System, terminal equipment and method for managing secret key based on security chip

A technology of key management system and security chip, applied in the field of key management system based on security chip, can solve the problems of ineffective security management, strengthening keys, illegal misappropriation of content keys, etc. Reliability, system cost saving effect

Active Publication Date: 2012-07-18
北京视博数字电视科技有限公司
View PDF5 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Adopt a multi-layer key system, use a combination of symmetric key and asymmetric key to encrypt media content layer by layer, change the content key randomly, and continuously strengthen the difficulty of cracking the key, although it can effectively improve the security of media content , but for the decryption unit and descrambling unit of the terminal device in Figure 1(b), the content key (CW) is stored and transmitted in plain text. If the content key (CW) is cracked and read, then the security management of the entire system is useless, and there is a hidden danger of the content key being illegally embezzled

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System, terminal equipment and method for managing secret key based on security chip
  • System, terminal equipment and method for managing secret key based on security chip
  • System, terminal equipment and method for managing secret key based on security chip

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] In order to describe the technical content, achieved objectives and effects of the present invention in detail, the following will be described in detail in conjunction with the implementation methods and accompanying drawings.

[0046] figure 2 It is a block diagram of a security chip-based key management system according to an embodiment of the present invention. The system includes front-end encryption system and terminal equipment,

[0047] The front-end encryption system includes a scrambling module, an encryption module, a key management module and a sending module, the scrambling module is used to generate a content key and use the content key to scramble the program content; the key management module is used to Manage the second product key, security chip key, first product key, session key and user key; the encryption module is used to encrypt the content key once with the second product key, and then use the session The key encrypts the once-encrypted conten...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a system, terminal equipment and a method for managing a secret key based on a security chip. The system comprises a front-end encryption system and the terminal equipment, wherein the front-end encryption system comprises a scrambling module, an encrypting module, a secret key management module and a transmitting module; the scrambling module is used for generating a content secret key and scrambling program content; the secret key management module is used for managing a hierarchical secret key; the encrypting module is used for performing hierarchical secret key encryption on the scrambling data to form ciphertext data; the ciphertext data is transmitted to the terminal equipment through the transmitting module; the terminal equipment comprises a receiving module, a decrypting module, a security chip and a playing module; the receiving module is used for receiving the ciphertext data; the decrypting module is used for decrypting the ciphertext data primarily to obtain an encrypted content secret key; the encrypted content secret key is decrypted and descrambled in the security chip to obtain the program content; and the program content is played by the playing module. The content secret key is prevented from being leaked and shared, and the safety and the reliability of the system are improved.

Description

technical field [0001] The invention relates to a key encryption and decryption technology in a content protection system in the field of digital television, in particular to a security chip-based key management system, terminal equipment and method. Background technique [0002] In order to achieve the purpose of secure storage and transmission, keys are widely used in various fields, and hierarchical keys play an important role in preventing content from being illegally embezzled. Hierarchical key refers to that under the multi-layer key system, the media content is encrypted by the content key at the bottom level, and the keys at other levels are used to encrypt the keys at the next level or several levels. The key is the core of the entire key system. The encrypted ciphertext data is transmitted to the terminal device. Only after the terminal device obtains the authorization to decrypt the content key, and then the content key decrypts the media content, the user can wa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04N21/235H04N21/435H04N21/4623
Inventor 王天星卢增祥王文军李伟东柯发敏
Owner 北京视博数字电视科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products