CN106533668A - Network-based PVR protection method and system - Google Patents
Network-based PVR protection method and system Download PDFInfo
- Publication number
- CN106533668A CN106533668A CN201610989564.1A CN201610989564A CN106533668A CN 106533668 A CN106533668 A CN 106533668A CN 201610989564 A CN201610989564 A CN 201610989564A CN 106533668 A CN106533668 A CN 106533668A
- Authority
- CN
- China
- Prior art keywords
- key
- recording
- identification information
- top box
- set top
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 67
- 230000001960 triggered effect Effects 0.000 claims abstract description 13
- 230000008569 process Effects 0.000 claims description 15
- 230000027455 binding Effects 0.000 claims description 2
- 238000009739 binding Methods 0.000 claims description 2
- 101000622430 Homo sapiens Vang-like protein 2 Proteins 0.000 description 11
- 102100023520 Vang-like protein 2 Human genes 0.000 description 11
- 101000622427 Homo sapiens Vang-like protein 1 Proteins 0.000 description 10
- 102100023517 Vang-like protein 1 Human genes 0.000 description 10
- 238000005516 engineering process Methods 0.000 description 5
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 238000004891 communication Methods 0.000 description 2
- 230000008878 coupling Effects 0.000 description 2
- 235000012364 Peperomia pellucida Nutrition 0.000 description 1
- 240000007711 Peperomia pellucida Species 0.000 description 1
- 230000009471 action Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000001149 cognitive effect Effects 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 238000000151 deposition Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000002349 favourable effect Effects 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000002085 persistent effect Effects 0.000 description 1
- 230000001681 protective effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/41—Structure of client; Structure of client peripherals
- H04N21/4104—Peripherals receiving signals from specially adapted client devices
- H04N21/4108—Peripherals receiving signals from specially adapted client devices characterised by an identification number or address, e.g. local network address
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/41—Structure of client; Structure of client peripherals
- H04N21/4104—Peripherals receiving signals from specially adapted client devices
- H04N21/4135—Peripherals receiving signals from specially adapted client devices external recorder
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/41—Structure of client; Structure of client peripherals
- H04N21/414—Specialised client platforms, e.g. receiver in car or embedded in a mobile appliance
- H04N21/4147—PVR [Personal Video Recorder]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/41—Structure of client; Structure of client peripherals
- H04N21/426—Internal components of the client ; Characteristics thereof
- H04N21/42684—Client identification by a unique number or address, e.g. serial number, MAC address, socket ID
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/433—Content storage operation, e.g. storage operation in response to a pause request, caching operations
- H04N21/4334—Recording operations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/44—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
- H04N21/4405—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/44—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
- H04N21/4408—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream encryption, e.g. re-encrypting a decrypted video stream for redistribution in a home network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N5/00—Details of television systems
- H04N5/76—Television signal recording
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Multimedia (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Power Engineering (AREA)
- Storage Device Security (AREA)
- Signal Processing For Digital Recording And Reproducing (AREA)
Abstract
The invention discloses a network-based PVR protection method and system, the method comprising: when the recording instruction of a first set-top box is triggered, the first set-top box sends request information for obtaining a first recording key to a PVR management system (PMS), the PMS generates a random key of an encrypted program based on the request information, encrypts the random key and sends the encrypted random key to the first set-top box so that the set-top box uses the random key to record programs. In the present invention, a random key for recording programs is generated by the PMS and is acquired by the PMS at the time of playback and the program is decrypted by the random key so that other set-top boxes, other than the set-top box recording the program, can also play back the recorded programs, thereby enabling the sharing of recorded programs.
Description
Technical field
The present invention relates to set-top box technique field, more particularly to a kind of network PVR guard methods and system.
Background technology
Top box of digital machine becomes people and understands the world, cognitive things, joy in daily life throughout vast family
The important platforms such as happy consumption.As the technology and business of top box of digital machine are continually developed and renewal, PVR (Personal
Video Recorder, individual video video recording) technology has been applied successfully on Set Top Box, using the core technology (number of PVR
Word process and memory technology), program is flexibly recorded and played back, and digitized excellent confused journey is brought with interaction
Follow one's bent.
In order to ensure program copyright, the PVR programs to being stored in Set Top Box hard disk generally need encryption.CA in the market
Typically using the hardware encryption method based on chip-scale, which is specially for producer:Using privately owned in master chip in recording process
Key SK (Session Key) obtains random secret key PVR KEY after computing, then using the PVR KEY to audio frequency and video number
According to being encrypted;Then computing is carried out using the private cipher key SK in the master chip in playback obtain PVR KEY, and it is close using this
Key decrypts audio, video data.But, the encryption method is the protection based on privately owned link on hardware, and other other Set Top Boxes cannot
Recover the PVR KEY of the Set Top Box so that record and playback is limited to use on same Set Top Box, data cannot be by
The Set Top Box of other CA manufacturers accreditations is shared.
Thus prior art could be improved and improve.
The content of the invention
The technical problem to be solved in the present invention is, for the deficiencies in the prior art, there is provided a kind of network PVR is protected
Maintaining method and system, are only capable of in the Set Top Box last time for recording the data with solving the data recorded using existing encryption method
Put so that the problem that the data of recording cannot be shared by other machine tops.
In order to solve above-mentioned technical problem, the technical solution adopted in the present invention is as follows:
A kind of network PVR guard methods, which includes recording process, and the recording process is specifically included:
When the record command of the first Set Top Box is triggered, first Set Top Box sends to PVR management systems PMS and obtains first
The solicited message of key is recorded, wherein, the solicited message carries the first identification information of first Set Top Box;
The PMS receives the solicited message and generates a random key, then according to first identification information it is corresponding the
Random key described in one private cipher key pair is encrypted to obtain the first recording key;
The first Set Top Box decryption described first records key to obtain the random key, and adopts the random key pair
Audio, video data after descrambling is encrypted and obtains recording audio;And
The recording audio is preserved to External memory equipment, to realize PVR encrypting shootings.
The network PVR guard methods, wherein, the PMS receives the solicited message and generates one with secret
Key, then according to the first private cipher key pair corresponding to first identification information, random key is encrypted to obtain the first recording
Also include after key:
First identification information and described first are recorded key bindings by first Set Top Box, and are stored in for storing
Record the External memory equipment of program.
The network PVR guard methods, wherein, the PMS generates a random key according to the solicited message,
And random key is encrypted to obtain the first recording key according to the first private cipher key pair corresponding to first identification information
Specifically include:
Whether the PMS first Set Top Boxes according to first identification information-enquiry have is recorded authority;
When there is first Set Top Box recording right to prescribe a time limit, PMS generates a random key according to the solicited message, and according to institute
State random key described in the first private cipher key pair corresponding to the first identification information to encrypt to obtain the first recording key.
The network PVR guard methods, methods described also include:PVR replayed sections, the PVR replayed sections
Specifically include:
It is when the second Set Top Box receives play-back command, the second identification information of its own is corresponding with the recording program of playback
First identification information is compared;
If differing, the second identification information, the first identification information and recording program corresponding first are recorded into key and is sent
To PMS;
The PMS records key according to second identification information, the first identification information and first and generates the second recording key;
Second Set Top Box is decrypted to the described second recording key to obtain the random key, and using described random
Key is decrypted to the recording program, to realize playing back the recording program.
The network PVR guard methods, wherein, the PVR replayed sections also include:
If identical, decrypt described first and key is recorded to obtain the random key;
The recording program is decrypted using the random key, to realize playing back the recording program.
The network PVR guard methods, wherein, the PMS is according to second identification information, the first mark letter
Breath and the first recording key generate the second recording key and specifically include:
The PMS first recording keys according to first identification information pair are decrypted and obtain random key;And
The random key according to the second private cipher key pair corresponding to second identification information is encrypted generation second and records
Key.
The network PVR guard methods, wherein, the PMS is according to second identification information, the first mark letter
Breath and the first recording key include before generating the second recording key:
Whether the PMS second Set Top Boxes according to second identification information judgment have a playback right, and when described the
There is two Set Top Boxes recording right to prescribe a time limit, and performs and generates the second recording key step.
A kind of network PVR protection systems, which includes:Set Top Box and PVR management systems PMS;
The Set Top Box includes:First sending module, the first deciphering module and preserving module;
First sending module, for when record command is triggered, sending to PVR management systems PMS and obtaining the first recording
The solicited message of key, wherein, the solicited message carries the first identification information of the Set Top Box;
First deciphering module, for decrypting the first recording key to obtain the random key, and using it is described with
Secret key is encrypted to the audio, video data after descrambling and obtains recording audio;
The preserving module, for the recording audio is preserved to External memory equipment, to realize that PVR is protected;
PVR management systems PMS, for receiving the solicited message and generating a random key, then according to described first
Random key described in first private cipher key pair corresponding to identification information is encrypted to obtain the first recording key.
The network PVR protection systems, wherein, the Set Top Box also includes:Comparison module, the second sending module
And second deciphering module;
The comparison module, for when play-back command is triggered, by the second identification information of its own and the recording section for playing back
Corresponding first identification information of mesh is compared;
Second sending module, for when both differ, by second identification information, the first identification information and recording section
The corresponding first recording key of mesh is sent to PMS;
Second deciphering module, for being decrypted to the second recording key to obtain the random key, and using described random
Key is decrypted to the recording program, to realize playing back the recording program;
The PMS is additionally operable to record key generation according to second identification information, corresponding first identification information and first
Second records key.
The network PVR protection systems, wherein, the Set Top Box also includes:
3rd deciphering module, for when both are identical, decrypting the first recording key to obtain the random key, and profit
The recording program is decrypted with the random key, to realize playing back the recording program.
Beneficial effect:Compared with prior art, the invention provides a kind of network PVR guard methods and system,
Methods described includes:When the record command of the first Set Top Box is triggered, first Set Top Box is sent out to PVR management systems PMS
Send and obtain the first solicited message for recording key, the PMS generates the random of the program for encryption according to the solicited message
Key simultaneously will be sent to the first Set Top Box after random key encryption, so that Set Top Box is recorded using the random key
Program processed.In the present invention, generated for the random key to recording program by PMS, and in playback by described
PMS obtains the random key, and decrypts the program by the random key so that from the Set Top Box for recording program its
His Set Top Box can also play back the recording program, realize and record the shared of program.
Description of the drawings
The flow chart of the network PVR guard methods embodiment one that Fig. 1 is provided for the present invention.
The flow chart of the network PVR guard methods embodiment two that Fig. 2 is provided for the present invention.
The flow chart of the network PVR guard methods embodiment three that Fig. 3 is provided for the present invention.
The flow chart of the network PVR guard methods example IV that Fig. 4 is provided for the present invention.
The structure principle chart of the network PVR protection systems that Fig. 5 is provided for the present invention.
The structure principle chart of Set Top Box in the network PVR protection systems that Fig. 6 is provided for the present invention.
Specific embodiment
The present invention provides a kind of network PVR guard methods and system, for make the purpose of the present invention, technical scheme and
Effect is clearer, clear and definite, and the present invention is described in more detail for the embodiment that develops simultaneously referring to the drawings.It should be appreciated that herein
Described specific embodiment only to explain the present invention, is not intended to limit the present invention.
In the present invention, using the suffix for representing such as " module ", " part " or " unit " of element only for favourable
In the explanation of the present invention, itself does not have specific meaning.Therefore, module ", " part " or " unit " mixedly can make
With.
Terminal unit can be implemented in a variety of manners.For example, the terminal described in the present invention can include such as moving
Phone, smart phone, notebook computer, digit broadcasting receiver, PDA (personal digital assistant), PAD (panel computer), PMP
The mobile terminal of (portable media player), guider etc. and such as numeral TV, desk computer etc. are consolidated
Determine terminal.However, it will be understood by those skilled in the art that, in addition to being used in particular for moving the element of purpose, according to this
The construction of bright embodiment can also apply to the terminal of fixed type.
Below in conjunction with the accompanying drawings, by the description to embodiment, the content of the invention is described further.
Embodiment one
A kind of network PVR guard methods are present embodiments provided, methods described includes recording process, as shown in figure 1, institute
State recording process to specifically include
S101, when the record command of the first Set Top Box is triggered, first Set Top Box to PVR management systems PMS send obtain
The solicited message of the first recording key is taken, wherein, the solicited message carries the first identification information of first Set Top Box;
S102, the PMS receive the solicited message and generate a random key, then according to first identification information correspondence
The first private cipher key pair described in random key encryption obtaining the first recording key;
S103, first Set Top Box decryption described first record key to obtain the random key, and using described random
Key is encrypted to the audio, video data after descrambling and obtains recording audio;And
S104, the recording audio is preserved to External memory equipment, to realize PVR encrypting shootings.
In the present embodiment, the Set Top Box sends the first identification information of its own to PMS systems, the PMS systems
A random key is generated for first identification information, and using AES corresponding to first identification information and the
Random key described in one private cipher key pair is encrypted to generate the first recording key, and the Set Top Box decryption described first is recorded
Key obtains the random key, and carries out recording program using the random key.So by PMS systems to recording key
It is managed, solves PVR programs intelligence playback on same Set Top Box that existing method for recording is obtained, it is impossible on other machine tops
The problem played back on box.
Specifically, in step S101, it can be user that the record command of first Set Top Box is triggered
The control produced by the control operation that the control devices such as the control panel or remote control of Set Top Box are carried out to Set Top Box is referred to
Order, the control instruction are record command.PVR management systems PMS can be arranged in CA front ends, and the PMS can be obtained
The relevant information of the Set Top Box of CA front ends certification is obtained, e.g., the identification information of Set Top Box(For example, chip number CHIP
ID), private cipher key, encryption method and recording authority etc..In the present embodiment, institute's identification information is CHIP ID.Answer actual
With in, the PMS systems can pre-build a data base, and the data base is used for chip number CHIP for storing Set Top Box
ID, private cipher key, encryption method and recording authority etc..Also, the chip number CHIP ID, private cipher key, encryption method
And record the interrelated storage of authority.That is, according to the CHIP ID of Set Top Box, the PMS systems can determine which is right
Private cipher key, encryption method and recording authority for answering etc..
First Set Top Box to PVR management systems PMS send obtain first record key solicited message its specifically may be used
The Internet is passed through with first Set Top Box and the solicited message for carrying its own CHIP ID is sent to the PMS systems, so that
Must by the solicited message obtain for record program first recording key.
In step S102, the random key is that PMS systems are generated at random, and which can be a character string,
Such as ab12 etc..After random key is generated, further according to random described in the first private cipher key pair corresponding to first identification information
Key is encrypted and obtains the first recording key.In actual applications, as not every Set Top Box all has recording program
Authority, and its have record authority when need not for its generation random key and perform subsequent step.So as to,
One can also be included before step S102 and inquire about whether first Set Top Box has the process for recording authority, which is concrete
Can include:
The PMS receives the solicited message, and obtains the first identification information that the solicited message is carried;
Inquire about whether Set Top Box corresponding to first identification information has recording authority in presetting database;
If first Set Top Box has records authority, step S102 is performed;
If first Set Top Box does not have records authority, first Set Top Box is fed back by the inquiry knot by network
Really, i.e., described first Set Top Box does not have recording authority.
In the present embodiment, the PMS receives the solicited message and generates a random key, then according to described first
Random key encryption described in first private cipher key pair corresponding to identification information is specifically included with obtaining the first recording key:
S1021, the PMS receive and parse through the solicited message, to obtain first identification information;
S1022, its corresponding private cipher key and encryption method are searched in presetting database according to first identification information;
S1023, at random one random key of generation, and utilize the private cipher key and encryption method to add the random key
It is close to obtain the first recording key;
Described first recording key is fed back to the first Set Top Box by S1024, the PMS.
In the present embodiment, first identification information is CHIP ID1, and first private cipher key is set top box main chip
In private cipher key.Namely PMS using the private cipher key SK (Session Key) in the set top box main chip to secret
Key is encrypted and obtains the first recording key, so when the first Set Top Box receives the first recording key, can be according to which certainly
Described in the private cipher key pair that body master chip is carried, the first recording key is decrypted, to obtain the random key.It is, this
Embodiment is by set top box main chip generation random key and complete in PMS systems to the process which is encrypted using private cipher key pair
Into, such PMS systems can preserve the random key, when there is Set Top Box to play back the first Set Top Box recorded program,
The random key can be obtained by PMS systems, the first Set Top Box recorded program is decrypted using the random key, be realized
PVR programs it is shared.
In step S103, the first Set Top Box decryption described first records key to obtain the random key
Refer to the first recording key that first Set Top Box receives PMS feedbacks, and record key by described first arrange encryption
Decryption in engine obtains the random key.Meanwhile, first identification information and first are recorded into the metadata such as password
META DATA information is preserved to External memory equipment(Such as, USB flash disk, portable hard drive etc.)On, the External memory equipment is for depositing
Store up the External memory equipment of the first Set Top Box recorded program.That is, working as has Set Top Box to obtain from the External memory equipment
When taking the first Set Top Box recorded program, the META DATA information of first Set Top Box can be obtained, so can be according to institute
State META DATA and obtain random key.
In step S104, the recording audio for obtaining is written to External memory equipment with shape by first Set Top Box
Into the program played with the first Set Top Box relative to PVR files, lay equal stress on be added with close recording process until record terminate.The record
System terminates be that Pgmtime terminates(Digital TV terminal judges to know section by the EPG information of the digital TV channel
Purpose time started and persistent period), complete the recording to program need to be recorded;Can also be that user cancels recording;Can also be
Make a mistake end, and e.g., storage device is full etc..
Embodiment two
A kind of network PVR guard methods are present embodiments provided, methods described includes recording process, as shown in Fig. 2 institute
State recording process to specifically include:
S201, Set Top Box STB1 record commands are triggered, and the CHIP ID1 information of the machine is sent to PVR management by the Internet
System PMS;
S202, the PMS inquire about the recording authority of Set Top Box STB1 by database retrieval;If Set Top Box STB1 is allowed to
Record, then perform S203;If Set Top Box STB1 is not allowed to record, PMS returns the authority that cannot be recorded by network, and
Perform S205;
S203, the PMS generate a random key PVR KEY, and using the corresponding private cipher key SK1 of CHIP ID1 to described
PVR KEY encryptions obtain recording key RECORD KEY1;
S204, the PMS will record authority by network and RECORD KEY1 return to Set Top Box STB1;
S205, Set Top Box STB1 check the result that PMS is returned, if allowing to record, perform S206;S209 is performed otherwise;
The RECORD KEY1 that PMS is returned by S206, Set Top Box STB1 arrange in crypto engine decryption and obtain PVR KEY, and will
The metadata META DATA information being made up of CHIP ID1 and/RECORD KEY1 is saved on External memory equipment;
S207, Set Top Box STB1 the audio, video data after descrambling is encrypted using PVR KEY after data RECORD
CONTENT, and RECORD CONTENT are saved on External memory equipment;
S208, repeat step S207 are recorded or other mistake generations until user cancels, and terminate to record;
S209, end are recorded.
The recording process that this enforcement is provided is the recording process of master chip and PMS systems based on Set Top Box, and institute
State AES and its private cipher key SK that PMS preserves the master chip.When Set Top Box is operated to PMS request PVR,
PMS transmits chip number CHIP ID1 according to the first Set Top Box and finds its corresponding private cipher key, described so as to generating and returning
PVR KEY after the corresponding encryptions of CHIP ID1, then Set Top Box just can utilize chip inside private cipher key SK decrypt
The PVR KEY, and then complete recording action.So described PVR KEY are stored in the first Set Top Box and PMS simultaneously, are returned
The Set Top Box for putting the first Set Top Box recorded program can itself be preserved the PVR KEY, or obtained by PMS
The PVR KEY are taken, is realized on the basis of the safety for ensureing to record program and is recorded the shared of program.
Embodiment three
A kind of network PVR guard methods are present embodiments provided, methods described also includes replayed section, as shown in figure 3,
The replayed section is specifically included:
S301, when the second Set Top Box receives play-back command, by the second identification information of its own with playback recording program
Corresponding first identification information is compared.
Specifically, second Set Top Box receives play-back command and refers to second Set Top Box and External memory equipment
Be connected, and the recording interface in the External memory equipment be shown in the menu of Set Top Box, according to the selection of user and
Produce play-back command.
It is described when the second Set Top Box receives play-back command, by the second identification information of its own with playback recording section
Corresponding first identification information of mesh is compared and can specifically include:
S3011, when the second Set Top Box connect External memory equipment when, by the External memory equipment carry recorded content show
In menu;
The selection operation of S3012, receive user, and play-back command is produced according to the selection operation;
S3123, its corresponding recording program is obtained according to the play-back command, and obtain it is described record program to metadata
Information;
S3014, the first identification information read in the metadata information, and by first identification information and its own the
Two identification informations are compared.
If S302, differing, by the second identification information, the first identification information and record program corresponding first and record
Key is sent to PMS.
Specifically, second identification information for differing finger is differed with the first identification information, illustrates that described recording is saved
Mesh is not that second Set Top Box the machine is recorded.Now random key can be obtained by PMS.It is, by described by the second mark
The corresponding first recording key of knowledge information, the first identification information and recording program is sent to PMS, so that PMS is according to described
Second identification information, the first identification information and the first recording key are determined for the second Set Top Box decryption recording program
Second records key.
Further, when the second identification information is identical with the first identification information, the recording program is second Set Top Box the machine
Record, then just decrypt described first and record key to obtain the random key;Using the random key to the record
Program processed is decrypted, to realize playing back the recording program.In actual applications, key can be recorded by described first to arrange
Random key is decrypted in crypto engine.
S303, the PMS record key according to second identification information, the first identification information and first and generate second
Record key.
Specifically, after the PMS receives the second identification information, first determine whether second identification information it is corresponding second
Whether Set Top Box has playback right, only there is recording right to prescribe a time limit in the second Set Top Box, just generates second and records key.From
And, specifically include in step S303:
Whether S3031, the PMS the second Set Top Box according to second identification information judgment has playback right.
Specifically, PMS searches its corresponding second Set Top Box in presetting database according to second identification information
Playback right.
S3032, when second Set Top Box has playback right, the PMS is according to the first identification information pair institute
State the first recording key and be decrypted and obtain random key.
Specifically, the PMS determines its corresponding first private cipher key according to first identification information, using described
One private cipher key pair the first recording key is decrypted and obtains random key.
S3033, the random key according to the second private cipher key pair corresponding to second identification information are encrypted life
Key is recorded into second.
Specifically, the PMS determines the second private cipher key for obtaining the second Set Top Box according to the second identification information, using institute
Random key described in stating the second private cipher key pair is encrypted generation second and records key, and records key feedback by described second
To the second Set Top Box.
S304, second Set Top Box are decrypted to obtain the random key, and profit to the described second recording key
The recording program is decrypted with the random key, to realize playing back the recording program.
Specifically, second Set Top Box by the described second recording key arrange in crypto engine decryption obtain it is described with
Secret key, records decryption using random key decryption is described, obtains the original voice data for encryption and completes to play, real
The recording program is played back now.
The replayed section that the present embodiment is provided, which first determines whether whether the recording program of the playback is what the machine was recorded,
It is not, in the case that itself records, to obtain random key to PMS systems, and record section by random key decryption is described
Mesh, realizes and records the shared of program.The back method that the present embodiment is provided has broken the man-to-man pattern of traditional PVR programs,
Realize the flexi mode of one-to-many;Also, break the restriction between each hardware platform, from the content that a platform is recorded
It is put into another platform still to use, realizes the shared of PVR programs.Meanwhile, can be with during recording and playback
Various protective measures are added to carry out enhancement mode protection to recorded content in front end(Increase timestamp control such as in META DATA
Effective time limit processed etc.), secondary charge can also be carried out(The content such as recorded on STB1 is put into STB2 and watches up, and
STB2 itself does not buy related-program bag)Etc., it is so more convenient and flexible for the management of front end changeable.
Example IV
A kind of network PVR guard methods are present embodiments provided, methods described also includes replayed section, as shown in figure 4,
The replayed section is specifically included:
The connection of S401, Set Top Box and External memory equipment, and the recording program that External memory equipment is carried is shown and Set Top Box
Menu on, and the selection operation of receive user;
S402, play instruction is generated according to the selection operation, the Set Top Box reads the recording that need to play back according to play instruction
Corresponding metadata METADATA of program RECORD CONTENT;If reading failure, perform S413 and terminate to play and point out
User;If read successfully, S403 is performed;
S403, Set Top Box read the chip number CHIP ID of the machine and are designated as CHIP ID2, by the CHIP ID2 and META
CHIP ID1 in DATA are compared, if CHIP ID1 are equal with CHIP ID2, perform S404;Otherwise, perform S406;
RECORD KEY1 in META DATA are arranged and PVR KEY are decrypted in crypto engine by S404, Set Top Box STB1;
S405, Set Top Box STB1 decrypt RECORD CONTENT using PVR KEY, obtain original unencrypted audio, video data
And complete to play;
The META DATA data and CHIP ID2 are sent to PMS by network by S406, Set Top Box STB2;
S407, the PMS searching databases are determining whether Set Top Box STB2 has playback right:If Set Top Box STB2 is allowed to
Play, then perform S408;Otherwise, the PMS returns the authority that cannot be played back to STB2 by network and performs S410;
S408, the PMS obtain PVR to RECORD KEY1 decryption according to the corresponding first private cipher key SK1 of CHIP ID1
KEY, then obtains RECORD KEY2 to PVR KEY encryptions using the corresponding second private cipher key SK2 of CHIP ID2;
Playback right and RECORD KEY2 are returned to Set Top Box STB2 by network by S409, the PMS;
S410, the Set Top Box STB2 judge the returning result of the PMS:If allowing playback, S411 is performed, is otherwise performed
S413;
S411, Set Top Box STB2 arrange RECORD KEY2 in crypto engine, decrypt PVR KEY;
S412, Set Top Box STB2 read recorded content RECORD CONTENT, and RECORD CONTENT are solved using PVR KEY
It is close, obtain original unencrypted audio, video data and complete to play;
S413, stop playback.
Present invention also offers a kind of network PVR protection systems, as shown in figure 5, which includes:Set Top Box 100 with
And PVR management systems PMS200;
The Set Top Box 100 includes:First sending module 101, the first deciphering module 102 and preserving module 103;
First sending module 101, for when record command is triggered, sending to PVR management systems PMS and obtaining the first record
The solicited message of key processed, wherein, the solicited message carries the first identification information of first Set Top Box;
First deciphering module 102, for decrypting the first recording key to obtain the random key, and using described
Random key is encrypted to the audio, video data after descrambling and obtains recording audio;
The preserving module 103, for the recording audio is preserved to External memory equipment, to realize that PVR is protected;
PVR management systems PMS200, for generating a random key according to the solicited message, and according to the described first mark
Random key described in corresponding first private cipher key pair of knowledge information is encrypted to obtain the first recording key.
The network PVR protection systems, wherein, the Set Top Box also includes:Comparison module, the second sending module
And second deciphering module;
The comparison module, for when play-back command is triggered, by the second identification information of its own and the recording section for playing back
Corresponding first identification information of mesh is compared;
Second sending module, for when both differ, by second identification information, the first identification information and recording section
The corresponding first recording key of mesh is sent to PMS;
Second deciphering module, for being decrypted to the second recording key to obtain the random key, and using described random
Key is decrypted to the recording program, to realize playing back the recording program;
The PMS is additionally operable to record key generation according to second identification information, corresponding first identification information and first
Second records key.
The network PVR protection systems, wherein, the Set Top Box also includes:
3rd deciphering module, for when both are identical, decrypting the first recording key to obtain the random key, and profit
The recording program is decrypted with the random key, to realize playing back the recording program.
The modules of above-mentioned network PVR protection systems are described in detail in the above-mentioned methods, here
No longer state one by one.
In embodiment provided by the present invention, it should be understood that disclosed system and method, can pass through other
Mode is realized.For example, device embodiment described above is only schematic, and for example, the division of the module is only
A kind of division of logic function, can have when actually realizing other dividing mode, such as multiple units or component can with reference to or
Person is desirably integrated into another system, or some features can be ignored, or does not perform.Another, shown or discussed is mutual
Between coupling or direct-coupling or communication connection can be INDIRECT COUPLING or communication link by some interfaces, device or unit
Connect, can be electrical, mechanical or other forms.
The unit as separating component explanation can be or may not be it is physically separate, it is aobvious as unit
The part for showing can be or may not be physical location, you can local to be located at one, or can also be distributed to multiple
On NE.Some or all of unit therein can be selected according to the actual needs to realize the mesh of this embodiment scheme
's.
In addition, each functional unit in each embodiment of the invention can be integrated in a processing unit, it is also possible to
It is that unit is individually physically present, it is also possible to which two or more units are integrated in a unit.Above-mentioned integrated list
Unit both can be realized in the form of hardware, it would however also be possible to employ hardware adds the form of SFU software functional unit to realize.
The above-mentioned integrated unit realized in the form of SFU software functional unit, can be stored in an embodied on computer readable and deposit
In storage media.Above-mentioned SFU software functional unit is stored in a storage medium, is used so that a computer including some instructions
Equipment (can be personal computer, server, or network equipment etc.) or processor (processor) perform the present invention each
The part steps of embodiment methods described.And aforesaid storage medium includes:USB flash disk, portable hard drive, read only memory (Read-
Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disc or CD etc. it is various
Can be with the medium of store program codes.
Finally it should be noted that:Above example only to illustrate technical scheme, rather than a limitation;Although
With reference to the foregoing embodiments the present invention has been described in detail, it will be understood by those within the art that:Which still may be used
To modify to the technical scheme described in foregoing embodiments, or equivalent is carried out to which part technical characteristic;
And these modification or replace, do not make appropriate technical solution essence depart from various embodiments of the present invention technical scheme spirit and
Scope.
Claims (10)
1. a kind of network PVR guard methods, it is characterised in which includes recording process, and the recording process is specifically wrapped
Include:
When the record command of the first Set Top Box is triggered, first Set Top Box sends to PVR management systems PMS and obtains first
The solicited message of key is recorded, wherein, the solicited message carries the first identification information of first Set Top Box;
The PMS receives the solicited message and generates a random key, then according to first identification information it is corresponding the
Random key described in one private cipher key pair is encrypted to obtain the first recording key;
The first Set Top Box decryption described first records key to obtain the random key, and adopts the random key pair
Audio, video data after descrambling is encrypted and obtains recording audio;And
The recording audio is preserved to External memory equipment, to realize PVR encrypting shootings.
2. network PVR guard methods according to claim 1, it is characterised in that the PMS receives the request letter
A random key is ceased and generates, then the random key according to the first private cipher key pair corresponding to first identification information adds
It is close also including after obtaining the first recording key:
First identification information and described first are recorded key bindings by first Set Top Box, and are stored in for storing
Record the External memory equipment of program.
3. network PVR guard methods according to claim 1, it is characterised in that the PMS is according to the request letter
Breath generate a random key, and according to the first private cipher key pair corresponding to first identification information random key encryption with
Obtain the first recording key to specifically include:
Whether the PMS first Set Top Boxes according to first identification information-enquiry have is recorded authority;
When there is first Set Top Box recording right to prescribe a time limit, PMS generates a random key according to the solicited message, and according to institute
State random key described in the first private cipher key pair corresponding to the first identification information to encrypt to obtain the first recording key.
4. according to the arbitrary network PVR guard methods of claim 1-3, it is characterised in that methods described also includes:
PVR replayed sections, the PVR replayed sections are specifically included:
It is when the second Set Top Box receives play-back command, the second identification information of its own is corresponding with the recording program of playback
First identification information is compared;
If differing, the second identification information, the first identification information and recording program corresponding first are recorded into key and is sent
To PMS;
The PMS records key according to second identification information, the first identification information and first and generates the second recording key;
Second Set Top Box is decrypted to the described second recording key to obtain the random key, and using described random
Key is decrypted to the recording program, to realize playing back the recording program.
5. network PVR guard methods according to claim 4, it is characterised in that the PVR replayed sections are also wrapped
Include:
If identical, decrypt described first and key is recorded to obtain the random key;
The recording program is decrypted using the random key, to realize playing back the recording program.
6. network PVR guard methods according to claim 4, it is characterised in that the PMS is according to the described second mark
Knowledge information, the first identification information and the first recording key generate the second recording key and specifically include:
The PMS first recording keys according to first identification information pair are decrypted and obtain random key;And
The random key according to the second private cipher key pair corresponding to second identification information is encrypted generation second and records
Key.
7. network PVR guard methods according to claim 4, it is characterised in that the PMS is according to the described second mark
Knowledge information, the first identification information and the first recording key include before generating the second recording key:
Whether the PMS second Set Top Boxes according to second identification information judgment have a playback right, and when described the
There is two Set Top Boxes recording right to prescribe a time limit, and performs and generates the second recording key step.
8. a kind of network PVR protection systems, it is characterised in which includes:Set Top Box and PVR management systems PMS;
The Set Top Box includes:First sending module, the first deciphering module and preserving module;
First sending module, for when record command is triggered, sending to PVR management systems PMS and obtaining the first recording
The solicited message of key, wherein, the solicited message carries the first identification information of the Set Top Box;
First deciphering module, for decrypting the first recording key to obtain the random key, and using it is described with
Secret key is encrypted to the audio, video data after descrambling and obtains recording audio;
The preserving module, for the recording audio is preserved to External memory equipment, to realize that PVR is protected;
PVR management systems PMS, for receiving the solicited message and generating a random key, then according to described first
Random key described in first private cipher key pair corresponding to identification information is encrypted to obtain the first recording key.
9. network PVR protection systems according to claim 8, it is characterised in that the Set Top Box also includes:Relatively
Module, the second sending module and the second deciphering module;
The comparison module, for when play-back command is triggered, by the second identification information of its own and the recording section for playing back
Corresponding first identification information of mesh is compared;
Second sending module, for when both differ, by second identification information, the first identification information and recording section
The corresponding first recording key of mesh is sent to PMS;
Second deciphering module, for being decrypted to the second recording key to obtain the random key, and using described random
Key is decrypted to the recording program, to realize playing back the recording program;
The PMS is additionally operable to record key generation according to second identification information, corresponding first identification information and first
Second records key.
10. network PVR protection systems according to claim 8, it is characterised in that the Set Top Box also includes:
3rd deciphering module, for when both are identical, decrypting the first recording key to obtain the random key, and profit
The recording program is decrypted with the random key, to realize playing back the recording program.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610989564.1A CN106533668B (en) | 2016-11-10 | 2016-11-10 | A kind of network-based PVR guard method and system |
PCT/CN2017/110334 WO2018086566A1 (en) | 2016-11-10 | 2017-11-10 | Pvr protection method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610989564.1A CN106533668B (en) | 2016-11-10 | 2016-11-10 | A kind of network-based PVR guard method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106533668A true CN106533668A (en) | 2017-03-22 |
CN106533668B CN106533668B (en) | 2019-09-10 |
Family
ID=58350920
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610989564.1A Active CN106533668B (en) | 2016-11-10 | 2016-11-10 | A kind of network-based PVR guard method and system |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN106533668B (en) |
WO (1) | WO2018086566A1 (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107820128A (en) * | 2017-11-10 | 2018-03-20 | 深圳创维-Rgb电子有限公司 | USB recording functions method for customizing, device and computer-readable recording medium |
WO2018086566A1 (en) * | 2016-11-10 | 2018-05-17 | 深圳创维数字技术有限公司 | Pvr protection method and system |
CN113542877A (en) * | 2021-07-13 | 2021-10-22 | 四川长虹网络科技有限责任公司 | PVR resource sharing method, system, computer equipment and storage medium |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114389839B (en) * | 2021-12-10 | 2023-12-08 | 国网浙江省电力有限公司宁波供电公司 | PMS data transmission system and method based on 5G network module |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030235393A1 (en) * | 2002-06-25 | 2003-12-25 | International Business Machines Corporation | Personal video recording with storage space requirement checking |
CN102281468A (en) * | 2011-08-09 | 2011-12-14 | 深圳市九洲电器有限公司 | Method and device for recording and playing personal video record, and set-top box |
CN103024475A (en) * | 2012-12-21 | 2013-04-03 | 深圳市九洲电器有限公司 | Method and system of recording and authorization playing of television programs |
CN103974117A (en) * | 2013-02-06 | 2014-08-06 | 中兴通讯股份有限公司 | Sharing recording method, sharing recording device, sharing recording server and set-top boxes |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106533668B (en) * | 2016-11-10 | 2019-09-10 | 深圳创维数字技术有限公司 | A kind of network-based PVR guard method and system |
-
2016
- 2016-11-10 CN CN201610989564.1A patent/CN106533668B/en active Active
-
2017
- 2017-11-10 WO PCT/CN2017/110334 patent/WO2018086566A1/en active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030235393A1 (en) * | 2002-06-25 | 2003-12-25 | International Business Machines Corporation | Personal video recording with storage space requirement checking |
CN102281468A (en) * | 2011-08-09 | 2011-12-14 | 深圳市九洲电器有限公司 | Method and device for recording and playing personal video record, and set-top box |
CN103024475A (en) * | 2012-12-21 | 2013-04-03 | 深圳市九洲电器有限公司 | Method and system of recording and authorization playing of television programs |
CN103974117A (en) * | 2013-02-06 | 2014-08-06 | 中兴通讯股份有限公司 | Sharing recording method, sharing recording device, sharing recording server and set-top boxes |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018086566A1 (en) * | 2016-11-10 | 2018-05-17 | 深圳创维数字技术有限公司 | Pvr protection method and system |
CN107820128A (en) * | 2017-11-10 | 2018-03-20 | 深圳创维-Rgb电子有限公司 | USB recording functions method for customizing, device and computer-readable recording medium |
CN107820128B (en) * | 2017-11-10 | 2019-12-27 | 深圳创维-Rgb电子有限公司 | USB recording function customizing method and device and computer readable storage medium |
US11132325B2 (en) | 2017-11-10 | 2021-09-28 | Shenzhen Skyworth-Rgb Electronic Co., Ltd. | Method and device for customizing a USB recording function, and a computer readable storage medium |
CN113542877A (en) * | 2021-07-13 | 2021-10-22 | 四川长虹网络科技有限责任公司 | PVR resource sharing method, system, computer equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN106533668B (en) | 2019-09-10 |
WO2018086566A1 (en) | 2018-05-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11238165B2 (en) | File encryption method, file decryption method, electronic device, and storage medium | |
CN1723501B (en) | Method and system for protecting content and method for accessing protected contents | |
CN110324143A (en) | Data transmission method, electronic equipment and storage medium | |
CN101271501B (en) | Encryption and decryption method and device of digital media file | |
CN101535987B (en) | Use of media storage structure with multiple pieces of content in a content-distribution system | |
CN103366132B (en) | Equipment and method for encryption data | |
US8571209B2 (en) | Recording keys in a broadcast-encryption-based system | |
CN106533668A (en) | Network-based PVR protection method and system | |
CN103427983A (en) | Apparatus and method for content encryption and decryption based on storage device ID | |
CN106067874B (en) | It is a kind of by the method for data record to server end, terminal and server | |
JPWO2007007764A1 (en) | License management apparatus and method | |
EP2553622B1 (en) | Secure data recorder | |
CN105611318A (en) | Method and system for video encryption playing | |
CN102368850A (en) | Method for carrying out encryption and decryption on video file on mobile phone | |
US20080098217A1 (en) | Method for efficient and secure data migration between data processing systems | |
CN100364002C (en) | Apparatus and method for reading or writing user data | |
US20060018473A1 (en) | Method for transmission/reception of contents usage right information in encrypted form, and device thereof | |
CN103237011B (en) | Digital content encryption transmission method and server end | |
CN103077359A (en) | Data decryption method, device and system | |
CN110300289A (en) | Video security management system and method | |
CN101212633A (en) | Digital audio/video data encryption and decryption method | |
CN110750326A (en) | Disk encryption and decryption method and system for virtual machine | |
US8634555B2 (en) | Information processing apparatus, information processing method, and program | |
JP2003216500A (en) | Digital copyright managing system | |
JP5296195B2 (en) | Content data reproduction system and recording apparatus |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |