A conditional access method and related equipment and system
A conditional access and terminal equipment technology, applied in electrical components, image communication, selective content distribution, etc., can solve the problem of low reception efficiency, achieve the effect of improving reception efficiency and application experience
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0026] Embodiment 1 of the present application provides a conditional access method, such as figure 2 As shown, it is a schematic flow chart of the conditional access method described in Embodiment 1 of the present application, and the conditional access method may include the following steps:
[0027] Step 201: The terminal device receives the key update information including the set root key generation parameters sent by the TV transmission center.
[0028] Optionally, the terminal device may receive the key update information containing the set root key generation parameters issued by the TV transmission center in the following manner:
[0029] receiving the EMM information issued by the TV transmitting center;
[0030] Use the original device identifier of the terminal device to find the information related to the terminal device itself from the EMM information, and find the information related to the terminal device itself based on the original root key pair of the term...
Embodiment 2
[0075] Based on the same inventive concept, Embodiment 2 of the present application provides a terminal device. For the specific implementation of the terminal device, please refer to the relevant description in Embodiment 1 of the above-mentioned method. image 3 As shown, the terminal equipment mainly includes:
[0076] The receiving module 31 can be used to receive the key update information containing the set root key generation parameters issued by the TV transmission center;
[0077] The update module 32 is configured to generate a new root key according to the root key generation parameters and a set key generation algorithm stored locally by the terminal device; wherein, the set key generation algorithm is determined by The device manufacturer related to the terminal device presets a private security algorithm in the secure storage area of the terminal device; the root key generation parameter is an M-bit random number, and M is any positive integer, and , generatin...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


