Method for restraining clone card service key from updating

A key update and key technology, applied in the direction of analog security/charging system, TV, electrical components, etc., can solve the problem of unable to prevent illegal users from watching programs, affecting users to watch programs, and the speed is not infinite.

Active Publication Date: 2008-10-01
南宁市欧韦电子科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] 1. Because the cloning card is to copy the IC card of the legitimate user, when the legitimate user is updating the SK, the cloning card can also be updated, which still cannot achieve the purpose of preventing illegal users from watching the program;
[0005] 2. Since the speed at which the CA sends EMM (Entitlement Management Message, authorization management information) packets is not infinite, when the number of system users is too large, it will take a long time to update all users, affecting the normal operation of users. watch a show

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for restraining clone card service key from updating
  • Method for restraining clone card service key from updating

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments, but the present invention is not limited to the following embodiments.

[0027] The invention first invalidates the authorization of the cloning card, and then updates it according to the SK update mechanism in the prior art. At the same time, it ensures that the IC card can receive a complete blacklist and temporary service key SK1 by adding a data protocol. The card compares whether it exists in the blacklist to determine whether it can store the temporary service key SK1, which ensures that legitimate users watch programs while preventing the cloned card from renewing the SK and taking effect.

[0028] see figure 1 , the embodiment of the present invention provides a method for suppressing the key update of the clone card service, the specific steps are as follows:

[0029] Step 101: Add the card numbers of the cloned cards in the CA system t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for inhibiting the service key update of a clone card, belonging to the digital television conditional access field. The method comprises isolating the clone card and giving a provisional service key to a legitimate user IC card, then opening the provisional service key, finally updating the service key, and canceling the provisional service key after the update and using the updated service key. The adoption of the technology provided by the invention can effectively inhibit continuous service key updating of the clone card without affecting user to watching programs.

Description

technical field [0001] The invention relates to the field of digital television conditional access (CA, Conditional Access), in particular to a method for suppressing the update of a clone card service key (SK, Service Key). Background technique [0002] In order to prevent the proliferation of illegal authorization activities such as cloning authorization cards in the digital TV conditional access system, when designing the CA system, a standard SK upgrade mechanism is adopted, that is, all SKs used in the system have a backup SK. When cracking the phenomenon, the system uses the front-end CA server to issue the spare SK to the IC card of each legitimate user. After the authorized SKs of the legal users are all updated, the CA system will use the spare SK to encrypt the program authorization information. At this time, the legal users can use the updated SK to watch the program. [0003] But this mechanism still has the following two problems: [0004] 1. Because the cloni...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04N7/16H04N7/167
Inventor 张磊朱峰王昱付春秋张宝柱郭胜华高峰
Owner 南宁市欧韦电子科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products