Method and system for preventing set top box software from malicious upgrade

A set-top box and anti-malicious technology, applied in the field of communication, can solve the problems of increasing the possibility of data transmission being intercepted, upgrading and destroying the software of the set-top box, and failing to complete the upgrade, so as to reduce the possibility of data leakage, protect interests, and improve data security. sexual effect

Inactive Publication Date: 2015-07-15
FUJIAN NEWLAND COMM SCI TECH
View PDF5 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At this stage, set-top box software upgrades are generally implemented through online over-the-air upgrades (OTA), USB upgrades, or serial port upgrades. From the header control information of the received upgrade data, the manufacturer ID, hardware version, and software version are analyzed. And compare it with the information of the running software of the current set-top box, and perform the upgrade operation if the comparison is successful, otherwise the upgrade cannot be completed
Due to the low confidentiality of manufacturer ID, hardware version, software version and other information, it is easy to leak, and it is easy to cause an illegally generated malicious program to upgrade and destroy all set-top box software in operation.
[0003] The existing application number is 200710119226.3 Chinese patent "set-top box software upgrade method and upgrade system", the method includes the following steps: the set-top box sends an upgrade package download request carrying upgrade parameters to the upgrade service device; receiving the upgrade service device returns The upgrade package, the upgrade package summary and the encryption summary obtained after the summary of the upgrade package is encrypted; the encryption summary is sent to the subscriber identification module for decryption, and when the upgrade package summary is the same as the decryption result, the upgrade package is installed, Compared with this application document, the entire process of this patent is more complicated, and data transmission is performed multiple times, which increases the possibility of being intercepted during data transmission and causes security risks.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for preventing set top box software from malicious upgrade
  • Method and system for preventing set top box software from malicious upgrade

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] see figure 1 , a method for anti-malicious upgrade of set-top box software, comprising the steps of:

[0029] Step 10, adopting the RSA asymmetric encryption algorithm to encapsulate the upgrade data through the front end, and transmit the encapsulated data to the set-top box; this step 10 further includes:

[0030] Step 11, generate a pair of RSA secret keys through the RSA secret key generation tool, including the RSA public key and the RSA private key, and solidify the RSA public key in the upgrade module inside the set-top box or store it in the flash memory of the set-top box;

[0031] Step 12, perform a hash operation on the upgrade data by the RSA private key, generate a fixed-length first hash data, and insert the first hash data into the head of the upgrade data to obtain encapsulated data, and send it to the set-top box;

[0032] Step 20, perform a hash operation on the upgrade data in the received data through the RSA public key in the set-top box to generat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for preventing set top box software from malicious upgrade, comprising the steps as follows: step 10, encapsulating upgrade data by adopting RSA asymmetric cryptographic algorithm via a front end and transmitting the encapsulated data to a set top box; step 20, authenticating data received by the set top box, and entering a step 30 if the authentication is successful; otherwise, quitting the upgrade; step 30, analyzing the data received by the set top box to obtain upgrade data and performing upgrade according to the upgrade data. The invention further provides a system for preventing set top box software from malicious upgrade, comprising a data encapsulation module, an authentication module and an upgrade module. The method and the system of the invention improve safety of data and effectively prevent illegal operation.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a method and system for preventing malicious upgrade of set-top box software. Background technique [0002] At this stage, set-top box software upgrades are generally implemented through online over-the-air upgrades (OTA), USB upgrades, or serial port upgrades. From the header control information of the received upgrade data, the manufacturer ID, hardware version, and software version are analyzed. And compare it with the information of the running software of the current set-top box, and perform the upgrade operation if the comparison is successful, otherwise the upgrade cannot be completed. Due to the low confidentiality of information such as manufacturer ID, hardware version, and software version, it is easy to leak, and it is easy to cause an illegally generated malicious program to upgrade and destroy all set-top box software in operation. [0003] The existing appl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04N21/458H04N21/41H04N21/258
Inventor 李必龙
Owner FUJIAN NEWLAND COMM SCI TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products