Confidential method for set-top box software

A software security, set-top box technology, applied in electrical components, computer security devices, program/content distribution protection, etc., can solve problems such as high cost and easy cracking of single-chip encryption, achieve simple operation, protect software copyright, and prevent illegal copying. Effect

Inactive Publication Date: 2011-06-22
FUJIAN ERLING ELECTRONICS
View PDF5 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Hardware encryption uses single-chip encryption, but single-chip encryption is easy to be cracked
Hardware encrypt

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Confidential method for set-top box software
  • Confidential method for set-top box software
  • Confidential method for set-top box software

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The program capacity of the set-top box FLASH is relatively large, and it is impossible to put the program in the single-chip microcomputer for encryption like ordinary single-chip microcomputers. However, the FLASH program can be read and written by an ordinary programmer, and the program can be copied. Some FLASH program chips have a globally unique ID code inside, such as ST’s M29W160ET, by sending a CFI query command to the FLASH, the 8-byte Security Code can be read, which is the only ID code. Using this group of 8-byte data and a group of 8-byte keys set by ourselves, we use the DES3 algorithm to obtain a group of 8-byte passwords. DES3 is an encryption algorithm commonly used in the world, and there are free source programs available for download on the Internet.

[0027] Since the ID codes of each piece of FLASH are different, the corresponding passwords are also different. When others copy FLASH, because they don't know our password, they can't write the corr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a confidential method for set-top box software, which comprises that: a personal computer (PC) is connected with a set-top box by a joint test action group (JTAG) simulator, a central processing unit (CPU) of the PC transmits a code word calculation program to a random access memory (RAM) of the set-top box by the JTAG simulator, and the code word calculation program automatically reads an identity code of a set-top box FLASH, calculates a code word by using a data encryption standard (DES) 3 algorithm and writes the code word into a given position in the set-top box FLASH; and the set-top box is initialized after being electrified, the CPU of the set-top box runs the code word calculation program to calculate the code word of the set-top box FLASH, and compares the calculated code word with the code word, obtained by the step A, at the given position in the set-top box FLASH, and the set-top box is normally run if the code words are consistent, otherwise displays a FLASH running error prompt in a display interface thereof and terminate the running of the program. Due to the adoption of the method, the software is effectively prevented from being illegally copied with simple operations on the basis of not increasing hardware cost.

Description

technical field [0001] The invention relates to the technical field of set-top boxes, in particular to a method for keeping the software of the set-top box secret. Background technique [0002] In recent years, with the continuous development of the economy, the development of set-top boxes is rapid. Piracy of set-top box software is also becoming more common. In order to protect the software copyright of the set-top box and prevent the software from being copied illegally, the software must be encrypted. Traditional encryption methods use hardware encryption. Hardware encryption uses single-chip encryption, but single-chip encryption is easy to be cracked. Hardware encryption can also use a dedicated encryption chip, but the cost of using a dedicated encryption chip is relatively high. Contents of the invention [0003] The purpose of the present invention is to overcome the deficiencies of the prior art and provide a set-top box software security method, which can ef...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04N21/43G06F21/00G06F21/10
Inventor 卢琼辉
Owner FUJIAN ERLING ELECTRONICS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products