CN103607645A - Set top box pirate preventing method and set top box - Google Patents

Set top box pirate preventing method and set top box Download PDF

Info

Publication number
CN103607645A
CN103607645A CN201310601597.0A CN201310601597A CN103607645A CN 103607645 A CN103607645 A CN 103607645A CN 201310601597 A CN201310601597 A CN 201310601597A CN 103607645 A CN103607645 A CN 103607645A
Authority
CN
China
Prior art keywords
top box
set top
random number
signed data
algorithm
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201310601597.0A
Other languages
Chinese (zh)
Other versions
CN103607645B (en
Inventor
张平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Jiuzhou Electric Appliance Co Ltd
Original Assignee
Shenzhen Jiuzhou Electric Appliance Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Jiuzhou Electric Appliance Co Ltd filed Critical Shenzhen Jiuzhou Electric Appliance Co Ltd
Priority to CN201310601597.0A priority Critical patent/CN103607645B/en
Publication of CN103607645A publication Critical patent/CN103607645A/en
Application granted granted Critical
Publication of CN103607645B publication Critical patent/CN103607645B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention belongs to the technical field of information, and particularly relates to a set top box pirate preventing method and a set top box. The set top box pirate preventing method comprises the steps that a secret key of the set top box is generated; a random number is signed to the secrete key through the preset signature algorithm to obtain signature data; the random number and the signature data are stored at the designated position of the set top box; when the set top box is started, the random number and the signature data are read from the designated position of the set top box, and hardware identification codes of the set top box are read; the hardware identification codes are read through the first algorithm, the random number is signed to the secret key obtained through calculation through the preset signature algorithm, and whether the obtained result is the same as the read signature data or not is judged; the set top box is started after the obtained result is judged to be the same as the read signature data. The decoding difficulty of the set top box is increased, and the pirate preventing performance of the set top box is improved.

Description

A kind of Set Top Box method for preventing piracy and Set Top Box
Technical field
The invention belongs to areas of information technology, relate in particular to a kind of Set Top Box method for preventing piracy and Set Top Box.
Background technology
Existing set-top box technique does not have anti-piracy protection measure substantially; as long as bootlegger obtains a Set Top Box of regular manufacturer production; copy the circuit board of this Set Top Box; read the program in flash memory; buy again the required components and parts of production Set Top Box; just can unrestrictedly produce this type of Set Top Box, try to gain economic interests, bring great economic loss to regular Set Top Box manufacturer simultaneously.
In sum, existing Set Top Box anti-piracy technique anti-theft is poor.
Summary of the invention
The object of the embodiment of the present invention is to provide a kind of Set Top Box method for preventing piracy, is intended to solve the poor problem of existing Set Top Box method for preventing piracy anti-theft.
The embodiment of the present invention is achieved in that a kind of Set Top Box method for preventing piracy, comprising:
Generate the key of described Set Top Box, the hardware identifier code that described key calculates described Set Top Box by the first algorithm generates, and described hardware identifier code is for the specify hardware of Set Top Box described in unique identification;
Described key, by default signature algorithm signature random number, is obtained to signed data;
Described random number and described signed data are deposited in to the assigned address of described Set Top Box;
When described set-top-box opening, from the described assigned address of described Set Top Box, read described random number and described signed data, and read the described hardware identifier code of described Set Top Box;
By described the first algorithm, calculate the hardware identifier code read out, by the key calculating, by the described default signature algorithm described random number of signing, whether the result that judgement obtains is identical with the signed data reading out;
After the result obtaining described in judging is identical with the signed data reading out, restart described Set Top Box.
Another object of the embodiment of the present invention is to provide a kind of Set Top Box, comprising:
Key production module, for generating the key of described Set Top Box, the hardware identifier code that described key calculates described Set Top Box by the first algorithm generates, and described hardware identifier code is for the specify hardware of Set Top Box described in unique identification;
Signature blocks, for described key being passed through to default signature algorithm signature random number, obtains signed data;
Data memory module, for depositing described random number and described signed data in the assigned address of described Set Top Box;
Data read module, for when the described set-top-box opening, reads described random number and described signed data from the described assigned address of described Set Top Box, and reads the described hardware identifier code of described Set Top Box;
Antitheft judge module, for calculating by described the first algorithm the hardware identifier code read out, by the key calculating, by the described default signature algorithm described random number of signing, whether the result that judgement obtains is identical with the signed data reading out;
Set Top Box starts module, identical with the signed data reading out for the result obtaining described in judging after, restart described Set Top Box.
The embodiment of the present invention is by the production process of Set Top Box, generate key, key is obtained to signed data by default signature algorithm signature random number, by random number and signed data storage, then in the start process of Set Top Box, read random number and signed data, can judgement obtain identical signed data by default signature algorithm, if obtain identical signed data, restart Set Top Box, thereby increased the difficulty that cracks of Set Top Box, improved thus the anti-theft of Set Top Box.
Accompanying drawing explanation
Fig. 1 is the realization flow figure of the Set Top Box method for preventing piracy that provides of the embodiment of the present invention;
The specific implementation flow chart of the key of described Set Top Box is provided in the Set Top Box method for preventing piracy step S101 that provides of the embodiment of the present invention Fig. 2;
Fig. 3 is the specific implementation flow chart of the Set Top Box method for preventing piracy step S103 that provides of the embodiment of the present invention;
Fig. 4 is the structured flowchart of the Set Top Box that provides of the embodiment of the present invention.
Embodiment
In order to make object of the present invention, technical scheme and advantage clearer, below in conjunction with drawings and Examples, the present invention is further elaborated.Should be appreciated that specific embodiment described herein, only in order to explain the present invention, is not intended to limit the present invention.
The embodiment of the present invention is by the production process of Set Top Box, generate key, key is obtained to signed data by default signature algorithm signature random number, by random number and signed data storage, then in the start process of Set Top Box, read random number and signed data, can judgement obtain identical signed data by default signature algorithm, if obtain identical signed data, restart Set Top Box, thereby increased the difficulty that cracks of Set Top Box, improved thus the anti-theft of Set Top Box.
Fig. 1 shows the realization flow of the Set Top Box method for preventing piracy that the embodiment of the present invention provides, and details are as follows:
In step S101, generate the key of described Set Top Box, the hardware identifier code that described key calculates described Set Top Box by the first algorithm generates, and described hardware identifier code is for the specify hardware of Set Top Box described in unique identification.
Further, the key that generates described Set Top Box in step S101 is specially:
In step S201, from the described specify hardware of described Set Top Box, read described hardware identifier code.
In embodiments of the present invention, hardware identifier code is the intrinsic identification code of specify hardware, that is to say, the hardware identifier code of specify hardware has uniqueness.
Preferably, described specify hardware comprises following any one: flash memory, central processor CPU or Double Data Rate synchronous DRAM DDR(Double Data Rate).
It should be noted that, specify hardware comprises two kinds of read-only chip and read-write chips.As long as the built-in chip in Set Top Box has unique hardware identifier code and can read this unique hardware identifier code, just can be used as specify hardware here.
In step S202, read the production sequence number of described specify hardware.
Here, the production sequence number of specify hardware is by the former producer of Set Top Box, to be pre-deposited in the assigned address of Set Top Box in the production process of Set Top Box.The production sequence number of specify hardware is unique.For example, the production sequence number of burning in the flash of Set Top Box is for identifying different Set Top Box, that is to say, each Set Top Box by the former manufacturer production of Set Top Box has unique production sequence number.
In step S203, by described the first algorithm, by the key of Set Top Box described in described hardware identifier code and described production sequence number combination producing.
Here, the specific algorithm of the first algorithm is not construed as limiting, the former producer of Set Top Box can carry out algorithm design to this first algorithm as required.Because the hardware identifier code of specify hardware and the production sequence number of specify hardware are all unique, therefore, by the hardware identifier code of specify hardware with produce sequence number to calculate by the first algorithm the key generating be also unique.
In step S102, described key, by default signature algorithm signature random number, is obtained to signed data.
In step S103, described random number and described signed data are deposited in to the assigned address of described Set Top Box.
Further, the assigned address that step S103 deposits described random number and described signed data in described Set Top Box is specially:
In step S301, described random number is cut apart to the subdata that obtains 1 the above random number.
In step S302, described signed data is cut apart to the subdata that obtains 1 the above signed data.
In step S303, the subdata of described random number and the subdata of described signed data are calculated and are generated 1 above data splitting by the second algorithm.
Below the specific implementation of step S103 is given an example:
Example one: random number is data B, signed data is data C, data B is divided into subdata B1 and B2, data C is divided into subdata C1 and C2, B1 and C1 are generated to data splitting Z1 by algorithm, B2 and C2 are generated to data splitting Z2 by the 4th algorithm, data splitting Z1 is deposited in the single-chip microcomputer of set top box front panel, data splitting Z2 is deposited in the flash memory of Set Top Box.Here, the specific algorithm of algorithm and the 4th algorithm is not construed as limiting.
Example two: random number is data B, signed data is data C, data B is divided into subdata B1, B2, B3, B4 and B5, data C is divided into subdata C1, C2, C3 and C4, B1, C2 and B3 are generated to data splitting Z1 by the 5th algorithm, C1, B2 and C3 are generated to data splitting Z2 by the 6th algorithm, B4, C4 and B5 are generated to data splitting Z3 by the 7th algorithm, data splitting Z1 and Z3 are deposited in the single-chip microcomputer of set top box front panel, data splitting Z2 is deposited in the flash memory of Set Top Box.Here, the specific algorithm of the 5th algorithm, the 6th algorithm and the 7th algorithm is not construed as limiting.
In step S304, described 1 above data splitting is deposited in to the assigned address of described Set Top Box.
Further, described assigned address comprises following at least one: flash memory or single-chip microcomputer.
In actual applications, assigned address comprises set top box front panel single-chip microcomputer and flash memory.
As one embodiment of the present of invention, the assigned address of the Set Top Box 1 above data splitting not being deposited in is construed as limiting.
Preferably, 1 above data splitting deposits flash memory and the single-chip microcomputer of Set Top Box in.
Alternatively, 1 above data splitting deposits the flash memory of Set Top Box in.
Alternatively, 1 above data splitting deposits the single-chip microcomputer of Set Top Box in.
In step S104, when described set-top-box opening, from the described assigned address of described Set Top Box, read described random number and described signed data, and read the described hardware identifier code of described Set Top Box.
As one embodiment of the present of invention, from the assigned address of described Set Top Box, read random number and signed data is specially: from the assigned address of Set Top Box, read more than 1 data splitting, by 1 above data splitting, generate the subdata of random number and the subdata of signed data, by the synthetic random number of subdata of random number, by the subdata of signed data, synthesize signed data again.Corresponding with above-mentioned example one: from the single-chip microcomputer of set top box front panel, to read data splitting Z1, from the flash memory of Set Top Box, read data splitting Z2, the algorithm for inversion that data splitting Z1 is passed through to algorithm generates B1 and C1, the algorithm for inversion that data splitting Z2 is passed through to the 4th algorithm generates B2 and C2, by B1 and B2 generated data B, by C1 and C2 generated data C.
In step S105, by described the first algorithm, calculate the hardware identifier code read out, by the key calculating, by the described default signature algorithm described random number of signing, whether the result that judgement obtains is identical with the signed data reading out.
As one embodiment of the present of invention, by described the first algorithm, calculate the hardware identifier code reading out and be specially: the production sequence number of the hardware identifier code reading out and specify hardware is calculated to key by the first algorithm.
In step S106, after the result obtaining described in judging is identical with the signed data reading out, restart described Set Top Box.
If the result obtaining by default signature algorithm signature is different from the signed data reading, this Set Top Box is pirate Set Top Box, does not start.
The embodiment of the present invention is by the production process of Set Top Box, generate key, key is obtained to signed data by default signature algorithm signature random number, by random number and signed data storage, then in the start process of Set Top Box, read random number and signed data, can judgement obtain identical signed data by default signature algorithm, if obtain identical signed data, restart Set Top Box, thereby increased the difficulty that cracks of Set Top Box, improved thus the anti-theft of Set Top Box.
Fig. 4 shows the structured flowchart of the Set Top Box that the embodiment of the present invention provides, and for moving the Set Top Box method for preventing piracy described in Fig. 1 to Fig. 3 embodiment of the present invention, for convenience of explanation, only shows the part relevant to the present embodiment.
With reference to Fig. 4, a kind of Set Top Box, comprising:
Key production module 41, generates the key of described Set Top Box, and the hardware identifier code that described key calculates described Set Top Box by the first algorithm generates, and described hardware identifier code is for the specify hardware of Set Top Box described in unique identification.
Signature blocks 42, by default signature algorithm signature random number, obtains signed data by described key.
Data memory module 43, deposits described random number and described signed data in the assigned address of described Set Top Box.
Data read module 44, when described set-top-box opening, reads described random number and described signed data from the described assigned address of described Set Top Box, and reads the described hardware identifier code of described Set Top Box.
Antitheft judge module 45, calculates by described the first algorithm the hardware identifier code read out, and by the key calculating, by the described default signature algorithm described random number of signing, whether the result that judgement obtains is identical with the signed data reading out.
Set Top Box starts module 46, after the result obtaining described in judging is identical with the signed data reading out, restarts described Set Top Box.
Further, described key production module 41 specifically for:
From the described specify hardware of described Set Top Box, read described hardware identifier code;
Read the production sequence number of described specify hardware;
By described the first algorithm, by the key of Set Top Box described in described hardware identifier code and described production sequence number combination producing.
Further, described data memory module 43 specifically for:
Described random number is cut apart to the subdata that obtains 1 the above random number;
Described signed data is cut apart to the subdata that obtains 1 the above signed data;
The subdata of described random number and the subdata of described signed data are calculated and are generated 1 above data splitting by the second algorithm;
Described 1 above data splitting is deposited in to the assigned address of described Set Top Box.
Further, described assigned address comprises following at least one: flash memory or single-chip microcomputer.
Preferably, described specify hardware comprises following any one: flash memory, central processor CPU or Double Data Rate synchronous DRAM DDR.
The embodiment of the present invention is by the production process of Set Top Box, generate key, key is obtained to signed data by default signature algorithm signature random number, by random number and signed data storage, then in the start process of Set Top Box, read random number and signed data, can judgement obtain identical signed data by default signature algorithm, if obtain identical signed data, restart Set Top Box, thereby increased the difficulty that cracks of Set Top Box, improved thus the anti-theft of Set Top Box.
The foregoing is only preferred embodiment of the present invention, not in order to limit the present invention, all any modifications of doing within the spirit and principles in the present invention, be equal to and replace and improvement etc., within all should being included in protection scope of the present invention.

Claims (10)

1. a Set Top Box method for preventing piracy, is characterized in that, comprising:
Generate the key of described Set Top Box, the hardware identifier code that described key calculates described Set Top Box by the first algorithm generates, and described hardware identifier code is for the specify hardware of Set Top Box described in unique identification;
Described key, by default signature algorithm signature random number, is obtained to signed data;
Described random number and described signed data are deposited in to the assigned address of described Set Top Box;
When described set-top-box opening, from the described assigned address of described Set Top Box, read described random number and described signed data, and read the described hardware identifier code of described Set Top Box;
By described the first algorithm, calculate the hardware identifier code read out, by the key calculating, by the described default signature algorithm described random number of signing, whether the result that judgement obtains is identical with the signed data reading out;
After the result obtaining described in judging is identical with the signed data reading out, restart described Set Top Box.
2. the method for claim 1, is characterized in that, the key of the described Set Top Box of described generation is specially:
From the described specify hardware of described Set Top Box, read described hardware identifier code;
Read the production sequence number of described specify hardware;
By described the first algorithm, by the key of Set Top Box described in described hardware identifier code and described production sequence number combination producing.
3. the method for claim 1, is characterized in that, the assigned address that described random number and described signed data is deposited in to described Set Top Box is specially:
Described random number is cut apart to the subdata that obtains 1 the above random number;
Described signed data is cut apart to the subdata that obtains 1 the above signed data;
The subdata of described random number and the subdata of described signed data are calculated and are generated 1 above data splitting by the second algorithm;
Described 1 above data splitting is deposited in to the assigned address of described Set Top Box.
4. the method as described in claims 1 to 3 any one, is characterized in that, described assigned address comprises following at least one: flash memory or single-chip microcomputer.
5. the method as described in claims 1 to 3 any one, is characterized in that, described specify hardware comprises following any one: flash memory, central processor CPU or Double Data Rate synchronous DRAM DDR.
6. a Set Top Box, is characterized in that, comprising:
Key production module, for generating the key of described Set Top Box, the hardware identifier code that described key calculates described Set Top Box by the first algorithm generates, and described hardware identifier code is for the specify hardware of Set Top Box described in unique identification;
Signature blocks, for described key being passed through to default signature algorithm signature random number, obtains signed data;
Data memory module, for depositing described random number and described signed data in the assigned address of described Set Top Box;
Data read module, for when the described set-top-box opening, reads described random number and described signed data from the described assigned address of described Set Top Box, and reads the described hardware identifier code of described Set Top Box;
Antitheft judge module, for calculating by described the first algorithm the hardware identifier code read out, by the key calculating, by the described default signature algorithm described random number of signing, whether the result that judgement obtains is identical with the signed data reading out;
Set Top Box starts module, identical with the signed data reading out for the result obtaining described in judging after, restart described Set Top Box.
7. Set Top Box as claimed in claim 6, is characterized in that, described key production module specifically for:
From the described specify hardware of described Set Top Box, read described hardware identifier code;
Read the production sequence number of described specify hardware;
By described the first algorithm, by the key of Set Top Box described in described hardware identifier code and described production sequence number combination producing.
8. Set Top Box as claimed in claim 6, is characterized in that, described data memory module specifically for:
Described random number is cut apart to the subdata that obtains 1 the above random number;
Described signed data is cut apart to the subdata that obtains 1 the above signed data;
The subdata of described random number and the subdata of described signed data are calculated and are generated 1 above data splitting by the second algorithm;
Described 1 above data splitting is deposited in to the assigned address of described Set Top Box.
9. the Set Top Box as described in claim 6 to 8 any one, is characterized in that, described assigned address comprises following at least one: flash memory or single-chip microcomputer.
10. the Set Top Box as described in claim 6 to 8 any one, is characterized in that, described specify hardware comprises following any one: flash memory, central processor CPU or Double Data Rate synchronous DRAM DDR.
CN201310601597.0A 2013-11-22 2013-11-22 A kind of Set Top Box method for preventing piracy and Set Top Box Expired - Fee Related CN103607645B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310601597.0A CN103607645B (en) 2013-11-22 2013-11-22 A kind of Set Top Box method for preventing piracy and Set Top Box

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310601597.0A CN103607645B (en) 2013-11-22 2013-11-22 A kind of Set Top Box method for preventing piracy and Set Top Box

Publications (2)

Publication Number Publication Date
CN103607645A true CN103607645A (en) 2014-02-26
CN103607645B CN103607645B (en) 2017-06-23

Family

ID=50125842

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310601597.0A Expired - Fee Related CN103607645B (en) 2013-11-22 2013-11-22 A kind of Set Top Box method for preventing piracy and Set Top Box

Country Status (1)

Country Link
CN (1) CN103607645B (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104683871A (en) * 2015-02-12 2015-06-03 福建新大陆通信科技股份有限公司 FLASH ID-based low-security set-top box encryption control method
CN104796745A (en) * 2015-03-26 2015-07-22 成都市斯达鑫辉视讯科技有限公司 Safety protection method for set top box
CN108197196A (en) * 2017-12-27 2018-06-22 北京京存技术有限公司 Determining method, apparatus, equipment and the storage medium of chip identification code
CN105809053B (en) * 2014-12-31 2018-10-26 深圳市麦思美科技有限公司 The encrypting and deciphering system and its encipher-decipher method of Blu-ray player
CN109040026A (en) * 2018-07-11 2018-12-18 深圳市网心科技有限公司 A kind of authorization method of digital asset, device, equipment and medium
CN109150813A (en) * 2017-06-27 2019-01-04 武汉海康存储技术有限公司 A kind of verification method and device of equipment
CN109409112A (en) * 2018-10-19 2019-03-01 郑州云海信息技术有限公司 A kind of disk binding method and device
CN111597274A (en) * 2020-07-23 2020-08-28 南京数科安金信息技术有限公司 Data distributed encryption storage system

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1833398A (en) * 2003-06-11 2006-09-13 安全第一公司 Secure data parser method and system
CN101031068A (en) * 2006-02-27 2007-09-05 美国博通公司 Method and system for secure system-on-a-chip architecture for multimedia data processing
CN101154256A (en) * 2006-09-26 2008-04-02 英特尔公司 Methods and arrangements to launch trusted, co-existing environments
CN101300775A (en) * 2005-10-31 2008-11-05 松下电器产业株式会社 Secure processing device, secure processing method, encrypted confidential information embedding method, program, storage medium, and integrated circuit
CN101401341A (en) * 2005-11-18 2009-04-01 安全第一公司 Secure data parser method and system
CN102082665A (en) * 2009-11-30 2011-06-01 中国移动通信集团公司 Identity authentication method, system and equipment in EAP (Extensible Authentication Protocol) authentication
CN102196317A (en) * 2011-03-01 2011-09-21 深圳创维数字技术股份有限公司 Set-top box protection method and set-top box
CN102867138A (en) * 2012-08-23 2013-01-09 深圳市同洲电子股份有限公司 Copyright protection method and device for STB (set top box) middleware

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1833398A (en) * 2003-06-11 2006-09-13 安全第一公司 Secure data parser method and system
CN101300775A (en) * 2005-10-31 2008-11-05 松下电器产业株式会社 Secure processing device, secure processing method, encrypted confidential information embedding method, program, storage medium, and integrated circuit
CN101401341A (en) * 2005-11-18 2009-04-01 安全第一公司 Secure data parser method and system
CN101031068A (en) * 2006-02-27 2007-09-05 美国博通公司 Method and system for secure system-on-a-chip architecture for multimedia data processing
CN101154256A (en) * 2006-09-26 2008-04-02 英特尔公司 Methods and arrangements to launch trusted, co-existing environments
CN102082665A (en) * 2009-11-30 2011-06-01 中国移动通信集团公司 Identity authentication method, system and equipment in EAP (Extensible Authentication Protocol) authentication
CN102196317A (en) * 2011-03-01 2011-09-21 深圳创维数字技术股份有限公司 Set-top box protection method and set-top box
CN102867138A (en) * 2012-08-23 2013-01-09 深圳市同洲电子股份有限公司 Copyright protection method and device for STB (set top box) middleware

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
王宏远,周爱弟.: "数字机顶盒系统的软件加密设计", 《计算机与数字工程》 *

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105809053B (en) * 2014-12-31 2018-10-26 深圳市麦思美科技有限公司 The encrypting and deciphering system and its encipher-decipher method of Blu-ray player
CN104683871A (en) * 2015-02-12 2015-06-03 福建新大陆通信科技股份有限公司 FLASH ID-based low-security set-top box encryption control method
CN104796745A (en) * 2015-03-26 2015-07-22 成都市斯达鑫辉视讯科技有限公司 Safety protection method for set top box
CN109150813A (en) * 2017-06-27 2019-01-04 武汉海康存储技术有限公司 A kind of verification method and device of equipment
CN108197196A (en) * 2017-12-27 2018-06-22 北京京存技术有限公司 Determining method, apparatus, equipment and the storage medium of chip identification code
CN109040026A (en) * 2018-07-11 2018-12-18 深圳市网心科技有限公司 A kind of authorization method of digital asset, device, equipment and medium
CN109409112A (en) * 2018-10-19 2019-03-01 郑州云海信息技术有限公司 A kind of disk binding method and device
CN111597274A (en) * 2020-07-23 2020-08-28 南京数科安金信息技术有限公司 Data distributed encryption storage system

Also Published As

Publication number Publication date
CN103607645B (en) 2017-06-23

Similar Documents

Publication Publication Date Title
CN103607645A (en) Set top box pirate preventing method and set top box
JP6636183B2 (en) Block generation method, apparatus and block chain network
CN108880797B (en) Authentication method of Internet of things equipment and Internet of things equipment
US9971895B2 (en) Method and apparatus for supporting dynamic change of authentication means secure booting
KR20120140223A (en) Semiconductor device
US10754727B2 (en) Method and apparatus for storing data and method and apparatus for recovering data
CN104678771A (en) Control method and control system for household electrical appliance
CN105046142B (en) A kind of method, equipment and the storage medium of certification ancillary equipment
CN103024438B (en) A kind of Set Top Box and production test method, system
CN104765987A (en) System and method for embedded device software encryption
CN104471581A (en) Protecting media items using a media security controller
CN101222698A (en) IMEI code protection method based on hardware sequence number
CN102196317A (en) Set-top box protection method and set-top box
CN104574170A (en) Code pattern setting method for products and buying behavior automated verification method and system
CN103366139A (en) Electronic device, hardware maintenance system and hardware maintenance method
CN102750982A (en) Burning method and system of encrypted memory chip
US8880900B2 (en) Memory system
CN102411575A (en) Method and system for displaying webpage, and server
CN101149708A (en) Mobile memory encryption method and method for automatically operating encrypted mobile memory
CN103577744A (en) Network on-line activating mode for Android mobile internet equipment
CN103902371B (en) A kind of User space program obtains kernel jiffies method and system
KR101409040B1 (en) Apparatus and method for data processing in Programmable Logic Controller system
JP5986279B2 (en) Semiconductor device
CN203894784U (en) New media interaction picture book
CN109471810B (en) Hardware configuration validation method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20170623

Termination date: 20171122

CF01 Termination of patent right due to non-payment of annual fee