Set-top box-based secure information transmission system and method

A technology of information security and transmission method, applied in the field of information security transmission system based on set-top box, can solve the problems of heavy workload, low efficiency, difficult key management and distribution for developers, etc., to improve software reusability, ensure efficiency, guarantee safety effect

Inactive Publication Date: 2011-02-02
SUN YAT SEN UNIV
View PDF2 Cites 30 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Encryption algorithms are divided into symmetric encryption algorithms and asymmetric encryption algorithms. Symmetric encryption algorithms are fast to implement, but key management and distribution are difficult. Asymmetric encryption algorithms private key is kept secret, public key is public, key management is convenient, but encryption Low decryption efficiency
[0005] In the current method, after the encryption and decryption algorithm is applied in the application program, the security of the information is guaranteed to a certain extent, but each application program needs to do its own encryption and decryption program, which makes the developer's workload heavy and the efficiency low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Set-top box-based secure information transmission system and method
  • Set-top box-based secure information transmission system and method
  • Set-top box-based secure information transmission system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0073] refer to figure 2 , is a schematic diagram of a communication process of an information security transmission system according to an embodiment of the present invention. In this embodiment, the information security transmission system of the present invention is provided in the form of middleware to provide services for upper-layer applications.

[0074] Such as figure 2 As shown, it specifically includes the following steps:

[0075] A1. The sender sends a communication request to the receiver;

[0076] A2. The key management components of the sender and the receiver interact with each other's session keys, that is, their respective public keys;

[0077] A3. The authentication components of the sender and the receiver respectively verify the identity of the other party;

[0078] A4. After knowing the other party's public key and confirming the identity of the other party, the sender and receiver use a mixture of symmetric and asymmetric algorithms to securely tra...

Embodiment 2

[0079] Embodiment 2, public key exchange and identity verification:

[0080] image 3 It is a flowchart of public key exchange and identity verification in Embodiment 2 of the present invention.

[0081] refer to image 3 , including the following steps:

[0082] B1. The communication party A sends a communication request to the communication party B;

[0083] B2. The two parties in the communication send their respective public keys to each other, that is, exchange the dialogue key;

[0084] B3. Communication party A generates a random number r1, encrypts r1 with its own private key SKA to obtain SKA(r1), and sends it to communication party B;

[0085] B4. After receiving the SKA(r1), the communicating party B decrypts the SKA(r1) into r1 with the public key PKA of the communicating party A, encrypts r1 into PKA(r1) with the public key PKA of the communicating party A, and generates a random number r2 , use your own private key SKB to encrypt r2 into SKB(r2), and send PK...

Embodiment 3

[0087] Embodiment 3, encryption process.

[0088] Figure 4 It is the encryption flowchart of Embodiment 3 of the present invention.

[0089] refer to Figure 4 , including the following steps:

[0090] The sender uses the DSA algorithm to calculate the digest A of the message M to be sent, and then adds its own identity and timestamp information T to prevent replay attacks;

[0091] Use your own private key SKA to encrypt and sign the summary A and timestamp information T to form signature information S=ESKA(A+T);

[0092] Generate a dynamic session key K, use K to encrypt the message itself M and signature information to form ciphertext C=EK(M+S);

[0093] Encrypt the session key K with the public key PKB of receiver B to obtain CK=EPKB(K);

[0094] Encapsulate the ciphertext C and the encrypted session key CK together to form a data envelope, and transmit the data envelope to the receiver B.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a set-top box-based secure information transmission system and a set-top box-based secure information transmission method. The secure information transmission system comprises a secure algorithms library, a key management component, an authentication component, an encryption/decryption component and a verification component; the secure algorithms library is used for providing transmission encryption and decryption algorithm supports; the key management component is used for managing a public key and a private key of a user and generating a dynamic key; the authentication component is used for determining the identities of double data transmission parties; the encryption/decryption component is used for implementing encryption and decryption of data; and the verification component is used for verifying validity and integrity of the received decrypted data. According to the technical scheme, the transmission of the sensitive data on a set-top box is safer and more efficient by combining a symmetric encryption algorithm and an asymmetric encryption algorithm.

Description

technical field [0001] The invention relates to the technical field of digital home, in particular to an information security transmission system and method based on a set-top box. Background technique [0002] With the continuous advancement of digital home technology, more and more functions are realized on the set-top box. The currently used set-top boxes have realized functions such as playing games, checking the stock market, banking services, etc., which greatly facilitate people's lives. [0003] With the diversity of services provided by the set-top box, the security of content services becomes more and more important. For example, bank account password information or game account information are sensitive information that needs to be protected, so the information transmission on the set-top box needs to be secured. [0004] In the existing technical solution, generally, the message to be sent is encrypted and then sent. Encryption algorithms are divided into symm...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04N5/00H04N7/16H04L29/06
Inventor 罗笑南韩冠亚曹庭毅
Owner SUN YAT SEN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products