Check patentability & draft patents in minutes with Patsnap Eureka AI!

Authentication method and terminal equipment of set-top box remote control based on hash algorithm

A technology of a set-top box remote control and an authentication method, applied in the field of communication, can solve the problems of unusable, set-top box control and attack, set-top box control, etc., and achieve the effect of avoiding attack and control

Active Publication Date: 2022-02-22
GUANGZHOU CHNAVS DIGITAL TECH
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] During the research and practice of the prior art, the inventor of the present invention found that many methods or systems in the prior art for controlling set-top boxes by sending remote control commands through the virtual remote control on the smart phone are based on plain text or simple encryption method, it is easy to be emulated or modified by other malicious systems to control and attack the set-top box, causing the set-top box to be controlled or unusable

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method and terminal equipment of set-top box remote control based on hash algorithm
  • Authentication method and terminal equipment of set-top box remote control based on hash algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0036] see Figure 1-2 .

[0037] Such as figure 1 As shown, the authentication method of a set-top box remote control based on a hash algorithm provided in this embodiment includes:

[0038] S101. The remote controller responds to the initial control instruction input by the user, and obtains a key value corresponding to the initial control instruction;

[0039] S102. The remote controller performs a hash operation to obtain a hash value H according to the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a hash algorithm-based authentication method for a remote control of a set-top box, a terminal device and a storage medium. The method includes that the remote control responds to an initial control command input by a user, and obtains a key value corresponding to the initial control command; Initially refers to the start code of the control command, the current timestamp, the key value, and the smart card number bound to the target set-top box, perform hash operation to obtain the hash value H, and send the operation result to the data gateway server, so that the data gateway The server encapsulates the operation result into a remote control command in TS packet format after the hash value verification of the operation result is passed once; after the target set-top box recognizes the remote control command according to the smart card number, it hashes the remote control command twice. The value is verified, and the operation commanded by the remote control is executed after the verification is passed. The invention can verify the protection data between the set-top box and the remote controller, and avoid the set-top box being attacked and controlled by other malicious systems.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to an authentication method for a set-top box remote controller based on a hash algorithm, a terminal device and a storage medium. Background technique [0002] With the popularity of smart phones, it is a good choice for users to control the set-top box through the virtual remote control app on the smart phone. Live more users and improve economic benefits. [0003] During the research and practice of the prior art, the inventor of the present invention found that many methods or systems in the prior art for controlling set-top boxes by sending remote control commands through the virtual remote control on the smart phone are based on plain text or simple encryption It is easy to be simulated or modified by other malicious systems to send commands to control and attack the set-top box, causing the set-top box to be controlled or unusable. Therefore, it is necessary to provi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/06H04L9/40
CPCH04L9/0643H04L63/0428H04L63/12
Inventor 殷焦元
Owner GUANGZHOU CHNAVS DIGITAL TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More