CN103929674B - A kind of set-top box authorization method and set-top box - Google Patents
A kind of set-top box authorization method and set-top box Download PDFInfo
- Publication number
- CN103929674B CN103929674B CN201410172963.XA CN201410172963A CN103929674B CN 103929674 B CN103929674 B CN 103929674B CN 201410172963 A CN201410172963 A CN 201410172963A CN 103929674 B CN103929674 B CN 103929674B
- Authority
- CN
- China
- Prior art keywords
- top box
- user
- verified
- family
- bound
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Landscapes
- Small-Scale Networks (AREA)
- Alarm Systems (AREA)
Abstract
The present invention relates to a kind of set-top box authorization method and set-top box.This method includes:Set-top box communicates with the external equipment bound in advance when being abnormal power-off or triggering user setting, sends checking information and verified;If communicating successfully and being verified, user is authorized, otherwise user is locked.The present invention is bound set-top box and the external equipment in user family, in set-top box abnormal power-down or triggering user setting, with the external equipment of binding communicate and send checking information and verified, authorized if being verified, otherwise locked, set-top box is coordinated with exterior apparatus bound in user family and is verified, so that even if set-top box and smart card are stolen at the same time, as the external equipment that cannot be set with user carries out authentication and cannot be used by other people, so as to effectively ensure that the security of set-top box and the uniqueness of user are not destroyed, the strong rights and interests for protecting paying customer.
Description
Technical field
The present invention relates to the communications field, more particularly to a kind of set-top box authorization method and set-top box.
Background technology
At present.Set-top box plays the terminal of TV programme as control, is used in many families.
In a region, local TV and Radio Service distributes different set-top box and smart card for each user, uses
Set-top box and the smart card method that uses of pairing control the broadcasting of charge program.But when set-top box and smart card while quilt
After robber, since set-top box and smart card still match use, still it can be licensed in other families of this area, this is not only
The security and user's uniqueness of set-top box are destroyed, has also greatly invaded the rights and interests of paying customer.
The content of the invention
In view of this, it is necessary to be stolen at the same time for above-mentioned set-top box and smart card, destroy set-top box security and use
A kind of the problem of family uniqueness, there is provided set-top box authorization method.
In addition, also provide a kind of set-top box for ensureing set-top box security and user's uniqueness.
A kind of set-top box authorization method, includes the following steps:
Set-top box communicates when being abnormal power-off or triggering user setting with the external equipment bound in advance,
Checking information is sent to be verified;
If communicating successfully and being verified, user is authorized, otherwise user is locked.
In one of which embodiment, the external equipment includes the movement that electric appliance, user are held in user family
At least one of power equipment in terminal or user family.
It is described to communicate with external equipment that is binding in advance in one of which embodiment, send checking information
The step of being verified be specially:
Set-top box communicates with electric appliance in the user family bound in advance, sends checking information to the user family bound in advance
Middle electric appliance, the checking information sent by electric appliance in the family bound in advance to set-top box is verified, and returns to verification result.
It is described to communicate with external equipment that is binding in advance in one of which embodiment, send checking information
The step of being verified be specially:
Family lan is created by the lan device of user, set-top box is connected to be sent out into family lan, set-top box
When raw abnormal power-down or triggering user setting, communicate with the lan device bound in advance, transmission is connected into office of family
The checking information of domain net is verified, and returns to verification result.
In one of which embodiment, the method further includes:
If set-top box receive external user identification apparatus transmission subscriber identity information, if be verified it is right
User is authorized.
A kind of set-top box, including:
Communication unit, when set-top box is being abnormal power-off or triggering user setting, the outside with binding in advance is set
It is standby to communicate, send checking information and verified;
Authorization control unit, if communicating successfully and being verified, authorizes user, otherwise user is locked
It is fixed.
In one of which embodiment, the external equipment includes the movement that electric appliance, user are held in user family
At least one of power equipment in terminal or user family.
In one of which embodiment, the communication unit communicates with electric appliance in the user family bound in advance,
Checking information electric appliance into the user family bound in advance is sent, by checking information progress of the electric appliance in the family bound in advance to transmission
Verification, and return to verification result.
In one of which embodiment, family lan, the set-top box are created by the lan device of user
Connect into family lan, the communication unit is when being abnormal power-off or triggering user setting, with the office bound in advance
Domain net equipment communicates, and sends the checking information connected into family lan and is verified, and returns to verification result.
In one of which embodiment, the set-top box further includes:
Radio frequency identification unit, if receiving the subscriber identity information of external user identification apparatus transmission, if verification
By then being authorized to user.
The set-top box authorization method and set-top box of the present invention, set-top box are bound with the external equipment in user family,
When set-top box abnormal power-down or triggering user setting, tested with the external equipment of the binding transmission checking information that communicate
Card, authorizes if being verified, is otherwise locked, and set-top box is coordinated with exterior apparatus bound in user family and is verified,
So that even if set-top box and smart card at the same time be stolen, as cannot with user set external equipment carry out authentication and
It cannot be used by other people, so that effectively ensure that the security of set-top box and the uniqueness of user are not destroyed, strong guarantor
The rights and interests of paying customer are protected.
Brief description of the drawings
Fig. 1 is the flow chart of the set-top box authorization method in one embodiment;
Fig. 2 is the structure chart of the set-top box in one embodiment.
Embodiment
In order to make the purpose , technical scheme and advantage of the present invention be clearer, with reference to the accompanying drawings and embodiments, it is right
The present invention is further elaborated.It should be appreciated that specific embodiment described herein is only to explain the present invention, not
For limiting the present invention.
Fig. 1 is the flow chart of the set-top box authorization method in one embodiment.As shown in Figure 1, this method includes following step
Suddenly:
S10:When being abnormal power-off or triggering user setting, the external equipment with binding in advance is led to set-top box
Letter, sends checking information and is verified.
Used to prevent set-top box and smart card to be together stolen by other people, it is necessary to be tested when set-top box has exception
Card.In the embodiment, verification operation is carried out in set-top box abnormal power-down or triggering user setting.Under normal conditions, machine top
The normal power down of box is all to carry out shutdown power-off by the power key on remote controler or set-top box front control board, if not by being remotely controlled
Power supply on device or set-top box front control board carries out shutdown power-off, then it is abnormal to belong to power-off, illustrate in the presence of power failure suddenly or by
The situation of robber, needs to verify in such cases.Or user needs to be configured in set-top box according to oneself, if triggering is used
Family sets and is then also required to verify.Preferably, user setting is cycle verification time of user setting, i.e., how long is user setting interval
Time cycle needs are verified again, can so carry out periodic verification, other people are limited after stolen and is used.
Set-top box is bound with other external equipments in advance, and external equipment includes electric appliance, user in user family and held
Some mobile terminals either power equipment (such as Homeplug or intelligent socket) etc. in user family.In view of current family's intelligence
Energy electric appliance and the popularization and application at home intelligent center, and electric appliance should not be tampered in family, which is specially:Set-top box with
Electric appliance communicates in the user family bound in advance, checking information electric appliance into the user family bound in advance is sent, by tying up in advance
The checking information that electric appliance sends set-top box in fixed family is verified, and returns to verification result.Verification is so allowed for by family
Middle electric appliance is completed, rather than set-top box is verified, be stolen even if this allows for set-top box, due to being that electric appliance carries out in user family
Verification, set-top box can not be verified and be authorized, and greatly improve security and user's uniqueness.
Alternatively, in view of all having opened network in most of families, pass through lan device (such as cat or router etc.
Deng) family lan can be set up, set-top box may be coupled in family lan, if be once stolen, due to family LAN
The uniqueness and required distance of net, set-top box will not can connect to family lan.Then the step can also be specifically further:It is logical
The lan device for crossing user creates family lan, and set-top box is connected is being abnormal power-off into family lan, set-top box
Or during triggering user setting, communicate with the lan device bound in advance, send the verification connected into family lan
Information is verified, and returns to verification result.
To ensure set-top box and the security for the external device communication bound in advance, set-top box is by checking information using random
The encrypted mode of number is sent to external equipment after being encrypted, and is verified.
S20:If communicating successfully and being verified, user is authorized, otherwise user is locked.
If set-top box can succeed with the external device communication bound in advance in user family and be able to verify that by saying
The possibility very little that bright set-top box is stolen, then set-top box user can be authorized, user can normally watch sponsored program.
But if set-top box and the external device communication bound in advance be unsuccessful or verification cannot be by, illustrate set-top box with
The external equipment bound in advance has been detached from, it is impossible to is used cooperatively, the possibility that set-top box is stolen is very big, at this moment needs to user
Locked, user cannot normally watch sponsored program, so allow for have after set-top box and smart card are together stolen
Effect prevents other people from damaging the rights and interests of paying customer, and the safety of user's uniqueness and set-top box is effectively protected.
In addition, to prevent user itself behavior (such as removal of home or external equipment replacement etc.) mistake from causing user to be locked
After condition of pledging love occurs, the problem of user cannot unlock, this method further comprises:
S30:If set-top box receives the subscriber identity information of external user identification apparatus transmission, if being verified
Then user is authorized.
External user identification apparatus is to be placed on different from smart card in set-top box, but outside set-top box by with
The identification apparatus that family is held.For example, user identity card or NFC device etc..
Subscriber identity information is added (the privately owned numbers of CA in CA (ConditionalAccess) private data by set-top box front-end
It is used for according to be front end send for authorized user to encrypted charge program decryption), TS is generated by multiplexer after encryption
(TransportStream) flow, be transferred to television network broadcast.Subscriber identity information can be the identity of user and kinsfolk
Demonstrate,prove information, NFC (NearFieldCommunication) information etc..In set top box side, set-top box is needed by smart card pair
TS stream decryption is encrypted, it is necessary to first have to verify subscriber identity information before decryption, decryption is authorized if being verified.
In further embodiment, set-top box is provided with video identification area, external user identification apparatus (identity card or NFC
Equipment etc.) close to radio frequency identification area, verified by set-top box, user authorized if being verified, otherwise to user into
Row locking.
This method, set-top box and the external equipment in user family are bound, in set-top box abnormal power-down or triggering
During user setting, with the external equipment of binding communicate sends checking information and is verified, is authorized if being verified, otherwise
Locked, set-top box is coordinated with exterior apparatus bound in user family and is verified so that even if set-top box and smart card are same
When be stolen, as cannot with user set external equipment carry out authentication and cannot be used by other people, so as to have
The guarantee security of set-top box and the uniqueness of user of effect are not destroyed, the strong rights and interests for protecting paying customer.
Meanwhile the present invention also provides a kind of set-top box.As shown in Fig. 2, the set-top box includes:
Communication unit 100, when set-top box is being abnormal power-off or triggering user setting, with the outside bound in advance
Equipment communicates, and sends checking information and is verified.
Used to prevent set-top box and smart card to be together stolen by other people, it is necessary to be tested when set-top box has exception
Card.In the embodiment, communication unit 100 carries out verification operation in set-top box abnormal power-down or triggering user setting.Usual
Under situation, the normal power down of set-top box is all to carry out shutdown power-off by the power key on remote controler or set-top box front control board, such as
Fruit is not to carry out shutdown power-off by the power supply on remote controler or set-top box front control board, then belongs to power-off exception, illustrate in the presence of prominent
The situation for so having a power failure or being stolen, needs to verify in such cases.Or user needs to be set in set-top box according to oneself
Put, be also required to verify if user setting is triggered.Preferably, user setting is cycle verification time of user setting, that is, is used
Family sets interval, and how long the cycle needs to be verified again, can so carry out periodic verification, other are limited after stolen
People uses.
Set-top box is bound with other external equipments in advance, and external equipment includes electric appliance, user in user family and held
Some mobile terminals either power equipment (Homeplug or intelligent socket) etc. in user family.In view of current home intelligent electricity
Device and the popularization and application at home intelligent center, and electric appliance should not be tampered in family, communication unit 100 and the use bound in advance
Electric appliance communicates in the man of family, sends checking information electric appliance into the user family bound in advance, by electric appliance in the family bound in advance
The checking information sent to communication unit 100 is verified, and returns to verification result, so allows for verification by electric in user family
Device is completed, rather than set-top box is verified, is stolen even if this allows for set-top box, due to being that electric appliance is tested in user family
Card, set-top box can not be verified and be authorized, and greatly improve security and user's uniqueness.
Alternatively, in view of all having opened network in most of families, pass through lan device (such as cat or router etc.
Deng) family lan can be set up, set-top box may be coupled in family lan, if be once stolen, due to family LAN
The uniqueness and required distance of net, set-top box will not can connect to family lan.Then created by the lan device of user
Family lan, set-top box are connected into family lan, and set-top box is when being abnormal power-off or triggering user setting, communication
Unit 100 communicates with the lan device bound in advance, sends the checking information connected into family lan and is verified,
And return to verification result.
To ensure set-top box and the security for the external device communication bound in advance, communication unit 100 adopts checking information
External equipment is sent to after being encrypted with the mode of random number encryption, is verified.
Authorization control unit 200, if communicating successfully and being verified, authorizes user, and otherwise user is carried out
Locking.
If set-top box can succeed with the external device communication bound in advance in user family and be able to verify that by saying
The possibility very little that bright set-top box is stolen, then authorization control unit 200 user can be authorized, user can normally watch
Sponsored program.But if set-top box and the external device communication bound in advance are unsuccessful or verification cannot be by illustrating
Set-top box has been detached from the external equipment bound in advance, it is impossible to is used cooperatively, the possibility that set-top box is stolen is very big, at this moment awards
Power control unit 200 needs to lock user, and user cannot normally watch sponsored program, so allow for set-top box and intelligence
Can card be together stolen after can also effectively prevent other people from damaging the rights and interests of paying customer, to user's uniqueness and set-top box
Safety is effectively protected.
In addition, to prevent user itself behavior (such as removal of home or external equipment replacement etc.) mistake from causing user to be locked
After condition of pledging love occurs, the problem of user cannot unlock, which further comprises:
Radio frequency identification unit 300, if the subscriber identity information of external user identification apparatus transmission is received, if testing
Card is by then authorizing user.
External user identification apparatus is to be placed on different from smart card in set-top box, but outside set-top box by with
The identification apparatus that family is held.For example, user identity card or NFC device etc..
Subscriber identity information is added (the privately owned numbers of CA in CA (ConditionalAccess) private data by set-top box front-end
It is used for according to be front end send for authorized user to encrypted charge program decryption), TS is generated by multiplexer after encryption
(TransportStream) flow, be transferred to television network broadcast.Subscriber identity information can be the identity of user and kinsfolk
Demonstrate,prove information, NFC (NearFieldCommunication) information etc..In set top box side, set-top box is needed by smart card pair
TS stream decryption is encrypted, it is necessary to first have to verify subscriber identity information before decryption, decryption is authorized if being verified.
In further embodiment, external user identification apparatus (identity card or NFC device etc.) is close to radio frequency identification list
Member 300 is verified, user is authorized by authorization control unit 200 if being verified, otherwise user is locked.
The set-top box, is bound with the external equipment in user family, in abnormal power-down or triggering user setting, with
The external equipment of binding carries out communication transmission checking information and is verified, authorizes if being verified, is otherwise locked, by machine
Top box coordinates with exterior apparatus bound in user family to be verified so that, also can be because even if set-top box and smart card are stolen at the same time
External equipment for that cannot be set with user carries out authentication and cannot be used by other people, so as to effectively ensure set-top box
Security and the uniqueness of user be not destroyed, the strong rights and interests for protecting paying customer.
The set-top box authorization method and set-top box of the present invention, set-top box are bound with the external equipment in user family,
When set-top box abnormal power-down or triggering user setting, tested with the external equipment of the binding transmission checking information that communicate
Card, authorizes if being verified, is otherwise locked, and set-top box is coordinated with exterior apparatus bound in user family and is verified,
So that even if set-top box and smart card at the same time be stolen, as cannot with user set external equipment carry out authentication and
It cannot be used by other people, so that effectively ensure that the security of set-top box and the uniqueness of user are not destroyed, strong guarantor
The rights and interests of paying customer are protected.
The foregoing is merely a prefered embodiment of the invention, is not intended to limit the invention, it is all the present invention spirit and
All any modification, equivalent and improvement made within principle etc., should all be included in the protection scope of the present invention.
Claims (2)
1. a kind of set-top box authorization method, it is characterised in that include the following steps:
When set-top box is abnormal power-off or triggers cycle verification time of user setting, bound in advance with the set-top box
Lan device communicate, send the checking information connected into family lan and verified, and return to verification result;Its
In, the family lan is created by the lan device, and the set-top box is connected into the family lan in advance;
If communicating successfully and being verified, user is authorized, otherwise user is locked.
A kind of 2. set-top box, it is characterised in that including:
Communication unit, it is and described for when set-top box is abnormal power-off or triggers cycle verification time of user setting
The lan device that set-top box is bound in advance communicates, and sends the checking information connected into family lan and is verified, and
Return to verification result;Wherein, the family lan is created by the lan device, and the set-top box is connected into institute in advance
State family lan;
Authorization control unit, if for communicating successfully and being verified, authorizes user, otherwise user is locked
It is fixed.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410172963.XA CN103929674B (en) | 2014-04-25 | 2014-04-25 | A kind of set-top box authorization method and set-top box |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410172963.XA CN103929674B (en) | 2014-04-25 | 2014-04-25 | A kind of set-top box authorization method and set-top box |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103929674A CN103929674A (en) | 2014-07-16 |
CN103929674B true CN103929674B (en) | 2018-04-20 |
Family
ID=51147729
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410172963.XA Expired - Fee Related CN103929674B (en) | 2014-04-25 | 2014-04-25 | A kind of set-top box authorization method and set-top box |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103929674B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104244090B (en) * | 2014-09-04 | 2018-05-01 | 四川迪佳通电子有限公司 | A kind of program authorization method and system |
CN113422712B (en) * | 2021-06-21 | 2023-03-14 | 珠海格力电器股份有限公司 | Network distribution method, network distribution device, household equipment and computer readable storage medium |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020188866A1 (en) * | 2001-06-07 | 2002-12-12 | Jalaludeen Ca | Method and apparatus for protecting a device connected to a newtwork |
US7305555B2 (en) * | 2002-03-27 | 2007-12-04 | General Instrument Corporation | Smart card mating protocol |
US8298295B2 (en) * | 2007-09-28 | 2012-10-30 | Intel Corporation | Theft-deterrence method and apparatus for processor based devices |
US8181032B2 (en) * | 2008-05-13 | 2012-05-15 | Intel Corporation | Method and apparatus with chipset-based protection for local and remote authentication of booting from peripheral devices |
US8321916B2 (en) * | 2008-12-19 | 2012-11-27 | Intel Corporation | Method, apparatus and system for remote management of mobile devices |
US20140020081A1 (en) * | 2012-07-16 | 2014-01-16 | Qualcomm Incorporated | Portable Token Device |
-
2014
- 2014-04-25 CN CN201410172963.XA patent/CN103929674B/en not_active Expired - Fee Related
Also Published As
Publication number | Publication date |
---|---|
CN103929674A (en) | 2014-07-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103227776B (en) | Configuration method, configuration device, computer program product and control system | |
CN106898065B (en) | Unlocking method of intelligent door lock | |
CN101521886B (en) | Method and device for authenticating terminal and telecommunication smart card | |
CN105656941B (en) | Identification authentication system and method | |
CN106101147A (en) | A kind of method and system realizing smart machine and remote terminal dynamic encryption communication | |
CN105553924B (en) | A kind of safety protecting method, smart home and system applied to smart home | |
CN102495983B (en) | Method for encrypting and decrypting data of intelligent mobile terminal in real time | |
CN103793960A (en) | Method for mobile key service | |
CN103136819A (en) | Unlocking method for door control system based on mobile terminal and mobile terminal | |
CN101068143B (en) | Network equipment identification method | |
CN104484926A (en) | Intelligent door lock management system based on wireless control of mobile phone | |
US11822679B2 (en) | Host computer securitization architecture | |
CN109618344A (en) | A kind of secure connection method and device of wireless monitoring equipment | |
CN102333068B (en) | SSH and SFTP (Secure Shell and Ssh File Transfer Protocol)-based tunnel intelligent management and control system and method | |
CN201336704Y (en) | Remote video monitoring system | |
CN103929674B (en) | A kind of set-top box authorization method and set-top box | |
CN104361667B (en) | A kind of access control system and its entrance guard authorization method based on 4G communications | |
CN103200562A (en) | Communication terminal locking method and communication terminal | |
CN104469752B (en) | A kind of encryption method, device and terminal | |
CN107046525A (en) | One kind recognizes matching security system nearby based on intelligent hardware devices | |
CN102833067B (en) | Trilateral authentication method and system and authentication state management method of terminal equipment | |
CN111898167A (en) | External terminal protection equipment and protection system including identity information verification | |
CN101902610A (en) | Method for realizing secure communication between IPTV set top box and smart card | |
CN101478397B (en) | Method and system for authentication of public telephone card and public telephone machine | |
CN104469422B (en) | Set top box ad system and its implementation with security mechanism |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB03 | Change of inventor or designer information | ||
CB03 | Change of inventor or designer information |
Inventor after: Tang Xia Inventor after: Liu Han Inventor before: Liu Han |
|
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20180420 Termination date: 20200425 |