CN103607645A - Set top box pirate preventing method and set top box - Google Patents
Set top box pirate preventing method and set top box Download PDFInfo
- Publication number
- CN103607645A CN103607645A CN201310601597.0A CN201310601597A CN103607645A CN 103607645 A CN103607645 A CN 103607645A CN 201310601597 A CN201310601597 A CN 201310601597A CN 103607645 A CN103607645 A CN 103607645A
- Authority
- CN
- China
- Prior art keywords
- top box
- set top
- random number
- signed data
- algorithm
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Abstract
The invention belongs to the technical field of information, and particularly relates to a set top box pirate preventing method and a set top box. The set top box pirate preventing method comprises the steps that a secret key of the set top box is generated; a random number is signed to the secrete key through the preset signature algorithm to obtain signature data; the random number and the signature data are stored at the designated position of the set top box; when the set top box is started, the random number and the signature data are read from the designated position of the set top box, and hardware identification codes of the set top box are read; the hardware identification codes are read through the first algorithm, the random number is signed to the secret key obtained through calculation through the preset signature algorithm, and whether the obtained result is the same as the read signature data or not is judged; the set top box is started after the obtained result is judged to be the same as the read signature data. The decoding difficulty of the set top box is increased, and the pirate preventing performance of the set top box is improved.
Description
Technical field
The invention belongs to areas of information technology, relate in particular to a kind of Set Top Box method for preventing piracy and Set Top Box.
Background technology
Existing set-top box technique does not have anti-piracy protection measure substantially; as long as bootlegger obtains a Set Top Box of regular manufacturer production; copy the circuit board of this Set Top Box; read the program in flash memory; buy again the required components and parts of production Set Top Box; just can unrestrictedly produce this type of Set Top Box, try to gain economic interests, bring great economic loss to regular Set Top Box manufacturer simultaneously.
In sum, existing Set Top Box anti-piracy technique anti-theft is poor.
Summary of the invention
The object of the embodiment of the present invention is to provide a kind of Set Top Box method for preventing piracy, is intended to solve the poor problem of existing Set Top Box method for preventing piracy anti-theft.
The embodiment of the present invention is achieved in that a kind of Set Top Box method for preventing piracy, comprising:
Generate the key of described Set Top Box, the hardware identifier code that described key calculates described Set Top Box by the first algorithm generates, and described hardware identifier code is for the specify hardware of Set Top Box described in unique identification;
Described key, by default signature algorithm signature random number, is obtained to signed data;
Described random number and described signed data are deposited in to the assigned address of described Set Top Box;
When described set-top-box opening, from the described assigned address of described Set Top Box, read described random number and described signed data, and read the described hardware identifier code of described Set Top Box;
By described the first algorithm, calculate the hardware identifier code read out, by the key calculating, by the described default signature algorithm described random number of signing, whether the result that judgement obtains is identical with the signed data reading out;
After the result obtaining described in judging is identical with the signed data reading out, restart described Set Top Box.
Another object of the embodiment of the present invention is to provide a kind of Set Top Box, comprising:
Key production module, for generating the key of described Set Top Box, the hardware identifier code that described key calculates described Set Top Box by the first algorithm generates, and described hardware identifier code is for the specify hardware of Set Top Box described in unique identification;
Signature blocks, for described key being passed through to default signature algorithm signature random number, obtains signed data;
Data memory module, for depositing described random number and described signed data in the assigned address of described Set Top Box;
Data read module, for when the described set-top-box opening, reads described random number and described signed data from the described assigned address of described Set Top Box, and reads the described hardware identifier code of described Set Top Box;
Antitheft judge module, for calculating by described the first algorithm the hardware identifier code read out, by the key calculating, by the described default signature algorithm described random number of signing, whether the result that judgement obtains is identical with the signed data reading out;
Set Top Box starts module, identical with the signed data reading out for the result obtaining described in judging after, restart described Set Top Box.
The embodiment of the present invention is by the production process of Set Top Box, generate key, key is obtained to signed data by default signature algorithm signature random number, by random number and signed data storage, then in the start process of Set Top Box, read random number and signed data, can judgement obtain identical signed data by default signature algorithm, if obtain identical signed data, restart Set Top Box, thereby increased the difficulty that cracks of Set Top Box, improved thus the anti-theft of Set Top Box.
Accompanying drawing explanation
Fig. 1 is the realization flow figure of the Set Top Box method for preventing piracy that provides of the embodiment of the present invention;
The specific implementation flow chart of the key of described Set Top Box is provided in the Set Top Box method for preventing piracy step S101 that provides of the embodiment of the present invention Fig. 2;
Fig. 3 is the specific implementation flow chart of the Set Top Box method for preventing piracy step S103 that provides of the embodiment of the present invention;
Fig. 4 is the structured flowchart of the Set Top Box that provides of the embodiment of the present invention.
Embodiment
In order to make object of the present invention, technical scheme and advantage clearer, below in conjunction with drawings and Examples, the present invention is further elaborated.Should be appreciated that specific embodiment described herein, only in order to explain the present invention, is not intended to limit the present invention.
The embodiment of the present invention is by the production process of Set Top Box, generate key, key is obtained to signed data by default signature algorithm signature random number, by random number and signed data storage, then in the start process of Set Top Box, read random number and signed data, can judgement obtain identical signed data by default signature algorithm, if obtain identical signed data, restart Set Top Box, thereby increased the difficulty that cracks of Set Top Box, improved thus the anti-theft of Set Top Box.
Fig. 1 shows the realization flow of the Set Top Box method for preventing piracy that the embodiment of the present invention provides, and details are as follows:
In step S101, generate the key of described Set Top Box, the hardware identifier code that described key calculates described Set Top Box by the first algorithm generates, and described hardware identifier code is for the specify hardware of Set Top Box described in unique identification.
Further, the key that generates described Set Top Box in step S101 is specially:
In step S201, from the described specify hardware of described Set Top Box, read described hardware identifier code.
In embodiments of the present invention, hardware identifier code is the intrinsic identification code of specify hardware, that is to say, the hardware identifier code of specify hardware has uniqueness.
Preferably, described specify hardware comprises following any one: flash memory, central processor CPU or Double Data Rate synchronous DRAM DDR(Double Data Rate).
It should be noted that, specify hardware comprises two kinds of read-only chip and read-write chips.As long as the built-in chip in Set Top Box has unique hardware identifier code and can read this unique hardware identifier code, just can be used as specify hardware here.
In step S202, read the production sequence number of described specify hardware.
Here, the production sequence number of specify hardware is by the former producer of Set Top Box, to be pre-deposited in the assigned address of Set Top Box in the production process of Set Top Box.The production sequence number of specify hardware is unique.For example, the production sequence number of burning in the flash of Set Top Box is for identifying different Set Top Box, that is to say, each Set Top Box by the former manufacturer production of Set Top Box has unique production sequence number.
In step S203, by described the first algorithm, by the key of Set Top Box described in described hardware identifier code and described production sequence number combination producing.
Here, the specific algorithm of the first algorithm is not construed as limiting, the former producer of Set Top Box can carry out algorithm design to this first algorithm as required.Because the hardware identifier code of specify hardware and the production sequence number of specify hardware are all unique, therefore, by the hardware identifier code of specify hardware with produce sequence number to calculate by the first algorithm the key generating be also unique.
In step S102, described key, by default signature algorithm signature random number, is obtained to signed data.
In step S103, described random number and described signed data are deposited in to the assigned address of described Set Top Box.
Further, the assigned address that step S103 deposits described random number and described signed data in described Set Top Box is specially:
In step S301, described random number is cut apart to the subdata that obtains 1 the above random number.
In step S302, described signed data is cut apart to the subdata that obtains 1 the above signed data.
In step S303, the subdata of described random number and the subdata of described signed data are calculated and are generated 1 above data splitting by the second algorithm.
Below the specific implementation of step S103 is given an example:
Example one: random number is data B, signed data is data C, data B is divided into subdata B1 and B2, data C is divided into subdata C1 and C2, B1 and C1 are generated to data splitting Z1 by algorithm, B2 and C2 are generated to data splitting Z2 by the 4th algorithm, data splitting Z1 is deposited in the single-chip microcomputer of set top box front panel, data splitting Z2 is deposited in the flash memory of Set Top Box.Here, the specific algorithm of algorithm and the 4th algorithm is not construed as limiting.
Example two: random number is data B, signed data is data C, data B is divided into subdata B1, B2, B3, B4 and B5, data C is divided into subdata C1, C2, C3 and C4, B1, C2 and B3 are generated to data splitting Z1 by the 5th algorithm, C1, B2 and C3 are generated to data splitting Z2 by the 6th algorithm, B4, C4 and B5 are generated to data splitting Z3 by the 7th algorithm, data splitting Z1 and Z3 are deposited in the single-chip microcomputer of set top box front panel, data splitting Z2 is deposited in the flash memory of Set Top Box.Here, the specific algorithm of the 5th algorithm, the 6th algorithm and the 7th algorithm is not construed as limiting.
In step S304, described 1 above data splitting is deposited in to the assigned address of described Set Top Box.
Further, described assigned address comprises following at least one: flash memory or single-chip microcomputer.
In actual applications, assigned address comprises set top box front panel single-chip microcomputer and flash memory.
As one embodiment of the present of invention, the assigned address of the Set Top Box 1 above data splitting not being deposited in is construed as limiting.
Preferably, 1 above data splitting deposits flash memory and the single-chip microcomputer of Set Top Box in.
Alternatively, 1 above data splitting deposits the flash memory of Set Top Box in.
Alternatively, 1 above data splitting deposits the single-chip microcomputer of Set Top Box in.
In step S104, when described set-top-box opening, from the described assigned address of described Set Top Box, read described random number and described signed data, and read the described hardware identifier code of described Set Top Box.
As one embodiment of the present of invention, from the assigned address of described Set Top Box, read random number and signed data is specially: from the assigned address of Set Top Box, read more than 1 data splitting, by 1 above data splitting, generate the subdata of random number and the subdata of signed data, by the synthetic random number of subdata of random number, by the subdata of signed data, synthesize signed data again.Corresponding with above-mentioned example one: from the single-chip microcomputer of set top box front panel, to read data splitting Z1, from the flash memory of Set Top Box, read data splitting Z2, the algorithm for inversion that data splitting Z1 is passed through to algorithm generates B1 and C1, the algorithm for inversion that data splitting Z2 is passed through to the 4th algorithm generates B2 and C2, by B1 and B2 generated data B, by C1 and C2 generated data C.
In step S105, by described the first algorithm, calculate the hardware identifier code read out, by the key calculating, by the described default signature algorithm described random number of signing, whether the result that judgement obtains is identical with the signed data reading out.
As one embodiment of the present of invention, by described the first algorithm, calculate the hardware identifier code reading out and be specially: the production sequence number of the hardware identifier code reading out and specify hardware is calculated to key by the first algorithm.
In step S106, after the result obtaining described in judging is identical with the signed data reading out, restart described Set Top Box.
If the result obtaining by default signature algorithm signature is different from the signed data reading, this Set Top Box is pirate Set Top Box, does not start.
The embodiment of the present invention is by the production process of Set Top Box, generate key, key is obtained to signed data by default signature algorithm signature random number, by random number and signed data storage, then in the start process of Set Top Box, read random number and signed data, can judgement obtain identical signed data by default signature algorithm, if obtain identical signed data, restart Set Top Box, thereby increased the difficulty that cracks of Set Top Box, improved thus the anti-theft of Set Top Box.
Fig. 4 shows the structured flowchart of the Set Top Box that the embodiment of the present invention provides, and for moving the Set Top Box method for preventing piracy described in Fig. 1 to Fig. 3 embodiment of the present invention, for convenience of explanation, only shows the part relevant to the present embodiment.
With reference to Fig. 4, a kind of Set Top Box, comprising:
Signature blocks 42, by default signature algorithm signature random number, obtains signed data by described key.
Data read module 44, when described set-top-box opening, reads described random number and described signed data from the described assigned address of described Set Top Box, and reads the described hardware identifier code of described Set Top Box.
Set Top Box starts module 46, after the result obtaining described in judging is identical with the signed data reading out, restarts described Set Top Box.
Further, described key production module 41 specifically for:
From the described specify hardware of described Set Top Box, read described hardware identifier code;
Read the production sequence number of described specify hardware;
By described the first algorithm, by the key of Set Top Box described in described hardware identifier code and described production sequence number combination producing.
Further, described data memory module 43 specifically for:
Described random number is cut apart to the subdata that obtains 1 the above random number;
Described signed data is cut apart to the subdata that obtains 1 the above signed data;
The subdata of described random number and the subdata of described signed data are calculated and are generated 1 above data splitting by the second algorithm;
Described 1 above data splitting is deposited in to the assigned address of described Set Top Box.
Further, described assigned address comprises following at least one: flash memory or single-chip microcomputer.
Preferably, described specify hardware comprises following any one: flash memory, central processor CPU or Double Data Rate synchronous DRAM DDR.
The embodiment of the present invention is by the production process of Set Top Box, generate key, key is obtained to signed data by default signature algorithm signature random number, by random number and signed data storage, then in the start process of Set Top Box, read random number and signed data, can judgement obtain identical signed data by default signature algorithm, if obtain identical signed data, restart Set Top Box, thereby increased the difficulty that cracks of Set Top Box, improved thus the anti-theft of Set Top Box.
The foregoing is only preferred embodiment of the present invention, not in order to limit the present invention, all any modifications of doing within the spirit and principles in the present invention, be equal to and replace and improvement etc., within all should being included in protection scope of the present invention.
Claims (10)
1. a Set Top Box method for preventing piracy, is characterized in that, comprising:
Generate the key of described Set Top Box, the hardware identifier code that described key calculates described Set Top Box by the first algorithm generates, and described hardware identifier code is for the specify hardware of Set Top Box described in unique identification;
Described key, by default signature algorithm signature random number, is obtained to signed data;
Described random number and described signed data are deposited in to the assigned address of described Set Top Box;
When described set-top-box opening, from the described assigned address of described Set Top Box, read described random number and described signed data, and read the described hardware identifier code of described Set Top Box;
By described the first algorithm, calculate the hardware identifier code read out, by the key calculating, by the described default signature algorithm described random number of signing, whether the result that judgement obtains is identical with the signed data reading out;
After the result obtaining described in judging is identical with the signed data reading out, restart described Set Top Box.
2. the method for claim 1, is characterized in that, the key of the described Set Top Box of described generation is specially:
From the described specify hardware of described Set Top Box, read described hardware identifier code;
Read the production sequence number of described specify hardware;
By described the first algorithm, by the key of Set Top Box described in described hardware identifier code and described production sequence number combination producing.
3. the method for claim 1, is characterized in that, the assigned address that described random number and described signed data is deposited in to described Set Top Box is specially:
Described random number is cut apart to the subdata that obtains 1 the above random number;
Described signed data is cut apart to the subdata that obtains 1 the above signed data;
The subdata of described random number and the subdata of described signed data are calculated and are generated 1 above data splitting by the second algorithm;
Described 1 above data splitting is deposited in to the assigned address of described Set Top Box.
4. the method as described in claims 1 to 3 any one, is characterized in that, described assigned address comprises following at least one: flash memory or single-chip microcomputer.
5. the method as described in claims 1 to 3 any one, is characterized in that, described specify hardware comprises following any one: flash memory, central processor CPU or Double Data Rate synchronous DRAM DDR.
6. a Set Top Box, is characterized in that, comprising:
Key production module, for generating the key of described Set Top Box, the hardware identifier code that described key calculates described Set Top Box by the first algorithm generates, and described hardware identifier code is for the specify hardware of Set Top Box described in unique identification;
Signature blocks, for described key being passed through to default signature algorithm signature random number, obtains signed data;
Data memory module, for depositing described random number and described signed data in the assigned address of described Set Top Box;
Data read module, for when the described set-top-box opening, reads described random number and described signed data from the described assigned address of described Set Top Box, and reads the described hardware identifier code of described Set Top Box;
Antitheft judge module, for calculating by described the first algorithm the hardware identifier code read out, by the key calculating, by the described default signature algorithm described random number of signing, whether the result that judgement obtains is identical with the signed data reading out;
Set Top Box starts module, identical with the signed data reading out for the result obtaining described in judging after, restart described Set Top Box.
7. Set Top Box as claimed in claim 6, is characterized in that, described key production module specifically for:
From the described specify hardware of described Set Top Box, read described hardware identifier code;
Read the production sequence number of described specify hardware;
By described the first algorithm, by the key of Set Top Box described in described hardware identifier code and described production sequence number combination producing.
8. Set Top Box as claimed in claim 6, is characterized in that, described data memory module specifically for:
Described random number is cut apart to the subdata that obtains 1 the above random number;
Described signed data is cut apart to the subdata that obtains 1 the above signed data;
The subdata of described random number and the subdata of described signed data are calculated and are generated 1 above data splitting by the second algorithm;
Described 1 above data splitting is deposited in to the assigned address of described Set Top Box.
9. the Set Top Box as described in claim 6 to 8 any one, is characterized in that, described assigned address comprises following at least one: flash memory or single-chip microcomputer.
10. the Set Top Box as described in claim 6 to 8 any one, is characterized in that, described specify hardware comprises following any one: flash memory, central processor CPU or Double Data Rate synchronous DRAM DDR.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310601597.0A CN103607645B (en) | 2013-11-22 | 2013-11-22 | A kind of Set Top Box method for preventing piracy and Set Top Box |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310601597.0A CN103607645B (en) | 2013-11-22 | 2013-11-22 | A kind of Set Top Box method for preventing piracy and Set Top Box |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103607645A true CN103607645A (en) | 2014-02-26 |
CN103607645B CN103607645B (en) | 2017-06-23 |
Family
ID=50125842
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310601597.0A Expired - Fee Related CN103607645B (en) | 2013-11-22 | 2013-11-22 | A kind of Set Top Box method for preventing piracy and Set Top Box |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103607645B (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104683871A (en) * | 2015-02-12 | 2015-06-03 | 福建新大陆通信科技股份有限公司 | FLASH ID-based low-security set-top box encryption control method |
CN104796745A (en) * | 2015-03-26 | 2015-07-22 | 成都市斯达鑫辉视讯科技有限公司 | Safety protection method for set top box |
CN108197196A (en) * | 2017-12-27 | 2018-06-22 | 北京京存技术有限公司 | Determining method, apparatus, equipment and the storage medium of chip identification code |
CN105809053B (en) * | 2014-12-31 | 2018-10-26 | 深圳市麦思美科技有限公司 | The encrypting and deciphering system and its encipher-decipher method of Blu-ray player |
CN109040026A (en) * | 2018-07-11 | 2018-12-18 | 深圳市网心科技有限公司 | A kind of authorization method of digital asset, device, equipment and medium |
CN109150813A (en) * | 2017-06-27 | 2019-01-04 | 武汉海康存储技术有限公司 | A kind of verification method and device of equipment |
CN109409112A (en) * | 2018-10-19 | 2019-03-01 | 郑州云海信息技术有限公司 | A kind of disk binding method and device |
CN111597274A (en) * | 2020-07-23 | 2020-08-28 | 南京数科安金信息技术有限公司 | Data distributed encryption storage system |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1833398A (en) * | 2003-06-11 | 2006-09-13 | 安全第一公司 | Secure data parser method and system |
CN101031068A (en) * | 2006-02-27 | 2007-09-05 | 美国博通公司 | Method and system for secure system-on-a-chip architecture for multimedia data processing |
CN101154256A (en) * | 2006-09-26 | 2008-04-02 | 英特尔公司 | Methods and arrangements to launch trusted, co-existing environments |
CN101300775A (en) * | 2005-10-31 | 2008-11-05 | 松下电器产业株式会社 | Secure processing device, secure processing method, encrypted confidential information embedding method, program, storage medium, and integrated circuit |
CN101401341A (en) * | 2005-11-18 | 2009-04-01 | 安全第一公司 | Secure data parser method and system |
CN102082665A (en) * | 2009-11-30 | 2011-06-01 | 中国移动通信集团公司 | Identity authentication method, system and equipment in EAP (Extensible Authentication Protocol) authentication |
CN102196317A (en) * | 2011-03-01 | 2011-09-21 | 深圳创维数字技术股份有限公司 | Set-top box protection method and set-top box |
CN102867138A (en) * | 2012-08-23 | 2013-01-09 | 深圳市同洲电子股份有限公司 | Copyright protection method and device for STB (set top box) middleware |
-
2013
- 2013-11-22 CN CN201310601597.0A patent/CN103607645B/en not_active Expired - Fee Related
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1833398A (en) * | 2003-06-11 | 2006-09-13 | 安全第一公司 | Secure data parser method and system |
CN101300775A (en) * | 2005-10-31 | 2008-11-05 | 松下电器产业株式会社 | Secure processing device, secure processing method, encrypted confidential information embedding method, program, storage medium, and integrated circuit |
CN101401341A (en) * | 2005-11-18 | 2009-04-01 | 安全第一公司 | Secure data parser method and system |
CN101031068A (en) * | 2006-02-27 | 2007-09-05 | 美国博通公司 | Method and system for secure system-on-a-chip architecture for multimedia data processing |
CN101154256A (en) * | 2006-09-26 | 2008-04-02 | 英特尔公司 | Methods and arrangements to launch trusted, co-existing environments |
CN102082665A (en) * | 2009-11-30 | 2011-06-01 | 中国移动通信集团公司 | Identity authentication method, system and equipment in EAP (Extensible Authentication Protocol) authentication |
CN102196317A (en) * | 2011-03-01 | 2011-09-21 | 深圳创维数字技术股份有限公司 | Set-top box protection method and set-top box |
CN102867138A (en) * | 2012-08-23 | 2013-01-09 | 深圳市同洲电子股份有限公司 | Copyright protection method and device for STB (set top box) middleware |
Non-Patent Citations (1)
Title |
---|
王宏远,周爱弟.: "数字机顶盒系统的软件加密设计", 《计算机与数字工程》 * |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105809053B (en) * | 2014-12-31 | 2018-10-26 | 深圳市麦思美科技有限公司 | The encrypting and deciphering system and its encipher-decipher method of Blu-ray player |
CN104683871A (en) * | 2015-02-12 | 2015-06-03 | 福建新大陆通信科技股份有限公司 | FLASH ID-based low-security set-top box encryption control method |
CN104796745A (en) * | 2015-03-26 | 2015-07-22 | 成都市斯达鑫辉视讯科技有限公司 | Safety protection method for set top box |
CN109150813A (en) * | 2017-06-27 | 2019-01-04 | 武汉海康存储技术有限公司 | A kind of verification method and device of equipment |
CN108197196A (en) * | 2017-12-27 | 2018-06-22 | 北京京存技术有限公司 | Determining method, apparatus, equipment and the storage medium of chip identification code |
CN109040026A (en) * | 2018-07-11 | 2018-12-18 | 深圳市网心科技有限公司 | A kind of authorization method of digital asset, device, equipment and medium |
CN109409112A (en) * | 2018-10-19 | 2019-03-01 | 郑州云海信息技术有限公司 | A kind of disk binding method and device |
CN111597274A (en) * | 2020-07-23 | 2020-08-28 | 南京数科安金信息技术有限公司 | Data distributed encryption storage system |
Also Published As
Publication number | Publication date |
---|---|
CN103607645B (en) | 2017-06-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103607645A (en) | Set top box pirate preventing method and set top box | |
JP6636183B2 (en) | Block generation method, apparatus and block chain network | |
CN108880797B (en) | Authentication method of Internet of things equipment and Internet of things equipment | |
US9971895B2 (en) | Method and apparatus for supporting dynamic change of authentication means secure booting | |
KR20120140223A (en) | Semiconductor device | |
US10754727B2 (en) | Method and apparatus for storing data and method and apparatus for recovering data | |
CN104678771A (en) | Control method and control system for household electrical appliance | |
CN105046142B (en) | A kind of method, equipment and the storage medium of certification ancillary equipment | |
CN103024438B (en) | A kind of Set Top Box and production test method, system | |
CN104765987A (en) | System and method for embedded device software encryption | |
CN104471581A (en) | Protecting media items using a media security controller | |
CN101222698A (en) | IMEI code protection method based on hardware sequence number | |
CN102196317A (en) | Set-top box protection method and set-top box | |
CN104574170A (en) | Code pattern setting method for products and buying behavior automated verification method and system | |
CN103366139A (en) | Electronic device, hardware maintenance system and hardware maintenance method | |
CN102750982A (en) | Burning method and system of encrypted memory chip | |
US8880900B2 (en) | Memory system | |
CN102411575A (en) | Method and system for displaying webpage, and server | |
CN101149708A (en) | Mobile memory encryption method and method for automatically operating encrypted mobile memory | |
CN103577744A (en) | Network on-line activating mode for Android mobile internet equipment | |
CN103902371B (en) | A kind of User space program obtains kernel jiffies method and system | |
KR101409040B1 (en) | Apparatus and method for data processing in Programmable Logic Controller system | |
JP5986279B2 (en) | Semiconductor device | |
CN203894784U (en) | New media interaction picture book | |
CN109471810B (en) | Hardware configuration validation method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20170623 Termination date: 20171122 |
|
CF01 | Termination of patent right due to non-payment of annual fee |