Network terminal, security certification and registration activation methods thereof and server

A network terminal and security certification technology, applied in the field of network terminal security certification, can solve problems such as piracy, increased cost and complexity of network TV terminals, and loss of manufacturers and service operators, so as to reduce security certification costs and reduce counterfeiting by pirated versions The effect of risk on production

Active Publication Date: 2013-04-03
ZHENGZHOU SEANET TECH CO LTD
View PDF4 Cites 53 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

With the expansion of the market, some users illegally crack the terminal software and hardware, and use Internet TV services for piracy. Provide high-quality content services and download application services, interfere with normal operations, and cause losses to manufacturers and service operators
[0003] The existing preventive production of counterfeit IPTV terminal technology mainly adopts two methods: one method is to use the secure hardware module or trusted computing module and associated software module provided by a third party to bind the IPTV terminal software with the secure hardware module; To prevent piracy production, this method significantly increases the cost and complexity of the IPTV terminal; another method is to write the pre-allocated unique serial number of the terminal into the protected storage area of ​​the IPTV terminal, and protect the sequence with a digital signature The information is not tampered with. Once the serial number is detected to be modified during the operation of the IPTV terminal, it will prevent the terminal from running normally. This method also has defects. Pirate producers can completely copy the software code and data of the legal IPTV terminal It writes into the storage area of ​​other IPTV terminals or IPTV terminals produced by hardware copy boards, and creates counterfeit products whose serial numbers and digital signatures are exactly the same as those of legal IPTV terminals, thereby achieving the purpose of piracy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network terminal, security certification and registration activation methods thereof and server
  • Network terminal, security certification and registration activation methods thereof and server
  • Network terminal, security certification and registration activation methods thereof and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The technical solutions of the present application will be described in further detail below with reference to the drawings and embodiments.

[0025] With the development of smart terminals and security technologies, IPTV terminals have a variety of built-in devices, such as CPU (Central Processing Unit, central processing unit) and FLASH (flash memory). Each chip of many CPUs and FLASH has unique identification information, and the network The MAC address of the terminal network interface and the terminal serial number pre-allocated by the television terminal also have unique identification information. The embodiment of the present invention utilizes the combination of the unique identification information of various devices built into the above-mentioned Internet TV terminal to generate a terminal unique identification code through a hash digest algorithm, and then uses the manufacturer's private key asymmetric encryption algorithm to generate a digital signature. Si...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network terminal, security certification and registration activation methods thereof and a server. The security certification method comprises the following steps of: extracting combined identity information of a variety of devices in the terminal; creating a terminal unique identification code according to the combined identity information; carrying out comparison and signature verification on the created terminal unique identification code and a terminal unique identification code generated and pre-stored at a server side, and passing security certification if the comparison is consistent and the signature verification passes; and executing a terminal self-activating operation through the server side if the comparison is inconsistent or the signature verification does not pass. The network terminal, the security certification and registration activation methods of the network terminal and the server have the advantages that the security certification cost for the network terminal is reduced, and the risk of pirated counterfeit network terminal production is also reduced, so that the protection on the rights and benefits of rightful network terminal manufacturers, operators and users is realized.

Description

technical field [0001] The invention relates to a network terminal safety authentication technology, in particular to a network terminal, a method for safety authentication, registration and activation thereof, and a server. Background technique [0002] At present, the technology of Internet TV terminals (including set-top boxes and TV forms) continues to develop, and the performance of Internet TV terminals provided by major manufacturers continues to improve. Users can enjoy more high-quality TV programs and download application services through broadband Internet TV. Statistics show that, including set-top boxes and TV sets, my country produces more than 10 million Internet TV terminals every year. Manufacturers and service operators generally hope to provide high-quality value-added services (such as HD and 3D movie services) through Internet TV terminals to attract users to use paid services. With the expansion of the market, some users illegally crack the terminal s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
Inventor 曾学文陈君郭志川邓峰
Owner ZHENGZHOU SEANET TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products