CN107820126A - A kind of method for security protection of set top box - Google Patents

A kind of method for security protection of set top box Download PDF

Info

Publication number
CN107820126A
CN107820126A CN201710775665.3A CN201710775665A CN107820126A CN 107820126 A CN107820126 A CN 107820126A CN 201710775665 A CN201710775665 A CN 201710775665A CN 107820126 A CN107820126 A CN 107820126A
Authority
CN
China
Prior art keywords
top box
set top
signed data
identification code
random number
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201710775665.3A
Other languages
Chinese (zh)
Inventor
黄勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
This Da Xinhui Video Signal Science And Technology Ltd Of Chengdu
Original Assignee
This Da Xinhui Video Signal Science And Technology Ltd Of Chengdu
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by This Da Xinhui Video Signal Science And Technology Ltd Of Chengdu filed Critical This Da Xinhui Video Signal Science And Technology Ltd Of Chengdu
Priority to CN201710775665.3A priority Critical patent/CN107820126A/en
Publication of CN107820126A publication Critical patent/CN107820126A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/81Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer by operating on the power supply, e.g. enabling or disabling power-on, sleep or resume operations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/443OS processes, e.g. booting an STB, implementing a Java virtual machine in an STB or power management in an STB

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of method for security protection of set top box; due to the preset unique identifier of set top box; and software encryption and protection is carried out to it; when therefore decrypting, it is necessary to decrypt identical key using decipherment algorithm corresponding with AES, and same signed data is obtained using the key signature random number; set top box could be started; therefore set-top box software can mutually be bound with hardware, the difficulty that set top box is cracked is drastically increased, so as to provide safeguard protection for set top box.

Description

A kind of method for security protection of set top box
Technical field
The present invention relates to set-top box technique field, more particularly to a kind of method for security protection of set top box.
Background technology
Now, set-top box technique is continued to develop, and more more rich TV programme can be watched by set top box.But mesh There is safety defect in preceding set top box, such as the illegal software or hardware to set top box of some users cracks, pirate of going forward side by side Version production, therefrom obtains unlawful interests, so as to cause reputation and loss economically to set top box producer and television operator.
Existing set top box does not have safety precautions substantially, as long as bootlegger obtains a machine top of regular manufacturer production Box, the software in flash memory is read using illegal means, then by other burned set top boxes of software, it is possible to economic interests are tryed to gain, are given Regular set top box manufacturer brings great economic loss.
The content of the invention
The present invention solves the technical problem of a kind of method for security protection of set top box is provided, can be carried for set top box For safeguard protection.
It is an object of the invention to provide a kind of method for security protection of set top box, to solve the deficiencies in the prior art, it is Reach above-mentioned requirements, the present invention adopts the technical scheme that:
For the preset exclusive identification code of set top box, the exclusive identification code is used for set top box described in unique mark, and identification code is entered Row encryption, obtain key and store;
The key is signed to random number by default signature algorithm, obtains the first signed data, and by described in only One identification code, first signed data, the random number write the set top box;
In the set-top-box opening, set top box judges the electric current on cable TV signal ground wire when detecting starting-up signal Whether threshold value is exceeded;If so, the electric current on control isolation cable TV signal ground wire;If it is not, the ground of connection cable TV signal Line;Set top box blocks cable TV signal ground paths when detecting off signal;
The exclusive identification code, the Software Coding, the random number and first signed data are read, using described unique The key is decrypted for identification code and the Software Coding, and by the signature algorithm by the key after decryption to described Random number is signed, and obtains the second signed data;
Judge whether second signed data and first signed data are consistent;If second signed data with it is described First signed data is consistent, starts the set top box.
Preferably, if second signed data and first signed data are inconsistent, the set top box is locked.
Preferably, the Software Coding is the MD5 values or SHAI values of software.
Compared with prior art, the beneficial effects of the invention are as follows:
(1)Certainly judge before being carried out by hardware detection to set top box entry condition and electric signal, ensure top-set hardware equipment peace Row for the national games.
(2)Because signed data is to pass through label again after obtaining key using AES by exclusive identification code and Software Coding The key is signed what is obtained by name algorithm to random number, therefore during decryption, it is necessary to using solution corresponding with AES Close algorithm decrypts identical key, and obtains same signed data using the key signature random number, could starter motor top Box, therefore set-top box software can mutually be bound with hardware, the difficulty that set top box is cracked is drastically increased, so as to Safeguard protection is provided for set top box.
Embodiment
To make the purpose, technical scheme and advantage of the application clearer, specific examples below is made to the application into one Step ground describes in detail, for the sake of simplicity, eliminates that well known to a person skilled in the art some technical characteristics in describing below.
A kind of method for security protection of set top box, including
For the preset exclusive identification code of set top box, the exclusive identification code is used for set top box described in unique mark, and identification code is entered Row encryption, obtain key and store;
The key is signed to random number by default signature algorithm, obtains the first signed data, and by described in only One identification code, first signed data, the random number write the set top box;
In the set-top-box opening, set top box judges the electric current on cable TV signal ground wire when detecting starting-up signal Whether threshold value is exceeded;If so, the electric current on control isolation cable TV signal ground wire;If it is not, the ground of connection cable TV signal Line;Set top box blocks cable TV signal ground paths when detecting off signal;
The exclusive identification code, the Software Coding, the random number and first signed data are read, using described unique The key is decrypted for identification code and the Software Coding, and by the signature algorithm by the key after decryption to described Random number is signed, and obtains the second signed data;
Judge whether second signed data and first signed data are consistent;If second signed data with it is described First signed data is consistent, starts the set top box.
Specifically, if second signed data and first signed data are inconsistent, the machine top is locked Box, the Software Coding are the MD5 values or SHAI values of software.
It should be pointed out that pin is to one skilled in the art, it is seen that the technical scheme can be without creative labor It is dynamic to make other deformations and the technical scheme replacement of equal means, therefore, within the spirit and principles of the invention, done Any modification and equivalents, are regarded as within protection scope of the present invention.

Claims (3)

  1. A kind of 1. method for security protection of set top box, it is characterised in that including:
    For the preset exclusive identification code of set top box, the exclusive identification code is used for set top box described in unique mark, and identification code is entered Row encryption, obtain key and store;
    The key is signed to random number by default signature algorithm, obtains the first signed data, and by described in only One identification code, first signed data, the random number write the set top box;
    In the set-top-box opening, set top box judges the electric current on cable TV signal ground wire when detecting starting-up signal Whether threshold value is exceeded;If so, the electric current on control isolation cable TV signal ground wire;If it is not, the ground of connection cable TV signal Line;Set top box blocks cable TV signal ground paths when detecting off signal;
    The exclusive identification code, the Software Coding, the random number and first signed data are read, using described unique The key is decrypted for identification code and the Software Coding, and by the signature algorithm by the key after decryption to described Random number is signed, and obtains the second signed data;
    Judge whether second signed data and first signed data are consistent;If second signed data with it is described First signed data is consistent, starts the set top box.
  2. 2. the method for security protection according to claim 1, it is characterised in that the method for security protection also includes:Such as Second signed data described in fruit and first signed data are inconsistent, then lock the set top box.
  3. 3. the method for security protection according to claim 1, it is characterised in that the Software Coding is the MD5 of software Value or SHAI values.
CN201710775665.3A 2017-08-31 2017-08-31 A kind of method for security protection of set top box Withdrawn CN107820126A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710775665.3A CN107820126A (en) 2017-08-31 2017-08-31 A kind of method for security protection of set top box

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710775665.3A CN107820126A (en) 2017-08-31 2017-08-31 A kind of method for security protection of set top box

Publications (1)

Publication Number Publication Date
CN107820126A true CN107820126A (en) 2018-03-20

Family

ID=61600874

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710775665.3A Withdrawn CN107820126A (en) 2017-08-31 2017-08-31 A kind of method for security protection of set top box

Country Status (1)

Country Link
CN (1) CN107820126A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110020535A (en) * 2019-03-29 2019-07-16 深圳市九洲电器有限公司 Critical data area data processing method, device and set-top box

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110020535A (en) * 2019-03-29 2019-07-16 深圳市九洲电器有限公司 Critical data area data processing method, device and set-top box

Similar Documents

Publication Publication Date Title
US8392722B2 (en) Digital cable system and method for protection of secure micro program
CN1655495A (en) System and method for security key transmission with strong pairing to destination client
US20050027994A1 (en) Device key protection method, and encoding apparatus, decoding apparatus, video transmission apparatus and video receiving apparatus using the method
CN103841469A (en) Digital film copyright protection method and device
CN102595198B (en) A kind of key management system based on safety chip, terminal equipment and method
CN107547918A (en) The methods, devices and systems that a kind of IPTV channel plays safely
KR20100058840A (en) Method for downloading cas in iptv
JP6596133B2 (en) Transmitting apparatus, receiving apparatus and conditional access system
CN102427561A (en) Method for preventing VOD (Video-On-Demand) programs from being illegally spread and shared
RU2605923C2 (en) Secure transmission method and apparatus for transport stream
CN101018317A (en) A virtual intelligent card security authentication method and system
CN107820126A (en) A kind of method for security protection of set top box
CN110868641B (en) Method and system for detecting validity of live broadcast source
CN104244090B (en) A kind of program authorization method and system
CN104796745A (en) Safety protection method for set top box
CN103929680B (en) Set top box encryption program descrambling method and set top box
CN105187912A (en) Ciphertext video player and playing method
TWI510045B (en) Protection method, decrypting method, recording medium and terminal for this protection method
CN114189713A (en) Content encryption method
US9892285B2 (en) Accessory, electronic apparatus and system for accessory certification
CN101365098B (en) Digital program right management method and digital right management system
CN103402129B (en) The method of a kind of condition reception, equipment and system
US11468149B2 (en) Device authentication in collaborative content screening
CN111510775A (en) Digital copyright management and watermark tracking method and system for set top box video in IPTV
KR100695706B1 (en) System and method of verifying authorization for communicating protected content

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20180320