Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Encrypting/decrypting system and encrypting/decrypting method for interactive network television

A network TV and encryption system technology, applied in the field of encryption/decryption system of interactive network TV, can solve problems such as algorithm security and intellectual property barriers, low strength of scrambling algorithm, inability to effectively resist violent attacks, etc., to provide security Sexuality and normativeness, resistance to violent attacks, and high computing efficiency

Active Publication Date: 2010-02-03
AEROSPACE INFORMATION
View PDF5 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 1) Since DVB's CA technology is essentially a one-way broadcast network rating control technology, although IP network program broadcasting can be realized after IP transformation, it cannot effectively use the interactive characteristics of IP network to realize online identity authentication of users. Unable to effectively prevent illegal viewing;
[0006] 2), IPCAS technology only provides security encryption during program stream transmission, and cannot provide security protection for program content after landing. Therefore, it cannot effectively prevent users from sharing, distributing and other illegal dissemination of programs they have received;
[0007] 3) IPCAS uses a common scrambling algorithm to encrypt the program. The strength of the scrambling algorithm is low and cannot effectively resist violent attacks based on the powerful computing power of the Internet
[0011] Most of the cryptographic algorithms used in the above two technical systems are foreign algorithms, and the security and intellectual property issues of the algorithms will bring certain obstacles to the application of the products; at present, the commercial cryptographic algorithms of the State Cryptography Administration can fully meet the requirements. Application requirements

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encrypting/decrypting system and encrypting/decrypting method for interactive network television
  • Encrypting/decrypting system and encrypting/decrypting method for interactive network television
  • Encrypting/decrypting system and encrypting/decrypting method for interactive network television

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063] The above and other technical features and advantages of the present invention will be described in more detail below in conjunction with the accompanying drawings.

[0064] For the encryption and decryption system of interactive IP TV, we use the encryption algorithm approved by the national encryption management department, and adopt a secure three-layer key system, namely: program content key, authorization key, user's personal ECC key pair, As well as mature identity authentication technology, the security protection of the business system can not only solve the identity authentication problem of the system, but also realize the security protection of on-demand and live broadcast services. The symmetric block cipher algorithm (SM1) of the Cipher Administration is used, with a key length of 128bit, used to encrypt and decrypt program content.

[0065] The authorization key is used in conjunction with the symmetric block cipher algorithm (SM1) of the State Cryptograph...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an encrypting / decrypting system and an encrypting / decrypting method for an interactive network television. By using a cryptographic algorithm approved by the national cryptogram management department, adopting a secure three-layer key system, namely a program content key, an authorized key and a user personal ECC key pair, and adopting a mature identity authentication technique, the security of a service system is protected, so the identity authentication problem of the system can be solved, and simultaneously the security protection for on-demand and living broadcast services also can be realized.

Description

technical field [0001] The invention relates to a digital security system and method of an interactive network TV, in particular to an encryption / decryption system and an encryption / decryption method of an interactive network TV. Background technique [0002] Since the technology of interactive network television (IPTV) has just started in my country, and the IPTV business is also in the pilot process, compared with security technology, operators are more concerned about the diversity of business system functions. Therefore, the currently used IPTV business system Most of them do not use systematic password security technology to effectively protect media content. [0003] Although in the typical IPTV DRM model represented by OMA, a cryptographic algorithm has been introduced to realize the security protection of the media stream, but due to the different emphases of each IPTV business model, the security system design and specific implementation methods There are big differ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04N7/16H04N7/167
Inventor 戴才良于志强张飚
Owner AEROSPACE INFORMATION
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products