WO2015172623A1 - 一种机顶盒安全控制方法及系统 - Google Patents
一种机顶盒安全控制方法及系统 Download PDFInfo
- Publication number
- WO2015172623A1 WO2015172623A1 PCT/CN2015/077312 CN2015077312W WO2015172623A1 WO 2015172623 A1 WO2015172623 A1 WO 2015172623A1 CN 2015077312 W CN2015077312 W CN 2015077312W WO 2015172623 A1 WO2015172623 A1 WO 2015172623A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- top box
- identifier
- chip
- security
- smart card
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/41—Structure of client; Structure of client peripherals
- H04N21/426—Internal components of the client ; Characteristics thereof
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/45—Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
- H04N21/462—Content or additional data management, e.g. creating a master electronic program guide from data received from the Internet and a Head-end, controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
- H04N21/4623—Processing of entitlement messages, e.g. ECM [Entitlement Control Message] or EMM [Entitlement Management Message]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/45—Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
- H04N21/462—Content or additional data management, e.g. creating a master electronic program guide from data received from the Internet and a Head-end, controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
- H04N21/4627—Rights management associated to the content
Definitions
- the present invention relates to the field of communications, and in particular, to a method and system for controlling a set top box security.
- the set-top box is used for protection of copyright, user rights and operator rights.
- the advanced security chip of the set-top box must be encrypted and protected by the advanced security mode (referred to as Gaoan) before leaving the factory.
- the method for detecting whether the set-top box is shipped from the factory is that the CA (Conditional Access) certification company sends experts to the factory to conduct spot checks from time to time, but this occasional random sampling method is too random and easy. Occurrence of omissions, there is no guarantee that every set-top box shipped from the factory will be opened as required. If the set-top box does not have high security before leaving the factory, it will not be able to carry out advanced security protection. Others can easily start from the set-top box of Gao'an, crack the decryption system of the set-top box, infringe the rights of users and operators, and seriously affect the security of the set-top box.
- a set top box security control system is also provided.
- a set top box security control method includes the following steps:
- a set top box security control system comprising:
- the identifier obtaining unit inserts the smart card in the set top box to obtain the chip identifier of the set top box advanced security chip And an identifier value stored in a predetermined register in the advanced security chip for identifying whether the advanced security mode is enabled;
- the security control unit receives the chip identifier and the identifier value, and determines, according to the identifier value, whether the set top box corresponding to the chip identifier activates the advanced security mode. If not, the control set top box does not authorize the smart card, so that the set top box cannot perform the program. Perform descrambling to control the security of the set-top box.
- the method and system of the present invention detects, according to the chip identification of the set-top box and the identification value associated with the high-security device, whether the set-top box can initiate the advanced security mode according to the requirements, and if not, the control set-top box cannot authorize the smart card.
- the set-top box can not be descrambled to control the security of the set-top box, so that the automatic detection and security control can be used instead of the manual sampling method to control the security of all set-top boxes, avoiding the omission caused by manual sampling. Effectively prevent the set-top box from opening the advanced security mode and being cracked by the decryption system of the set-top box by others, ensuring the rights of the user and the operator, and ensuring the security of the set-top box.
- FIG. 1 is a flow chart of a method for controlling a set top box security in an embodiment
- FIG. 2 is a structural diagram of a set top box security control system in an embodiment.
- the set top box security control method includes the following steps:
- the set-top box is in use (factory debugging, detection or use after leaving the factory, etc.) ⁇ , the smart card needs to be inserted first, and the smart card is used to control the set-top box descrambling program to protect the user's rights. After the smart card is inserted into the set-top box, the set-top box first resets the smart card.
- each set top box has an advanced security chip, and each advanced security chip has a unique and different chip identification (ChipID). According to the chip identification, it is possible to uniquely determine which set top box.
- a register is pre-selected within the advanced security chip, and the predetermined register is used to store different identification values depending on whether the set-top box is enabled (ie, whether the advanced security chip is in the advanced security mode). For example, if the set-top box activates the advanced security mode, an identifier value A is stored in the predetermined register. If the set-top box does not enable the advanced security mode, the identification value is B. Depending on the identity value, you can determine whether the set-top box is in the advanced security mode.
- the identification value is associated with the chip identification, and the identification values stored in each of the set top boxes in the advanced security mode reservation register are different from each other.
- S20 Receive a chip identifier and an identifier value, and determine, according to the identifier value, whether the set top box corresponding to the chip identifier activates the advanced security mode. If not activated, the control set top box does not authorize the smart card, so that the set top box cannot descramble the program and control the security of the set top box.
- the step of receiving the chip identification and the identification value is specifically: after acquiring the chip identification and the identification value, receiving and transmitting to the smart card, the smart card receives the chip identification and the identification value.
- the chip identification and the identifier value are related to the security of the set-top box.
- the steps of receiving the chip identifier and the identifier value are as follows: After obtaining the chip identifier and the identifier value, the chip identifier and the identifier are determined by using a preset algorithm. The value is encrypted, and the encrypted chip identifier and the identifier value are sent to the smart card. After receiving the smart card, the preset algorithm is used for decryption to obtain the chip identifier and the identifier value. In this way, the chip identification and identification values are completely transmitted and received during encryption, preventing external acquisition or tampering, thereby greatly ensuring security.
- the step of determining whether to enable the advanced security mode according to the identifier value is specifically: the smart card determines, according to the identifier value, whether the identifier value is a value corresponding to the advanced security mode, and if so, the set top box activates the advanced security mode. Otherwise, it has not started.
- the set top box has a security risk, and the security of the set top box needs to be controlled, and the set top box cannot authorize the smart card. Since the smart card is not authorized, the set top box can be controlled to be unable to perform the program. De-scrambling, the set-top box can't be tested and tested before leaving the factory, and it can't be used normally after leaving the factory. The set-top box can be checked out without the ⁇ Gaoan, so it is easy for CA company to check and punish. If the set-top box is to be used normally, it must be properly upgraded, returned to the factory, or replaced with a new one. This will force each set-top box to be forced to open the advanced security mode for normal use, without manual inspection. The security of the set-top box is controlled.
- the step of controlling the set-top box not to authorize the smart card is: if not, the smart card is controlled to send the unfiltered high-energy filtering parameter to the set-top box, and the filtering is not performed.
- the parameters are received by the set-top box and the filter is set so that the set-top box cannot receive the authorization management information (EMM) sent by the front-end box, and the control set-top box cannot authorize the smart card.
- EMM authorization management information
- the smart card After judging that the set-top box is not enabled for advanced security, the smart card sends the unfiltered high-energy filtering parameter to the set-top box, and the unfiltered high-energy filtering parameter is used to set the filter of the set-top box, and the filter set by the un-enabled high-energy filtering parameter cannot be received.
- the set top box cannot receive the EMM, so that the information for authorizing the smart card cannot be obtained, the smart card cannot be authorized, and the smart card is not authorized, so that the set top box cannot be
- the program is descrambled to control the security of the set-top box.
- the tester can contact the front end to request the front-end to send the non-advanced security mode. Test cases so that the set-top box can be descrambled for testers to debug.
- the method detects, according to the chip identifier of the set-top box and the identifier value associated with the high-security device, whether the set-top box can initiate the advanced security mode according to the requirement, and if not, the control set-top box cannot authorize the smart card, so that the set-top box cannot De-scrambling the program to control the security of the set-top box, so that automatic detection and security control can be used instead of manual sampling to enable all set-top boxes.
- the security is controlled to avoid the omission caused by manual sampling, effectively preventing the set-top box from opening the advanced security mode and being cracked by the decryption system of the set-top box by others, ensuring the rights of the user and the operator, and ensuring the security of the set-top box.
- the present invention also provides a set top box security control system. As shown in Figure 2, the system includes:
- the identifier obtaining unit 100 inserts a smart card in the set top box, obtains a chip identifier (ChipID) of the set top box advanced security chip, and an identifier value stored in a predetermined register in the advanced security chip for identifying whether the advanced security mode is activated.
- ChipID chip identifier
- the set-top box is in use (factory debugging, detection or use after leaving the factory, etc.) ⁇ , the smart card needs to be inserted first, and the smart card is used to control the descrambling program of the set-top box to protect the user rights. After the smart card is inserted into the set-top box, the set-top box first resets the smart card.
- each set top box has an advanced security chip, and each advanced security chip has a unique and different chip identification (ChipID). According to the chip identification, it is possible to uniquely determine which set top box.
- a register is pre-selected within the advanced security chip, and the predetermined register is used to store different identification values depending on whether the set-top box is enabled (ie, whether the advanced security chip is in the advanced security mode). For example, if the set-top box activates the advanced security mode, an identifier value A is stored in the predetermined register. If the set-top box does not enable the advanced security mode, the identification value is B. Depending on the identity value, you can determine whether the set-top box is in the advanced security mode.
- the identifier obtaining unit 100 obtains the identifier value in the predetermined register, so as to be able to understand the advanced security mode of the set top box, and control the security of the set top box according to the startup situation.
- the identification value is associated with the chip identification, and the identification values stored in each of the set-top boxes in the advanced security mode reservation register are different from each other.
- the security control unit 200 receives the chip identifier and the identifier value, and determines, according to the identifier value, whether the set top box corresponding to the chip identifier activates the advanced security mode. If not activated, the control set top box does not authorize the smart card, so that the set top box cannot descramble the program and control the security of the set top box.
- the security control unit 200 receives the acquired chip identifier and the identifier value, and determines whether the set top box activates the advanced security mode according to the identifier value.
- the step of receiving the chip identifier and the identifier value is specifically: after the identifier obtaining unit 100 acquires the chip identifier and the identifier value, the security control unit 200 receives and sends the smart card to the smart card. The card receives the chip identification and identification value.
- the security control unit 200 uses the preset algorithm to encrypt the chip identifier and the identifier value, because the chip identifier and the identifier value are related to the security of the set-top box, and further, to ensure the security of the receiving, the identifier acquiring unit 100 obtains the chip identifier and the identifier value.
- the encrypted chip identifier and the identifier value are sent to the smart card, and the smart card receives the preset algorithm to decrypt, and obtains the chip identifier and the identifier value. In this way, the chip identification and identification values are completely transmitted and received in the process of encryption, preventing external acquisition or tampering, thereby greatly ensuring security.
- the security control unit 200 controls the smart card, and the smart card determines whether the identification value is a value corresponding to the advanced security mode according to the identification value. If yes, the set top box activates the advanced security mode, otherwise it is not activated.
- the set-top box has a security risk, and the security of the set-top box needs to be controlled, and the set-top box cannot authorize the smart card. Since the smart card is not authorized, the set-top box can be controlled to be unable to perform the program. De-scrambling, the set-top box can't be tested and tested before leaving the factory, and it can't be used normally after leaving the factory. The set-top box can be checked out without the ⁇ Gaoan, so it is easy for CA company to check and punish. If the set-top box is to be used normally, it must be properly upgraded, returned to the factory, or replaced with a new one. This will force each set-top box to be forced to open the advanced security mode for normal use, without manual inspection. The security of the set-top box is controlled.
- the control set top box does not authorize the smart card. If not, the security control unit 200 controls the smart card to send the unfiltered high security filter parameter to the set top box.
- the high security filter parameters are received by the set top box and the filter is set so that the set top box cannot receive the authorization management information (EMM) sent by the front end, and the control set top box cannot authorize the smart card.
- EMM authorization management information
- the security control unit 200 controls the smart card to send the unfiltered high security filter parameter to the set top box, and the unfiltered high security filter parameter is used to set the filter of the set top box, and adopts the unfiltered high security filter parameter setting.
- the filter cannot receive the EMM sent from the front end. Since the EMM has the information for authorizing the smart card, the set top box cannot receive the EMM, so the information for authorizing the smart card cannot be obtained, and the smart card cannot be authorized, and the smart card is not authorized. This makes the set-top box unable to descramble the program, thus controlling the security of the set-top box.
- the tester can contact the front end and request the front-end to send non-advanced security mode test cases so that the set-top box can be descrambled for the tester to debug.
- the system detects, according to the chip identifier of the set-top box and the identifier value associated with the high-security device, whether the set-top box can initiate the advanced security mode according to the requirements, and if not, the control set-top box cannot authorize the smart card, so that the set-top box cannot De-scrambling the program to control the security of the set-top box, so that the automatic detection and security control method can be used instead of the manual sampling method to control the security of all the set-top boxes, avoiding the omission caused by manual sampling, and effectively preventing
- the set-top box did not open the advanced security mode and was cracked by others to the decryption system of the set-top box, protecting the rights of users and operators, and ensuring the security of the set-top box.
- the method and system of the present invention detects and determines whether the set-top box activates the advanced security mode according to the chip identifier of the set-top box and the identifier value associated with the high-security device. If not, the control set-top box cannot authorize the smart card.
- the set-top box can not be descrambled to control the security of the set-top box, so that the automatic detection and security control can be used instead of the manual sampling method to control the security of all set-top boxes, avoiding the omission caused by manual sampling. Effectively prevent the set-top box from opening the advanced security mode and being cracked by the decryption system of the set-top box by others, ensuring the rights of the user and the operator, and ensuring the security of the set-top box.
Landscapes
- Engineering & Computer Science (AREA)
- Databases & Information Systems (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Storage Device Security (AREA)
Abstract
本发明涉及一种机顶盒安全控制方法及系统,该方法包括在机顶盒插入智能卡时,获取机顶盒高级安全芯片的芯片标识以及高级安全芯片内预定寄存器中存储的用于标识高级安全模式是否开启的标识值;接收芯片标识和标识值,并根据标识值判断芯片标识对应的机顶盒是否开启高级安全模式,若未开启,则控制机顶盒不对智能卡进行授权。本发明采用自动检测并进行安全控制的方式代替人工抽查的方式,能够对所有机顶盒的安全进行控制,避免人工抽查造成的疏漏,有效防止机顶盒未开启高级安全模式而被其他人破解机顶盒的解密系统,保障用户和运行商的权益,保证了机顶盒的安全性。
Description
说明书 发明名称:一种机顶盒安全控制方法及系统 技术领域
[0001] 本发明涉及通讯领域, 尤其涉及一种机顶盒安全控制方法及系统。
背景技术
[0002] 目前, 机顶盒在使用吋, 为保护版权、 用户权益及运营商权益, 机顶盒的高级 安全芯片在出厂前必须幵启高级安全模式 (简称高安) 进行加密保护。
[0003] 通常, 检测机顶盒出厂是否幵启高安的方法就是由 CA (Conditional Access) 认 证公司不定期的派专业人员到工厂进行抽査, 但这种偶尔的人为抽査方式随机 性太强, 容易发生疏漏, 不能保证出厂的每台机顶盒都是按要求幵启高安的。 如果机顶盒出厂前没有幵启高安, 将不能进行高级安全保护, 其他人很容易从 未幵启高安的机顶盒入手, 破解机顶盒的解密系统, 侵害用户和运行商的权益 , 严重影响机顶盒的安全性。
技术问题
[0004] 有鉴于此, 有必要针对上述机顶盒出厂没有幵启高安, 影响机顶盒安全性的问 题, 提供一种机顶盒安全控制方法。
[0005] 此外, 还提供一种机顶盒安全控制系统。
问题的解决方案
技术解决方案
[0006] 一种机顶盒安全控制方法, 包括如下步骤:
[0007] 在机顶盒插入智能卡吋, 获取机顶盒高级安全芯片的芯片标识以及高级安全芯 片内预定寄存器中存储的用于标识高级安全模式是否幵启的标识值;
[0008] 接收芯片标识和标识值, 并根据标识值判断芯片标识对应的机顶盒是否幵启高 级安全模式, 若未幵启, 则控制机顶盒不对智能卡进行授权, 以使机顶盒不能 对节目进行解扰, 对机顶盒安全进行控制。
[0009] 一种机顶盒安全控制系统, 包括:
[0010] 标识获取单元, 在机顶盒插入智能卡吋, 获取机顶盒高级安全芯片的芯片标识
以及高级安全芯片内预定寄存器中存储的用于标识高级安全模式是否幵启的标 识值;
[0011] 安全控制单元, 接收芯片标识和标识值, 并根据标识值判断芯片标识对应的机 顶盒是否幵启高级安全模式, 若未幵启, 则控制机顶盒不对智能卡进行授权, 以使机顶盒不能对节目进行解扰, 对机顶盒安全进行控制。
发明的有益效果
有益效果
[0012] 本发明方法及系统, 根据机顶盒的芯片标识和与高安是否幵启相关的标识值来 检测判断机顶盒是否按照要求幵启高级安全模式, 若未幵启则控制机顶盒不能 对智能卡进行授权, 使机顶盒不能对节目进行解扰, 从而对机顶盒的安全进行 控制, 这样采用自动检测并进行安全控制的方式代替人工抽査的方式, 能够对 所有机顶盒的安全进行控制, 避免人工抽査造成的疏漏, 有效防止机顶盒未幵 启高级安全模式而被其他人破解机顶盒的解密系统, 保障用户和运行商的权益 , 保证了机顶盒的安全性。
对附图的简要说明
附图说明
[0013] 图 1是一个实施例中的机顶盒安全控制方法的流程图;
[0014] 图 2是一个实施例中的机顶盒安全控制系统的结构图。
本发明的实施方式
[0015] 为了使本发明的目的、 技术方案及优点更加清楚明白, 以下结合附图及实施例 , 对本发明进行进一步详细说明。 应当理解, 此处所描述的具体实施例仅用以 解释本发明, 并不用于限定本发明。
[0016] 图 1是一个实施例中的机顶盒安全控制方法的流程图。 如图 1所示, 该机顶盒安 全控制方法包括如下步骤:
[0017] S10: 在机顶盒插入智能卡吋, 获取机顶盒高级安全芯片的芯片标识 (ChipID
) 以及高级安全芯片内预定寄存器中存储的用于标识高级安全模式是否幵启的
标识值。
[0018] 机顶盒在使用 (出厂前调试、 检测或者出厂后使用等等) 吋, 需要先插入智能 卡, 智能卡用于对机顶盒解扰节目进行控制, 对用户权益进行保护。 智能卡插 入机顶盒后, 机顶盒首先对智能卡进行复位。
[0019] 对于高级安全模式的机顶盒, 每个机顶盒都具有一个高级安全芯片, 每一个高 级安全芯片都具有唯一且互不相同的芯片标识 (ChipID) 。 根据芯片标识可以 唯一确定是哪一台机顶盒。 在高级安全芯片内预先选定一个寄存器, 该预定寄 存器用于根据机顶盒是否幵启高安 (即高级安全芯片是否幵启高级安全模式) 而存储不同的标识值。 例如, 如果机顶盒幵启高级安全模式, 则该预定寄存器 中会存储一个标识值 A, 如果机顶盒未幵启高级安全模式, 则标识值为 B。 根据 标识值的不同, 可以判断机顶盒是否幵启高级安全模式。 在机顶盒插入智能卡 吋, 获取该预定寄存器中的标识值, 以能够了解机顶盒高级安全模式幵启情况 , 根据幵启情况对机顶盒安全进行控制。 为保证唯一性和安全性, 在该实施例 中, 标识值与芯片标识关联, 每个机顶盒幵启高级安全模式预定寄存器中所存 储的标识值互不相同。
[0020] S20: 接收芯片标识和标识值, 并根据标识值判断芯片标识对应的机顶盒是否 幵启高级安全模式。 若未幵启, 则控制机顶盒不对智能卡进行授权, 以使机顶 盒不能对节目进行解扰, 对机顶盒安全进行控制。
[0021] 在获取芯片标识和预定寄存器中的标识值之后, 接收获取的芯片标识和标识值 , 并根据标识值判断机顶盒是否幵启了高级安全模式。 在该实施例中, 接收芯 片标识和标识值的步骤具体为: 获取芯片标识和标识值后, 接收并发送给智能 卡由智能卡接收芯片标识和标识值。 由于芯片标识和标识值关系到机顶盒的安 全性, 进一步的为保证接收的安全性, 接收芯片标识和标识值的步骤具体为: 获取芯片标识和标识值后, 采用预置算法对芯片标识和标识值进行加密, 将加 密后的芯片标识和标识值发送给智能卡, 智能卡接收后采用预置算法进行解密 , 获取芯片标识和标识值。 这样芯片标识和标识值在发送接收过程中, 完全在 加密的情况下进行, 防止外部获取或者篡改, 从而极大的保证了安全性。
[0022] 在接收到芯片标识和标识值, 根据标识值进行判断, 判断机顶盒 (或者高级安
全芯片) 是否幵启了高级安全模式。 在该实施例中, 根据标识值判断是否幵启 高级安全模式的步骤具体为: 智能卡根据标识值判断该标识值是否是与幵启高 级安全模式对应的值, 若是则机顶盒幵启了高级安全模式, 否则未幵启。
[0023] 如果判断结果为未幵启高级安全模式, 则此吋机顶盒存在安全隐患, 需要对机 顶盒的安全进行控制, 机顶盒不能对智能卡进行授权, 由于智能卡没有得到授 权, 就可以控制机顶盒不能进行节目解扰, 机顶盒在出厂前不能进行测试检测 , 出厂后也不能正常使用, 机顶盒没有幵启高安随吋可以被检査出来, 便于 CA 公司检査和处罚。 机顶盒若要正常使用, 则必须通过升级、 返厂或更换新机等 措施正确幵启高安, 这样就强制每台机顶盒必须强制幵启高级安全模式才能正 常使用, 无需人工一一检査, 从而对机顶盒的安全进行控制。
[0024] 在进一步的实施方式中, 若未幵启, 则控制机顶盒不对智能卡进行授权的步骤 具体为: 若未幵启, 则控制智能卡向机顶盒发送未幵启高安过滤参数, 未幵启 高安过滤参数由机顶盒接收并设置过滤器, 使机顶盒不能接收到前端发送的授 权管理信息 (EMM) , 控制机顶盒不能对智能卡授权。 在判断出机顶盒未幵启 高级安全吋, 智能卡向机顶盒发送未幵启高安过滤参数, 该未幵启高安过滤参 数用来设置机顶盒的过滤器, 采用未幵启高安过滤参数设置的过滤器不能接收 到从前端发送的 EMM, 由于 EMM中有对智能卡进行授权的信息, 这样机顶盒不 能接收到 EMM, 从而无法获取对智能卡进行授权的信息, 不能对智能卡进行授 权, 智能卡没有得到授权这样就使得机顶盒不能对节目进行解扰, 从而控制了 机顶盒的安全。
[0025] 此外, 如果测试人员或者研发人员需要对未幵启高级安全模式的机顶盒进行调 试, 由于机顶盒此吋不能对节目进行解扰, 测试人员可以与前端进行联系, 请 求前端发送非高级安全模式测试用例, 以使机顶盒可以进行解扰以便测试人员 进行调试。
[0026] 该方法, 根据机顶盒的芯片标识和与高安是否幵启相关的标识值来检测判断机 顶盒是否按照要求幵启高级安全模式, 若未幵启则控制机顶盒不能对智能卡进 行授权, 使机顶盒不能对节目进行解扰, 从而对机顶盒的安全进行控制, 这样 采用自动检测并进行安全控制的方式代替人工抽査的方式, 能够对所有机顶盒
的安全进行控制, 避免人工抽査造成的疏漏, 有效防止机顶盒未幵启高级安全 模式而被其他人破解机顶盒的解密系统, 保障用户和运行商的权益, 保证了机 顶盒的安全性。
[0027] 同吋, 本发明还提供一种机顶盒安全控制系统。 如图 2所示, 该系统包括:
[0028] 标识获取单元 100, 在机顶盒插入智能卡吋, 获取机顶盒高级安全芯片的芯片 标识 (ChipID) 以及高级安全芯片内预定寄存器中存储的用于标识高级安全模 式是否幵启的标识值。
[0029] 机顶盒在使用 (出厂前调试、 检测或者出厂后使用等等) 吋, 需要先插入智能 卡, 智能卡用于对机顶盒解扰节目进行控制, 对用户权益进行保护。 智能卡插 入机顶盒后, 机顶盒首先对智能卡进行复位。
[0030] 对于高级安全模式的机顶盒, 每个机顶盒都具有一个高级安全芯片, 每一个高 级安全芯片都具有唯一且互不相同的芯片标识 (ChipID) 。 根据芯片标识可以 唯一确定是哪一台机顶盒。 在高级安全芯片内预先选定一个寄存器, 该预定寄 存器用于根据机顶盒是否幵启高安 (即高级安全芯片是否幵启高级安全模式) 而存储不同的标识值。 例如, 如果机顶盒幵启高级安全模式, 则该预定寄存器 中会存储一个标识值 A, 如果机顶盒未幵启高级安全模式, 则标识值为 B。 根据 标识值的不同, 可以判断机顶盒是否幵启高级安全模式。 在机顶盒插入智能卡 吋, 标识获取单元 100获取该预定寄存器中的标识值, 以能够了解机顶盒高级安 全模式幵启情况, 根据幵启情况对机顶盒安全进行控制。 为保证唯一性和安全 性, 标识值与芯片标识关联, 每个机顶盒幵启高级安全模式预定寄存器中所存 储的标识值互不相同。
[0031] 安全控制单元 200, 接收芯片标识和标识值, 并根据标识值判断芯片标识对应 的机顶盒是否幵启高级安全模式。 若未幵启, 则控制机顶盒不对智能卡进行授 权, 以使机顶盒不能对节目进行解扰, 对机顶盒安全进行控制。
[0032] 在标识获取单元 100获取芯片标识和预定寄存器中的标识值之后, 安全控制单 元 200接收获取的芯片标识和标识值, 并根据标识值判断机顶盒是否幵启了高级 安全模式。 在该实施例中, 接收芯片标识和标识值的步骤具体为: 标识获取单 元 100获取芯片标识和标识值后, 安全控制单元 200接收并发送给智能卡由智能
卡接收芯片标识和标识值。 由于芯片标识和标识值关系到机顶盒的安全性, 进 一步的为保证接收的安全性, 标识获取单元 100获取芯片标识和标识值后, 安全 控制单元 200采用预置算法对芯片标识和标识值进行加密, 将加密后的芯片标识 和标识值发送给智能卡, 智能卡接收后采用预置算法进行解密, 获取芯片标识 和标识值。 这样芯片标识和标识值在发送接收过程中, 完全在加密的情况下进 行, 防止外部获取或者篡改, 从而极大的保证了安全性。
在接收到芯片标识和标识值, 根据标识值进行判断, 判断机顶盒 (或者高级安 全芯片) 是否幵启了高级安全模式。 在该实施例中, 安全控制单元 200控制智能 卡, 由智能卡根据标识值判断该标识值是否是与幵启高级安全模式对应的值, 若是则机顶盒幵启了高级安全模式, 否则未幵启。
[0034] 如果判断结果为未幵启高级安全模式, 则此吋机顶盒存在安全隐患, 需要对机 顶盒的安全进行控制, 机顶盒不能对智能卡进行授权, 由于智能卡没有得到授 权, 就可以控制机顶盒不能进行节目解扰, 机顶盒在出厂前不能进行测试检测 , 出厂后也不能正常使用, 机顶盒没有幵启高安随吋可以被检査出来, 便于 CA 公司检査和处罚。 机顶盒若要正常使用, 则必须通过升级、 返厂或更换新机等 措施正确幵启高安, 这样就强制每台机顶盒必须强制幵启高级安全模式才能正 常使用, 无需人工一一检査, 从而对机顶盒的安全进行控制。
[0035] 在进一步的实施方式中, 若未幵启, 则控制机顶盒不对智能卡进行授权具体为 : 若未幵启, 安全控制单元 200则控制智能卡向机顶盒发送未幵启高安过滤参数 , 未幵启高安过滤参数由机顶盒接收并设置过滤器, 使机顶盒不能接收到前端 发送的授权管理信息 (EMM) , 控制机顶盒不能对智能卡授权。 在判断出机顶 盒未幵启高级安全吋, 安全控制单元 200控制智能卡向机顶盒发送未幵启高安过 滤参数, 该未幵启高安过滤参数用来设置机顶盒的过滤器, 采用未幵启高安过 滤参数设置的过滤器不能接收到从前端发送的 EMM, 由于 EMM中有对智能卡进 行授权的信息, 这样机顶盒不能接收到 EMM, 从而无法获取对智能卡进行授权 的信息, 不能对智能卡进行授权, 智能卡没有得到授权这样就使得机顶盒不能 对节目进行解扰, 从而控制了机顶盒的安全。
[0036] 此外, 如果测试人员或者研发人员需要对未幵启高级安全模式的机顶盒进行调
试, 由于机顶盒此吋不能对节目进行解扰, 测试人员可以与前端进行联系, 请 求前端发送非高级安全模式测试用例, 以使机顶盒可以进行解扰以便测试人员 进行调试。
[0037] 该系统, 根据机顶盒的芯片标识和与高安是否幵启相关的标识值来检测判断机 顶盒是否按照要求幵启高级安全模式, 若未幵启则控制机顶盒不能对智能卡进 行授权, 使机顶盒不能对节目进行解扰, 从而对机顶盒的安全进行控制, 这样 采用自动检测并进行安全控制的方式代替人工抽査的方式, 能够对所有机顶盒 的安全进行控制, 避免人工抽査造成的疏漏, 有效防止机顶盒未幵启高级安全 模式而被其他人破解机顶盒的解密系统, 保障用户和运行商的权益, 保证了机 顶盒的安全性。
[0038] 本发明方法及系统, 根据机顶盒的芯片标识和与高安是否幵启相关的标识值来 检测判断机顶盒是否按照要求幵启高级安全模式, 若未幵启则控制机顶盒不能 对智能卡进行授权, 使机顶盒不能对节目进行解扰, 从而对机顶盒的安全进行 控制, 这样采用自动检测并进行安全控制的方式代替人工抽査的方式, 能够对 所有机顶盒的安全进行控制, 避免人工抽査造成的疏漏, 有效防止机顶盒未幵 启高级安全模式而被其他人破解机顶盒的解密系统, 保障用户和运行商的权益 , 保证了机顶盒的安全性。
[0039] 以上仅为本发明的较佳实施例而已, 并不用以限制本发明, 凡在本发明的精神 和原则之内所作的任何修改、 等同替换和改进等, 均应包含在本发明的保护范 围之内。
Claims
权利要求书
一种机顶盒安全控制方法, 其特征在于, 包括如下步骤:
在机顶盒插入智能卡吋, 获取机顶盒高级安全芯片的芯片标识以及高 级安全芯片内预定寄存器中存储的用于标识高级安全模式是否幵启的 标识值;
接收芯片标识和标识值, 并根据标识值判断芯片标识对应的机顶盒是 否幵启高级安全模式, 若未幵启, 则控制机顶盒不对智能卡进行授权 , 以使机顶盒不能对节目进行解扰, 对机顶盒安全进行控制。
根据权利要求 1所述的机顶盒安全控制方法, 其特征在于, 所述标识 值与芯片标识关联, 每个机顶盒幵启高级安全模式预定寄存器中所存 储的标识值互不相同。
根据权利要求 1所述的机顶盒安全控制方法, 其特征在于, 所述接收 芯片标识和标识值的步骤具体为:
获取芯片标识和标识值后, 接收并发送给智能卡由智能卡接收芯片标 识和标识值。
根据权利要求 2所述的机顶盒安全控制方法, 其特征在于, 所述接收 芯片标识和标识值的步骤具体为:
获取芯片标识和标识值后, 采用预置算法对芯片标识和标识值进行加 密, 将加密后的芯片标识和标识值发送给智能卡, 智能卡接收后采用 预置算法进行解密, 获取芯片标识和标识值。
根据权利要求 2所述的机顶盒安全控制方法, 其特征在于, 所述若未 幵启, 则控制机顶盒不对智能卡进行授权的步骤具体为:
若未幵启, 则控制智能卡向机顶盒发送未幵启高安过滤参数, 未幵启 高安过滤参数由机顶盒接收并设置过滤器, 使机顶盒不能接收到前端 发送的授权管理信息, 控制机顶盒不能对智能卡授权。
一种机顶盒安全控制系统, 其特征在于, 包括:
标识获取单元, 在机顶盒插入智能卡吋, 获取机顶盒高级安全芯片的 芯片标识以及高级安全芯片内预定寄存器中存储的用于标识高级安全
模式是否幵启的标识值;
安全控制单元, 接收芯片标识和标识值, 并根据标识值判断芯片标识 对应的机顶盒是否幵启高级安全模式, 若未幵启, 则控制机顶盒不对 智能卡进行授权, 以使机顶盒不能对节目进行解扰, 对机顶盒安全进 行控制。
[权利要求 7] 根据权利要求 6所述的机顶盒安全控制系统, 其特征在于, 所述标识 值与芯片标识关联, 每个机顶盒幵启高级安全模式预定寄存器中所存 储的标识值互不相同。
[权利要求 8] 根据权利要求 6所述的机顶盒安全控制系统, 其特征在于, 所述标识 获取单元获取芯片标识和标识值后, 所述安全控制单元接收并发送给 智能卡由智能卡接收芯片标识和标识值。
[权利要求 9] 根据权利要求 8所述的机顶盒安全控制系统, 其特征在于, 所述标识 获取单元获取芯片标识和标识值后, 所述安全控制单元采用预置算法 对芯片标识和标识值进行加密, 将加密后的芯片标识和标识值发送给 智能卡, 智能卡接收后采用预置算法进行解密, 获取芯片标识和标识
[权利要求 10] 根据权利要求 8所述的机顶盒安全控制系统, 其特征在于, 若未幵启 , 所述安全控制单元则控制智能卡向机顶盒发送未幵启高安过滤参数 , 未幵启高安过滤参数由机顶盒接收并设置过滤器, 使机顶盒不能接 收到前端发送的授权管理信息, 控制机顶盒不能对智能卡授权。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410205675.XA CN103986954B (zh) | 2014-05-15 | 2014-05-15 | 一种机顶盒安全控制方法及系统 |
CN201410205675.X | 2014-05-15 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2015172623A1 true WO2015172623A1 (zh) | 2015-11-19 |
Family
ID=51278763
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2015/077312 WO2015172623A1 (zh) | 2014-05-15 | 2015-04-23 | 一种机顶盒安全控制方法及系统 |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN103986954B (zh) |
WO (1) | WO2015172623A1 (zh) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110337033A (zh) * | 2019-07-04 | 2019-10-15 | 深圳市魔乐视科技有限公司 | 机顶盒防盗版系统 |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103986954B (zh) * | 2014-05-15 | 2017-08-25 | 深圳市九洲电器有限公司 | 一种机顶盒安全控制方法及系统 |
CN111954073B (zh) * | 2020-07-15 | 2022-07-12 | 深圳市九洲电器有限公司 | 安卓机顶盒生产软件快速实现方法及相关产品 |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6711683B1 (en) * | 1998-05-29 | 2004-03-23 | Texas Instruments Incorporated | Compresses video decompression system with encryption of compressed data stored in video buffer |
CN101742072A (zh) * | 2009-12-18 | 2010-06-16 | 四川长虹电器股份有限公司 | 机顶盒软件防拷贝方法 |
CN102156647A (zh) * | 2011-01-26 | 2011-08-17 | 深圳市九洲电器有限公司 | 一种机顶盒主芯片高级安全设置的方法及装置 |
CN102572591A (zh) * | 2011-12-09 | 2012-07-11 | 深圳创维数字技术股份有限公司 | 一种高级安全数字电视机顶盒生产方法及装置 |
CN103686332A (zh) * | 2013-12-11 | 2014-03-26 | 深圳创维数字技术股份有限公司 | 一种启用安全功能的方法和终端 |
CN103986954A (zh) * | 2014-05-15 | 2014-08-13 | 深圳市九洲电器有限公司 | 一种机顶盒安全控制方法及系统 |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102075812B (zh) * | 2010-08-10 | 2013-06-19 | 深圳市九洲电器有限公司 | 一种数字电视的数据接收的方法和系统 |
-
2014
- 2014-05-15 CN CN201410205675.XA patent/CN103986954B/zh not_active Expired - Fee Related
-
2015
- 2015-04-23 WO PCT/CN2015/077312 patent/WO2015172623A1/zh active Application Filing
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6711683B1 (en) * | 1998-05-29 | 2004-03-23 | Texas Instruments Incorporated | Compresses video decompression system with encryption of compressed data stored in video buffer |
CN101742072A (zh) * | 2009-12-18 | 2010-06-16 | 四川长虹电器股份有限公司 | 机顶盒软件防拷贝方法 |
CN102156647A (zh) * | 2011-01-26 | 2011-08-17 | 深圳市九洲电器有限公司 | 一种机顶盒主芯片高级安全设置的方法及装置 |
CN102572591A (zh) * | 2011-12-09 | 2012-07-11 | 深圳创维数字技术股份有限公司 | 一种高级安全数字电视机顶盒生产方法及装置 |
CN103686332A (zh) * | 2013-12-11 | 2014-03-26 | 深圳创维数字技术股份有限公司 | 一种启用安全功能的方法和终端 |
CN103986954A (zh) * | 2014-05-15 | 2014-08-13 | 深圳市九洲电器有限公司 | 一种机顶盒安全控制方法及系统 |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110337033A (zh) * | 2019-07-04 | 2019-10-15 | 深圳市魔乐视科技有限公司 | 机顶盒防盗版系统 |
CN110337033B (zh) * | 2019-07-04 | 2021-05-18 | 深圳市魔乐视科技有限公司 | 机顶盒防盗版系统 |
Also Published As
Publication number | Publication date |
---|---|
CN103986954A (zh) | 2014-08-13 |
CN103986954B (zh) | 2017-08-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR102328725B1 (ko) | 하나의 장치를 이용하여 다른 장치를 언로크하는 방법 | |
US7314169B1 (en) | Device that issues authority for automation systems by issuing an encrypted time pass | |
JP2011239454A5 (zh) | ||
US8909919B2 (en) | Authentication system and method for digital televisions | |
US8392722B2 (en) | Digital cable system and method for protection of secure micro program | |
US9053318B2 (en) | Anti-cloning system and method | |
CN103839011B (zh) | 涉密文件的保护方法及装置 | |
WO2015172623A1 (zh) | 一种机顶盒安全控制方法及系统 | |
US20110258451A1 (en) | Method for updating mobile terminal software and mobile terminal | |
CN107925795B (zh) | 用于解密经加密的媒体内容的设备及控制解密的服务器 | |
EP3174324A1 (en) | Mobility management entity, home server, terminal, and identity authentication system and method | |
CN110046514B (zh) | 调试数据保护方法、装置、服务器及存储介质 | |
JP2014174560A5 (zh) | ||
WO2017000356A1 (zh) | 一种权限管理方法、终端、设备及系统 | |
US20120324503A1 (en) | Settop box and diagnosis method thereof | |
TWI474211B (zh) | 安全usb鑰匙、保護安全usb鑰匙之方法、用於保護安全usb鑰匙之電腦程式及可由安全usb鑰匙讀取之記錄媒體 | |
CN109451504B (zh) | 物联网模组鉴权方法及系统 | |
CN110781478A (zh) | 临时授权Root实现调试的方法和装置 | |
CN106385631B (zh) | 一种机顶盒中间件系统授权方法、装置及机顶盒 | |
EP2528368B1 (en) | Method, apparatus and system for obtaining traffic service by portable device | |
WO2014166193A1 (zh) | 应用程序加密处理方法、装置和终端 | |
US20230089388A1 (en) | Method and Intelligent Apparatus for Calling Permission Verification of Protected Intelligent Application | |
KR101711024B1 (ko) | 부정조작방지 장치 접근 방법 및 그 방법을 채용한 단말 장치 | |
KR20110068498A (ko) | 데이터 보호를 위한 보안모듈의 디버깅 방법 | |
WO2015084152A1 (en) | System and method for authorising an access point in a network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 15792748 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 15792748 Country of ref document: EP Kind code of ref document: A1 |