Conational access method, related device, and system
A conditional access and terminal equipment technology, applied in electrical components, image communication, selective content distribution, etc., can solve the problem of low reception efficiency, achieve the effect of improving reception efficiency and application experience
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0026] The first embodiment of this application provides a conditional access method, such as figure 2 As shown, it is a schematic flowchart of the conditional access method described in the first embodiment of the application, and the conditional access method may include the following steps:
[0027] Step 201: The terminal device receives the key update information that contains the set root key generation parameters issued by the television transmission center.
[0028] Optionally, the terminal device may receive the key update information including the set root key generation parameters issued by the television transmission center in the following manner:
[0029] Receiving EMM information issued by the television transmission center;
[0030] Use the original device identifier of the terminal device to find information related to the terminal device itself from the EMM information, and find the information related to the terminal device itself based on the original root key pair ...
Embodiment 2
[0075] Based on the same inventive concept, the second embodiment of the present application provides a terminal device. For the specific implementation of the terminal device, please refer to the related description in the first method embodiment above, and the repetition will not be repeated, such as image 3 As shown, the terminal equipment may mainly include:
[0076] The receiving module 31 can be used to receive key update information including the set root key generation parameters issued by the TV transmission center;
[0077] The update module 32 can be used to generate a new root key according to the root key generation parameters and the set key generation algorithm stored locally in the terminal device; wherein, the set key generation algorithm is determined by The device manufacturer related to the terminal device presets a private encryption algorithm in the secure storage area of the terminal device; the root key generation parameter is an M-bit random number, and t...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


