Set-top box protection method and set-top box

A set-top box and protection machine technology, applied in image communication, selective content distribution, electrical components, etc., can solve the problems of piracy, it is difficult to ensure the uniqueness of software burned into the set-top box, etc., to achieve the effect of protection cost and cost reduction

Inactive Publication Date: 2011-09-21
SHENZHEN SKYWORTH DIGITAL TECH CO LTD
View PDF4 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But this method still has defect: this method is difficult to guarantee the uniqueness of the software that is burnt into the set-top box (that is, a box corresponds to a software), so that the function interface of the third-party software can be modified by using the disassembly technology, thereby normally reading the FLASH ( flash memory) and burn the software into other set-top boxes at will, so as to achieve the purpose of piracy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Set-top box protection method and set-top box
  • Set-top box protection method and set-top box
  • Set-top box protection method and set-top box

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0031] An embodiment of the present invention provides a charging protection device, the device includes a power input terminal and a power output terminal, and also includes a second resistor, a control circuit and a third triode, wherein one end of the second resistor is grounded , the other end is respectively connected to the power supply input terminal and the control circuit; the emitter of the third triode is used to provide the power supply output terminal for charging, the collector is connected to the power supply input terminal, and the base is respectively used to connect to the power su...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a set-top box protection method and a set-top box. The method comprises the following steps of: acquiring a public key, wherein the public key is an identification code of the set-top box; decrypting encrypted codes of the set-top box by using the public key, wherein the encrypted codes are generated by encrypting the identification code of the set-top box and a code of the set-top box by a preset encryption algorithm; and judging whether the decrypted identification code is consistent with the public key or not, and if the decrypted identification code is judged to be inconsistent with the public key, quitting a system. The invention correspondingly provides a technical scheme of the set-top box. By the set-top box protection method, the uniqueness of software and hardware of the set-top box can be ensured, the set-top box can be protected from piracies, and the protection cost can be reduced.

Description

technical field [0001] The invention relates to the technical field of set-top boxes, in particular to a method for protecting a set-top box and the set-top box. Background technique [0002] At present, the set-top box technology is constantly developing, and users can enjoy more TV program services through the set-top box. The performance of the set-top boxes provided by major set-top box manufacturers is also continuously improved. However, there are also some bad phenomena in the application of set-top boxes today. For example, some users illegally crack the software or hardware of the set-top box and carry out pirated production to obtain illegal benefits, thus causing reputation and economic damage to the set-top box manufacturers and TV operators. on the loss. Therefore, the set-top box needs to be protected to prevent the software and hardware of the set-top box from being cracked and pirated. [0003] The method for protecting the set-top box in the prior art, fo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04N21/4627
Inventor 蓝允长
Owner SHENZHEN SKYWORTH DIGITAL TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products