Method and system for authenticating legality of receiving terminal in unidirectional network

A technology of legality authentication and receiving terminal, applied in the field of one-way digital transmission network to prevent imitation and cloning

Active Publication Date: 2008-03-19
北京邦天信息技术有限公司
View PDF0 Cites 45 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But for a network of more than 1 million users, the amount of information will be astronomical, so this method is impossible in this case

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for authenticating legality of receiving terminal in unidirectional network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The digital signature and digital abstract technologies to be used in the present invention will be briefly introduced below.

[0035] Digital signature is a widely used digital security technology. It is based on asymmetric key algorithms and digital digests. The asymmetric key algorithm uses a pair of keys for encryption and decryption operations, public key encryption, private key solution, for confidentiality requirements; private key encryption, public key solution for non-repudiation requirements. If the information to be sent needs to be signed by the information sender, the private key of the information sender needs to be used for the signature operation, and the receiver can identify the identity of the information publisher only by verifying with the sender's public key. Commonly used public key algorithms include RSA, DSA, Diffie-Hellman, etc.

[0036] Digital digests apply a one-way mathematical function called a hash algorithm to data, and the result of th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method and system for legality authentication of receiving terminals in a unidirectional network. The digital signature of UID of chips is written in terminal equipment, terminal firmware downloads a server authentication agent program from the network, the program runs on the hardware platform of the terminal, and UID signature is decrypted by using a built-in public key or the public key of the signature certificate acquired from the network; if the decrypted value and the abstract value of UID read out from the chips are determined to be identical and the signature certificate is in a trust chain established by the rood certificate, the terminal is legal, or the terminal is illegal. Also, in the process of self-test of the firmware, the decrypted value can be obtained by using the public key in the signature certificate to decrypt UID signature, then UID of the chips is read out and the abstract value thereof is calculated, and if the two values are identical, the self-test passes, or the work state ends. By using the self-test of the terminal firmware or the mutual authentication between the server authentication agent program and the firmware, the invention makes clone and copied set-top boxs not work normally in the network.

Description

technical field [0001] The invention relates to a one-way digital transmission network, in particular to a method for authenticating the legitimacy of terminal equipment based on the one-way digital transmission network. Background technique [0002] In a two-way network environment, the front-end server and the terminal device can mutually verify the legitimacy of each other's identities through two-way authentication. However, in a one-way network environment, such as the HFC network of radio and television, satellite broadcasting network and terrestrial digital TV network, since there is no return channel, the legitimacy of network terminal equipment cannot be authenticated through the general two-way authentication method, thus Network services can be stolen by copying and cloning network terminals. [0003] In order to solve the problem of terminal legitimacy authentication, the server authentication agent program can be downloaded from the front end of the network, ru...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
Inventor 杜聚龙范波鲍海兵
Owner 北京邦天信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products