Bi-directional set-top box authentication method, system and related equipment

A two-way set-top box and authentication method technology, which is applied in the field of communication, can solve problems such as potential safety hazards and information security problems, and achieve high security, ease of use, and security.

Inactive Publication Date: 2009-08-12
GLOBAL INNOVATION AGGREGATORS LLC
View PDF0 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this solution, since the ID of the two-way set-top box can be easily obtained, copied, or even stolen by the construction personnel or the user of the two-way set-top box, there is a relatively large security risk
[0004] In other solutions to ensure the security of IP network access authentication, either the user is required to manually enter the encryption password, or the CA module in the two-way set-top box needs to be changed, and there are corresponding operability, compatibility, security issues
[0005] It can be seen that in the prior art, when the two-way set-top box performs operations such as access authentication of the IP network, there are problems in its information security, and it is impossible to take into account the ease of use while ensuring the security of the IP network access of the two-way set-top box and compatibility

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Bi-directional set-top box authentication method, system and related equipment
  • Bi-directional set-top box authentication method, system and related equipment
  • Bi-directional set-top box authentication method, system and related equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0026] When performing IP network authentication on a two-way set-top box, in order to take into account both compatibility and security, it is necessary to use the Conditional Access System (CAS) without modifying the CA module of the two-way set-top box. For the high security of CAS system) guarantee the security of IP network certification, so in the scheme of present embodiment, adopt the personal distribution key (Personal Distribute Key) stored in the CA modul...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a two-way set-top box authentication method and a two-way set-top box, wherein the two-way set-top box comprises a conditional access module, and the method comprises the following steps: acquiring authentication information which is encrypted through a personal allocation key; decrypting the encrypted authentication information by using the conditional access module to acquire the decrypted authentication information, wherein the personal allocation key is stored in the conditional access module; and performing authentication on a network side by using the decrypted authentication information. By adopting the proposal of the embodiment, the usability and the compatibility are also ensured while the security of the IP network access of the two-way set-top box is ensured.

Description

technical field [0001] The invention relates to the communication field, in particular to a two-way set-top box authentication method, system and related equipment. Background technique [0002] The two-way set-top box and the network have two connection links of Cable and Internet Protocol (Internet Protocol, IP), so that the two-way set-top box can not only receive the video content sent by Cable broadcast, but also interact with the service provider through the IP link. [0003] During the process of implementing the present invention, the inventors found that the security of the content transmitted through the Cable link is guaranteed through the Conditional Access (CA) system. And when using IP network, usually use the two-way set-top box number of two-way set-top box or the two-way set-top box identification (ID) of the CA module in the two-way set-top box to carry out authentication to the server of IP network side, to guarantee the access authentication of IP network...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04N7/16H04N5/00H04N21/435H04N21/441
Inventor 马剑飞
Owner GLOBAL INNOVATION AGGREGATORS LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products