CN116233551A - Set top box synchronous upgrading method, equipment and storage medium - Google Patents

Set top box synchronous upgrading method, equipment and storage medium Download PDF

Info

Publication number
CN116233551A
CN116233551A CN202211710158.9A CN202211710158A CN116233551A CN 116233551 A CN116233551 A CN 116233551A CN 202211710158 A CN202211710158 A CN 202211710158A CN 116233551 A CN116233551 A CN 116233551A
Authority
CN
China
Prior art keywords
top box
set top
data
target
current
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211710158.9A
Other languages
Chinese (zh)
Inventor
杨波
姜赛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Amedia Technology Co ltd
Original Assignee
Shenzhen Amedia Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Amedia Technology Co ltd filed Critical Shenzhen Amedia Technology Co ltd
Priority to CN202211710158.9A priority Critical patent/CN116233551A/en
Publication of CN116233551A publication Critical patent/CN116233551A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/45Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
    • H04N21/458Scheduling content for creating a personalised stream, e.g. by combining a locally stored advertisement with an incoming stream; Updating operations, e.g. for OS modules ; time-related management operations
    • H04N21/4586Content update operation triggered locally, e.g. by comparing the version of software modules in a DVB carousel to the version stored locally
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/242Synchronization processes, e.g. processing of PCR [Program Clock References]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/258Client or end-user data management, e.g. managing client capabilities, user preferences or demographics, processing of multiple end-users preferences to derive collaborative data
    • H04N21/25808Management of client data
    • H04N21/25816Management of client data involving client authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/262Content or additional data distribution scheduling, e.g. sending additional data at off-peak times, updating software modules, calculating the carousel transmission frequency, delaying a video stream transmission, generating play-lists
    • H04N21/26291Content or additional data distribution scheduling, e.g. sending additional data at off-peak times, updating software modules, calculating the carousel transmission frequency, delaying a video stream transmission, generating play-lists for providing content or additional data updates, e.g. updating software modules, stored at the client
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/443OS processes, e.g. booting an STB, implementing a Java virtual machine in an STB or power management in an STB

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Graphics (AREA)
  • Software Systems (AREA)
  • Stored Programmes (AREA)

Abstract

The invention belongs to the technical field of set top boxes, and discloses a set top box synchronous upgrading method, equipment and a storage medium. The method comprises the following steps: receiving set top box identifiers and version information sent by a plurality of set top boxes; performing identity authentication on a plurality of set top boxes according to the received set top box identifiers, and determining a plurality of target set top boxes passing the authentication; and synchronously upgrading the plurality of target set-top boxes based on the version information corresponding to each target set-top box. By the method, the identity authentication is performed according to the set top box identification of the set top box, the identification capability of the server to the set top box is improved, the plurality of set top boxes are synchronously updated according to the version information, the set top boxes with different versions are prevented from capturing the update data, the set top boxes are not required to be updated with manpower, and the management of operators is facilitated.

Description

Set top box synchronous upgrading method, equipment and storage medium
Technical Field
The present invention relates to the field of set top boxes, and in particular, to a method, an apparatus, and a storage medium for synchronously upgrading a set top box.
Background
With the advent of the internet era, more and more set-top boxes support network functions, and with the increase of software functions, the upgrade of set-top box software is more and more frequent. At present, the illegal set top box can capture key data and upgrade data packets sent to the regular set top box by the server through simulating the behaviors of the regular set top box, and the server cannot recognize and prevent the illegal behaviors, so that operators are difficult to manage, and losses are caused to regular enterprises and operators.
The foregoing is provided merely for the purpose of facilitating understanding of the technical solutions of the present invention and is not intended to represent an admission that the foregoing is prior art.
Disclosure of Invention
The invention mainly aims to provide a set top box synchronous upgrading method, equipment and a storage medium, and aims to solve the technical problem that an illegal set top box can capture key data and an upgrading data packet sent to a regular set top box by a server through simulating the behavior of the regular set top box, so that management of operators is difficult.
In order to achieve the above purpose, the present invention provides a method for synchronously upgrading a set top box, which comprises the following steps:
receiving set top box identifiers and version information sent by a plurality of set top boxes;
performing identity authentication on the plurality of set top boxes according to the received set top box identifiers, and determining a plurality of target set top boxes passing the authentication;
and synchronously upgrading the plurality of target set-top boxes based on the version information corresponding to each target set-top box.
Optionally, the step of authenticating the identities of the plurality of set top boxes according to the received set top box identifiers and determining a plurality of target set top boxes passing the authentication includes:
inquiring the encryption data corresponding to each set top box according to the received set top box identification;
sending corresponding encrypted data to each set top box so that each set top box generates identity data according to the received encrypted data and feeds back the identity data;
and authenticating the identity data fed back by each set top box according to the encrypted data corresponding to each set top box, and determining a plurality of target set top boxes passing the authentication.
Optionally, the method further comprises:
and sending corresponding encrypted data to each set top box so that each set top box decrypts the received encrypted data according to a preset decryption algorithm, intercepts fragments from plaintext data obtained by decryption according to a preset interception strategy, generates identity data according to the intercepted fragments and current time information, and feeds back the identity data.
Optionally, the authenticating the identity data fed back by each set top box according to the encrypted data corresponding to each set top box, and determining a plurality of target set top boxes passing the authentication includes:
decrypting the encrypted data corresponding to each set top box according to a preset decryption algorithm to obtain plaintext data corresponding to each set top box;
intercepting fragment data from the plaintext data according to a preset interception strategy;
acquiring a reference fragment and reference time data from the identity data;
verifying the reference time data;
after the verification is passed, comparing the fragment data with the reference fragment to obtain a comparison result;
and determining a plurality of target set top boxes passing the authentication according to the comparison result.
Optionally, before the receiving the set top box identifiers and version information sent by the plurality of set top boxes, the method further includes:
interacting with a set top box to be activated in a connection state, and acquiring an activation code and a target set top box identifier corresponding to the set top box to be activated;
verifying the activation code;
after the verification is passed, combining the target set top box identification with the generated random number to obtain identification data;
randomly selecting a target encryption algorithm to encrypt the identification data to obtain encrypted data corresponding to the target set top box identification, and storing the encrypted data corresponding to the target set top box identification;
and sending a decryption algorithm identification corresponding to the target encryption algorithm to the set top box to be activated, so that the set top box to be activated presets a corresponding decryption algorithm according to the decryption algorithm identification.
Optionally, the method further comprises:
inquiring contact information corresponding to an activated set top box when a decryption algorithm checking instruction sent by the activated set top box is received;
and sending the decryption algorithm identification corresponding to the activated set top box to the equipment corresponding to the contact information.
Optionally, the step of synchronously upgrading the plurality of target set-top boxes based on version information corresponding to each target set-top box includes:
generating incremental data corresponding to each target set top box based on version information corresponding to each target set top box and the latest version data;
and sending corresponding incremental data to each target set top box so that each target set top box can be synchronously upgraded according to the incremental data.
In addition, in order to achieve the above purpose, the invention also provides a set top box synchronous upgrading method, which is applied to the set top box and comprises the following steps:
transmitting a current set top box identifier and current version information to a server, so that the server inquires corresponding current encryption data according to the current set top box identifier and feeds back the current encryption data;
decrypting the current encrypted data according to a preset decryption algorithm, intercepting fragments from plaintext data obtained by decryption according to a preset interception strategy, and generating current identity data according to the intercepted fragments and current time information;
the current identity data is sent to the server, so that the server authenticates the current identity data according to the current encrypted data, and when the authentication is passed, current incremental data is generated according to the current version information and the latest version data, and the current incremental data is fed back;
and synchronously upgrading according to the current incremental data.
In addition, in order to achieve the above purpose, the invention also provides a set top box synchronous upgrading device, which comprises a server or a set top box;
the server includes: the system comprises a memory, a processor and a set top box synchronous upgrading program which is stored in the memory and can run on the processor, wherein the set top box synchronous upgrading program is configured to realize the set top box synchronous upgrading method;
the set-top box comprises: the set top box synchronous upgrading system comprises a memory, a processor and a set top box synchronous upgrading program which is stored in the memory and can run on the processor, wherein the set top box synchronous upgrading program is configured to realize the set top box synchronous upgrading method applied to the set top box.
In addition, in order to achieve the above object, the present invention further provides a storage medium, on which a set-top box synchronization upgrade program is stored, which when executed by a processor, implements the set-top box synchronization upgrade method as described above.
The method and the device receive the set top box identifications and version information sent by a plurality of set top boxes; performing identity authentication on a plurality of set top boxes according to the received set top box identifiers, and determining a plurality of target set top boxes passing the authentication; and synchronously upgrading the plurality of target set-top boxes based on the version information corresponding to each target set-top box. By the method, the identity authentication is performed according to the set top box identification of the set top box, the identification capability of the server to the set top box is improved, the plurality of set top boxes are synchronously updated according to the version information, the set top boxes with different versions are prevented from capturing the update data, the set top boxes are not required to be updated with manpower, and the management of operators is facilitated.
Drawings
Fig. 1 is a schematic structural diagram of a set top box synchronous upgrade apparatus of a hardware running environment according to an embodiment of the present invention;
fig. 2 is a schematic flow chart of a first embodiment of a set-top box synchronization upgrade method according to the present invention;
fig. 3 is a schematic structural diagram of a set-top box synchronous upgrade system according to the present invention;
fig. 4 is a schematic flow chart of a second embodiment of a set-top box synchronization upgrade method according to the present invention;
fig. 5 is a first schematic diagram of interactive signaling of the set-top box synchronization upgrade method of the present invention;
fig. 6 is a schematic flow chart of a third embodiment of a set-top box synchronization upgrade method according to the present invention;
fig. 7 is a second schematic diagram of interactive signaling of the set-top box synchronization upgrade method of the present invention;
fig. 8 is a flowchart of a fourth embodiment of a set-top box synchronization upgrade method according to the present invention.
The achievement of the objects, functional features and advantages of the present invention will be further described with reference to the accompanying drawings, in conjunction with the embodiments.
Detailed Description
It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
Referring to fig. 1, fig. 1 is a schematic structural diagram of a set top box synchronization upgrade apparatus of a hardware running environment according to an embodiment of the present invention.
As shown in fig. 1, the set-top box synchronous upgrade device is a server or a set-top box, and may include: a processor 1001, such as a central processing unit (Central Processing Unit, CPU), a communication bus 1002, a user interface 1003, a network interface 1004, a memory 1005. Wherein the communication bus 1002 is used to enable connected communication between these components. The user interface 1003 may include a Display, an input unit such as a Keyboard (Keyboard), and the optional user interface 1003 may further include a standard wired interface, a wireless interface. The network interface 1004 may optionally include a standard wired interface, a Wireless interface (e.g., a Wireless-Fidelity (Wi-Fi) interface). The Memory 1005 may be a high-speed random access Memory (Random Access Memory, RAM) or a stable nonvolatile Memory (NVM), such as a disk Memory. The memory 1005 may also optionally be a storage device separate from the processor 1001 described above.
Those skilled in the art will appreciate that the architecture shown in fig. 1 does not constitute a limitation of the set-top box synchronization upgrade apparatus, and may include more or fewer components than shown, or may combine certain components, or a different arrangement of components.
As shown in fig. 1, an operating system, a network communication module, a user interface module, and a set-top box synchronization upgrade program may be included in the memory 1005 as one type of storage medium.
In the set-top box synchronous upgrade apparatus shown in fig. 1, the network interface 1004 is mainly used for data communication with a network server; the user interface 1003 is mainly used for data interaction with a user; the processor 1001 and the memory 1005 in the set top box synchronous upgrading device can be arranged in the set top box synchronous upgrading device, and the set top box synchronous upgrading device calls the set top box synchronous upgrading program stored in the memory 1005 through the processor 1001 and executes the set top box synchronous upgrading method provided by the embodiment of the invention.
The embodiment of the invention provides a set top box synchronous upgrading method, and referring to fig. 2, fig. 2 is a flow chart of a first embodiment of the set top box synchronous upgrading method.
In this embodiment, the set top box synchronous upgrade method includes the following steps:
step S10: and receiving set top box identifiers and version information sent by the plurality of set top boxes.
It can be understood that the execution body of the embodiment is a server, referring to fig. 3, fig. 3 is a schematic structural diagram of a set-top box synchronous upgrade system of the present invention, the server communicates with n set-top boxes at the same time, when the server issues a new version of software, upgrade notification is sent to each set-top box, and when each set-top box receives the upgrade notification, set-top box identifier and version information are sent to the server. The set top box identifier is a unique identification code of the set top box, such as STBID, and the like, and can also be a unique identifier of a home user corresponding to the set top box, such as a user identification card number, a telephone number, and the like. The version information is the version number of the software currently used by the set top box.
Step S20: and carrying out identity authentication on the plurality of set top boxes according to the received set top box identifiers, and determining a plurality of target set top boxes passing the authentication.
The identification of the set top box is used as a reference, the set top box is authenticated, and the illegal set top box is removed. Optionally, the server stores the unique identification code of the activated regular set top box, compares the set top box identification of each set top box with the stored unique identification code, and uses the set top box with the consistent comparison as the target set top box passing the authentication. Optionally, according to the set top box identification, inquiring the corresponding activation location, acquiring the current positioning information of the set top box, matching the positioning information with the activation location, and taking the successfully matched set top box as a target set top box passing authentication. Optionally, inquiring corresponding encrypted data according to the set top box identification, returning to the set top box for decryption, decrypting at the server, verifying whether the decryption result of the set top box is consistent with the decryption result of the server, and taking the set top box with the consistent decryption result as a target set top box passing authentication.
Step S30: and synchronously upgrading the plurality of target set-top boxes based on the version information corresponding to each target set-top box.
It should be understood that the synchronous upgrade is performed according to the version information of each target set top box, so that the synchronous upgrade is more accurate, the upgrade success rate of the set top box is improved, and on the other hand, the capture of upgrade data by the set top boxes with inconsistent versions is avoided. Optionally, the installation packages corresponding to different version numbers are stored in advance, the corresponding installation packages are obtained according to the version information of each target set top box, and the corresponding installation packages are sent to each target set top box, so that synchronous upgrading is performed.
Further, in order to avoid capturing upgrade data by the set top box with inconsistent version, the step S30 includes: generating incremental data corresponding to each target set top box based on version information corresponding to each target set top box and the latest version data; and sending corresponding incremental data to each target set top box so that each target set top box can be synchronously upgraded according to the incremental data.
It should be noted that, the illegal set top box may copy the set top box identifier and version information of the regular set top box, and imitate the regular set top box to communicate with the server, so as to obtain the upgrade data.
The embodiment receives the set top box identifications and version information sent by a plurality of set top boxes; performing identity authentication on a plurality of set top boxes according to the received set top box identifiers, and determining a plurality of target set top boxes passing the authentication; and synchronously upgrading the plurality of target set-top boxes based on the version information corresponding to each target set-top box. By the method, the identity authentication is performed according to the set top box identification of the set top box, the identification capability of the server to the set top box is improved, the plurality of set top boxes are synchronously updated according to the version information, the set top boxes with different versions are prevented from capturing the update data, the set top boxes are not required to be updated with manpower, and the management of operators is facilitated.
Referring to fig. 4, fig. 4 is a flowchart of a second embodiment of a set-top box synchronization upgrade method according to the present invention.
Based on the above first embodiment, the step S20 of the set top box synchronization upgrade method of this embodiment includes:
step S201: and inquiring the encrypted data corresponding to each set top box according to the received set top box identification.
It should be appreciated that the server stores the encrypted data of the activated set top box in advance. Optionally, the encrypted data of different set top boxes are encrypted by the same encryption algorithm; optionally, the encrypted data of different set-top boxes are encrypted by different encryption algorithms.
Step S202: and sending corresponding encrypted data to each set top box so that each set top box generates identity data according to the received encrypted data and feeds back the identity data.
The set top box decrypts the encrypted data according to a decryption algorithm set by the set top box, generates identity data according to the decrypted data, and sends the identity data to the server for authentication.
Step S203: and authenticating the identity data fed back by each set top box according to the encrypted data corresponding to each set top box, and determining a plurality of target set top boxes passing the authentication.
In the specific implementation, the server decrypts the encrypted data according to a preset decryption algorithm, and authenticates the identity data according to a decryption result, so as to determine a plurality of target set top boxes passing the authentication. Optionally, the server pre-provisions the same decryption algorithm with all regular set-top boxes. Optionally, the server is different from the decryption algorithm agreed in advance with different set-top boxes, the server decrypts the encrypted data corresponding to each set-top box according to the decryption algorithm agreed with each set-top box, and authenticates the identity data fed back by each set-top box according to the decryption result, so as to determine a plurality of target set-top boxes passing the authentication.
Further, to promote the communication security, the method further includes: and sending corresponding encrypted data to each set top box so that each set top box decrypts the received encrypted data according to a preset decryption algorithm, intercepts fragments from plaintext data obtained by decryption according to a preset interception strategy, generates identity data according to the intercepted fragments and current time information, and feeds back the identity data.
It should be understood that the preset decryption algorithm is a decryption algorithm pre-agreed by the set top box and the server, and in a specific implementation, the set top box interacts with the server in the activation stage, and sets a corresponding decryption algorithm. The preset intercepting policy may be to intercept m bytes at the head, k bytes at the tail, f bytes after intercepting the p-th byte, intercept a plurality of bytes at a plurality of positions and splice, where m, k, p, f is an integer greater than 0, and the specific mode of the preset intercepting policy is not limited in this embodiment. Specifically, the set top box splices the intercepted fragments with the current time information to generate identity data. The decryption algorithm and the fragment interception strategy of the set top box are set, and the identity data is generated by combining the fragment interception strategy with the time information, so that the difficulty of capturing the encrypted data and cracking the decryption mode of the identity data by the illegal set top box is improved, meanwhile, the identity data has timeliness, and the identity authentication of the illegal set top box according to the historically captured identity data is avoided.
Specifically, the step S203 includes: decrypting the encrypted data corresponding to each set top box according to a preset decryption algorithm to obtain plaintext data corresponding to each set top box; intercepting fragment data from the plaintext data according to a preset interception strategy; acquiring a reference fragment and reference time data from the identity data; verifying the reference time data; after the verification is passed, comparing the fragment data with the reference fragment to obtain a comparison result; and determining a plurality of target set top boxes passing the authentication according to the comparison result.
It should be noted that, optionally, the server and all regular set-top boxes pre-define the same preset decryption algorithm. Optionally, the server is different from decryption algorithms agreed in advance by different set top boxes, the server stores preset decryption algorithms corresponding to the different set top boxes, and the decryption algorithm of each set top box is queried to decrypt encrypted data corresponding to each set top box, so as to obtain plaintext data corresponding to each set top box. The server and the set top box adopt the same interception strategy, and intercept fragment data from the plaintext data according to a preset interception strategy. The method comprises the steps of separating fragments from time in the identity data, and verifying the reference time data, wherein the method specifically comprises the following steps: the server judges whether the reference time data is in a certain time range according to the self time, for example, judges whether the reference time data is in the first five minutes of the self time of the server, if so, the verification passes. And comparing the plaintext fragment intercepted by the set top box with the plaintext fragment intercepted by the server, and if the plaintext fragment is consistent with the plaintext fragment, passing the authentication.
In a specific implementation, referring to fig. 5, fig. 5 is a first schematic diagram of interactive signaling of the set top box synchronization upgrade method of the present invention. The set top box upgrade flow of an example of the present invention is shown in fig. 5: in the upgrading stage, the set top box sends set top box identification and version information to a server; the server inquires the encrypted data corresponding to the set top box identifier and sends the encrypted data to the set top box; the set top box decrypts the encrypted data according to a preset decryption algorithm, intercepts fragments from the decrypted plaintext data, combines the intercepted fragments with current time information to generate identity data, and sends the identity data to the server; the server decrypts the encrypted data obtained by inquiry in the same way, and intercepts fragments from the decrypted plaintext data; the server performs verification on time information contained in the identity data; after the verification is passed, the server compares the segment intercepted by the server with the segment contained in the identity data, and if the segment is consistent with the segment contained in the identity data, the identity authentication is passed; after the identity authentication is passed, generating incremental data according to version information of the set top box, and sending the incremental data to the set top box; and the set top box completes the software upgrade according to the incremental data.
In the embodiment, the encryption data corresponding to each set top box is inquired according to the received set top box identification; sending corresponding encrypted data to each set top box so that each set top box generates identity data according to the received encrypted data and feeds back the identity data; and authenticating the identity data fed back by each set top box according to the encrypted data corresponding to each set top box, and determining a plurality of target set top boxes passing the authentication. By the method, the set top box generates the identity data according to the encrypted data, and the server authenticates the identity data according to the encrypted data, so that the identification capability of the server to the set top box is further improved, the illegal set top box is prevented from acquiring an upgrade data packet from the server, the server sends the encrypted data to the set top box, and the communication safety between the server and the set top box is improved.
Referring to fig. 6, fig. 6 is a flowchart of a third embodiment of a set-top box synchronization upgrade method according to the present invention.
Based on the above second embodiment, the method for synchronously upgrading a set top box of the present embodiment further includes, before the step S10:
step S01: and interacting with the set top box to be activated in the connection state, and acquiring an activation code and a target set top box identifier corresponding to the set top box to be activated.
It should be appreciated that during the active phase, the set-top box establishes a connection with the server, and sends the activation code and the target set-top box identification to the server.
Step S02: and verifying the activation code.
Step S03: and after the verification is passed, combining the target set top box identification with the generated random number to obtain identification data.
The server has a function of generating a random number, and generates a random number for each set-top box that is activated. And after the activation code passes verification, splicing the target set top box identification and the random number to obtain identification data.
Step S04: and randomly selecting a target encryption algorithm to encrypt the identification data to obtain encrypted data corresponding to the target set top box identification, and storing the encrypted data corresponding to the target set top box identification.
It can be understood that the server selects an encryption algorithm for each activated set top box from the encryption algorithm library, encrypts the identification data formed by splicing the target set top box identification and the random number, and stores the target set top box identification and the encrypted data correspondingly.
Step S05: and sending a decryption algorithm identification corresponding to the target encryption algorithm to the set top box to be activated, so that the set top box to be activated presets a corresponding decryption algorithm according to the decryption algorithm identification.
The encryption algorithm is used for encrypting the plaintext into the ciphertext, and the corresponding decryption algorithm is used for decrypting the ciphertext into the plaintext. The server determines a decryption algorithm corresponding to the target encryption algorithm, and sends a decryption algorithm identification of the decryption algorithm to the set top box to be activated, so that the set top box to be activated and the server synchronously set the decryption algorithm in the activation stage.
Further, the method further comprises: inquiring contact information corresponding to an activated set top box when a decryption algorithm checking instruction sent by the activated set top box is received; and sending the decryption algorithm identification corresponding to the activated set top box to the equipment corresponding to the contact information.
It should be understood that the server stores the contact information, such as a telephone number, corresponding to each activated set-top box, after a certain activated set-top box sends a decryption algorithm checking instruction, the server sends a decryption algorithm identifier corresponding to the activated set-top box to a device corresponding to the contact information, so that a worker or a business owner can adjust a decryption algorithm set in the set-top box according to the decryption algorithm identifier, the rights of enterprises or families are guaranteed, an active authentication adjustment mode is provided, and the set-top box is prevented from being excluded from an upgrade range after being erroneously detected by the server.
It should be noted that referring to fig. 7, fig. 7 is a second schematic diagram of an interactive signaling of the set top box synchronization upgrade method of the present invention. The set top box activation flow of an example of the present invention is shown in fig. 7: the set top box establishes connection with a server; the set top box sends an activation code and a set top box identifier to the server; the server verifies the activation code; after the verification is passed, generating a random number, encrypting data combined by the set top box identifier and the random number, and generating encrypted data; correspondingly storing the set top box identification and the encrypted data; the server sends a decryption algorithm identification corresponding to the encryption algorithm used for encryption to the set top box; the set top box presets a decryption algorithm corresponding to the decryption algorithm identifier, and synchronous setting of the decryption algorithm is achieved.
The method comprises the steps that through interaction with a set top box to be activated in a connection state, an activation code and a target set top box identifier corresponding to the set top box to be activated are obtained; verifying the activation code; after the verification is passed, combining the set top box identification and the generated random number to obtain identification data; randomly selecting a target encryption algorithm to encrypt the identification data to obtain encrypted data corresponding to the target set top box identification, and storing the encrypted data corresponding to the target set top box identification; and sending a decryption algorithm identification corresponding to the target encryption algorithm to the set top box to be activated, so that the set top box to be activated presets the corresponding decryption algorithm according to the decryption algorithm identification. By the method, the encrypted data is stored in the set top box activation stage, and the encrypted data and the set top box are synchronously set by a decryption algorithm, so that data support is provided for the identity authentication of the subsequent set top box, the identification capability of the server to the set top box is improved, and the illegal set top box is prevented from acquiring an upgrade data packet from the server.
In addition, the embodiment of the invention also provides a storage medium, wherein the storage medium stores a set top box synchronous upgrading program, and the set top box synchronous upgrading program realizes the set top box synchronous upgrading method when being executed by a processor.
Because the storage medium adopts all the technical schemes of all the embodiments, the storage medium has at least all the beneficial effects brought by the technical schemes of the embodiments, and the description is omitted here.
Referring to fig. 8, fig. 8 is a flowchart of a fourth embodiment of a set-top box synchronization upgrade method according to the present invention. As shown in fig. 8, the set-top box synchronization upgrade method provided by the embodiment of the present invention is applied to a set-top box, and includes:
step S1: and sending the current set top box identification and the current version information to a server, so that the server inquires corresponding current encryption data according to the current set top box identification, and feeds back the current encryption data.
It should be understood that in this embodiment, the set top box initiates the upgrade process, and when the set top box automatically detects that the update is required or receives an upgrade instruction input by a user, the set top box sends the current set top box identifier and the current version information to the server, and receives the current encrypted data fed back by the server.
Step S2: decrypting the current encrypted data according to a preset decryption algorithm, intercepting fragments from the plaintext data obtained by decryption according to a preset interception strategy, and generating current identity data according to the intercepted fragments and the current time information.
Step S3: and sending the current identity data to the server so that the server authenticates the current identity data according to the current encrypted data, and when the authentication is passed, generating current increment data according to the current version information and the latest version data and feeding back the current increment data.
Specifically, the server decrypts the current encrypted data according to a preset decryption algorithm to obtain plaintext data, intercepts fragment data from the plaintext data according to a preset interception strategy, acquires a reference fragment and reference time data from the current identity data, performs verification on the reference time data, compares the fragment data with the reference fragment after verification is passed to obtain a comparison result, and determines whether authentication is passed according to the comparison result, wherein if the fragment data is consistent with the reference fragment, the authentication is passed. The server is consistent with the decryption algorithm adopted by the set top box and the adopted interception strategy.
Step S4: and synchronously upgrading according to the current incremental data.
In the embodiment, the set top box acquires the encrypted data from the server, decrypts the encrypted data, intercepts the fragments, combines the encrypted data with the time information to generate the identity data, and sends the identity data to the server for authentication, so that the difficulty in capturing the encrypted data and cracking the decryption mode of the identity data by the illegal set top box is improved, meanwhile, the identity data has timeliness, the identity authentication of the illegal set top box according to the historically captured identity data is avoided, and the management of operators is facilitated.
It should be noted that the above-described working procedure is merely illustrative, and does not limit the scope of the present invention, and in practical application, a person skilled in the art may select part or all of them according to actual needs to achieve the purpose of the embodiment, which is not limited herein.
In addition, technical details which are not described in detail in the present embodiment can refer to the set top box synchronization upgrading method provided in any embodiment of the present invention, and are not described herein.
Furthermore, it should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or system. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or system that comprises the element.
The foregoing embodiment numbers of the present invention are merely for the purpose of description, and do not represent the advantages or disadvantages of the embodiments.
From the above description of the embodiments, it will be clear to those skilled in the art that the above-described embodiment method may be implemented by means of software plus a necessary general hardware platform, but of course may also be implemented by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present invention may be embodied essentially or in a part contributing to the prior art in the form of a software product stored in a storage medium (e.g. Read Only Memory)/RAM, magnetic disk, optical disk) and including several instructions for causing a terminal device (which may be a mobile phone, a computer, a server, or a network device, etc.) to perform the method according to the embodiments of the present invention.
The foregoing description is only of the preferred embodiments of the present invention, and is not intended to limit the scope of the invention, but rather is intended to cover any equivalents of the structures or equivalent processes disclosed herein or in the alternative, which may be employed directly or indirectly in other related arts.

Claims (10)

1. The set top box synchronous upgrading method is characterized by comprising the following steps of:
receiving set top box identifiers and version information sent by a plurality of set top boxes;
performing identity authentication on the plurality of set top boxes according to the received set top box identifiers, and determining a plurality of target set top boxes passing the authentication;
and synchronously upgrading the plurality of target set-top boxes based on the version information corresponding to each target set-top box.
2. The method for synchronously upgrading set-top boxes according to claim 1, wherein the step of authenticating the plurality of set-top boxes according to the received set-top box identifiers and determining a plurality of target set-top boxes passing authentication comprises the steps of:
inquiring the encryption data corresponding to each set top box according to the received set top box identification;
sending corresponding encrypted data to each set top box so that each set top box generates identity data according to the received encrypted data and feeds back the identity data;
and authenticating the identity data fed back by each set top box according to the encrypted data corresponding to each set top box, and determining a plurality of target set top boxes passing the authentication.
3. The method for synchronously upgrading a set top box of claim 2, wherein the method further comprises:
and sending corresponding encrypted data to each set top box so that each set top box decrypts the received encrypted data according to a preset decryption algorithm, intercepts fragments from plaintext data obtained by decryption according to a preset interception strategy, generates identity data according to the intercepted fragments and current time information, and feeds back the identity data.
4. The method for synchronously upgrading set-top boxes according to claim 3, wherein authenticating the identity data fed back by each set-top box according to the encrypted data corresponding to each set-top box, and determining a plurality of target set-top boxes passing authentication comprises:
decrypting the encrypted data corresponding to each set top box according to a preset decryption algorithm to obtain plaintext data corresponding to each set top box;
intercepting fragment data from the plaintext data according to a preset interception strategy;
acquiring a reference fragment and reference time data from the identity data;
verifying the reference time data;
after the verification is passed, comparing the fragment data with the reference fragment to obtain a comparison result;
and determining a plurality of target set top boxes passing the authentication according to the comparison result.
5. The method for synchronously upgrading set-top boxes according to claim 3, wherein before receiving set-top box identifiers and version information sent by a plurality of set-top boxes, the method further comprises:
interacting with a set top box to be activated in a connection state, and acquiring an activation code and a target set top box identifier corresponding to the set top box to be activated;
verifying the activation code;
after the verification is passed, combining the target set top box identification with the generated random number to obtain identification data;
randomly selecting a target encryption algorithm to encrypt the identification data to obtain encrypted data corresponding to the target set top box identification, and storing the encrypted data corresponding to the target set top box identification;
and sending a decryption algorithm identification corresponding to the target encryption algorithm to the set top box to be activated, so that the set top box to be activated presets a corresponding decryption algorithm according to the decryption algorithm identification.
6. The method for synchronously upgrading a set top box of claim 5, wherein the method further comprises:
inquiring contact information corresponding to an activated set top box when a decryption algorithm checking instruction sent by the activated set top box is received;
and sending the decryption algorithm identification corresponding to the activated set top box to the equipment corresponding to the contact information.
7. The method for synchronously upgrading set top boxes according to any one of claims 1-6, wherein the step of synchronously upgrading the plurality of target set top boxes based on version information corresponding to each target set top box includes:
generating incremental data corresponding to each target set top box based on version information corresponding to each target set top box and the latest version data;
and sending corresponding incremental data to each target set top box so that each target set top box can be synchronously upgraded according to the incremental data.
8. The set top box synchronous upgrading method is applied to a set top box and is characterized by comprising the following steps of:
transmitting a current set top box identifier and current version information to a server, so that the server inquires corresponding current encryption data according to the current set top box identifier and feeds back the current encryption data;
decrypting the current encrypted data according to a preset decryption algorithm, intercepting fragments from plaintext data obtained by decryption according to a preset interception strategy, and generating current identity data according to the intercepted fragments and current time information;
the current identity data is sent to the server, so that the server authenticates the current identity data according to the current encrypted data, and when the authentication is passed, current incremental data is generated according to the current version information and the latest version data, and the current incremental data is fed back;
and synchronously upgrading according to the current incremental data.
9. The set top box synchronous upgrading device is characterized by comprising a server or a set top box;
the server includes: a memory, a processor, and a set-top box synchronization upgrade program stored on the memory and operable on the processor, the set-top box synchronization upgrade program configured to implement the set-top box synchronization upgrade method of any one of claims 1 to 7;
the set-top box comprises: the system comprises a memory, a processor and a set top box synchronous upgrading program stored on the memory and capable of running on the processor, wherein the set top box synchronous upgrading program is configured to realize the set top box synchronous upgrading method as claimed in claim 8.
10. A storage medium, wherein an organic set-top box synchronization upgrade program is stored on the storage medium, and when executed by a processor, the set-top box synchronization upgrade program implements the set-top box synchronization upgrade method according to any one of claims 1 to 8.
CN202211710158.9A 2022-12-29 2022-12-29 Set top box synchronous upgrading method, equipment and storage medium Pending CN116233551A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211710158.9A CN116233551A (en) 2022-12-29 2022-12-29 Set top box synchronous upgrading method, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211710158.9A CN116233551A (en) 2022-12-29 2022-12-29 Set top box synchronous upgrading method, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN116233551A true CN116233551A (en) 2023-06-06

Family

ID=86583458

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211710158.9A Pending CN116233551A (en) 2022-12-29 2022-12-29 Set top box synchronous upgrading method, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN116233551A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117272327A (en) * 2023-10-31 2023-12-22 深圳市巨诺电子有限公司 Set top box encryption upgrading method and set top box

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117272327A (en) * 2023-10-31 2023-12-22 深圳市巨诺电子有限公司 Set top box encryption upgrading method and set top box
CN117272327B (en) * 2023-10-31 2024-05-03 深圳市巨诺电子有限公司 Set top box encryption upgrading method and set top box

Similar Documents

Publication Publication Date Title
US8447970B2 (en) Securing out-of-band messages
CN101258505B (en) Secure software updates
US20170188234A1 (en) Methods and apparatus for storage and execution of access control clients
US20080189695A1 (en) Updating of Data Instructions
CN109145628B (en) Data acquisition method and system based on trusted execution environment
CN114637987B (en) Security chip firmware downloading method and system based on platform verification
EP4322464A1 (en) Information transmission method, storage medium and electronic device
CN110621014A (en) Vehicle-mounted equipment, program upgrading method thereof and server
CN112566119A (en) Terminal authentication method and device, computer equipment and storage medium
US20110154436A1 (en) Provider Management Methods and Systems for a Portable Device Running Android Platform
CN111901287B (en) Method and device for providing encryption information for light application and intelligent equipment
CN116233551A (en) Set top box synchronous upgrading method, equipment and storage medium
KR101213301B1 (en) Apparatus and method for re-authentication treatment of downloadable conditional access system
CN110287725B (en) Equipment, authority control method thereof and computer readable storage medium
WO2024124804A1 (en) Software function activation method, apparatus and device, and storage medium
CN105100030B (en) Access control method, system and device
CN108429732B (en) Method and system for acquiring resources
KR101329789B1 (en) Encryption Method of Database of Mobile Communication Device
CN110855434B (en) Key processing method, device, terminal equipment and storage medium
CN114501591A (en) Intelligent equipment network access method and device and computer readable storage medium
CN111246480A (en) Application communication method, system, equipment and storage medium based on SIM card
CN114444093B (en) Data security encryption method, device, equipment and computer readable storage medium
CN112968889B (en) Host right management method, terminal, device and computer readable storage medium
CN113506390B (en) Access control method, device, equipment and readable storage medium
CN112564888B (en) Method and equipment for deploying private cloud

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination