Unlock instant, AI-driven research and patent intelligence for your innovation.

Condition receiving method, condition receiving equipment and condition receiving system

A conditional access and encryption technology, applied in the field of communication, can solve the problems of hackers, unavoidable cracking, and supplier losses.

Active Publication Date: 2013-11-20
SHENZHEN SKYWORTH DIGITAL TECH CO LTD +1
View PDF3 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Usually, different CA manufacturers have different encryption and decryption methods for AK, but the same manufacturer usually uses the same encryption and decryption algorithm for CW on the same project, so once the CA encryption and decryption algorithm is cracked, it will Bring great losses to suppliers
[0003] To solve this problem, the prior art provides a method of constantly changing the control word cw. By continuously changing the control word CW, it is difficult for hackers to crack in a short time to achieve the purpose of protecting program information. However, with the computing power of computers It is becoming more and more powerful, especially with the introduction of cloud computing. The powerful computing power makes CA still unable to avoid the threat of being cracked in a short time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Condition receiving method, condition receiving equipment and condition receiving system
  • Condition receiving method, condition receiving equipment and condition receiving system
  • Condition receiving method, condition receiving equipment and condition receiving system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0047] An embodiment of the present invention provides a method for conditional access, which may include: receiving an encrypted program data packet transmitted by a front-end server, the encrypted program data packet carrying authorization management information and authorization control information; Obtain the encrypted authorization key and the encryption method description information of the authorization key from the authorization management information; decry...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a condition receiving method, condition receiving equipment and a condition receiving system. The method comprises the following steps of receiving an encrypted program data packet transmitted by a front-end server, wherein the encrypted program data packet carries authorization management information and authorization control information; acquiring an encrypted authorization key and encryption mode descriptive information of the authorization key from the authorization management information carried in the encrypted program data packet; decrypting the encrypted authorization key according to the encryption mode descriptive information, so as to obtain the authorization key; decrypting encryption control words in the authorization control information carried in the encrypted program data packet according to the authorization key, so as to obtain control words; decrypting the encrypted program data packet according to the control words, so as to obtain program content. The method, the equipment and the system provided by the embodiment of the invention can be used for improving the safety of a condition receiving mode and ensuring the benefits of an operator.

Description

technical field [0001] The present invention relates to the technical field of communication, in particular to a conditional access method, device and system. Background technique [0002] The conditional access (CA) system is used to protect the security of program content. In order to prevent illegal users from viewing, suppliers usually use scrambling and descrambling technology to protect programs under the CA system. The method is usually to generate a control word and use the The control word encrypts the program through the internationally accepted encryption algorithm, and transmits the generated encryption key AK to the terminal through the EMM system, so that the terminal obtains the control word CW through the encryption key AK in the EMM system, and then according to the general algorithm The video is played after decryption. Usually, different CA manufacturers have different encryption and decryption methods for AK, but the same manufacturer usually uses the sa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04N21/266H04N21/4623
Inventor 张神力
Owner SHENZHEN SKYWORTH DIGITAL TECH CO LTD