program flow diagram of the embodiment of the method for Set Top Box model machine software anti-pirate of the present invention, comprise: before dispatching from the factory, 01) pre-set the binding hours that Set Top Box model machine uses, is stored in authority setting unit 4 li this time; 02) Set Top Box has arrived after in user's hand, when user uses Set Top Box, is read the binding hours value in storer 2 by microprocessor 1, and judges whether current service time reaches binding hours; 03) if do not reach binding hours, Set Top Box model machine normally works, and continues the service time of computing set-top box model machine; 04) if reach binding hours, send erasing memory instructions, microprocessor 1 reads and performs this instruction, and the software code oneself being stored in storer 2 storage compartments 3 is smashed, and Set Top Box model machine stops normal work; 05) step 04 is performed) if Set Top Box model machine need be reused afterwards, recover software code by the mode of upgrading.
Set Top Box model machine software anti-pirate method provided by the invention, the service time of Set Top Box model machine is calculated by two kinds of methods and is controlled: timer 5 adds up the service time of each Set Top Box model machine; Or open by preserving first time the time using Set Top Box model machine, when using Set Top Box model machine searching programs next time, reading first time and opening the time used, and doing difference to realize with the time used next time;
Set Top Box model machine software anti-pirate method of the present invention, after software code oneself smashes, uses this model machine if need continue, and by the mode recovery code of upgrading, the mode of wherein upgrading comprises use USB, UART, OTA.Meanwhile, after Set Top Box model machine software rejuvenation code, and cancel the binding hours used, can be used for large-scale production.
Above-mentioned Set Top Box model machine software anti-pirate method is realized by the method set forth in following embodiment:
The binding hours timer0(being preset Set Top Box model machine software application by Set Top Box model machine supplier can be preset as one week or one month etc. as required), and be stored in before dispatching from the factory in storer; Set Top Box model machine service time timer1, the effective storage life that so Set Top Box model machine is remaining is timer0-timer1, and wherein timer1 initial value is zero.After first time start, timer1 starts timing, and often increase by 1 hour, timer1=timer1+1, calculate timer0-timer1 simultaneously, see whether result is 0, in time equaling 0, Set Top Box model machine software smashes (the flash storer that erasing stores application program) with regard to oneself, thus cannot continue to use, and reach the effect of software anti-theft.Consult shown in Fig. 2, this embodiment comprises following process:
101) software initial setting up timer0(is such as one week, namely 168 hours), timer1=0 during first time start;
102), during each use Set Top Box model machine, the i.e. accumulative timing from the service time of last time of timer1, often increases by 1 hour, timer1=timer1+1;
103) calculate timer0-timer1, see whether result equals 0;
104) if result is not equal to 0, Set Top Box prototyping system continues normal operation;
105) if result equals 0, send erasing flash instruction, the code inside erasing flash storer, makes model machine cisco unity malfunction;
106) if need to continue to use this software, by the mode recovery code of upgrade (USB, UART, OTA etc.), and timer1 is reset.When still using as model machine, system worked well, timer1 restarts counting; When needs are for large-scale production, after upgrading restoring code, cancel original timer0 and timer1 simultaneously;
Above-mentioned Set Top Box model machine software anti-pirate method can be realized by another preferred embodiment following equally:
The same binding hours being preset Set Top Box model machine software application by Set Top Box model machine supplier, and be stored in memory module; Transport stream (TS stream) the inside free date table (TDT, real-time date-time can be reacted accurately), the date of memory T DT1 when first time searching programs, second time searching programs TDT2 ..., TDTn when the N time, does the subtraction of TDTn-TDT1 at every turn, when its difference equals the binding hours arranging Set Top Box model machine software application, software oneself smashes (erasing stores the flash storer of model machine software), thus cannot continue to use, reach software anti-theft effect.Consult shown in Fig. 3, this embodiment comprises following process:
201) start shooting, during store-memory first time searching programs, the TDT1 of TS stream the inside is in memory module;
202) n-th searching programs reads the TDTn that TS flows the inside from storer;
203) calculate the difference of TDTn and TDT1, judge whether to reach binding hours;
204) if difference is less than use binding hours, Set Top Box prototyping system continues normal operation;
205) if difference is equal to or greater than use binding hours, send erasing flash instruction, the code inside erasing flash storer, makes its cisco unity malfunction;
206) if need to continue to use this software, by the mode recovery code of upgrade (USB, UART, OTA etc.), machine normally works.When still using as model machine, system worked well, date memory unit resets, the TDT1 again during memory first time searching programs; When needs for the production of time, after upgrading restoring code, cancel date storage.
After above-mentioned two kinds of methods all reach regulation use binding hours by calculating, Set Top Box model machine stops normal work, when being used in test as continued can by upgrading mode time make counter O reset, cancel counting when formal production by upgrading, thus realize volume production.The resource that these two kinds of methods take CPU is all little, the not performance index of influential system, even can arrange antitheft when others does not know, in special environment advantageously, and its anti-theft capability is not easily cracked, complete because it is all inside, and external condition can not change because of the setting of individual.Wherein the cpu resource that takies of the second embodiment is less, and the Time of Day that only need read when each searching programs inside TS stream does a subtraction and compares, and the first embodiment needs software oneself continuous counter.
Consult shown in Fig. 4, the above-mentioned Set Top Box for Set Top Box model machine software anti-pirate, comprise microprocessor 1, the storer 2 of being accessed by described microcomputer reads, described storer comprises storage compartments 3 for running Set Top Box model machine software and the authority setting unit 4 corresponding with this software, the code of the binding hours of this software of use that described authority setting unit 4 presets before preserving and dispatching from the factory and the instruction of removing storer, this time value before model machine dispatches from the factory by the self-defined setting of the supplier of Set Top Box, as one week namely 168 hours can be set to as required.
When implementing the first embodiment of Set Top Box model machine software anti-pirate method of the present invention, described Set Top Box also comprises timer 5, and for the time that accumulative Set Top Box model machine uses, often use 1h, timer1 just increases by 1; And when implementing the second embodiment of Set Top Box model machine software anti-pirate method of the present invention, described Set Top Box model machine reads the Time of Day data in TS stream by OTA.
After service time of the above-mentioned Set Top Box for Set Top Box model machine software anti-pirate reaching binding hours, described microprocessor 1 reads and performs the instruction of removing storer, make to be stored in storer 2 software storage compartments 3 software code oneself to smash, Set Top Box model machine stops normal work.
The above-mentioned Set Top Box for Set Top Box model machine software anti-pirate, described Set Top Box model machine also comprises the interface of the software code smashed by upgrading restoring, the code that upgrading can be wiped free of in recovering, described interface comprises JTAG6, UART7 and USB8 interface, by above-mentioned interface, can read or transplanting program in Set Top Box model machine, but its read or transplant be all binary code, cannot revise it.When model machine Set Top Box is by large-scale production, by after upgrading restoring code, the use binding hours etc. preset in code can be cancelled.Simultaneously, for the production of time, described in every platform, Set Top Box all can have unique sequence number, to make anti-counterfeiting mark, (sequence number is self-defined by the supplier of Set Top Box, need to be connected with server when write, not connecting cannot writing sequence number, in case reusing of sequence number, guarantees the uniqueness of sequence number); And the software of described Set Top Box does high safe handling, be namely successfully burnt to after in machine and just shut jtag interface 6, UART interface 7 etc., code cannot be read, thus prevent it stolen.
The above, for the person of ordinary skill of the art, can make other various corresponding change and distortion according to technical scheme of the present invention and technical conceive, and all these change and be out of shape the protection domain that all should belong to claim of the present invention.
Claims (4)
1. a Set Top Box model machine software anti-pirate method, is characterized in that, the binding hours of this Set Top Box model machine software application that prestores before described Set Top Box model machine dispatches from the factory, described method comprises the steps:
When S1) opening use Set Top Box model machine, judge whether the use of Set Top Box model machine reaches binding hours; Described binding hours is self-defined before dispatching from the factory as required by the supplier of Set Top Box model machine, and after dispatching from the factory, other users cannot change;
S2) if do not reach binding hours, Set Top Box model machine normally works;
S3) if reach binding hours, send and perform the instruction of wiping Set Top Box model machine software code, Set Top Box model machine stops normal work, performs step S4);
S4) recover software code by the mode of upgrading, Set Top Box model machine normally works again;
S5) if when described Set Top Box model machine is used for large-scale production, above-mentioned steps S4 is performed) and cancel described binding hours;
Perform described step S1) by accumulative each time using Set Top Box model machine, and compare realization with binding hours, or perform described step S1) use the Time of Day of Set Top Box model machine and first time to use the difference between the Time of Day of Set Top Box model machine and binding hours to compare realization by each, when described Set Top Box model machine still uses as model machine, Set Top Box model machine normally works, date memory unit resets, the Time of Day table again during memory first time searching programs; When described Set Top Box model machine for the production of time, after upgrading restoring code, cancel date storage.
2. Set Top Box model machine software anti-pirate method according to claim 1, is characterized in that, the mode of described upgrading comprises use USB, UART, OTA.
3. the Set Top Box for Set Top Box model machine software anti-pirate, it is characterized in that, the storer (2) of comprise microprocessor (1), being accessed by described microcomputer reads, described storer comprises storage compartments (3) for running Set Top Box model machine software and the authority setting unit (4) corresponding with this software, the binding hours of this software of use that described authority setting unit (4) presets before preserving and dispatching from the factory and the code of "clear store" instruction;
Described Set Top Box also comprises for accumulative each timer (5) using the time of Set Top Box model machine, described microprocessor (1) is by timer (5) accumulative each time using Set Top Box model machine, and compare with binding hours, or use the Time of Day of Set Top Box model machine and first time to use the difference between the Time of Day of Set Top Box model machine and binding hours to compare by each, after reaching binding hours the service time of described Set Top Box model machine, read and perform the instruction of removing storer, make to be stored in storer (2) software storage compartments (3) software code oneself to smash, when described Set Top Box model machine still uses as model machine, Set Top Box model machine normally works, date memory unit resets, again Time of Day table during memory first time searching programs, when described Set Top Box model machine for the production of time, after upgrading restoring code, cancel date storage.
4. the Set Top Box for Set Top Box model machine software anti-pirate according to claim 3, it is characterized in that, described Set Top Box model machine also comprises the interface of the software code smashed by upgrading restoring, and described interface comprises JTAG (6), UART (7) and USB (8) interface.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210187852.7A CN102724593B (en) | 2012-06-08 | 2012-06-08 | Method for preventing pirating software of sample set top box and set top box |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210187852.7A CN102724593B (en) | 2012-06-08 | 2012-06-08 | Method for preventing pirating software of sample set top box and set top box |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102724593A CN102724593A (en) | 2012-10-10 |
CN102724593B true CN102724593B (en) | 2015-05-06 |
Family
ID=46950231
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210187852.7A Expired - Fee Related CN102724593B (en) | 2012-06-08 | 2012-06-08 | Method for preventing pirating software of sample set top box and set top box |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102724593B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108846285A (en) * | 2018-06-19 | 2018-11-20 | 北京奥普维尔科技有限公司 | Model machine management method and model machine management system |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105677530A (en) * | 2014-11-17 | 2016-06-15 | 鸿富锦精密工业(深圳)有限公司 | Computer usage hour recording system and method |
CN106488315B (en) * | 2016-09-12 | 2019-09-10 | 深圳创维数字技术有限公司 | A kind of software anti-pirate device and its method of set-top box |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101261667A (en) * | 2008-04-10 | 2008-09-10 | 北京深思洛克数据保护中心 | A software protection method |
CN102196317A (en) * | 2011-03-01 | 2011-09-21 | 深圳创维数字技术股份有限公司 | Set-top box protection method and set-top box |
CN102289383A (en) * | 2011-09-22 | 2011-12-21 | 四川长虹电器股份有限公司 | Method for upgrading software of set top box |
-
2012
- 2012-06-08 CN CN201210187852.7A patent/CN102724593B/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101261667A (en) * | 2008-04-10 | 2008-09-10 | 北京深思洛克数据保护中心 | A software protection method |
CN102196317A (en) * | 2011-03-01 | 2011-09-21 | 深圳创维数字技术股份有限公司 | Set-top box protection method and set-top box |
CN102289383A (en) * | 2011-09-22 | 2011-12-21 | 四川长虹电器股份有限公司 | Method for upgrading software of set top box |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108846285A (en) * | 2018-06-19 | 2018-11-20 | 北京奥普维尔科技有限公司 | Model machine management method and model machine management system |
Also Published As
Publication number | Publication date |
---|---|
CN102724593A (en) | 2012-10-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102722394B (en) | Start upgrading method of embedded equipment | |
US10152579B2 (en) | Network information system with license registration and method of operation thereof | |
CN102360298B (en) | Software upgrading method of terminal equipment | |
EP3188065A1 (en) | Secure intelligent terminal device and information processing method | |
CN104267982A (en) | Application program start control system and method | |
CN103905850A (en) | Installment payment method and installment payment television | |
CN102724593B (en) | Method for preventing pirating software of sample set top box and set top box | |
CN107608705A (en) | A kind of wireless WIFI video equipments and its firmware upgrade method | |
CN103279431A (en) | Access method for kinds of permissions of memorizer | |
CN104423985A (en) | Method and device for noticing update of applications | |
Afonin et al. | Mobile Forensics–Advanced Investigative Strategies | |
CN103226482A (en) | Method and device for guiding and starting set top box | |
CN103997684A (en) | Method and device for updating operating system | |
CN106897063B (en) | Method and system for permanently adding OS boot entry to BIOS based on EFI | |
CN106095605A (en) | The abnormality eliminating method of a kind of display terminal and device | |
CN103034636A (en) | Roll-back method, device and system of non relational database | |
KR101529713B1 (en) | Method for improving system stability of android devices in abnormal power switching, and computer-readable recording medium for the same | |
CN109034808B (en) | Operation method and device of payment application program and terminal equipment | |
CN104580135A (en) | UEFI-based terminal real-time control system and method | |
CN103561321A (en) | Method and device for preventing Android intelligent set top box from being abnormally upgraded | |
CN102693390B (en) | Rentable main board and the method for control mainboard lease | |
CN106778359B (en) | The release method and its electronic device of resetting factory protection | |
CN105975586B (en) | Recommended software installation method, device and equipment | |
CN111488282A (en) | Business function processing method and device, electronic equipment and storage medium | |
CN109032782A (en) | Pot life control method, device and the readable storage medium storing program for executing of one interaction machine |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20150506 Termination date: 20190608 |