Security certificate method and system of credible TV terminal

A TV terminal and security authentication technology, applied in the field of TV, can solve the problems of low concealment, easy to be deciphered, poor security, etc., and achieve the effect of high concealment, improved hardware architecture and system integrity, and not easy to leak

Active Publication Date: 2012-07-18
SHENZHEN SKYWORTH RGB ELECTRONICS CO LTD
View PDF3 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This authentication method has extremely poor security, and the concealment is not high in the process of sending the account number and password, and it is easy to leak and be deciphered

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security certificate method and system of credible TV terminal
  • Security certificate method and system of credible TV terminal
  • Security certificate method and system of credible TV terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0055] Such as figure 1 as shown, figure 1 It is a flow chart of the trusted TV terminal security authentication method in the first embodiment of the present invention. The trusted TV terminal security authentication method mentioned in this embodiment includes:

[0056] Step S10, the TV terminal generates a root of trust after installing the trusted platform module;

[0057] In this embodiment, during the TV production process, a TPM (Trusted Platform Module, Trusted Platform Module) security chip is installed on the TV hardware platform. Since the TPM includes components such as a cryptographic operator and a memory, a series of passwords can be provided. Processing functions, such as RSA accelerator, algorithm engine, random number generator, and key storage functions, after the trusted platform module is loaded...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a security certificate method and a system of a credible TV terminal, wherein the method comprises the following steps that: a TV terminal generates a credible root after a credible platform module is mounted; the TV terminal generates a key according to the credible root when requesting to access to a server; the TV terminal encrypts access request data and the key to generate access request ciphertext data and outputs the access request ciphertext data to the server; the server decrypts the access request ciphertext data, extracts the key and obtains the credible root from the key; and the server allows the TV terminal to access to the server after verifying the effectiveness of the credible root. The security certificate method and system disclosed by the invention effectively improve the data exchange security between the TV terminal and the server, so that the data are unlikely to decode; the method and the system are high in concealment and are unlikely to leak; and the method and the system have reliable physical carriers to improve the certificate security of the terminal equipment from the hardware system structure and system integrality of TV equipment.

Description

technical field [0001] The present invention relates to the technical field of television, in particular to a method and system for authenticating security of a trusted television terminal. Background technique [0002] At present, with the rapid development of computer and Internet technology, the trend of 3C integration and the digital development of TV sets, TV sets, which are the core appliances of home entertainment, have begun to develop towards intelligent multimedia network TVs. Smart IP TV is a multifunctional network terminal, especially the current smart IP TV, which has very powerful functions, such as online shopping mall, online shopping, Alipay and other functions. Smart IP TV is a terminal node in the Internet. In terms of information security protection, In particular, its security and reliability have been challenged unprecedentedly. How to ensure the reliable execution of smart network TVs, as well as the security of TV network information and user informa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04N21/258H04N21/437H04N21/835
Inventor 梁元李杨
Owner SHENZHEN SKYWORTH RGB ELECTRONICS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products