CN106533668A - Network-based PVR protection method and system - Google Patents

Network-based PVR protection method and system Download PDF

Info

Publication number
CN106533668A
CN106533668A CN201610989564.1A CN201610989564A CN106533668A CN 106533668 A CN106533668 A CN 106533668A CN 201610989564 A CN201610989564 A CN 201610989564A CN 106533668 A CN106533668 A CN 106533668A
Authority
CN
China
Prior art keywords
key
recording
identification information
top box
set top
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610989564.1A
Other languages
Chinese (zh)
Other versions
CN106533668B (en
Inventor
钟争胜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Skyworth Digital Technology Co Ltd
Original Assignee
Shenzhen Skyworth Digital Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Skyworth Digital Technology Co Ltd filed Critical Shenzhen Skyworth Digital Technology Co Ltd
Priority to CN201610989564.1A priority Critical patent/CN106533668B/en
Publication of CN106533668A publication Critical patent/CN106533668A/en
Priority to PCT/CN2017/110334 priority patent/WO2018086566A1/en
Application granted granted Critical
Publication of CN106533668B publication Critical patent/CN106533668B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/41Structure of client; Structure of client peripherals
    • H04N21/4104Peripherals receiving signals from specially adapted client devices
    • H04N21/4108Peripherals receiving signals from specially adapted client devices characterised by an identification number or address, e.g. local network address
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/41Structure of client; Structure of client peripherals
    • H04N21/4104Peripherals receiving signals from specially adapted client devices
    • H04N21/4135Peripherals receiving signals from specially adapted client devices external recorder
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/41Structure of client; Structure of client peripherals
    • H04N21/414Specialised client platforms, e.g. receiver in car or embedded in a mobile appliance
    • H04N21/4147PVR [Personal Video Recorder]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/41Structure of client; Structure of client peripherals
    • H04N21/426Internal components of the client ; Characteristics thereof
    • H04N21/42684Client identification by a unique number or address, e.g. serial number, MAC address, socket ID
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/433Content storage operation, e.g. storage operation in response to a pause request, caching operations
    • H04N21/4334Recording operations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
    • H04N21/4405Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
    • H04N21/4408Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream encryption, e.g. re-encrypting a decrypted video stream for redistribution in a home network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/76Television signal recording

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Power Engineering (AREA)
  • Storage Device Security (AREA)
  • Signal Processing For Digital Recording And Reproducing (AREA)

Abstract

The invention discloses a network-based PVR protection method and system, the method comprising: when the recording instruction of a first set-top box is triggered, the first set-top box sends request information for obtaining a first recording key to a PVR management system (PMS), the PMS generates a random key of an encrypted program based on the request information, encrypts the random key and sends the encrypted random key to the first set-top box so that the set-top box uses the random key to record programs. In the present invention, a random key for recording programs is generated by the PMS and is acquired by the PMS at the time of playback and the program is decrypted by the random key so that other set-top boxes, other than the set-top box recording the program, can also play back the recorded programs, thereby enabling the sharing of recorded programs.

Description

A kind of network PVR guard methods and system
Technical field
The present invention relates to set-top box technique field, more particularly to a kind of network PVR guard methods and system.
Background technology
Top box of digital machine becomes people and understands the world, cognitive things, joy in daily life throughout vast family The important platforms such as happy consumption.As the technology and business of top box of digital machine are continually developed and renewal, PVR (Personal Video Recorder, individual video video recording) technology has been applied successfully on Set Top Box, using the core technology (number of PVR Word process and memory technology), program is flexibly recorded and played back, and digitized excellent confused journey is brought with interaction Follow one's bent.
In order to ensure program copyright, the PVR programs to being stored in Set Top Box hard disk generally need encryption.CA in the market Typically using the hardware encryption method based on chip-scale, which is specially for producer:Using privately owned in master chip in recording process Key SK (Session Key) obtains random secret key PVR KEY after computing, then using the PVR KEY to audio frequency and video number According to being encrypted;Then computing is carried out using the private cipher key SK in the master chip in playback obtain PVR KEY, and it is close using this Key decrypts audio, video data.But, the encryption method is the protection based on privately owned link on hardware, and other other Set Top Boxes cannot Recover the PVR KEY of the Set Top Box so that record and playback is limited to use on same Set Top Box, data cannot be by The Set Top Box of other CA manufacturers accreditations is shared.
Thus prior art could be improved and improve.
The content of the invention
The technical problem to be solved in the present invention is, for the deficiencies in the prior art, there is provided a kind of network PVR is protected Maintaining method and system, are only capable of in the Set Top Box last time for recording the data with solving the data recorded using existing encryption method Put so that the problem that the data of recording cannot be shared by other machine tops.
In order to solve above-mentioned technical problem, the technical solution adopted in the present invention is as follows:
A kind of network PVR guard methods, which includes recording process, and the recording process is specifically included:
When the record command of the first Set Top Box is triggered, first Set Top Box sends to PVR management systems PMS and obtains first The solicited message of key is recorded, wherein, the solicited message carries the first identification information of first Set Top Box;
The PMS receives the solicited message and generates a random key, then according to first identification information it is corresponding the Random key described in one private cipher key pair is encrypted to obtain the first recording key;
The first Set Top Box decryption described first records key to obtain the random key, and adopts the random key pair Audio, video data after descrambling is encrypted and obtains recording audio;And
The recording audio is preserved to External memory equipment, to realize PVR encrypting shootings.
The network PVR guard methods, wherein, the PMS receives the solicited message and generates one with secret Key, then according to the first private cipher key pair corresponding to first identification information, random key is encrypted to obtain the first recording Also include after key:
First identification information and described first are recorded key bindings by first Set Top Box, and are stored in for storing Record the External memory equipment of program.
The network PVR guard methods, wherein, the PMS generates a random key according to the solicited message, And random key is encrypted to obtain the first recording key according to the first private cipher key pair corresponding to first identification information Specifically include:
Whether the PMS first Set Top Boxes according to first identification information-enquiry have is recorded authority;
When there is first Set Top Box recording right to prescribe a time limit, PMS generates a random key according to the solicited message, and according to institute State random key described in the first private cipher key pair corresponding to the first identification information to encrypt to obtain the first recording key.
The network PVR guard methods, methods described also include:PVR replayed sections, the PVR replayed sections Specifically include:
It is when the second Set Top Box receives play-back command, the second identification information of its own is corresponding with the recording program of playback First identification information is compared;
If differing, the second identification information, the first identification information and recording program corresponding first are recorded into key and is sent To PMS;
The PMS records key according to second identification information, the first identification information and first and generates the second recording key;
Second Set Top Box is decrypted to the described second recording key to obtain the random key, and using described random Key is decrypted to the recording program, to realize playing back the recording program.
The network PVR guard methods, wherein, the PVR replayed sections also include:
If identical, decrypt described first and key is recorded to obtain the random key;
The recording program is decrypted using the random key, to realize playing back the recording program.
The network PVR guard methods, wherein, the PMS is according to second identification information, the first mark letter Breath and the first recording key generate the second recording key and specifically include:
The PMS first recording keys according to first identification information pair are decrypted and obtain random key;And
The random key according to the second private cipher key pair corresponding to second identification information is encrypted generation second and records Key.
The network PVR guard methods, wherein, the PMS is according to second identification information, the first mark letter Breath and the first recording key include before generating the second recording key:
Whether the PMS second Set Top Boxes according to second identification information judgment have a playback right, and when described the There is two Set Top Boxes recording right to prescribe a time limit, and performs and generates the second recording key step.
A kind of network PVR protection systems, which includes:Set Top Box and PVR management systems PMS;
The Set Top Box includes:First sending module, the first deciphering module and preserving module;
First sending module, for when record command is triggered, sending to PVR management systems PMS and obtaining the first recording The solicited message of key, wherein, the solicited message carries the first identification information of the Set Top Box;
First deciphering module, for decrypting the first recording key to obtain the random key, and using it is described with Secret key is encrypted to the audio, video data after descrambling and obtains recording audio;
The preserving module, for the recording audio is preserved to External memory equipment, to realize that PVR is protected;
PVR management systems PMS, for receiving the solicited message and generating a random key, then according to described first Random key described in first private cipher key pair corresponding to identification information is encrypted to obtain the first recording key.
The network PVR protection systems, wherein, the Set Top Box also includes:Comparison module, the second sending module And second deciphering module;
The comparison module, for when play-back command is triggered, by the second identification information of its own and the recording section for playing back Corresponding first identification information of mesh is compared;
Second sending module, for when both differ, by second identification information, the first identification information and recording section The corresponding first recording key of mesh is sent to PMS;
Second deciphering module, for being decrypted to the second recording key to obtain the random key, and using described random Key is decrypted to the recording program, to realize playing back the recording program;
The PMS is additionally operable to record key generation according to second identification information, corresponding first identification information and first Second records key.
The network PVR protection systems, wherein, the Set Top Box also includes:
3rd deciphering module, for when both are identical, decrypting the first recording key to obtain the random key, and profit The recording program is decrypted with the random key, to realize playing back the recording program.
Beneficial effect:Compared with prior art, the invention provides a kind of network PVR guard methods and system, Methods described includes:When the record command of the first Set Top Box is triggered, first Set Top Box is sent out to PVR management systems PMS Send and obtain the first solicited message for recording key, the PMS generates the random of the program for encryption according to the solicited message Key simultaneously will be sent to the first Set Top Box after random key encryption, so that Set Top Box is recorded using the random key Program processed.In the present invention, generated for the random key to recording program by PMS, and in playback by described PMS obtains the random key, and decrypts the program by the random key so that from the Set Top Box for recording program its His Set Top Box can also play back the recording program, realize and record the shared of program.
Description of the drawings
The flow chart of the network PVR guard methods embodiment one that Fig. 1 is provided for the present invention.
The flow chart of the network PVR guard methods embodiment two that Fig. 2 is provided for the present invention.
The flow chart of the network PVR guard methods embodiment three that Fig. 3 is provided for the present invention.
The flow chart of the network PVR guard methods example IV that Fig. 4 is provided for the present invention.
The structure principle chart of the network PVR protection systems that Fig. 5 is provided for the present invention.
The structure principle chart of Set Top Box in the network PVR protection systems that Fig. 6 is provided for the present invention.
Specific embodiment
The present invention provides a kind of network PVR guard methods and system, for make the purpose of the present invention, technical scheme and Effect is clearer, clear and definite, and the present invention is described in more detail for the embodiment that develops simultaneously referring to the drawings.It should be appreciated that herein Described specific embodiment only to explain the present invention, is not intended to limit the present invention.
In the present invention, using the suffix for representing such as " module ", " part " or " unit " of element only for favourable In the explanation of the present invention, itself does not have specific meaning.Therefore, module ", " part " or " unit " mixedly can make With.
Terminal unit can be implemented in a variety of manners.For example, the terminal described in the present invention can include such as moving Phone, smart phone, notebook computer, digit broadcasting receiver, PDA (personal digital assistant), PAD (panel computer), PMP The mobile terminal of (portable media player), guider etc. and such as numeral TV, desk computer etc. are consolidated Determine terminal.However, it will be understood by those skilled in the art that, in addition to being used in particular for moving the element of purpose, according to this The construction of bright embodiment can also apply to the terminal of fixed type.
Below in conjunction with the accompanying drawings, by the description to embodiment, the content of the invention is described further.
Embodiment one
A kind of network PVR guard methods are present embodiments provided, methods described includes recording process, as shown in figure 1, institute State recording process to specifically include
S101, when the record command of the first Set Top Box is triggered, first Set Top Box to PVR management systems PMS send obtain The solicited message of the first recording key is taken, wherein, the solicited message carries the first identification information of first Set Top Box;
S102, the PMS receive the solicited message and generate a random key, then according to first identification information correspondence The first private cipher key pair described in random key encryption obtaining the first recording key;
S103, first Set Top Box decryption described first record key to obtain the random key, and using described random Key is encrypted to the audio, video data after descrambling and obtains recording audio;And
S104, the recording audio is preserved to External memory equipment, to realize PVR encrypting shootings.
In the present embodiment, the Set Top Box sends the first identification information of its own to PMS systems, the PMS systems A random key is generated for first identification information, and using AES corresponding to first identification information and the Random key described in one private cipher key pair is encrypted to generate the first recording key, and the Set Top Box decryption described first is recorded Key obtains the random key, and carries out recording program using the random key.So by PMS systems to recording key It is managed, solves PVR programs intelligence playback on same Set Top Box that existing method for recording is obtained, it is impossible on other machine tops The problem played back on box.
Specifically, in step S101, it can be user that the record command of first Set Top Box is triggered The control produced by the control operation that the control devices such as the control panel or remote control of Set Top Box are carried out to Set Top Box is referred to Order, the control instruction are record command.PVR management systems PMS can be arranged in CA front ends, and the PMS can be obtained The relevant information of the Set Top Box of CA front ends certification is obtained, e.g., the identification information of Set Top Box(For example, chip number CHIP ID), private cipher key, encryption method and recording authority etc..In the present embodiment, institute's identification information is CHIP ID.Answer actual With in, the PMS systems can pre-build a data base, and the data base is used for chip number CHIP for storing Set Top Box ID, private cipher key, encryption method and recording authority etc..Also, the chip number CHIP ID, private cipher key, encryption method And record the interrelated storage of authority.That is, according to the CHIP ID of Set Top Box, the PMS systems can determine which is right Private cipher key, encryption method and recording authority for answering etc..
First Set Top Box to PVR management systems PMS send obtain first record key solicited message its specifically may be used The Internet is passed through with first Set Top Box and the solicited message for carrying its own CHIP ID is sent to the PMS systems, so that Must by the solicited message obtain for record program first recording key.
In step S102, the random key is that PMS systems are generated at random, and which can be a character string, Such as ab12 etc..After random key is generated, further according to random described in the first private cipher key pair corresponding to first identification information Key is encrypted and obtains the first recording key.In actual applications, as not every Set Top Box all has recording program Authority, and its have record authority when need not for its generation random key and perform subsequent step.So as to, One can also be included before step S102 and inquire about whether first Set Top Box has the process for recording authority, which is concrete Can include:
The PMS receives the solicited message, and obtains the first identification information that the solicited message is carried;
Inquire about whether Set Top Box corresponding to first identification information has recording authority in presetting database;
If first Set Top Box has records authority, step S102 is performed;
If first Set Top Box does not have records authority, first Set Top Box is fed back by the inquiry knot by network Really, i.e., described first Set Top Box does not have recording authority.
In the present embodiment, the PMS receives the solicited message and generates a random key, then according to described first Random key encryption described in first private cipher key pair corresponding to identification information is specifically included with obtaining the first recording key:
S1021, the PMS receive and parse through the solicited message, to obtain first identification information;
S1022, its corresponding private cipher key and encryption method are searched in presetting database according to first identification information;
S1023, at random one random key of generation, and utilize the private cipher key and encryption method to add the random key It is close to obtain the first recording key;
Described first recording key is fed back to the first Set Top Box by S1024, the PMS.
In the present embodiment, first identification information is CHIP ID1, and first private cipher key is set top box main chip In private cipher key.Namely PMS using the private cipher key SK (Session Key) in the set top box main chip to secret Key is encrypted and obtains the first recording key, so when the first Set Top Box receives the first recording key, can be according to which certainly Described in the private cipher key pair that body master chip is carried, the first recording key is decrypted, to obtain the random key.It is, this Embodiment is by set top box main chip generation random key and complete in PMS systems to the process which is encrypted using private cipher key pair Into, such PMS systems can preserve the random key, when there is Set Top Box to play back the first Set Top Box recorded program, The random key can be obtained by PMS systems, the first Set Top Box recorded program is decrypted using the random key, be realized PVR programs it is shared.
In step S103, the first Set Top Box decryption described first records key to obtain the random key Refer to the first recording key that first Set Top Box receives PMS feedbacks, and record key by described first arrange encryption Decryption in engine obtains the random key.Meanwhile, first identification information and first are recorded into the metadata such as password META DATA information is preserved to External memory equipment(Such as, USB flash disk, portable hard drive etc.)On, the External memory equipment is for depositing Store up the External memory equipment of the first Set Top Box recorded program.That is, working as has Set Top Box to obtain from the External memory equipment When taking the first Set Top Box recorded program, the META DATA information of first Set Top Box can be obtained, so can be according to institute State META DATA and obtain random key.
In step S104, the recording audio for obtaining is written to External memory equipment with shape by first Set Top Box Into the program played with the first Set Top Box relative to PVR files, lay equal stress on be added with close recording process until record terminate.The record System terminates be that Pgmtime terminates(Digital TV terminal judges to know section by the EPG information of the digital TV channel Purpose time started and persistent period), complete the recording to program need to be recorded;Can also be that user cancels recording;Can also be Make a mistake end, and e.g., storage device is full etc..
Embodiment two
A kind of network PVR guard methods are present embodiments provided, methods described includes recording process, as shown in Fig. 2 institute State recording process to specifically include:
S201, Set Top Box STB1 record commands are triggered, and the CHIP ID1 information of the machine is sent to PVR management by the Internet System PMS;
S202, the PMS inquire about the recording authority of Set Top Box STB1 by database retrieval;If Set Top Box STB1 is allowed to Record, then perform S203;If Set Top Box STB1 is not allowed to record, PMS returns the authority that cannot be recorded by network, and Perform S205;
S203, the PMS generate a random key PVR KEY, and using the corresponding private cipher key SK1 of CHIP ID1 to described PVR KEY encryptions obtain recording key RECORD KEY1;
S204, the PMS will record authority by network and RECORD KEY1 return to Set Top Box STB1;
S205, Set Top Box STB1 check the result that PMS is returned, if allowing to record, perform S206;S209 is performed otherwise;
The RECORD KEY1 that PMS is returned by S206, Set Top Box STB1 arrange in crypto engine decryption and obtain PVR KEY, and will The metadata META DATA information being made up of CHIP ID1 and/RECORD KEY1 is saved on External memory equipment;
S207, Set Top Box STB1 the audio, video data after descrambling is encrypted using PVR KEY after data RECORD CONTENT, and RECORD CONTENT are saved on External memory equipment;
S208, repeat step S207 are recorded or other mistake generations until user cancels, and terminate to record;
S209, end are recorded.
The recording process that this enforcement is provided is the recording process of master chip and PMS systems based on Set Top Box, and institute State AES and its private cipher key SK that PMS preserves the master chip.When Set Top Box is operated to PMS request PVR, PMS transmits chip number CHIP ID1 according to the first Set Top Box and finds its corresponding private cipher key, described so as to generating and returning PVR KEY after the corresponding encryptions of CHIP ID1, then Set Top Box just can utilize chip inside private cipher key SK decrypt The PVR KEY, and then complete recording action.So described PVR KEY are stored in the first Set Top Box and PMS simultaneously, are returned The Set Top Box for putting the first Set Top Box recorded program can itself be preserved the PVR KEY, or obtained by PMS The PVR KEY are taken, is realized on the basis of the safety for ensureing to record program and is recorded the shared of program.
Embodiment three
A kind of network PVR guard methods are present embodiments provided, methods described also includes replayed section, as shown in figure 3, The replayed section is specifically included:
S301, when the second Set Top Box receives play-back command, by the second identification information of its own with playback recording program Corresponding first identification information is compared.
Specifically, second Set Top Box receives play-back command and refers to second Set Top Box and External memory equipment Be connected, and the recording interface in the External memory equipment be shown in the menu of Set Top Box, according to the selection of user and Produce play-back command.
It is described when the second Set Top Box receives play-back command, by the second identification information of its own with playback recording section Corresponding first identification information of mesh is compared and can specifically include:
S3011, when the second Set Top Box connect External memory equipment when, by the External memory equipment carry recorded content show In menu;
The selection operation of S3012, receive user, and play-back command is produced according to the selection operation;
S3123, its corresponding recording program is obtained according to the play-back command, and obtain it is described record program to metadata Information;
S3014, the first identification information read in the metadata information, and by first identification information and its own the Two identification informations are compared.
If S302, differing, by the second identification information, the first identification information and record program corresponding first and record Key is sent to PMS.
Specifically, second identification information for differing finger is differed with the first identification information, illustrates that described recording is saved Mesh is not that second Set Top Box the machine is recorded.Now random key can be obtained by PMS.It is, by described by the second mark The corresponding first recording key of knowledge information, the first identification information and recording program is sent to PMS, so that PMS is according to described Second identification information, the first identification information and the first recording key are determined for the second Set Top Box decryption recording program Second records key.
Further, when the second identification information is identical with the first identification information, the recording program is second Set Top Box the machine Record, then just decrypt described first and record key to obtain the random key;Using the random key to the record Program processed is decrypted, to realize playing back the recording program.In actual applications, key can be recorded by described first to arrange Random key is decrypted in crypto engine.
S303, the PMS record key according to second identification information, the first identification information and first and generate second Record key.
Specifically, after the PMS receives the second identification information, first determine whether second identification information it is corresponding second Whether Set Top Box has playback right, only there is recording right to prescribe a time limit in the second Set Top Box, just generates second and records key.From And, specifically include in step S303:
Whether S3031, the PMS the second Set Top Box according to second identification information judgment has playback right.
Specifically, PMS searches its corresponding second Set Top Box in presetting database according to second identification information Playback right.
S3032, when second Set Top Box has playback right, the PMS is according to the first identification information pair institute State the first recording key and be decrypted and obtain random key.
Specifically, the PMS determines its corresponding first private cipher key according to first identification information, using described One private cipher key pair the first recording key is decrypted and obtains random key.
S3033, the random key according to the second private cipher key pair corresponding to second identification information are encrypted life Key is recorded into second.
Specifically, the PMS determines the second private cipher key for obtaining the second Set Top Box according to the second identification information, using institute Random key described in stating the second private cipher key pair is encrypted generation second and records key, and records key feedback by described second To the second Set Top Box.
S304, second Set Top Box are decrypted to obtain the random key, and profit to the described second recording key The recording program is decrypted with the random key, to realize playing back the recording program.
Specifically, second Set Top Box by the described second recording key arrange in crypto engine decryption obtain it is described with Secret key, records decryption using random key decryption is described, obtains the original voice data for encryption and completes to play, real The recording program is played back now.
The replayed section that the present embodiment is provided, which first determines whether whether the recording program of the playback is what the machine was recorded, It is not, in the case that itself records, to obtain random key to PMS systems, and record section by random key decryption is described Mesh, realizes and records the shared of program.The back method that the present embodiment is provided has broken the man-to-man pattern of traditional PVR programs, Realize the flexi mode of one-to-many;Also, break the restriction between each hardware platform, from the content that a platform is recorded It is put into another platform still to use, realizes the shared of PVR programs.Meanwhile, can be with during recording and playback Various protective measures are added to carry out enhancement mode protection to recorded content in front end(Increase timestamp control such as in META DATA Effective time limit processed etc.), secondary charge can also be carried out(The content such as recorded on STB1 is put into STB2 and watches up, and STB2 itself does not buy related-program bag)Etc., it is so more convenient and flexible for the management of front end changeable.
Example IV
A kind of network PVR guard methods are present embodiments provided, methods described also includes replayed section, as shown in figure 4, The replayed section is specifically included:
The connection of S401, Set Top Box and External memory equipment, and the recording program that External memory equipment is carried is shown and Set Top Box Menu on, and the selection operation of receive user;
S402, play instruction is generated according to the selection operation, the Set Top Box reads the recording that need to play back according to play instruction Corresponding metadata METADATA of program RECORD CONTENT;If reading failure, perform S413 and terminate to play and point out User;If read successfully, S403 is performed;
S403, Set Top Box read the chip number CHIP ID of the machine and are designated as CHIP ID2, by the CHIP ID2 and META CHIP ID1 in DATA are compared, if CHIP ID1 are equal with CHIP ID2, perform S404;Otherwise, perform S406;
RECORD KEY1 in META DATA are arranged and PVR KEY are decrypted in crypto engine by S404, Set Top Box STB1;
S405, Set Top Box STB1 decrypt RECORD CONTENT using PVR KEY, obtain original unencrypted audio, video data And complete to play;
The META DATA data and CHIP ID2 are sent to PMS by network by S406, Set Top Box STB2;
S407, the PMS searching databases are determining whether Set Top Box STB2 has playback right:If Set Top Box STB2 is allowed to Play, then perform S408;Otherwise, the PMS returns the authority that cannot be played back to STB2 by network and performs S410;
S408, the PMS obtain PVR to RECORD KEY1 decryption according to the corresponding first private cipher key SK1 of CHIP ID1 KEY, then obtains RECORD KEY2 to PVR KEY encryptions using the corresponding second private cipher key SK2 of CHIP ID2;
Playback right and RECORD KEY2 are returned to Set Top Box STB2 by network by S409, the PMS;
S410, the Set Top Box STB2 judge the returning result of the PMS:If allowing playback, S411 is performed, is otherwise performed S413;
S411, Set Top Box STB2 arrange RECORD KEY2 in crypto engine, decrypt PVR KEY;
S412, Set Top Box STB2 read recorded content RECORD CONTENT, and RECORD CONTENT are solved using PVR KEY It is close, obtain original unencrypted audio, video data and complete to play;
S413, stop playback.
Present invention also offers a kind of network PVR protection systems, as shown in figure 5, which includes:Set Top Box 100 with And PVR management systems PMS200;
The Set Top Box 100 includes:First sending module 101, the first deciphering module 102 and preserving module 103;
First sending module 101, for when record command is triggered, sending to PVR management systems PMS and obtaining the first record The solicited message of key processed, wherein, the solicited message carries the first identification information of first Set Top Box;
First deciphering module 102, for decrypting the first recording key to obtain the random key, and using described Random key is encrypted to the audio, video data after descrambling and obtains recording audio;
The preserving module 103, for the recording audio is preserved to External memory equipment, to realize that PVR is protected;
PVR management systems PMS200, for generating a random key according to the solicited message, and according to the described first mark Random key described in corresponding first private cipher key pair of knowledge information is encrypted to obtain the first recording key.
The network PVR protection systems, wherein, the Set Top Box also includes:Comparison module, the second sending module And second deciphering module;
The comparison module, for when play-back command is triggered, by the second identification information of its own and the recording section for playing back Corresponding first identification information of mesh is compared;
Second sending module, for when both differ, by second identification information, the first identification information and recording section The corresponding first recording key of mesh is sent to PMS;
Second deciphering module, for being decrypted to the second recording key to obtain the random key, and using described random Key is decrypted to the recording program, to realize playing back the recording program;
The PMS is additionally operable to record key generation according to second identification information, corresponding first identification information and first Second records key.
The network PVR protection systems, wherein, the Set Top Box also includes:
3rd deciphering module, for when both are identical, decrypting the first recording key to obtain the random key, and profit The recording program is decrypted with the random key, to realize playing back the recording program.
The modules of above-mentioned network PVR protection systems are described in detail in the above-mentioned methods, here No longer state one by one.
In embodiment provided by the present invention, it should be understood that disclosed system and method, can pass through other Mode is realized.For example, device embodiment described above is only schematic, and for example, the division of the module is only A kind of division of logic function, can have when actually realizing other dividing mode, such as multiple units or component can with reference to or Person is desirably integrated into another system, or some features can be ignored, or does not perform.Another, shown or discussed is mutual Between coupling or direct-coupling or communication connection can be INDIRECT COUPLING or communication link by some interfaces, device or unit Connect, can be electrical, mechanical or other forms.
The unit as separating component explanation can be or may not be it is physically separate, it is aobvious as unit The part for showing can be or may not be physical location, you can local to be located at one, or can also be distributed to multiple On NE.Some or all of unit therein can be selected according to the actual needs to realize the mesh of this embodiment scheme 's.
In addition, each functional unit in each embodiment of the invention can be integrated in a processing unit, it is also possible to It is that unit is individually physically present, it is also possible to which two or more units are integrated in a unit.Above-mentioned integrated list Unit both can be realized in the form of hardware, it would however also be possible to employ hardware adds the form of SFU software functional unit to realize.
The above-mentioned integrated unit realized in the form of SFU software functional unit, can be stored in an embodied on computer readable and deposit In storage media.Above-mentioned SFU software functional unit is stored in a storage medium, is used so that a computer including some instructions Equipment (can be personal computer, server, or network equipment etc.) or processor (processor) perform the present invention each The part steps of embodiment methods described.And aforesaid storage medium includes:USB flash disk, portable hard drive, read only memory (Read- Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disc or CD etc. it is various Can be with the medium of store program codes.
Finally it should be noted that:Above example only to illustrate technical scheme, rather than a limitation;Although With reference to the foregoing embodiments the present invention has been described in detail, it will be understood by those within the art that:Which still may be used To modify to the technical scheme described in foregoing embodiments, or equivalent is carried out to which part technical characteristic; And these modification or replace, do not make appropriate technical solution essence depart from various embodiments of the present invention technical scheme spirit and Scope.

Claims (10)

1. a kind of network PVR guard methods, it is characterised in which includes recording process, and the recording process is specifically wrapped Include:
When the record command of the first Set Top Box is triggered, first Set Top Box sends to PVR management systems PMS and obtains first The solicited message of key is recorded, wherein, the solicited message carries the first identification information of first Set Top Box;
The PMS receives the solicited message and generates a random key, then according to first identification information it is corresponding the Random key described in one private cipher key pair is encrypted to obtain the first recording key;
The first Set Top Box decryption described first records key to obtain the random key, and adopts the random key pair Audio, video data after descrambling is encrypted and obtains recording audio;And
The recording audio is preserved to External memory equipment, to realize PVR encrypting shootings.
2. network PVR guard methods according to claim 1, it is characterised in that the PMS receives the request letter A random key is ceased and generates, then the random key according to the first private cipher key pair corresponding to first identification information adds It is close also including after obtaining the first recording key:
First identification information and described first are recorded key bindings by first Set Top Box, and are stored in for storing Record the External memory equipment of program.
3. network PVR guard methods according to claim 1, it is characterised in that the PMS is according to the request letter Breath generate a random key, and according to the first private cipher key pair corresponding to first identification information random key encryption with Obtain the first recording key to specifically include:
Whether the PMS first Set Top Boxes according to first identification information-enquiry have is recorded authority;
When there is first Set Top Box recording right to prescribe a time limit, PMS generates a random key according to the solicited message, and according to institute State random key described in the first private cipher key pair corresponding to the first identification information to encrypt to obtain the first recording key.
4. according to the arbitrary network PVR guard methods of claim 1-3, it is characterised in that methods described also includes: PVR replayed sections, the PVR replayed sections are specifically included:
It is when the second Set Top Box receives play-back command, the second identification information of its own is corresponding with the recording program of playback First identification information is compared;
If differing, the second identification information, the first identification information and recording program corresponding first are recorded into key and is sent To PMS;
The PMS records key according to second identification information, the first identification information and first and generates the second recording key;
Second Set Top Box is decrypted to the described second recording key to obtain the random key, and using described random Key is decrypted to the recording program, to realize playing back the recording program.
5. network PVR guard methods according to claim 4, it is characterised in that the PVR replayed sections are also wrapped Include:
If identical, decrypt described first and key is recorded to obtain the random key;
The recording program is decrypted using the random key, to realize playing back the recording program.
6. network PVR guard methods according to claim 4, it is characterised in that the PMS is according to the described second mark Knowledge information, the first identification information and the first recording key generate the second recording key and specifically include:
The PMS first recording keys according to first identification information pair are decrypted and obtain random key;And
The random key according to the second private cipher key pair corresponding to second identification information is encrypted generation second and records Key.
7. network PVR guard methods according to claim 4, it is characterised in that the PMS is according to the described second mark Knowledge information, the first identification information and the first recording key include before generating the second recording key:
Whether the PMS second Set Top Boxes according to second identification information judgment have a playback right, and when described the There is two Set Top Boxes recording right to prescribe a time limit, and performs and generates the second recording key step.
8. a kind of network PVR protection systems, it is characterised in which includes:Set Top Box and PVR management systems PMS;
The Set Top Box includes:First sending module, the first deciphering module and preserving module;
First sending module, for when record command is triggered, sending to PVR management systems PMS and obtaining the first recording The solicited message of key, wherein, the solicited message carries the first identification information of the Set Top Box;
First deciphering module, for decrypting the first recording key to obtain the random key, and using it is described with Secret key is encrypted to the audio, video data after descrambling and obtains recording audio;
The preserving module, for the recording audio is preserved to External memory equipment, to realize that PVR is protected;
PVR management systems PMS, for receiving the solicited message and generating a random key, then according to described first Random key described in first private cipher key pair corresponding to identification information is encrypted to obtain the first recording key.
9. network PVR protection systems according to claim 8, it is characterised in that the Set Top Box also includes:Relatively Module, the second sending module and the second deciphering module;
The comparison module, for when play-back command is triggered, by the second identification information of its own and the recording section for playing back Corresponding first identification information of mesh is compared;
Second sending module, for when both differ, by second identification information, the first identification information and recording section The corresponding first recording key of mesh is sent to PMS;
Second deciphering module, for being decrypted to the second recording key to obtain the random key, and using described random Key is decrypted to the recording program, to realize playing back the recording program;
The PMS is additionally operable to record key generation according to second identification information, corresponding first identification information and first Second records key.
10. network PVR protection systems according to claim 8, it is characterised in that the Set Top Box also includes:
3rd deciphering module, for when both are identical, decrypting the first recording key to obtain the random key, and profit The recording program is decrypted with the random key, to realize playing back the recording program.
CN201610989564.1A 2016-11-10 2016-11-10 A kind of network-based PVR guard method and system Active CN106533668B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201610989564.1A CN106533668B (en) 2016-11-10 2016-11-10 A kind of network-based PVR guard method and system
PCT/CN2017/110334 WO2018086566A1 (en) 2016-11-10 2017-11-10 Pvr protection method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610989564.1A CN106533668B (en) 2016-11-10 2016-11-10 A kind of network-based PVR guard method and system

Publications (2)

Publication Number Publication Date
CN106533668A true CN106533668A (en) 2017-03-22
CN106533668B CN106533668B (en) 2019-09-10

Family

ID=58350920

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610989564.1A Active CN106533668B (en) 2016-11-10 2016-11-10 A kind of network-based PVR guard method and system

Country Status (2)

Country Link
CN (1) CN106533668B (en)
WO (1) WO2018086566A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107820128A (en) * 2017-11-10 2018-03-20 深圳创维-Rgb电子有限公司 USB recording functions method for customizing, device and computer-readable recording medium
WO2018086566A1 (en) * 2016-11-10 2018-05-17 深圳创维数字技术有限公司 Pvr protection method and system
CN113542877A (en) * 2021-07-13 2021-10-22 四川长虹网络科技有限责任公司 PVR resource sharing method, system, computer equipment and storage medium

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114389839B (en) * 2021-12-10 2023-12-08 国网浙江省电力有限公司宁波供电公司 PMS data transmission system and method based on 5G network module

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030235393A1 (en) * 2002-06-25 2003-12-25 International Business Machines Corporation Personal video recording with storage space requirement checking
CN102281468A (en) * 2011-08-09 2011-12-14 深圳市九洲电器有限公司 Method and device for recording and playing personal video record, and set-top box
CN103024475A (en) * 2012-12-21 2013-04-03 深圳市九洲电器有限公司 Method and system of recording and authorization playing of television programs
CN103974117A (en) * 2013-02-06 2014-08-06 中兴通讯股份有限公司 Sharing recording method, sharing recording device, sharing recording server and set-top boxes

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106533668B (en) * 2016-11-10 2019-09-10 深圳创维数字技术有限公司 A kind of network-based PVR guard method and system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030235393A1 (en) * 2002-06-25 2003-12-25 International Business Machines Corporation Personal video recording with storage space requirement checking
CN102281468A (en) * 2011-08-09 2011-12-14 深圳市九洲电器有限公司 Method and device for recording and playing personal video record, and set-top box
CN103024475A (en) * 2012-12-21 2013-04-03 深圳市九洲电器有限公司 Method and system of recording and authorization playing of television programs
CN103974117A (en) * 2013-02-06 2014-08-06 中兴通讯股份有限公司 Sharing recording method, sharing recording device, sharing recording server and set-top boxes

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018086566A1 (en) * 2016-11-10 2018-05-17 深圳创维数字技术有限公司 Pvr protection method and system
CN107820128A (en) * 2017-11-10 2018-03-20 深圳创维-Rgb电子有限公司 USB recording functions method for customizing, device and computer-readable recording medium
CN107820128B (en) * 2017-11-10 2019-12-27 深圳创维-Rgb电子有限公司 USB recording function customizing method and device and computer readable storage medium
US11132325B2 (en) 2017-11-10 2021-09-28 Shenzhen Skyworth-Rgb Electronic Co., Ltd. Method and device for customizing a USB recording function, and a computer readable storage medium
CN113542877A (en) * 2021-07-13 2021-10-22 四川长虹网络科技有限责任公司 PVR resource sharing method, system, computer equipment and storage medium

Also Published As

Publication number Publication date
CN106533668B (en) 2019-09-10
WO2018086566A1 (en) 2018-05-17

Similar Documents

Publication Publication Date Title
US11238165B2 (en) File encryption method, file decryption method, electronic device, and storage medium
CN1723501B (en) Method and system for protecting content and method for accessing protected contents
CN110324143A (en) Data transmission method, electronic equipment and storage medium
CN101271501B (en) Encryption and decryption method and device of digital media file
CN101535987B (en) Use of media storage structure with multiple pieces of content in a content-distribution system
CN103366132B (en) Equipment and method for encryption data
US8571209B2 (en) Recording keys in a broadcast-encryption-based system
CN106533668A (en) Network-based PVR protection method and system
CN103427983A (en) Apparatus and method for content encryption and decryption based on storage device ID
CN106067874B (en) It is a kind of by the method for data record to server end, terminal and server
JPWO2007007764A1 (en) License management apparatus and method
EP2553622B1 (en) Secure data recorder
CN105611318A (en) Method and system for video encryption playing
CN102368850A (en) Method for carrying out encryption and decryption on video file on mobile phone
US20080098217A1 (en) Method for efficient and secure data migration between data processing systems
CN100364002C (en) Apparatus and method for reading or writing user data
US20060018473A1 (en) Method for transmission/reception of contents usage right information in encrypted form, and device thereof
CN103237011B (en) Digital content encryption transmission method and server end
CN103077359A (en) Data decryption method, device and system
CN110300289A (en) Video security management system and method
CN101212633A (en) Digital audio/video data encryption and decryption method
CN110750326A (en) Disk encryption and decryption method and system for virtual machine
US8634555B2 (en) Information processing apparatus, information processing method, and program
JP2003216500A (en) Digital copyright managing system
JP5296195B2 (en) Content data reproduction system and recording apparatus

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant