IPTV (Internet Protocol Television) user security terminal

A technology for secure terminals and users, applied in the field of IPTV security applications, can solve problems such as hidden dangers of IPTV user terminals, achieve good scalability, and protect the security of digital media content

Inactive Publication Date: 2010-11-24
AEROSPACE INFORMATION
View PDF0 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to solve the tech

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • IPTV (Internet Protocol Television) user security terminal
  • IPTV (Internet Protocol Television) user security terminal
  • IPTV (Internet Protocol Television) user security terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The present invention will be described in further detail below through specific embodiments and in conjunction with the accompanying drawings.

[0021] Such as figure 1 As shown, the IPTV user security terminal 1 provided by the present invention includes an identity authentication module 10, an authorization information decryption module 11, an authorization storage and management module 12, a key storage and management module 13, a key decryption module 14, and a content descrambling module 15 , an uplink information encryption module 16, a decoding module 17 and a user input module 18. Wherein, the identity authentication module 10 includes an ECC (Elliptic Curve Cryptosystems, Elliptic Curve Cryptosystem) signature module 101 and an ECC verification module 102 .

[0022] The ECC verification module 102 in the identity authentication module 10 is responsible for identity verification of the received authorization issuance information, and the ECC signature module 1...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an IPTV (Internet Protocol Television) user security terminal which comprises an identity authentication module, an authorization information decryption module, an authorization storage and management module, a key storage and management module, a key decryption module, a content descrambling module, an uplink information encryption module, a decoding module and a user input module, wherein the identity authentication module comprises an elliptic curve cryptosystem signature module and an elliptic curve cryptosystem verification module. The terminal ensures that only authorized users can watch programs based on good interactivity of the IPTV by means of identity authentication, authorization management, secret key encryption protection, content encryption protection and the like. The user security terminal has favorable expansibility, can satisfy live broadcast, VOD broadcast and other services of the IPTV, and can effectively protect the security of the digital media content of the IPTV.

Description

technical field [0001] The invention relates to IPTV (Internet Protocol Television) security application technology, in particular to an IPTV user security terminal. Background technique [0002] IPTV is a media service based on broadband Internet, with digital audio and video resources as the main body, and TVs, computers, etc. as display terminals. It is a new service generated after the integration of Internet services and traditional TV services. IPTV is an open and interactive audio and video content and business management system based on content management. Since there are many security risks in the process of broadcasting digital program content on the IP network, effective copyright management can realize copyright protection of audio and video programs. and legitimate consumption. To protect the security of IPTV digital media content copyright, it is necessary to establish a set of security mechanisms including encryption, authentication, and rights management. By...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L9/30H04L29/06H04N7/24H04N5/00
Inventor 叶松郭宝安于志强张飚唐凌王杰斌丁瑶吴渊鲁昱
Owner AEROSPACE INFORMATION
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products