Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

STB terminal and its verification method

A verification method and set-top box technology, which are applied in user identity/authority verification, television, analog security/charging systems, etc., can solve the problems of key theft, affecting system security, and inability to realize digital rights management, and improve security. Sexuality, the effect of preventing malicious attacks

Active Publication Date: 2008-01-09
CHINA UNITED NETWORK COMM GRP CO LTD
View PDF0 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The defect of the prior art is: in the existing IPTV system, before running the network authentication, the IPTV SIM card does not verify the legitimacy of the set-top box terminal, therefore, for some services that need to be encrypted, such as digital rights management (Digital Right Management, referred to as: DRM) business, will affect the security of the system
Since the IPTV SIM card provides the set-top box terminal with decrypted plaintext, it is easy to simulate a malicious attack against the IPTV SIM card, resulting in the key being stolen, thus failing to achieve the purpose of digital rights management

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • STB terminal and its verification method
  • STB terminal and its verification method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0027] This embodiment provides a STB terminal verification method, as shown in Figure 1, including:

[0028] In step 101, the IPTV SIM card sends a key sequence number and a random number sequence (abbreviation: RND) to the STB terminal.

[0029] Wherein, the key serial number corresponds to the session key stored in the STB terminal, and is used to select a session key from multiple session keys. The number of digits of the key serial number can be determined according to the number of session keys.

[0030] Step 102, the STB terminal looks up the pre-stored session key in the STB terminal according to the received key serial number, encrypts the received random number sequence, generates terminal ciphertext data, and combines the terminal ciphertext data with the STB terminal The terminal information of the terminal is sent to the IPTV SIM card.

[0031] Wherein, the terminal information of the STB terminal may include a manufacturer code, a key version number, and the li...

Embodiment 2

[0039] This embodiment provides another STB terminal verification method, as shown in Figure 2, including:

[0040] Steps 201 and 202 are the same as steps 101 and 102 in Embodiment 1, and will not be repeated here.

[0041] Step 203, the IPTV SIM card searches for a pre-stored session key in the IPTV SIM card according to the received terminal information of the STB terminal, and encrypts the random number sequence sent to the STB terminal in step 201 according to the session key, Generate card ciphertext data and send it to STB terminal.

[0042] Step 204, the STB terminal compares the card ciphertext data received from the IPTV SIM card with the terminal ciphertext data obtained through encryption in step 202, and when the card ciphertext data is equal to the terminal ciphertext data , pass the verification, and then start running network authentication.

[0043] In addition, this embodiment can also adopt the method of presetting the authentication field described in Emb...

Embodiment 3

[0047]This embodiment provides a kind of STB terminal, as shown in Figure 3, STB terminal 1 comprises: terminal identification card 10 and verification unit 20, wherein, terminal identification card 10 comprises: first card module 11, second card module 12. The third card module 13 and the fourth card module 14 ; the verification unit 20 includes: a first unit module 21 , a second unit module 22 and a third unit module 23 . Its working principle is:

[0048] The first card module 11 of the terminal identification card 10 sends the key serial number and the random number sequence to the verification unit 20; the first unit module 21 of the verification unit 20 searches the pre-stored session from the key serial number of the first card module 11 Key; the second unit module 22 encrypts the random number sequence from the first card module 11 according to the session key found by the first unit module 21 to generate terminal ciphertext data; the third unit module 23 converts the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The method comprises: the terminal identification card sends the key sequence number and the random number sequence to the STB terminal; according to the key sequence number, the STB terminal looks up the pre-saved session key to encrypt the random number sequence in order to generated the terminal cipher text data; said STB terminal sends the terminal cipher text data and the information about the set-top box terminal to said terminal identification card; said terminal identification card uses the information about the set-top box terminal to look up the pre-saved session key to encrypt said random number sequence so as to generate card cipher text data; comparing the card cipher text data with the terminal cipher text data; if they are the same, then passing the authentication. The set-top box terminal comprise: a terminal identification card and an authentication unit.

Description

technical field [0001] The invention relates to a verification method for a set-top box terminal and a set-top box terminal capable of realizing the method, belonging to the set-top box terminal technology in network television technology. Background technique [0002] Internet TV (abbreviation: IPTV) is a technology that uses broadband cable TV network to provide users with various interactive services including digital TV. The existing implementation of Internet TV is mainly by setting a set-top box (Set Top Box, referred to as: STB) terminal on the ordinary TV, and through the set-top box terminal, the ordinary TV can be connected to the broadband cable TV network to realize the on-demand or transmission of TV programs. . A terminal identification card (abbreviation: IPTV SIM card) is provided in an existing STB terminal, which is usually issued by a network operator, and is used to perform network authentication on the set-top box terminal before accessing the network. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04N7/16H04N5/00H04L9/32H04N21/441
Inventor 王彬
Owner CHINA UNITED NETWORK COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products