CN111954073B - Method for quickly realizing android set top box production software and related products - Google Patents
Method for quickly realizing android set top box production software and related products Download PDFInfo
- Publication number
- CN111954073B CN111954073B CN202010682534.2A CN202010682534A CN111954073B CN 111954073 B CN111954073 B CN 111954073B CN 202010682534 A CN202010682534 A CN 202010682534A CN 111954073 B CN111954073 B CN 111954073B
- Authority
- CN
- China
- Prior art keywords
- advanced
- top box
- starting
- advanced security
- bootloader
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/443—OS processes, e.g. booting an STB, implementing a Java virtual machine in an STB or power management in an STB
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/575—Secure boot
Abstract
The embodiment of the application provides a method for quickly realizing android set top box production software, which is applied to a set top box and comprises the following steps: after the set top box is powered on, starting the universal bootloader, and reading the advanced safety zone bit area; the universal bootloader is a non-advanced security system; if the advanced safety system is not started, starting an automatic testing tool for mass production, receiving and writing the advanced safety key after the assembly test is finished, starting the advanced safety system, and writing the mark of the advanced safety system to the region of the advanced safety mark. The technical scheme that this application provided has efficient advantage.
Description
Technical Field
The application relates to the technical field of video set-top box equipment, in particular to a method for quickly realizing android set-top box production software and a related product.
Background
With the development of technology, the demand of set top boxes is very large worldwide. However, the existing set-top box has great importance on the protection of contents, and basically all set-top boxes are high-level and safe, namely, the flash is prevented, and any software in the set-top boxes is modified in a mode so as to achieve the double protection of data and software. But the most important production mode of the high-level security is the high-level security of the set-top box, and once the high-level security is opened, all images in the system must be matched. Therefore, the production mode of the general set-top box is to use a set of non-advanced security system, then open the advanced security in the non-high security system, and refresh the whole software. Because the existing systems are all bigger, the flash is written twice in the production process, especially for an android set-top box, the mirror image of the android set-top box generally has about 2G, so that the flash writing twice consumes about 5-10 minutes (including production test), and the production efficiency is very low for mass production.
Disclosure of Invention
The embodiment of the application discloses a method for quickly realizing android set top box production software, which can improve the production efficiency of a set top box.
The first aspect of the embodiment of the application discloses a method for quickly realizing android set top box production software, which is applied to a set top box and comprises the following steps:
after the set top box is powered on, starting the universal bootloader, and reading the advanced safety zone bit area; the universal bootloader is a non-advanced security system;
if the advanced safety system is not started, starting an automatic testing tool for mass production, receiving and writing the advanced safety secret key after the assembly test is completed, starting the advanced safety system, and writing the identification of the advanced safety system to the advanced safety zone bit area.
In a second aspect, a set-top box is provided, the set-top box comprising:
the starting reading unit is used for starting the universal bootloader and reading the advanced safety zone bit area after the set top box is powered on; the universal bootloader is a non-advanced safety system;
and the processing unit is used for starting an automatic test tool for mass production if the advanced safety system is not started, receiving and writing the advanced safety key after the assembly test is finished, starting the advanced safety system, and writing the identification of the advanced safety system to the advanced safety zone bit area.
In a third aspect, a computer-readable storage medium is provided, characterized in that a computer program for electronic data exchange is stored, wherein the computer program causes a computer to perform the method provided in the first aspect.
By implementing the embodiment of the application, the technical scheme provided by the application only needs to write the flash once, then refers to the non-high-security boot for starting, realizes high-security starting in the starting process, and simultaneously only moves the high-security boot. Since the boot is small, the entire transfer process takes only a few seconds. Thus the time to produce a high security set top box can be reduced to 1 to 2 minutes (including production testing). The production efficiency is greatly improved. Meanwhile, the method also adopts a temporary guide verification mode, so that the successful opening of the high-security boot is ensured, and the problem of chip damage caused by high-security boot opening is greatly reduced.
Drawings
The drawings used in the embodiments of the present application are described below.
Fig. 1 is a schematic structural diagram of a set top box according to an embodiment of the present application;
fig. 2 is a schematic flow chart of a method for quickly implementing android set top box production software provided in an embodiment of the present application;
fig. 3 is a schematic flow chart illustrating a rapid implementation process of android set top box production software according to an embodiment of the present application;
fig. 4 is a schematic partition diagram provided in an embodiment of the present application.
Fig. 5 is a schematic structural diagram of a set top box according to an embodiment of the present application.
Detailed Description
The embodiments of the present application will be described below with reference to the drawings.
The term "and/or" in this application is only one kind of association relationship describing the association object, and means that there may be three kinds of relationships, for example, a and/or B, and may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the character "/" in this document indicates that the former and latter related objects are in an "or" relationship.
The "plurality" appearing in the embodiments of the present application means two or more. The descriptions of the first, second, etc. appearing in the embodiments of the present application are only for illustrating and differentiating the objects, and do not represent the order or the particular limitation of the number of the devices in the embodiments of the present application, and do not constitute any limitation to the embodiments of the present application. The term "connect" in the embodiments of the present application refers to various connection manners, such as direct connection or indirect connection, to implement communication between devices, which is not limited in this embodiment of the present application.
The set-top box in the embodiments of the present application may refer to various forms of UE, access set-top box, subscriber unit, subscriber station, mobile station, MS (mobile station), remote station, remote set-top box, mobile device, computer, server, cloud system user set-top box, set-top box device (terminal equipment), wireless communication device, user agent, or user equipment. The set-top box device may also be a cellular phone, a cordless phone, an SIP (session initiation protocol) phone, a WLL (wireless local loop) station, a PDA (personal digital assistant) in chinese), a handheld device with wireless communication function, a computing device or other processing device connected to a wireless modem, a vehicle-mounted device, a wearable device, a set-top box device in a future 5G network or a set-top box device in a future evolved PLMN (public land mobile network in chinese), and the like, which is not limited in the embodiments of the present application.
Referring to fig. 1, fig. 1 is a schematic structural diagram of a set-top box, as shown in fig. 1, the set-top box may include: processor 101, input unit 102, communication module 103, memory 104 and camera 105.
The input unit 102 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the set-top box. Specifically, the input unit 102 may include a touch display screen, a fingerprint recognition device, and other input devices. The fingerprint identification device can set up alone, and certainly in practical application, the fingerprint identification device also can combine to the touch-control display screen, realizes fingerprint under the screen promptly. The input unit may also include other input devices. In particular, other input devices may include, but are not limited to, one or more of physical keys, function keys (such as volume control keys, switch keys, etc.), a trackball, a mouse, a joystick, and the like.
The processor 101 is a control center of the set-top box, connects various parts of the whole set-top box by using various interfaces and lines, and performs various functions of the set-top box and processes data by operating or executing software programs and/or modules stored in the memory 104 and calling data stored in the memory 104, thereby performing overall monitoring or control of the set-top box. Alternatively, processor 101 may include one or more processing units; optionally, the processor 101 may integrate an application processor, a modem processor, and an artificial intelligence chip, where the application processor mainly processes an operating system, a user interface, an application program, and the like, the modem processor mainly processes wireless communication, and the artificial intelligence chip mainly implements calculation of a neural network model. It will be appreciated that the modem processor or artificial intelligence chip described above may not be integrated into the processor 101.
Further, the memory 104 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
The communication module 103 may be used for receiving and transmitting information. Generally, the communication module 103 includes, but is not limited to, an antenna, at least one Amplifier, a transceiver, a coupler, a Low Noise Amplifier (LNA), a duplexer, and the like. In addition, the communication module 103 can also communicate with a network and other devices through wireless communication. The wireless communication may use any communication standard or protocol, including but not limited to Global System for Mobile communication (GSM), General Packet Radio Service (GPRS), Code Division Multiple Access (CDMA), Wideband Code Division Multiple Access (WCDMA), Long Term Evolution (LTE), email, Short Messaging Service (SMS), and the like.
The camera 105 may be used to capture a picture, scan a two-dimensional code, and so on, and process image data. The camera 105 specifically can include a front camera or a rear camera, and also can include two cameras for the rear camera, certainly can also be two camera settings for the front camera, and this application is not restricted to the quantity and the specific position of camera, and the picture that camera 105 gathered can be transmitted for and carries out relevant processing for processor 101.
Referring to fig. 2, fig. 2 provides a method for quickly implementing android set-top box production software, where the method is executed by a set-top box shown in fig. 1, and the method is shown in fig. 2, and includes the following steps:
step S201, after the set top box is powered on, starting a universal bootloader, and reading an advanced safety zone bit area; the universal bootloader is a non-advanced security system;
step S202, if the advanced safety system is not started, starting an automatic test tool for mass production, and after the assembly test is completed, receiving and writing an advanced safety secret key;
and step S203, starting the advanced security system, and writing the identification of the advanced security system to the advanced security zone bit area.
According to the technical scheme, the flash is written once, then the non-high-security boot is started, high-security opening is achieved in the starting process, and meanwhile, only the high-security boot is moved. Since the boot is small, the entire transfer process takes only a few seconds. Thus the time to produce a high security set top box can be reduced to 1 to 2 minutes (including production testing). The production efficiency is greatly improved. Meanwhile, the method also adopts a temporary guide verification mode, so that the successful opening of the high-security boot is ensured, and the problem of chip damage caused by high-security boot opening is greatly reduced.
In an alternative arrangement, the first and second electrodes may be,
if the advanced security zone bit area has no advanced security system identification, determining that the advanced security system is not started;
and if the high-level safety zone bit area has the high-level safety system identification, determining to start the high-level safety system.
In one alternative, the method further comprises:
and if the advanced security system is started, starting the bootloader of the advanced security system.
In one alternative, the method further comprises:
and after the advanced security system is started, the successful starting result is sent to the number writing computer.
In one alternative, the method further comprises:
if the power is off, the set-top box repeats the power-on steps S201-S203.
Making mirror images
The mirror image manufacturing is a key of the method, because the whole flash memory chip is burned in the factory mass production, then the chip is welded on the mainboard, and the running system is loaded through the program in the flash.
The image consists of three parts, one part is a universal bootloader of non-high security (advanced security system), the second part is a high security image and the high security bootloader, and the third part is a zone bit area of advanced security.
And the non-high-security bootloader is used for starting the production testing tool, starting high security after the production testing is finished, simultaneously saving a starting mark in the partition, and determining whether the non-high-security bootloader is started to the high-security bootloader or the non-high-security bootloader.
The high-security mirror image and the high-security bootloader are used for starting the high-security system which is normally started after the high-security is started.
And the advanced security zone bit area, the data of which is bound with the chip information through algorithm encryption.
Example one
Referring to fig. 3, the high safety process of the software production in the embodiment of the present application, the partitioning of the set top box is shown in fig. 4, which may specifically include:
1. after power-on, starting the non-high-security bootloader, reading the high-security flag bit region by the non-high-security bootloader, and obtaining a value by a correlation algorithm.
2. And if the high security is already started, starting the high security bootloader and starting the system normally.
3. If the high security is not started, the test method is a factory mass production mode, the bootloader starts an automatic mass production test tool, and a production line worker can test hardware assembly.
4. After the assembly test is finished, connecting a computer special for writing numbers, and writing related high-security keys
5. And after the high-security key is written, starting high security, and writing the identification bit into the zone bit area.
6. And after the high security is started, returning a successful result of the high security starting to the number writing computer, and making data statistics by the computer.
Because the process of mirror image burning is not carried out in the process, the box software can still repeat the process from 1 to 6 even if the power is abnormally cut off midway. This simplifies the work steps for the worker while ensuring that the probability of chip damage is minimized.
Thus, the production process of one box on the production line is very short, and if workers test the production quickly, one box can complete high-safety production within 1 minute.
This also ensures the security of the system because if any partition in the image is replaced, it will not boot.
Referring to fig. 5, fig. 5 provides a set-top box comprising:
the starting reading unit 501 is used for starting the universal bootloader and reading the high-level safety zone bit area after the set top box is powered on; the universal bootloader is a non-advanced safety system;
the processing unit 502 is configured to start an automatic test tool for mass production if the advanced security system is not started, receive and write in an advanced security key after the assembly test is completed, start the advanced security system, and write in an identifier of the advanced security system to an area of an advanced security flag.
Optionally, the processing unit is specifically configured to determine that the advanced security system is not started if the advanced security flag region has no advanced security system identifier;
and if the high-level safety zone bit area has the high-level safety system identification, determining to start the high-level safety system.
Optionally, the processing unit is specifically configured to start the advanced security system bootloader if the advanced security system is started.
Optionally, the processing unit is further configured to send a successful opening result to the number writing computer after the advanced security system is opened.
An embodiment of the present application further provides a computer-readable storage medium, in which a computer program is stored, and when the computer program runs on a network device, the method flow shown in fig. 2 is implemented.
An embodiment of the present application further provides a computer program product, and when the computer program product runs on a set top box, the method flow shown in fig. 2 is implemented.
Embodiments of the present application also provide a set-top box, comprising a processor, a memory, a communication interface, and one or more programs stored in the memory and configured to be executed by the processor, the programs including instructions for performing the steps in the method of the embodiment shown in fig. 2.
The above description has introduced the solution of the embodiment of the present application mainly from the perspective of the method-side implementation process. It is understood that the electronic device comprises corresponding hardware structures and/or software modules for performing the respective functions in order to realize the above-mentioned functions. Those of skill in the art will readily appreciate that the present application is capable of hardware or a combination of hardware and computer software implementing the various illustrative elements and algorithm steps described in connection with the embodiments provided herein. Whether a function is performed as hardware or computer software drives hardware depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the embodiment of the present application, the electronic device may be divided into the functional units according to the method example, for example, each functional unit may be divided corresponding to each function, or two or more functions may be integrated into one processing unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit. It should be noted that the division of the unit in the embodiment of the present application is schematic, and is only a logic function division, and there may be another division manner in actual implementation.
Embodiments of the present application also provide a computer storage medium, where the computer storage medium stores a computer program for electronic data exchange, the computer program enabling a computer to execute part or all of the steps of any one of the methods described in the above method embodiments, and the computer includes an electronic device.
Embodiments of the present application also provide a computer program product comprising a non-transitory computer readable storage medium storing a computer program operable to cause a computer to perform some or all of the steps of any one of the methods as set out in the above method embodiments. The computer program product may be a software installation package, the computer comprising an electronic device.
It should be noted that, for simplicity of description, the above-mentioned method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present application is not limited by the order of acts described, as some steps may occur in other orders or concurrently depending on the application. Further, those skilled in the art will recognize that the embodiments described in this specification are preferred embodiments and that acts or modules referred to are not necessarily required for this application.
In the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus may be implemented in other manners. For example, the above-described embodiments of the apparatus are merely illustrative, and for example, the above-described division of the units is only one type of division of logical functions, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of some interfaces, devices or units, and may be an electric or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit may be stored in a computer readable memory if it is implemented in the form of a software functional unit and sold or used as a stand-alone product. Based on such understanding, the technical solution of the present application may be substantially implemented or a part of or all or part of the technical solution contributing to the prior art may be embodied in the form of a software product stored in a memory, and including several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the above-mentioned method of the embodiments of the present application. And the aforementioned memory comprises: a U-disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic or optical disk, and other various media capable of storing program codes.
Those skilled in the art will appreciate that all or part of the steps in the methods of the above embodiments may be implemented by associated hardware instructed by a program, which may be stored in a computer-readable memory, which may include: flash Memory disks, Read-Only memories (ROMs), Random Access Memories (RAMs), magnetic or optical disks, and the like.
The foregoing detailed description of the embodiments of the present application has been presented to illustrate the principles and implementations of the present application, and the above description of the embodiments is only provided to help understand the method and the core concept of the present application; meanwhile, for a person skilled in the art, according to the idea of the present application, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present application.
Claims (6)
1. A method for quickly realizing android set top box production software is characterized in that the method is applied to a set top box and comprises the following steps:
after the set top box is powered on, starting the universal bootloader, and reading the advanced safety zone bit area; the universal bootloader is a bootloader of a non-advanced security system, and data in an advanced security zone bit area is bound with chip information through encryption;
if the advanced safety system is not started, starting an automatic test tool for mass production, receiving and writing an advanced safety key after the assembly test is finished, starting the advanced safety system, starting a bootloader of the advanced safety system, and writing an identifier of the advanced safety system to an advanced safety zone bit region;
the method further comprises the following steps:
if the advanced security zone bit area has no advanced security system identification, determining that the advanced security system is not started;
and if the high-level safety zone bit area has the high-level safety system identification, determining to start the high-level safety system.
2. The method of claim 1, further comprising:
and after the advanced security system is started, the successful starting result is sent to the number writing computer.
3. The method of claim 2, further comprising:
and if the power is off, the set top box repeats the power-on step.
4. A set top box, comprising:
the starting reading unit is used for starting the universal bootloader and reading the advanced safety zone bit area after the set top box is powered on; the universal bootloader is a bootloader of a non-advanced security system, and data in an advanced security zone bit area is bound with chip information through encryption;
the processing unit is used for starting an automatic testing tool for mass production if the advanced security system is not started, receiving and writing an advanced security key after the assembly test is finished, starting the advanced security system, starting a bootloader of the advanced security system, and writing the bootloader of the advanced security system into an advanced security zone bit area;
the processing unit is specifically configured to determine that the advanced security system is not started if the advanced security zone bit region does not have an advanced security system identifier;
and if the high-level safety zone bit area has the high-level safety system identification, determining to start the high-level safety system.
5. The set top box of claim 4,
and the processing unit is also used for sending the successful opening result to the number writing computer after the advanced security system is opened.
6. A computer-readable storage medium, characterized in that a computer program for electronic data exchange is stored, wherein the computer program causes a computer to perform the method according to any one of claims 1-3.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010682534.2A CN111954073B (en) | 2020-07-15 | 2020-07-15 | Method for quickly realizing android set top box production software and related products |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010682534.2A CN111954073B (en) | 2020-07-15 | 2020-07-15 | Method for quickly realizing android set top box production software and related products |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111954073A CN111954073A (en) | 2020-11-17 |
CN111954073B true CN111954073B (en) | 2022-07-12 |
Family
ID=73339938
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010682534.2A Active CN111954073B (en) | 2020-07-15 | 2020-07-15 | Method for quickly realizing android set top box production software and related products |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111954073B (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101562686A (en) * | 2009-04-29 | 2009-10-21 | 山东泰信电子有限公司 | Method for downloading software of universal set-top box (STB) platform |
CN101710240A (en) * | 2009-11-18 | 2010-05-19 | 深圳市九洲电器有限公司 | Set-top box production control system |
CN102572591A (en) * | 2011-12-09 | 2012-07-11 | 深圳创维数字技术股份有限公司 | Method and device for producing advanced security digital television set-top box |
CN103544034A (en) * | 2013-10-12 | 2014-01-29 | 深圳市九洲电器有限公司 | Set top box (STB) and method and system for dynamically loading drive of STB |
CN103888835A (en) * | 2014-04-17 | 2014-06-25 | 江苏银河电子股份有限公司 | Safety certification method of intelligent set top box |
CN103955648A (en) * | 2014-05-15 | 2014-07-30 | 乐视致新电子科技(天津)有限公司 | Method and device for verifying legality of system image |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102156647B (en) * | 2011-01-26 | 2013-10-09 | 深圳市九洲电器有限公司 | Advanced safety setting method and advanced safety setting device for main chip of set-top box |
US20140230052A1 (en) * | 2013-02-11 | 2014-08-14 | Motorola Mobility Llc | System and method for testing a secured manufactured device |
CN103220578B (en) * | 2013-03-26 | 2016-03-09 | 深圳市九洲电器有限公司 | A kind of high safe machine top box and production method, system |
CN103258153A (en) * | 2013-04-19 | 2013-08-21 | 深圳创维数字技术股份有限公司 | Method for achieving safeguard in digital television terminal and digital television terminal |
CN103986954B (en) * | 2014-05-15 | 2017-08-25 | 深圳市九洲电器有限公司 | A kind of set top box method of controlling security and system |
CN104394466B (en) * | 2014-12-09 | 2017-10-31 | 北京四达时代软件技术股份有限公司 | High safety set top box production method |
CN105142022A (en) * | 2015-08-12 | 2015-12-09 | 浪潮软件集团有限公司 | Production upgrading method for high-security set top box |
US20180365406A1 (en) * | 2017-06-20 | 2018-12-20 | Qualcomm Incorporated | Methods and systems for providing advanced secure boot features to limited-resource peripheral devices by using a secure processor |
-
2020
- 2020-07-15 CN CN202010682534.2A patent/CN111954073B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101562686A (en) * | 2009-04-29 | 2009-10-21 | 山东泰信电子有限公司 | Method for downloading software of universal set-top box (STB) platform |
CN101710240A (en) * | 2009-11-18 | 2010-05-19 | 深圳市九洲电器有限公司 | Set-top box production control system |
CN102572591A (en) * | 2011-12-09 | 2012-07-11 | 深圳创维数字技术股份有限公司 | Method and device for producing advanced security digital television set-top box |
CN103544034A (en) * | 2013-10-12 | 2014-01-29 | 深圳市九洲电器有限公司 | Set top box (STB) and method and system for dynamically loading drive of STB |
CN103888835A (en) * | 2014-04-17 | 2014-06-25 | 江苏银河电子股份有限公司 | Safety certification method of intelligent set top box |
CN103955648A (en) * | 2014-05-15 | 2014-07-30 | 乐视致新电子科技(天津)有限公司 | Method and device for verifying legality of system image |
Non-Patent Citations (2)
Title |
---|
一种安全的智能机顶盒实现方案;胡冰松等;《电信科学》;20130420(第04期);全文 * |
机顶盒高级安全启动系统的功能分析与实现;袁苇;《科学技术创新》;20170715(第20期);全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN111954073A (en) | 2020-11-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102317884B (en) | For supporting the wake up trigger signal of multiple user interfaces, environment and/or virtual machine | |
CN102299729B (en) | A kind of information transferring method and device | |
US8838094B2 (en) | Acquiring information from volatile memory of a mobile device | |
CN103731810A (en) | Access point sharing method and device | |
CN106502826A (en) | Data backup and transmission method and mobile terminal | |
WO2020156255A1 (en) | Payment method, device, system, mobile terminal, payment machine, and server | |
CN103796197A (en) | Bluetooth technology based method, apparatus and system for establishing wireless communication channel | |
CN107708084B (en) | Data processing method and device, computer equipment and computer readable storage medium | |
CN104967593A (en) | Identity verification method, apparatus and system | |
CN106445743A (en) | Data backup transmission method and mobile terminal | |
CN104469771A (en) | Data transmission method for having access to cellular mobile network system and associated equipment | |
CN104751105A (en) | Fingerprint data verification method, fingerprint data verification device, related equipment and system | |
CN104244206A (en) | Method, device and terminal device for processing short message | |
CN104751086A (en) | Terminal anti-theft method | |
CN104936167A (en) | Card writing method, system and equipment | |
CN106599663A (en) | Information security protecting method and mobile terminal | |
CN105246075A (en) | Access point connecting method and device | |
CN108876611B (en) | Transaction information processing method and device and block link points | |
CN101516087A (en) | Storage system of mobile terminal and access control method | |
CN111954073B (en) | Method for quickly realizing android set top box production software and related products | |
CN102667806B (en) | A chip card, an electronic system, a method being implemented by a chip card and a computer program product | |
CN102647506A (en) | Mobile phone secret divulgence prevention method | |
CN111160157A (en) | Text extraction method based on DWG drawing and related product | |
CN106572226A (en) | Contact person sharing method, address list sharing terminal and address list receiving terminal | |
CN106453200A (en) | Data service accessing method and terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |