CN103974122B - Set-top-box chip and apply the digital signature implementation method in set-top-box chip - Google Patents

Set-top-box chip and apply the digital signature implementation method in set-top-box chip Download PDF

Info

Publication number
CN103974122B
CN103974122B CN201310042010.7A CN201310042010A CN103974122B CN 103974122 B CN103974122 B CN 103974122B CN 201310042010 A CN201310042010 A CN 201310042010A CN 103974122 B CN103974122 B CN 103974122B
Authority
CN
China
Prior art keywords
chip
rsa public
public keys
rsa
keys
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310042010.7A
Other languages
Chinese (zh)
Other versions
CN103974122A (en
Inventor
许树娜
莫国兵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Montage Technology Shanghai Co Ltd
Montage LZ Technologies Chengdu Co Ltd
Original Assignee
Lan To Electronic Technology (chengdu) Co Ltd
Shanghai Lanshi Semiconductor Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lan To Electronic Technology (chengdu) Co Ltd, Shanghai Lanshi Semiconductor Co Ltd filed Critical Lan To Electronic Technology (chengdu) Co Ltd
Priority to CN201310042010.7A priority Critical patent/CN103974122B/en
Publication of CN103974122A publication Critical patent/CN103974122A/en
Application granted granted Critical
Publication of CN103974122B publication Critical patent/CN103974122B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The present invention provides a kind of set-top-box chip and applies the digital signature implementation method in set-top-box chip, and the digital signature implementation method includes:First, RSA public keys are encrypted using the key of the chip, obtain RSA public key cryptographies;Then the RSA public key cryptographies are stored to the pre-set space in the Flash;Then hash algorithm is run to RSA public keys, obtains the cryptographic Hash of the RSA public keys;Finally by the cryptographic Hash of the RSA public keys be implanted into the OTP registers of the chip for the chip starts when carry out signature verification.In the present invention, due to the introducing of hash algorithm, new implementation method effectively reduces the use of chip internal OTP resources, thereby reduce chip cost, further, since chip keys have the characteristics that uniqueness, RSA public keys are encrypted using it and effectively raise chip security.

Description

Set-top-box chip and apply the digital signature implementation method in set-top-box chip
Technical field
The present invention relates to digital television chip technical field, more particularly to a kind of set-top-box chip and applies in set-top box Digital signature implementation method in chip.
Background technology
With the development closed on digital technology of deadline, Chinese DTV conversion paces are progressively accelerated, and cut Only the cable digital TV user Chinese by 2010 alreadys exceed 80,000,000, IPTV users and has reached 8,500,000.With economy Fast-developing and living standard continuous improvement, requirement of the certain customers to program grade are also being continuously improved.In order to meet not Differentiated demand with user to program quality and program category, respective program is opened by way of payment to specific user Watching authority progressively becomes the mainstream of current operation way.
Simultaneously because the driving of interests, for existing set-top-box chip secure context deficiency, it is non-by various modes The phenomenon of method viewing sponsored program is commonplace, or even more and more pirate set-top boxes commercially also occur again and again.In order to Ensure the interests of operator and set-top box manufacturer as far as possible, it is necessary to begin to consider the peace for improving product from chip design stage Full performance.Therefore, the digital television chip with advanced security characteristic comes into being.
In order to ensure the integrality of code in set-top box Flash, the digital signature for verifying loader utility in Flash is one Kind prevents hacker from distorting and runs the effective means of unauthorized program.In the signature verification to program, mainly use at present It is asymmetrical RSA Algorithm(RSA be Rivest, Shamir and Adleman put forward based on number theory asymmetry(Open key) Encryption Algorithm, also known as asymmetric arithmetic).The algorithm requires CA manufacturers to sign using its private key to program, is opened in set-top box Verified during dynamic using the public key matched with it.For the RSA that CA manufacturers can only be used to provide when ensureing chip startup Public key carries out sign test, and ensures the versatility of chip, is generally implanted into the OTP of chip internal(One-time Programmable, abbreviation OTP)In register.With the raising of security intensity demand, field of set-top safety chip has been at present The key length of 2048BIT is generally used, this will be so that chip embeds OTP area sharp increases, so as to add chip cost.
The content of the invention
In view of the foregoing deficiencies of prior art, it is an object of the invention to provide a kind of set-top-box chip and apply Digital signature implementation method in set-top-box chip, for solving to bring because chip is embedded OTP areas increase in the prior art Chip cost it is high the problem of.
In order to achieve the above objects and other related objects, the present invention provides a kind of numeral label applied in set-top-box chip Name implementation method, the digital signature implementation method include:RSA public keys are encrypted using the key of the chip, are obtained RSA public key cryptographies;The RSA public key cryptographies are stored to the pre-set space in the Flash;RSA public keys operation Hash is calculated Method, obtains the cryptographic Hash of the RSA public keys;By the cryptographic Hash of the RSA public keys be implanted into the OTP registers of the chip for The chip carries out signature verification when starting.
In digital signature implementation method of the present invention, the step of signing to loading procedure is further included:Order is pre-stored in institute State loading procedure in Flash and run corresponding hash algorithm, obtain corresponding cryptographic Hash;Hash using RSA private keys to acquisition Value is signed, to obtain loading procedure signature;Loading procedure signature is stored to the pre-set space in the Flash.
The step of signature verification is carried out in digital signature implementation method of the present invention, when the chip starts to be included:From described The RSA public key cryptographies are loaded in Flash, and it is decrypted using the key of the chip, obtain RSA public keys in plain text;To institute State RSA public keys and run corresponding hash algorithm in plain text to obtain cryptographic Hash;Verify that the cryptographic Hash obtained and the OTP of the chip are posted Whether the cryptographic Hash for the RSA public keys being implanted into storage is consistent, if unanimously, the RSA public keys are effective in plain text;If differ Cause, then the RSA public keys are invalid in plain text, then authentication failed, into CPU suspended states;It is right in plain text using the effective RSA public keys The loading procedure signature operation signature verification algorithm;If signature verification is by running loading procedure;If signature verification is not led to Cross, into CPU suspended states.Specifically, further include to prejudge in the step of carrying out signature verification when the chip starts and open The step of whether dynamic model formula is safe mode, if so, the RSA public key cryptographies are then loaded from the Flash, and described in use The key of chip decrypts it, obtains RSA public keys in plain text;If it is not, then directly loaded from the Flash and run the loading Program.
The present invention also provides a kind of set-top-box chip, including:Flash storage, including it is stored with the program of loading procedure Memory block, the signature memory block for being stored with loading procedure signature and the public key memory block for being stored with RSA public key cryptographies, wherein, Generated when the RSA public key cryptographies are by being encrypted RSA public keys using chip keys;And OTP registers, including be stored with The memory block of RSA public key cryptographic Hash and the key storage area for being stored with chip keys, wherein, the RSA public keys cryptographic Hash is by RSA Public key operation hash algorithm generation.
In the set-top-box chip of the present invention, the loading procedure signature runs corresponding hash algorithm by loading procedure and obtains Corresponding cryptographic Hash, and signature generation is carried out to it using RSA private keys.
As described above, the present invention set-top-box chip and apply the digital signature implementation method in set-top-box chip, The cryptographic Hash of RSA public keys is implanted into chip internal OTP, while will be stored in using the encrypted RSA public key cryptographies of chip keys In Flash.When restarting every time, Flash is verified first with the cryptographic Hash and chip keys for the RSA public keys being implanted into chip The validity of middle RSA public key cryptographies, completes loader utility in Flash using the RSA public keys after decryption after being verified and signs Verification.Due to the introducing of hash algorithm, new implementation method effectively reduces the use of chip internal OTP resources, and then drops Low chip cost.Since chip keys have the characteristics that uniqueness, RSA public keys are encrypted using it and are effectively raised Chip security.
Brief description of the drawings
Fig. 1 is shown as the digital signature implementation method flow chart applied in set-top-box chip that the present invention carries.
Fig. 2 is shown as the method flow diagram that set-top-box chip of the invention carries out signature verification on startup.
Fig. 3 is shown as the data frame memory figure of set-top-box chip of the present invention.
Embodiment
Illustrate embodiments of the present invention below by way of specific instantiation, those skilled in the art can be by this specification Disclosed content understands other advantages and effect of the present invention easily.The present invention can also pass through in addition different specific realities The mode of applying is embodied or practiced, the various details in this specification can also be based on different viewpoints with application, without departing from Various modifications or alterations are carried out under the spirit of the present invention.
It should be noted that the diagram provided in the present embodiment only illustrates the basic conception of the present invention in a schematic way, Then in schema only display with it is of the invention in related component rather than component count, shape and size during according to actual implementation paint System, kenel, quantity and the ratio of each component can be a kind of random change during its actual implementation, and its assembly layout kenel also may be used Can be increasingly complex.
In order under the premise of chip security demand is met, reduce chip cost as far as possible, proposed in present embodiment A kind of signature verification implementation method of new loader utility, for convenience of the principle of the present invention is illustrated, in present embodiment, Sampling algorithm involved in technical solution will be illustrated, so with RSA-2048 exemplified by SHA-1, it is not limited to this, the calculation Method also can be SHA-256 algorithms.
For the principle of the present invention and effect is described in detail, referring to Fig. 1, be shown as that the present invention carries applies in set-top-box chip Digital signature implementation method flow chart, as shown in the figure, the digital signature implementation method comprises the following steps:
Step S11:Order is pre-stored in loading procedure in Flash and runs corresponding hash algorithm, obtains corresponding cryptographic Hash; That is, the Boot loader utilities for participating in verification are run into corresponding hash algorithm, obtains corresponding cryptographic Hash.In the present embodiment In, the hash algorithm is by taking SHA-1 as an example.It should be strongly noted that the Flash can be in the set-top-box chip Flash storage, or the Flash memory chip being arranged on outside the set-top-box chip.
Step S12:Signed using RSA private keys to the cryptographic Hash of acquisition, to obtain loading procedure signature;Specifically, Signed using RSA private keys to the cryptographic Hash of acquisition, obtain Boot Loader signatures, in this present embodiment, the use The signature length that RSA private keys carry out the cryptographic Hash of acquisition is 2048 bits.
Step S13:Loading procedure signature is stored to the pre-set space in the Flash;In this present embodiment, institute It can be the flash storage in the set-top-box chip to state Flash, or be arranged on outside the set-top-box chip Flash memory chip.
Step S14:RSA public keys are encrypted using the key of the chip, obtain RSA public key cryptographies;In this implementation In example, the RSA public key cryptographies length of acquisition is 2048 bits, and the key length of the chip is 128 bits, and decipherment algorithm makes Use TDES(That is the data encryption key Encryption Algorithm identical with decruption key)Or AES(Advanced Encryption Standard, abbreviation AES, also known as Rijndael enciphered methods).
Step S15:The RSA public key cryptographies are stored to the pre-set space in the Flash.
Step S16:Hash algorithm is run to RSA public keys, obtains the cryptographic Hash of the RSA public keys.In this present embodiment, institute The cryptographic Hash length for stating RSA public keys is 160 bits.
Step S17:The cryptographic Hash of the RSA public keys is implanted into the OTP registers of the chip so that the chip opens Signature verification is carried out when dynamic.
RSA public keys are encrypted using chip keys by the present invention, the ciphertext of RSA public keys are stored in Flash, therefore use Design method provided by the invention will greatly reduce the use of OTP storage resources in piece, and then reduce chip cost.
Referring to Fig. 2, the set-top-box chip for being shown as the present invention carries out the method flow diagram of signature verification on startup, such as Shown in figure, the method that the set-top-box chip carries out signature verification on startup comprises the following steps:
Step S21:First, prejudge whether start-up mode is safe mode, if so, then into halting rapid S22;If it is not, Then into rapid S28 is halted, i.e., directly loaded from the Flash and run the loading procedure.
Step S22:The RSA public key cryptographies are loaded from the Flash, and it is solved using the key of the chip It is close, obtain RSA public keys in plain text, the key length of the chip is 128 bits, and decipherment algorithm uses TDES or AES.
Step S23:Corresponding hash algorithm is run in plain text to the RSA public keys to obtain cryptographic Hash.In this present embodiment, The cryptographic Hash length of the RSA public keys is 160 bits.
Step S24:Verify the Kazakhstan for the RSA public keys being implanted into the OTP registers of the cryptographic Hash and chip obtained Whether uncommon value is consistent, if unanimously, into halting rapid S25;If inconsistent, into halting rapid S29.
Step S25:The RSA public keys are effective in plain text, i.e., verification result unanimously illustrates that this group of public key is effective.
Step S26:Signed in plain text to the loading procedure using the effective RSA public keys and run signature verification algorithm.
Whether step S27, judge signature verification by if so, then into halting rapid S28;If it is not, then into halting rapid S29.
:Step S28:Signature verification is by running loading procedure, i.e. normal operation Boot loader utilities.
Step S29:The RSA public keys are invalid in plain text, then authentication failed, into CPU suspended states.
RSA public keys are encrypted using chip keys by the present invention, and the ciphertext of RSA public keys is stored in Flash, is opened in chip RSA public keys are decrypted first by chip keys during dynamic, since chip keys possess the characteristics of uniqueness, and can not to software See, even if hacker has cracked RSA key pair, it is also difficult to the corresponding RSA public key cryptographies of every chips are obtained, so as to enhance chip Security.
Referring to Fig. 3, the data frame memory figure of set-top-box chip of the present invention is shown as, as shown in the figure, the machine top of the present invention Box chip 1 includes:Flash storage 11 and OTP registers 12.
The flash storage includes being stored with loading procedure(That is Boot loader utilities)Program storage area 113, It is stored with the signature memory block 114 of loading procedure signature and is stored with the public key memory block 115 of RSA public key cryptographies, wherein, Generated when the RSA public key cryptographies are by being encrypted RSA public keys using chip keys;The loading procedure signature is by loading journey The corresponding hash algorithm of sort run obtains corresponding cryptographic Hash, and carries out signature generation to it using RSA private keys.In the present embodiment In, the RSA public key cryptographies length that the public key memory block 115 stores is 2048 bits.What the signature memory block 114 stored adds The length for carrying program signature is 2048 bits.In specific embodiment, APP storages are further included in the flash storage 11 Area 111 and APP signatures memory block 112.
The OTP registers 12 include being stored with the memory block 121 of RSA public key cryptographic Hash and are stored with the close of chip keys Key memory block 122, wherein, the RSA public keys cryptographic Hash is generated by RSA public keys operation hash algorithm.In this present embodiment, it is described RSA public key cryptographic Hash length is 160 bits, and the key length of the chip is 128 bits, decipherment algorithm using TDES or AES.Therefore the use of OTP storage resources in piece will be greatly reduced using chip provided by the invention, and then reduces chip cost.
From the foregoing, it will be observed that implementation method provided by the invention is then that the cryptographic Hash of RSA public keys is being implanted into internal OTP, and In the Flash that will be put into by the encrypted RSA public key cryptographies of chip keys.Common RSA Algorithm is generally using 2048 ratios at present Special key strength, and the length of summarization of hash algorithm is significantly less than the length(There was only 160 bits by taking SHA-1 as an example), therefore adopt The use of OTP storage resources in piece will be greatly reduced with design method provided by the invention, and then reduces chip cost.Refer to Table 1, is expressed as Conventional implementations and is contrasted with new implementation resources of chip consumption, it is as shown in the table:
Since hash algorithm is there are certain risk of collision, and RSA Algorithm also deposit in itself it is certain crack risk, once RSA key will cause continue to use using the set-top box of the RSA key pair by the gross to being cracked, and be brought to manufacturer huge Big economic loss, to improve security, RSA public keys are encrypted using chip keys by the present invention, and RSA is stored in Flash The ciphertext of public key, decrypts RSA public keys, since chip keys possess uniqueness in chip start-up course first by chip keys The characteristics of, and it is invisible to software, even if hacker has cracked RSA key pair, it is also difficult to obtain the corresponding RSA public keys of every chips Ciphertext, so as to enhance chip security.
In conclusion the present invention set-top-box chip and apply the digital signature implementation method in set-top-box chip, The cryptographic Hash of RSA public keys is implanted into chip internal OTP, while will be stored in using the encrypted RSA public key cryptographies of chip keys In Flash.When restarting every time, Flash is verified first with the cryptographic Hash and chip keys for the RSA public keys being implanted into chip The validity of middle RSA public key cryptographies, completes loader utility in Flash using the RSA public keys after decryption after being verified and signs Verification.Due to the introducing of hash algorithm, new implementation method effectively reduces the use of chip internal OTP resources, and then drops Low chip cost.Since chip keys have the characteristics that uniqueness, RSA public keys are encrypted using it and are effectively raised Chip security.So the present invention effectively overcomes various shortcoming of the prior art and has high industrial utilization.
The above-described embodiments merely illustrate the principles and effects of the present invention, not for the limitation present invention.It is any ripe Know the personage of this technology all can carry out modifications and changes under the spirit and scope without prejudice to the present invention to above-described embodiment.Cause This, those of ordinary skill in the art is complete without departing from disclosed spirit and institute under technological thought such as Into all equivalent modifications or change, should by the present invention claim be covered.

Claims (5)

  1. A kind of 1. digital signature implementation method applied in set-top-box chip, it is characterised in that the digital signature realization side Method includes:
    RSA public keys are encrypted using the key of the chip, obtain RSA public key cryptographies;
    The RSA public key cryptographies are stored into the pre-set space into Flash;
    Hash algorithm is run to RSA public keys, obtains the cryptographic Hash of the RSA public keys;
    By the cryptographic Hash of the RSA public keys be implanted into the OTP registers of the chip for the chip starts when sign Verification, wherein, signature verification is carried out when the chip starts to be included:The RSA public key cryptographies are loaded from the Flash, and It is decrypted using the key of the chip, obtains RSA public keys in plain text;Corresponding Hash is run in plain text to the RSA public keys to calculate Method is to obtain cryptographic Hash;Verify the Hash for the RSA public keys being implanted into the OTP registers of the cryptographic Hash and chip obtained Whether value is consistent, if unanimously, the RSA public keys are effective in plain text;If inconsistent, the RSA public keys are invalid in plain text, then verify Failure, into CPU suspended states;Operation signature verification of being signed in plain text to the loading procedure using the effective RSA public keys is calculated Method;If signature verification is by running loading procedure;If signature verification is not by into CPU suspended states.
  2. 2. the digital signature implementation method according to claim 1 applied in set-top-box chip, it is characterised in that:Also wrap Include the step of signing to loading procedure:
    Order is pre-stored in loading procedure in Flash and runs corresponding hash algorithm, obtains corresponding cryptographic Hash;
    Signed using RSA private keys to the cryptographic Hash of acquisition, to obtain loading procedure signature;
    Loading procedure signature is stored to the pre-set space in the Flash.
  3. 3. the digital signature implementation method according to claim 1 applied in set-top-box chip, it is characterised in that:It is described Further include the step of whether start-up mode is safe mode prejudged in the step of signature verification is carried out when chip starts, if It is that the RSA public key cryptographies are then loaded from the Flash, and it is decrypted using the key of the chip, it is public obtains RSA Key is in plain text;If it is not, then directly loaded from the Flash and run the loading procedure.
  4. A kind of 4. set-top-box chip, it is characterised in that including:
    Flash storage, including be stored with the program storage area of loading procedure, be stored with the signature storage of loading procedure signature Area and the public key memory block for being stored with RSA public key cryptographies, wherein, the RSA public key cryptographies are by using chip keys to RSA Generated when public key is encrypted;
    OTP registers, including be stored with the memory block of RSA public key cryptographic Hash and be stored with the key storage area of chip keys, its In, the RSA public keys cryptographic Hash is generated by RSA public keys operation hash algorithm;
    Wherein, signature verification is carried out when the cryptographic Hash of the RSA public keys starts for the chip, wherein, when the chip starts Carrying out signature verification includes:The RSA public key cryptographies are loaded from the Flash, and it is solved using the key of the chip It is close, obtain RSA public keys in plain text;Corresponding hash algorithm is run in plain text to the RSA public keys to obtain cryptographic Hash;What verification obtained Whether the cryptographic Hash of the RSA public key of the cryptographic Hash with being implanted into the OTP registers of the chip is consistent, if unanimously, it is described RSA public keys are effective in plain text;If inconsistent, the RSA public keys are invalid in plain text, then authentication failed, into CPU suspended states;Make Signed in plain text to the loading procedure with the effective RSA public keys and run signature verification algorithm;If signature verification is by the way that operation adds Carry program;If signature verification is not by into CPU suspended states.
  5. 5. set-top-box chip according to claim 4, it is characterised in that:The loading procedure signature is run by loading procedure Corresponding hash algorithm obtains corresponding cryptographic Hash, and carries out signature generation to it using RSA private keys.
CN201310042010.7A 2013-02-04 2013-02-04 Set-top-box chip and apply the digital signature implementation method in set-top-box chip Active CN103974122B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310042010.7A CN103974122B (en) 2013-02-04 2013-02-04 Set-top-box chip and apply the digital signature implementation method in set-top-box chip

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310042010.7A CN103974122B (en) 2013-02-04 2013-02-04 Set-top-box chip and apply the digital signature implementation method in set-top-box chip

Publications (2)

Publication Number Publication Date
CN103974122A CN103974122A (en) 2014-08-06
CN103974122B true CN103974122B (en) 2018-04-24

Family

ID=51243082

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310042010.7A Active CN103974122B (en) 2013-02-04 2013-02-04 Set-top-box chip and apply the digital signature implementation method in set-top-box chip

Country Status (1)

Country Link
CN (1) CN103974122B (en)

Families Citing this family (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105354050B (en) * 2015-09-30 2019-05-17 深圳市九洲电器有限公司 A kind of application software call method of intelligent terminal
CN105224875B (en) * 2015-11-13 2018-04-06 上海斐讯数据通信技术有限公司 The secure startup system and method for a kind of terminal
CN107729743A (en) * 2016-08-10 2018-02-23 中国电信股份有限公司 The method, apparatus and system started for realizing mobile terminal safety
WO2018053844A1 (en) * 2016-09-26 2018-03-29 华为技术有限公司 Security authentication method, integrated circuit and system
CN107016290A (en) * 2017-04-26 2017-08-04 贵州省广播电视信息网络股份有限公司 A kind of method of anti-set top box brush machine
CN108347332A (en) * 2017-06-06 2018-07-31 清华大学 Verify the method and device of firmware signature
CN107992760B (en) * 2017-12-08 2021-08-13 深圳小湃科技有限公司 Key writing method, device, equipment and storage medium
CN108959980B (en) * 2018-07-25 2020-10-27 北京智芯微电子科技有限公司 Public key protection method and public key protection system of security chip
CN109829269A (en) * 2018-12-26 2019-05-31 平安科技(深圳)有限公司 Method, apparatus and system based on E-seal authenticating electronic documents
CN110020535B (en) * 2019-03-29 2021-07-30 深圳市九洲电器有限公司 Key data area data processing method and device and set top box
CN111327429B (en) * 2020-02-25 2022-07-22 杭州海康威视数字技术股份有限公司 Terminal starting processing method and device
CN111475815A (en) * 2020-04-08 2020-07-31 上海汉枫电子科技有限公司 Code protection method for chip
CN112243154B (en) * 2020-07-15 2022-08-05 福建新大陆通信科技股份有限公司 Set top box safe starting method, equipment and medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1898956A (en) * 2003-12-18 2007-01-17 松下电器产业株式会社 Method for authenticating and executing an application program
CN101175268A (en) * 2006-10-31 2008-05-07 华为技术有限公司 Method and device for controlling operation authority of communication terminal chip
CN101369889A (en) * 2007-08-13 2009-02-18 深圳兆日技术有限公司 System and method for electronic endorsement of document
CN101626484A (en) * 2008-07-07 2010-01-13 北京视博数字电视科技有限公司 Method for protecting control word in condition access system, front end and terminal
CN102509047A (en) * 2011-11-09 2012-06-20 北京赛科世纪数码科技有限公司 Method and system for verifying program code in set-top box
CN102799815A (en) * 2012-06-29 2012-11-28 安科智慧城市技术(中国)有限公司 Method and device for safely loading program library

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120060039A1 (en) * 2010-03-05 2012-03-08 Maxlinear, Inc. Code Download and Firewall for Embedded Secure Application

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1898956A (en) * 2003-12-18 2007-01-17 松下电器产业株式会社 Method for authenticating and executing an application program
CN101175268A (en) * 2006-10-31 2008-05-07 华为技术有限公司 Method and device for controlling operation authority of communication terminal chip
CN101369889A (en) * 2007-08-13 2009-02-18 深圳兆日技术有限公司 System and method for electronic endorsement of document
CN101626484A (en) * 2008-07-07 2010-01-13 北京视博数字电视科技有限公司 Method for protecting control word in condition access system, front end and terminal
CN102509047A (en) * 2011-11-09 2012-06-20 北京赛科世纪数码科技有限公司 Method and system for verifying program code in set-top box
CN102799815A (en) * 2012-06-29 2012-11-28 安科智慧城市技术(中国)有限公司 Method and device for safely loading program library

Also Published As

Publication number Publication date
CN103974122A (en) 2014-08-06

Similar Documents

Publication Publication Date Title
CN103974122B (en) Set-top-box chip and apply the digital signature implementation method in set-top-box chip
CN110474898A (en) Data encrypting and deciphering and key location mode, device, equipment and readable storage medium storing program for executing
CN110677250B (en) Key and certificate distribution method, identity information processing method, device and medium
US8560453B2 (en) Method and apparatus for dynamic, real-time ad insertion based on meta-data within a hardware based root of trust
US11184164B2 (en) Secure crypto system attributes
CN102509034B (en) Software license control method of software license control device
US7903820B2 (en) Key production system
CN107743067B (en) Method, system, terminal and storage medium for issuing digital certificate
US20120170740A1 (en) Content protection apparatus and content encryption and decryption apparatus using white-box encryption table
CN108134676A (en) Android system safe starting method and readable storage medium storing program for executing
CN109862560B (en) Bluetooth authentication method, device, equipment and medium
WO2011047078A3 (en) Firmware verified boot
WO2011119985A3 (en) Firmware authentication and deciphering for secure tv receiver
CN102413132A (en) Two-way-security-authentication-based data downloading method and system
CN103902915B (en) Trustable industrial control terminal and establishing method thereof
CN105357003B (en) A kind of method and device of encryption data
CN109034796A (en) Transaction monitoring and managing method, electronic device and readable storage medium storing program for executing based on alliance's chain
CN103841469A (en) Digital film copyright protection method and device
CN101615411B (en) Encryption method of playlist and media task of networking information release system
GB2587957A (en) Method for provisioning device certificates for electronic processors in untrusted environments
US11917084B2 (en) Cryptographic validation of media integrity
AU2014342209A1 (en) Cryptographic watermarking of content in fuel dispensing environments
CN114124364B (en) Key security processing method, device, equipment and computer readable storage medium
CN102170348A (en) Method for achieving encryption and decryption of data through recording user input speed
WO2015180459A1 (en) Method for verifying license of web system based on multiway tree search

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20171102

Address after: 200233 A18 site, 1 Yishan Road, Shanghai, Xuhui District, 900

Applicant after: MONTAGE TECHNOLOGY (SHANGHAI) CO.,LTD.

Applicant after: Montage LZ Technologies (Chengdu) Co.,Ltd.

Address before: 200233 room 406A, building 32, No. 680 Guiping Road, Shanghai, Xuhui District, China

Applicant before: MONTAGE TECHNOLOGY (SHANGHAI) Co.,Ltd.

GR01 Patent grant
GR01 Patent grant
PE01 Entry into force of the registration of the contract for pledge of patent right
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: Set-top box chips and digital signature implementation methods applied in set-top box chips

Granted publication date: 20180424

Pledgee: Renlai Electronic Technology (Shanghai) Co.,Ltd.

Pledgor: MONTAGE TECHNOLOGY (SHANGHAI) CO.,LTD.|Montage LZ Technologies (Chengdu) Co.,Ltd.

Registration number: Y2024980016169