CN109787756B - Vehicle-mounted terminal key distribution management method based on white-box encryption technology - Google Patents

Vehicle-mounted terminal key distribution management method based on white-box encryption technology Download PDF

Info

Publication number
CN109787756B
CN109787756B CN201811580794.8A CN201811580794A CN109787756B CN 109787756 B CN109787756 B CN 109787756B CN 201811580794 A CN201811580794 A CN 201811580794A CN 109787756 B CN109787756 B CN 109787756B
Authority
CN
China
Prior art keywords
key
vehicle
mounted terminal
basic
white box
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811580794.8A
Other languages
Chinese (zh)
Other versions
CN109787756A (en
Inventor
张宇
拱印生
娄喜超
迟亮
刘凤致
张春婷
于辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jilin Venus Intelligent Technology Co ltd
Original Assignee
Jilin Venus Intelligent Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jilin Venus Intelligent Technology Co ltd filed Critical Jilin Venus Intelligent Technology Co ltd
Priority to CN201811580794.8A priority Critical patent/CN109787756B/en
Publication of CN109787756A publication Critical patent/CN109787756A/en
Application granted granted Critical
Publication of CN109787756B publication Critical patent/CN109787756B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses a vehicle-mounted terminal key distribution management method based on a white-box encryption technology, which comprises the following steps: a step of distributing the vehicle-mounted terminal key; and generating a root key of the vehicle-mounted terminal and encrypting and decrypting data. The information safety problem in the whole key life cycle process can be effectively solved and the key leakage is avoided by comprehensively protecting and managing the distribution, storage, use and updating processes of the vehicle-mounted terminal key; and the invention can ensure the storage and use safety of the key on the vehicle-mounted terminal equipment without using an encryption chip, thereby improving the safety, effectively reducing the BOM cost of the vehicle-mounted terminal and reducing the use and maintenance cost of a user.

Description

Vehicle-mounted terminal key distribution management method based on white-box encryption technology
Technical Field
The invention relates to the field of vehicle-mounted terminal information security, in particular to a vehicle-mounted terminal key distribution management method based on a white-box encryption technology.
Background
With the high integration of vehicles and informatization, a vehicle is no longer a separate information island, and the vehicle has a tendency of extranet basically in order to bring more vehicle use services and travel services to users. While ensuring the secure communication, more and more attention is paid to how to ensure the secure distribution, storage and use of the core key in the encryption algorithm.
The key management methods of the current terminal devices mainly include the following two methods:
direct disk access: the secret key distributed when the disk leaves the factory is stored only by adopting the disk, the secret key is directly read from the disk for use during encryption and decryption, and the secret key can be updated on line at regular intervals.
And (3) accessing the encryption chip: the generated key is recorded into the encryption chip before leaving the factory, the encryption and decryption processes are directly completed in the encryption chip, and the encryption chip cannot be read or changed outside, so that complete physical isolation is realized.
However, the mode of directly accessing the key by the disk is adopted, so that the key is easy to illegally obtain, and great potential safety hazard exists. The mode of accessing the key by the encryption chip can cause the problem that the key cannot be updated regularly on line, and the BOM cost of the terminal is increased.
Accordingly, the prior art is subject to further improvement and development.
Disclosure of Invention
In view of the above-mentioned shortcomings of the prior art, an object of the present invention is to provide a vehicle-mounted terminal key distribution management method based on white-box encryption technology, which reduces the cost of key distribution management on the premise of ensuring information security.
In order to solve the technical problem, the scheme of the invention comprises the following steps:
a vehicle-mounted terminal key distribution management method based on white-box encryption technology comprises the following steps:
a step of distributing the vehicle-mounted terminal key;
and generating a root key of the vehicle-mounted terminal and encrypting and decrypting data.
The vehicle-mounted terminal key distribution management method comprises the following steps: key = Keybasic + KeypartTherein, KeybasicIs a basic part, the equipment of the same production batch is the same and is protected by a white box password; key (R)partIs a unique identification part, and each device corresponds to a unique Keypart
The Key distribution management method of the vehicle-mounted terminal comprises the following steps of obtaining the Key in the vehicle-mounted terminalbasicIs injected into the white box firmware to be programmed togetherKey of same batch of equipment in equipmentbasicSame, KeypartCan be obtained by an air interface application.
The vehicle-mounted terminal key distribution management method comprises the following steps:
A. the KEY management center makes and generates the USBKEY, and the digital certificate which marks the identity of the USB KEY is safely stored in an external unreadable security chip in the USB KEY;
B. based on the identity authentication of the USB KEY, the KEY management center receives a white box firmware downloading request of the production line;
C. the production line applies for issuing Key to a Key management center according to the version number of the white box firmwarepartThe key is stored locally in a relationship way;
D. the production line writes corresponding white box firmware into the terminal equipment according to the production batch;
E. the production line sends a corresponding Key according to the unique equipment identification code of the vehicle-mounted terminalpartWriting the data into a device of the vehicle-mounted terminal;
F. removing the USB KEY after the production is finished, and clearing the copy of the local white box firmware and the related KeypartA key.
The vehicle-mounted terminal key distribution management method comprises the following specific steps: the digital certificate of the USB KEY identity is distributed to a production line in a physical distribution mode; the production line security personnel need to insert the USB KEY into a computer and establish an SSL-based encryption channel with the KEY management center.
The vehicle-mounted terminal Key distribution management method comprises the steps that the corresponding software in the white box in the step B generates the version number of the white box firmware of the production line, and the corresponding Key is usedbasicSending the data to the corresponding software to generate a contained KeybasicAnd meanwhile, the white-box software informs the version number of the white-box firmware to a key management center for management.
The vehicle-mounted terminal key distribution management method comprises the following steps of generating a vehicle-mounted terminal root key and encrypting and decrypting data:
white box firmwareInput KeypartAnd plaintext/ciphertext;
inside the white box, with KeybasicIs a Key pair KeypartCarrying out decryption operation;
inside the white box, KeybasicAnd Key after decryptionbasicPerforming combined operation to obtain a required terminal root key;
carrying out encryption and decryption operation by using a terminal root key in the white box;
and outputting the ciphertext/plaintext to the outside of the white box.
The vehicle-mounted terminal key distribution management method further comprises the step of remotely updating a vehicle-mounted terminal root key, and comprises the following steps:
an SSL encryption channel is established between the vehicle-mounted terminal and the central management server;
the central management server issues Key according to the unique identification code of the vehicle-mounted terminalpart
Vehicle-mounted terminal generates random code and uses newly issued KeypartAfter being encrypted, the encrypted data is sent to a Key management center, and the Key management center decrypts the encrypted data after receiving the ciphertext and returns the decrypted data to the vehicle-mounted terminal to compare and confirm a new KeypartThe validity is valid;
with new KeypartReplace the current Keypart
The invention provides a vehicle-mounted terminal key distribution management method based on a white-box encryption technology, which can effectively solve the information safety problem in the whole key life cycle process and avoid key leakage by comprehensively protecting and managing the distribution, storage, use and updating processes of a vehicle-mounted terminal key; and the invention can ensure the storage and use safety of the key on the vehicle-mounted terminal equipment without using an encryption chip, thereby improving the safety, effectively reducing the BOM cost of the vehicle-mounted terminal and reducing the use and maintenance cost of a user.
Drawings
FIG. 1 is a schematic diagram of a key distribution process according to the present invention;
FIG. 2 is a schematic diagram of an encryption and decryption process according to the present invention;
FIG. 3 is a schematic diagram illustrating a remote key update process according to the present invention;
FIG. 4 is a schematic view of a specific flow chart of a key distribution mode of the vehicle-mounted terminal in the invention;
FIG. 5 is a schematic diagram of a specific process of generating a root key and encrypting and decrypting data of a vehicle-mounted terminal according to the present invention;
fig. 6 is a schematic diagram of a specific process for remotely updating a root key of a vehicle-mounted terminal in the present invention.
Detailed Description
The invention provides a vehicle-mounted terminal key distribution management method based on a white-box encryption technology, and the invention is further described in detail below in order to make the purpose, the technical scheme and the effect of the invention clearer and clearer. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
The invention provides a vehicle-mounted terminal key distribution management method based on a white-box encryption technology, which specifically comprises a vehicle-mounted terminal key distribution step and a vehicle-mounted terminal root key generation and data encryption and decryption step as shown in fig. 1 and fig. 2, and can also comprise a step of remotely updating a vehicle-mounted terminal root key in order to better perfect a vehicle-mounted terminal key distribution management party as shown in fig. 3.
More specifically, the vehicle-mounted terminal key is: key = Keybasic + KeypartTherein, KeybasicIs a basic part, the equipment of the same production batch is the same and is protected by a white box password; key (R)partIs a unique identification part, and each device corresponds to a unique Keypart. And Key in vehicle-mounted terminalbasicKey injected into white box firmware and written into equipment together and used for equipment in same batchbasicSame, KeypartCan be obtained by an air interface application.
In another preferred embodiment of the present invention, as shown in fig. 4, the step of distributing the vehicle-mounted terminal key specifically includes:
A. the KEY management center makes and generates the USBKEY, and the digital certificate which marks the identity of the USB KEY is safely stored in an external unreadable security chip in the USB KEY;
B. based on the identity authentication of the USB KEY, the KEY management center receives a white box firmware downloading request of the production line;
C. the production line applies for issuing Key to a Key management center according to the version number of the white box firmwarepartThe key is stored locally in a relationship way;
D. the production line writes corresponding white box firmware into the terminal equipment according to the production batch;
E. the production line sends a corresponding Key according to the unique equipment identification code of the vehicle-mounted terminalpartWriting the data into a device of the vehicle-mounted terminal;
F. removing the USB KEY after the production is finished, and clearing the copy of the local white box firmware and the related KeypartA key.
More specifically, step a specifically further includes: the digital certificate of the USB KEY identity is distributed to a production line in a physical distribution mode; the production line security personnel need to insert the USB KEY into a computer and establish an SSL-based encryption channel with the KEY management center.
And the corresponding software in the white box in the step B generates the version number of the white box firmware of the production line and sends the corresponding KeybasicSending the data to the corresponding software to generate a contained KeybasicAnd meanwhile, the white-box software informs the version number of the white-box firmware to a key management center for management.
When the in-vehicle terminal is used specifically, as shown in fig. 5, the step of generating the root key and encrypting and decrypting the data of the in-vehicle terminal includes:
inputting Key to white box firmwarepartAnd plaintext/ciphertext;
inside the white box, with KeybasicIs a Key pair KeypartCarrying out decryption operation;
inside the white box, KeybasicAnd Key after decryptionbasicPerforming combined operation to obtain a required terminal root key;
carrying out encryption and decryption operation by using a terminal root key in the white box;
and outputting the ciphertext/plaintext to the outside of the white box.
As shown in fig. 6, the step of remotely updating the root key of the vehicle-mounted terminal specifically includes:
an SSL encryption channel is established between the vehicle-mounted terminal and the central management server;
the central management server issues Key according to the unique identification code of the vehicle-mounted terminalpart
Vehicle-mounted terminal generates random code and uses newly issued KeypartAfter being encrypted, the encrypted data is sent to a Key management center, and the Key management center decrypts the encrypted data after receiving the ciphertext and returns the decrypted data to the vehicle-mounted terminal to compare and confirm a new KeypartThe validity is valid;
with new KeypartReplace the current Keypart
In order to further describe the present invention, the following examples are given by way of illustration and not by way of limitation.
The Key system of the integral vehicle-mounted terminal is one vehicle and one secret, and the vehicle-mounted terminal Key is composed of 2 parts:
Key = Keybasic + Keypart
keybasic is a basic part, and the parts of the equipment in the same production batch are the same and protected by white box passwords;
the keycart is unique and the key is different for each device.
Key distribution mode
Key in vehicle-mounted terminalbasicAnd injecting the white box firmware into the device together with programming. Key (R)basicProduct Key related to product batch and same batchbasicThe same is true. Due to KeybasicIs contained in the generated white-box firmware, so that the burning process in the production link can be ensured to be safe.
KeypartMay be applied over the air interface. Due to independent KeypartThe root key cannot be generated and thus the part does not cause a security problem even if it is leaked.
As shown in particular in fig. 4;
the USB KEY is generated by KMC, and the digital certificate for identifying the USB KEY is stored in an external unreadable security chip in the USB KEY. And the information is distributed to the production line in a physical distribution mode (machine essential elements, carrying of information security personnel, on-going application of suppliers and the like). The production line security personnel need to insert the USB KEY into the computer to establish an SSL-based encryption channel with the KMC.
Based on the identity authentication of the USB KEY, the KMC can accept the white box firmware downloading request of the production line. The white box software can generate the version number of the white box firmware of the production line and send the corresponding KeybasicSends it to the software to generate a contained KeybasicAnd meanwhile, the white-box software informs the KMC of the version number of the white-box firmware for management.
Thirdly, the production line can apply for issuing Key to KMC according to the version number of the white box firmwarepartKeys and performs relational storage locally. Key (R)basicAnd KeypartIs in one-to-many relationship and is internally provided with a corresponding Key in the KMCbasicAnd (5) encrypting and storing the key.
And fourthly, the production line writes the corresponding white box firmware into the terminal equipment according to the production batch.
The production line sends the corresponding Key according to the unique identification code of the terminal equipmentpartAnd writing into the terminal equipment.
Sixthly, removing the USB KEY after the production is finished, and clearing the copy of the local white box firmware and the related Keyparthe t key.
3. As shown in fig. 5, the process of generating the root key and encrypting and decrypting the data is as follows:
inputting Key to white box firmwarepartAnd plaintext/ciphertext.
② in the white box with KeybasicIs a Key pair KeypartAnd carrying out decryption operation.
③ inside the white box, KeybasicAnd Key after decryptionbasicAnd carrying out combined operation to obtain the required terminal root key.
And fourthly, performing encryption and decryption operation by using the terminal root key in the white box.
Fifthly, outputting the ciphertext/plaintext to the outside of the white box.
4. The remote updating of the root key of the terminal, as shown in fig. 6, proceeds as follows:
an SSL encryption channel is established between the terminal and a CMS (Content Management System).
CMS issues Key according to terminal equipment unique identification codepart
Thirdly, the terminal generates random code and uses the newly issued KeypartEncrypted and sent to the KMS, and the KMS receives the ciphertext, decrypts the ciphertext and returns the ciphertext to the terminal side to compare and confirm the new KeypartThe method is legal and effective.
Fourthly, use the new KeypartReplace the current Keypart
It should be understood, however, that the description herein of specific embodiments is not intended to limit the invention to the particular forms disclosed, but on the contrary, the intention is to cover all modifications, equivalents, and alternatives falling within the spirit and scope of the invention as defined by the appended claims.

Claims (5)

1. A vehicle-mounted terminal key distribution management method based on white-box encryption technology is characterized by comprising the following steps:
a step of distributing the vehicle-mounted terminal key;
generating a root key of the vehicle-mounted terminal and encrypting and decrypting data;
the vehicle-mounted terminal key is as follows: key = Keybasic + Key partTherein, KeybasicIs a basic part, the equipment of the same production batch is the same and is protected by a white box password; key (R)part Is a unique identification part, and each device corresponds to a unique Keypart
The step of distributing the vehicle-mounted terminal key specifically includes:
A. the KEY management center makes and generates the USBKEY, and the digital certificate which marks the identity of the USB KEY is safely stored in an external unreadable security chip in the USB KEY;
B. based on the identity authentication of the USB KEY, the KEY management center receives a white box firmware downloading request of the production line;
C. the production line applies for issuing Key to a Key management center according to the version number of the white box firmwarepartThe key is stored locally;
D. the production line writes corresponding white box firmware into the terminal equipment according to the production batch;
E. the production line sends a corresponding Key according to the unique equipment identification code of the vehicle-mounted terminalpartWriting the data into a device of the vehicle-mounted terminal;
F. removing the USB KEY after the production is finished, and clearing the copy of the local white box firmware and the related Keypart A secret key;
the steps of generating the root key of the vehicle-mounted terminal and encrypting and decrypting the data comprise:
inputting Key to white box firmware partAnd plaintext/ciphertext;
inside the white box, with KeybasicIs a Key pair Key partCarrying out decryption operation;
inside the white box, Keybasic And Key after decryption partPerforming combined operation to obtain a required terminal root key; the Key system of the integral vehicle-mounted terminal is one vehicle and one secret, and the vehicle-mounted terminal Key is composed of 2 parts: key = Keybasic + Keypart;KeybasicIs a basic part, the equipment of the same production batch is the same and is protected by a white box password; key (R)partIs unique, the key for each device is different;
carrying out encryption and decryption operation by using a terminal root key in the white box;
and outputting the ciphertext/plaintext to the outside of the white box.
2. The vehicle-mounted terminal Key distribution management method according to claim 1, characterized in that Key in vehicle-mounted terminalbasicKey injected into white box firmware and written into equipment together and used for equipment in same batchbasicSame, KeypartCan be obtained by an air interface application.
3. The vehicle-mounted terminal key distribution management method according to claim 2, wherein step a further specifically includes: the digital certificate of the USB KEY identity is distributed to a production line in a physical distribution mode; the production line security personnel need to insert the USBKEY into a computer and establish an SSL-based encryption channel with a key management center.
4. The vehicle-mounted terminal Key distribution management method according to claim 2, wherein the corresponding software in the white box in the step B generates the version number of the white box firmware of the production line, and sends the corresponding Keybasic Sending the data to the corresponding software to generate a contained KeybasicAnd meanwhile, the white-box software informs the version number of the white-box firmware to a key management center for management.
5. The vehicle-mounted terminal key distribution management method according to claim 1, further comprising a step of remotely updating a vehicle-mounted terminal root key, including:
an SSL encryption channel is established between the vehicle-mounted terminal and the central management server;
the central management server issues Key according to the unique identification code of the vehicle-mounted terminalpart
Vehicle-mounted terminal generates random code and uses newly issued KeypartAfter being encrypted, the encrypted data is sent to a Key management center, and the Key management center decrypts the encrypted data after receiving the ciphertext and returns the decrypted data to the vehicle-mounted terminal to compare and confirm a new KeypartThe validity is valid;
with new Keypart Replace the current Keypart
CN201811580794.8A 2018-12-24 2018-12-24 Vehicle-mounted terminal key distribution management method based on white-box encryption technology Active CN109787756B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811580794.8A CN109787756B (en) 2018-12-24 2018-12-24 Vehicle-mounted terminal key distribution management method based on white-box encryption technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811580794.8A CN109787756B (en) 2018-12-24 2018-12-24 Vehicle-mounted terminal key distribution management method based on white-box encryption technology

Publications (2)

Publication Number Publication Date
CN109787756A CN109787756A (en) 2019-05-21
CN109787756B true CN109787756B (en) 2021-11-26

Family

ID=66498177

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811580794.8A Active CN109787756B (en) 2018-12-24 2018-12-24 Vehicle-mounted terminal key distribution management method based on white-box encryption technology

Country Status (1)

Country Link
CN (1) CN109787756B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110263526B (en) * 2019-06-13 2023-08-18 惠州市德赛西威汽车电子股份有限公司 Production line certificate injection system and method thereof
CN110417548A (en) * 2019-07-26 2019-11-05 交通运输部公路科学研究所 A kind of bus or train route contract network method for security protection based on digital certificates
CN111695166B (en) * 2020-06-11 2023-06-06 阿波罗智联(北京)科技有限公司 Disk encryption protection method and device
CN115988488B (en) * 2023-03-21 2023-06-30 北京全路通信信号研究设计院集团有限公司 Method and device for on-line centralized updating of vehicle-mounted secret key

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007120024A1 (en) * 2006-04-19 2007-10-25 Electronics And Telecommunications Research Institute The efficient generation method of authorization key for mobile communication
CN102752635A (en) * 2012-02-23 2012-10-24 中央电视台 Downloadable and replaceable condition receiving system
CN106230583A (en) * 2016-07-19 2016-12-14 成都安程通科技有限公司 Automobile ecu information monitoring system
CN106330868A (en) * 2016-08-14 2017-01-11 北京数盾信息科技有限公司 Encrypted storage key management system and method of high-speed network
CN108282467A (en) * 2017-12-29 2018-07-13 北京握奇智能科技有限公司 The application process of digital certificate, system
CN108287999A (en) * 2017-01-10 2018-07-17 厦门雅迅网络股份有限公司 A kind of startup method that system based on TrustZone is credible
CN108304722A (en) * 2017-12-21 2018-07-20 广州小鹏汽车科技有限公司 A kind of software installation packet and its generation method, upgrade method and system
CN108629207A (en) * 2017-03-22 2018-10-09 温科尼克斯多夫国际有限公司 The system and method that information based on peripheral equipment generates encryption key
CN108989024A (en) * 2018-06-29 2018-12-11 百度在线网络技术(北京)有限公司 Control method, apparatus, equipment, storage medium and the corresponding vehicle communicated between electronic control unit in the car

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9195858B2 (en) * 2009-08-04 2015-11-24 Seagate Technology Llc Encrypted data storage device
US20120137137A1 (en) * 2010-11-30 2012-05-31 Brickell Ernest F Method and apparatus for key provisioning of hardware devices
US8898767B1 (en) * 2011-09-22 2014-11-25 Mountain Top Digital, L.L.C. Methods and apparatuses for digital content protection

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007120024A1 (en) * 2006-04-19 2007-10-25 Electronics And Telecommunications Research Institute The efficient generation method of authorization key for mobile communication
CN102752635A (en) * 2012-02-23 2012-10-24 中央电视台 Downloadable and replaceable condition receiving system
CN106230583A (en) * 2016-07-19 2016-12-14 成都安程通科技有限公司 Automobile ecu information monitoring system
CN106330868A (en) * 2016-08-14 2017-01-11 北京数盾信息科技有限公司 Encrypted storage key management system and method of high-speed network
CN108287999A (en) * 2017-01-10 2018-07-17 厦门雅迅网络股份有限公司 A kind of startup method that system based on TrustZone is credible
CN108629207A (en) * 2017-03-22 2018-10-09 温科尼克斯多夫国际有限公司 The system and method that information based on peripheral equipment generates encryption key
CN108304722A (en) * 2017-12-21 2018-07-20 广州小鹏汽车科技有限公司 A kind of software installation packet and its generation method, upgrade method and system
CN108282467A (en) * 2017-12-29 2018-07-13 北京握奇智能科技有限公司 The application process of digital certificate, system
CN108989024A (en) * 2018-06-29 2018-12-11 百度在线网络技术(北京)有限公司 Control method, apparatus, equipment, storage medium and the corresponding vehicle communicated between electronic control unit in the car

Also Published As

Publication number Publication date
CN109787756A (en) 2019-05-21

Similar Documents

Publication Publication Date Title
CN109787756B (en) Vehicle-mounted terminal key distribution management method based on white-box encryption technology
CN100552793C (en) Method and apparatus and pocket memory based on the Digital Right Management playback of content
KR101043336B1 (en) Method and apparatus for acquiring and removing informations of digital right objects
CN100417064C (en) Information processing system and its method, information recording medium and ,program providing medium
US8635453B2 (en) Controller to be incorporated in storage medium device, storage medium device, system for manufacturing storage medium device, and method for manufacturing storage medium device
CN103366102A (en) Digital rights management system for transfer of content and distribution
CN101262332A (en) Method and system for mutual authentication between mobile and host devices
JP5159916B2 (en) host
CN101742072A (en) Anti-copy method for set-top box software
CN102761790A (en) Digital-watermark-based digital copyright management method and device for IPTV terminals
CN101951315A (en) Key processing method and device
US8693694B2 (en) Information recording device
CN112507296B (en) User login verification method and system based on blockchain
CN111385085B (en) Quantum three-level key system implementation method and system
JP5050114B1 (en) Information recording device
WO2018157724A1 (en) Method for protecting encrypted control word, hardware security module, main chip and terminal
CN104394467B (en) The method for down loading and set top box of set-top box application program
CN102647393B (en) Digital signage content piracy prevention method
CN105915345A (en) Realization method for authorized production and reform in home gateway device production testing
CN101171791B (en) Method and apparatus for efficiently encrypting/decrypting digital content according to broadcast encryption scheme
CN110300289B (en) Video safety management system and method
CN102510374B (en) License management method and device capable of detecting clone for front-end system
CN101174287B (en) Method and apparatus for digital rights management
CN113836516B (en) Printer selenium drum anti-counterfeiting and printing frequency protection system and method
TWI430643B (en) Secure key recovery system and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant