CN103929680B - Set top box encryption program descrambling method and set top box - Google Patents
Set top box encryption program descrambling method and set top box Download PDFInfo
- Publication number
- CN103929680B CN103929680B CN201410124040.7A CN201410124040A CN103929680B CN 103929680 B CN103929680 B CN 103929680B CN 201410124040 A CN201410124040 A CN 201410124040A CN 103929680 B CN103929680 B CN 103929680B
- Authority
- CN
- China
- Prior art keywords
- top box
- set top
- program
- instruction
- descrambling
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Landscapes
- Storage Device Security (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
Abstract
The invention relates to a set top box encryption program descrambling method and a set top box. The method includes the following steps that for a playing program, an encryption mode of the program is analyzed and acquired; whether the encryption mode of the program is a BISS encryption mode or not is judged, if yes, the descrambling mode of the set top box is set as an non-advanced security descrambling mode, and then BISS descrambling is conducted, and if not, the descrambling mode of the set top box is set as an advanced security descrambling mode. By the adoption of the set top box encryption program descrambling method and the set top box, the corresponding descrambling modes are set according to the different encryption modes, on the premise that security is guaranteed, audience can watch the BISS encrypted program and can watch more television programs without being limited by encryption modes, and therefore great convenience and good experience are brought to users.
Description
Technical field
The present invention relates to the communications field, more particularly to a kind of Set Top Box ciphered program de-scrambling method and Set Top Box.
Background technology
BISS, full name BasicInteroperableScramblingSystem, are used in digital television system
A kind of method for scrambling, is a kind of satellite broadcasting encryption system, is also the method for scrambling that a kind of key is fixed, and some programs are adopted
BISS cipher modes are encrypted.
At present, it is to ensure security, Set Top Box has mostly been advanced security Set Top Box.In advanced security Set Top Box,
Condition reception(CA)Key be only in plain text, and to descramble and be set to advanced security in master chip with encrypted test mode transmission
The Set Top Box of pattern, is directly arranged the key of plaintext to descrambler, it is impossible to enough that program is descrambled.But, BISS encryptions
Mode is plaintext, and this results in advanced security Set Top Box and the BISS ciphered programs of BISS cipher modes encryption can not be solved
Disturb so that user can not watch program, to user great inconvenience is brought.
The content of the invention
In view of this, it is necessary to for asking that above-mentioned advanced security Set Top Box can not be descrambled to BISS ciphered programs
A kind of topic, there is provided Set Top Box ciphered program de-scrambling method.
Additionally, also providing a kind of Set Top Box.
A kind of Set Top Box ciphered program de-scrambling method, comprises the steps:
For the program played, parsing obtains the cipher mode of program;
Whether the cipher mode for judging program is BISS cipher modes, if the descrambling pattern of Set Top Box is set to into not high
Level security descrambles pattern, carries out BISS descramblings, otherwise the descrambling pattern of Set Top Box is set to into advanced security descrambling pattern.
In one of which embodiment, described for the program played, parsing obtains the step of the cipher mode of program
It is rapid to be specially:
Pmt table in the frequency of inquiry program place, parsing pmt table conditional reception system mark, according to condition reception system
The corresponding cipher mode of system mark, obtains the cipher mode of program.
It is described that the descrambling pattern of Set Top Box is set to into non-advanced security descrambling pattern in one of which embodiment
The step of be specially:
The first setting instruction of encryption is sent, decryption obtains first and arranges instruction, and instruction is arranged by Set Top Box according to first
Descrambling pattern be set to non-advanced security descrambling pattern;
It is described by the descrambling pattern of Set Top Box be set to advanced security descrambling pattern the step of be specially:
The second setting instruction of encryption is sent, decryption obtains second and arranges instruction, and instruction is arranged by Set Top Box according to second
Descrambling pattern be set to advanced security descrambling pattern.
It is described that the descrambling pattern of Set Top Box is set to into non-advanced security descrambling pattern in one of which embodiment
The step of be specially:
The first instruction functions in memory are called, the first setting is randomly generated and is instructed and store;Call the first encryption letter
Number, is encrypted to the first setting instruction, and produces the effective order mark being associated with the first setting instruction of storage;
When arranging, the first setting instruction to encrypting is decrypted, and according to effective order identifier lookup to storage
First arranges instruction, and the first setting instruction of decryption is compared with the first setting instruction of storage, will if both matchings
The descrambling pattern of Set Top Box is set to non-advanced security descrambling pattern, is not otherwise configured for illegal instruction.
It is described that the descrambling pattern of Set Top Box is set to into advanced security descrambling pattern in one of which embodiment
Step is specially:
The second instruction functions in memory are called, the second setting is randomly generated and is instructed and store;Call the second encryption letter
Number, is encrypted to the second setting instruction, and produces the effective order mark being associated with the second setting instruction of storage;Setting
When putting, the second setting instruction to encrypting is decrypted, and according to the second setting instruction of effective order identifier lookup to storage,
Second setting instruction of decryption is compared with the second setting instruction of storage, by the descrambling mould of Set Top Box if both matchings
Formula is set to advanced security descrambling pattern, is not otherwise configured for illegal instruction.
A kind of Set Top Box, including:
Cipher mode acquiring unit, for the program played, parsing obtains the cipher mode of program;
Mode setting unit, whether the cipher mode for judging program is BISS cipher modes, if then by the solution of Set Top Box
The pattern of disturbing is set to non-advanced security descrambling pattern, carries out BISS descramblings, is otherwise set to the descrambling pattern of Set Top Box senior
Safety descrambling pattern.
In one of which embodiment, the pmt table in the cipher mode acquiring unit inquiry program place frequency,
Parsing pmt table conditional reception system mark, according to condition receiving system corresponding cipher mode is identified, and obtains the encryption of program
Mode.
In one of which embodiment, Set Top Box sends the first setting instruction of encryption, mode setting unit decryption
Obtain first and instruction is set, instruction is set according to first the descrambling pattern of Set Top Box is set to into non-advanced security descrambling pattern;
Set Top Box sends the second setting instruction of encryption, and mode setting unit decryption obtains second and arranges instruction, according to the
Two arrange instruction is set to advanced security descrambling pattern by the descrambling pattern of Set Top Box.
In one of which embodiment, the first instruction functions in memory are called, randomly generate the first setting and refer to
Make and store;The first encryption function is called, the first setting instruction is encrypted, and produce the first setting instruction phase with storage
The effective order mark of association;
When arranging, the mode setting unit is decrypted to the first setting instruction encrypted, and according to effective order
Identifier lookup is compared the first setting instruction of decryption with the first setting instruction of storage to the first setting instruction of storage
Compared with, the descrambling pattern of Set Top Box is set to into non-advanced security descrambling pattern if both matchings, otherwise do not enter for illegal instruction
Row is arranged.
In one of which embodiment, the second instruction functions in memory are called, randomly generate the second setting and refer to
Make and store;The second encryption function is called, the second setting instruction is encrypted, and produce the second setting instruction phase with storage
The effective order mark of association;
When arranging, the mode setting unit is decrypted to the second setting instruction encrypted, and according to effective order
Identifier lookup is compared the second setting instruction of decryption with the second setting instruction of storage to the second setting instruction of storage
Compared with, the descrambling pattern of Set Top Box is set to into advanced security descrambling pattern if both matchings, otherwise do not carry out for illegal instruction
Arrange.
The method of the present invention and Set Top Box, the cipher mode of program is obtained when playing to program, and then program is added
Close mode judged, the descrambling pattern of Set Top Box is set to into non-senior peace if program encryption mode is BISS cipher modes
Complete solution disturbs pattern, carries out BISS descramblings, is otherwise provided as advanced security descrambling pattern, arranges corresponding according to different cipher modes
Descrambling pattern, ensure security under the premise of enable a viewer to watch BISS encryption program so that spectators can not by plus
The restriction of close mode, watches more TV programme, brings great convenience to user and experiences.
Description of the drawings
Fig. 1 is the flow chart of the Set Top Box ciphered program de-scrambling method in one embodiment;
Fig. 2 is the structure chart of the Set Top Box in one embodiment.
Specific embodiment
In order that the objects, technical solutions and advantages of the present invention become more apparent, it is right below in conjunction with drawings and Examples
The present invention is further elaborated.It should be appreciated that specific embodiment described herein is only to explain the present invention, not
For limiting the present invention.
Fig. 1 is the flow chart of the Set Top Box ciphered program de-scrambling method in one embodiment.The method includes:
S10:For the program played, parsing obtains the cipher mode of program.
The method, is not that directly program is descrambled to the program played, but first parsing obtains adding for the program
Close mode, understands which kind of manner of decryption the program uses.In this embodiment, the step is specially:Inquiry program is located
Pmt table in frequency(Program Map Table), parsing pmt table conditional reception system mark(CA_system_ID), according to condition
Reception system identifies corresponding cipher mode, obtains the cipher mode of program.
S20:Whether the cipher mode for judging program is BISS cipher modes, if then execution step S30, otherwise performs step
Rapid S40.
After the cipher mode that parsing obtains program, the cipher mode of the program is judged, judge the program
Whether cipher mode belongs to BISS cipher modes, and according to the difference of cipher mode different operations are taken.If cipher mode is
BISS cipher modes, otherwise execution step S30, execution step S40.In this embodiment, if CA_system_ID is 0x2600,
Then cipher mode is BISS cipher modes.
S30:The descrambling pattern of Set Top Box is set to into non-advanced security descrambling pattern, BISS descramblings are carried out.
If the cipher mode of program be BISS cipher modes, due to BISS cipher modes be plain text encryption mode, Set Top Box
Descrambling pattern can not be descrambled under advanced security pattern, it is impossible to watch program, if want watch program need to Set Top Box
Descrambling pattern be configured, the descrambling pattern of Set Top Box is set to into non-advanced security descrambling pattern, in non-advanced security solution
Disturb and carry out under pattern BISS descramblings, BISS cipher modes can be descrambled.
Ask due to the descrambling pattern of Set Top Box being set to into non-advanced security descrambling pattern being related to the security of Set Top Box
Topic, is the security for ensureing Set Top Box, prevents from suffering that malicious attack causes Set Top Box advanced security pattern to be destroyed, setting up procedure
Needs are carried out under the conditions of encryption.In this embodiment, the descrambling pattern of Set Top Box is set to into non-advanced security descrambling pattern
The step of be specially:The first setting instruction of encryption is sent, decryption obtains first and arranges instruction, and instruction is arranged by machine according to first
The descrambling pattern of top box is set to non-advanced security descrambling pattern.
In further embodiment, the step is further:The first instruction functions in memory are called, it is random to produce
Raw first setting is instructed and stored;Call the first encryption function, the first setting instruction be encrypted, and produce with storage the
One arranges the associated effective order mark of instruction;When arranging, the first setting instruction to encrypting is decrypted, and according to having
Active command identifier lookup to storage first setting instruction, by decryption first setting instruction with storage first arrange instruct into
Row compares, and the descrambling pattern of Set Top Box is set to into non-advanced security descrambling pattern if both matchings, is otherwise illegal instruction
It is not configured.
Illustrate in a concrete fashion, the step:Set Top Box calls GenHLOffCmd () function(First instruction functions),
Randomly generate one group of command sequence group(First arranges instruction), in being stored in g_HLOffCmd [M] [N].
Call GetHLOffCmd ()(First encryption function), the command sequence for obtaining an encryption is encrypted, it is stored in
In aHLOffCmd [N], meanwhile, produce an effective order and identify nAvialbleID.It is first right when operation is configured
AHLOffCmd is decrypted, and finds from g_HLOffCmd [M] [N] effectively further according to effective order mark nAvialbleID
The first setting instruction, be then compared with the aHLOffCmd after decryption, if it does, then by the descrambling pattern of Set Top Box
It is set to non-advanced security descrambling pattern.
S40:The descrambling pattern of Set Top Box is set to into advanced security descrambling pattern.
If the non-BISS cipher modes of the cipher mode of program, Set Top Box need not carry out BISS descramblings, the descrambling of Set Top Box
Pattern just must can be effectively ensured safety under advanced security pattern, then the descrambling pattern of Set Top Box is set to into advanced security solution
Disturb pattern.
It is the safety for ensureing Set Top Box because the descrambling pattern by Set Top Box arranges the safety issue for being related to Set Top Box
Property, preventing from suffering that malicious attack causes Set Top Box advanced security pattern to be destroyed, setting up procedure needs to be carried out under the conditions of encryption.
In this embodiment, the step is specially:The second setting instruction of encryption is sent, decryption obtains second and arranges instruction, according to the
Two arrange instruction is set to advanced security descrambling pattern by the descrambling pattern of Set Top Box.
In further embodiment, the step is further:The second instruction functions in memory are called, it is random to produce
Raw second setting is instructed and stored;Call the second encryption function, the second setting instruction be encrypted, and produce with storage the
Two arrange the associated effective order mark of instruction;When arranging, the second setting instruction to encrypting is decrypted, and according to having
Active command identifier lookup to storage second setting instruction, by decryption second setting instruction with storage second arrange instruct into
Row compares, and the descrambling pattern of Set Top Box is set to into advanced security descrambling pattern if both matchings, otherwise for illegal instruction not
It is configured.
Illustrate in a concrete fashion, the step:Set Top Box calls GenHLOnCmd () function(Second instruction functions), with
Machine produces one group of command sequence group(Second arranges instruction), in being stored in g_HLOnCmd [M] [N].
Call GetHLOnCmd ()(Second encryption function), the command sequence for obtaining an encryption is encrypted, it is stored in
In aHLOnCmd [N], meanwhile, produce an effective order and identify nAvialbleID.It is first right when operation is configured
AHLOnfCmd is decrypted, and finds from g_HLOnCmd [M] [N] effectively further according to effective order mark nAvialbleID
Second setting instruction, be then compared with the aHLOnCmd after decryption, if it does, then the descrambling pattern of Set Top Box is set
It is set to advanced security descrambling pattern.
The method, the cipher mode of program is obtained when playing to program, and then the cipher mode of program is judged,
The descrambling pattern of Set Top Box is set to into non-advanced security descrambling pattern if program encryption mode is BISS cipher modes, is carried out
BISS descrambles, and is otherwise provided as advanced security descrambling pattern, and according to different cipher modes corresponding descrambling pattern is arranged, and is protecting
Enable a viewer to watch the program of BISS encryptions under the premise of card security so that spectators are not capable of the restriction of mode encrypted, see
See more TV programme, bring great convenience to user and experience.
Meanwhile, the present invention also provides a kind of Set Top Box.As shown in Fig. 2 the Set Top Box includes:
Cipher mode acquiring unit 100, for the program played, parsing obtains the cipher mode of program.
The Set Top Box, is not that directly program is descrambled to the program played, but first parsing obtains the program
Cipher mode, understands which kind of manner of decryption the program uses.In this embodiment, cipher mode acquiring unit 100 is inquired about
Pmt table in the frequency of program place(Program Map Table), parsing pmt table conditional reception system mark(CA_system_ID),
Corresponding cipher mode is identified according to condition receiving system, the cipher mode of program is obtained.
Mode setting unit 200, whether the cipher mode for judging program is BISS cipher modes, if then by Set Top Box
Descrambling pattern is set to non-advanced security descrambling pattern, carries out BISS descramblings, otherwise the descrambling pattern of Set Top Box is set to into height
Level security descrambles pattern.
After the cipher mode that parsing obtains program, mode setting unit 200 will be sentenced to the cipher mode of the program
Disconnected, whether the cipher mode for judging the program belongs to BISS cipher modes, and according to the difference of cipher mode different operations are taken.
If cipher mode is BISS cipher modes, because BISS cipher modes are plain text encryption mode, the descrambling pattern of Set Top Box exists
Can not be descrambled under advanced security pattern, it is impossible to watch program, if wanting, watching program needs to enter the descrambling pattern of Set Top Box
Row is arranged, and the descrambling pattern of Set Top Box is set to into non-advanced security descrambling pattern, is carried out under non-advanced security descrambling pattern
BISS descrambles, and BISS cipher modes can be descrambled.If the non-BISS cipher modes of the cipher mode of program, Set Top Box
BISS descramblings need not be carried out, the descrambling pattern of Set Top Box just must can be effectively ensured safety under advanced security pattern, then by machine
The descrambling pattern of top box is set to advanced security descrambling pattern.In this embodiment, if CA_system_ID is 0x2600, plus
Close mode is BISS cipher modes, is not otherwise BISS cipher modes.
Ask due to the descrambling pattern of Set Top Box being set to into non-advanced security descrambling pattern being related to the security of Set Top Box
Topic, is the security for ensureing Set Top Box, prevents from suffering that malicious attack causes Set Top Box advanced security pattern to be destroyed, setting up procedure
Needs are carried out under the conditions of encryption.In this embodiment, Set Top Box sends the first setting instruction of encryption, mode setting unit
200 decryption obtain first and arrange instruction, arrange instruction according to first and the descrambling pattern of Set Top Box is set to into non-advanced security solution
Disturb pattern.
In further embodiment, the first instruction functions in memory are called, randomly generate the first setting instruction
And store;The first encryption function is called, the first setting instruction is encrypted, and produced related to the first setting instruction of storage
The effective order mark of connection;When arranging, the first setting instruction of 200 pairs of encryptions of mode setting unit is decrypted, and according to
Effective order identifier lookup arranges instruction and instructs with the first setting of storage to the first setting instruction of storage by the first of decryption
It is compared, the descrambling pattern of Set Top Box is set to into non-advanced security descrambling pattern if both matchings, is otherwise illegally finger
Order is not configured.
Illustrate in a concrete fashion, Set Top Box calls GenHLOffCmd () function(First instruction functions), randomly generate
One group of command sequence group(First arranges instruction), in being stored in g_HLOffCmd [M] [N].
Call GetHLOffCmd ()(First encryption function), the command sequence for obtaining an encryption is encrypted, it is stored in
In aHLOffCmd [N], meanwhile, produce an effective order and identify nAvialbleID.When operation is configured, pattern is arranged
Unit 200 is first decrypted to aHLOffCmd, and nAvialbleID is identified from g_HLOffCmd [M] [N] further according to effective order
In find effective first instruction be set, be then compared with the aHLOffCmd after decryption, if it does, then by machine top
The descrambling pattern of box is set to non-advanced security descrambling pattern.
Similarly, since the descrambling pattern of Set Top Box is set to into the security that advanced security descrambling pattern is related to Set Top Box
Problem, is the security for ensureing Set Top Box, prevents from suffering that malicious attack causes Set Top Box advanced security pattern to be destroyed, and is arranged
Journey needs to be carried out under the conditions of encryption.In this embodiment, Set Top Box sends the second setting instruction of encryption, mode setting unit
200 decryption obtain second and arrange instruction, arrange instruction according to second and the descrambling pattern of Set Top Box is set to into advanced security descrambling
Pattern.
In further embodiment, the second instruction functions in memory are called, randomly generate the second setting instruction
And store;The second encryption function is called, the second setting instruction is encrypted, and produced related to the second setting instruction of storage
The effective order mark of connection;When arranging, the second setting instruction of 200 pairs of encryptions of mode setting unit is decrypted, and according to
Effective order identifier lookup arranges instruction and instructs with the second setting of storage to the second setting instruction of storage by the second of decryption
It is compared, the descrambling pattern of Set Top Box is set to into advanced security descrambling pattern if both matchings, is otherwise illegal instruction
It is not configured.
Illustrate in a concrete fashion, Set Top Box calls GenHLOnCmd () function(Second instruction functions), randomly generate
One group of command sequence group(Second arranges instruction), in being stored in g_HLOnCmd [M] [N].
Call GetHLOnCmd ()(Second encryption function), the command sequence for obtaining an encryption is encrypted, it is stored in
In aHLOnCmd [N], meanwhile, produce an effective order and identify nAvialbleID.When operation is configured, pattern is arranged
Unit 200 is first decrypted to aHLOnfCmd, further according to effective order mark nAvialbleID from g_HLOnCmd [M] [N]
Find effective second and instruction is set, be then compared with the aHLOnCmd after decryption, if it does, then by Set Top Box
Descrambling pattern is set to advanced security descrambling pattern.
The Set Top Box, the cipher mode of program is obtained when playing to program, and then the cipher mode of program is sentenced
It is disconnected, the descrambling pattern of Set Top Box is set to into non-advanced security descrambling pattern if program encryption mode is BISS cipher modes,
BISS descramblings are carried out, advanced security descrambling pattern is otherwise provided as, corresponding descrambling pattern are arranged according to different cipher modes,
Enable a viewer to watch the program of BISS encryptions under the premise of security is ensured so that spectators are not capable of the limit of mode encrypted
System, watches more TV programme, brings great convenience to user and experiences.
The method of the present invention and Set Top Box, the cipher mode of program is obtained when playing to program, and then program is added
Close mode judged, the descrambling pattern of Set Top Box is set to into non-senior peace if program encryption mode is BISS cipher modes
Complete solution disturbs pattern, carries out BISS descramblings, is otherwise provided as advanced security descrambling pattern, arranges corresponding according to different cipher modes
Descrambling pattern, ensure security under the premise of enable a viewer to watch BISS encryption program so that spectators can not by plus
The restriction of close mode, watches more TV programme, brings great convenience to user and experiences.
These are only presently preferred embodiments of the present invention, not to limit the present invention, all spirit in the present invention and
Any modification, equivalent and improvement for being made within principle etc., should be included within the scope of the present invention.
Claims (6)
1. a kind of Set Top Box ciphered program de-scrambling method, it is characterised in that comprise the steps:
For the program played, parsing obtains the cipher mode of program;
Whether the cipher mode for judging program is BISS cipher modes, if the descrambling pattern of Set Top Box is set to into non-senior peace
Complete solution disturbs pattern, carries out BISS descramblings, otherwise the descrambling pattern of Set Top Box is set to into advanced security descrambling pattern;
Wherein, the step of descrambling pattern of Set Top Box being set to into non-advanced security descrambling pattern includes:
The first instruction functions in memory are called, the first setting is randomly generated and is instructed and store;The first encryption function is called, it is right
First setting instruction is encrypted, and produces the effective order mark being associated with the first setting instruction of storage;
When arranging, the first setting instruction to encrypting is decrypted, and according to effective order identifier lookup to the first of storage
Instruction is set, the first setting instruction of decryption is compared with the first setting instruction of storage, by machine top if both matchings
The descrambling pattern of box is set to non-advanced security descrambling pattern.
2. Set Top Box ciphered program de-scrambling method according to claim 1, it is characterised in that described for the section played
The step of mesh, cipher mode of parsing acquisition program, is specially:
Pmt table in the frequency of inquiry program place, parsing pmt table conditional reception system mark, according to condition receiving system mark
Know corresponding cipher mode, obtain the cipher mode of program.
3. Set Top Box ciphered program de-scrambling method according to claim 1, it is characterised in that the descrambling by Set Top Box
The step of pattern is set to advanced security descrambling pattern is specially:
The second instruction functions in memory are called, the second setting is randomly generated and is instructed and store;The second encryption function is called, it is right
Second setting instruction is encrypted, and produces the effective order mark being associated with the second setting instruction of storage;When arranging,
The second setting instruction to encrypting is decrypted, and according to the second setting instruction of effective order identifier lookup to storage, will solve
The second close setting instruction is compared with the second setting instruction of storage, sets the descrambling pattern of Set Top Box if both matchings
Advanced security descrambling pattern is set to, is not otherwise configured for illegal instruction.
4. a kind of Set Top Box, it is characterised in that include:
Cipher mode acquiring unit, for the program played, parsing obtains the cipher mode of program;
Mode setting unit, whether the cipher mode for judging program is BISS cipher modes, if then by the descrambling mould of Set Top Box
Formula is set to non-advanced security descrambling pattern, carries out BISS descramblings, otherwise the descrambling pattern of Set Top Box is set to into advanced security
Descrambling pattern;
Wherein, the first instruction functions during the mode setting unit is specifically for calling memory, randomly generate the first setting
Instruct and store;The first encryption function is called, the first setting instruction is encrypted, and produce the first setting instruction with storage
Associated effective order mark;
When arranging, the mode setting unit is decrypted to the first setting instruction encrypted, and is identified according to effective order
The first setting instruction of storage is found, the first setting instruction of decryption is compared with the first setting instruction of storage, if
The descrambling pattern of Set Top Box is then set to non-advanced security descrambling pattern by both matchings.
5. Set Top Box according to claim 4, it is characterised in that frequency that the cipher mode acquiring unit inquiry program is located
Pmt table in point, parsing pmt table conditional reception system mark, according to condition receiving system corresponding cipher mode is identified, and is obtained
Take the cipher mode of program.
6. Set Top Box according to claim 4, it is characterised in that call the second instruction functions in memory, it is random to produce
Raw second setting is instructed and stored;Call the second encryption function, the second setting instruction be encrypted, and produce with storage the
Two arrange the associated effective order mark of instruction;
When arranging, the mode setting unit is decrypted to the second setting instruction encrypted, and is identified according to effective order
The second setting instruction of storage is found, the second setting instruction of decryption is compared with the second setting instruction of storage, if
The descrambling pattern of Set Top Box is then set to advanced security descrambling pattern by both matchings, is not otherwise configured for illegal instruction.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410124040.7A CN103929680B (en) | 2014-03-28 | 2014-03-28 | Set top box encryption program descrambling method and set top box |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410124040.7A CN103929680B (en) | 2014-03-28 | 2014-03-28 | Set top box encryption program descrambling method and set top box |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103929680A CN103929680A (en) | 2014-07-16 |
CN103929680B true CN103929680B (en) | 2017-04-12 |
Family
ID=51147735
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410124040.7A Expired - Fee Related CN103929680B (en) | 2014-03-28 | 2014-03-28 | Set top box encryption program descrambling method and set top box |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103929680B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105100889B (en) * | 2015-08-12 | 2018-09-04 | 深圳创维数字技术有限公司 | A kind of descramble key set updating method and set-top box |
CN105578291B (en) * | 2015-12-25 | 2018-09-21 | 广州视源电子科技股份有限公司 | Television program processing method and system of digital television terminal |
CN107343212B (en) * | 2017-07-19 | 2020-07-10 | 海信视像科技股份有限公司 | Descrambling method of digital television, digital television and CAM card |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1681299A (en) * | 2004-02-26 | 2005-10-12 | 三星电子株式会社 | Circuits and methods for providing conditional access and copy protection schemes for broadcast data |
CN1780361A (en) * | 2004-11-24 | 2006-05-31 | 纳格拉影像股份有限公司 | Digital audio/video data processing unit and method for controlling access to said data |
JP2007028519A (en) * | 2005-07-21 | 2007-02-01 | Toshiba Corp | Broadcast receiver and broadcast receiving method |
JP2010278935A (en) * | 2009-05-31 | 2010-12-09 | I2:Kk | Conditional access system |
CN102082971A (en) * | 2011-02-10 | 2011-06-01 | 武汉天喻信息产业股份有限公司 | Digital TV set top box (STB) chip and entitle receiving method adopting same |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9268735B2 (en) * | 2008-09-30 | 2016-02-23 | Oracle America, Inc. | Loadable and modular conditional access application |
-
2014
- 2014-03-28 CN CN201410124040.7A patent/CN103929680B/en not_active Expired - Fee Related
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1681299A (en) * | 2004-02-26 | 2005-10-12 | 三星电子株式会社 | Circuits and methods for providing conditional access and copy protection schemes for broadcast data |
CN1780361A (en) * | 2004-11-24 | 2006-05-31 | 纳格拉影像股份有限公司 | Digital audio/video data processing unit and method for controlling access to said data |
JP2007028519A (en) * | 2005-07-21 | 2007-02-01 | Toshiba Corp | Broadcast receiver and broadcast receiving method |
JP2010278935A (en) * | 2009-05-31 | 2010-12-09 | I2:Kk | Conditional access system |
CN102082971A (en) * | 2011-02-10 | 2011-06-01 | 武汉天喻信息产业股份有限公司 | Digital TV set top box (STB) chip and entitle receiving method adopting same |
Also Published As
Publication number | Publication date |
---|---|
CN103929680A (en) | 2014-07-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA2622505C (en) | Method for verifying a target device connected to a master device | |
US9479825B2 (en) | Terminal based on conditional access technology | |
US9270465B2 (en) | Control word protection | |
CN1258898C (en) | Method for managing symmetrical secret key in communication network, and device for carrying out such method | |
KR101406350B1 (en) | Method for managing consumption of digital contents within a client domain and devices implementing this method | |
KR100969668B1 (en) | Method for Downloading CAS in IPTV | |
US9402108B2 (en) | Receiver software protection | |
JP2010193449A (en) | Method of securely providing control word from smart card to conditional access module | |
WO2009094851A1 (en) | Digital tv conditional access system and related handling procedure | |
EP2192773A1 (en) | Content decryption device and encryption system using an additional key layer | |
CN102075812B (en) | Data receiving method and system of digital television | |
KR20090111846A (en) | A conditional access system | |
CN101335579A (en) | Method implementing conditional reception and conditional receiving apparatus | |
WO2014121653A1 (en) | Digital television signal receiving system and receiving method | |
CN103929680B (en) | Set top box encryption program descrambling method and set top box | |
CN103581751B (en) | A kind of digital television signal receives system and method for reseptance | |
US11308242B2 (en) | Method for protecting encrypted control word, hardware security module, main chip and terminal | |
CA2916818C (en) | Method for protecting decryption keys in a decoder and decoder for implementing said method | |
CN103250423B (en) | For receiving the method for content of multimedia by control word scrambling and CAPTCHA | |
KR101280740B1 (en) | Method to secure access to audio/video content in a decoding unit | |
CN104247437B (en) | The method that the use of television receiver is tied to particular network | |
CN108259962B (en) | Program switching method, set top box and storage medium | |
JP6163025B2 (en) | Digital broadcasting tuner, terminal, station individual data supplement program, and tuner station individual data supplement method | |
CN101998163A (en) | Entitlement management method, terminal equipment and front end | |
KR101314417B1 (en) | Apparatus for providing and reproducing contents using secure chipset and the method threaof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20170412 Termination date: 20200328 |
|
CF01 | Termination of patent right due to non-payment of annual fee |