CN105657454B - A kind of audio-video terminal network EPG method of reseptance and system - Google Patents
A kind of audio-video terminal network EPG method of reseptance and system Download PDFInfo
- Publication number
- CN105657454B CN105657454B CN201610114883.8A CN201610114883A CN105657454B CN 105657454 B CN105657454 B CN 105657454B CN 201610114883 A CN201610114883 A CN 201610114883A CN 105657454 B CN105657454 B CN 105657454B
- Authority
- CN
- China
- Prior art keywords
- epg
- configuration file
- cryptographic hash
- edition configuration
- video terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000000034 method Methods 0.000 title claims abstract description 27
- 238000012795 verification Methods 0.000 claims description 55
- 238000012937 correction Methods 0.000 claims description 18
- 230000005540 biological transmission Effects 0.000 claims 1
- 238000012163 sequencing technique Methods 0.000 description 3
- 238000011161 development Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
- H04N21/234—Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
- H04N21/2347—Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving video stream encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
- H04N21/235—Processing of additional data, e.g. scrambling of additional data or processing content descriptors
- H04N21/2351—Processing of additional data, e.g. scrambling of additional data or processing content descriptors involving encryption of additional data
Landscapes
- Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
- Storage Device Security (AREA)
Abstract
The present invention relates to a kind of audio-video terminal network EPG method of reseptance and systems, when audio-video terminal requests to server and receives network EPG data, summed data is asked to encrypt in the process all, it is transmitted by the way of ciphertext, rather than only EPG data is encrypted, to effectively prevent being broken through by other people using network EPG, eliminate incipient fault for data security, the safety that greatly ensure that network data, solves network security problem.
Description
Technical field
The present invention relates to digital TV field more particularly to a kind of audio-video terminal network EPG method of reseptance and systems.
Background technique
With the intelligent development of audio-video terminal (such as television set, set-top box etc.), network EPG (Electronic
Program Guide, i.e. electronic program guides) application it is also more and more extensive.
Audio-video terminal (such as set-top box) requests EPG data, service to server end first when obtaining network EPG
The legitimacy of device end checking request, is verified, by current server EPG configuration file and version information issue machine
Top box end.Audio-video terminal can remove request EPG data according to the configuration file and version information received.In the whole process, it removes
EPG data is except encryption, it is other it is various asks the summed data all to transmit in clear text manner, such audio-video is whole
End is easy to be broken through by other people using network EPG, very big hidden danger is brought to data safety, it cannot be guaranteed that network data
Safety, cause great network security problem.
Summary of the invention
In view of this, it is necessary to when obtaining network EPG for above-mentioned audio-video terminal, be easy to utilize network EPG by other people
It is broken through, brings very big hidden danger to data safety, it cannot be guaranteed that the problem of the safety of network data, provides a kind of sound view
Frequency terminal network EPG method of reseptance.
Meanwhile also providing a kind of audio-video terminal network EPG reception system.
A kind of audio-video terminal network EPG method of reseptance provided by the invention, includes the following steps:
S10: in audio-video terminal to when server sends request, server authentication passes through, EPG edition configuration file is calculated
The cryptographic Hash of URL encrypts EPG edition configuration file URL and cryptographic Hash, audio-video terminal is sent to after encryption;
S20: control audio-video terminal receives the EPG edition configuration file URL encrypted and cryptographic Hash and is decrypted, and uses
Cryptographic Hash after decryption verifies the EPG edition configuration file URL after decryption, if verification passes through, this time EPG version is matched
It is effective to set file URL, control audio-video terminal requests corresponding EPG version to be matched according to EPG edition configuration file URL to server
It sets file and executes step S30, invalid if verification does not pass through, control audio-video terminal is sent to server again requests;
S30: calculating the cryptographic Hash of EPG edition configuration file, configures to EPG edition configuration file cryptographic Hash and EPG version
File is encrypted, and audio-video terminal is sent to after encryption;
S40: the EPG edition configuration file and EPG edition configuration file cryptographic Hash that control audio-video terminal receives encryption are simultaneously
It is decrypted, the EPG edition configuration file after decryption is verified using the EPG edition configuration file cryptographic Hash after decryption,
The URL of EPG is parsed according to EPG edition configuration file if if verification, it is corresponding to server request according to the URL of EPG
EPG data simultaneously executes step S50, and EPG edition configuration file is invalid if verification does not pass through;
S50: the cryptographic Hash of corresponding EPG data is calculated, the cryptographic Hash of EPG data and EPG data is encrypted, is encrypted
After be sent to audio-video terminal;
S60: control audio-video terminal receives the EPG data encrypted and EPG data cryptographic Hash and is decrypted, and uses decryption
EPG data cryptographic Hash afterwards verifies the EPG data after decryption, stores EPG data if if verifying, if verification is obstructed
Cross then directly discarding.
In one of them embodiment, the step S30 specifically:
The cryptographic Hash that EPG edition configuration file is calculated using SHA256 algorithm, matches EPG version using the first cipher mode
The cryptographic Hash for setting file is encrypted, and is encrypted using the second cipher mode to EPG edition configuration file.
In one of them embodiment, the step S40 specifically:
The cryptographic Hash of EPG edition configuration file is decrypted using the first cipher mode first;If successful decryption again
EPG edition configuration file is decrypted using the second cipher mode, otherwise EPG edition configuration file is not decrypted.
In one of them embodiment, the step S50 specifically:
The cryptographic Hash that EPG data is calculated using SHA256 algorithm, using the first cipher mode to the cryptographic Hash of EPG data into
Row encryption, encrypts EPG data using the second cipher mode.
In one of them embodiment, the step S60 specifically:
The cryptographic Hash of EPG data is decrypted using the first cipher mode first;Use second again if successful decryption
EPG data is decrypted in cipher mode, otherwise EPG data is not decrypted.
In one of them embodiment, first cipher mode is rsa encryption mode, second cipher mode
For AES encryption mode.
A kind of audio-video terminal network EPG provided by the invention receives system, comprising:
EPG edition configuration file URL encrypting module, in audio-video terminal to server sends request, server authentication is led to
It is out-of-date, the cryptographic Hash of EPG edition configuration file URL is calculated, EPG edition configuration file URL and cryptographic Hash are encrypted, added
Audio-video terminal is sent to after close;
EPG edition configuration file URL correction verification module, control audio-video terminal receive the EPG edition configuration file URL of encryption
With cryptographic Hash and be decrypted, the EPG edition configuration file URL after decryption is verified using the cryptographic Hash after decryption, if
Verification passes through, then this time EPG edition configuration file URL it is effective, control audio-video terminal according to EPG edition configuration file URL to
Server requests corresponding EPG edition configuration file and executes step S30, invalid if verification does not pass through, and control audio-video is whole
End sends to server request again;
EPG edition configuration file encrypting module calculates the cryptographic Hash of EPG edition configuration file, to EPG edition configuration file
Cryptographic Hash and EPG edition configuration file are encrypted, and audio-video terminal is sent to after encryption;
EPG edition configuration file correction verification module, control audio-video terminal receive the EPG edition configuration file and EPG of encryption
Edition configuration file cryptographic Hash is simultaneously decrypted, using the EPG edition configuration file cryptographic Hash after decryption to the EPG version after decryption
This configuration file is verified, and the URL of EPG is parsed according to EPG edition configuration file if if verification, according to the URL of EPG
Corresponding EPG data is requested to server and executes step S50, and EPG edition configuration file is invalid if verification does not pass through;
EPG data encrypting module calculates the cryptographic Hash of corresponding EPG data, equal to the cryptographic Hash of EPG data and EPG data
It is encrypted, audio-video terminal is sent to after encryption;
EPG data deciphering module, control audio-video terminal receive the EPG data encrypted and EPG data cryptographic Hash and carry out
Decryption, verifies the EPG data after decryption using the EPG data cryptographic Hash after decryption, stores EPG number if if verifying
According to the directly discarding if verification does not pass through.
In one of them embodiment, the EPG edition configuration file encrypting module is calculated using SHA256 algorithm
The cryptographic Hash of EPG edition configuration file is encrypted using cryptographic Hash of first cipher mode to EPG edition configuration file, is adopted
EPG edition configuration file is encrypted with the second cipher mode;
The EPG data encrypting module calculates the cryptographic Hash of EPG data using SHA256 algorithm, using the first cipher mode
The cryptographic Hash of EPG data is encrypted, EPG data is encrypted using the second cipher mode.
In one of them embodiment, the EPG edition configuration file correction verification module uses the first encryption side first
The cryptographic Hash of EPG edition configuration file is decrypted in formula;EPG version is matched using the second cipher mode again if successful decryption
It sets file to be decrypted, otherwise EPG edition configuration file is not decrypted;
The EPG data correction verification module uses the first cipher mode that the cryptographic Hash of EPG data is decrypted first;If solution
Close success is then again decrypted EPG data using the second cipher mode, otherwise EPG data is not decrypted.
In one of them embodiment, first cipher mode is rsa encryption mode, second cipher mode
For AES encryption mode.
Audio-video terminal network EPG method of reseptance of the present invention and system are requested and are received to server in audio-video terminal
When network EPG data, asks summed data to encrypt in the process all, transmitted by the way of ciphertext, rather than
Only EPG data is encrypted, to effectively prevent being broken through by other people using network EPG, it is hidden to eliminate data safety
Suffer from, greatly ensure that the safety of network data, solve network security problem.
Detailed description of the invention
Fig. 1 is the flow chart of the audio-video terminal network EPG method of reseptance in one embodiment;
Fig. 2 is the structure chart of the audio-video terminal network EPG reception system in one embodiment.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to the accompanying drawings and embodiments, right
The present invention is further elaborated.It should be appreciated that described herein, specific examples are only used to explain the present invention, not
For limiting the present invention.
When obtaining network EPG for above-mentioned audio-video terminal, it is easy to be broken through by other people using network EPG, to number
Carry out very big hidden danger according to safety belt, it cannot be guaranteed that the technical problem of the safety of network data, the method for the present invention is in audio-video terminal
During requesting network EPG to server, asks summed data to encrypt to all, transmitted with ciphertext, to guarantee to pacify
Quan Xing.
Specifically, as shown in Figure 1, the audio-video terminal network EPG method of reseptance includes the following steps:
S10: in audio-video terminal to when server sends request, server authentication passes through, EPG edition configuration file is calculated
The cryptographic Hash of URL (Uniform Resource Locator, uniform resource locator), to EPG edition configuration file URL and Kazakhstan
Uncommon value is encrypted, and audio-video terminal is sent to after encryption.
When audio-video terminal needs network EPG data, first has to send to server and request, device to be serviced is to requests verification
By rear, EPG edition configuration file URL first can be sent to audio-video terminal.In the embodiment, to guarantee that request network EPG is complete
The internet security of process can calculate the cryptographic Hash of EPG edition configuration file URL, and to EPG edition configuration file URL and Kazakhstan
Uncommon value is encrypted, and audio-video terminal is sent by EPG edition configuration file URL in a manner of encryption, to guarantee data
Safety.
In further mode, the step specifically: calculate EPG edition configuration file URL's using SHA256 algorithm
Cryptographic Hash encrypts EPG edition configuration file URL and cryptographic Hash using rsa encryption mode.
S20: control audio-video terminal receives the EPG edition configuration file URL encrypted and cryptographic Hash and is decrypted, and uses
Cryptographic Hash after decryption verifies the EPG edition configuration file URL after decryption, if verification passes through, this time EPG version is matched
It is effective to set file URL, control audio-video terminal requests corresponding EPG version to be matched according to EPG edition configuration file URL to server
It sets file and executes step S30, invalid if verification does not pass through, control audio-video terminal is sent to server again requests.
After sending audio-video terminal for encrypted EPG edition configuration file URL and cryptographic Hash, control audio-video is whole
End is received.Since EPG edition configuration file URL and cryptographic Hash are encrypted, therefore need first to be decrypted.Decryption
Afterwards, the EPG edition configuration file URL after decryption is verified using the cryptographic Hash after decryption, verification is by then according to EPG editions
This configuration file URL requests corresponding EPG edition configuration file to server.
In further mode, the step specifically: cryptographic Hash and EPG version are matched respectively using rsa encryption mode
File is set to be decrypted.
S30: calculating the cryptographic Hash of EPG edition configuration file, configures to EPG edition configuration file cryptographic Hash and EPG version
File is encrypted, and audio-video terminal is sent to after encryption.
When audio-video terminal requests EPG edition configuration file to server, for the safety for guaranteeing EPG edition configuration file
Property, in the embodiment, the cryptographic Hash of EPG edition configuration file is calculated, EPG edition configuration file cryptographic Hash and EPG version are matched
It sets file to be encrypted, to guarantee safety.
Further, step specifically: calculate the cryptographic Hash of EPG edition configuration file using SHA256 algorithm, use
First cipher mode encrypts the cryptographic Hash of EPG edition configuration file, configures text to EPG version using the second cipher mode
Part is encrypted.Preferably, the first cipher mode is rsa encryption mode, and the second cipher mode is AES encryption mode.
S40: the EPG edition configuration file and EPG edition configuration file cryptographic Hash that control audio-video terminal receives encryption are simultaneously
It is decrypted, the EPG edition configuration file after decryption is verified using the EPG edition configuration file cryptographic Hash after decryption,
The URL of EPG is parsed according to EPG edition configuration file if if verification, it is corresponding to server request according to the URL of EPG
EPG data simultaneously executes step S50, and EPG edition configuration file is invalid if verification does not pass through.
After sending audio-video terminal for encrypted EPG edition configuration file and cryptographic Hash, audio-video terminal is controlled
It is received and is decrypted, using the EPG edition configuration file cryptographic Hash after decryption to the EPG edition configuration file after decryption
It is verified, obtains check results.
Further, the step specifically: first using the first cipher mode to the cryptographic Hash of EPG edition configuration file into
Row decryption;EPG edition configuration file is decrypted using the second cipher mode again if successful decryption, otherwise not to EPG editions
This configuration file is decrypted.In this way by the sequencing and incidence relation of decryption, further to reinforce confidentiality and peace
Quan Xing.
S50: the cryptographic Hash of corresponding EPG data is calculated, the cryptographic Hash of EPG data and EPG data is encrypted, is encrypted
After be sent to audio-video terminal.
Pass through verifying, parse the URL of EPG according to EPG edition configuration file, is requested according to the URL of EPG to server
After corresponding EPG data, for the safety for guaranteeing EPG data, in the embodiment, the cryptographic Hash of corresponding EPG data is calculated, it is right
The cryptographic Hash of EPG data and EPG data is encrypted, and guarantees the safety of EPG data by encryption.
Further, the step specifically: the cryptographic Hash that EPG data is calculated using SHA256 algorithm, using the first encryption
Mode encrypts the cryptographic Hash of EPG data, is encrypted using the second cipher mode to EPG data.Preferably, first adds
Close mode is rsa encryption mode, and the second cipher mode is AES encryption mode.
S60: control audio-video terminal receives the EPG data encrypted and EPG data cryptographic Hash and is decrypted, and uses decryption
EPG data cryptographic Hash afterwards verifies the EPG data after decryption, stores EPG data if if verifying, if verification is obstructed
Cross then directly discarding.
When the cryptographic Hash of the EPG data of encryption and EPG data is sent to audio-video terminal, control by audio-video terminal
It receives and is decrypted, the EPG data after decryption is verified using the EPG data cryptographic Hash after decryption, if verification passes through
EPG data is then stored, is directly abandoned if verification does not pass through.
Further, the cryptographic Hash of EPG data is decrypted using the first cipher mode first;If successful decryption again
EPG data is decrypted using the second cipher mode, otherwise EPG data is not decrypted.Pass through the successive of decryption in this way
Sequence and incidence relation further to reinforce confidentiality and safety.
The audio-video terminal network EPG method of reseptance requests and receives network EPG data to server in audio-video terminal
When, it asks summed data to encrypt in the process all, is transmitted by the way of ciphertext, rather than only to EPG number
According to being encrypted, to effectively prevent being broken through by other people using network EPG, incipient fault for data security is eliminated, is greatly protected
The safety for having demonstrate,proved network data, solves network security problem.
Meanwhile the present invention also provides a kind of audio-video terminal network EPG to receive system, as shown in Fig. 2, the system includes:
EPG edition configuration file URL encrypting module 100 sends request, server authentication to server in audio-video terminal
By when, calculate EPG edition configuration file URL (Uniform Resource Locator, uniform resource locator) Hash
Value, encrypts EPG edition configuration file URL and cryptographic Hash, audio-video terminal is sent to after encryption.
When audio-video terminal needs network EPG data, first has to send to server and request, device to be serviced is to requests verification
By rear, EPG edition configuration file URL first can be sent to audio-video terminal.In the embodiment, to guarantee that request network EPG is complete
The internet security of process, EPG edition configuration file URL encrypting module 100 can calculate the Hash of EPG edition configuration file URL
Value, and EPG edition configuration file URL and cryptographic Hash are encrypted, by EPG edition configuration file URL in a manner of encryption
It is sent to audio-video terminal, to guarantee the safety of data.
In further mode, EPG edition configuration file URL encrypting module 100 calculates EPG editions using SHA256 algorithm
The cryptographic Hash of this configuration file URL encrypts EPG edition configuration file URL and cryptographic Hash using rsa encryption mode.
EPG edition configuration file URL correction verification module 200, control audio-video terminal receive the EPG edition configuration file of encryption
URL and cryptographic Hash are simultaneously decrypted, and are verified using the cryptographic Hash after decryption to the EPG edition configuration file URL after decryption,
If verification passes through, this time EPG edition configuration file URL is effective, controls audio-video terminal according to EPG edition configuration file URL
Corresponding EPG edition configuration file is requested to server;It is invalid if verification does not pass through, audio-video terminal is controlled again to service
Device sends request.
After sending audio-video terminal for encrypted EPG edition configuration file URL and cryptographic Hash, the configuration of EPG version
File URL correction verification module 200 controls audio-video terminal and is received.Since EPG edition configuration file URL and cryptographic Hash carry out
Encryption, therefore EPG edition configuration file URL correction verification module 200 needs first to be decrypted.After decryption, EPG edition configuration file
URL correction verification module 200 verifies the EPG edition configuration file URL after decryption using the cryptographic Hash after decryption, and verification passes through
Corresponding EPG edition configuration file is then requested to server according to EPG edition configuration file URL.
In further mode, EPG edition configuration file URL correction verification module 200 is using rsa encryption mode respectively to Kazakhstan
Uncommon value and EPG edition configuration file are decrypted.
EPG edition configuration file encrypting module 300 calculates the cryptographic Hash of EPG edition configuration file, configures to EPG version
File cryptographic Hash and EPG edition configuration file are encrypted, and audio-video terminal is sent to after encryption.
When audio-video terminal requests EPG edition configuration file to server, for the safety for guaranteeing EPG edition configuration file
Property, in the embodiment, EPG edition configuration file encrypting module 300 calculates the cryptographic Hash of EPG edition configuration file, to EPG version
Configuration file cryptographic Hash and EPG edition configuration file are encrypted, to guarantee safety.
Further, EPG edition configuration file encrypting module 300 calculates EPG edition configuration file using SHA256 algorithm
Cryptographic Hash, encrypted using cryptographic Hash of first cipher mode to EPG edition configuration file, using the second cipher mode pair
EPG edition configuration file is encrypted.Preferably, the first cipher mode is rsa encryption mode, and the second cipher mode adds for AES
Close mode.
EPG edition configuration file correction verification module 400, control audio-video terminal receive encryption EPG edition configuration file and
EPG edition configuration file cryptographic Hash is simultaneously decrypted, using the EPG edition configuration file cryptographic Hash after decryption to decryption after
EPG edition configuration file is verified, and the URL of EPG is parsed according to EPG edition configuration file if if verification, according to EPG
URL request corresponding EPG data to server, EPG edition configuration file is invalid if verification does not pass through.
After sending audio-video terminal for encrypted EPG edition configuration file and cryptographic Hash, EPG edition configuration file
Correction verification module 400 controls audio-video terminal and is received and be decrypted, and uses the EPG edition configuration file cryptographic Hash after decryption
EPG edition configuration file after decryption is verified, check results are obtained.
Further, EPG edition configuration file correction verification module 400 first configures EPG version using the first cipher mode
The cryptographic Hash of file is decrypted;EPG edition configuration file is decrypted using the second cipher mode again if successful decryption,
Otherwise EPG edition configuration file is not decrypted.In this way by the sequencing and incidence relation of decryption, further to add
Strong confidentiality and safety.
EPG data encrypting module 500 calculates the cryptographic Hash of corresponding EPG data, to the cryptographic Hash of EPG data and EPG data
It is encrypted, audio-video terminal is sent to after encryption.
Pass through verifying, parse the URL of EPG according to EPG edition configuration file, is requested according to the URL of EPG to server
After corresponding EPG data, for the safety for guaranteeing EPG data, in the embodiment, EPG data encrypting module 500, which calculates, to be corresponded to
The cryptographic Hash of EPG data encrypts the cryptographic Hash of EPG data and EPG data, guarantees the peace of EPG data by encryption
Quan Xing.
Further, EPG data encrypting module 500 calculates the cryptographic Hash of EPG data using SHA256 algorithm, using first
Cipher mode encrypts the cryptographic Hash of EPG data, is encrypted using the second cipher mode to EPG data.Preferably,
One cipher mode is rsa encryption mode, and the second cipher mode is AES encryption mode.
EPG data correction verification module 600, control audio-video terminal receives the EPG data of encryption and EPG data cryptographic Hash is gone forward side by side
Row decryption, verifies the EPG data after decryption using the EPG data cryptographic Hash after decryption, stores EPG if if verifying
Data directly abandon if verification does not pass through.
When the cryptographic Hash of the EPG data of encryption and EPG data is sent to audio-video terminal, EPG data correction verification module
600 controls are received and are decrypted by audio-video terminal, using the EPG data cryptographic Hash after decryption to the EPG data after decryption
It is verified, stores EPG data if if verifying, if verification is by directly abandoning.
Further, EPG data correction verification module 600 is carried out using cryptographic Hash of first cipher mode to EPG data first
Decryption;EPG data is decrypted using the second cipher mode again if successful decryption, otherwise EPG data is not decrypted.
In this way by the sequencing and incidence relation of decryption, further to reinforce confidentiality and safety.
The audio-video terminal network EPG receives system, requests and receive network EPG data to server in audio-video terminal
When, it asks summed data to encrypt in the process all, is transmitted by the way of ciphertext, rather than only to EPG number
According to being encrypted, to effectively prevent being broken through by other people using network EPG, incipient fault for data security is eliminated, is greatly protected
The safety for having demonstrate,proved network data, solves network security problem.
Audio-video terminal network EPG method of reseptance of the present invention and system are requested and are received to server in audio-video terminal
When network EPG data, asks summed data to encrypt in the process all, transmitted by the way of ciphertext, rather than
Only EPG data is encrypted, to effectively prevent being broken through by other people using network EPG, it is hidden to eliminate data safety
Suffer from, greatly ensure that the safety of network data, solve network security problem.
The above is merely preferred embodiments of the present invention, be not intended to limit the invention, it is all in spirit of the invention and
Made any modifications, equivalent replacements, and improvements etc., should all be included in the protection scope of the present invention within principle.
Claims (10)
1. a kind of audio-video terminal network EPG method of reseptance, which comprises the steps of:
S10: in audio-video terminal to when server sends request, server authentication passes through, EPG edition configuration file URL is calculated
Cryptographic Hash, EPG edition configuration file URL and cryptographic Hash are encrypted, audio-video terminal is sent to after encryption;
S20: control audio-video terminal receives the EPG edition configuration file URL encrypted and cryptographic Hash and is decrypted, and uses decryption
Cryptographic Hash afterwards verifies the EPG edition configuration file URL after decryption, if verification passes through, this time EPG version configuration text
Part URL is effective, and control audio-video terminal requests corresponding EPG version to configure text according to EPG edition configuration file URL to server
Part simultaneously executes step S30, invalid if verification does not pass through, and control audio-video terminal is sent to server again requests;
S30: the cryptographic Hash of EPG edition configuration file is calculated, to EPG edition configuration file cryptographic Hash and EPG edition configuration file
It is encrypted, audio-video terminal is sent to after encryption;
S40: control audio-video terminal receives the EPG edition configuration file encrypted and EPG edition configuration file cryptographic Hash and carries out
Decryption, verifies the EPG edition configuration file after decryption using the EPG edition configuration file cryptographic Hash after decryption, if school
The URL by then parsing EPG according to EPG edition configuration file is tested, corresponding EPG number is requested to server according to the URL of EPG
According to and execute step S50, EPG edition configuration file is invalid if verification does not pass through;
S50: the cryptographic Hash of corresponding EPG data is calculated, the cryptographic Hash of EPG data and EPG data is encrypted, is sent out after encryption
It is sent to audio-video terminal;
S60: control audio-video terminal receives the EPG data encrypted and EPG data cryptographic Hash and is decrypted, after decryption
EPG data cryptographic Hash verifies the EPG data after decryption, stores EPG data if if verifying, if verification does not pass through
Directly abandon.
2. audio-video terminal network EPG method of reseptance according to claim 1, which is characterized in that the step S30 is specific
Are as follows:
The cryptographic Hash that EPG edition configuration file is calculated using SHA256 algorithm configures text to EPG version using the first cipher mode
The cryptographic Hash of part is encrypted, and is encrypted using the second cipher mode to EPG edition configuration file.
3. audio-video terminal network EPG method of reseptance according to claim 2, which is characterized in that the step S40 is specific
Are as follows:
The cryptographic Hash of EPG edition configuration file is decrypted using the first cipher mode first;It is used again if successful decryption
EPG edition configuration file is decrypted in second cipher mode, otherwise EPG edition configuration file is not decrypted.
4. audio-video terminal network EPG method of reseptance according to claim 1, which is characterized in that the step S50 is specific
Are as follows:
The cryptographic Hash that EPG data is calculated using SHA256 algorithm, is added using cryptographic Hash of first cipher mode to EPG data
It is close, EPG data is encrypted using the second cipher mode.
5. audio-video terminal network EPG method of reseptance according to claim 4, which is characterized in that the step S60 is specific
Are as follows:
The cryptographic Hash of EPG data is decrypted using the first cipher mode first;Again using the second encryption if successful decryption
EPG data is decrypted in mode, otherwise EPG data is not decrypted.
6. according to any audio-video terminal network EPG method of reseptance of claim 2 to 5, which is characterized in that described first
Cipher mode is rsa encryption mode, and second cipher mode is AES encryption mode.
7. a kind of audio-video terminal network EPG receives system characterized by comprising
EPG edition configuration file URL encrypting module, when audio-video terminal passes through to server transmission request, server authentication,
The cryptographic Hash for calculating EPG edition configuration file URL, encrypts EPG edition configuration file URL and cryptographic Hash, after encryption
It is sent to audio-video terminal;
EPG edition configuration file URL correction verification module, control audio-video terminal receive EPG edition configuration file URL and the Kazakhstan of encryption
Uncommon value is simultaneously decrypted, and is verified using the cryptographic Hash after decryption to the EPG edition configuration file URL after decryption, if verification
Pass through, then this time EPG edition configuration file URL is effective, and control audio-video terminal is according to EPG edition configuration file URL to service
Device requests corresponding EPG edition configuration file and executes step S30, invalid if verification does not pass through, and control audio-video terminal is again
Secondary send to server is requested;
EPG edition configuration file encrypting module calculates the cryptographic Hash of EPG edition configuration file, to EPG edition configuration file Hash
Value and EPG edition configuration file are encrypted, and audio-video terminal is sent to after encryption;
EPG edition configuration file correction verification module, control audio-video terminal receive the EPG edition configuration file and EPG version of encryption
Configuration file cryptographic Hash is simultaneously decrypted, and is matched using the EPG edition configuration file cryptographic Hash after decryption to the EPG version after decryption
It sets file to be verified, parses if the URL of EPG according to EPG edition configuration file if verification, according to the URL of EPG to clothes
Business device requests corresponding EPG data and executes step S50, and EPG edition configuration file is invalid if verification does not pass through;
EPG data encrypting module calculates the cryptographic Hash of corresponding EPG data, carries out to the cryptographic Hash of EPG data and EPG data
Encryption, is sent to audio-video terminal after encryption;
EPG data deciphering module, control audio-video terminal receive the EPG data encrypted and EPG data cryptographic Hash and are decrypted,
The EPG data after decryption is verified using the EPG data cryptographic Hash after decryption, stores EPG data if if verifying, if
Verification is not by abandoning directly then.
8. audio-video terminal network EPG according to claim 7 receives system, which is characterized in that
The EPG edition configuration file encrypting module calculates the cryptographic Hash of EPG edition configuration file using SHA256 algorithm, uses
First cipher mode encrypts the cryptographic Hash of EPG edition configuration file, configures text to EPG version using the second cipher mode
Part is encrypted;
The EPG data encrypting module calculates the cryptographic Hash of EPG data using SHA256 algorithm, using the first cipher mode pair
The cryptographic Hash of EPG data is encrypted, and is encrypted using the second cipher mode to EPG data.
9. audio-video terminal network EPG according to claim 8 receives system, which is characterized in that the EPG version configuration
File verification module uses the first cipher mode that the cryptographic Hash of EPG edition configuration file is decrypted first;If successful decryption
Then EPG edition configuration file is decrypted using the second cipher mode again, otherwise EPG edition configuration file is not solved
It is close;
EPG data correction verification module uses the first cipher mode that the cryptographic Hash of EPG data is decrypted first;If successful decryption
EPG data is decrypted using the second cipher mode again, otherwise EPG data is not decrypted.
10. audio-video terminal network EPG according to claim 8 or claim 9 receives system, which is characterized in that described first adds
Close mode is rsa encryption mode, and second cipher mode is AES encryption mode.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610114883.8A CN105657454B (en) | 2016-03-01 | 2016-03-01 | A kind of audio-video terminal network EPG method of reseptance and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610114883.8A CN105657454B (en) | 2016-03-01 | 2016-03-01 | A kind of audio-video terminal network EPG method of reseptance and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105657454A CN105657454A (en) | 2016-06-08 |
CN105657454B true CN105657454B (en) | 2019-02-15 |
Family
ID=56492859
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610114883.8A Expired - Fee Related CN105657454B (en) | 2016-03-01 | 2016-03-01 | A kind of audio-video terminal network EPG method of reseptance and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105657454B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109996096B (en) * | 2019-03-06 | 2022-01-11 | 湖北省广播电视信息网络股份有限公司 | Regional EPG management system, distribution system and distribution method |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1725852A (en) * | 2004-07-21 | 2006-01-25 | 联想(北京)有限公司 | Encipher and decipher method of electronic program guide |
KR20080090165A (en) * | 2007-04-04 | 2008-10-08 | 삼성전자주식회사 | System of offering digital broadcasting using picture in picture in portable terminal, method thereof and apparatus thereof |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8281155B1 (en) * | 2000-11-02 | 2012-10-02 | Intel Corporation | Content protection using block reordering |
-
2016
- 2016-03-01 CN CN201610114883.8A patent/CN105657454B/en not_active Expired - Fee Related
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1725852A (en) * | 2004-07-21 | 2006-01-25 | 联想(北京)有限公司 | Encipher and decipher method of electronic program guide |
KR20080090165A (en) * | 2007-04-04 | 2008-10-08 | 삼성전자주식회사 | System of offering digital broadcasting using picture in picture in portable terminal, method thereof and apparatus thereof |
Also Published As
Publication number | Publication date |
---|---|
CN105657454A (en) | 2016-06-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11757662B2 (en) | Confidential authentication and provisioning | |
CN109246053B (en) | Data communication method, device, equipment and storage medium | |
CN105939484B (en) | A kind of the encryption playback method and its system of audio-video | |
CN107294937B (en) | Data transmission method based on network communication, client and server | |
CN114900338B (en) | Encryption and decryption method, device, equipment and medium | |
US20200320178A1 (en) | Digital rights management authorization token pairing | |
CN106658093B (en) | The exchange method and system of set-top box and server | |
CN105915342A (en) | Application program communication processing system, an application program communication processing device, an application program communication processing apparatus and an application program communication processing method | |
JP4519935B2 (en) | Information communication method, communication terminal device, and information communication system | |
CN106790183A (en) | Logging on authentication method of calibration, device | |
CN110662091B (en) | Third-party live video access method, storage medium, electronic device and system | |
CN108809633B (en) | Identity authentication method, device and system | |
CN110753321A (en) | Safe communication method for vehicle-mounted TBOX and cloud server | |
CN104243452B (en) | A kind of cloud computing access control method and system | |
CN105635759B (en) | A kind of output content protection method and Conditional Access Module | |
KR102140356B1 (en) | Method and device to embed watermark in uncompressed video data | |
CN105657454B (en) | A kind of audio-video terminal network EPG method of reseptance and system | |
WO2020101471A1 (en) | Secure framework for transaction signing | |
US8699710B2 (en) | Controlled security domains | |
CN110912857A (en) | Method and storage medium for sharing login between mobile applications | |
KR20220128615A (en) | Transmission of Security Information in Content Distribution Networks | |
CN111711836B (en) | Data transmission method, device, terminal equipment and storage medium | |
KR101609095B1 (en) | Apparatus and method for data security in content delivery network | |
KR20200060930A (en) | Cryptographic communication method between telematics devices | |
CN116886208B (en) | Information encryption transmission method, device, terminal equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20190215 Termination date: 20200301 |
|
CF01 | Termination of patent right due to non-payment of annual fee |