CN111954073B - Method for quickly realizing android set top box production software and related products - Google Patents

Method for quickly realizing android set top box production software and related products Download PDF

Info

Publication number
CN111954073B
CN111954073B CN202010682534.2A CN202010682534A CN111954073B CN 111954073 B CN111954073 B CN 111954073B CN 202010682534 A CN202010682534 A CN 202010682534A CN 111954073 B CN111954073 B CN 111954073B
Authority
CN
China
Prior art keywords
advanced
top box
starting
advanced security
bootloader
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010682534.2A
Other languages
Chinese (zh)
Other versions
CN111954073A (en
Inventor
邓鹏�
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Jiuzhou Electric Appliance Co Ltd
Original Assignee
Shenzhen Jiuzhou Electric Appliance Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Jiuzhou Electric Appliance Co Ltd filed Critical Shenzhen Jiuzhou Electric Appliance Co Ltd
Priority to CN202010682534.2A priority Critical patent/CN111954073B/en
Publication of CN111954073A publication Critical patent/CN111954073A/en
Application granted granted Critical
Publication of CN111954073B publication Critical patent/CN111954073B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/443OS processes, e.g. booting an STB, implementing a Java virtual machine in an STB or power management in an STB
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/575Secure boot

Abstract

The embodiment of the application provides a method for quickly realizing android set top box production software, which is applied to a set top box and comprises the following steps: after the set top box is powered on, starting the universal bootloader, and reading the advanced safety zone bit area; the universal bootloader is a non-advanced security system; if the advanced safety system is not started, starting an automatic testing tool for mass production, receiving and writing the advanced safety key after the assembly test is finished, starting the advanced safety system, and writing the mark of the advanced safety system to the region of the advanced safety mark. The technical scheme that this application provided has efficient advantage.

Description

Method for quickly realizing android set top box production software and related products
Technical Field
The application relates to the technical field of video set-top box equipment, in particular to a method for quickly realizing android set-top box production software and a related product.
Background
With the development of technology, the demand of set top boxes is very large worldwide. However, the existing set-top box has great importance on the protection of contents, and basically all set-top boxes are high-level and safe, namely, the flash is prevented, and any software in the set-top boxes is modified in a mode so as to achieve the double protection of data and software. But the most important production mode of the high-level security is the high-level security of the set-top box, and once the high-level security is opened, all images in the system must be matched. Therefore, the production mode of the general set-top box is to use a set of non-advanced security system, then open the advanced security in the non-high security system, and refresh the whole software. Because the existing systems are all bigger, the flash is written twice in the production process, especially for an android set-top box, the mirror image of the android set-top box generally has about 2G, so that the flash writing twice consumes about 5-10 minutes (including production test), and the production efficiency is very low for mass production.
Disclosure of Invention
The embodiment of the application discloses a method for quickly realizing android set top box production software, which can improve the production efficiency of a set top box.
The first aspect of the embodiment of the application discloses a method for quickly realizing android set top box production software, which is applied to a set top box and comprises the following steps:
after the set top box is powered on, starting the universal bootloader, and reading the advanced safety zone bit area; the universal bootloader is a non-advanced security system;
if the advanced safety system is not started, starting an automatic testing tool for mass production, receiving and writing the advanced safety secret key after the assembly test is completed, starting the advanced safety system, and writing the identification of the advanced safety system to the advanced safety zone bit area.
In a second aspect, a set-top box is provided, the set-top box comprising:
the starting reading unit is used for starting the universal bootloader and reading the advanced safety zone bit area after the set top box is powered on; the universal bootloader is a non-advanced safety system;
and the processing unit is used for starting an automatic test tool for mass production if the advanced safety system is not started, receiving and writing the advanced safety key after the assembly test is finished, starting the advanced safety system, and writing the identification of the advanced safety system to the advanced safety zone bit area.
In a third aspect, a computer-readable storage medium is provided, characterized in that a computer program for electronic data exchange is stored, wherein the computer program causes a computer to perform the method provided in the first aspect.
By implementing the embodiment of the application, the technical scheme provided by the application only needs to write the flash once, then refers to the non-high-security boot for starting, realizes high-security starting in the starting process, and simultaneously only moves the high-security boot. Since the boot is small, the entire transfer process takes only a few seconds. Thus the time to produce a high security set top box can be reduced to 1 to 2 minutes (including production testing). The production efficiency is greatly improved. Meanwhile, the method also adopts a temporary guide verification mode, so that the successful opening of the high-security boot is ensured, and the problem of chip damage caused by high-security boot opening is greatly reduced.
Drawings
The drawings used in the embodiments of the present application are described below.
Fig. 1 is a schematic structural diagram of a set top box according to an embodiment of the present application;
fig. 2 is a schematic flow chart of a method for quickly implementing android set top box production software provided in an embodiment of the present application;
fig. 3 is a schematic flow chart illustrating a rapid implementation process of android set top box production software according to an embodiment of the present application;
fig. 4 is a schematic partition diagram provided in an embodiment of the present application.
Fig. 5 is a schematic structural diagram of a set top box according to an embodiment of the present application.
Detailed Description
The embodiments of the present application will be described below with reference to the drawings.
The term "and/or" in this application is only one kind of association relationship describing the association object, and means that there may be three kinds of relationships, for example, a and/or B, and may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the character "/" in this document indicates that the former and latter related objects are in an "or" relationship.
The "plurality" appearing in the embodiments of the present application means two or more. The descriptions of the first, second, etc. appearing in the embodiments of the present application are only for illustrating and differentiating the objects, and do not represent the order or the particular limitation of the number of the devices in the embodiments of the present application, and do not constitute any limitation to the embodiments of the present application. The term "connect" in the embodiments of the present application refers to various connection manners, such as direct connection or indirect connection, to implement communication between devices, which is not limited in this embodiment of the present application.
The set-top box in the embodiments of the present application may refer to various forms of UE, access set-top box, subscriber unit, subscriber station, mobile station, MS (mobile station), remote station, remote set-top box, mobile device, computer, server, cloud system user set-top box, set-top box device (terminal equipment), wireless communication device, user agent, or user equipment. The set-top box device may also be a cellular phone, a cordless phone, an SIP (session initiation protocol) phone, a WLL (wireless local loop) station, a PDA (personal digital assistant) in chinese), a handheld device with wireless communication function, a computing device or other processing device connected to a wireless modem, a vehicle-mounted device, a wearable device, a set-top box device in a future 5G network or a set-top box device in a future evolved PLMN (public land mobile network in chinese), and the like, which is not limited in the embodiments of the present application.
Referring to fig. 1, fig. 1 is a schematic structural diagram of a set-top box, as shown in fig. 1, the set-top box may include: processor 101, input unit 102, communication module 103, memory 104 and camera 105.
The input unit 102 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the set-top box. Specifically, the input unit 102 may include a touch display screen, a fingerprint recognition device, and other input devices. The fingerprint identification device can set up alone, and certainly in practical application, the fingerprint identification device also can combine to the touch-control display screen, realizes fingerprint under the screen promptly. The input unit may also include other input devices. In particular, other input devices may include, but are not limited to, one or more of physical keys, function keys (such as volume control keys, switch keys, etc.), a trackball, a mouse, a joystick, and the like.
The processor 101 is a control center of the set-top box, connects various parts of the whole set-top box by using various interfaces and lines, and performs various functions of the set-top box and processes data by operating or executing software programs and/or modules stored in the memory 104 and calling data stored in the memory 104, thereby performing overall monitoring or control of the set-top box. Alternatively, processor 101 may include one or more processing units; optionally, the processor 101 may integrate an application processor, a modem processor, and an artificial intelligence chip, where the application processor mainly processes an operating system, a user interface, an application program, and the like, the modem processor mainly processes wireless communication, and the artificial intelligence chip mainly implements calculation of a neural network model. It will be appreciated that the modem processor or artificial intelligence chip described above may not be integrated into the processor 101.
Further, the memory 104 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
The communication module 103 may be used for receiving and transmitting information. Generally, the communication module 103 includes, but is not limited to, an antenna, at least one Amplifier, a transceiver, a coupler, a Low Noise Amplifier (LNA), a duplexer, and the like. In addition, the communication module 103 can also communicate with a network and other devices through wireless communication. The wireless communication may use any communication standard or protocol, including but not limited to Global System for Mobile communication (GSM), General Packet Radio Service (GPRS), Code Division Multiple Access (CDMA), Wideband Code Division Multiple Access (WCDMA), Long Term Evolution (LTE), email, Short Messaging Service (SMS), and the like.
The camera 105 may be used to capture a picture, scan a two-dimensional code, and so on, and process image data. The camera 105 specifically can include a front camera or a rear camera, and also can include two cameras for the rear camera, certainly can also be two camera settings for the front camera, and this application is not restricted to the quantity and the specific position of camera, and the picture that camera 105 gathered can be transmitted for and carries out relevant processing for processor 101.
Referring to fig. 2, fig. 2 provides a method for quickly implementing android set-top box production software, where the method is executed by a set-top box shown in fig. 1, and the method is shown in fig. 2, and includes the following steps:
step S201, after the set top box is powered on, starting a universal bootloader, and reading an advanced safety zone bit area; the universal bootloader is a non-advanced security system;
step S202, if the advanced safety system is not started, starting an automatic test tool for mass production, and after the assembly test is completed, receiving and writing an advanced safety secret key;
and step S203, starting the advanced security system, and writing the identification of the advanced security system to the advanced security zone bit area.
According to the technical scheme, the flash is written once, then the non-high-security boot is started, high-security opening is achieved in the starting process, and meanwhile, only the high-security boot is moved. Since the boot is small, the entire transfer process takes only a few seconds. Thus the time to produce a high security set top box can be reduced to 1 to 2 minutes (including production testing). The production efficiency is greatly improved. Meanwhile, the method also adopts a temporary guide verification mode, so that the successful opening of the high-security boot is ensured, and the problem of chip damage caused by high-security boot opening is greatly reduced.
In an alternative arrangement, the first and second electrodes may be,
if the advanced security zone bit area has no advanced security system identification, determining that the advanced security system is not started;
and if the high-level safety zone bit area has the high-level safety system identification, determining to start the high-level safety system.
In one alternative, the method further comprises:
and if the advanced security system is started, starting the bootloader of the advanced security system.
In one alternative, the method further comprises:
and after the advanced security system is started, the successful starting result is sent to the number writing computer.
In one alternative, the method further comprises:
if the power is off, the set-top box repeats the power-on steps S201-S203.
Making mirror images
The mirror image manufacturing is a key of the method, because the whole flash memory chip is burned in the factory mass production, then the chip is welded on the mainboard, and the running system is loaded through the program in the flash.
The image consists of three parts, one part is a universal bootloader of non-high security (advanced security system), the second part is a high security image and the high security bootloader, and the third part is a zone bit area of advanced security.
And the non-high-security bootloader is used for starting the production testing tool, starting high security after the production testing is finished, simultaneously saving a starting mark in the partition, and determining whether the non-high-security bootloader is started to the high-security bootloader or the non-high-security bootloader.
The high-security mirror image and the high-security bootloader are used for starting the high-security system which is normally started after the high-security is started.
And the advanced security zone bit area, the data of which is bound with the chip information through algorithm encryption.
Example one
Referring to fig. 3, the high safety process of the software production in the embodiment of the present application, the partitioning of the set top box is shown in fig. 4, which may specifically include:
1. after power-on, starting the non-high-security bootloader, reading the high-security flag bit region by the non-high-security bootloader, and obtaining a value by a correlation algorithm.
2. And if the high security is already started, starting the high security bootloader and starting the system normally.
3. If the high security is not started, the test method is a factory mass production mode, the bootloader starts an automatic mass production test tool, and a production line worker can test hardware assembly.
4. After the assembly test is finished, connecting a computer special for writing numbers, and writing related high-security keys
5. And after the high-security key is written, starting high security, and writing the identification bit into the zone bit area.
6. And after the high security is started, returning a successful result of the high security starting to the number writing computer, and making data statistics by the computer.
Because the process of mirror image burning is not carried out in the process, the box software can still repeat the process from 1 to 6 even if the power is abnormally cut off midway. This simplifies the work steps for the worker while ensuring that the probability of chip damage is minimized.
Thus, the production process of one box on the production line is very short, and if workers test the production quickly, one box can complete high-safety production within 1 minute.
This also ensures the security of the system because if any partition in the image is replaced, it will not boot.
Referring to fig. 5, fig. 5 provides a set-top box comprising:
the starting reading unit 501 is used for starting the universal bootloader and reading the high-level safety zone bit area after the set top box is powered on; the universal bootloader is a non-advanced safety system;
the processing unit 502 is configured to start an automatic test tool for mass production if the advanced security system is not started, receive and write in an advanced security key after the assembly test is completed, start the advanced security system, and write in an identifier of the advanced security system to an area of an advanced security flag.
Optionally, the processing unit is specifically configured to determine that the advanced security system is not started if the advanced security flag region has no advanced security system identifier;
and if the high-level safety zone bit area has the high-level safety system identification, determining to start the high-level safety system.
Optionally, the processing unit is specifically configured to start the advanced security system bootloader if the advanced security system is started.
Optionally, the processing unit is further configured to send a successful opening result to the number writing computer after the advanced security system is opened.
An embodiment of the present application further provides a computer-readable storage medium, in which a computer program is stored, and when the computer program runs on a network device, the method flow shown in fig. 2 is implemented.
An embodiment of the present application further provides a computer program product, and when the computer program product runs on a set top box, the method flow shown in fig. 2 is implemented.
Embodiments of the present application also provide a set-top box, comprising a processor, a memory, a communication interface, and one or more programs stored in the memory and configured to be executed by the processor, the programs including instructions for performing the steps in the method of the embodiment shown in fig. 2.
The above description has introduced the solution of the embodiment of the present application mainly from the perspective of the method-side implementation process. It is understood that the electronic device comprises corresponding hardware structures and/or software modules for performing the respective functions in order to realize the above-mentioned functions. Those of skill in the art will readily appreciate that the present application is capable of hardware or a combination of hardware and computer software implementing the various illustrative elements and algorithm steps described in connection with the embodiments provided herein. Whether a function is performed as hardware or computer software drives hardware depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the embodiment of the present application, the electronic device may be divided into the functional units according to the method example, for example, each functional unit may be divided corresponding to each function, or two or more functions may be integrated into one processing unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit. It should be noted that the division of the unit in the embodiment of the present application is schematic, and is only a logic function division, and there may be another division manner in actual implementation.
Embodiments of the present application also provide a computer storage medium, where the computer storage medium stores a computer program for electronic data exchange, the computer program enabling a computer to execute part or all of the steps of any one of the methods described in the above method embodiments, and the computer includes an electronic device.
Embodiments of the present application also provide a computer program product comprising a non-transitory computer readable storage medium storing a computer program operable to cause a computer to perform some or all of the steps of any one of the methods as set out in the above method embodiments. The computer program product may be a software installation package, the computer comprising an electronic device.
It should be noted that, for simplicity of description, the above-mentioned method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present application is not limited by the order of acts described, as some steps may occur in other orders or concurrently depending on the application. Further, those skilled in the art will recognize that the embodiments described in this specification are preferred embodiments and that acts or modules referred to are not necessarily required for this application.
In the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus may be implemented in other manners. For example, the above-described embodiments of the apparatus are merely illustrative, and for example, the above-described division of the units is only one type of division of logical functions, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of some interfaces, devices or units, and may be an electric or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit may be stored in a computer readable memory if it is implemented in the form of a software functional unit and sold or used as a stand-alone product. Based on such understanding, the technical solution of the present application may be substantially implemented or a part of or all or part of the technical solution contributing to the prior art may be embodied in the form of a software product stored in a memory, and including several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the above-mentioned method of the embodiments of the present application. And the aforementioned memory comprises: a U-disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic or optical disk, and other various media capable of storing program codes.
Those skilled in the art will appreciate that all or part of the steps in the methods of the above embodiments may be implemented by associated hardware instructed by a program, which may be stored in a computer-readable memory, which may include: flash Memory disks, Read-Only memories (ROMs), Random Access Memories (RAMs), magnetic or optical disks, and the like.
The foregoing detailed description of the embodiments of the present application has been presented to illustrate the principles and implementations of the present application, and the above description of the embodiments is only provided to help understand the method and the core concept of the present application; meanwhile, for a person skilled in the art, according to the idea of the present application, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present application.

Claims (6)

1. A method for quickly realizing android set top box production software is characterized in that the method is applied to a set top box and comprises the following steps:
after the set top box is powered on, starting the universal bootloader, and reading the advanced safety zone bit area; the universal bootloader is a bootloader of a non-advanced security system, and data in an advanced security zone bit area is bound with chip information through encryption;
if the advanced safety system is not started, starting an automatic test tool for mass production, receiving and writing an advanced safety key after the assembly test is finished, starting the advanced safety system, starting a bootloader of the advanced safety system, and writing an identifier of the advanced safety system to an advanced safety zone bit region;
the method further comprises the following steps:
if the advanced security zone bit area has no advanced security system identification, determining that the advanced security system is not started;
and if the high-level safety zone bit area has the high-level safety system identification, determining to start the high-level safety system.
2. The method of claim 1, further comprising:
and after the advanced security system is started, the successful starting result is sent to the number writing computer.
3. The method of claim 2, further comprising:
and if the power is off, the set top box repeats the power-on step.
4. A set top box, comprising:
the starting reading unit is used for starting the universal bootloader and reading the advanced safety zone bit area after the set top box is powered on; the universal bootloader is a bootloader of a non-advanced security system, and data in an advanced security zone bit area is bound with chip information through encryption;
the processing unit is used for starting an automatic testing tool for mass production if the advanced security system is not started, receiving and writing an advanced security key after the assembly test is finished, starting the advanced security system, starting a bootloader of the advanced security system, and writing the bootloader of the advanced security system into an advanced security zone bit area;
the processing unit is specifically configured to determine that the advanced security system is not started if the advanced security zone bit region does not have an advanced security system identifier;
and if the high-level safety zone bit area has the high-level safety system identification, determining to start the high-level safety system.
5. The set top box of claim 4,
and the processing unit is also used for sending the successful opening result to the number writing computer after the advanced security system is opened.
6. A computer-readable storage medium, characterized in that a computer program for electronic data exchange is stored, wherein the computer program causes a computer to perform the method according to any one of claims 1-3.
CN202010682534.2A 2020-07-15 2020-07-15 Method for quickly realizing android set top box production software and related products Active CN111954073B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010682534.2A CN111954073B (en) 2020-07-15 2020-07-15 Method for quickly realizing android set top box production software and related products

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010682534.2A CN111954073B (en) 2020-07-15 2020-07-15 Method for quickly realizing android set top box production software and related products

Publications (2)

Publication Number Publication Date
CN111954073A CN111954073A (en) 2020-11-17
CN111954073B true CN111954073B (en) 2022-07-12

Family

ID=73339938

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010682534.2A Active CN111954073B (en) 2020-07-15 2020-07-15 Method for quickly realizing android set top box production software and related products

Country Status (1)

Country Link
CN (1) CN111954073B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101562686A (en) * 2009-04-29 2009-10-21 山东泰信电子有限公司 Method for downloading software of universal set-top box (STB) platform
CN101710240A (en) * 2009-11-18 2010-05-19 深圳市九洲电器有限公司 Set-top box production control system
CN102572591A (en) * 2011-12-09 2012-07-11 深圳创维数字技术股份有限公司 Method and device for producing advanced security digital television set-top box
CN103544034A (en) * 2013-10-12 2014-01-29 深圳市九洲电器有限公司 Set top box (STB) and method and system for dynamically loading drive of STB
CN103888835A (en) * 2014-04-17 2014-06-25 江苏银河电子股份有限公司 Safety certification method of intelligent set top box
CN103955648A (en) * 2014-05-15 2014-07-30 乐视致新电子科技(天津)有限公司 Method and device for verifying legality of system image

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102156647B (en) * 2011-01-26 2013-10-09 深圳市九洲电器有限公司 Advanced safety setting method and advanced safety setting device for main chip of set-top box
US20140230052A1 (en) * 2013-02-11 2014-08-14 Motorola Mobility Llc System and method for testing a secured manufactured device
CN103220578B (en) * 2013-03-26 2016-03-09 深圳市九洲电器有限公司 A kind of high safe machine top box and production method, system
CN103258153A (en) * 2013-04-19 2013-08-21 深圳创维数字技术股份有限公司 Method for achieving safeguard in digital television terminal and digital television terminal
CN103986954B (en) * 2014-05-15 2017-08-25 深圳市九洲电器有限公司 A kind of set top box method of controlling security and system
CN104394466B (en) * 2014-12-09 2017-10-31 北京四达时代软件技术股份有限公司 High safety set top box production method
CN105142022A (en) * 2015-08-12 2015-12-09 浪潮软件集团有限公司 Production upgrading method for high-security set top box
US20180365406A1 (en) * 2017-06-20 2018-12-20 Qualcomm Incorporated Methods and systems for providing advanced secure boot features to limited-resource peripheral devices by using a secure processor

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101562686A (en) * 2009-04-29 2009-10-21 山东泰信电子有限公司 Method for downloading software of universal set-top box (STB) platform
CN101710240A (en) * 2009-11-18 2010-05-19 深圳市九洲电器有限公司 Set-top box production control system
CN102572591A (en) * 2011-12-09 2012-07-11 深圳创维数字技术股份有限公司 Method and device for producing advanced security digital television set-top box
CN103544034A (en) * 2013-10-12 2014-01-29 深圳市九洲电器有限公司 Set top box (STB) and method and system for dynamically loading drive of STB
CN103888835A (en) * 2014-04-17 2014-06-25 江苏银河电子股份有限公司 Safety certification method of intelligent set top box
CN103955648A (en) * 2014-05-15 2014-07-30 乐视致新电子科技(天津)有限公司 Method and device for verifying legality of system image

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
一种安全的智能机顶盒实现方案;胡冰松等;《电信科学》;20130420(第04期);全文 *
机顶盒高级安全启动系统的功能分析与实现;袁苇;《科学技术创新》;20170715(第20期);全文 *

Also Published As

Publication number Publication date
CN111954073A (en) 2020-11-17

Similar Documents

Publication Publication Date Title
CN102317884B (en) For supporting the wake up trigger signal of multiple user interfaces, environment and/or virtual machine
CN102299729B (en) A kind of information transferring method and device
US8838094B2 (en) Acquiring information from volatile memory of a mobile device
CN103731810A (en) Access point sharing method and device
CN106502826A (en) Data backup and transmission method and mobile terminal
WO2020156255A1 (en) Payment method, device, system, mobile terminal, payment machine, and server
CN103796197A (en) Bluetooth technology based method, apparatus and system for establishing wireless communication channel
CN107708084B (en) Data processing method and device, computer equipment and computer readable storage medium
CN104967593A (en) Identity verification method, apparatus and system
CN106445743A (en) Data backup transmission method and mobile terminal
CN104469771A (en) Data transmission method for having access to cellular mobile network system and associated equipment
CN104751105A (en) Fingerprint data verification method, fingerprint data verification device, related equipment and system
CN104244206A (en) Method, device and terminal device for processing short message
CN104751086A (en) Terminal anti-theft method
CN104936167A (en) Card writing method, system and equipment
CN106599663A (en) Information security protecting method and mobile terminal
CN105246075A (en) Access point connecting method and device
CN108876611B (en) Transaction information processing method and device and block link points
CN101516087A (en) Storage system of mobile terminal and access control method
CN111954073B (en) Method for quickly realizing android set top box production software and related products
CN102667806B (en) A chip card, an electronic system, a method being implemented by a chip card and a computer program product
CN102647506A (en) Mobile phone secret divulgence prevention method
CN111160157A (en) Text extraction method based on DWG drawing and related product
CN106572226A (en) Contact person sharing method, address list sharing terminal and address list receiving terminal
CN106453200A (en) Data service accessing method and terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant