CN107820126A - A kind of method for security protection of set top box - Google Patents
A kind of method for security protection of set top box Download PDFInfo
- Publication number
- CN107820126A CN107820126A CN201710775665.3A CN201710775665A CN107820126A CN 107820126 A CN107820126 A CN 107820126A CN 201710775665 A CN201710775665 A CN 201710775665A CN 107820126 A CN107820126 A CN 107820126A
- Authority
- CN
- China
- Prior art keywords
- top box
- set top
- signed data
- identification code
- random number
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/81—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer by operating on the power supply, e.g. enabling or disabling power-on, sleep or resume operations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/443—OS processes, e.g. booting an STB, implementing a Java virtual machine in an STB or power management in an STB
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of method for security protection of set top box; due to the preset unique identifier of set top box; and software encryption and protection is carried out to it; when therefore decrypting, it is necessary to decrypt identical key using decipherment algorithm corresponding with AES, and same signed data is obtained using the key signature random number; set top box could be started; therefore set-top box software can mutually be bound with hardware, the difficulty that set top box is cracked is drastically increased, so as to provide safeguard protection for set top box.
Description
Technical field
The present invention relates to set-top box technique field, more particularly to a kind of method for security protection of set top box.
Background technology
Now, set-top box technique is continued to develop, and more more rich TV programme can be watched by set top box.But mesh
There is safety defect in preceding set top box, such as the illegal software or hardware to set top box of some users cracks, pirate of going forward side by side
Version production, therefrom obtains unlawful interests, so as to cause reputation and loss economically to set top box producer and television operator.
Existing set top box does not have safety precautions substantially, as long as bootlegger obtains a machine top of regular manufacturer production
Box, the software in flash memory is read using illegal means, then by other burned set top boxes of software, it is possible to economic interests are tryed to gain, are given
Regular set top box manufacturer brings great economic loss.
The content of the invention
The present invention solves the technical problem of a kind of method for security protection of set top box is provided, can be carried for set top box
For safeguard protection.
It is an object of the invention to provide a kind of method for security protection of set top box, to solve the deficiencies in the prior art, it is
Reach above-mentioned requirements, the present invention adopts the technical scheme that:
For the preset exclusive identification code of set top box, the exclusive identification code is used for set top box described in unique mark, and identification code is entered
Row encryption, obtain key and store;
The key is signed to random number by default signature algorithm, obtains the first signed data, and by described in only
One identification code, first signed data, the random number write the set top box;
In the set-top-box opening, set top box judges the electric current on cable TV signal ground wire when detecting starting-up signal
Whether threshold value is exceeded;If so, the electric current on control isolation cable TV signal ground wire;If it is not, the ground of connection cable TV signal
Line;Set top box blocks cable TV signal ground paths when detecting off signal;
The exclusive identification code, the Software Coding, the random number and first signed data are read, using described unique
The key is decrypted for identification code and the Software Coding, and by the signature algorithm by the key after decryption to described
Random number is signed, and obtains the second signed data;
Judge whether second signed data and first signed data are consistent;If second signed data with it is described
First signed data is consistent, starts the set top box.
Preferably, if second signed data and first signed data are inconsistent, the set top box is locked.
Preferably, the Software Coding is the MD5 values or SHAI values of software.
Compared with prior art, the beneficial effects of the invention are as follows:
(1)Certainly judge before being carried out by hardware detection to set top box entry condition and electric signal, ensure top-set hardware equipment peace
Row for the national games.
(2)Because signed data is to pass through label again after obtaining key using AES by exclusive identification code and Software Coding
The key is signed what is obtained by name algorithm to random number, therefore during decryption, it is necessary to using solution corresponding with AES
Close algorithm decrypts identical key, and obtains same signed data using the key signature random number, could starter motor top
Box, therefore set-top box software can mutually be bound with hardware, the difficulty that set top box is cracked is drastically increased, so as to
Safeguard protection is provided for set top box.
Embodiment
To make the purpose, technical scheme and advantage of the application clearer, specific examples below is made to the application into one
Step ground describes in detail, for the sake of simplicity, eliminates that well known to a person skilled in the art some technical characteristics in describing below.
A kind of method for security protection of set top box, including
For the preset exclusive identification code of set top box, the exclusive identification code is used for set top box described in unique mark, and identification code is entered
Row encryption, obtain key and store;
The key is signed to random number by default signature algorithm, obtains the first signed data, and by described in only
One identification code, first signed data, the random number write the set top box;
In the set-top-box opening, set top box judges the electric current on cable TV signal ground wire when detecting starting-up signal
Whether threshold value is exceeded;If so, the electric current on control isolation cable TV signal ground wire;If it is not, the ground of connection cable TV signal
Line;Set top box blocks cable TV signal ground paths when detecting off signal;
The exclusive identification code, the Software Coding, the random number and first signed data are read, using described unique
The key is decrypted for identification code and the Software Coding, and by the signature algorithm by the key after decryption to described
Random number is signed, and obtains the second signed data;
Judge whether second signed data and first signed data are consistent;If second signed data with it is described
First signed data is consistent, starts the set top box.
Specifically, if second signed data and first signed data are inconsistent, the machine top is locked
Box, the Software Coding are the MD5 values or SHAI values of software.
It should be pointed out that pin is to one skilled in the art, it is seen that the technical scheme can be without creative labor
It is dynamic to make other deformations and the technical scheme replacement of equal means, therefore, within the spirit and principles of the invention, done
Any modification and equivalents, are regarded as within protection scope of the present invention.
Claims (3)
- A kind of 1. method for security protection of set top box, it is characterised in that including:For the preset exclusive identification code of set top box, the exclusive identification code is used for set top box described in unique mark, and identification code is entered Row encryption, obtain key and store;The key is signed to random number by default signature algorithm, obtains the first signed data, and by described in only One identification code, first signed data, the random number write the set top box;In the set-top-box opening, set top box judges the electric current on cable TV signal ground wire when detecting starting-up signal Whether threshold value is exceeded;If so, the electric current on control isolation cable TV signal ground wire;If it is not, the ground of connection cable TV signal Line;Set top box blocks cable TV signal ground paths when detecting off signal;The exclusive identification code, the Software Coding, the random number and first signed data are read, using described unique The key is decrypted for identification code and the Software Coding, and by the signature algorithm by the key after decryption to described Random number is signed, and obtains the second signed data;Judge whether second signed data and first signed data are consistent;If second signed data with it is described First signed data is consistent, starts the set top box.
- 2. the method for security protection according to claim 1, it is characterised in that the method for security protection also includes:Such as Second signed data described in fruit and first signed data are inconsistent, then lock the set top box.
- 3. the method for security protection according to claim 1, it is characterised in that the Software Coding is the MD5 of software Value or SHAI values.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710775665.3A CN107820126A (en) | 2017-08-31 | 2017-08-31 | A kind of method for security protection of set top box |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710775665.3A CN107820126A (en) | 2017-08-31 | 2017-08-31 | A kind of method for security protection of set top box |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107820126A true CN107820126A (en) | 2018-03-20 |
Family
ID=61600874
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710775665.3A Withdrawn CN107820126A (en) | 2017-08-31 | 2017-08-31 | A kind of method for security protection of set top box |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107820126A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110020535A (en) * | 2019-03-29 | 2019-07-16 | 深圳市九洲电器有限公司 | Critical data area data processing method, device and set-top box |
-
2017
- 2017-08-31 CN CN201710775665.3A patent/CN107820126A/en not_active Withdrawn
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110020535A (en) * | 2019-03-29 | 2019-07-16 | 深圳市九洲电器有限公司 | Critical data area data processing method, device and set-top box |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8392722B2 (en) | Digital cable system and method for protection of secure micro program | |
CN1655495A (en) | System and method for security key transmission with strong pairing to destination client | |
US20050027994A1 (en) | Device key protection method, and encoding apparatus, decoding apparatus, video transmission apparatus and video receiving apparatus using the method | |
CN103841469A (en) | Digital film copyright protection method and device | |
CN102595198B (en) | A kind of key management system based on safety chip, terminal equipment and method | |
CN107547918A (en) | The methods, devices and systems that a kind of IPTV channel plays safely | |
KR20100058840A (en) | Method for downloading cas in iptv | |
JP6596133B2 (en) | Transmitting apparatus, receiving apparatus and conditional access system | |
CN102427561A (en) | Method for preventing VOD (Video-On-Demand) programs from being illegally spread and shared | |
RU2605923C2 (en) | Secure transmission method and apparatus for transport stream | |
CN101018317A (en) | A virtual intelligent card security authentication method and system | |
CN107820126A (en) | A kind of method for security protection of set top box | |
CN110868641B (en) | Method and system for detecting validity of live broadcast source | |
CN104244090B (en) | A kind of program authorization method and system | |
CN104796745A (en) | Safety protection method for set top box | |
CN103929680B (en) | Set top box encryption program descrambling method and set top box | |
CN105187912A (en) | Ciphertext video player and playing method | |
TWI510045B (en) | Protection method, decrypting method, recording medium and terminal for this protection method | |
CN114189713A (en) | Content encryption method | |
US9892285B2 (en) | Accessory, electronic apparatus and system for accessory certification | |
CN101365098B (en) | Digital program right management method and digital right management system | |
CN103402129B (en) | The method of a kind of condition reception, equipment and system | |
US11468149B2 (en) | Device authentication in collaborative content screening | |
CN111510775A (en) | Digital copyright management and watermark tracking method and system for set top box video in IPTV | |
KR100695706B1 (en) | System and method of verifying authorization for communicating protected content |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
WW01 | Invention patent application withdrawn after publication | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20180320 |