Method and device for protecting program source

A program source and program technology, applied in the video field, can solve problems such as protection failure, complicated methods, failure to protect copyright liabilities, etc., and achieve the effect of avoiding piracy

Inactive Publication Date: 2013-05-01
SHENZHEN SKYWORTH DIGITAL TECH CO LTD
View PDF4 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the implementation method of the former prior art is more complicated, requires more fingerprint information to be recorded, and completely relies on the information fed back by the CA in real time to generate fingerprint information. If the CA fails to feed back the information, there will be no fingerprint display during playback. , will lead to protection failure. If the CA card number of the video file is modified, the supplier will not be able to know the source of the pirated broadcast, and will not be able to protect the copyright and investigate the responsibility; another protection method is too dependent on the program producer. If the program itself is not copyrighted If the information is embedded in the process, the operator will not be able to protect the purchased program

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for protecting program source
  • Method and device for protecting program source
  • Method and device for protecting program source

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0054]An embodiment of the present invention provides a program source protection method, which may include: when a set-top box records a program to generate a video file, creates a metadata file of the program requested to be recorded in the video file, and the metadata file includes a random number; Encrypt the random number, generate encrypted random number K_random and random number key K_rec, and store the K_random in the metadata file, save the K_rec in the se...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a method and a device for protecting a program source. The method comprises the following steps of: creating a metadata file of a program requested to be recorded in a video file when a set-top box records the program to generate the video file, wherein the metadata file comprises a random number; encrypting the random number, generating an encrypted random number K_random and a random number key K_rec, storing the K_random into the metadata file, and storing the K_rec into the set-top box, wherein the K_rec is used for decrypting the K_random; acquiring a current certificate authority (CA) card number, and storing the current CA card number into the metadata file; and checking the CA card number in the metadata file by utilizing a chip number CHIP ID of the set-top box, generating a first check result, and storing the generated first check result into the metadata file. According to the embodiment of the invention, the method for protecting the program source is improved, so that a certificate card number of the program and the chip number of the set-top box can be accurately acquired when the program is discovered to be pirated, and a video pirating user can be tracked.

Description

technical field [0001] The invention relates to the field of video, in particular to a method and device for protecting program sources. Background technique [0002] The video recording function of the set-top box enables users to record or pre-record their favorite programs through the set-top box, and watch favorite or missed programs again on the playback terminal associated with the set-top box. While the supplier enables the set-top box to support users to record programs, it also needs to protect the copyright of the recorded programs. The existing technology proposes a protection method for this problem. When recording, the authentication card number CA fingerprint information at each moment is recorded. Read the attributes such as time, location and size in the CA fingerprint information during the return visit, and display them in the playback screen accordingly; or provide users with programs that have embedded relevant copyright protection information in the vide...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04N21/4367
Inventor 刘衍银
Owner SHENZHEN SKYWORTH DIGITAL TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products