CN103577724B - A kind of copy-right protection method and device based on IPTV third-party applications - Google Patents
A kind of copy-right protection method and device based on IPTV third-party applications Download PDFInfo
- Publication number
- CN103577724B CN103577724B CN201210284881.5A CN201210284881A CN103577724B CN 103577724 B CN103577724 B CN 103577724B CN 201210284881 A CN201210284881 A CN 201210284881A CN 103577724 B CN103577724 B CN 103577724B
- Authority
- CN
- China
- Prior art keywords
- authorization code
- party application
- top box
- set top
- authentication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 30
- 238000013475 authorization Methods 0.000 claims abstract description 139
- 238000012795 verification Methods 0.000 claims description 29
- 230000005540 biological transmission Effects 0.000 claims 1
- 238000011161 development Methods 0.000 description 3
- 230000018109 developmental process Effects 0.000 description 3
- 238000010586 diagram Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 238000004891 communication Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012360 testing method Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 235000013399 edible fruits Nutrition 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 238000004321 preservation Methods 0.000 description 1
- 230000001737 promoting effect Effects 0.000 description 1
- 230000008929 regeneration Effects 0.000 description 1
- 238000011069 regeneration method Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/105—Arrangements for software license management or administration, e.g. for managing licenses at corporate level
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/12—Payment architectures specially adapted for electronic shopping systems
- G06Q20/123—Shopping for digital content
- G06Q20/1235—Shopping for digital content with control of digital rights management [DRM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/25—Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
- H04N21/254—Management at additional data server, e.g. shopping server, rights management server
- H04N21/2541—Rights Management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/60—Network structure or processes for video distribution between server and client or between remote clients; Control signalling between clients, server and network components; Transmission of management data between server and client, e.g. sending from server to client commands for recording incoming content stream; Communication details between server and client
- H04N21/63—Control signaling related to video distribution between client, server and network components; Network processes for video distribution between server and clients or between remote clients, e.g. transmitting basic layer and enhancement layers over different transmission paths, setting up a peer-to-peer communication via Internet between remote STB's; Communication protocols; Addressing
- H04N21/633—Control signals issued by server directed to the network components or client
- H04N21/6332—Control signals issued by server directed to the network components or client directed to client
- H04N21/6334—Control signals issued by server directed to the network components or client directed to client for authorisation, e.g. by transmitting a key
- H04N21/63345—Control signals issued by server directed to the network components or client directed to client for authorisation, e.g. by transmitting a key by transmitting keys
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Multimedia (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Accounting & Taxation (AREA)
- Software Systems (AREA)
- Signal Processing (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Computer Networks & Wireless Communication (AREA)
- Databases & Information Systems (AREA)
- Finance (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
Abstract
The invention discloses a kind of copy-right protection method and device based on IPTV third-party applications, its method includes:According to the rights check message on third-party application from set top box, the authorization code of the third-party application is inquired about;If inquiring the authorization code, the authorization code is sent to set top box so that its authorization code carries out the rights check of third-party application, conversely, then carrying out the authentication of the third-party application;If authenticating the authorization code for successfully, generating the third-party application, and the authorization code generated is sent to set top box, so that it uses the rights check of authorization code progress third-party application.The present invention can prevent the pirate situation using application of user to occur, and protect using the interests for providing manufacturer and operator.
Description
Technical field
The present invention relates to communication technique field, specifically, is related to the copy-right protection method based on IPTV third-party applications
And device.
Background technology
IPTV is IPTV, is that one kind utilizes broadband cable net, collection internet, multimedia, communication etc.
Multiple technologies are in one, to the brand-new technology of a variety of interactive services of domestic consumer's offer including DTV.
In IPTV, it is possible to provide multiple value increasing service, the important value-added service of one of which:IPTV third-party applications, including play, be various
Application software etc..
IPTV set top box at present, with flush type LINUX system and based on more open ANDROID systems, in IPTV
Tripartite is applied, and exists in a variety of forms, and JAVA such as based on browser JVM is applied and NATIVE is locally applied, at present these
Using these concepts of not copyright, this situation causes:
1) third-party application can with being intended to run in IPTV system, cause iptv operators can not effectively management and control these should
With finally promoting the pipe running tool of its business as third-party application development of company.
2) some applications need to pay and used, but do not have copyright protection, and user can arbitrarily propagate, and cause application and development factory
The benefit damage of business.
The content of the invention
It is an object of the invention to provide one kind based on IPTV third-party applications in copy-right protection method, so that operator can
With business development of the effective management and control in third-party application in IPTV system, the legal of application developer or integrator is protected
Interests.
It is a further object of the present invention to provide a kind of device for implementing the above method.
According to a first aspect of the present invention, a kind of copy-right protection method based on IPTV third-party applications of the invention includes:
According to the rights check message on third-party application from set top box, the mandate of the third-party application is inquired about
Code;
If inquiring the authorization code, the authorization code is sent to set top box so that its authorization code carries out third-party application
Rights check, conversely, then carrying out the authentication of the third-party application;
If authenticating the authorization code for successfully, generating the third-party application, and the authorization code generated is sent to machine top
Box, so that it uses the rights check of authorization code progress third-party application.
Preferably, rights check message package ID containing third-party application, authorization object and public key.
Preferably, the described authentication that carries out includes:Order relations to the third-party application and whether in set top box
Prepackage is authenticated, if order relations be present or pre-install on the set-top box, it is determined that authenticate successfully.
Preferably, generating the authorization code of the third-party application includes:Using public key in the rights check message to this
Third-party application ID and authorization object are encrypted in message, generate authorization code.
Preferably, the rights check message is that set top box generates according to the result locally verified, if local verification is lost
Lose, then firstly generate the private key for belonging to a pair of secret keys and the public key and preserve the private key, then recycle third-party application
ID, authorization object and public key generate the rights check message.
Preferably, described set top box is included using the rights check of authorization code progress third-party application:Using being preserved
Private key authorization code is decrypted, parse using ID and authorization object;ID and mandate are applied by what is parsed from authorization code
Object is compared with the ID and authorization object of third-party application, and comparison is identical then to be examined successfully, on the contrary then verification failure.
Preferably, the local verification that set top box is carried out includes:Check whether set top box locally has authorization code;Awarded if checking
Weighted code, then third-party application is verified using the authorization code;If not checking authorization code, the copyright is generated and sent
Verification message.
Preferably, third-party application ID and authorization object add during public key is to the message in using rights check message
It is dense to be preserved the authorization code and public key into after authorization code, so that the inquiry uses.According to a second aspect of the present invention,
A kind of apparatus for protecting copyright based on IPTV third-party applications of the present invention includes:
Copyright authentication and module is issued, for according to the rights check message on third-party application from set top box,
Carry out inquiry, authentication, the operation for generating and issuing of third-party application authorization code;
Key management module, for preserving the authorization code and public key, so that the key management module therefrom inquires about institute
State authorization code;
Authentication module, for according to copyright authentication and issuing the authentication request of module, third-party application is authenticated;
Wherein, when copyright authentication and when issuing module polls to authorization code, the authorization code is handed down to set top box, conversely,
Then initiate the authentication request of the third-party application;
Wherein, after authenticating successfully, authentication module notifies copyright authentication and issues the module generation third-party application
Authorization code, and authorization code generated is handed down to set top box by it.
Preferably, copyright authentication and module is issued by using public key in the rights check message to the in the message the 3rd
Fang Yingyong ID and authorization object are encrypted, and generate the authorization code.
Relative to prior art, the copyright protection of the present invention based on IPTV third-party applications has and mainly had as follows
Beneficial effect:
1st, operator can carry out effective management and control to operating in the third-party application in IPTV system, avoid turning into one kind
Pipe running tool.
2nd, copyright protection prevents the pirate situation using application of user, protects using the profit for providing manufacturer and operator
Benefit.
The copy-right protection method based on IPTV third-party applications to the present invention and device are carried out detailed below in conjunction with the accompanying drawings
Explanation.
Brief description of the drawings
Fig. 1 is the schematic diagram of the apparatus for protecting copyright based on IPTV third-party applications of the embodiment of the present invention;
Fig. 2 is the schematic diagram of the copy-right protection method based on IPTV third-party applications of the embodiment of the present invention;
Fig. 3 is the schematic diagram of the specific embodiment of the apparatus for protecting copyright based on IPTV third-party applications of the present invention;
Fig. 4 is the signal of a specific embodiment of the copy-right protection method based on IPTV third-party applications of the present invention
Figure.
Embodiment
Fig. 1 shows a kind of apparatus for protecting copyright based on IPTV third-party applications of the embodiment of the present invention, such as Fig. 1 institutes
Show, the device includes:
Copyright authentication and module is issued, for according to the rights check message on third-party application from set top box,
Carry out inquiry, authentication, the operation for generating and issuing of third-party application authorization code;
Key management module, for preserving the authorization code and public key, so that the key management module therefrom inquires about institute
State authorization code;
Authentication module, for according to copyright authentication and issuing the authentication request of module, third-party application is authenticated;
Wherein, when copyright authentication and when issuing module polls to authorization code, the authorization code is handed down to set top box, conversely,
Then initiate the authentication request of the third-party application;
Wherein, after authenticating successfully, authentication module notifies copyright authentication and issues the module generation third-party application
Authorization code, and authorization code generated is handed down to set top box by it.
The apparatus for protecting copyright of the embodiment of the present invention can set server end.
Rights check message package ID containing third-party application, authorization object and public key.Copyright authentication and issue module caching should
Rights check message, and public key in the rights check message can be utilized to enter third-party application ID in the message and authorization object
Row encryption, to generate the authorization code.
Fig. 2 shows a kind of copy-right protection method based on IPTV third-party applications of the embodiment of the present invention, such as Fig. 2 institutes
Show, comprise the following steps:
Copyright authentication and module is issued according to the rights check message on third-party application from set top box, in key
The authorization code of the third-party application is inquired about in management module;
If inquiring the authorization code in key management module, the authorization code is sent to set top box so that it is authorized
Code carries out the rights check of third-party application, conversely, then initiating the authentication request of the third-party application to authentication module;
Authentication module is authenticated according to the authentication request and notifies copyright authentication after authenticating successfully and issue module
Generate the authorization code of the third-party application;
Copyright authentication and issue module the authorization code generated is sent to set top box, so that it is carried out using the authorization code
The rights check of third-party application.
The authentication that authentication module is carried out includes:The order relations of the third-party application are authenticated, however, it is determined that institute
State third-party application to be ordered or pre-installed in set top box by the user of the set top box, then authenticate successfully.
Generally, set top box can generate rights check message after carrying out local verification failure, firstly generate and belong to a pair of secret keys
Public key and private key and preserve the private key, then regeneration includes the rights check of public key, third-party application ID and authorization object
Message.
In local checking procedure, set top box carries out the rights check of third-party application, its checking procedure using authorization code
Including:Use preserved private key that authorization code is decrypted, parse using ID and authorization object;It will be parsed from authorization code
Application ID and authorization object be compared with third-party application ID and authorization object, comparison it is identical then examines successfully, it is on the contrary then
Verification failure.The local verification that set top box is carried out includes:Check whether set top box locally has authorization code;If check mandate
Code, then above-mentioned verification is carried out to third-party application using the authorization code;If not checking authorization code, generation is used for being sent to version
Power certification and the rights check message for issuing module.
In addition, copyright authentication and issuing module after the authorization code of generation, the authorization code and public key are also sent into key pipe
Reason module is preserved.
Fig. 3 shows the apparatus for protecting copyright based on IPTV third-party applications of the present invention or a specific implementation of system
The structure of example;Fig. 4 shows a specific embodiment of the copy-right protection method based on IPTV third-party applications of the present invention.
With reference to Fig. 3 and Fig. 4 specific embodiment, said apparatus and method to the embodiment of the present invention are carried out specifically
It is bright.
As shown in figure 3, a specific embodiment of the copyright protecting system based on IPTV third-party applications is by following several
Part forms:
1. the copyright card module called to third-party application
2. it is located at the copyright authentication of service end and issues module
3. positioned at the key management module of service end
4. positioned at the authentication module of service end
Third-party application is LOADER (loading) program built in set top box directly from EPG in the set top box method of operation at present
Door is downloaded and runs third-party application, or LOADER programs are directly run from locally stored third-party application.Make
With copyright protection, then LOADER programs are needed before third-party application is run, call the copyright plug-in unit of the embodiment of the present invention first
Module is verified.
The copyright protecting system functions based on IPTV third-party applications of the specific embodiment of the invention are as described below:
(1) copyright card module:
Local verification
When LOADER starts application, rights check is carried out first, and LOADER calls the rights check interface (R1 of copyright plug-in unit
Interface), whether plug-in unit inspection locally has authorization code, if verifying failure without if, carries out service end verification.If authorizing
Code, then be decrypted using private key, parsed using ID and authorization object (user's pseudo-code or machine ID), plug-in unit passes through copyright school
Test interface acquisition and apply ID and authorization object, the two groups of data (i.e. two groups using ID and authorization object) being achieved in that are compared
Right, comparison is identical then to be verified successfully, and returns to successful result to LOADER.Compare different then verification failures, it will call clothes
The verification of business end.
Here private key be stored with authorization code it is local, it is local when application starts first time rights check
There is no private key and authorization code, be to verify to produce this authorization code by service end, concrete function verifies referring to following service end.
Service end verifies
After locally verification failure, plug-in unit can carry out service end verification, and plug-in unit obtains from rights check interface (R1 interfaces)
Using ID and authorization object, plug-in unit uses asymmetric key algorithm (RSA), generation a pair of secret keys (publickey,
Privatekey), plug-in unit by rights check and issue interface R2 to copyright authentication and issue module initiate rights check message,
This message interface R2 will apply ID, authorization object, and publickey to pass to copyright authentication and issue module, copyright authentication and
Issue module and carry out real rights check, when verifying successfully, copyright plug-in unit successful result and authorization code can be returned to.Work as school
Failure result can be returned when testing unsuccessfully also can return result to LOADER to plug-in unit, plug-in unit by R1 interfaces.
Authorization code management
When service end verifies successfully, plug-in unit does local preservation for the authorization code of return, while preserves private key, with after an action of the bowels
It is continuous to do local verification.
(2) copyright authentication and module is issued:
Rights check
Copyright server receives the verification message (containing using ID, authorization object, publickey etc.) from plug-in unit, arrives first
Key management module carries out key and authorization code inquiry, is verified if finding successfully, directly issues authorization code to plug-in unit.If
Do not find, then initiate authentication request to authentication module, generate authorization code after authenticating successfully, be handed down to plug-in unit.If authentication is lost
Lose, then rights check fails, will be to copyright plug-in unit back-checking failure.
Authorization code generates
After authentication module returns to authentication successful message, copyright server uses publickey to application ID, authorization object
It is encrypted, generates authorization code.And key and authorization code are sent out to key management module, to preserve.
Log recording
Copyright server carries out log recording to verification request and result.
(3) key management module:
Key and authorization code preserve
When copyright server generates authorization code, it is necessary to which key and authorization code are preserved.
Key and authorization code inquiry
Key management module provides query interface, and when rights check, whether have key and authorization code, such as if can first inquire about
Fruit has, then can directly return to authorization code, it is not necessary to goes to authenticate to authentication module again.
(4) authentication module:
User's order relations authenticate
Charging authentication module of the authentication module to IPTV value added service management platforms initiates order relations authentication request, and right
Authenticating result returns to copyright authentication and issues module.
Machine ID authenticates
Authentication module calls pre-installed applications database, inquires about whether this set top box has pre-installed this application.If pre-installing, then
Authenticate successfully, otherwise fail.
The copy-right protection method of the invention based on IPTV third-party applications realized on Fig. 3 shown devices can include
Following steps:
1st, built-in copyright card module in set top box, this module opening rights check interface, set top box start the 3rd
Fang Yingyong LOADER programs first call the rights check interface of copyright plug-in unit before application is started.
2nd, copyright plug-in unit first carries out local verification, see it is local whether have an authorization code, and by private key decryption and authorization code, then
Checking copyright is compared with third-party application information.
If the 3, local verification passes through, third-party application can be run, if verification is by the way that plug-in unit will be serviced
End verification, now card module will be communicated with the service end of copyright management (copyright authentication and issue module).
4th, Copyright management service end receives the rights check message from plug-in unit, can arrive first key management module and carry out key
And authorization code inquiry, verified if finding successfully, directly issue authorization code to plug-in unit.If do not found, to authentication mould
Block initiates authentication request.
5th, authentication module is reflected according to authentication rules set in advance (such as user's order relations authentication, machine ID authenticate)
Power.
6th, authentication module will be communicated with IPTV value added service management platforms, call the charging of Business Management Platform to reflect
Weigh module and authenticating result is provided.
7th, success or not is authenticated, result is all issued copyright authentication and issues module by authentication module, if it is successful, copyright is tested
Demonstrate,prove and issue module generation authorization code and issue copyright plug-in unit (while notifying key management module), if it fails, then returning to checking
The result of failure gives copyright plug-in unit.
8th, the rights check interface (R1 interfaces) of copyright plug-in unit, can also return to LOADER program ver-ify results.
9th, LOADER programs decide whether to run third party's program according to check results.
Fig. 4 shows a specific embodiment of the inventive method, and method comprises the following steps shown in Fig. 4:
1st, user opens IPTV set top box, selects GameChannel, and starts to select a game (third-party application) to be swum
Play
2nd, set top box is arrived in the such game of set top box LOADER download programs, and rights check is carried out before running
3rd, copyright card module first carries out local verification, and the authorization code without this game is locally found during verification.
4th, copyright plug-in unit carries out service end verification, and rights check message is initiated to copyright server.
5th, copyright server first inquires about authorization code in key management unit, does not find, and turns to authentication module and is authenticated.
6th, authentication module initiates user's order relations authentication to IPTV value added service management platforms, and authenticating result user orders
This game.
7th, after authentication module receives result, copyright server, copyright server generation authorization code are notified, and be handed down to and be located at
The copyright plug-in unit of set top box.
8th, copyright plug-in unit locally preserves authorization code, and reports to LOADER copyright of programs and verify successfully.
9th .LOADER programs run this game.
From above-mentioned steps as can be seen that for IPTV user, all game run on the set-top box, application,
It is required for carrying out rights check, is so effectively controlled piracy.
Although the present invention is described in detail above, the invention is not restricted to this, those skilled in the art of the present technique
Various modifications can be carried out according to the principle of the present invention.Therefore, all modifications made according to the principle of the invention, all should be understood to
Fall into protection scope of the present invention.
Claims (10)
1. a kind of copy-right protection method based on IPTV third-party applications, comprises the following steps:
Copyright server inquires about the third-party application according to the rights check message on third-party application from set top box
Include by encryption third-party application ID and authorization object authorization code;
If inquiring the authorization code, the authorization code is sent to set top box by copyright server, so that set top box uses mandate
Code carries out the rights check of third-party application;
If not inquiring the authorization code, copyright server carries out the authentication of the third-party application;
If the authentication success of third-party application, copyright server generates the authorization code of the third-party application, and will be generated
Authorization code be sent to set top box, for set top box using authorization code carry out third-party application rights check;
Wherein, set top box is not when progress rights check finds the authorization code of third-party application, to described in copyright server transmission
Rights check message.
2. according to the method for claim 1, it is characterised in that rights check message package ID containing third-party application, award
Weigh object and public key.
3. according to the method for claim 2, it is characterised in that the described authentication that carries out includes:To the third-party application
Order relations and whether being pre-installed in set top box authenticated, if order relations be present or third-party application has been pre-installed,
Then determine to authenticate successfully.
4. according to the method for claim 3, it is characterised in that generating the authorization code of the third-party application includes:Utilize
Third-party application ID in the message and authorization object are encrypted public key in the rights check message, generate authorization code.
5. according to the method for claim 4, it is characterised in that the rights check message is set top box according to local verification
Result generation, if local verification failure, firstly generate the private key for belonging to a pair of secret keys and the public key and described in preserving
Private key, then third-party application ID, authorization object and public key is recycled to generate the rights check message.
6. according to the method for claim 5, it is characterised in that described set top box carries out third-party application using authorization code
Rights check include:
Use preserved private key that authorization code is decrypted, parse using ID and authorization object;
It is compared, compares with the ID and authorization object of third-party application using ID and authorization object by what is parsed from authorization code
It is identical then to examine successfully, on the contrary then verification failure.
7. according to the method for claim 5, it is characterised in that the local verification that set top box is carried out includes:
Check whether set top box locally has authorization code;
If checking authorization code, third-party application is verified using the authorization code;
If not checking authorization code, the rights check message is generated and sent.
8. according to the method for claim 4, it is characterised in that using public key in rights check message in the message the
After generation authorization code is encrypted using ID and authorization object in tripartite, the authorization code and public key are preserved, looked into for described
Ask and use.
9. a kind of apparatus for protecting copyright based on IPTV third-party applications, including:
Copyright authentication and module is issued, for according to the rights check message on third-party application from set top box, carrying out
Inquiry, authentication, the operation for generating and issuing of third-party application authorization code;
Key management module, for preserving the authorization code and public key, so that the key management module therefrom inquires about described award
Weighted code;
Authentication module, for according to copyright authentication and issuing the authentication request of module, third-party application is authenticated;
Wherein, when copyright authentication and module is issued according to the rights check message on third-party application from set top box, look into
When asking the authorization code comprising the third-party application ID by encryption and authorization object, the authorization code is handed down to set top box, with
The rights check of third-party application is carried out using the authorization code for set top box;When copyright authentication and issue module and do not inquire mandate
During code, then the authentication request of the third-party application is initiated;
Wherein, after the authentication success of third-party application, authentication module notifies copyright authentication and issues module generation the described 3rd
Fang Yingyong authorization code, and authorization code generated is handed down to set top box by it, so that set top box carries out the using authorization code
The rights check of tripartite's application;
Wherein, set top box to copyright authentication and issues module when progress rights check does not find the authorization code of third-party application
Send the rights check message.
10. device according to claim 9, it is characterised in that copyright authentication and issue module by using the copyright
Third-party application ID in the message and authorization object are encrypted public key in verification message, generate the authorization code.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210284881.5A CN103577724B (en) | 2012-08-10 | 2012-08-10 | A kind of copy-right protection method and device based on IPTV third-party applications |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210284881.5A CN103577724B (en) | 2012-08-10 | 2012-08-10 | A kind of copy-right protection method and device based on IPTV third-party applications |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103577724A CN103577724A (en) | 2014-02-12 |
CN103577724B true CN103577724B (en) | 2017-11-10 |
Family
ID=50049488
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210284881.5A Active CN103577724B (en) | 2012-08-10 | 2012-08-10 | A kind of copy-right protection method and device based on IPTV third-party applications |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103577724B (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107743115B (en) * | 2016-12-22 | 2021-02-02 | 腾讯科技(深圳)有限公司 | Identity authentication method, device and system for terminal application |
CN108281008A (en) * | 2018-04-04 | 2018-07-13 | 武汉市技领科技有限公司 | A kind of detection device and monitoring device |
CN108650530B (en) * | 2018-06-26 | 2020-08-07 | 深圳市九洲电器有限公司 | Set top box application authorization use method and system |
CN111414588B (en) * | 2019-01-08 | 2023-03-31 | 杭州海康威视数字技术股份有限公司 | Authorization key generation method, authorization key generation device and authorization server |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101202883A (en) * | 2006-12-15 | 2008-06-18 | 中兴通讯股份有限公司 | System for numeral copyright management of IPTV system |
CN102194077A (en) * | 2011-03-10 | 2011-09-21 | 中兴通讯股份有限公司 | Application program copyright protection method and digital copyright protection system |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8321950B2 (en) * | 2009-03-20 | 2012-11-27 | Cisco Technology, Inc. | Delivering secure IPTV services to PC platforms |
-
2012
- 2012-08-10 CN CN201210284881.5A patent/CN103577724B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101202883A (en) * | 2006-12-15 | 2008-06-18 | 中兴通讯股份有限公司 | System for numeral copyright management of IPTV system |
CN102194077A (en) * | 2011-03-10 | 2011-09-21 | 中兴通讯股份有限公司 | Application program copyright protection method and digital copyright protection system |
Also Published As
Publication number | Publication date |
---|---|
CN103577724A (en) | 2014-02-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8296561B2 (en) | Certifying device, verifying device, verifying system, computer program and integrated circuit | |
US6256393B1 (en) | Authorization and access control of software object residing in set-top terminals | |
KR100711722B1 (en) | Software authentication apparatus for mobile communication terminal and the method thereof | |
CN102981881B (en) | A kind of method and system for preventing updating mobile terminal to illegal firmware version | |
JP4818664B2 (en) | Device information transmission method, device information transmission device, device information transmission program | |
CN107145769B (en) | Digital Rights Management (DRM) method, equipment and system | |
CN113722683B (en) | Model protection method, device, equipment, system and storage medium | |
FR2854303A1 (en) | METHOD FOR SECURING A MOBILE TERMINAL AND METHOD APPLICATIONS, THE EXECUTION OF APPLICATIONS REQUIRING A HIGH SECURITY LEVEL | |
CN103577724B (en) | A kind of copy-right protection method and device based on IPTV third-party applications | |
CN113282946B (en) | Information security method and system based on data access process in high-reliability environment | |
US20130232337A1 (en) | User terminal and method for playing digital rights management content | |
JP5278495B2 (en) | Device information transmission method, device information transmission device, device information transmission program | |
US20050246285A1 (en) | Software licensing using mobile agents | |
CN106096336B (en) | Software anti-crack method and system | |
CN112231674A (en) | Skip verification method and system for URL (Uniform resource locator) address and electronic equipment | |
CN104994503B (en) | A kind of mobile application access method | |
CN104077502A (en) | Software protection method in software encryption way | |
KR20150072007A (en) | Method for accessing temper-proof device and apparatus enabling of the method | |
CN101571899B (en) | Smart device software anti-theft version method and device | |
CN112380503B (en) | Method for protecting core program and memory | |
CN114036527B (en) | Code injection method, code running end, code injection end and related equipment | |
CN109167785A (en) | A kind of call method and service server of virtual credible root | |
CN112968889B (en) | Host right management method, terminal, device and computer readable storage medium | |
EP1221077B1 (en) | Detection of suspect software objects and signatures after failed authentication | |
CN116170140A (en) | User key protection method, device, storage medium and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |