CN103929674B - A kind of set-top box authorization method and set-top box - Google Patents

A kind of set-top box authorization method and set-top box Download PDF

Info

Publication number
CN103929674B
CN103929674B CN201410172963.XA CN201410172963A CN103929674B CN 103929674 B CN103929674 B CN 103929674B CN 201410172963 A CN201410172963 A CN 201410172963A CN 103929674 B CN103929674 B CN 103929674B
Authority
CN
China
Prior art keywords
top box
user
verified
family
bound
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201410172963.XA
Other languages
Chinese (zh)
Other versions
CN103929674A (en
Inventor
汤霞
刘韩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Jiuzhou Electric Appliance Co Ltd
Original Assignee
Shenzhen Jiuzhou Electric Appliance Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Jiuzhou Electric Appliance Co Ltd filed Critical Shenzhen Jiuzhou Electric Appliance Co Ltd
Priority to CN201410172963.XA priority Critical patent/CN103929674B/en
Publication of CN103929674A publication Critical patent/CN103929674A/en
Application granted granted Critical
Publication of CN103929674B publication Critical patent/CN103929674B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Small-Scale Networks (AREA)
  • Alarm Systems (AREA)

Abstract

The present invention relates to a kind of set-top box authorization method and set-top box.This method includes:Set-top box communicates with the external equipment bound in advance when being abnormal power-off or triggering user setting, sends checking information and verified;If communicating successfully and being verified, user is authorized, otherwise user is locked.The present invention is bound set-top box and the external equipment in user family, in set-top box abnormal power-down or triggering user setting, with the external equipment of binding communicate and send checking information and verified, authorized if being verified, otherwise locked, set-top box is coordinated with exterior apparatus bound in user family and is verified, so that even if set-top box and smart card are stolen at the same time, as the external equipment that cannot be set with user carries out authentication and cannot be used by other people, so as to effectively ensure that the security of set-top box and the uniqueness of user are not destroyed, the strong rights and interests for protecting paying customer.

Description

A kind of set-top box authorization method and set-top box
Technical field
The present invention relates to the communications field, more particularly to a kind of set-top box authorization method and set-top box.
Background technology
At present.Set-top box plays the terminal of TV programme as control, is used in many families.
In a region, local TV and Radio Service distributes different set-top box and smart card for each user, uses Set-top box and the smart card method that uses of pairing control the broadcasting of charge program.But when set-top box and smart card while quilt After robber, since set-top box and smart card still match use, still it can be licensed in other families of this area, this is not only The security and user's uniqueness of set-top box are destroyed, has also greatly invaded the rights and interests of paying customer.
The content of the invention
In view of this, it is necessary to be stolen at the same time for above-mentioned set-top box and smart card, destroy set-top box security and use A kind of the problem of family uniqueness, there is provided set-top box authorization method.
In addition, also provide a kind of set-top box for ensureing set-top box security and user's uniqueness.
A kind of set-top box authorization method, includes the following steps:
Set-top box communicates when being abnormal power-off or triggering user setting with the external equipment bound in advance, Checking information is sent to be verified;
If communicating successfully and being verified, user is authorized, otherwise user is locked.
In one of which embodiment, the external equipment includes the movement that electric appliance, user are held in user family At least one of power equipment in terminal or user family.
It is described to communicate with external equipment that is binding in advance in one of which embodiment, send checking information The step of being verified be specially:
Set-top box communicates with electric appliance in the user family bound in advance, sends checking information to the user family bound in advance Middle electric appliance, the checking information sent by electric appliance in the family bound in advance to set-top box is verified, and returns to verification result.
It is described to communicate with external equipment that is binding in advance in one of which embodiment, send checking information The step of being verified be specially:
Family lan is created by the lan device of user, set-top box is connected to be sent out into family lan, set-top box When raw abnormal power-down or triggering user setting, communicate with the lan device bound in advance, transmission is connected into office of family The checking information of domain net is verified, and returns to verification result.
In one of which embodiment, the method further includes:
If set-top box receive external user identification apparatus transmission subscriber identity information, if be verified it is right User is authorized.
A kind of set-top box, including:
Communication unit, when set-top box is being abnormal power-off or triggering user setting, the outside with binding in advance is set It is standby to communicate, send checking information and verified;
Authorization control unit, if communicating successfully and being verified, authorizes user, otherwise user is locked It is fixed.
In one of which embodiment, the external equipment includes the movement that electric appliance, user are held in user family At least one of power equipment in terminal or user family.
In one of which embodiment, the communication unit communicates with electric appliance in the user family bound in advance, Checking information electric appliance into the user family bound in advance is sent, by checking information progress of the electric appliance in the family bound in advance to transmission Verification, and return to verification result.
In one of which embodiment, family lan, the set-top box are created by the lan device of user Connect into family lan, the communication unit is when being abnormal power-off or triggering user setting, with the office bound in advance Domain net equipment communicates, and sends the checking information connected into family lan and is verified, and returns to verification result.
In one of which embodiment, the set-top box further includes:
Radio frequency identification unit, if receiving the subscriber identity information of external user identification apparatus transmission, if verification By then being authorized to user.
The set-top box authorization method and set-top box of the present invention, set-top box are bound with the external equipment in user family, When set-top box abnormal power-down or triggering user setting, tested with the external equipment of the binding transmission checking information that communicate Card, authorizes if being verified, is otherwise locked, and set-top box is coordinated with exterior apparatus bound in user family and is verified, So that even if set-top box and smart card at the same time be stolen, as cannot with user set external equipment carry out authentication and It cannot be used by other people, so that effectively ensure that the security of set-top box and the uniqueness of user are not destroyed, strong guarantor The rights and interests of paying customer are protected.
Brief description of the drawings
Fig. 1 is the flow chart of the set-top box authorization method in one embodiment;
Fig. 2 is the structure chart of the set-top box in one embodiment.
Embodiment
In order to make the purpose , technical scheme and advantage of the present invention be clearer, with reference to the accompanying drawings and embodiments, it is right The present invention is further elaborated.It should be appreciated that specific embodiment described herein is only to explain the present invention, not For limiting the present invention.
Fig. 1 is the flow chart of the set-top box authorization method in one embodiment.As shown in Figure 1, this method includes following step Suddenly:
S10:When being abnormal power-off or triggering user setting, the external equipment with binding in advance is led to set-top box Letter, sends checking information and is verified.
Used to prevent set-top box and smart card to be together stolen by other people, it is necessary to be tested when set-top box has exception Card.In the embodiment, verification operation is carried out in set-top box abnormal power-down or triggering user setting.Under normal conditions, machine top The normal power down of box is all to carry out shutdown power-off by the power key on remote controler or set-top box front control board, if not by being remotely controlled Power supply on device or set-top box front control board carries out shutdown power-off, then it is abnormal to belong to power-off, illustrate in the presence of power failure suddenly or by The situation of robber, needs to verify in such cases.Or user needs to be configured in set-top box according to oneself, if triggering is used Family sets and is then also required to verify.Preferably, user setting is cycle verification time of user setting, i.e., how long is user setting interval Time cycle needs are verified again, can so carry out periodic verification, other people are limited after stolen and is used.
Set-top box is bound with other external equipments in advance, and external equipment includes electric appliance, user in user family and held Some mobile terminals either power equipment (such as Homeplug or intelligent socket) etc. in user family.In view of current family's intelligence Energy electric appliance and the popularization and application at home intelligent center, and electric appliance should not be tampered in family, which is specially:Set-top box with Electric appliance communicates in the user family bound in advance, checking information electric appliance into the user family bound in advance is sent, by tying up in advance The checking information that electric appliance sends set-top box in fixed family is verified, and returns to verification result.Verification is so allowed for by family Middle electric appliance is completed, rather than set-top box is verified, be stolen even if this allows for set-top box, due to being that electric appliance carries out in user family Verification, set-top box can not be verified and be authorized, and greatly improve security and user's uniqueness.
Alternatively, in view of all having opened network in most of families, pass through lan device (such as cat or router etc. Deng) family lan can be set up, set-top box may be coupled in family lan, if be once stolen, due to family LAN The uniqueness and required distance of net, set-top box will not can connect to family lan.Then the step can also be specifically further:It is logical The lan device for crossing user creates family lan, and set-top box is connected is being abnormal power-off into family lan, set-top box Or during triggering user setting, communicate with the lan device bound in advance, send the verification connected into family lan Information is verified, and returns to verification result.
To ensure set-top box and the security for the external device communication bound in advance, set-top box is by checking information using random The encrypted mode of number is sent to external equipment after being encrypted, and is verified.
S20:If communicating successfully and being verified, user is authorized, otherwise user is locked.
If set-top box can succeed with the external device communication bound in advance in user family and be able to verify that by saying The possibility very little that bright set-top box is stolen, then set-top box user can be authorized, user can normally watch sponsored program. But if set-top box and the external device communication bound in advance be unsuccessful or verification cannot be by, illustrate set-top box with The external equipment bound in advance has been detached from, it is impossible to is used cooperatively, the possibility that set-top box is stolen is very big, at this moment needs to user Locked, user cannot normally watch sponsored program, so allow for have after set-top box and smart card are together stolen Effect prevents other people from damaging the rights and interests of paying customer, and the safety of user's uniqueness and set-top box is effectively protected.
In addition, to prevent user itself behavior (such as removal of home or external equipment replacement etc.) mistake from causing user to be locked After condition of pledging love occurs, the problem of user cannot unlock, this method further comprises:
S30:If set-top box receives the subscriber identity information of external user identification apparatus transmission, if being verified Then user is authorized.
External user identification apparatus is to be placed on different from smart card in set-top box, but outside set-top box by with The identification apparatus that family is held.For example, user identity card or NFC device etc..
Subscriber identity information is added (the privately owned numbers of CA in CA (ConditionalAccess) private data by set-top box front-end It is used for according to be front end send for authorized user to encrypted charge program decryption), TS is generated by multiplexer after encryption (TransportStream) flow, be transferred to television network broadcast.Subscriber identity information can be the identity of user and kinsfolk Demonstrate,prove information, NFC (NearFieldCommunication) information etc..In set top box side, set-top box is needed by smart card pair TS stream decryption is encrypted, it is necessary to first have to verify subscriber identity information before decryption, decryption is authorized if being verified. In further embodiment, set-top box is provided with video identification area, external user identification apparatus (identity card or NFC Equipment etc.) close to radio frequency identification area, verified by set-top box, user authorized if being verified, otherwise to user into Row locking.
This method, set-top box and the external equipment in user family are bound, in set-top box abnormal power-down or triggering During user setting, with the external equipment of binding communicate sends checking information and is verified, is authorized if being verified, otherwise Locked, set-top box is coordinated with exterior apparatus bound in user family and is verified so that even if set-top box and smart card are same When be stolen, as cannot with user set external equipment carry out authentication and cannot be used by other people, so as to have The guarantee security of set-top box and the uniqueness of user of effect are not destroyed, the strong rights and interests for protecting paying customer.
Meanwhile the present invention also provides a kind of set-top box.As shown in Fig. 2, the set-top box includes:
Communication unit 100, when set-top box is being abnormal power-off or triggering user setting, with the outside bound in advance Equipment communicates, and sends checking information and is verified.
Used to prevent set-top box and smart card to be together stolen by other people, it is necessary to be tested when set-top box has exception Card.In the embodiment, communication unit 100 carries out verification operation in set-top box abnormal power-down or triggering user setting.Usual Under situation, the normal power down of set-top box is all to carry out shutdown power-off by the power key on remote controler or set-top box front control board, such as Fruit is not to carry out shutdown power-off by the power supply on remote controler or set-top box front control board, then belongs to power-off exception, illustrate in the presence of prominent The situation for so having a power failure or being stolen, needs to verify in such cases.Or user needs to be set in set-top box according to oneself Put, be also required to verify if user setting is triggered.Preferably, user setting is cycle verification time of user setting, that is, is used Family sets interval, and how long the cycle needs to be verified again, can so carry out periodic verification, other are limited after stolen People uses.
Set-top box is bound with other external equipments in advance, and external equipment includes electric appliance, user in user family and held Some mobile terminals either power equipment (Homeplug or intelligent socket) etc. in user family.In view of current home intelligent electricity Device and the popularization and application at home intelligent center, and electric appliance should not be tampered in family, communication unit 100 and the use bound in advance Electric appliance communicates in the man of family, sends checking information electric appliance into the user family bound in advance, by electric appliance in the family bound in advance The checking information sent to communication unit 100 is verified, and returns to verification result, so allows for verification by electric in user family Device is completed, rather than set-top box is verified, is stolen even if this allows for set-top box, due to being that electric appliance is tested in user family Card, set-top box can not be verified and be authorized, and greatly improve security and user's uniqueness.
Alternatively, in view of all having opened network in most of families, pass through lan device (such as cat or router etc. Deng) family lan can be set up, set-top box may be coupled in family lan, if be once stolen, due to family LAN The uniqueness and required distance of net, set-top box will not can connect to family lan.Then created by the lan device of user Family lan, set-top box are connected into family lan, and set-top box is when being abnormal power-off or triggering user setting, communication Unit 100 communicates with the lan device bound in advance, sends the checking information connected into family lan and is verified, And return to verification result.
To ensure set-top box and the security for the external device communication bound in advance, communication unit 100 adopts checking information External equipment is sent to after being encrypted with the mode of random number encryption, is verified.
Authorization control unit 200, if communicating successfully and being verified, authorizes user, and otherwise user is carried out Locking.
If set-top box can succeed with the external device communication bound in advance in user family and be able to verify that by saying The possibility very little that bright set-top box is stolen, then authorization control unit 200 user can be authorized, user can normally watch Sponsored program.But if set-top box and the external device communication bound in advance are unsuccessful or verification cannot be by illustrating Set-top box has been detached from the external equipment bound in advance, it is impossible to is used cooperatively, the possibility that set-top box is stolen is very big, at this moment awards Power control unit 200 needs to lock user, and user cannot normally watch sponsored program, so allow for set-top box and intelligence Can card be together stolen after can also effectively prevent other people from damaging the rights and interests of paying customer, to user's uniqueness and set-top box Safety is effectively protected.
In addition, to prevent user itself behavior (such as removal of home or external equipment replacement etc.) mistake from causing user to be locked After condition of pledging love occurs, the problem of user cannot unlock, which further comprises:
Radio frequency identification unit 300, if the subscriber identity information of external user identification apparatus transmission is received, if testing Card is by then authorizing user.
External user identification apparatus is to be placed on different from smart card in set-top box, but outside set-top box by with The identification apparatus that family is held.For example, user identity card or NFC device etc..
Subscriber identity information is added (the privately owned numbers of CA in CA (ConditionalAccess) private data by set-top box front-end It is used for according to be front end send for authorized user to encrypted charge program decryption), TS is generated by multiplexer after encryption (TransportStream) flow, be transferred to television network broadcast.Subscriber identity information can be the identity of user and kinsfolk Demonstrate,prove information, NFC (NearFieldCommunication) information etc..In set top box side, set-top box is needed by smart card pair TS stream decryption is encrypted, it is necessary to first have to verify subscriber identity information before decryption, decryption is authorized if being verified. In further embodiment, external user identification apparatus (identity card or NFC device etc.) is close to radio frequency identification list Member 300 is verified, user is authorized by authorization control unit 200 if being verified, otherwise user is locked.
The set-top box, is bound with the external equipment in user family, in abnormal power-down or triggering user setting, with The external equipment of binding carries out communication transmission checking information and is verified, authorizes if being verified, is otherwise locked, by machine Top box coordinates with exterior apparatus bound in user family to be verified so that, also can be because even if set-top box and smart card are stolen at the same time External equipment for that cannot be set with user carries out authentication and cannot be used by other people, so as to effectively ensure set-top box Security and the uniqueness of user be not destroyed, the strong rights and interests for protecting paying customer.
The set-top box authorization method and set-top box of the present invention, set-top box are bound with the external equipment in user family, When set-top box abnormal power-down or triggering user setting, tested with the external equipment of the binding transmission checking information that communicate Card, authorizes if being verified, is otherwise locked, and set-top box is coordinated with exterior apparatus bound in user family and is verified, So that even if set-top box and smart card at the same time be stolen, as cannot with user set external equipment carry out authentication and It cannot be used by other people, so that effectively ensure that the security of set-top box and the uniqueness of user are not destroyed, strong guarantor The rights and interests of paying customer are protected.
The foregoing is merely a prefered embodiment of the invention, is not intended to limit the invention, it is all the present invention spirit and All any modification, equivalent and improvement made within principle etc., should all be included in the protection scope of the present invention.

Claims (2)

1. a kind of set-top box authorization method, it is characterised in that include the following steps:
When set-top box is abnormal power-off or triggers cycle verification time of user setting, bound in advance with the set-top box Lan device communicate, send the checking information connected into family lan and verified, and return to verification result;Its In, the family lan is created by the lan device, and the set-top box is connected into the family lan in advance;
If communicating successfully and being verified, user is authorized, otherwise user is locked.
A kind of 2. set-top box, it is characterised in that including:
Communication unit, it is and described for when set-top box is abnormal power-off or triggers cycle verification time of user setting The lan device that set-top box is bound in advance communicates, and sends the checking information connected into family lan and is verified, and Return to verification result;Wherein, the family lan is created by the lan device, and the set-top box is connected into institute in advance State family lan;
Authorization control unit, if for communicating successfully and being verified, authorizes user, otherwise user is locked It is fixed.
CN201410172963.XA 2014-04-25 2014-04-25 A kind of set-top box authorization method and set-top box Expired - Fee Related CN103929674B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410172963.XA CN103929674B (en) 2014-04-25 2014-04-25 A kind of set-top box authorization method and set-top box

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410172963.XA CN103929674B (en) 2014-04-25 2014-04-25 A kind of set-top box authorization method and set-top box

Publications (2)

Publication Number Publication Date
CN103929674A CN103929674A (en) 2014-07-16
CN103929674B true CN103929674B (en) 2018-04-20

Family

ID=51147729

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410172963.XA Expired - Fee Related CN103929674B (en) 2014-04-25 2014-04-25 A kind of set-top box authorization method and set-top box

Country Status (1)

Country Link
CN (1) CN103929674B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104244090B (en) * 2014-09-04 2018-05-01 四川迪佳通电子有限公司 A kind of program authorization method and system
CN113422712B (en) * 2021-06-21 2023-03-14 珠海格力电器股份有限公司 Network distribution method, network distribution device, household equipment and computer readable storage medium

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020188866A1 (en) * 2001-06-07 2002-12-12 Jalaludeen Ca Method and apparatus for protecting a device connected to a newtwork
US7305555B2 (en) * 2002-03-27 2007-12-04 General Instrument Corporation Smart card mating protocol
US8298295B2 (en) * 2007-09-28 2012-10-30 Intel Corporation Theft-deterrence method and apparatus for processor based devices
US8181032B2 (en) * 2008-05-13 2012-05-15 Intel Corporation Method and apparatus with chipset-based protection for local and remote authentication of booting from peripheral devices
US8321916B2 (en) * 2008-12-19 2012-11-27 Intel Corporation Method, apparatus and system for remote management of mobile devices
US20140020081A1 (en) * 2012-07-16 2014-01-16 Qualcomm Incorporated Portable Token Device

Also Published As

Publication number Publication date
CN103929674A (en) 2014-07-16

Similar Documents

Publication Publication Date Title
CN103227776B (en) Configuration method, configuration device, computer program product and control system
CN106898065B (en) Unlocking method of intelligent door lock
CN101521886B (en) Method and device for authenticating terminal and telecommunication smart card
CN105656941B (en) Identification authentication system and method
CN106101147A (en) A kind of method and system realizing smart machine and remote terminal dynamic encryption communication
CN105553924B (en) A kind of safety protecting method, smart home and system applied to smart home
CN102495983B (en) Method for encrypting and decrypting data of intelligent mobile terminal in real time
CN103793960A (en) Method for mobile key service
CN103136819A (en) Unlocking method for door control system based on mobile terminal and mobile terminal
CN101068143B (en) Network equipment identification method
CN104484926A (en) Intelligent door lock management system based on wireless control of mobile phone
US11822679B2 (en) Host computer securitization architecture
CN109618344A (en) A kind of secure connection method and device of wireless monitoring equipment
CN102333068B (en) SSH and SFTP (Secure Shell and Ssh File Transfer Protocol)-based tunnel intelligent management and control system and method
CN103929674B (en) A kind of set-top box authorization method and set-top box
CN104361667B (en) A kind of access control system and its entrance guard authorization method based on 4G communications
CN103200562A (en) Communication terminal locking method and communication terminal
CN104469752B (en) A kind of encryption method, device and terminal
CN103324971B (en) A kind of smart card system and dynamic key thereof upgrade authentication method
CN107046525A (en) One kind recognizes matching security system nearby based on intelligent hardware devices
CN102833067B (en) Trilateral authentication method and system and authentication state management method of terminal equipment
CN106027258A (en) TPM-based household appliance remote control method
CN111898167A (en) External terminal protection equipment and protection system including identity information verification
CN101902610A (en) Method for realizing secure communication between IPTV set top box and smart card
CN101478397B (en) Method and system for authentication of public telephone card and public telephone machine

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB03 Change of inventor or designer information
CB03 Change of inventor or designer information

Inventor after: Tang Xia

Inventor after: Liu Han

Inventor before: Liu Han

GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20180420

Termination date: 20200425