CN105657454B - A kind of audio-video terminal network EPG method of reseptance and system - Google Patents

A kind of audio-video terminal network EPG method of reseptance and system Download PDF

Info

Publication number
CN105657454B
CN105657454B CN201610114883.8A CN201610114883A CN105657454B CN 105657454 B CN105657454 B CN 105657454B CN 201610114883 A CN201610114883 A CN 201610114883A CN 105657454 B CN105657454 B CN 105657454B
Authority
CN
China
Prior art keywords
epg
configuration file
cryptographic hash
edition configuration
video terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201610114883.8A
Other languages
Chinese (zh)
Other versions
CN105657454A (en
Inventor
赵忠民
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sichuan Jiuzhou Electric Group Co Ltd
Shenzhen Jiuzhou Electric Appliance Co Ltd
Original Assignee
Sichuan Jiuzhou Electric Group Co Ltd
Shenzhen Jiuzhou Electric Appliance Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sichuan Jiuzhou Electric Group Co Ltd, Shenzhen Jiuzhou Electric Appliance Co Ltd filed Critical Sichuan Jiuzhou Electric Group Co Ltd
Priority to CN201610114883.8A priority Critical patent/CN105657454B/en
Publication of CN105657454A publication Critical patent/CN105657454A/en
Application granted granted Critical
Publication of CN105657454B publication Critical patent/CN105657454B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/234Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
    • H04N21/2347Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving video stream encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/235Processing of additional data, e.g. scrambling of additional data or processing content descriptors
    • H04N21/2351Processing of additional data, e.g. scrambling of additional data or processing content descriptors involving encryption of additional data

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention relates to a kind of audio-video terminal network EPG method of reseptance and systems, when audio-video terminal requests to server and receives network EPG data, summed data is asked to encrypt in the process all, it is transmitted by the way of ciphertext, rather than only EPG data is encrypted, to effectively prevent being broken through by other people using network EPG, eliminate incipient fault for data security, the safety that greatly ensure that network data, solves network security problem.

Description

A kind of audio-video terminal network EPG method of reseptance and system
Technical field
The present invention relates to digital TV field more particularly to a kind of audio-video terminal network EPG method of reseptance and systems.
Background technique
With the intelligent development of audio-video terminal (such as television set, set-top box etc.), network EPG (Electronic Program Guide, i.e. electronic program guides) application it is also more and more extensive.
Audio-video terminal (such as set-top box) requests EPG data, service to server end first when obtaining network EPG The legitimacy of device end checking request, is verified, by current server EPG configuration file and version information issue machine Top box end.Audio-video terminal can remove request EPG data according to the configuration file and version information received.In the whole process, it removes EPG data is except encryption, it is other it is various asks the summed data all to transmit in clear text manner, such audio-video is whole End is easy to be broken through by other people using network EPG, very big hidden danger is brought to data safety, it cannot be guaranteed that network data Safety, cause great network security problem.
Summary of the invention
In view of this, it is necessary to when obtaining network EPG for above-mentioned audio-video terminal, be easy to utilize network EPG by other people It is broken through, brings very big hidden danger to data safety, it cannot be guaranteed that the problem of the safety of network data, provides a kind of sound view Frequency terminal network EPG method of reseptance.
Meanwhile also providing a kind of audio-video terminal network EPG reception system.
A kind of audio-video terminal network EPG method of reseptance provided by the invention, includes the following steps:
S10: in audio-video terminal to when server sends request, server authentication passes through, EPG edition configuration file is calculated The cryptographic Hash of URL encrypts EPG edition configuration file URL and cryptographic Hash, audio-video terminal is sent to after encryption;
S20: control audio-video terminal receives the EPG edition configuration file URL encrypted and cryptographic Hash and is decrypted, and uses Cryptographic Hash after decryption verifies the EPG edition configuration file URL after decryption, if verification passes through, this time EPG version is matched It is effective to set file URL, control audio-video terminal requests corresponding EPG version to be matched according to EPG edition configuration file URL to server It sets file and executes step S30, invalid if verification does not pass through, control audio-video terminal is sent to server again requests;
S30: calculating the cryptographic Hash of EPG edition configuration file, configures to EPG edition configuration file cryptographic Hash and EPG version File is encrypted, and audio-video terminal is sent to after encryption;
S40: the EPG edition configuration file and EPG edition configuration file cryptographic Hash that control audio-video terminal receives encryption are simultaneously It is decrypted, the EPG edition configuration file after decryption is verified using the EPG edition configuration file cryptographic Hash after decryption, The URL of EPG is parsed according to EPG edition configuration file if if verification, it is corresponding to server request according to the URL of EPG EPG data simultaneously executes step S50, and EPG edition configuration file is invalid if verification does not pass through;
S50: the cryptographic Hash of corresponding EPG data is calculated, the cryptographic Hash of EPG data and EPG data is encrypted, is encrypted After be sent to audio-video terminal;
S60: control audio-video terminal receives the EPG data encrypted and EPG data cryptographic Hash and is decrypted, and uses decryption EPG data cryptographic Hash afterwards verifies the EPG data after decryption, stores EPG data if if verifying, if verification is obstructed Cross then directly discarding.
In one of them embodiment, the step S30 specifically:
The cryptographic Hash that EPG edition configuration file is calculated using SHA256 algorithm, matches EPG version using the first cipher mode The cryptographic Hash for setting file is encrypted, and is encrypted using the second cipher mode to EPG edition configuration file.
In one of them embodiment, the step S40 specifically:
The cryptographic Hash of EPG edition configuration file is decrypted using the first cipher mode first;If successful decryption again EPG edition configuration file is decrypted using the second cipher mode, otherwise EPG edition configuration file is not decrypted.
In one of them embodiment, the step S50 specifically:
The cryptographic Hash that EPG data is calculated using SHA256 algorithm, using the first cipher mode to the cryptographic Hash of EPG data into Row encryption, encrypts EPG data using the second cipher mode.
In one of them embodiment, the step S60 specifically:
The cryptographic Hash of EPG data is decrypted using the first cipher mode first;Use second again if successful decryption EPG data is decrypted in cipher mode, otherwise EPG data is not decrypted.
In one of them embodiment, first cipher mode is rsa encryption mode, second cipher mode For AES encryption mode.
A kind of audio-video terminal network EPG provided by the invention receives system, comprising:
EPG edition configuration file URL encrypting module, in audio-video terminal to server sends request, server authentication is led to It is out-of-date, the cryptographic Hash of EPG edition configuration file URL is calculated, EPG edition configuration file URL and cryptographic Hash are encrypted, added Audio-video terminal is sent to after close;
EPG edition configuration file URL correction verification module, control audio-video terminal receive the EPG edition configuration file URL of encryption With cryptographic Hash and be decrypted, the EPG edition configuration file URL after decryption is verified using the cryptographic Hash after decryption, if Verification passes through, then this time EPG edition configuration file URL it is effective, control audio-video terminal according to EPG edition configuration file URL to Server requests corresponding EPG edition configuration file and executes step S30, invalid if verification does not pass through, and control audio-video is whole End sends to server request again;
EPG edition configuration file encrypting module calculates the cryptographic Hash of EPG edition configuration file, to EPG edition configuration file Cryptographic Hash and EPG edition configuration file are encrypted, and audio-video terminal is sent to after encryption;
EPG edition configuration file correction verification module, control audio-video terminal receive the EPG edition configuration file and EPG of encryption Edition configuration file cryptographic Hash is simultaneously decrypted, using the EPG edition configuration file cryptographic Hash after decryption to the EPG version after decryption This configuration file is verified, and the URL of EPG is parsed according to EPG edition configuration file if if verification, according to the URL of EPG Corresponding EPG data is requested to server and executes step S50, and EPG edition configuration file is invalid if verification does not pass through;
EPG data encrypting module calculates the cryptographic Hash of corresponding EPG data, equal to the cryptographic Hash of EPG data and EPG data It is encrypted, audio-video terminal is sent to after encryption;
EPG data deciphering module, control audio-video terminal receive the EPG data encrypted and EPG data cryptographic Hash and carry out Decryption, verifies the EPG data after decryption using the EPG data cryptographic Hash after decryption, stores EPG number if if verifying According to the directly discarding if verification does not pass through.
In one of them embodiment, the EPG edition configuration file encrypting module is calculated using SHA256 algorithm The cryptographic Hash of EPG edition configuration file is encrypted using cryptographic Hash of first cipher mode to EPG edition configuration file, is adopted EPG edition configuration file is encrypted with the second cipher mode;
The EPG data encrypting module calculates the cryptographic Hash of EPG data using SHA256 algorithm, using the first cipher mode The cryptographic Hash of EPG data is encrypted, EPG data is encrypted using the second cipher mode.
In one of them embodiment, the EPG edition configuration file correction verification module uses the first encryption side first The cryptographic Hash of EPG edition configuration file is decrypted in formula;EPG version is matched using the second cipher mode again if successful decryption It sets file to be decrypted, otherwise EPG edition configuration file is not decrypted;
The EPG data correction verification module uses the first cipher mode that the cryptographic Hash of EPG data is decrypted first;If solution Close success is then again decrypted EPG data using the second cipher mode, otherwise EPG data is not decrypted.
In one of them embodiment, first cipher mode is rsa encryption mode, second cipher mode For AES encryption mode.
Audio-video terminal network EPG method of reseptance of the present invention and system are requested and are received to server in audio-video terminal When network EPG data, asks summed data to encrypt in the process all, transmitted by the way of ciphertext, rather than Only EPG data is encrypted, to effectively prevent being broken through by other people using network EPG, it is hidden to eliminate data safety Suffer from, greatly ensure that the safety of network data, solve network security problem.
Detailed description of the invention
Fig. 1 is the flow chart of the audio-video terminal network EPG method of reseptance in one embodiment;
Fig. 2 is the structure chart of the audio-video terminal network EPG reception system in one embodiment.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to the accompanying drawings and embodiments, right The present invention is further elaborated.It should be appreciated that described herein, specific examples are only used to explain the present invention, not For limiting the present invention.
When obtaining network EPG for above-mentioned audio-video terminal, it is easy to be broken through by other people using network EPG, to number Carry out very big hidden danger according to safety belt, it cannot be guaranteed that the technical problem of the safety of network data, the method for the present invention is in audio-video terminal During requesting network EPG to server, asks summed data to encrypt to all, transmitted with ciphertext, to guarantee to pacify Quan Xing.
Specifically, as shown in Figure 1, the audio-video terminal network EPG method of reseptance includes the following steps:
S10: in audio-video terminal to when server sends request, server authentication passes through, EPG edition configuration file is calculated The cryptographic Hash of URL (Uniform Resource Locator, uniform resource locator), to EPG edition configuration file URL and Kazakhstan Uncommon value is encrypted, and audio-video terminal is sent to after encryption.
When audio-video terminal needs network EPG data, first has to send to server and request, device to be serviced is to requests verification By rear, EPG edition configuration file URL first can be sent to audio-video terminal.In the embodiment, to guarantee that request network EPG is complete The internet security of process can calculate the cryptographic Hash of EPG edition configuration file URL, and to EPG edition configuration file URL and Kazakhstan Uncommon value is encrypted, and audio-video terminal is sent by EPG edition configuration file URL in a manner of encryption, to guarantee data Safety.
In further mode, the step specifically: calculate EPG edition configuration file URL's using SHA256 algorithm Cryptographic Hash encrypts EPG edition configuration file URL and cryptographic Hash using rsa encryption mode.
S20: control audio-video terminal receives the EPG edition configuration file URL encrypted and cryptographic Hash and is decrypted, and uses Cryptographic Hash after decryption verifies the EPG edition configuration file URL after decryption, if verification passes through, this time EPG version is matched It is effective to set file URL, control audio-video terminal requests corresponding EPG version to be matched according to EPG edition configuration file URL to server It sets file and executes step S30, invalid if verification does not pass through, control audio-video terminal is sent to server again requests.
After sending audio-video terminal for encrypted EPG edition configuration file URL and cryptographic Hash, control audio-video is whole End is received.Since EPG edition configuration file URL and cryptographic Hash are encrypted, therefore need first to be decrypted.Decryption Afterwards, the EPG edition configuration file URL after decryption is verified using the cryptographic Hash after decryption, verification is by then according to EPG editions This configuration file URL requests corresponding EPG edition configuration file to server.
In further mode, the step specifically: cryptographic Hash and EPG version are matched respectively using rsa encryption mode File is set to be decrypted.
S30: calculating the cryptographic Hash of EPG edition configuration file, configures to EPG edition configuration file cryptographic Hash and EPG version File is encrypted, and audio-video terminal is sent to after encryption.
When audio-video terminal requests EPG edition configuration file to server, for the safety for guaranteeing EPG edition configuration file Property, in the embodiment, the cryptographic Hash of EPG edition configuration file is calculated, EPG edition configuration file cryptographic Hash and EPG version are matched It sets file to be encrypted, to guarantee safety.
Further, step specifically: calculate the cryptographic Hash of EPG edition configuration file using SHA256 algorithm, use First cipher mode encrypts the cryptographic Hash of EPG edition configuration file, configures text to EPG version using the second cipher mode Part is encrypted.Preferably, the first cipher mode is rsa encryption mode, and the second cipher mode is AES encryption mode.
S40: the EPG edition configuration file and EPG edition configuration file cryptographic Hash that control audio-video terminal receives encryption are simultaneously It is decrypted, the EPG edition configuration file after decryption is verified using the EPG edition configuration file cryptographic Hash after decryption, The URL of EPG is parsed according to EPG edition configuration file if if verification, it is corresponding to server request according to the URL of EPG EPG data simultaneously executes step S50, and EPG edition configuration file is invalid if verification does not pass through.
After sending audio-video terminal for encrypted EPG edition configuration file and cryptographic Hash, audio-video terminal is controlled It is received and is decrypted, using the EPG edition configuration file cryptographic Hash after decryption to the EPG edition configuration file after decryption It is verified, obtains check results.
Further, the step specifically: first using the first cipher mode to the cryptographic Hash of EPG edition configuration file into Row decryption;EPG edition configuration file is decrypted using the second cipher mode again if successful decryption, otherwise not to EPG editions This configuration file is decrypted.In this way by the sequencing and incidence relation of decryption, further to reinforce confidentiality and peace Quan Xing.
S50: the cryptographic Hash of corresponding EPG data is calculated, the cryptographic Hash of EPG data and EPG data is encrypted, is encrypted After be sent to audio-video terminal.
Pass through verifying, parse the URL of EPG according to EPG edition configuration file, is requested according to the URL of EPG to server After corresponding EPG data, for the safety for guaranteeing EPG data, in the embodiment, the cryptographic Hash of corresponding EPG data is calculated, it is right The cryptographic Hash of EPG data and EPG data is encrypted, and guarantees the safety of EPG data by encryption.
Further, the step specifically: the cryptographic Hash that EPG data is calculated using SHA256 algorithm, using the first encryption Mode encrypts the cryptographic Hash of EPG data, is encrypted using the second cipher mode to EPG data.Preferably, first adds Close mode is rsa encryption mode, and the second cipher mode is AES encryption mode.
S60: control audio-video terminal receives the EPG data encrypted and EPG data cryptographic Hash and is decrypted, and uses decryption EPG data cryptographic Hash afterwards verifies the EPG data after decryption, stores EPG data if if verifying, if verification is obstructed Cross then directly discarding.
When the cryptographic Hash of the EPG data of encryption and EPG data is sent to audio-video terminal, control by audio-video terminal It receives and is decrypted, the EPG data after decryption is verified using the EPG data cryptographic Hash after decryption, if verification passes through EPG data is then stored, is directly abandoned if verification does not pass through.
Further, the cryptographic Hash of EPG data is decrypted using the first cipher mode first;If successful decryption again EPG data is decrypted using the second cipher mode, otherwise EPG data is not decrypted.Pass through the successive of decryption in this way Sequence and incidence relation further to reinforce confidentiality and safety.
The audio-video terminal network EPG method of reseptance requests and receives network EPG data to server in audio-video terminal When, it asks summed data to encrypt in the process all, is transmitted by the way of ciphertext, rather than only to EPG number According to being encrypted, to effectively prevent being broken through by other people using network EPG, incipient fault for data security is eliminated, is greatly protected The safety for having demonstrate,proved network data, solves network security problem.
Meanwhile the present invention also provides a kind of audio-video terminal network EPG to receive system, as shown in Fig. 2, the system includes:
EPG edition configuration file URL encrypting module 100 sends request, server authentication to server in audio-video terminal By when, calculate EPG edition configuration file URL (Uniform Resource Locator, uniform resource locator) Hash Value, encrypts EPG edition configuration file URL and cryptographic Hash, audio-video terminal is sent to after encryption.
When audio-video terminal needs network EPG data, first has to send to server and request, device to be serviced is to requests verification By rear, EPG edition configuration file URL first can be sent to audio-video terminal.In the embodiment, to guarantee that request network EPG is complete The internet security of process, EPG edition configuration file URL encrypting module 100 can calculate the Hash of EPG edition configuration file URL Value, and EPG edition configuration file URL and cryptographic Hash are encrypted, by EPG edition configuration file URL in a manner of encryption It is sent to audio-video terminal, to guarantee the safety of data.
In further mode, EPG edition configuration file URL encrypting module 100 calculates EPG editions using SHA256 algorithm The cryptographic Hash of this configuration file URL encrypts EPG edition configuration file URL and cryptographic Hash using rsa encryption mode.
EPG edition configuration file URL correction verification module 200, control audio-video terminal receive the EPG edition configuration file of encryption URL and cryptographic Hash are simultaneously decrypted, and are verified using the cryptographic Hash after decryption to the EPG edition configuration file URL after decryption, If verification passes through, this time EPG edition configuration file URL is effective, controls audio-video terminal according to EPG edition configuration file URL Corresponding EPG edition configuration file is requested to server;It is invalid if verification does not pass through, audio-video terminal is controlled again to service Device sends request.
After sending audio-video terminal for encrypted EPG edition configuration file URL and cryptographic Hash, the configuration of EPG version File URL correction verification module 200 controls audio-video terminal and is received.Since EPG edition configuration file URL and cryptographic Hash carry out Encryption, therefore EPG edition configuration file URL correction verification module 200 needs first to be decrypted.After decryption, EPG edition configuration file URL correction verification module 200 verifies the EPG edition configuration file URL after decryption using the cryptographic Hash after decryption, and verification passes through Corresponding EPG edition configuration file is then requested to server according to EPG edition configuration file URL.
In further mode, EPG edition configuration file URL correction verification module 200 is using rsa encryption mode respectively to Kazakhstan Uncommon value and EPG edition configuration file are decrypted.
EPG edition configuration file encrypting module 300 calculates the cryptographic Hash of EPG edition configuration file, configures to EPG version File cryptographic Hash and EPG edition configuration file are encrypted, and audio-video terminal is sent to after encryption.
When audio-video terminal requests EPG edition configuration file to server, for the safety for guaranteeing EPG edition configuration file Property, in the embodiment, EPG edition configuration file encrypting module 300 calculates the cryptographic Hash of EPG edition configuration file, to EPG version Configuration file cryptographic Hash and EPG edition configuration file are encrypted, to guarantee safety.
Further, EPG edition configuration file encrypting module 300 calculates EPG edition configuration file using SHA256 algorithm Cryptographic Hash, encrypted using cryptographic Hash of first cipher mode to EPG edition configuration file, using the second cipher mode pair EPG edition configuration file is encrypted.Preferably, the first cipher mode is rsa encryption mode, and the second cipher mode adds for AES Close mode.
EPG edition configuration file correction verification module 400, control audio-video terminal receive encryption EPG edition configuration file and EPG edition configuration file cryptographic Hash is simultaneously decrypted, using the EPG edition configuration file cryptographic Hash after decryption to decryption after EPG edition configuration file is verified, and the URL of EPG is parsed according to EPG edition configuration file if if verification, according to EPG URL request corresponding EPG data to server, EPG edition configuration file is invalid if verification does not pass through.
After sending audio-video terminal for encrypted EPG edition configuration file and cryptographic Hash, EPG edition configuration file Correction verification module 400 controls audio-video terminal and is received and be decrypted, and uses the EPG edition configuration file cryptographic Hash after decryption EPG edition configuration file after decryption is verified, check results are obtained.
Further, EPG edition configuration file correction verification module 400 first configures EPG version using the first cipher mode The cryptographic Hash of file is decrypted;EPG edition configuration file is decrypted using the second cipher mode again if successful decryption, Otherwise EPG edition configuration file is not decrypted.In this way by the sequencing and incidence relation of decryption, further to add Strong confidentiality and safety.
EPG data encrypting module 500 calculates the cryptographic Hash of corresponding EPG data, to the cryptographic Hash of EPG data and EPG data It is encrypted, audio-video terminal is sent to after encryption.
Pass through verifying, parse the URL of EPG according to EPG edition configuration file, is requested according to the URL of EPG to server After corresponding EPG data, for the safety for guaranteeing EPG data, in the embodiment, EPG data encrypting module 500, which calculates, to be corresponded to The cryptographic Hash of EPG data encrypts the cryptographic Hash of EPG data and EPG data, guarantees the peace of EPG data by encryption Quan Xing.
Further, EPG data encrypting module 500 calculates the cryptographic Hash of EPG data using SHA256 algorithm, using first Cipher mode encrypts the cryptographic Hash of EPG data, is encrypted using the second cipher mode to EPG data.Preferably, One cipher mode is rsa encryption mode, and the second cipher mode is AES encryption mode.
EPG data correction verification module 600, control audio-video terminal receives the EPG data of encryption and EPG data cryptographic Hash is gone forward side by side Row decryption, verifies the EPG data after decryption using the EPG data cryptographic Hash after decryption, stores EPG if if verifying Data directly abandon if verification does not pass through.
When the cryptographic Hash of the EPG data of encryption and EPG data is sent to audio-video terminal, EPG data correction verification module 600 controls are received and are decrypted by audio-video terminal, using the EPG data cryptographic Hash after decryption to the EPG data after decryption It is verified, stores EPG data if if verifying, if verification is by directly abandoning.
Further, EPG data correction verification module 600 is carried out using cryptographic Hash of first cipher mode to EPG data first Decryption;EPG data is decrypted using the second cipher mode again if successful decryption, otherwise EPG data is not decrypted. In this way by the sequencing and incidence relation of decryption, further to reinforce confidentiality and safety.
The audio-video terminal network EPG receives system, requests and receive network EPG data to server in audio-video terminal When, it asks summed data to encrypt in the process all, is transmitted by the way of ciphertext, rather than only to EPG number According to being encrypted, to effectively prevent being broken through by other people using network EPG, incipient fault for data security is eliminated, is greatly protected The safety for having demonstrate,proved network data, solves network security problem.
Audio-video terminal network EPG method of reseptance of the present invention and system are requested and are received to server in audio-video terminal When network EPG data, asks summed data to encrypt in the process all, transmitted by the way of ciphertext, rather than Only EPG data is encrypted, to effectively prevent being broken through by other people using network EPG, it is hidden to eliminate data safety Suffer from, greatly ensure that the safety of network data, solve network security problem.
The above is merely preferred embodiments of the present invention, be not intended to limit the invention, it is all in spirit of the invention and Made any modifications, equivalent replacements, and improvements etc., should all be included in the protection scope of the present invention within principle.

Claims (10)

1. a kind of audio-video terminal network EPG method of reseptance, which comprises the steps of:
S10: in audio-video terminal to when server sends request, server authentication passes through, EPG edition configuration file URL is calculated Cryptographic Hash, EPG edition configuration file URL and cryptographic Hash are encrypted, audio-video terminal is sent to after encryption;
S20: control audio-video terminal receives the EPG edition configuration file URL encrypted and cryptographic Hash and is decrypted, and uses decryption Cryptographic Hash afterwards verifies the EPG edition configuration file URL after decryption, if verification passes through, this time EPG version configuration text Part URL is effective, and control audio-video terminal requests corresponding EPG version to configure text according to EPG edition configuration file URL to server Part simultaneously executes step S30, invalid if verification does not pass through, and control audio-video terminal is sent to server again requests;
S30: the cryptographic Hash of EPG edition configuration file is calculated, to EPG edition configuration file cryptographic Hash and EPG edition configuration file It is encrypted, audio-video terminal is sent to after encryption;
S40: control audio-video terminal receives the EPG edition configuration file encrypted and EPG edition configuration file cryptographic Hash and carries out Decryption, verifies the EPG edition configuration file after decryption using the EPG edition configuration file cryptographic Hash after decryption, if school The URL by then parsing EPG according to EPG edition configuration file is tested, corresponding EPG number is requested to server according to the URL of EPG According to and execute step S50, EPG edition configuration file is invalid if verification does not pass through;
S50: the cryptographic Hash of corresponding EPG data is calculated, the cryptographic Hash of EPG data and EPG data is encrypted, is sent out after encryption It is sent to audio-video terminal;
S60: control audio-video terminal receives the EPG data encrypted and EPG data cryptographic Hash and is decrypted, after decryption EPG data cryptographic Hash verifies the EPG data after decryption, stores EPG data if if verifying, if verification does not pass through Directly abandon.
2. audio-video terminal network EPG method of reseptance according to claim 1, which is characterized in that the step S30 is specific Are as follows:
The cryptographic Hash that EPG edition configuration file is calculated using SHA256 algorithm configures text to EPG version using the first cipher mode The cryptographic Hash of part is encrypted, and is encrypted using the second cipher mode to EPG edition configuration file.
3. audio-video terminal network EPG method of reseptance according to claim 2, which is characterized in that the step S40 is specific Are as follows:
The cryptographic Hash of EPG edition configuration file is decrypted using the first cipher mode first;It is used again if successful decryption EPG edition configuration file is decrypted in second cipher mode, otherwise EPG edition configuration file is not decrypted.
4. audio-video terminal network EPG method of reseptance according to claim 1, which is characterized in that the step S50 is specific Are as follows:
The cryptographic Hash that EPG data is calculated using SHA256 algorithm, is added using cryptographic Hash of first cipher mode to EPG data It is close, EPG data is encrypted using the second cipher mode.
5. audio-video terminal network EPG method of reseptance according to claim 4, which is characterized in that the step S60 is specific Are as follows:
The cryptographic Hash of EPG data is decrypted using the first cipher mode first;Again using the second encryption if successful decryption EPG data is decrypted in mode, otherwise EPG data is not decrypted.
6. according to any audio-video terminal network EPG method of reseptance of claim 2 to 5, which is characterized in that described first Cipher mode is rsa encryption mode, and second cipher mode is AES encryption mode.
7. a kind of audio-video terminal network EPG receives system characterized by comprising
EPG edition configuration file URL encrypting module, when audio-video terminal passes through to server transmission request, server authentication, The cryptographic Hash for calculating EPG edition configuration file URL, encrypts EPG edition configuration file URL and cryptographic Hash, after encryption It is sent to audio-video terminal;
EPG edition configuration file URL correction verification module, control audio-video terminal receive EPG edition configuration file URL and the Kazakhstan of encryption Uncommon value is simultaneously decrypted, and is verified using the cryptographic Hash after decryption to the EPG edition configuration file URL after decryption, if verification Pass through, then this time EPG edition configuration file URL is effective, and control audio-video terminal is according to EPG edition configuration file URL to service Device requests corresponding EPG edition configuration file and executes step S30, invalid if verification does not pass through, and control audio-video terminal is again Secondary send to server is requested;
EPG edition configuration file encrypting module calculates the cryptographic Hash of EPG edition configuration file, to EPG edition configuration file Hash Value and EPG edition configuration file are encrypted, and audio-video terminal is sent to after encryption;
EPG edition configuration file correction verification module, control audio-video terminal receive the EPG edition configuration file and EPG version of encryption Configuration file cryptographic Hash is simultaneously decrypted, and is matched using the EPG edition configuration file cryptographic Hash after decryption to the EPG version after decryption It sets file to be verified, parses if the URL of EPG according to EPG edition configuration file if verification, according to the URL of EPG to clothes Business device requests corresponding EPG data and executes step S50, and EPG edition configuration file is invalid if verification does not pass through;
EPG data encrypting module calculates the cryptographic Hash of corresponding EPG data, carries out to the cryptographic Hash of EPG data and EPG data Encryption, is sent to audio-video terminal after encryption;
EPG data deciphering module, control audio-video terminal receive the EPG data encrypted and EPG data cryptographic Hash and are decrypted, The EPG data after decryption is verified using the EPG data cryptographic Hash after decryption, stores EPG data if if verifying, if Verification is not by abandoning directly then.
8. audio-video terminal network EPG according to claim 7 receives system, which is characterized in that
The EPG edition configuration file encrypting module calculates the cryptographic Hash of EPG edition configuration file using SHA256 algorithm, uses First cipher mode encrypts the cryptographic Hash of EPG edition configuration file, configures text to EPG version using the second cipher mode Part is encrypted;
The EPG data encrypting module calculates the cryptographic Hash of EPG data using SHA256 algorithm, using the first cipher mode pair The cryptographic Hash of EPG data is encrypted, and is encrypted using the second cipher mode to EPG data.
9. audio-video terminal network EPG according to claim 8 receives system, which is characterized in that the EPG version configuration File verification module uses the first cipher mode that the cryptographic Hash of EPG edition configuration file is decrypted first;If successful decryption Then EPG edition configuration file is decrypted using the second cipher mode again, otherwise EPG edition configuration file is not solved It is close;
EPG data correction verification module uses the first cipher mode that the cryptographic Hash of EPG data is decrypted first;If successful decryption EPG data is decrypted using the second cipher mode again, otherwise EPG data is not decrypted.
10. audio-video terminal network EPG according to claim 8 or claim 9 receives system, which is characterized in that described first adds Close mode is rsa encryption mode, and second cipher mode is AES encryption mode.
CN201610114883.8A 2016-03-01 2016-03-01 A kind of audio-video terminal network EPG method of reseptance and system Expired - Fee Related CN105657454B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610114883.8A CN105657454B (en) 2016-03-01 2016-03-01 A kind of audio-video terminal network EPG method of reseptance and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610114883.8A CN105657454B (en) 2016-03-01 2016-03-01 A kind of audio-video terminal network EPG method of reseptance and system

Publications (2)

Publication Number Publication Date
CN105657454A CN105657454A (en) 2016-06-08
CN105657454B true CN105657454B (en) 2019-02-15

Family

ID=56492859

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610114883.8A Expired - Fee Related CN105657454B (en) 2016-03-01 2016-03-01 A kind of audio-video terminal network EPG method of reseptance and system

Country Status (1)

Country Link
CN (1) CN105657454B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109996096B (en) * 2019-03-06 2022-01-11 湖北省广播电视信息网络股份有限公司 Regional EPG management system, distribution system and distribution method

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1725852A (en) * 2004-07-21 2006-01-25 联想(北京)有限公司 Encipher and decipher method of electronic program guide
KR20080090165A (en) * 2007-04-04 2008-10-08 삼성전자주식회사 System of offering digital broadcasting using picture in picture in portable terminal, method thereof and apparatus thereof

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8281155B1 (en) * 2000-11-02 2012-10-02 Intel Corporation Content protection using block reordering

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1725852A (en) * 2004-07-21 2006-01-25 联想(北京)有限公司 Encipher and decipher method of electronic program guide
KR20080090165A (en) * 2007-04-04 2008-10-08 삼성전자주식회사 System of offering digital broadcasting using picture in picture in portable terminal, method thereof and apparatus thereof

Also Published As

Publication number Publication date
CN105657454A (en) 2016-06-08

Similar Documents

Publication Publication Date Title
US11757662B2 (en) Confidential authentication and provisioning
CN109246053B (en) Data communication method, device, equipment and storage medium
CN105939484B (en) A kind of the encryption playback method and its system of audio-video
CN107294937B (en) Data transmission method based on network communication, client and server
CN114900338B (en) Encryption and decryption method, device, equipment and medium
US20200320178A1 (en) Digital rights management authorization token pairing
CN106658093B (en) The exchange method and system of set-top box and server
CN105915342A (en) Application program communication processing system, an application program communication processing device, an application program communication processing apparatus and an application program communication processing method
JP4519935B2 (en) Information communication method, communication terminal device, and information communication system
CN106790183A (en) Logging on authentication method of calibration, device
CN110662091B (en) Third-party live video access method, storage medium, electronic device and system
CN108809633B (en) Identity authentication method, device and system
CN110753321A (en) Safe communication method for vehicle-mounted TBOX and cloud server
CN104243452B (en) A kind of cloud computing access control method and system
CN105635759B (en) A kind of output content protection method and Conditional Access Module
KR102140356B1 (en) Method and device to embed watermark in uncompressed video data
CN105657454B (en) A kind of audio-video terminal network EPG method of reseptance and system
WO2020101471A1 (en) Secure framework for transaction signing
US8699710B2 (en) Controlled security domains
CN110912857A (en) Method and storage medium for sharing login between mobile applications
KR20220128615A (en) Transmission of Security Information in Content Distribution Networks
CN111711836B (en) Data transmission method, device, terminal equipment and storage medium
KR101609095B1 (en) Apparatus and method for data security in content delivery network
KR20200060930A (en) Cryptographic communication method between telematics devices
CN116886208B (en) Information encryption transmission method, device, terminal equipment and storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20190215

Termination date: 20200301

CF01 Termination of patent right due to non-payment of annual fee