CN103929680B - Set top box encryption program descrambling method and set top box - Google Patents

Set top box encryption program descrambling method and set top box Download PDF

Info

Publication number
CN103929680B
CN103929680B CN201410124040.7A CN201410124040A CN103929680B CN 103929680 B CN103929680 B CN 103929680B CN 201410124040 A CN201410124040 A CN 201410124040A CN 103929680 B CN103929680 B CN 103929680B
Authority
CN
China
Prior art keywords
top box
set top
program
instruction
descrambling
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201410124040.7A
Other languages
Chinese (zh)
Other versions
CN103929680A (en
Inventor
郑巧红
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Jiuzhou Electric Appliance Co Ltd
Original Assignee
Shenzhen Jiuzhou Electric Appliance Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Jiuzhou Electric Appliance Co Ltd filed Critical Shenzhen Jiuzhou Electric Appliance Co Ltd
Priority to CN201410124040.7A priority Critical patent/CN103929680B/en
Publication of CN103929680A publication Critical patent/CN103929680A/en
Application granted granted Critical
Publication of CN103929680B publication Critical patent/CN103929680B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

The invention relates to a set top box encryption program descrambling method and a set top box. The method includes the following steps that for a playing program, an encryption mode of the program is analyzed and acquired; whether the encryption mode of the program is a BISS encryption mode or not is judged, if yes, the descrambling mode of the set top box is set as an non-advanced security descrambling mode, and then BISS descrambling is conducted, and if not, the descrambling mode of the set top box is set as an advanced security descrambling mode. By the adoption of the set top box encryption program descrambling method and the set top box, the corresponding descrambling modes are set according to the different encryption modes, on the premise that security is guaranteed, audience can watch the BISS encrypted program and can watch more television programs without being limited by encryption modes, and therefore great convenience and good experience are brought to users.

Description

A kind of Set Top Box ciphered program de-scrambling method and Set Top Box
Technical field
The present invention relates to the communications field, more particularly to a kind of Set Top Box ciphered program de-scrambling method and Set Top Box.
Background technology
BISS, full name BasicInteroperableScramblingSystem, are used in digital television system A kind of method for scrambling, is a kind of satellite broadcasting encryption system, is also the method for scrambling that a kind of key is fixed, and some programs are adopted BISS cipher modes are encrypted.
At present, it is to ensure security, Set Top Box has mostly been advanced security Set Top Box.In advanced security Set Top Box, Condition reception(CA)Key be only in plain text, and to descramble and be set to advanced security in master chip with encrypted test mode transmission The Set Top Box of pattern, is directly arranged the key of plaintext to descrambler, it is impossible to enough that program is descrambled.But, BISS encryptions Mode is plaintext, and this results in advanced security Set Top Box and the BISS ciphered programs of BISS cipher modes encryption can not be solved Disturb so that user can not watch program, to user great inconvenience is brought.
The content of the invention
In view of this, it is necessary to for asking that above-mentioned advanced security Set Top Box can not be descrambled to BISS ciphered programs A kind of topic, there is provided Set Top Box ciphered program de-scrambling method.
Additionally, also providing a kind of Set Top Box.
A kind of Set Top Box ciphered program de-scrambling method, comprises the steps:
For the program played, parsing obtains the cipher mode of program;
Whether the cipher mode for judging program is BISS cipher modes, if the descrambling pattern of Set Top Box is set to into not high Level security descrambles pattern, carries out BISS descramblings, otherwise the descrambling pattern of Set Top Box is set to into advanced security descrambling pattern.
In one of which embodiment, described for the program played, parsing obtains the step of the cipher mode of program It is rapid to be specially:
Pmt table in the frequency of inquiry program place, parsing pmt table conditional reception system mark, according to condition reception system The corresponding cipher mode of system mark, obtains the cipher mode of program.
It is described that the descrambling pattern of Set Top Box is set to into non-advanced security descrambling pattern in one of which embodiment The step of be specially:
The first setting instruction of encryption is sent, decryption obtains first and arranges instruction, and instruction is arranged by Set Top Box according to first Descrambling pattern be set to non-advanced security descrambling pattern;
It is described by the descrambling pattern of Set Top Box be set to advanced security descrambling pattern the step of be specially:
The second setting instruction of encryption is sent, decryption obtains second and arranges instruction, and instruction is arranged by Set Top Box according to second Descrambling pattern be set to advanced security descrambling pattern.
It is described that the descrambling pattern of Set Top Box is set to into non-advanced security descrambling pattern in one of which embodiment The step of be specially:
The first instruction functions in memory are called, the first setting is randomly generated and is instructed and store;Call the first encryption letter Number, is encrypted to the first setting instruction, and produces the effective order mark being associated with the first setting instruction of storage;
When arranging, the first setting instruction to encrypting is decrypted, and according to effective order identifier lookup to storage First arranges instruction, and the first setting instruction of decryption is compared with the first setting instruction of storage, will if both matchings The descrambling pattern of Set Top Box is set to non-advanced security descrambling pattern, is not otherwise configured for illegal instruction.
It is described that the descrambling pattern of Set Top Box is set to into advanced security descrambling pattern in one of which embodiment Step is specially:
The second instruction functions in memory are called, the second setting is randomly generated and is instructed and store;Call the second encryption letter Number, is encrypted to the second setting instruction, and produces the effective order mark being associated with the second setting instruction of storage;Setting When putting, the second setting instruction to encrypting is decrypted, and according to the second setting instruction of effective order identifier lookup to storage, Second setting instruction of decryption is compared with the second setting instruction of storage, by the descrambling mould of Set Top Box if both matchings Formula is set to advanced security descrambling pattern, is not otherwise configured for illegal instruction.
A kind of Set Top Box, including:
Cipher mode acquiring unit, for the program played, parsing obtains the cipher mode of program;
Mode setting unit, whether the cipher mode for judging program is BISS cipher modes, if then by the solution of Set Top Box The pattern of disturbing is set to non-advanced security descrambling pattern, carries out BISS descramblings, is otherwise set to the descrambling pattern of Set Top Box senior Safety descrambling pattern.
In one of which embodiment, the pmt table in the cipher mode acquiring unit inquiry program place frequency, Parsing pmt table conditional reception system mark, according to condition receiving system corresponding cipher mode is identified, and obtains the encryption of program Mode.
In one of which embodiment, Set Top Box sends the first setting instruction of encryption, mode setting unit decryption Obtain first and instruction is set, instruction is set according to first the descrambling pattern of Set Top Box is set to into non-advanced security descrambling pattern;
Set Top Box sends the second setting instruction of encryption, and mode setting unit decryption obtains second and arranges instruction, according to the Two arrange instruction is set to advanced security descrambling pattern by the descrambling pattern of Set Top Box.
In one of which embodiment, the first instruction functions in memory are called, randomly generate the first setting and refer to Make and store;The first encryption function is called, the first setting instruction is encrypted, and produce the first setting instruction phase with storage The effective order mark of association;
When arranging, the mode setting unit is decrypted to the first setting instruction encrypted, and according to effective order Identifier lookup is compared the first setting instruction of decryption with the first setting instruction of storage to the first setting instruction of storage Compared with, the descrambling pattern of Set Top Box is set to into non-advanced security descrambling pattern if both matchings, otherwise do not enter for illegal instruction Row is arranged.
In one of which embodiment, the second instruction functions in memory are called, randomly generate the second setting and refer to Make and store;The second encryption function is called, the second setting instruction is encrypted, and produce the second setting instruction phase with storage The effective order mark of association;
When arranging, the mode setting unit is decrypted to the second setting instruction encrypted, and according to effective order Identifier lookup is compared the second setting instruction of decryption with the second setting instruction of storage to the second setting instruction of storage Compared with, the descrambling pattern of Set Top Box is set to into advanced security descrambling pattern if both matchings, otherwise do not carry out for illegal instruction Arrange.
The method of the present invention and Set Top Box, the cipher mode of program is obtained when playing to program, and then program is added Close mode judged, the descrambling pattern of Set Top Box is set to into non-senior peace if program encryption mode is BISS cipher modes Complete solution disturbs pattern, carries out BISS descramblings, is otherwise provided as advanced security descrambling pattern, arranges corresponding according to different cipher modes Descrambling pattern, ensure security under the premise of enable a viewer to watch BISS encryption program so that spectators can not by plus The restriction of close mode, watches more TV programme, brings great convenience to user and experiences.
Description of the drawings
Fig. 1 is the flow chart of the Set Top Box ciphered program de-scrambling method in one embodiment;
Fig. 2 is the structure chart of the Set Top Box in one embodiment.
Specific embodiment
In order that the objects, technical solutions and advantages of the present invention become more apparent, it is right below in conjunction with drawings and Examples The present invention is further elaborated.It should be appreciated that specific embodiment described herein is only to explain the present invention, not For limiting the present invention.
Fig. 1 is the flow chart of the Set Top Box ciphered program de-scrambling method in one embodiment.The method includes:
S10:For the program played, parsing obtains the cipher mode of program.
The method, is not that directly program is descrambled to the program played, but first parsing obtains adding for the program Close mode, understands which kind of manner of decryption the program uses.In this embodiment, the step is specially:Inquiry program is located Pmt table in frequency(Program Map Table), parsing pmt table conditional reception system mark(CA_system_ID), according to condition Reception system identifies corresponding cipher mode, obtains the cipher mode of program.
S20:Whether the cipher mode for judging program is BISS cipher modes, if then execution step S30, otherwise performs step Rapid S40.
After the cipher mode that parsing obtains program, the cipher mode of the program is judged, judge the program Whether cipher mode belongs to BISS cipher modes, and according to the difference of cipher mode different operations are taken.If cipher mode is BISS cipher modes, otherwise execution step S30, execution step S40.In this embodiment, if CA_system_ID is 0x2600, Then cipher mode is BISS cipher modes.
S30:The descrambling pattern of Set Top Box is set to into non-advanced security descrambling pattern, BISS descramblings are carried out.
If the cipher mode of program be BISS cipher modes, due to BISS cipher modes be plain text encryption mode, Set Top Box Descrambling pattern can not be descrambled under advanced security pattern, it is impossible to watch program, if want watch program need to Set Top Box Descrambling pattern be configured, the descrambling pattern of Set Top Box is set to into non-advanced security descrambling pattern, in non-advanced security solution Disturb and carry out under pattern BISS descramblings, BISS cipher modes can be descrambled.
Ask due to the descrambling pattern of Set Top Box being set to into non-advanced security descrambling pattern being related to the security of Set Top Box Topic, is the security for ensureing Set Top Box, prevents from suffering that malicious attack causes Set Top Box advanced security pattern to be destroyed, setting up procedure Needs are carried out under the conditions of encryption.In this embodiment, the descrambling pattern of Set Top Box is set to into non-advanced security descrambling pattern The step of be specially:The first setting instruction of encryption is sent, decryption obtains first and arranges instruction, and instruction is arranged by machine according to first The descrambling pattern of top box is set to non-advanced security descrambling pattern.
In further embodiment, the step is further:The first instruction functions in memory are called, it is random to produce Raw first setting is instructed and stored;Call the first encryption function, the first setting instruction be encrypted, and produce with storage the One arranges the associated effective order mark of instruction;When arranging, the first setting instruction to encrypting is decrypted, and according to having Active command identifier lookup to storage first setting instruction, by decryption first setting instruction with storage first arrange instruct into Row compares, and the descrambling pattern of Set Top Box is set to into non-advanced security descrambling pattern if both matchings, is otherwise illegal instruction It is not configured.
Illustrate in a concrete fashion, the step:Set Top Box calls GenHLOffCmd () function(First instruction functions), Randomly generate one group of command sequence group(First arranges instruction), in being stored in g_HLOffCmd [M] [N].
Call GetHLOffCmd ()(First encryption function), the command sequence for obtaining an encryption is encrypted, it is stored in In aHLOffCmd [N], meanwhile, produce an effective order and identify nAvialbleID.It is first right when operation is configured AHLOffCmd is decrypted, and finds from g_HLOffCmd [M] [N] effectively further according to effective order mark nAvialbleID The first setting instruction, be then compared with the aHLOffCmd after decryption, if it does, then by the descrambling pattern of Set Top Box It is set to non-advanced security descrambling pattern.
S40:The descrambling pattern of Set Top Box is set to into advanced security descrambling pattern.
If the non-BISS cipher modes of the cipher mode of program, Set Top Box need not carry out BISS descramblings, the descrambling of Set Top Box Pattern just must can be effectively ensured safety under advanced security pattern, then the descrambling pattern of Set Top Box is set to into advanced security solution Disturb pattern.
It is the safety for ensureing Set Top Box because the descrambling pattern by Set Top Box arranges the safety issue for being related to Set Top Box Property, preventing from suffering that malicious attack causes Set Top Box advanced security pattern to be destroyed, setting up procedure needs to be carried out under the conditions of encryption. In this embodiment, the step is specially:The second setting instruction of encryption is sent, decryption obtains second and arranges instruction, according to the Two arrange instruction is set to advanced security descrambling pattern by the descrambling pattern of Set Top Box.
In further embodiment, the step is further:The second instruction functions in memory are called, it is random to produce Raw second setting is instructed and stored;Call the second encryption function, the second setting instruction be encrypted, and produce with storage the Two arrange the associated effective order mark of instruction;When arranging, the second setting instruction to encrypting is decrypted, and according to having Active command identifier lookup to storage second setting instruction, by decryption second setting instruction with storage second arrange instruct into Row compares, and the descrambling pattern of Set Top Box is set to into advanced security descrambling pattern if both matchings, otherwise for illegal instruction not It is configured.
Illustrate in a concrete fashion, the step:Set Top Box calls GenHLOnCmd () function(Second instruction functions), with Machine produces one group of command sequence group(Second arranges instruction), in being stored in g_HLOnCmd [M] [N].
Call GetHLOnCmd ()(Second encryption function), the command sequence for obtaining an encryption is encrypted, it is stored in In aHLOnCmd [N], meanwhile, produce an effective order and identify nAvialbleID.It is first right when operation is configured AHLOnfCmd is decrypted, and finds from g_HLOnCmd [M] [N] effectively further according to effective order mark nAvialbleID Second setting instruction, be then compared with the aHLOnCmd after decryption, if it does, then the descrambling pattern of Set Top Box is set It is set to advanced security descrambling pattern.
The method, the cipher mode of program is obtained when playing to program, and then the cipher mode of program is judged, The descrambling pattern of Set Top Box is set to into non-advanced security descrambling pattern if program encryption mode is BISS cipher modes, is carried out BISS descrambles, and is otherwise provided as advanced security descrambling pattern, and according to different cipher modes corresponding descrambling pattern is arranged, and is protecting Enable a viewer to watch the program of BISS encryptions under the premise of card security so that spectators are not capable of the restriction of mode encrypted, see See more TV programme, bring great convenience to user and experience.
Meanwhile, the present invention also provides a kind of Set Top Box.As shown in Fig. 2 the Set Top Box includes:
Cipher mode acquiring unit 100, for the program played, parsing obtains the cipher mode of program.
The Set Top Box, is not that directly program is descrambled to the program played, but first parsing obtains the program Cipher mode, understands which kind of manner of decryption the program uses.In this embodiment, cipher mode acquiring unit 100 is inquired about Pmt table in the frequency of program place(Program Map Table), parsing pmt table conditional reception system mark(CA_system_ID), Corresponding cipher mode is identified according to condition receiving system, the cipher mode of program is obtained.
Mode setting unit 200, whether the cipher mode for judging program is BISS cipher modes, if then by Set Top Box Descrambling pattern is set to non-advanced security descrambling pattern, carries out BISS descramblings, otherwise the descrambling pattern of Set Top Box is set to into height Level security descrambles pattern.
After the cipher mode that parsing obtains program, mode setting unit 200 will be sentenced to the cipher mode of the program Disconnected, whether the cipher mode for judging the program belongs to BISS cipher modes, and according to the difference of cipher mode different operations are taken. If cipher mode is BISS cipher modes, because BISS cipher modes are plain text encryption mode, the descrambling pattern of Set Top Box exists Can not be descrambled under advanced security pattern, it is impossible to watch program, if wanting, watching program needs to enter the descrambling pattern of Set Top Box Row is arranged, and the descrambling pattern of Set Top Box is set to into non-advanced security descrambling pattern, is carried out under non-advanced security descrambling pattern BISS descrambles, and BISS cipher modes can be descrambled.If the non-BISS cipher modes of the cipher mode of program, Set Top Box BISS descramblings need not be carried out, the descrambling pattern of Set Top Box just must can be effectively ensured safety under advanced security pattern, then by machine The descrambling pattern of top box is set to advanced security descrambling pattern.In this embodiment, if CA_system_ID is 0x2600, plus Close mode is BISS cipher modes, is not otherwise BISS cipher modes.
Ask due to the descrambling pattern of Set Top Box being set to into non-advanced security descrambling pattern being related to the security of Set Top Box Topic, is the security for ensureing Set Top Box, prevents from suffering that malicious attack causes Set Top Box advanced security pattern to be destroyed, setting up procedure Needs are carried out under the conditions of encryption.In this embodiment, Set Top Box sends the first setting instruction of encryption, mode setting unit 200 decryption obtain first and arrange instruction, arrange instruction according to first and the descrambling pattern of Set Top Box is set to into non-advanced security solution Disturb pattern.
In further embodiment, the first instruction functions in memory are called, randomly generate the first setting instruction And store;The first encryption function is called, the first setting instruction is encrypted, and produced related to the first setting instruction of storage The effective order mark of connection;When arranging, the first setting instruction of 200 pairs of encryptions of mode setting unit is decrypted, and according to Effective order identifier lookup arranges instruction and instructs with the first setting of storage to the first setting instruction of storage by the first of decryption It is compared, the descrambling pattern of Set Top Box is set to into non-advanced security descrambling pattern if both matchings, is otherwise illegally finger Order is not configured.
Illustrate in a concrete fashion, Set Top Box calls GenHLOffCmd () function(First instruction functions), randomly generate One group of command sequence group(First arranges instruction), in being stored in g_HLOffCmd [M] [N].
Call GetHLOffCmd ()(First encryption function), the command sequence for obtaining an encryption is encrypted, it is stored in In aHLOffCmd [N], meanwhile, produce an effective order and identify nAvialbleID.When operation is configured, pattern is arranged Unit 200 is first decrypted to aHLOffCmd, and nAvialbleID is identified from g_HLOffCmd [M] [N] further according to effective order In find effective first instruction be set, be then compared with the aHLOffCmd after decryption, if it does, then by machine top The descrambling pattern of box is set to non-advanced security descrambling pattern.
Similarly, since the descrambling pattern of Set Top Box is set to into the security that advanced security descrambling pattern is related to Set Top Box Problem, is the security for ensureing Set Top Box, prevents from suffering that malicious attack causes Set Top Box advanced security pattern to be destroyed, and is arranged Journey needs to be carried out under the conditions of encryption.In this embodiment, Set Top Box sends the second setting instruction of encryption, mode setting unit 200 decryption obtain second and arrange instruction, arrange instruction according to second and the descrambling pattern of Set Top Box is set to into advanced security descrambling Pattern.
In further embodiment, the second instruction functions in memory are called, randomly generate the second setting instruction And store;The second encryption function is called, the second setting instruction is encrypted, and produced related to the second setting instruction of storage The effective order mark of connection;When arranging, the second setting instruction of 200 pairs of encryptions of mode setting unit is decrypted, and according to Effective order identifier lookup arranges instruction and instructs with the second setting of storage to the second setting instruction of storage by the second of decryption It is compared, the descrambling pattern of Set Top Box is set to into advanced security descrambling pattern if both matchings, is otherwise illegal instruction It is not configured.
Illustrate in a concrete fashion, Set Top Box calls GenHLOnCmd () function(Second instruction functions), randomly generate One group of command sequence group(Second arranges instruction), in being stored in g_HLOnCmd [M] [N].
Call GetHLOnCmd ()(Second encryption function), the command sequence for obtaining an encryption is encrypted, it is stored in In aHLOnCmd [N], meanwhile, produce an effective order and identify nAvialbleID.When operation is configured, pattern is arranged Unit 200 is first decrypted to aHLOnfCmd, further according to effective order mark nAvialbleID from g_HLOnCmd [M] [N] Find effective second and instruction is set, be then compared with the aHLOnCmd after decryption, if it does, then by Set Top Box Descrambling pattern is set to advanced security descrambling pattern.
The Set Top Box, the cipher mode of program is obtained when playing to program, and then the cipher mode of program is sentenced It is disconnected, the descrambling pattern of Set Top Box is set to into non-advanced security descrambling pattern if program encryption mode is BISS cipher modes, BISS descramblings are carried out, advanced security descrambling pattern is otherwise provided as, corresponding descrambling pattern are arranged according to different cipher modes, Enable a viewer to watch the program of BISS encryptions under the premise of security is ensured so that spectators are not capable of the limit of mode encrypted System, watches more TV programme, brings great convenience to user and experiences.
The method of the present invention and Set Top Box, the cipher mode of program is obtained when playing to program, and then program is added Close mode judged, the descrambling pattern of Set Top Box is set to into non-senior peace if program encryption mode is BISS cipher modes Complete solution disturbs pattern, carries out BISS descramblings, is otherwise provided as advanced security descrambling pattern, arranges corresponding according to different cipher modes Descrambling pattern, ensure security under the premise of enable a viewer to watch BISS encryption program so that spectators can not by plus The restriction of close mode, watches more TV programme, brings great convenience to user and experiences.
These are only presently preferred embodiments of the present invention, not to limit the present invention, all spirit in the present invention and Any modification, equivalent and improvement for being made within principle etc., should be included within the scope of the present invention.

Claims (6)

1. a kind of Set Top Box ciphered program de-scrambling method, it is characterised in that comprise the steps:
For the program played, parsing obtains the cipher mode of program;
Whether the cipher mode for judging program is BISS cipher modes, if the descrambling pattern of Set Top Box is set to into non-senior peace Complete solution disturbs pattern, carries out BISS descramblings, otherwise the descrambling pattern of Set Top Box is set to into advanced security descrambling pattern;
Wherein, the step of descrambling pattern of Set Top Box being set to into non-advanced security descrambling pattern includes:
The first instruction functions in memory are called, the first setting is randomly generated and is instructed and store;The first encryption function is called, it is right First setting instruction is encrypted, and produces the effective order mark being associated with the first setting instruction of storage;
When arranging, the first setting instruction to encrypting is decrypted, and according to effective order identifier lookup to the first of storage Instruction is set, the first setting instruction of decryption is compared with the first setting instruction of storage, by machine top if both matchings The descrambling pattern of box is set to non-advanced security descrambling pattern.
2. Set Top Box ciphered program de-scrambling method according to claim 1, it is characterised in that described for the section played The step of mesh, cipher mode of parsing acquisition program, is specially:
Pmt table in the frequency of inquiry program place, parsing pmt table conditional reception system mark, according to condition receiving system mark Know corresponding cipher mode, obtain the cipher mode of program.
3. Set Top Box ciphered program de-scrambling method according to claim 1, it is characterised in that the descrambling by Set Top Box The step of pattern is set to advanced security descrambling pattern is specially:
The second instruction functions in memory are called, the second setting is randomly generated and is instructed and store;The second encryption function is called, it is right Second setting instruction is encrypted, and produces the effective order mark being associated with the second setting instruction of storage;When arranging, The second setting instruction to encrypting is decrypted, and according to the second setting instruction of effective order identifier lookup to storage, will solve The second close setting instruction is compared with the second setting instruction of storage, sets the descrambling pattern of Set Top Box if both matchings Advanced security descrambling pattern is set to, is not otherwise configured for illegal instruction.
4. a kind of Set Top Box, it is characterised in that include:
Cipher mode acquiring unit, for the program played, parsing obtains the cipher mode of program;
Mode setting unit, whether the cipher mode for judging program is BISS cipher modes, if then by the descrambling mould of Set Top Box Formula is set to non-advanced security descrambling pattern, carries out BISS descramblings, otherwise the descrambling pattern of Set Top Box is set to into advanced security Descrambling pattern;
Wherein, the first instruction functions during the mode setting unit is specifically for calling memory, randomly generate the first setting Instruct and store;The first encryption function is called, the first setting instruction is encrypted, and produce the first setting instruction with storage Associated effective order mark;
When arranging, the mode setting unit is decrypted to the first setting instruction encrypted, and is identified according to effective order The first setting instruction of storage is found, the first setting instruction of decryption is compared with the first setting instruction of storage, if The descrambling pattern of Set Top Box is then set to non-advanced security descrambling pattern by both matchings.
5. Set Top Box according to claim 4, it is characterised in that frequency that the cipher mode acquiring unit inquiry program is located Pmt table in point, parsing pmt table conditional reception system mark, according to condition receiving system corresponding cipher mode is identified, and is obtained Take the cipher mode of program.
6. Set Top Box according to claim 4, it is characterised in that call the second instruction functions in memory, it is random to produce Raw second setting is instructed and stored;Call the second encryption function, the second setting instruction be encrypted, and produce with storage the Two arrange the associated effective order mark of instruction;
When arranging, the mode setting unit is decrypted to the second setting instruction encrypted, and is identified according to effective order The second setting instruction of storage is found, the second setting instruction of decryption is compared with the second setting instruction of storage, if The descrambling pattern of Set Top Box is then set to advanced security descrambling pattern by both matchings, is not otherwise configured for illegal instruction.
CN201410124040.7A 2014-03-28 2014-03-28 Set top box encryption program descrambling method and set top box Expired - Fee Related CN103929680B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410124040.7A CN103929680B (en) 2014-03-28 2014-03-28 Set top box encryption program descrambling method and set top box

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410124040.7A CN103929680B (en) 2014-03-28 2014-03-28 Set top box encryption program descrambling method and set top box

Publications (2)

Publication Number Publication Date
CN103929680A CN103929680A (en) 2014-07-16
CN103929680B true CN103929680B (en) 2017-04-12

Family

ID=51147735

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410124040.7A Expired - Fee Related CN103929680B (en) 2014-03-28 2014-03-28 Set top box encryption program descrambling method and set top box

Country Status (1)

Country Link
CN (1) CN103929680B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105100889B (en) * 2015-08-12 2018-09-04 深圳创维数字技术有限公司 A kind of descramble key set updating method and set-top box
CN105578291B (en) * 2015-12-25 2018-09-21 广州视源电子科技股份有限公司 Television program processing method and system of digital television terminal
CN107343212B (en) * 2017-07-19 2020-07-10 海信视像科技股份有限公司 Descrambling method of digital television, digital television and CAM card

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1681299A (en) * 2004-02-26 2005-10-12 三星电子株式会社 Circuits and methods for providing conditional access and copy protection schemes for broadcast data
CN1780361A (en) * 2004-11-24 2006-05-31 纳格拉影像股份有限公司 Digital audio/video data processing unit and method for controlling access to said data
JP2007028519A (en) * 2005-07-21 2007-02-01 Toshiba Corp Broadcast receiver and broadcast receiving method
JP2010278935A (en) * 2009-05-31 2010-12-09 I2:Kk Conditional access system
CN102082971A (en) * 2011-02-10 2011-06-01 武汉天喻信息产业股份有限公司 Digital TV set top box (STB) chip and entitle receiving method adopting same

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9268735B2 (en) * 2008-09-30 2016-02-23 Oracle America, Inc. Loadable and modular conditional access application

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1681299A (en) * 2004-02-26 2005-10-12 三星电子株式会社 Circuits and methods for providing conditional access and copy protection schemes for broadcast data
CN1780361A (en) * 2004-11-24 2006-05-31 纳格拉影像股份有限公司 Digital audio/video data processing unit and method for controlling access to said data
JP2007028519A (en) * 2005-07-21 2007-02-01 Toshiba Corp Broadcast receiver and broadcast receiving method
JP2010278935A (en) * 2009-05-31 2010-12-09 I2:Kk Conditional access system
CN102082971A (en) * 2011-02-10 2011-06-01 武汉天喻信息产业股份有限公司 Digital TV set top box (STB) chip and entitle receiving method adopting same

Also Published As

Publication number Publication date
CN103929680A (en) 2014-07-16

Similar Documents

Publication Publication Date Title
CA2622505C (en) Method for verifying a target device connected to a master device
US9479825B2 (en) Terminal based on conditional access technology
US9270465B2 (en) Control word protection
CN1258898C (en) Method for managing symmetrical secret key in communication network, and device for carrying out such method
KR101406350B1 (en) Method for managing consumption of digital contents within a client domain and devices implementing this method
KR100969668B1 (en) Method for Downloading CAS in IPTV
US9402108B2 (en) Receiver software protection
JP2010193449A (en) Method of securely providing control word from smart card to conditional access module
WO2009094851A1 (en) Digital tv conditional access system and related handling procedure
EP2192773A1 (en) Content decryption device and encryption system using an additional key layer
CN102075812B (en) Data receiving method and system of digital television
KR20090111846A (en) A conditional access system
CN101335579A (en) Method implementing conditional reception and conditional receiving apparatus
WO2014121653A1 (en) Digital television signal receiving system and receiving method
CN103929680B (en) Set top box encryption program descrambling method and set top box
CN103581751B (en) A kind of digital television signal receives system and method for reseptance
US11308242B2 (en) Method for protecting encrypted control word, hardware security module, main chip and terminal
CA2916818C (en) Method for protecting decryption keys in a decoder and decoder for implementing said method
CN103250423B (en) For receiving the method for content of multimedia by control word scrambling and CAPTCHA
KR101280740B1 (en) Method to secure access to audio/video content in a decoding unit
CN104247437B (en) The method that the use of television receiver is tied to particular network
CN108259962B (en) Program switching method, set top box and storage medium
JP6163025B2 (en) Digital broadcasting tuner, terminal, station individual data supplement program, and tuner station individual data supplement method
CN101998163A (en) Entitlement management method, terminal equipment and front end
KR101314417B1 (en) Apparatus for providing and reproducing contents using secure chipset and the method threaof

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20170412

Termination date: 20200328

CF01 Termination of patent right due to non-payment of annual fee