Content security protection method of embedded television terminal system

A TV terminal and content security technology, applied in computer security devices, selective content distribution, electrical components, etc., can solve the problems of destroying, improving, and reducing the security of digital TV broadcasting systems, so as to prevent tampering and damage, and reduce maintenance The effect of spending

Inactive Publication Date: 2012-07-04
INST OF ACOUSTICS CHINESE ACAD OF SCI
View PDF4 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there has been no real solution to the problem of illegal television programming
Thereby reducing the security of the entire digital TV broadcasting system
In addition, under the conditions of "triple play integration" and the introduction of a large number of applications, not only the risk of illegal content entering TV terminals is also greatly increased, but TV terminals are also more and more exposed to open network security risks and threats, and are vulnerable to Illegal tampering or replacement of TV programs and other content brought about by viruses and other malicious program attacks, and security threats such as damage to sensitive resources of TV terminals caused by application program running mutations

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Content security protection method of embedded television terminal system
  • Content security protection method of embedded television terminal system
  • Content security protection method of embedded television terminal system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments.

[0033] Aiming at illegal media content and malicious program attacks, the present invention proposes a content security protection method for an embedded TV terminal system based on an embedded TV operating system, which ensures real-time monitoring of illegal media content and protection of malicious codes at the terminal. Active defense prevents the presentation of illegal media content and damage to system resource files, and realizes the content security control of embedded TV terminals.

[0034] The present invention provides an embedded TV terminal system content security protection method, which includes three parts:

[0035] 1) For cable or network TS media streams, the security framework measures the integrity of the TS stream content security based on the watermark embedded in it. When the media content is tampered with or replaced, t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a content security protection method of an embedded television terminal system. The method aims at attacks of illegal contents and malware, the real-time monitoring for the illegal contents and the proactive defense for malicious codes are ensured at a terminal, the presentation of the illegal contents and the damage for resource files of the system are prevented, and the content security control for the embedded television terminal is realized. The method comprises a TS (Transport Stream) content security mechanism based on digital watermarking, an external-network access restricting mechanism based on a resource declaration and a process access control mechanism, wherein the TS content security mechanism is that watermarking is added in a TS at the front end, the data flow is analyzed by the terminal through a corresponding digital watermarking algorithm, the measurement error of data integrity can be generated when the content is tampered or replaced, and then an application is stopped and closed; the external-network access restricting mechanism is that whether the application is allowed to access a network address or not is determined according to a white list used for maintaining a legal network address in the resource declaration; and the process access control mechanism is that the process of the embedded television terminal is defined through a security policy to control the access for the resource files in an operation system kernel layer.

Description

technical field [0001] The invention relates to the field of embedded software security, in particular to a content security protection method for an embedded television terminal system. Background technique [0002] Most of the currently open embedded operating systems are oriented to mobile phone applications, mainly Symbian and Android. [0003] Symbian OS is an advanced and open smart phone operating system recognized by the world's mainstream mobile phone manufacturers. It is designed for the specific requirements of advanced 2.5G and 3G mobile phones. Because more and more personal information such as phone books and business confidential documents will be stored in smart phones, in order to prevent malicious software and viruses from stealing this information or consuming user communication costs. Therefore, Symbian OS V9.0 and later versions introduce a new system security model. The new security model implements a trusted computing platform through capability mode...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04N21/254H04N21/266G06F21/22G06F21/24
Inventor 邓峰郭志川王劲林张辉孙鹏林军
Owner INST OF ACOUSTICS CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products