CN105451038A - Code generation method, code authentication method, related device and system - Google Patents

Code generation method, code authentication method, related device and system Download PDF

Info

Publication number
CN105451038A
CN105451038A CN201510785581.9A CN201510785581A CN105451038A CN 105451038 A CN105451038 A CN 105451038A CN 201510785581 A CN201510785581 A CN 201510785581A CN 105451038 A CN105451038 A CN 105451038A
Authority
CN
China
Prior art keywords
top box
set top
server
code
current time
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510785581.9A
Other languages
Chinese (zh)
Inventor
蓝允长
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Skyworth Digital Technology Co Ltd
Shenzhen Skyworth Software Co Ltd
Original Assignee
Shenzhen Skyworth Digital Technology Co Ltd
Shenzhen Skyworth Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Skyworth Digital Technology Co Ltd, Shenzhen Skyworth Software Co Ltd filed Critical Shenzhen Skyworth Digital Technology Co Ltd
Priority to CN201510785581.9A priority Critical patent/CN105451038A/en
Publication of CN105451038A publication Critical patent/CN105451038A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/266Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel
    • H04N21/26613Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel for generating or managing keys in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/254Management at additional data server, e.g. shopping server, rights management server
    • H04N21/2541Rights Management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/45Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
    • H04N21/462Content or additional data management, e.g. creating a master electronic program guide from data received from the Internet and a Head-end, controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
    • H04N21/4623Processing of entitlement messages, e.g. ECM [Entitlement Control Message] or EMM [Entitlement Management Message]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/45Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
    • H04N21/462Content or additional data management, e.g. creating a master electronic program guide from data received from the Internet and a Head-end, controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
    • H04N21/4627Rights management associated to the content
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/80Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
    • H04N21/83Generation or processing of protective or descriptive data associated with content; Content structuring
    • H04N21/835Generation of protective data, e.g. certificates
    • H04N21/8352Generation of protective data, e.g. certificates involving content or source identification data, e.g. Unique Material Identifier [UMID]

Landscapes

  • Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention discloses a code generation method, a code authentication method, a related device and a system. According to the method, the identification code of a set top box and the current time of a server by the server are acquired, a super code is generated by a server preset algorithm based on the identification code and the current time of the server, and the super code is transmitted to the set top box, the set top box receives the super code transmitted by the server, the decryption information is acquired, and whether the super code is matched with the decryption information is determined, if yes, the set top box is unlocked. Because the identification code of the set top box is unique and the current time of the server continuously changes, the super code generated by the preset algorithm is unique and dynamically changes, the unique super code which dynamically changes is provided for the set top box, and other people cannot unlock the set top box with the fixed super code.

Description

A kind of password generation, authentication method, relevant apparatus and system
Technical field
The present invention relates to field of terminal, particularly a kind of password generation, authentication method, relevant apparatus and system.
Background technology
At present, many intelligent terminals are as mobile phone, computer, Set Top Box etc., application function gets more and more, the personal information of the user entrained by intelligent terminal also gets more and more, in order to protect individual privacy, usual user can arrange startup password or the encryption of certain application program of terminal, such as: user can arrange password to Set Top Box usually, or the some multicast function to Set Top Box, personal information reading etc. arranges password, but, once user forgets this password, Set Top Box will be caused to start shooting or personal information read cannot, in prior art, the mode of the fixing effective super code of usual employing one unlocks Set Top Box, but, this super code is applicable to the Set Top Box of all same moneys usually, and super code is permanently effective, thus easily reveal to other people, cracked by other people, dangerous.
Summary of the invention
Embodiment of the present invention technical problem to be solved is, the generation of a kind of password, authentication method, relevant apparatus and system are provided, can realize providing unique and the super code of dynamic change to Set Top Box, prevent other people from utilizing changeless super code to unlock Set Top Box.
The invention provides a kind of method for generating cipher code, be applied to server, comprising:
Obtain identification code and the server current time of Set Top Box;
According to described identification code and described server current time, generate super code by server preset algorithm;
Described super code is sent to described Set Top Box, and described super code is used for unlocking described Set Top Box when described Set Top Box is locked.
Alternatively, described described super code is sent to described Set Top Box before, described method also comprises: the time step rise time authority that described server changes according to described server current time; Or described server is according to preset time threshold rise time authority; Described time authority is for limiting the effective storage life of described super code;
Described described super code is sent to described Set Top Box while, described method also comprises: described time authority is sent to described Set Top Box.
Alternatively, described server is carrier server or third-party server, and wherein, described method also comprises: the daily record of recording described Set Top Box;
When described method is applied to described third-party server, described method also comprises: by the Log Sender of described Set Top Box to giving described carrier server.
Present invention also offers a kind of password generating apparatus, be applied to server, comprising:
First acquiring unit, for obtaining identification code and the server current time of Set Top Box;
Generation unit, for according to described identification code and described server current time, generates super code by server preset algorithm;
Transmitting element, for described super code is sent to described Set Top Box, described super code is used for unlocking described Set Top Box when described Set Top Box is locked.
Alternatively, described generation unit is also for the time step rise time authority according to described server current time change; Or according to preset time threshold rise time authority; Described time authority is for limiting the effective storage life of described super code;
Described transmitting element is also for being sent to described Set Top Box by described time authority.
Alternatively, described server is carrier server or third-party server, wherein,
When described application of installation is in described carrier server, described device also comprises: storage element, for recording the daily record of described Set Top Box;
When described application of installation is in described third-party server, described transmitting element also for, by the Log Sender of described Set Top Box to give carrier server.
Present invention also offers a kind of cipher authentication method, be applied to Set Top Box, comprising:
The super code that reception server sends, described super code is that described server is generated by server preset algorithm according to the current time of the identification code of described Set Top Box and described server;
Obtain decryption information;
Judge whether described super code mates with described decryption information, if so, then unlock described Set Top Box.
Alternatively, after the described Set Top Box of described unblock, described method also comprises: the unlocking pin resetting described Set Top Box, and described unlocking pin is used for unlocking described Set Top Box when the decryption information of user's input that described Set Top Box obtains is consistent with described unlocking pin.
Alternatively, before or after the super code that described reception server sends, described method also comprises: the time authority that receiving front-end sends, and described time authority is for limiting the effective storage life of described super code;
While described acquisition decryption information, described method also comprises: obtain Set Top Box current time;
Described judge whether described super code mates with described decryption information before, described method also comprises:
Judge, within the effective storage life scope whether described Set Top Box current time allows in described time authority, if so, then to perform the described step whether described super code mates with described decryption information that judges.
Alternatively, described acquisition decryption information comprises:
Obtain the decryption information of user's input.
Alternatively, described acquisition decryption information comprises:
Obtain identification code and the Set Top Box current time of Set Top Box;
According to described identification code and described Set Top Box current time, by terminal preset algorithm generating solution confidential information, described Set Top Box preset algorithm is identical with described server preset algorithm.
Present invention also offers a kind of cipher authentication device, be applied to Set Top Box, comprise:
Receiving element, for the super code that reception server sends, described super code is that described server is generated by server preset algorithm according to the current time of the identification code of described Set Top Box and described server;
Second acquisition unit, for obtaining decryption information;
Judging unit, for judging whether described super code mates with described decryption information, if so, then unlocks described Set Top Box.
Alternatively, described device also comprises: setting unit, and for resetting the unlocking pin of described Set Top Box, described unlocking pin is used for unlocking described Set Top Box when the decryption information of user's input that described Set Top Box obtains is consistent with described unlocking pin.
Alternatively, described receiving element is also for the time authority that: receiving front-end sends, and described time authority is for limiting the effective storage life of described super code;
Described second acquisition unit also for, while described acquisition decryption information, obtain Set Top Box current time;
Described judging unit also for, described judge whether described super code mates with described decryption information before, judge within the effective storage life scope whether described Set Top Box current time allows in described time authority, if so, then the described step whether described super code mates with described decryption information that judges is performed.
Alternatively, described second acquisition unit specifically for, obtain user input decryption information.
Alternatively, described second acquisition unit specifically for,
Obtain identification code and the Set Top Box current time of Set Top Box;
According to described identification code and described Set Top Box current time, by terminal preset algorithm generating solution confidential information, described Set Top Box preset algorithm is identical with described server preset algorithm.
Present invention also offers the generation of a kind of password, Verification System, comprise server and Set Top Box, described server comprises above-mentioned password generating apparatus; Described Set Top Box comprises above-mentioned cipher authentication device.
Foregoing invention, obtains identification code and the server current time of Set Top Box by server, according to this identification code and server current time, generate super code, and this super code is sent to Set Top Box by server preset algorithm; The super code that Set Top Box reception server sends, obtain decryption information, and judge whether super code mates with decryption information, if, then unlock this Set Top Box, the unique and server current time of the identification code due to Set Top Box constantly changes, the unique and dynamic change of the super code thus it generated by preset algorithm, thus provide unique and the super code of dynamic change to realization to Set Top Box, prevent other people from utilizing changeless super code to unlock Set Top Box.
Accompanying drawing explanation
In order to be illustrated more clearly in the embodiment of the present invention or technical scheme of the prior art, be briefly described to the accompanying drawing used required in embodiment or description of the prior art below, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
Fig. 1 is the flow chart of a kind of method for generating cipher code one of the present invention execution mode;
Fig. 2 is the flow chart of a kind of cipher authentication method one of the present invention execution mode;
Fig. 3 is that a kind of password of the present invention generates, the flow chart of Verification System one execution mode;
Fig. 4 is that a kind of password of the present invention generates, the flow chart of another execution mode of Verification System;
Fig. 5 is the structural representation of a kind of password generating apparatus one of the present invention execution mode;
Fig. 6 is the structural representation of a kind of cipher authentication device one of the present invention execution mode;
Fig. 7 is that a kind of password of the present invention generates, the structural representation of Verification System.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, be clearly and completely described the technical scheme in the embodiment of the present invention, obviously, described embodiment is only the present invention's part embodiment, instead of whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art, not making the every other embodiment obtained under creative work prerequisite, belong to the scope of protection of the invention.
It should be noted that, the term used in embodiments of the present invention is only for the object describing specific embodiment, and not intended to be limiting the present invention." one ", " described " and " being somebody's turn to do " of the singulative used in the embodiment of the present invention and appended claims is also intended to comprise most form, unless context clearly represents other implications.It is also understood that term "and/or" used herein refer to and comprise one or more project of listing be associated any or all may combine.
Refer to Fig. 1, Fig. 1 is the flow chart of a kind of method for generating cipher code one of the present invention execution mode.A kind of method for generating cipher code of present embodiment can be applied to server, and this server can be carrier server also can be third-party server, and this method for generating cipher code comprises:
Step S101: the identification code and the server current time that obtain Set Top Box.
Digital video switching box (SetTopBox, STB), so-called Set Top Box, the equipment connecting television set and outside source, the digital signal of compression can be changed into television content by it, and show on a television set, wherein external signal can from wire cable, satellite antenna, broadband network and terrestrial broadcasting etc.Set Top Box not only can receive image, the sound-content that simulated television provides, the digital content comprising electronic program guides, internet webpage, captions etc. can also be received, thus make user can watch digital television program on existing television set, and carry out interactive digital amusement, education and commercialization activity by network.Along with increasing of the inner value-added service of Set Top Box, user more and more focuses on information security and the individual privacy of Set Top Box, and thus, usually, user can arrange the startup password of Set Top Box or the interpolation unlatching password for certain valued added applications.
When user forgets the unlatching password of the startup password of Set Top Box or certain value-added service, Set Top Box or its this application are in the lock state, cannot open or this application cannot be used, now, user can obtain super code to server request, the mode of request can be call to operator or send mail etc., or the third party that request operator is authorized unlocks Set Top Box.After operator or third party check user profile, unlocking operation is carried out to Set Top Box.
Particularly, operator or third-party server obtain identification code and the server current time of Set Top Box, and the identification code of Set Top Box is used for cognitron top box, and the identification code of this Set Top Box can be the sequence number (MCID) of Set Top Box.
It should be noted that, the server current time that server obtains, the unit specified can be got, such as, to get hour, such as, if during server current time 13 days 14 August in 2015 33 points 18 seconds, then the server current time obtained can be got hour, is 2015081314, also sky 20150813 can be got, wherein the time of server and the time synchronized of Set Top Box.
Step S102: according to identification code and server current time, generates super code by server preset algorithm.
Particularly, the identification code of Set Top Box and the combination of server current time can pass through server preset algorithm, such as md5 encryption algorithm, generates character string, then passes through dictionary enquiring, such as, utilize the character list of 8859-1, the character string of generation is converted to super code, such as: the identification code of Set Top Box is 123456789ABCDEF, the server current time obtained when being 05 day 10 November in 2015 23 points, is expressed as 201511051023.The then identification code of Set Top Box and being combined as of server current time: 123456789ABCDEF201511051023, the character string generated by md5 encryption algorithm is: e93a81546c52f707ade5f45b924b5b83.Can only get ASSIC code, namely, character after removing 0x7A, character before 0x30 and comprise 0x3A and 0x40 0x3A and 0x40 between character, as spcial character represents with null character (NUL), e9 is the character after 0x7A, cast out e9, 3a casts out, 81 cast out for the character after 0x7A, the like, finally obtain 546c525b4b5b, by 8859-1 character list inquiry obtain TlR [K [, suppose only to get 8 characters as super code, if inquire about the character obtained to be greater than 8, only get first 8, if the character that inquiry obtains is less than 8, thereafter character z can added, the super code of above-mentioned citing embodiment is: TlR [K [zz.
It should be noted that, the form of identification code and the combination of server current time can be the direct connection of identification code and server current time, also can be by a certain symbol, such as " # ", " & " or "-" etc. couple together, cryptographic algorithm in server preset algorithm of the present invention can be MD5, AES, 1DES, 3DES, one in CRPM and CSS etc., the present invention is not restricted, the dictionary used can be the character list of 8859-1, ASSIC, 8859 series, unicode, any one in utf8 etc., do not invent and be not restricted, the processing method of character is obtained by dictionary enquiring, and the processing method etc. of super code, do not invent and all do not limit.
Step S103: super code is sent to Set Top Box.
Particularly, super code is sent to Set Top Box by wire cable, broadband or network by server.This super code is used for unlocking Set Top Box when Set Top Box is locked.
It should be noted that, alternatively, before super code is sent to Set Top Box, server can according to the time step rise time authority of server current time change, such as, if during server current time 13 days 14 August in 2015 33 points 18 seconds, and in step S101, it hour is 2015081314 that the server current time that server obtains can be got, then effective time, authority was that super code is effectively front when 13 days 15 August in 2015; Also can according to preset time threshold rise time authority, such as, if during server current time 13 days 14 August in 2015 33 points 18 seconds, arranging preset time threshold is 3 hours, then super code when then 13 days 17 August in 2015 33 points before 18 seconds effectively.Time authority, while super code is sent to Set Top Box, is also sent to Set Top Box by server, the effective time that this time authority uses for limiting super code.
Also it should be noted that, server in the present embodiment can be carrier server, also can be third-party server, after super code or time authority are sent to Set Top Box by server, the daily record of the Set Top Box that the daily record of this Set Top Box of server record or receiver top box send, contains the transmission record of this super code in this daily record.When server is applied to third-party server, third-party server also needs the Log Sender of Set Top Box extremely to carrier server.
Foregoing invention, server is by obtaining identification code and the server current time of Set Top Box, according to this identification code and server current time, super code is generated by server preset algorithm, and this super code is sent to Set Top Box, for unlocking Set Top Box, unique and the server current time of identification code due to Set Top Box constantly changes, thus the unique and dynamic change of the super code it generated by preset algorithm, thus provide unique and the super code of dynamic change to realization to Set Top Box, prevent other people from utilizing changeless super code to unlock Set Top Box.
Refer to Fig. 2, Fig. 2 is the flow chart of a kind of cipher authentication method one of the present invention execution mode.A kind of cipher authentication method of present embodiment can be applied to Set Top Box, and this cipher authentication method comprises:
Step S201: the super code that reception server sends.
Particularly, Set Top Box passes through the super code that wire cable, broadband or network reception server send.
It should be noted that, before or after the super code that Set Top Box reception server sends, the time authority that all right reception server of Set Top Box sends, for limiting the effective time that super code uses, this time authority can be that the time step that server changes according to server current time generates, or also can be that server generates according to preset time threshold.
Step S202: obtain decryption information.
When Set Top Box is for lock-out state, when cannot unlock, can to service provider or third party's acquisition request super code, Set Top Box can send request the instruction of super code to server, also can be that user informs operator or third party by modes such as mail, phone or notes, operator or third-party server are after generation super code, and super code is sent to Set Top Box, and operator or third party inform user's super code by modes such as mail, phone or notes.
Particularly, can by obtaining the decryption information of user's input at Set Top Box locking interface; Also can by obtaining identification code and the Set Top Box current time of Set Top Box, according to identification code and Set Top Box current time, by Set Top Box preset algorithm generating solution confidential information, wherein Set Top Box preset algorithm is identical with server preset algorithm.
Step S203: judge whether super code mates with decryption information.
Particularly, super code and decryption information are compared, if consistent, super code mates with decryption information, and decryption information is correct, then perform step S204, otherwise Set Top Box can keep lock-out state, the input error of prompting user cipher, or process ends, the present invention is not restricted.
It should be noted that, when Set Top Box receives the time authority of server transmission, step S202 also comprises: the current time obtaining Set Top Box while Set Top Box obtains decryption information, step S203 also comprises: within the scope whether current time judging Set Top Box allows in time authority, particularly, can by the current time that judges Set Top Box whether before time authority permission deadline, such as when the current time of Set Top Box is 5 days 15 November in 2015 22 points, when deadline that authority allows time is 5 days 18 November in 2015 00 point, then the current time of Set Top Box is within the scope of time authority permission.Only have within the scope that super code mates with decryption information and the current time of Set Top Box allows in time authority, just unlock this Set Top Box, otherwise Set Top Box keeps lock-out state, the input error of prompting user cipher.
Step S204: unlock this Set Top Box.
Particularly, when super code mates with decryption information, unlock Set Top Box; When step S203 comprise judge Set Top Box current time whether within the scope that time authority allows time, only have within the scope that super code mates with decryption information and the current time of Set Top Box allows in time authority, just unlock this Set Top Box.
Alternatively, after unlocking Set Top Box, the unlocking pin that can reset.Particularly, unlocking successfully, Pop-up message frame, prompting user resets unlocking pin, and Set Top Box receives user resets interface input encrypted message at password, and set it to unlocking pin, this password is for unlocking Set Top Box.
Foregoing invention, by the super code that reception server sends, this super code is that server is generated by server preset algorithm according to the identification code of Set Top Box and the current time of server, and obtain decryption information, and then judge whether super code mates with decryption information, if so, then Set Top Box is unlocked.Unique and the server current time of identification code due to Set Top Box constantly changes, thus the unique and dynamic change of the super code it generated by preset algorithm, thus provide unique and the super code of dynamic change to realization to Set Top Box, prevent other people from utilizing changeless super code to unlock Set Top Box.
Refer to Fig. 3, Fig. 3 is that a kind of password of the present invention generates, the flow chart of Verification System one execution mode.A kind of cipher authentication method of present embodiment can be applied to Set Top Box, and this cipher authentication method comprises:
Step S301: the identification code and the server current time that obtain Set Top Box.
When user forgets the unlatching password of the startup password of Set Top Box or certain value-added service, Set Top Box or its this application are in the lock state, cannot open or this application cannot be used, now, user can obtain super code to server request, the mode of request can be call to operator or send mail etc., or the third party that request operator is authorized unlocks Set Top Box.After operator or third party check user profile, unlocking operation is carried out to Set Top Box.
Particularly, operator or third-party server obtain identification code and the server current time of Set Top Box, and the identification code of Set Top Box is used for cognitron top box, and the identification code of this Set Top Box can be the sequence number (MCID) of Set Top Box.
It should be noted that, the server current time that server obtains, the unit specified can be got, such as, to get hour, such as, if during server current time 13 days 14 August in 2015 33 points 18 seconds, then the server current time obtained can be got hour, is 2015081314, also sky 20150813 can be got, wherein the time of server and the time synchronized of Set Top Box.
Step S302: according to identification code and server current time, generates super code by server preset algorithm.
Particularly, the identification code of Set Top Box and the combination of server current time can pass through server preset algorithm, such as md5 encryption algorithm, generates character string, then passes through dictionary enquiring, such as, utilize the character list of 8859-1, the character string of generation is converted to super code, such as: the identification code of Set Top Box is 123456789ABCDEF, the server current time obtained when being 05 day 10 November in 2015 23 points, is expressed as 201511051023.The then identification code of Set Top Box and being combined as of server current time: 123456789ABCDEF201511051023, the character string generated by md5 encryption algorithm is: e93a81546c52f707ade5f45b924b5b83.Can only get ASSIC code, namely, character after removing 0x7A, character before 0x30 and comprise 0x3A and 0x40 0x3A and 0x40 between character, as spcial character represents with null character (NUL), e9 is the character after 0x7A, cast out e9, 3a casts out, 81 cast out for the character after 0x7A, the like, finally obtain 546c525b4b5b, by 8859-1 character list inquiry obtain TlR [K [, suppose only to get 8 characters as super code, if inquire about the character obtained to be greater than 8, only get first 8, if the character that inquiry obtains is less than 8, thereafter character z can added, the super code of above-mentioned citing embodiment is: TlR [K [zz.
It should be noted that, the form of identification code and the combination of server current time can be the direct connection of identification code and server current time, also can be by a certain symbol, such as " # ", " & " or "-" etc. couple together, cryptographic algorithm in server preset algorithm of the present invention can be MD5, AES, 1DES, 3DES, one in CRPM and CSS etc., the present invention is not restricted, the dictionary used can be the character list of 8859-1, ASSIC, 8859 series, unicode, any one in utf8 etc., do not invent and be not restricted, the processing method of character is obtained by dictionary enquiring, and the processing method etc. of super code, do not invent and all do not limit.
Step S303: super code is sent to Set Top Box.
Particularly, super code is sent to Set Top Box by wire cable, broadband or network by server.This super code is used for unlocking Set Top Box when Set Top Box is locked.
It should be noted that, before super code is sent to Set Top Box, server can according to the time step rise time authority of server current time change, such as, if during server current time 13 days 14 August in 2015 33 points 18 seconds, and in step S101, it hour is 2015081314 that the server current time that server obtains can be got, then effective time, authority was that super code is effectively front when 13 days 15 August in 2015; Also can according to preset time threshold rise time authority, such as, if during server current time 13 days 14 August in 2015 33 points 18 seconds, arranging preset time threshold is 3 hours, then super code when then 13 days 17 August in 2015 33 points before 18 seconds effectively.Time authority described above, while super code is sent to Set Top Box, is also sent to Set Top Box by server.
Step S304: the super code that Set Top Box reception server sends.
Particularly, Set Top Box passes through the super code that wire cable, broadband or network reception server send.
It should be noted that, before or after the super code that Set Top Box reception server sends, the time authority that all right reception server of Set Top Box sends, for limiting the effective time that super code uses, this time authority can be that the time step that server changes according to server current time generates, or also can be that server generates according to preset time threshold.
Step S305: Set Top Box obtains decryption information.
When Set Top Box is for lock-out state, when cannot unlock, can to service provider or third party's acquisition request super code, Set Top Box can send request the instruction of super code to server, also can be that user informs operator or third party by modes such as mail, phone or notes, operator or third-party server are after generation super code, and super code is sent to Set Top Box, and operator or third party inform user's super code by modes such as mail, phone or notes.
Particularly, can by obtaining the decryption information of user's input at Set Top Box locking interface; Also can by obtaining identification code and the Set Top Box current time of Set Top Box, according to identification code and Set Top Box current time, by Set Top Box preset algorithm generating solution confidential information, wherein Set Top Box preset algorithm is identical with server preset algorithm.
Step S306: judge whether super code mates with decryption information.
Particularly, super code and decryption information are compared, if consistent, super code mates with decryption information, and decryption information is correct, unlocks this Set Top Box, otherwise Set Top Box keeps lock-out state, the input error of prompting user cipher.
It should be noted that, when Set Top Box receives the time authority of server transmission, step S305 also comprises: the current time obtaining Set Top Box while Set Top Box obtains decryption information, step S306 also comprises: within the scope whether current time judging Set Top Box allows in time authority, particularly, comparison deadline that Set Top Box current time and time authority can be allowed, judge that the current time of Set Top Box is whether before time authority allows deadline, such as when the current time of Set Top Box is 5 days 15 November in 2015 22 points, when deadline that authority allows time is 5 days 18 November in 2015 00 point, then the current time of Set Top Box is within the scope of time authority permission.Only have within the scope that super code mates with decryption information and the current time of Set Top Box allows in time authority, just unlock this Set Top Box, otherwise, process ends, or Set Top Box can keep lock-out state, the input error of prompting user cipher, the present invention is not restricted.
Step S307: unlock this Set Top Box.
Particularly, when super code mates with decryption information, unlock Set Top Box; When step S203 comprise judge Set Top Box current time whether within the scope that time authority allows time, only have within the scope that super code mates with decryption information and the current time of Set Top Box allows in time authority, just unlock this Set Top Box.
Alternatively, after unlocking Set Top Box, the unlocking pin that can reset.Particularly, unlocking successfully, Pop-up message frame, prompting user resets unlocking pin, and Set Top Box receives user resets interface input encrypted message at password, and set it to unlocking pin, this password is for unlocking Set Top Box.
It should be noted that, server in the present embodiment can be carrier server, also can be third-party server, after super code or time authority are sent to Set Top Box by server, the daily record of this Set Top Box of server record, contains the transmission record of this super code in this daily record.When server is applied to third-party server, third-party server also needs the Log Sender of Set Top Box extremely to carrier server.
Foregoing invention, identification code and the server current time of Set Top Box is obtained by server, according to described identification code and described server current time, generate super code by described server preset algorithm, and this super code is sent to described Set Top Box; The super code that Set Top Box reception server sends, obtain decryption information, and judge whether described super code mates with the described confidential information of solution, if, then unlock described Set Top Box, the unique and server current time of the identification code due to Set Top Box constantly changes, the unique and dynamic change of the super code thus it generated by preset algorithm, thus provide unique and the super code of dynamic change to realization to Set Top Box, prevent other people from utilizing changeless super code to unlock Set Top Box.
Refer to Fig. 4, Fig. 4 is that a kind of password of the present invention generates, the flow chart of another execution mode of Verification System.A kind of password of present embodiment generates, Verification System can be applied to server and Set Top Box, and this password generates, Verification System comprises:
Step S401: the identification code and the server current time that obtain Set Top Box.
Particularly, operator or third-party server obtain identification code and the server current time of Set Top Box, and the identification code of Set Top Box is used for cognitron top box, and the identification code of this Set Top Box can be the sequence number (MCID) of Set Top Box.
It should be noted that, the server current time that server obtains, the unit specified can be got, such as, to get hour, such as, if during server current time 13 days 14 August in 2015 33 points 18 seconds, then the server current time obtained can be got hour, is 2015081314, also sky 20150813 can be got, wherein the time of server and the time synchronized of Set Top Box.
Step S402: according to identification code and server current time, generates super code by server preset algorithm.
Particularly, the identification code of Set Top Box and the combination of server current time can pass through server preset algorithm, such as md5 encryption algorithm, generates character string, then passes through dictionary enquiring, such as, utilize the character list of 8859-1, the character string of generation is converted to super code, such as: the identification code of Set Top Box is 123456789ABCDEF, the server current time obtained when being 05 day 10 November in 2015 23 points, is expressed as 201511051023.The then identification code of Set Top Box and being combined as of server current time: 123456789ABCDEF201511051023, the character string generated by md5 encryption algorithm is: e93a81546c52f707ade5f45b924b5b83.Can only get ASSIC code, namely, character after removing 0x7A, character before 0x30 and comprise 0x3A and 0x40 0x3A and 0x40 between character, as spcial character represents with null character (NUL), e9 is the character after 0x7A, cast out e9, 3a casts out, 81 cast out for the character after 0x7A, the like, finally obtain 546c525b4b5b, by 8859-1 character list inquiry obtain TlR [K [, suppose only to get 8 characters as super code, if inquire about the character obtained to be greater than 8, only get first 8, if the character that inquiry obtains is less than 8, thereafter character z can added, the super code of above-mentioned citing embodiment is: TlR [K [zz.
It should be noted that, the form of identification code and the combination of server current time can be the direct connection of identification code and server current time, also can be by a certain symbol, such as " # ", " & " or "-" etc. couple together, cryptographic algorithm in server preset algorithm of the present invention can be MD5, AES, 1DES, 3DES, one in CRPM and CSS etc., the present invention is not restricted, the dictionary used can be the character list of 8859-1, ASSIC, 8859 series, unicode, any one in utf8 etc., do not invent and be not restricted, the processing method of character is obtained by dictionary enquiring, and the processing method etc. of super code, do not invent and all do not limit.
Step S403: rise time authority.
Particularly, server can according to the time step rise time authority of server current time change, such as, if during server current time 13 days 14 August in 2015 33 points 18 seconds, and in step S101, it hour is 2015081314 that the server current time that server obtains can be got, then effective time, authority was that super code is effectively front when 13 days 15 August in 2015; Also can according to preset time threshold rise time authority, such as, if during server current time 13 days 14 August in 2015 33 points 18 seconds, arranging preset time threshold is 3 hours, then super code when then 13 days 17 August in 2015 33 points before 18 seconds effectively.Time authority, while super code is sent to Set Top Box, is also sent to Set Top Box by server, the effective time that this time authority uses for limiting super code.
Step S404: super code and time authority are sent to Set Top Box.
Particularly, super code and time authority are sent to Set Top Box by wire cable, broadband or network by server.This super code is used for unlocking Set Top Box when Set Top Box is locked.
Step S405: the super code that reception server sends and time authority.
Particularly, the super code that sent by wire cable, broadband or network reception server of Set Top Box and time authority.
Step S406: obtain decryption information and Set Top Box current time.
Particularly, Set Top Box obtains decryption information and Set Top Box current time, can by obtaining the decryption information of user's input at Set Top Box locking interface; Also can by obtaining identification code and the Set Top Box current time of Set Top Box, according to identification code and Set Top Box current time, by Set Top Box preset algorithm generating solution confidential information, wherein Set Top Box preset algorithm is identical with server preset algorithm.
Step S407: judge whether super code mates with decryption information.
Particularly, super code and decryption information are compared, if consistent, super code mates with decryption information, then decryption information is correct.
Step S408: within the scope whether current time judging Set Top Box allows in time authority.
Within the scope whether current time judging Set Top Box allows in time authority, particularly, comparison deadline that Set Top Box current time and time authority can be allowed, judge that the current time of Set Top Box is whether before time authority allows deadline, if so, then Set Top Box current time the time authority allow scope within.
It should be noted that, step S407 and step S408 can perform with any order, and also can perform, the present invention is not restricted simultaneously.
Step S409: unlock this Set Top Box.
Only have within the scope that super code mates with decryption information and the current time of Set Top Box allows in time authority, just unlock this Set Top Box; Otherwise, process ends, or Set Top Box can keep lock-out state, and prompting user cipher mistake, the present invention is not restricted.
Step S410: the unlocking pin reset.
Particularly, after Set Top Box unlocks, the unlocking pin that can reset.Particularly, unlocking successfully, Pop-up message frame, prompting user resets unlocking pin, and Set Top Box receives user resets interface input encrypted message at password, and set it to unlocking pin, this password is for unlocking Set Top Box.
Step S411: send set-top performance logs to server.
Particularly, the operation that Set Top Box meeting moment logging machine top box is current, when after Set Top Box unlocks or after completing password replacement, whether unlock successfully to server feedback Set Top Box, also this set-top performance logs can be sent to server, or send password to Set Top Box and reset successful message, the process of notification server this time operation or result.
Step S412: to storage set-top performance logs.
Particularly, server also can the Operation Log of logging machine top box, and server also can the daily record that sends of receiving set up box or message, and store set-top performance logs.
It should be noted that, server in the present embodiment can be carrier server, also can be third-party server, after super code or time authority are sent to Set Top Box by server, the daily record of this Set Top Box of server record, contains the transmission record of this super code in this daily record.When server is applied to third-party server, third-party server also needs the Log Sender of Set Top Box extremely to carrier server.
Foregoing invention, identification code and the server current time of Set Top Box is obtained by server, according to described identification code and described server current time, generate super code by described server preset algorithm, and this super code and time authority are sent to described Set Top Box, the super code that Set Top Box reception server sends and time authority, obtain decryption information and Set Top Box current time, and judge described super code and separate within whether described confidential information mates and whether the current time of Set Top Box allows in time authority scope, only have above-mentioned when judging all as "Yes", just unlock this Set Top Box, unique and the server current time of identification code due to Set Top Box constantly changes, thus the unique and dynamic change of the super code it generated by preset algorithm, after interpolation time authority, can provide unique and dynamic change and effective super code to realization to Set Top Box, prevent other people from utilizing super code that is changeless or that exceed the time limit to unlock Set Top Box.
Refer to Fig. 5, Fig. 5 is the structural representation of a kind of password generating apparatus one of the present invention execution mode.This password generating apparatus 500 can be applied to server, and this password generating apparatus 500 comprises:
First acquiring unit 501, for obtaining identification code and the server current time of Set Top Box.
Generation unit 502, for according to described identification code and described server current time, generates super code by server preset algorithm.
Transmitting element 503, for described super code is sent to described Set Top Box, described super code is used for unlocking described Set Top Box when described Set Top Box is locked.
Alternatively, described generation unit 502 is also for the time step rise time authority according to described server current time change; Or according to preset time threshold rise time authority; Described time authority is for limiting the effective storage life of described super code; Described transmitting element 503 is also for being sent to described Set Top Box by described time authority.
Alternatively, described server is carrier server or third-party server, wherein, when this password generating apparatus 500 is applied to described carrier server, described password generating apparatus 500 also comprises: storage element 504, for recording the daily record of described Set Top Box; When this password generating apparatus is applied to described third-party server, described transmitting element 503 also for, by the Log Sender of described Set Top Box to give described carrier server.
It should be noted that, the function of each functional module of password generating apparatus 500 in the embodiment of the present invention can according to the method specific implementation in said method embodiment, and its specific implementation process with reference to the associated description of said method embodiment, can repeat no more herein.
Refer to Fig. 6, Fig. 6 is the structural representation of a kind of cipher authentication device one of the present invention execution mode.This cipher authentication device 600 can be applied to Set Top Box, and this cipher authentication device 600 comprises:
Receiving element 601, for the super code that reception server sends, described super code is that described server is generated by server preset algorithm according to the current time of the identification code of described Set Top Box and described server.
Second acquisition unit 602, for obtaining decryption information.
Judging unit 603, for judging whether described super code mates with described decryption information, if so, then unlocks described Set Top Box.
Alternatively, described cipher authentication device 600 also comprises: setting unit 604, for resetting the unlocking pin of described Set Top Box, described unlocking pin is used for unlocking described Set Top Box when the decryption information of user's input that described Set Top Box obtains is consistent with described unlocking pin.
Alternatively, described receiving element 601 is also for the time authority that: receiving front-end sends, and described time authority is for limiting the effective storage life of described super code.
Described second acquisition unit 602 also for, while described acquisition decryption information, obtain Set Top Box current time.
Described judging unit 603 also for, described judge whether described super code mates with described decryption information before, judge within the effective storage life scope whether described Set Top Box current time allows in described time authority, if so, then the described step whether described super code mates with described decryption information that judges is performed.
Alternatively, described second acquisition unit 602 specifically for, obtain user input decryption information.
Alternatively, described second acquisition unit 602 concrete also for, obtain identification code and the Set Top Box current time of Set Top Box; According to described identification code and described Set Top Box current time, by terminal preset algorithm generating solution confidential information, described Set Top Box preset algorithm is identical with described server preset algorithm.
It should be noted that, the function of each functional module of cipher authentication device 600 in the embodiment of the present invention can according to the method specific implementation in said method embodiment, and its specific implementation process with reference to the associated description of said method embodiment, can repeat no more herein.
Refer to Fig. 7, Fig. 7 is that a kind of password of the present invention generates, the structural representation of Verification System, and this password generates, Verification System, and comprise server 70 and Set Top Box 71, described server 70 comprises password generating apparatus 500 as described in Figure 5; Set Top Box 71 comprises cipher authentication device 600 as described in Figure 6.
Password generating apparatus 500 is applied to server 70, for obtaining identification code and server 70 current time of Set Top Box 71; According to described identification code and described server 70 current time, generate super code by server 70 preset algorithm; Described super code is sent to described Set Top Box 71, and described super code is used for unlocking described Set Top Box 71 when described Set Top Box 71 is locked.
Set Top Box 71 comprises cipher authentication device 600, for the super code that reception server 70 sends, described super code is that described server 70 is generated by server 70 preset algorithm according to the identification code of described Set Top Box 71 and the current time of described server 70; Obtain decryption information; And judge whether described super code mates with described decryption information, if so, then unlock described Set Top Box 71.
Alternatively, after the described Set Top Box 71 of described unblock, described Set Top Box 71 also for, reset the unlocking pin of described Set Top Box 71, described unlocking pin is used for unlocking described Set Top Box 71 when the decryption information that the user that described Set Top Box 71 obtains inputs is consistent with described unlocking pin.
Alternatively, described described super code is sent to described Set Top Box 71 before, described server 70 is also for the time step rise time authority according to described server 70 current time change; Or according to preset time threshold rise time authority, described time authority being sent to described Set Top Box 71, described time authority is for limiting the effective storage life of described super code.
Described Set Top Box 71 is also for the time authority that receiving front-end sends, and described time authority is for limiting the effective storage life of described super code; Set Top Box 71 current time is obtained while described acquisition decryption information; Described judge whether described super code mates with described decryption information before, judge within the effective storage life scope whether described Set Top Box 71 current time allows in described time authority, if so, then the described step whether described super code mates with described decryption information that judges is performed.
Alternatively, the mode that described Set Top Box 71 obtains decryption information comprises: the decryption information obtaining user's input.
Alternatively, the mode that described Set Top Box 71 obtains decryption information also comprises: the identification code and Set Top Box 71 current time that obtain Set Top Box 71; According to described identification code and described Set Top Box 71 current time, by terminal preset algorithm generating solution confidential information, described Set Top Box 71 preset algorithm is identical with described server 70 preset algorithm.
Alternatively, described server 70 is carrier server or third-party server, wherein,
When described application of installation is in described carrier server, described device also comprises: storage element, for recording the daily record of described Set Top Box 71.
When described application of installation is in described third-party server, described transmitting element also for, by the Log Sender of described Set Top Box 71 to give carrier server.
It should be noted that, in password generation in the embodiment of the present invention, Verification System, the function of server 70 and Set Top Box 71 can according to the method specific implementation in said method embodiment, its specific implementation process with reference to the associated description of said method embodiment, can repeat no more herein.
In sum, the present invention obtains identification code and the server current time of Set Top Box by server, according to described identification code and described server current time, generate super code by described server preset algorithm, and this super code and time authority are sent to described Set Top Box, the super code that Set Top Box reception server sends and time authority, obtain decryption information and Set Top Box current time, and judge described super code and separate within whether described confidential information mates and whether the current time of Set Top Box allows in time authority scope, only have above-mentioned when judging all as "Yes", just unlock this Set Top Box, unique and the server current time of identification code due to Set Top Box constantly changes, thus the unique and dynamic change of the super code it generated by preset algorithm, after interpolation time authority, can provide unique and dynamic change and effective super code to realization to Set Top Box, prevent other people from utilizing super code that is changeless or that exceed the time limit to unlock Set Top Box.
One of ordinary skill in the art will appreciate that all or part of flow process realized in above-described embodiment method, that the hardware that can carry out instruction relevant by computer program has come, described program can be stored in a computer read/write memory medium, this program, when performing, can comprise the flow process of the embodiment as above-mentioned each side method.Wherein, described storage medium can be magnetic disc, CD, read-only store-memory body (Read-OnlyMemory, ROM) or random store-memory body (RandomAccessMemory, RAM) etc.
Above disclosedly be only a kind of preferred embodiment of the present invention, certainly the interest field of the present invention can not be limited with this, one of ordinary skill in the art will appreciate that all or part of flow process realizing above-described embodiment, and according to the equivalent variations that the claims in the present invention are done, still belong to the scope that invention is contained.

Claims (17)

1. a method for generating cipher code, is applied to server, it is characterized in that, comprising:
Obtain identification code and the server current time of Set Top Box;
According to described identification code and described server current time, generate super code by server preset algorithm;
Described super code is sent to described Set Top Box, and described super code is used for unlocking described Set Top Box when described Set Top Box is locked.
2. method according to claim 1, is characterized in that, described described super code is sent to described Set Top Box before, described method also comprises: the time step rise time authority that described server changes according to described server current time; Or described server is according to preset time threshold rise time authority; Described time authority is for limiting the effective storage life of described super code;
Described described super code is sent to described Set Top Box while, described method also comprises: described time authority is sent to described Set Top Box.
3. method according to claim 2, is characterized in that, described server is carrier server or third-party server, and wherein, described method also comprises: the daily record of recording described Set Top Box;
When described method is applied to described third-party server, described method also comprises: by the Log Sender of described Set Top Box to giving described carrier server.
4. a password generating apparatus, is applied to server, it is characterized in that, comprising:
First acquiring unit, for obtaining identification code and the server current time of Set Top Box;
Generation unit, for according to described identification code and described server current time, generates super code by server preset algorithm;
Transmitting element, for described super code is sent to described Set Top Box, described super code is used for unlocking described Set Top Box when described Set Top Box is locked.
5. device according to claim 4, is characterized in that, described generation unit is also for the time step rise time authority according to described server current time change; Or according to preset time threshold rise time authority; Described time authority is for limiting the effective storage life of described super code;
Described transmitting element is also for being sent to described Set Top Box by described time authority.
6. device according to claim 5, is characterized in that, described server is carrier server or third-party server, wherein,
When described application of installation is in described carrier server, described device also comprises: storage element, for recording the daily record of described Set Top Box;
When described application of installation is in described third-party server, described transmitting element also for, by the Log Sender of described Set Top Box to give described carrier server.
7. a cipher authentication method, is applied to Set Top Box, it is characterized in that, comprising:
The super code that reception server sends, described super code is that described server is generated by server preset algorithm according to the current time of the identification code of described Set Top Box and described server;
Obtain decryption information;
Judge whether described super code mates with described decryption information, if so, then unlock described Set Top Box.
8. method according to claim 7, it is characterized in that, after the described Set Top Box of described unblock, described method also comprises: the unlocking pin resetting described Set Top Box, and described unlocking pin is used for unlocking described Set Top Box when the decryption information of user's input that described Set Top Box obtains is consistent with described unlocking pin.
9. method according to claim 8, it is characterized in that, before or after the super code that described reception server sends, described method also comprises: the time authority that receiving front-end sends, and described time authority is for limiting the effective storage life of described super code;
While described acquisition decryption information, described method also comprises: obtain Set Top Box current time;
Described judge whether described super code mates with described decryption information before, described method also comprises:
Judge, within the effective storage life scope whether described Set Top Box current time allows in described time authority, if so, then to perform the described step whether described super code mates with described decryption information that judges.
10. the method according to the arbitrary claim of claim 7-9, is characterized in that, described acquisition decryption information comprises:
Obtain the decryption information of user's input.
11. methods according to the arbitrary claim of claim 7-9, it is characterized in that, described acquisition decryption information comprises:
Obtain identification code and the Set Top Box current time of Set Top Box;
According to described identification code and described Set Top Box current time, by terminal preset algorithm generating solution confidential information, described Set Top Box preset algorithm is identical with described server preset algorithm.
12. 1 kinds of cipher authentication devices, are applied to Set Top Box, it is characterized in that, comprising:
Receiving element, for the super code that reception server sends, described super code is that described server is generated by server preset algorithm according to the current time of the identification code of described Set Top Box and described server;
Second acquisition unit, for obtaining decryption information;
Judging unit, for judging whether described super code mates with described decryption information, if so, then unlocks described Set Top Box.
13. devices according to claim 12, it is characterized in that, described device also comprises: setting unit, for resetting the unlocking pin of described Set Top Box, described unlocking pin is used for unlocking described Set Top Box when the decryption information of user's input that described Set Top Box obtains is consistent with described unlocking pin.
14. methods according to claim 13, is characterized in that, described receiving element is also for the time authority that: receiving front-end sends, and described time authority is for limiting the effective storage life of described super code;
Described second acquisition unit also for, while described acquisition decryption information, obtain Set Top Box current time;
Described judging unit also for, described judge whether described super code mates with described decryption information before, judge within the effective storage life scope whether described Set Top Box current time allows in described time authority, if so, then the described step whether described super code mates with described decryption information that judges is performed.
15. devices according to the arbitrary claim of claim 12-14, is characterized in that, described second acquisition unit specifically for, obtain the decryption information of user's input.
16. devices according to the arbitrary claim of claim 12-14, is characterized in that, described second acquisition unit specifically for,
Obtain identification code and the Set Top Box current time of Set Top Box;
According to described identification code and described Set Top Box current time, by terminal preset algorithm generating solution confidential information, described Set Top Box preset algorithm is identical with described server preset algorithm.
17. 1 kinds of passwords generate Verification System, and comprise server and Set Top Box, it is characterized in that, described server comprises the password generating apparatus as described in claim as arbitrary in claim 4-6; Described Set Top Box comprises the cipher authentication device as described in claim as arbitrary in claim 12-16.
CN201510785581.9A 2015-11-16 2015-11-16 Code generation method, code authentication method, related device and system Pending CN105451038A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510785581.9A CN105451038A (en) 2015-11-16 2015-11-16 Code generation method, code authentication method, related device and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510785581.9A CN105451038A (en) 2015-11-16 2015-11-16 Code generation method, code authentication method, related device and system

Publications (1)

Publication Number Publication Date
CN105451038A true CN105451038A (en) 2016-03-30

Family

ID=55560756

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510785581.9A Pending CN105451038A (en) 2015-11-16 2015-11-16 Code generation method, code authentication method, related device and system

Country Status (1)

Country Link
CN (1) CN105451038A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106101159A (en) * 2016-08-27 2016-11-09 谢志豪 Dynamic cipher generating method, dynamic cipher authentication method and device
CN106407764A (en) * 2016-09-30 2017-02-15 深圳天珑无线科技有限公司 Information generation methods and apparatuses
CN106970579A (en) * 2017-04-19 2017-07-21 杭州朗鸿科技股份有限公司 A kind of article anti-theft protection system and device
CN109698978A (en) * 2018-12-27 2019-04-30 山东浪潮商用系统有限公司 A kind of access authentication system and method for engineering menu
CN114299636A (en) * 2020-09-22 2022-04-08 云丁网络技术(北京)有限公司 Method and apparatus for processing device offline password

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101505402A (en) * 2009-03-06 2009-08-12 四川长虹电器股份有限公司 Authentication method for uni-directional network digital television conditional receiving system terminal deciphering module
CN101742060A (en) * 2008-11-21 2010-06-16 康佳集团股份有限公司 Dynamic password control method
CN102378054A (en) * 2011-10-09 2012-03-14 深圳创维数字技术股份有限公司 Slave card authentication method and authentication system for digital set-top box (DSTB)
US20140137149A1 (en) * 2011-08-12 2014-05-15 Huawei Device Co., Ltd. Set-Top Box Authentication Method and Apparatus
US20150222937A1 (en) * 2012-08-24 2015-08-06 Zte Corporation Media type processing and media playing method and device in iptv system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101742060A (en) * 2008-11-21 2010-06-16 康佳集团股份有限公司 Dynamic password control method
CN101505402A (en) * 2009-03-06 2009-08-12 四川长虹电器股份有限公司 Authentication method for uni-directional network digital television conditional receiving system terminal deciphering module
US20140137149A1 (en) * 2011-08-12 2014-05-15 Huawei Device Co., Ltd. Set-Top Box Authentication Method and Apparatus
CN102378054A (en) * 2011-10-09 2012-03-14 深圳创维数字技术股份有限公司 Slave card authentication method and authentication system for digital set-top box (DSTB)
US20150222937A1 (en) * 2012-08-24 2015-08-06 Zte Corporation Media type processing and media playing method and device in iptv system

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106101159A (en) * 2016-08-27 2016-11-09 谢志豪 Dynamic cipher generating method, dynamic cipher authentication method and device
CN106101159B (en) * 2016-08-27 2019-08-23 谢志豪 Dynamic cipher generating method, dynamic cipher authentication method and device
CN106407764A (en) * 2016-09-30 2017-02-15 深圳天珑无线科技有限公司 Information generation methods and apparatuses
CN106970579A (en) * 2017-04-19 2017-07-21 杭州朗鸿科技股份有限公司 A kind of article anti-theft protection system and device
CN106970579B (en) * 2017-04-19 2021-08-06 杭州朗鸿科技股份有限公司 Article anti-theft protection system and device
CN109698978A (en) * 2018-12-27 2019-04-30 山东浪潮商用系统有限公司 A kind of access authentication system and method for engineering menu
CN109698978B (en) * 2018-12-27 2021-04-06 山东云缦智能科技有限公司 Access authentication system and method for engineering menu
CN114299636A (en) * 2020-09-22 2022-04-08 云丁网络技术(北京)有限公司 Method and apparatus for processing device offline password

Similar Documents

Publication Publication Date Title
CN111079128B (en) Data processing method and device, electronic equipment and storage medium
CN105451038A (en) Code generation method, code authentication method, related device and system
JP5167835B2 (en) User authentication system, method, program, and medium
KR100451012B1 (en) Information equipment used by selecting one of several cryptographic technology-enabled protocols for copyright protection of digital works
US8379866B2 (en) Method of distributing encoding/decoding program and symmetric key in security domain environment and data divider and data injector therefor
US8503675B2 (en) Cable television secure communication system for one way restricted
KR19990045057A (en) Encryption information access method, decryption module and communication system
US20190026456A1 (en) Methods and Apparatus for Authentication of Joint Account Login
CN104767616A (en) Message processing method, system and related device
CN107124279B (en) Method and device for erasing terminal data
JPH10145354A (en) Remote function changing method
CN101171860B (en) Security method and device for managing access to multimedia contents
JP5537377B2 (en) Service provision system
CN102457766A (en) Method for checking access authority of Internet protocol television
CN106357678A (en) Cloud encryption storage method for intelligent terminal and intelligent terminal
JP2007249507A (en) Information leakage prevention method, information leakage prevention system and information terminal
CN113378119A (en) Software authorization method, device, equipment and storage medium
KR101967874B1 (en) Method for Generating Dynamic Code Which Varies Periodically and Method for Authenticating the Dynamic Code
CN108989331B (en) Use authentication method of data storage device, device and storage medium thereof
KR101810904B1 (en) Video protection system
JP5142599B2 (en) Information processing apparatus, control method therefor, and computer program
US8103001B2 (en) Method for verifying rights contained in a security module
KR101280740B1 (en) Method to secure access to audio/video content in a decoding unit
CN106453057A (en) Method and terminal for preventing short message from being stolen
CN106230777A (en) A kind of method preventing file to be cracked and terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20160330