CN103079105A - Method and device for protecting program source - Google Patents

Method and device for protecting program source Download PDF

Info

Publication number
CN103079105A
CN103079105A CN 201310021301 CN201310021301A CN103079105A CN 103079105 A CN103079105 A CN 103079105A CN 201310021301 CN201310021301 CN 201310021301 CN 201310021301 A CN201310021301 A CN 201310021301A CN 103079105 A CN103079105 A CN 103079105A
Authority
CN
China
Prior art keywords
chip
meta data
data file
top box
check results
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN 201310021301
Other languages
Chinese (zh)
Inventor
刘衍银
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Skyworth Digital Technology Co Ltd
Original Assignee
Shenzhen Skyworth Digital Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Skyworth Digital Technology Co Ltd filed Critical Shenzhen Skyworth Digital Technology Co Ltd
Priority to CN 201310021301 priority Critical patent/CN103079105A/en
Publication of CN103079105A publication Critical patent/CN103079105A/en
Pending legal-status Critical Current

Links

Images

Abstract

The embodiment of the invention provides a method and a device for protecting a program source. The method comprises the following steps of: creating a metadata file of a program requested to be recorded in a video file when a set-top box records the program to generate the video file, wherein the metadata file comprises a random number; encrypting the random number, generating an encrypted random number K_random and a random number key K_rec, storing the K_random into the metadata file, and storing the K_rec into the set-top box, wherein the K_rec is used for decrypting the K_random; acquiring a current certificate authority (CA) card number, and storing the current CA card number into the metadata file; and checking the CA card number in the metadata file by utilizing a chip number CHIP ID of the set-top box, generating a first check result, and storing the generated first check result into the metadata file. According to the embodiment of the invention, the method for protecting the program source is improved, so that a certificate card number of the program and the chip number of the set-top box can be accurately acquired when the program is discovered to be pirated, and a video pirating user can be tracked.

Description

A kind of guard method of program source and device
Technical field
The present invention relates to video field, relate in particular to a kind of guard method and device of program source.
Background technology
The function of the recorded video that set-top box has makes the user can be by the program that set-top box is recorded or pre-recording oneself is liked, and with playback terminal that this set-top box is associated on again watch the program of liking or missing.When supplier makes set-top box support user program recording, also need protection by the copyright of recorded program, prior art has proposed guard method to this problem, when recording, each authentication card number CA finger print information is constantly recorded, when paying a return visit, read the attributes such as time, position and size in the CA finger print information, and correspondingly be presented in the playback picture; Perhaps provide the program that embeds relevant copyright protection information at video layer to the user, this class program can directly show copyright protection information at video pictures in the process of playback.
Yet, front a kind of existing techniques in realizing method more complicated, need the finger print information of record more, and rely on the Information generation finger print information of the real-time feedback of CA fully, if CA fails feedback information, then in the process of playback, will there be fingerprint to show, can cause protecting unsuccessfully, if the CA card number of video file is modified, supplier can't learn the bootlegging broadcasting source, can not protect copyright and call to account; Another kind of guard method too relies on again program making side, does not embed processing if program itself carries out copyright information, and operator can not protect and buy the program of coming so.
Summary of the invention
The technical problem that the embodiment of the invention solves is; improved the method for protection program source; can follow the trail of the user of bootlegging broadcasting video finding that program obtains authentication card number and the set-top-box chip number of recording this program stolen sowing time exactly, avoid user's bootlegging broadcasting to utilize the set-top box recorded program.
Concrete, the guard method of the program source that the embodiment of the invention provides comprises:
During set-top box program recording generating video file, create the meta data file of the recorded program of asking in described video file, described meta data file comprises random number;
Encrypt described random number, generate encrypted random number K_random and random number secret key K_rec, and deposit described K_random in meta data file, described K_rec is kept in the described set-top box, described K_rec is used for deciphering described K_random;
Obtain current authentication CA card number and deposit meta data file in;
Utilize CA card number described in the chip number CHIP ID verification meta data file of described set-top box, generate the first check results, and first check results that will generate deposits in the described meta data file in.
Better, the method that described set-top box is encrypted described random number comprises that described set-top box is encrypted described random number according to the random number encryption secret key K_pvr of the chip information generation of described set-top box.
Better, utilize the chip number CHIP ID verification meta data file of described set-top box, and first check results that will generate deposits in the described meta data file and comprises in:
Obtain described CHIP ID, and described CHIP ID is encrypted generation verification secret key K_Kub;
Described CA card number with comprising in the described meta data file of described K_Kub verification generates the first check results;
Described the first check results is deposited in the described meta data file.
Better, utilize the described CA card number in the chip number CHIP ID verification meta data file of described set-top box, and after first check results that will generate deposits in the described meta data file, comprising:
During the described video file of playback, extract the meta data file in the described video file;
Obtain be used to the set-top-box chip number CHIP ID that plays described video file, and utilize the described meta data file of described CHIPID verification, generate the second check results;
If described the second check results is identical with the first check results in the described meta data file, then plays described video file, and the described CA card number that comprises in described CHIP ID and the described metadata is presented on the display interface.
Better, if described the second check results is identical with the first check results in the described meta data file, then play described video file, and the described CA card number that comprises in described CHIP ID and the described metadata is presented on the display interface comprises:
Compare the first check results in described the second check results and the described metadata, if identical, then generate the comparison success message;
Described set-top box utilizes the described K_rec that comprises in the described set-top box to decipher described video file;
Obtain the described CA card number that comprises in described CHIP ID and the described metadata, and be embedded into the video playback interface.
Better, if described the second check results is not identical with the first check results in the described metadata, then generate the comparison failed message, described set-top box is not play described video file.
Accordingly, the set-top box that the embodiment of the invention provides comprises:
Creating unit during set-top box program recording generating video file, is used for creating at described video file the meta data file of the recorded program of asking, and described meta data file comprises random number;
The random number encryption unit is used for encrypting described random number, generates encrypted random number K_random and random number secret key K_rec;
Acquiring unit is used for obtaining current authentication CA card number;
Verification unit for CA card number described in the chip number CHIP ID verification meta data file that utilizes described set-top box, generates the first check results;
Storage unit is used for depositing the described CA card number that K_random, described acquiring unit that described random number encryption unit generates get access in described meta data file; Also be used for preserving the described K_rec that described random number encryption unit generates; Also be used for depositing described the first check results that described verification unit generates in described meta data file.
Better, the method that described random number is encrypted in described random number encryption unit comprises that the random number encryption secret key K_pvr that the chip information according to described set-top box produces is encrypted described random number.
Better, described verification unit comprises:
CHIP ID acquiring unit is used for obtaining current set-top-box chip number CHIP ID;
CHIP ID ciphering unit is used for described CHIP ID is encrypted generation verification secret key K_Kub;
CHIP ID verification unit, the described meta data file of described K_Kub verification that is used for utilizing described CHIP ID ciphering unit to generate carries out, and generates the first check results;
Described storage unit, described the first check results that also generates for the CHIP ID verification unit with described verification unit deposits described meta data file in.
Better, the set-top box that the embodiment of the invention provides also comprises:
Extraction unit during the described video file of playback, is used for extracting the meta data file of described video file;
Described verification unit also is used for obtaining be used to the set-top-box chip number CHIPID that plays described video file, utilizes the described meta data file of described CHIP ID verification, generates the second check results;
Broadcast unit when the original checksums that is used for described the second check results and described meta data file comes to the same thing, is play described video file, and the described CA card number that comprises in described CHIP ID and the described metadata is presented on the display interface.
Better, described broadcast unit comprises:
Comparing unit is used for comparing the first check results of described the second check results and described meta data file, and when comparison result is identical, generates the comparison success message and be sent to decryption unit;
Decryption unit, the described K_rec that is used for utilizing described storage unit to preserve deciphers described video file;
Embed and playback unit, be used for obtaining the described CA card number that described CHIP ID and described metadata comprise, and be embedded into the video playback interface.
Better, if described the second check results is not identical with original checksums result in the described metadata, then described broadcast unit is not play described video file.
Better, it is not identical with the original checksums result of described meta data file that the comparing unit of described broadcast unit also is used for comparing described the second check results, generates comparison failed message and playing program out of service.
The embodiment of the invention has been improved and has been detected whether legal method of playback program, can avoid the user to utilize the set-top box recorded program by bootlegging broadcasting.
Description of drawings
In order to be illustrated more clearly in the technical scheme of the embodiment of the invention, the below will do simple the introduction to the accompanying drawing of required use among the embodiment, apparently, accompanying drawing in the following describes only is some embodiment of the embodiment of the invention, for those of ordinary skills, under the prerequisite of not paying creative work, can also obtain according to these accompanying drawings other accompanying drawing.
Fig. 1 is an embodiment schematic flow sheet of the guard method of program source of the present invention;
Fig. 2 is another embodiment schematic flow sheet of the guard method of program source of the present invention;
Fig. 3 is that an example structure of set-top box of the present invention forms schematic diagram;
Fig. 4 is that another example structure of set-top box of the present invention forms schematic diagram;
Fig. 5 is an embodiment schematic flow sheet of set-top box of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the invention, the technical scheme in the embodiment of the invention is clearly and completely described, obviously, described embodiment only is the present invention's part embodiment, rather than whole embodiment.Based on the embodiment among the present invention, those of ordinary skills belong to the scope of protection of the invention not making the every other embodiment that obtains under the creative work prerequisite.
The embodiment of the invention provides a kind of guard method of program source, and it can comprise: during set-top box program recording generating video file, create the meta data file of the recorded program of asking in described video file, described meta data file comprises random number; Encrypt described random number, generate encrypted random number K_random and random number secret key K_rec, and deposit described K_random in meta data file, described K_rec is kept in the described set-top box, described K_rec is used for deciphering described K_random; Obtain current authentication CA card number and deposit meta data file in; Utilize CA card number described in the chip number CHIP ID verification meta data file of described set-top box, generate the first check results, and first check results that will generate deposits in the described meta data file in.In the embodiment of the invention; in the meta data file for the protection of video file, increase the encrypted random number of the random number secret key deciphering of preserving in the set-top box that can only be recorded this video during the video file of set-top box recorded video, generation and record the CA card number of this video; such method for recording can make the user record this video file of playback on the set-top box of this video file; and can only be under the prerequisite that this video file is not modified this video file of successful playback, can when video playback, program source be protected.
In the specific implementation, the set-top box of the embodiment of the invention record and the generating video file after, in the process of playback, also to carry out verification to video file, in the situation that verification succeeds, set-top box will be used the random number secret key enabling decryption of encrypted random number of the meta data file encrypted random number that is used for the decrypted video file, make video file begin playback.
Below in conjunction with the drawings and the specific embodiments, the technical scheme of the embodiment of the invention is elaborated.
As shown in Figure 1, an embodiment of the guard method of a kind of program source provided by the invention can may further comprise the steps:
Step S110 during set-top box program recording generating video file, creates the meta data file of the recorded program of asking in this video file, described meta data file comprises random number.Wherein, meta data file is in a kind of subfile that is present in video file, be used for to describe a kind of structural data of the video file that set-top box records, it can comprise multiple element, generate in the embodiment of the invention and during the verification video mentioned data can write in the meta data file.For example, set-top box is when beginning program recording video, when creating video file, establishment is contained in the metadata sk_pvr_filemanage_kdg_metadata_t in the program_name.meta subfile, and generating a random number, this random number can generate by call function sK_generate_random ().
Step S111 encrypts described random number, generates encrypted random number K_random and random number secret key K_rec, and deposits described K_random in meta data file, and described K_rec is kept in the described set-top box, and described K_rec is used for deciphering described K_random.
In the implementation, the method for set-top box encrypted random number comprises that set-top box is encrypted random number according to the random number encryption secret key of the chip information generation of self, and the method for encryption can comprise that AES encrypts.For example, after step S110 has generated random number, set-top box is imported random number into bottom layer driving, bottom layer driving is in the program recording video, the random number encryption secret key K_pvr that utilizes set-top box to produce according to self chip information carries out AES to this random number and encrypts, and generates encrypted random number K_random and random number secret key K_rec.
In the implementation, the random number secret key K_rec of generation will be stored in set-top box inside, enabling decryption of encrypted random number during for this video of playback on set-top box; The encrypted random number K_random that generates will be stored in the meta data file; for the protection of video file; guarantee that this video file can only play in the set-top box of recording this video file; for example; K_random can be stored in the m_u8RandomData array of metadata sk_pvr_filemanage_kdg_metadata_t structure, when the PVR playback, can be read out deciphering.
Step S112 obtains current authentication CA card number and deposits meta data file in.Wherein, the CA card number is stored in the metadata, can be used as the verification element.For example, can pass through function getSmartcardNumber (U8*pCardBuf, U32len) obtain the current CA card number of recording this video file, and the CA card number is kept in the m_smartCardNum array of metadata sk_pvr_filemanage_kdg_metadata_t structure.
Step S113 utilizes CA card number described in the chip number CHIP ID verification meta data file of described set-top box, generate the first check results, and first check results that will generate deposits in the described meta data file in.In the implementation, the concrete steps of verification meta data file can comprise: obtain CHIP ID, and CHIP ID is encrypted generation verification secret key K_Kub; CA card number with comprising in the K_Kub verification meta data file generates the first check results; The first check results is deposited in the described meta data file.
In the specific implementation, obtain CHIP ID, and CHIP ID is encrypted generates verification secret key K_Kub and can finish by call function, for example, can obtain by sk_pvr_get_K_kub () the verification secret key K_kub of metadata sk_pvr_filemanage_kdg_metadata_t, sk_pvr_get_K_kub () function at first obtains the CHIP ID of chip, then by algorithm CHIP ID is encrypted and produces the K_kub secret key, wherein, K_kub is owing to the uniqueness of CHIP ID has uniqueness, and is not present in the meta data file of video file.
In the specific implementation, with the CA card number that comprises in the K_Kub verification meta data file, generate in the first check results, the verification meta data file mainly is the verification to CA card number in the metadata, the method of verification can comprise by call function sk_pvr_com_priv_make_metadata_verify carries out the MD5 verification to data among the metadata sk_pvr_filemanage_kdg_metadata_t, and the MD5 check value that obtains is called the first check results, because after video file generates, metadata cannot be modified, therefore also the first check results can be considered as the benchmark check results for comparison.Again verification when the first check results is mainly used in video playback comparison can be used for guaranteeing that the meta data file of video file is not tampered, and in later stage again in the checking routine, if check results is not identical with the first check results again, then refuses displaying video.
In the specific implementation, the first check results is deposited in the described meta data file.Go aforesaid giving an example, the first check results can be deposited in the u8MetadataVerify array in the metadata sk_pvr_filemanage_kdg_metadata_t structure.Thus, the subfile program_name.meta of the video file recorded of set-top box will comprise a kind of meta data file with encrypted random number K_random, CA card number, the first check results and related data.
The embodiment of the invention is when recorded video; the CA that in the meta data file of video file, has added the encrypted random number K_random of the set-top box deciphering that can only be recorded this video, used when recording and utilize the check results that generates after the CHIP ID verification metadata of set-top box of recorded video; the video of recording can only be play in the set-top box of recording this video; if and the CA card number that has guaranteed video file is tampered then and can not plays, such method for recording can make program source be protected when the later stage playback.
Fig. 2 is another embodiment schematic flow sheet of the guard method of program source of the present invention.The present embodiment is based on the playback flow process of the video file of method generation shown in Figure 1, is the method for protection program source in replayed section, and concrete, the method for the present embodiment comprises:
Step S210 during the described video file of playback, extracts the meta data file in the described video file.For example, when the user chooses a recorded file to play, the meta data file sk_pvr_filemanage_kdg_metadata_t in the program_name.meta file of this video file of set-top box Automatic-searching.
Step S211 obtains be used to the set-top-box chip number CHIP ID that plays described video file, and utilizes the described meta data file of described CHIP ID verification, generates the second check results.Wherein, this step is similar to the mode that step S113 implements, whether the part of step S211 verification does not comprise the first check results in the meta data file, and the second check results is mainly used in whether the described video file of verification play in the set-top box of recording this video, be tampered.For example, when verification sk_pvr_filemanage_kdg_metadata_t file, set-top box will be removed the part of m_u8MetadataVerify array in the verification metadata, the the second check results MD5 value that obtains also deposits in the interim array temp_metadataVerify array of sk_pvr_filemanage_kdg_metadata_t in the lump, can be used for comparing with the first check results.
Step S212, if the second check results is identical with the first check results in the meta data file, playing video file then, and the CA card number that comprises in CHIP ID and the metadata is presented on the display interface.In the implementation, step S212 can implement particularly in the following manner: compare the first check results in the second check results and the metadata, if identical, then generate the comparison success message; Set-top box is utilized the K_rec decrypted video file that comprises in the set-top box; Obtain the CA card number that comprises in CHIP ID and the metadata, and be embedded into the video playback interface.For example, if the second check results that set-top box verification metadata generates is identical with the first check results, then be considered as this video file and be legal use, the K_rec that will generate in the time of generating this video file before then set-top box can be searched and be incited somebody to action imports into to drive and carries out the random number deciphering, decipher this video file, and show CHIP ID and the CA card number that from metadata, obtains at the interface of video playback, wherein, if this video file is not recorded in this set-top box, set-top box can't find the K_rec for this video file of deciphering, and this has guaranteed that also video file can legal broadcast on other set-top box; If it is not identical with the first check results in the metadata to compare out the second check results, it is illegal then being considered as this video file, can not be played, and set-top box generates the comparison failed message so, and set-top box is playing video file not.
The embodiment of the invention is when the video that playback is recorded, meta data file in the verification video file, judge whether this video file is tampered, can legal use in the situation that compare out this video file, the set-top box utilization generates the K_rec decrypted video file of this video file, thus, the embodiment of the invention makes the user record the video file that playback was not tampered on the set-top box of this video file, guaranteed the accuracy of video file CHIP ID and CA card number, therefore in case the bootlegging broadcasting situation occurs, the user is upper can be directly to obtain accurately bootlegging broadcasting CHIP ID and CA card number from the display interface of video, investigates the bootlegging broadcasting responsibility.
Accordingly, the embodiment of the invention provides a kind of set-top box, and it can comprise: creating unit, during set-top box program recording generating video file, be used for creating at described video file the meta data file of the recorded program of asking, described meta data file comprises random number; The random number encryption unit is used for encrypting described random number, generates encrypted random number K_random and random number secret key K_rec; Acquiring unit is used for obtaining current authentication CA card number; Verification unit for CA card number described in the chip number CHIP ID verification meta data file that utilizes described set-top box, generates the first check results; Storage unit is used for depositing the described CA card number that K_random, described acquiring unit that described random number encryption unit generates get access in described meta data file; Also be used for preserving the described K_rec that described random number encryption unit generates; Also be used for depositing described the first check results that described verification unit generates in described meta data file.The set-top box of the embodiment of the invention; in the meta data file for the protection of video file, increase the encrypted random number of the random number secret key deciphering of preserving in the set-top box that can only be recorded this video during the video file of recorded video, generation and record the CA card number of this video; such video file makes the user record playback on the set-top box of this video file, and can only successful playback under the prerequisite that this video file is not modified.
Below in conjunction with the drawings and the specific embodiments, the device of the embodiment of the invention is elaborated.
As shown in Figure 3, an example structure of set-top box provided by the invention forms schematic diagram.The device of this embodiment can be used for the way of execution graph 1, concrete, the device of this embodiment comprises: creating unit 31, random number encryption unit 32, acquiring unit 33, verification unit 34 and storage unit 35, wherein, verification unit 34 can further comprise CHIP ID acquiring unit 341, CHIP ID ciphering unit 342 and CHIP ID verification unit 343, wherein:
Creating unit 31 during set-top box program recording generating video file, is used for creating at this video file the meta data file of the recorded program of asking, and this meta data file comprises random number.Wherein, meta data file is in a kind of subfile that is present in video file, be used for to describe a kind of structural data of the video file that set-top box records, it can comprise multiple element, generate in the embodiment of the invention and during the verification video mentioned data can write in the meta data file.In the specific implementation, creating unit 31 creates the metadata sk_pvr_filemanage_kdg_metadata_t that is contained in the program_name.meta subfile, and generating a random number, this random number can generate by call function sK_generate_random ().
Random number encryption unit 32 is used for encrypting described random number, generates encrypted random number K_random and random number secret key K_rec.Wherein, the method for random number encryption unit 32 encrypted random numbers comprises that the random number encryption secret key according to the chip information generation of set-top box is encrypted random number, and the method for encryption can comprise that AES encrypts.For example, after creating unit 31 has created the meta data file that comprises random number, random number encryption unit 32 imports random number into bottom layer driving, in the program recording video, the random number encryption secret key K_pvr that utilizes set-top box to produce according to self chip information carries out AES to this random number and encrypts, and generates encrypted random number K_random and random number secret key K_rec.
Acquiring unit 33 is used for obtaining current authentication CA card number.Concrete, can pass through function getSmartcardNumber (U8*pCardBuf, U32len) obtain the current CA card number of recording this video file, and the CA card number is kept in the m_smartCardNum array of metadata sk_pvr_filemanage_kdg_metadata_t structure.
Verification unit 34, the chip number CHIP ID verification meta data file CA card number for utilizing set-top box generates the first check results.Wherein, verification unit 34 can further comprise CHIP ID acquiring unit 341, CHIP ID ciphering unit 342 and CHIP ID verification unit 343.
CHIP ID acquiring unit 341 is used for obtaining current set-top-box chip number CHIP ID.For example, can obtain by function sk_pvr_get_K_kub () the CHIP ID of chip.
CHIP ID ciphering unit 342 is used for CHIP ID is encrypted generation verification secret key K_Kub.Wherein, after CHIP ID acquiring unit 341 obtains the CHIP ID of chip by function sk_pvr_get_K_kub (), CHIP ID ciphering unit 342 continues to produce the K_kub secret key by by algorithm CHIP ID being encrypted, wherein, K_kub is owing to the uniqueness of CHIP ID has uniqueness, and is not present in the meta data file of video file.
CHIP ID verification unit 343, the K_Kub verification meta data file that is used for utilizing CHIP ID ciphering unit 342 to generate carries out, and generates the first check results.Wherein, CHIP ID verification unit 343 verification meta data files mainly are the verifications to CA card number in the metadata, the method of verification can comprise by call function sk_pvr_com_priv_make_metadata_verify carries out the MD5 verification to data among the metadata sk_pvr_filemanage_kdg_metadata_t, and the MD5 check value that obtains is called the first check results, because after video file generates, metadata cannot be modified, therefore also the first check results that CHIP ID verification unit 343 generates can be considered as the benchmark check results for comparison.Again verification when the first check results is mainly used in video playback comparison can be used for guaranteeing that the meta data file of video file is not tampered, and in later stage again in the checking routine, if check results is not identical with the first check results again, then refuses displaying video.
The specific implementation of verification unit 34 functions can be shown in following program:
Figure BDA00002755084700101
Figure BDA00002755084700111
Figure BDA00002755084700121
Storage unit 35 is used for depositing the K_random of random number encryption unit 32 generations, the CA card number that acquiring unit 33 gets access in meta data file; Also be used for preserving the K_rec that the random number encryption unit generates; Also be used for depositing the first check results that verification unit 34 generates in meta data file; The first check results that also generates for the CHIP ID verification unit 343 with verification unit 34 deposits meta data file in.Concrete, the sk_pvr_filemanage_kdg_metadata_t structure will be filled metadata as follows:
Figure BDA00002755084700122
And K_rec is deposited in the set-top box.
The set-top box of the embodiment of the invention can be used for generating a kind of video file of the meta data file with encrypted random number K_random, CA card number, the first check results and related data; in this video file encrypted random number K_random can only record on the set-top box of this video file decrypted; if the CA card number is tampered in this video file; then the result of later stage verification will not be inconsistent in the first check results; thus; the set-top box of the embodiment of the invention makes program source be subject to protection when the video file that generation is recorded.
Another example structure of set-top box as shown in Figure 4 forms schematic diagram, the set-top box of the embodiment of the invention is used for verification and treats playback video in replayed section, can be used for carrying out the step of the embodiment of the invention two, it can comprise: verification unit 34, extraction unit 36 and broadcast unit 37, wherein, broadcast unit 37 has also further comprised comparing unit 371, decryption unit 372 and embedding and playback unit 373, wherein:
Extraction unit 36 during the playback video file, is used for extracting the meta data file of video file.For example, when the user chose a recorded file to play, the program_name.meta file of extraction unit 36 these video files of Automatic-searching also extracted meta data file sk_pvr_filemanage_kdg_metadata_t in this document.
Verification unit 34 also is used for obtaining the set-top-box chip number CHIP ID for playing video file, utilizes CHIP ID verification meta data file, generates the second check results.Wherein, the mode of verification unit 34 generations the second check results is similar to the mode of previous embodiment, the method of verification unit 34 verification metadata comprises the part of removing the m_u8MetadataVerify array in the verification metadata in the present embodiment, the the second check results MD5 value that obtains also deposits in the interim array temp_metadataVerify array of sk_pvr_filemanage_kdg_metadata_t in the lump, can be used for comparing with the first check results.
Broadcast unit 37, when the original checksums that is used for the second check results and meta data file comes to the same thing, playing video file, and the CA card number that comprises in CHIP ID and the metadata is presented on the display interface.Wherein, broadcast unit 37 can further comprise: comparing unit 371, decryption unit 372 and embedding and playback unit 373.
Comparing unit 371 is used for the first check results of comparison the second check results and meta data file, and when comparison result is identical, generates the comparison success message and be sent to decryption unit;
Decryption unit 372 is used for the K_rec decrypted video file that utilizes storage unit to preserve;
Embed and playback unit 373, for the CA card number that obtains CHIP ID and metadata and comprise, and be embedded into the video playback interface.
In the specific implementation, if it is identical with the first check results that comparing unit 371 is compared out the second check results of verification unit 34 verification metadata generation, then be considered as this video file and be legal use, the K_rec that will generate in the time of generating this video file before then decryption unit 372 can be searched and be incited somebody to action imports into to drive and carries out the random number deciphering, the CA card number that embedding and playback unit 373 embed CHIP ID and obtain from metadata at the interface of video playback, make set-top box when the playback video file, show CHIP ID and CA card number on the playback interfaces, wherein, if this video file is not recorded in this set-top box, decryption unit 372 can't find the K_rec for this video file of deciphering, decryption unit 372 also can't be decrypted work, and this has guaranteed that also video file can legal broadcast on other set-top box; If it is not identical with the first check results in the metadata that comparing unit 371 is compared out the second check results, it is illegal then being considered as this video file, can not be played, comparing unit 371 generates the comparison failed message so, and embedding and playback unit 373 can not this video files of playback.
Please in the lump with reference to an embodiment schematic flow sheet of as shown in Figure 5 set-top box, Fig. 5 has showed the implementing procedure of set-top box unit protection program source in the process of playback video of the embodiment of the invention
Step S510 reads meta data file.This step is by being that extraction unit 36 is implemented, and mainly is the meta data file sk_pvr_filemanage_kdg_metadata_t that seeks in the program_name.meta file of video file.
Step S511 generates verification secret key K_kub.This step is to be implemented by the CHIP ID acquiring unit 341 of verification unit 34 and CHIP ID ciphering unit 342, and the K_Kub of generation has uniqueness and is not present in the meta data file of video file.
Step S512, the verification metadata.This step is to be finished by the CHIP ID verification unit 343 of verification unit 34, and this step will generate the first check results.
Step S513, the check results of generation is identical with the first check results.This step is the process of a judgement, is to be implemented by the comparing unit 371 of broadcast unit 37, and, when the check results that generates is identical with the first check results, think that this video file is not tampered implementation step S514; When the check results that generates is not identical with the first check results, think that this video file is tampered implementation step S516.
Step S514 imports random number secret key K_rec into and begins playback.Wherein, this step is to be implemented by the decryption unit 372 of broadcast unit 37, and random number secret key K_rec is present in the set-top box, and this step can guarantee that video file can successfully broadcast on other set-top box.
Step S515 shows CHIP ID and CA card number in playback interfaces.Wherein, this step is to be finished by the embedding of broadcast unit 37 and playback unit 373; show on the playback interfaces that CHIP ID and CA card number can play the effect of protection program source; if supplier finds program by bootlegging broadcasting, then can learn place, bootlegging broadcasting source by the CHIP ID and the CA card number that show on the playback interfaces.
Step S516, prompting is compared unsuccessfully.After video file was tampered, video file can not be by normal play, and this has also protected program source from another point of view.
The set-top box of the embodiment of the invention is when the video file that playback is recorded; increased the unit of supporting the video file verification; make the user record the video file that playback is not tampered on the set-top box of this video file; the supply and marketing merchant is when finding the bootlegging broadcasting phenomenon; the device of the embodiment of the invention can guarantee that the CHIP ID and the CA card number that show on the playback interfaces are accurately; the supply and marketing merchant can investigate bootlegging broadcasting person's responsibility on this basis; thus, the purpose of the protection program source that realized of the device of the embodiment of the invention.
Module described in the embodiment of the invention or unit, can pass through universal integrated circuit, CPU(Central Processing Unit for example, central processing unit), or by ASIC(Application Specific Integrated Circuit, application-specific integrated circuit (ASIC)) realize.
One of ordinary skill in the art will appreciate that all or part of flow process that realizes in above-described embodiment method, to come the relevant hardware of instruction to finish by computer program, described program can be stored in the computer read/write memory medium, this program can comprise the flow process such as the embodiment of above-mentioned each side method when carrying out.Wherein, described storage medium can be magnetic disc, CD, read-only store-memory body (Read-Only Memory, ROM) or random store-memory body (Random Access Memory, RAM) etc.
Above disclosed only is preferred embodiment of the present invention, certainly can not limit with this interest field of the present invention, one of ordinary skill in the art will appreciate that all or part of flow process that realizes above-described embodiment, and according to the equivalent variations that claim of the present invention is done, still belong to the scope that invention is contained.

Claims (13)

1. the guard method of a program source is characterized in that, comprising:
During set-top box program recording generating video file, create the meta data file of the recorded program of asking in described video file, described meta data file comprises random number;
Encrypt described random number, generate encrypted random number K_random and random number secret key K_rec, and deposit described K_random in meta data file, described K_rec is kept in the described set-top box, described K_rec is used for deciphering described K_random;
Obtain current authentication CA card number and deposit meta data file in;
Utilize CA card number described in the chip number CHIP ID verification meta data file of described set-top box, generate the first check results, and described first check results that will generate deposits in the described meta data file in.
2. the guard method of program source as claimed in claim 1; it is characterized in that, the method that described set-top box is encrypted described random number comprises that described set-top box is encrypted described random number according to the random number encryption secret key K_pvr of the chip information generation of described set-top box.
3. the guard method of program source as claimed in claim 1 is characterized in that, utilizes the chip number CHIP ID verification meta data file of described set-top box, and first check results that will generate deposits in the described meta data file and comprises:
Obtain described CHIP ID, and described CHIP ID is encrypted generation verification secret key K_Kub;
Described CA card number with comprising in the described meta data file of described K_Kub verification generates the first check results;
Described the first check results is deposited in the described meta data file.
4. the guard method of program source as claimed in claim 1; it is characterized in that; utilize the described CA card number in the chip number CHIP ID verification meta data file of described set-top box, and after first check results that will generate deposits in the described meta data file, comprising:
During the described video file of playback, extract the meta data file in the described video file;
Obtain be used to the set-top-box chip number CHIP ID that plays described video file, and utilize the described meta data file of described CHIPID verification, generate the second check results;
If described the second check results is identical with the first check results in the described meta data file, then plays described video file, and the described CA card number that comprises in described CHIP ID and the described metadata is presented on the display interface.
5. the guard method of program source as claimed in claim 4; it is characterized in that; if described the second check results is identical with the first check results in the described meta data file; then play described video file, and the described CA card number that comprises in described CHIP ID and the described metadata is presented on the display interface comprises:
Compare the first check results in described the second check results and the described metadata, if identical, then generate the comparison success message;
Described set-top box utilizes the described K_rec that comprises in the described set-top box to decipher described video file;
Obtain the described CA card number that comprises in described CHIP ID and the described metadata, and be embedded into the video playback interface.
6. such as the guard method of claim 4 or 5 described program source, it is characterized in that, if described the second check results is not identical with the first check results in the described metadata, then generate the comparison failed message, described set-top box is not play described video file.
7. a set-top box is characterized in that, comprising:
Creating unit during set-top box program recording generating video file, is used for creating at described video file the meta data file of the recorded program of asking, and described meta data file comprises random number;
The random number encryption unit is used for encrypting described random number, generates encrypted random number K_random and random number secret key K_rec;
Acquiring unit is used for obtaining current authentication CA card number;
Verification unit for CA card number described in the chip number CHIP ID verification meta data file that utilizes described set-top box, generates the first check results;
Storage unit is used for depositing the described CA card number that K_random, described acquiring unit that described random number encryption unit generates get access in described meta data file; Also be used for preserving the described K_rec that described random number encryption unit generates; Also be used for depositing described the first check results that described verification unit generates in described meta data file.
8. set-top box as claimed in claim 7 is characterized in that, the method that described random number is encrypted in described random number encryption unit comprises that the random number encryption secret key K_pvr that the chip information according to described set-top box produces is encrypted described random number.
9. set-top box as claimed in claim 7 is characterized in that, described verification unit comprises:
CHIP ID acquiring unit is used for obtaining current set-top-box chip number CHIP ID;
CHIP ID ciphering unit is used for described CHIP ID is encrypted generation verification secret key K_Kub;
CHIP ID verification unit, the described meta data file of described K_Kub verification that is used for utilizing described CHIP ID ciphering unit to generate carries out, and generates the first check results;
Described storage unit, described the first check results that also generates for the CHIP ID verification unit with described verification unit deposits described meta data file in.
10. set-top box as claimed in claim 7 is characterized in that, also comprises:
Extraction unit during the described video file of playback, is used for extracting the meta data file of described video file;
Described verification unit also is used for obtaining be used to the set-top-box chip number CHIPID that plays described video file, utilizes the described meta data file of described CHIP ID verification, generates the second check results;
Broadcast unit when the original checksums that is used for described the second check results and described meta data file comes to the same thing, is play described video file, and the described CA card number that comprises in described CHIP ID and the described metadata is presented on the display interface.
11. set-top box as claimed in claim 10 is characterized in that, described broadcast unit comprises:
Comparing unit is used for comparing the first check results of described the second check results and described meta data file, and when comparison result is identical, generates the comparison success message and be sent to decryption unit;
Decryption unit, the described K_rec that is used for utilizing described storage unit to preserve deciphers described video file;
Embed and playback unit, be used for obtaining the described CA card number that described CHIP ID and described metadata comprise, and be embedded into the video playback interface.
12. set-top box as claimed in claim 10 is characterized in that, if described the second check results is not identical with original checksums result in the described metadata, then described broadcast unit is not play described video file.
13. set-top box as claimed in claim 11 is characterized in that,
The comparing unit of described broadcast unit also is used for comparing described the second check results not identical with the original checksums result of described meta data file, generates comparison failed message and playing program out of service.
CN 201310021301 2013-01-21 2013-01-21 Method and device for protecting program source Pending CN103079105A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 201310021301 CN103079105A (en) 2013-01-21 2013-01-21 Method and device for protecting program source

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 201310021301 CN103079105A (en) 2013-01-21 2013-01-21 Method and device for protecting program source

Publications (1)

Publication Number Publication Date
CN103079105A true CN103079105A (en) 2013-05-01

Family

ID=48155493

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 201310021301 Pending CN103079105A (en) 2013-01-21 2013-01-21 Method and device for protecting program source

Country Status (1)

Country Link
CN (1) CN103079105A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104796733A (en) * 2014-01-20 2015-07-22 北京数码视讯科技股份有限公司 Method, device and system for processing video data
CN104902324A (en) * 2015-06-26 2015-09-09 深圳市九洲电器有限公司 Method and system for protecting personal video recording file
CN105516763A (en) * 2015-12-09 2016-04-20 深圳市纽格力科技有限公司 Encryption and decryption method of certificate authorization card identifying information, device and digital program system
CN105631428A (en) * 2015-12-29 2016-06-01 国家新闻出版广电总局监管中心 Comparison and identification method and apparatus for videos
CN112291613A (en) * 2019-07-25 2021-01-29 深圳佳力拓科技有限公司 Method and system for realizing simultaneous decoding and transcoding output of TS (transport stream)
CN112822144A (en) * 2019-11-15 2021-05-18 西安诺瓦星云科技股份有限公司 Program tamper-proof verification method and device

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104796733A (en) * 2014-01-20 2015-07-22 北京数码视讯科技股份有限公司 Method, device and system for processing video data
CN104902324A (en) * 2015-06-26 2015-09-09 深圳市九洲电器有限公司 Method and system for protecting personal video recording file
CN105516763A (en) * 2015-12-09 2016-04-20 深圳市纽格力科技有限公司 Encryption and decryption method of certificate authorization card identifying information, device and digital program system
CN105516763B (en) * 2015-12-09 2019-05-31 深圳市纽格力科技有限公司 Encipher-decipher method, device and the digital program system of certificate granting card identification information
CN105631428A (en) * 2015-12-29 2016-06-01 国家新闻出版广电总局监管中心 Comparison and identification method and apparatus for videos
CN105631428B (en) * 2015-12-29 2019-12-10 国家新闻出版广电总局监管中心 Video comparison identification method and device
CN112291613A (en) * 2019-07-25 2021-01-29 深圳佳力拓科技有限公司 Method and system for realizing simultaneous decoding and transcoding output of TS (transport stream)
CN112822144A (en) * 2019-11-15 2021-05-18 西安诺瓦星云科技股份有限公司 Program tamper-proof verification method and device
CN112822144B (en) * 2019-11-15 2022-10-21 西安诺瓦星云科技股份有限公司 Program tamper-proof verification method and device

Similar Documents

Publication Publication Date Title
US9490982B2 (en) Method and storage device for protecting content
CN1327358C (en) System and method for protecting a title key for recordable media content
CN103635911B (en) For the protection of the memory device of content and main process equipment and method thereof
JP6096186B2 (en) Method and apparatus for using nonvolatile memory device
JP5154830B2 (en) Content distribution system
US8635453B2 (en) Controller to be incorporated in storage medium device, storage medium device, system for manufacturing storage medium device, and method for manufacturing storage medium device
US20070276756A1 (en) Recording/Reproducing Device, Recording Medium Processing Device, Reproducing Device, Recording Medium, Contents Recording/Reproducing System, And Contents Recording/Reproducing Method
WO2018064955A1 (en) Method and system for recording and playing back program
CN103079105A (en) Method and device for protecting program source
EP2979392B1 (en) A challenge-response method and associated client device
JP2004193843A (en) Device, method, and program for content delivery and device, method, and program for reproducing content
JP2010267240A (en) Recording device
US20090154703A1 (en) Content Protection Using Encryption Keys Where only part of the private key is associated with end user data
US9652624B2 (en) Method, host, storage, and machine-readable storage medium for protecting content
CN105828186A (en) Set top box recorded program secondary encryption method
US20100313034A1 (en) Information processing apparatus, data recording system, information processing method, and program
EP2487619A2 (en) Information processing apparatus, information processing method and program
US20120290834A1 (en) Key distribution device, terminal device, and content distribution system
KR101305740B1 (en) Authentication method and apparatus for non volatile storage device
JP2012133426A5 (en)
KR100695665B1 (en) Apparatus and method for accessing material using an entity locked secure registry
JP5110942B2 (en) Information protection system
KR101492669B1 (en) Method for recording and restoring a ciphered content by a processing unit
JP2006506762A (en) Secure local copy protection
US20090307503A1 (en) Digital content management systems and methods

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20130501