CN109391594A - Security certification system and method - Google Patents

Security certification system and method Download PDF

Info

Publication number
CN109391594A
CN109391594A CN201710673014.3A CN201710673014A CN109391594A CN 109391594 A CN109391594 A CN 109391594A CN 201710673014 A CN201710673014 A CN 201710673014A CN 109391594 A CN109391594 A CN 109391594A
Authority
CN
China
Prior art keywords
terminal
authentication information
video server
public key
certification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710673014.3A
Other languages
Chinese (zh)
Other versions
CN109391594B (en
Inventor
李峰
李兴达
杨琛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Telecom Corp Ltd
Original Assignee
China Telecom Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Telecom Corp Ltd filed Critical China Telecom Corp Ltd
Priority to CN201710673014.3A priority Critical patent/CN109391594B/en
Publication of CN109391594A publication Critical patent/CN109391594A/en
Application granted granted Critical
Publication of CN109391594B publication Critical patent/CN109391594B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0869Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint

Abstract

The invention discloses a kind of safety certifying method and systems, are related to information security field.Safety certifying method include: video server sent in response to terminal access request, according to the first public key generate include the second public key the first authentication information, and to terminal return the first authentication information;Terminal carries out the first certification to the first authentication information using the first private key in the inter-trust domain module of terminal;Terminal generates the second authentication information using the second public key in the first authentication information, and returns to the second authentication information to video server;Video server carries out the second certification to the second authentication information using the second private key;Pass through in response to the first certification and the second certification, video server or terminal determine that safety certification passes through.To guarantee the legitimacy of terminal, and can guarantee the legitimacy of the video server of terminal access, effectively prevent the digital publishing rights of video content by unauthorized theft, realize the protection to video content.

Description

Security certification system and method
Technical field
The present invention relates to information security field, in particular to a kind of security certification system and method.
Background technique
The resolution ratio of original TV is substantially improved 4K video, has reached 3840x2160 pixel or more, can enable view The visual effect of frequency is greatly improved, and improves the experience of user's perception.
There is 4K video content in major content copyright side stringent digital publishing rights requirement, is distinctly claimed and interacts in operation It needs to carry out copyright guarantor to video content when the business such as formula Web TV (IPTV, Internet Protocol Television) Shield, relevant system or equipment must have content protecting ability, prevent from being played by illegal piracy.
However, the audio/video player systems such as IPTV in the prior art are not verified the safety of equipment, or by taking Business device simply verifies terminal, keeps the safety of system lower, and video content is easy by unauthorized theft.
Summary of the invention
One technical problem to be solved by the embodiment of the invention is that: how to improve the safety of video content protection.
First aspect according to an embodiment of the present invention provides a kind of safety certifying method, comprising: video server response In terminal send access request, according to the first public key generate the first authentication information, and to terminal return the first authentication information, In, it include the second public key in the first authentication information;Terminal is authenticated using the first private key in the inter-trust domain module of terminal to first Information carries out the first certification, wherein the first public key and the first private key are pairwise key;Terminal is using the in the first authentication information Two public keys generate the second authentication information, and return to the second authentication information to video server;Video server uses the second private key Second certification is carried out to the second authentication information, wherein the second public key and the second private key are pairwise key;In response to first certification and Second certification passes through, and video server or terminal determine that safety certification passes through.
In one embodiment, the access request that video server sends the second public key and terminal using the first public key In terminal iidentification carry out encryption generate the first authentication information, and to terminal return the first authentication information.
In one embodiment, terminal encrypts the first authentication information using the second public key in the first authentication information The second authentication information is generated, and returns to the second authentication information to video server.
In one embodiment, further includes: terminal reading terminals from inter-trust domain module identify, and send out to video server Send the access request including terminal iidentification.
In one embodiment, terminal iidentification includes equipment mark code and 4K host ID.
In one embodiment, safety certifying method further include: terminal passes through in response to safety certification, using inter-trust domain mould The encrypted video that video key pair video server in block is sent is decrypted.
In one embodiment, terminal is set-top box.
The second aspect according to an embodiment of the present invention provides a kind of security certification system, comprising: terminal, terminal can The first private key is stored in letter domain module, terminal is configured as receiving the first authentication information of video server transmission and use First private key carries out the first certification to the first authentication information, and generates second using the second public key in the first authentication information and recognize It demonstrate,proves information and returns to the second authentication information to video server;Video server is stored with the first public key, the second public key and Two private keys, it includes the second public key that the access request that video server is configured to respond to terminal transmission is generated according to the first public key The first authentication information and return to the first authentication information to terminal, and the is carried out to the second authentication information using the second private key Two certifications, and pass through in response to the first certification and the second certification, determine that safety certification passes through;Wherein, the first public key and first Private key is pairwise key, and the second public key and the second private key are pairwise key.
In one embodiment, video server is configured to using the first public key to the second public key and terminal Terminal iidentification in the access request of transmission carries out encryption and generates the first authentication information, and returns to the first authentication information to terminal.
In one embodiment, terminal is configured to recognize using the second public key in the first authentication information first Card information carries out encryption and generates the second authentication information, and returns to the second authentication information to video server.
In one embodiment, terminal is additionally configured to from inter-trust domain module reading terminals and identifies, and to Video service Device sends the access request including terminal iidentification.
In one embodiment, terminal iidentification includes equipment mark code and 4K host ID.
In one embodiment, terminal is additionally configured to pass through in response to safety certification, using the view in inter-trust domain module The encrypted video that frequency key pair video server is sent is decrypted.
In one embodiment, terminal is set-top box.
One embodiment in foregoing invention have the following advantages that or the utility model has the advantages that the terminal in the present invention to Video service Device is authenticated, video server also authenticates terminal, so that realize between terminal and video server two-way recognizes Card can either guarantee the legitimacy of terminal, avoid revealing copyrighted content from terminal side, and can guarantee that terminal accesses Video server legitimacy, avoid terminal from receiving the content that illegal server provides, effectively prevent the number of video content Letter is weighed by unauthorized theft, and the protection to video content is realized.
By referring to the drawings to the detailed description of exemplary embodiment of the present invention, other feature of the invention and its Advantage will become apparent.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of invention without any creative labor, may be used also for those of ordinary skill in the art To obtain other drawings based on these drawings.
Fig. 1 is the structure chart of one embodiment of security certification system of the present invention.
Fig. 2 is the flow chart of one embodiment of safety certifying method of the present invention.
Fig. 3 is the flow chart of another embodiment of safety certifying method of the present invention.
Fig. 4 is the flow chart of another embodiment of safety certifying method of the present invention.
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.Below Description only actually at least one exemplary embodiment be it is illustrative, never as to the present invention and its application or make Any restrictions.Based on the embodiments of the present invention, those of ordinary skill in the art are not making creative work premise Under every other embodiment obtained, shall fall within the protection scope of the present invention.
Unless specifically stated otherwise, positioned opposite, the digital table of the component and step that otherwise illustrate in these embodiments It is not limited the scope of the invention up to formula and numerical value.
Simultaneously, it should be appreciated that for ease of description, the size of various pieces shown in attached drawing is not according to reality Proportionate relationship draw.
Technology, method and apparatus known to person of ordinary skill in the relevant may be not discussed in detail, but suitable In the case of, the technology, method and apparatus should be considered as authorizing part of specification.
It is shown here and discuss all examples in, any occurrence should be construed as merely illustratively, without It is as limitation.Therefore, the other examples of exemplary embodiment can have different values.
It should also be noted that similar label and letter indicate similar terms in following attached drawing, therefore, once a certain Xiang Yi It is defined in a attached drawing, then in subsequent attached drawing does not need that it is further discussed.
Fig. 1 is the structure chart of one embodiment of security certification system of the present invention.As shown in Figure 1, the short message of the embodiment Receive-transmit system includes video server 11 and terminal 12.
Video server 11 is the equipment of network side, such as can be the content server of video website, terminal management system Equipment in system (Terminal Management System, TMS), is also possible to be exclusively used in the server of safety certification.Depending on Frequency server 11 provides video content and other related datas to terminal 12, so that terminal 12 plays out or shows.
The first public key, the second public key and the second private key are stored in video server 11.
Terminal 12 be user side equipment, for receive video server 11 transmission video, and play or after treatment Other users equipment is transferred to play out.The equipment such as can be set-top box, TV box of terminal 12.
The first private key is stored in terminal 12, and the first private key is stored in the inter-trust domain module of terminal 12.Inter-trust domain Module is the safety zone of terminal 12, does not provide modification authority to user, and the content in inter-trust domain module can only be read out behaviour Make.
First private key for example can terminal 12 dispatch from the factory when burning in the safety zone of terminal 12.
In an embodiment of the present invention, the first public key and the first private key are pairwise key, and the second public key and the second private key are Pairwise key.That is, can be decrypted using the first private key by the content after the first public key encryption, after the second public key encryption Content can be decrypted using the second private key.
Terminal 12 is configured as receiving the first authentication information of the transmission of video server 11 and using the first private key to first Authentication information carries out the first certification, and using the second public key in the first authentication information generates the second authentication information and to view Frequency server 11 returns to the second authentication information;Video server 11 be configured to respond to terminal 12 transmission access request according to First public key, which generates, includes that the first authentication information of the second public key simultaneously returns to the first authentication information to terminal 12, and using the Two private keys carry out the second certification to the second authentication information.
Video server 11 or terminal 12 pass through in response to the first certification and the second certification, determine that safety certification passes through.
Through the foregoing embodiment, the terminal in the present invention authenticates video server, video server is also to terminal It is authenticated, to realize the two-way authentication between terminal and video server, can either guarantee the legitimacy of terminal, avoid Copyrighted content is revealed from terminal side, and can guarantee the legitimacy of the video server of terminal access, avoid terminal The content that illegal server provides is received, the digital publishing rights of video content is effectively prevented by unauthorized theft, realizes to video The protection of content.
The encrypted object of video server 11 and terminal 12 can be the data that both sides have.
In one embodiment, video server 11 was configured to using the first public key to the second public key and end The terminal iidentification in access request that end 12 is sent carries out encryption and generates the first authentication information, and returns to the first certification to terminal 12 Information.
In one embodiment, terminal 12 is configured to using the second public key in the first authentication information to first Authentication information carries out encryption and generates the second authentication information.
Referring to the terminal and video server, the safety certification for describing in conjunction with Fig. 2 one embodiment of the invention in Fig. 1 Method.
Fig. 2 is the flow chart of one embodiment of safety certifying method of the present invention.As shown in Fig. 2, the safety of the embodiment Authentication method includes step S202~S210.
In step S202, access request that video server 11 is sent in response to terminal generates the according to the first public key One authentication information, and the first authentication information is returned to terminal, wherein it include the second public key in first authentication information.
Terminal 12 for example can send access request to video server 11 when accessing video server 11, or ask The preparation of video server 11 is asked to send access request when issuing video.Certainly, other hairs also can be set in those skilled in the art Opportunity or the mode of access request are sent, which is not described herein again.
In one embodiment, terminal 12 reading terminals can be identified from the inter-trust domain module of terminal 12, and to video Server 11 sends the access request including terminal iidentification.
Video server 11 can carry out the information that the second public key and video server 11 and terminal 12 are provided simultaneously with Encryption.For example, if in access request including terminal iidentification, video server 11 can to the second public key and terminal iidentification into Row encryption, terminal iidentification for example may include equipment mark code and 4K host ID;In another example video server 11 can root According to the facility information of the source address inquiry terminal 12 in access request, and the second public key and facility information are encrypted;Again It is encrypted for example, video server 11 can stab the sending time of the second public key and access request.As needed, ability Field technique personnel can also be using other cipher modes, and which is not described herein again.
In step S204, terminal 12 using terminal 12 inter-trust domain module in the first private key to the first authentication information into Row first authenticates.
First public key and the first private key are pairwise key.Therefore, terminal 12 can believe the first certification using the first private key Breath is decrypted, and compares the corresponding informance of decrypted result and the storage of terminal 12.If pair that decrypted result and terminal 12 store Answer information consistent, then the first certification passes through.
Terminal 12 can obtain the second public key in the first authentication information after successful decryption, and carry out step S206.
In step S206, terminal 12 generates the second authentication information using the second public key in the first authentication information, and to Video server 11 returns to the second authentication information.
The information that terminal 12 can be provided simultaneously with video server 11 and terminal 12 encrypts.Specific embodiment Step S202 can be referred to.
In step S208, video server 11 carries out the second certification to the second authentication information using the second private key.
Second public key and the second private key are pairwise key.Therefore, video server 11 can be using the second private key to second Authentication information is decrypted, and compares the corresponding informance that decrypted result and video server 11 store.If decrypted result and view The corresponding informance that frequency server 11 stores is consistent, then the second certification passes through.
In step S210, pass through in response to the first certification and the second certification, video server 11 or terminal 12 determine peace Full certification passes through.
After determining that safety certification passes through, video server 11 can establish data content transmission with terminal 12 and connect, So that video server 11 issues video content to terminal 12.
Through the foregoing embodiment, the two-way authentication between terminal and video server is realized, can either guarantee terminal Legitimacy avoids revealing copyrighted content from terminal side, and can guarantee the legal of the video server that terminal accesses Property, avoid terminal from receiving the content that illegal server provides, effectively prevent the digital publishing rights of video content by unauthorized theft, it is real The protection to video content is showed.
Video server 11 and terminal 12 in Fig. 1 embodiment can also be further configured.
In one embodiment, terminal 12 can be additionally configured to the reading terminals mark from the inter-trust domain module of terminal 12 Know, and sends the access request including terminal iidentification to video server 11.
Terminal iidentification for example may include equipment mark code and 4K host ID.
4K video has higher requirement to the safety of broadcasting, such as requires to be only capable of playing using particular device.Therefore, eventually The equipment mark codes that end 12 can send itself, for example, device numbering, hardware identifier, equipment Serial Number (Serial Number, ) or fixed network address etc. SN;In addition, terminal 12 can also send 4K host ID, to show that terminal 12 has permission Play 4K video.
To which security certification system provided by the invention can provide safe transmission environment for 4K video.
The safety certifying method of another embodiment of the present invention is described below with reference to Fig. 3.
Fig. 3 is the flow chart of another embodiment of safety certifying method of the present invention.As shown in figure 3, the side of the embodiment Method includes step S302~S320, can also include step S322 as needed.
In step s 302, terminal 12 reads equipment mark code and 4K host ID from inter-trust domain module.
In step s 304, it includes connecing for equipment mark code and 4K host ID that terminal 12 is sent to video server 11 Enter request.
In step S306, video server 11 is using the first public key to the equipment mark in the second public key and access request Know code and 4K host ID carries out encryption and generates the first authentication information.
Video server 11 can be respectively written into the second public key in the preset position in preset field or character string, set Standby identification code and 4K host ID, so that terminal 12 can obtain the corresponding contents of each part after decryption.
In step S308, video server 11 returns to the first authentication information to terminal 12.
In step s310, terminal 12 using terminal 12 inter-trust domain module in the first private key to the first authentication information into Row decryption.
First public key and the first private key are pairwise key.
In step S312, terminal 12 compares the equipment mark code stored in inter-trust domain module and 4K host ID and solution Whether the corresponding contents in result after close are identical.
If it is different, terminal 12 determines that safety certification does not pass through.At this point, terminal 12 can notify the safety of video server 11 Authenticate unacceptable as a result, being transmitted without data therebetween.Terminal 12 can re-initiate request, or selection connects it His server.
If identical, the first certification passes through, and executes step S314.
In step S314, terminal 12 carries out encryption to the first authentication information using the second public key and generates the second certification letter Breath.
In step S316, terminal 12 returns to the second authentication information to video server 11.
In step S318, video server 11 is decrypted the second authentication information using the second private key.
Second public key and the second private key are pairwise key.
In step s 320, video server 11 compares first that the result after decryption is pre-generated with video server 11 Whether authentication information is identical.
If it is different, video server 11 determines that safety certification does not pass through.At this point, video server 11 can notify terminal 12 safety certifications are unacceptable as a result, transmitting without data therebetween.Terminal 12 can re-initiate request, or selection Connect other servers.
If identical, video server 11 determines that safety certification passes through.At this point, video server 11 can notify terminal 12 It is that safety certification passes through as a result, it is between the two can establish transmission of video connection.
For example, may include step S322.
In step S322, transmission of video connection is established between video server 11 and terminal 12.
In addition, the encrypted video that terminal 12 can also be sent using the video key pair video server in inter-trust domain module It is decrypted.
To further ensure the safety of digital content.
Method through the foregoing embodiment can provide safe transmission environment for 4K video, realize in 4K video The protection of appearance.
In a network, for partial programme source, equipment needs to carry out it stringent content protecting, and partial programme source Security requirement is then relatively low.The net that the present disclosure applies equally to two kinds of security levels different program source or playback equipment and deposit Network or system.The safety certifying method of another embodiment of the invention is described below with reference to Fig. 4.
Fig. 4 is the flow chart of another embodiment of safety certifying method of the present invention.As shown in figure 4, the side of the embodiment Method includes step S402~S416.
In step S402, video server 11 receives the access request that terminal 12 is sent.
In step s 404, video server 11 judges whether to need to carry out safety according to the terminal iidentification in access request Certification.
If terminal iidentification corresponds to higher security level, such as has 4K host ID in terminal iidentification, then judge It needs to carry out safety certification, executes step S406~S416;If terminal iidentification corresponds to lower security level, such as terminal mark There is no 4K host ID in knowledge, which is ordinary terminal, then without carrying out safety certification, directly execution step S416.
In step S406, video server 11 generates the first authentication information including the second public key according to the first public key, And the first authentication information is returned to terminal 12.
In step S408, terminal 12 using terminal 12 inter-trust domain module in the first private key to the first authentication information into Row first authenticates.
First public key and the first private key are pairwise key
In step S410, terminal 12 generates the second authentication information using the second public key, and returns to video server 11 Second authentication information.
In step S412, video server 11 carries out the second certification to the second authentication information using the second private key.
Second public key and the second private key are pairwise key.
In step S414, pass through in response to the first certification and the second certification, video server 11 or terminal 12 determine peace Full certification passes through.
In step S416, video server 11 and terminal 12 are established data transmission and are connected.
Method through the foregoing embodiment, video server 11 can be the terminal with different demand for security types simultaneously It is serviced, so that the video content that there is different content protection to require is handed down to different types of terminal.
After through safety certification, the terminal 12 that the embodiment of the present invention provides can also be in playing process further Improve safety.
In one embodiment, terminal 12 can be additionally configured to pass through in response to safety certification, using inter-trust domain module In video key pair video server send encrypted video be decrypted.
To which the video content after decryption can be transferred to playing module to play out by terminal 12.
The embodiment of the present invention also provides a kind of computer readable storage medium, is stored thereon with computer program, special Sign is that the program realizes any one aforementioned short message receiving-transmitting method when being executed by processor.
Those skilled in the art should be understood that the embodiment of the present invention can provide as method, system or computer journey Sequence product.Therefore, complete hardware embodiment, complete software embodiment or combining software and hardware aspects can be used in the present invention The form of embodiment.Moreover, it wherein includes the calculating of computer usable program code that the present invention, which can be used in one or more, Machine can use the meter implemented in non-transient storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) The form of calculation machine program product.
The present invention be referring to according to the method for the embodiment of the present invention, the process of equipment (system) and computer program product Figure and/or block diagram describe.It is interpreted as to be realized by computer program instructions each in flowchart and/or the block diagram The combination of process and/or box in process and/or box and flowchart and/or the block diagram.It can provide these computer journeys Sequence instruct to general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices processor with A machine is generated, so that the instruction generation executed by computer or the processor of other programmable data processing devices is used for Realize the dress for the function of specifying in one or more flows of the flowchart and/or one or more blocks of the block diagram It sets.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates, Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one The step of function of being specified in a box or multiple boxes.
The foregoing is merely presently preferred embodiments of the present invention, is not intended to limit the invention, it is all in spirit of the invention and Within principle, any modification, equivalent replacement, improvement and so on be should all be included in the protection scope of the present invention.

Claims (14)

1. a kind of safety certifying method characterized by comprising
Access request that video server is sent in response to terminal generates the first authentication information according to the first public key, and to terminal Return to the first authentication information, wherein include the second public key in first authentication information;
Terminal carries out the first certification to first authentication information using the first private key in the inter-trust domain module of terminal, wherein First public key and the first private key are pairwise key;
Terminal generates the second authentication information using the second public key in the first authentication information, and returns to second to video server and recognize Demonstrate,prove information;
Video server carries out the second certification to second authentication information using the second private key, wherein the second public key and second Private key is pairwise key;
Pass through in response to first certification and second certification, video server or terminal determine that safety certification passes through.
2. safety certifying method according to claim 1, which is characterized in that
The terminal iidentification in access request that video server sends the second public key and terminal using the first public key adds It is dense to return to the first authentication information at the first authentication information, and to terminal.
3. safety certifying method according to claim 1, which is characterized in that
Terminal carries out encryption to the first authentication information using the second public key in the first authentication information and generates the second authentication information, and The second authentication information is returned to video server.
4. the safety certifying method stated according to claim 1, which is characterized in that further include:
Terminal reading terminals from the inter-trust domain module identify, and sending to video server includes connecing for the terminal iidentification Enter request.
5. safety certifying method according to claim 2 or 4, which is characterized in that the terminal iidentification includes device identification Code and 4K host ID.
6. safety certifying method described in any one of -4 according to claim 1, which is characterized in that further include:
Terminal passes through in response to the safety certification, is sent using the video key pair video server in the inter-trust domain module Encrypted video be decrypted.
7. safety certifying method described in any one of -4 according to claim 1, which is characterized in that the terminal is set-top box.
8. a kind of security certification system characterized by comprising
Terminal, is stored with the first private key in the inter-trust domain module of terminal, and the terminal, which is configured as receiving video server, to be sent The first authentication information and using the first private key to first authentication information carry out first certification, and using first certification The second public key in information generates the second authentication information and returns to the second authentication information to video server;
Video server, is stored with the first public key, the second public key and the second private key, and the video server is configured to respond to The access request that terminal is sent is generated according to the first public key to be included the first authentication information of the second public key and returns to first to terminal Authentication information, and the second certification is carried out to second authentication information using the second private key, and recognize in response to described first Card and second certification pass through, and determine that safety certification passes through;
Wherein, the first public key and the first private key are pairwise key, and the second public key and the second private key are pairwise key.
9. security certification system according to claim 8, which is characterized in that the video server is configured to The terminal iidentification in access request sent using the first public key to the second public key and terminal is carried out encryption and generates the first certification Information, and the first authentication information is returned to terminal.
10. security certification system according to claim 8, which is characterized in that the terminal is configured to use The second public key in first authentication information carries out encryption to the first authentication information and generates the second authentication information, and to video server Return to the second authentication information.
11. security certification system according to claim 8, which is characterized in that the terminal is additionally configured to from inter-trust domain Reading terminals identify in module, and send the access request including the terminal iidentification to video server.
12. the security certification system according to claim 9 or 11, which is characterized in that the terminal iidentification includes equipment mark Know code and 4K host ID.
13. the security certification system according to any one of claim 8-11, which is characterized in that the terminal is also configured To pass through in response to safety certification, carried out using the encrypted video that the video key pair video server in inter-trust domain module is sent Decryption.
14. the security certification system according to any one of claim 8-11, which is characterized in that the terminal is machine top Box.
CN201710673014.3A 2017-08-09 2017-08-09 Security authentication system and method Active CN109391594B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710673014.3A CN109391594B (en) 2017-08-09 2017-08-09 Security authentication system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710673014.3A CN109391594B (en) 2017-08-09 2017-08-09 Security authentication system and method

Publications (2)

Publication Number Publication Date
CN109391594A true CN109391594A (en) 2019-02-26
CN109391594B CN109391594B (en) 2021-07-30

Family

ID=65413966

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710673014.3A Active CN109391594B (en) 2017-08-09 2017-08-09 Security authentication system and method

Country Status (1)

Country Link
CN (1) CN109391594B (en)

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008045773A2 (en) * 2006-10-10 2008-04-17 Qualcomm Incorporated Method and apparatus for mutual authentication
CN101222488A (en) * 2007-01-10 2008-07-16 华为技术有限公司 Method and network authentication server for controlling client terminal access to network appliance
CN101431415A (en) * 2008-12-12 2009-05-13 天柏宽带网络科技(北京)有限公司 Bidirectional authentication method
US20090199303A1 (en) * 2008-02-01 2009-08-06 Samsung Electronics Co., Ltd. Ce device management server, method of issuing drm key by using ce device management server, and computer readable recording medium
CN101719910A (en) * 2009-11-16 2010-06-02 北京数字太和科技有限责任公司 Terminal equipment for realizing content protection and transmission method thereof
CN101958904A (en) * 2010-10-12 2011-01-26 高斯贝尔数码科技股份有限公司 User identity (Id) security authentication system and method for interactive digital television system
US20110314284A1 (en) * 2010-06-21 2011-12-22 Che-Yang Chou Method for securing transmission data and security system for implementing the same
CN102868519A (en) * 2011-07-04 2013-01-09 周哲仰 Data security method and system
CN103095704A (en) * 2013-01-15 2013-05-08 杭州华三通信技术有限公司 Trusted medium online validation method and device
CN105530253A (en) * 2015-12-17 2016-04-27 河南大学 Wireless sensor network access authentication method based on CA certificate and under Restful architecture
CN105554747A (en) * 2016-01-29 2016-05-04 腾讯科技(深圳)有限公司 Wireless network connecting method, device and system
CN105872848A (en) * 2016-06-13 2016-08-17 北京可信华泰信息技术有限公司 Credible two-way authentication method applicable to asymmetric resource environment
WO2017004470A1 (en) * 2015-06-30 2017-01-05 Visa International Service Association Mutual authentication of confidential communication
CN106603485A (en) * 2016-10-31 2017-04-26 美的智慧家居科技有限公司 Secret key negotiation method and device
EP3193486A1 (en) * 2016-01-15 2017-07-19 Fujitsu Limited Mutual authentication method, authentication apparatus, and authentication program

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008045773A2 (en) * 2006-10-10 2008-04-17 Qualcomm Incorporated Method and apparatus for mutual authentication
CN101222488A (en) * 2007-01-10 2008-07-16 华为技术有限公司 Method and network authentication server for controlling client terminal access to network appliance
US20090199303A1 (en) * 2008-02-01 2009-08-06 Samsung Electronics Co., Ltd. Ce device management server, method of issuing drm key by using ce device management server, and computer readable recording medium
CN101431415A (en) * 2008-12-12 2009-05-13 天柏宽带网络科技(北京)有限公司 Bidirectional authentication method
CN101719910A (en) * 2009-11-16 2010-06-02 北京数字太和科技有限责任公司 Terminal equipment for realizing content protection and transmission method thereof
US20110314284A1 (en) * 2010-06-21 2011-12-22 Che-Yang Chou Method for securing transmission data and security system for implementing the same
CN101958904A (en) * 2010-10-12 2011-01-26 高斯贝尔数码科技股份有限公司 User identity (Id) security authentication system and method for interactive digital television system
CN102868519A (en) * 2011-07-04 2013-01-09 周哲仰 Data security method and system
CN103095704A (en) * 2013-01-15 2013-05-08 杭州华三通信技术有限公司 Trusted medium online validation method and device
WO2017004470A1 (en) * 2015-06-30 2017-01-05 Visa International Service Association Mutual authentication of confidential communication
CN105530253A (en) * 2015-12-17 2016-04-27 河南大学 Wireless sensor network access authentication method based on CA certificate and under Restful architecture
EP3193486A1 (en) * 2016-01-15 2017-07-19 Fujitsu Limited Mutual authentication method, authentication apparatus, and authentication program
CN105554747A (en) * 2016-01-29 2016-05-04 腾讯科技(深圳)有限公司 Wireless network connecting method, device and system
CN105872848A (en) * 2016-06-13 2016-08-17 北京可信华泰信息技术有限公司 Credible two-way authentication method applicable to asymmetric resource environment
CN106603485A (en) * 2016-10-31 2017-04-26 美的智慧家居科技有限公司 Secret key negotiation method and device

Also Published As

Publication number Publication date
CN109391594B (en) 2021-07-30

Similar Documents

Publication Publication Date Title
RU2352985C2 (en) Method and device for authorisation of operations with content
RU2504005C2 (en) Digital rights management apparatus and method
KR100746030B1 (en) Method and apparatus for generating rights object with representation by commitment
US7224805B2 (en) Consumption of content
US7698743B2 (en) Authentication server, method and system for detecting unauthorized terminal
US7788728B2 (en) Method and apparatus for limiting number of times contents can be accessed using hash chain
CN100365972C (en) Method of establishing home domain through device authentication using smart card, and smart card for the same
CN1812416B (en) Method for managing consumption of digital contents within a client domain and devices implementing this method
CN101977190B (en) Digital content encryption transmission method and server side
CN103440436A (en) Digital rights management system and methods for accessing content from an intelligent storag
CN106033503A (en) Method, device and system of online writing application secret key into digital content equipment
CN1604522A (en) Method of creating domain based on public key cryptography
CN106571951A (en) Audit log obtaining, generating and verifying method and system and device
CN102281300A (en) digital rights management license distribution method and system, server and terminal
CN103841469A (en) Digital film copyright protection method and device
CN109151507A (en) Audio/video player system and method
US8220059B2 (en) Method and apparatus for generating rights object by reauthorization
CN104462877B (en) A kind of digital resource acquisition method under copyright protection and system
CN102546528A (en) Stream media playing method and stream media playing equipment
CN106131603B (en) A kind of video broadcasting method and system based on dynamic dictionary
CN103442020B (en) The method sharing digital license authorization certificate between terminal unit
CN109391594A (en) Security certification system and method
CN104994411A (en) Digital copyright protection system for high-definition videos of mobile Internet
CN101404573A (en) Authorization method, system and apparatus
JP2023012090A (en) Verification system, distribution server and browser

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant