Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and system for constructing dynamic root of trust based on high-security set top box

A high-security machine and top-box technology, applied in the field of information security, can solve problems such as risks in the chain of trust

Pending Publication Date: 2021-12-07
E-SURFING DIGITAL LIFE TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, although the asymmetric algorithm based on the hardware-level protection of high-security set-top boxes is difficult to crack, there are still risks in the chain of trust

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for constructing dynamic root of trust based on high-security set top box
  • Method and system for constructing dynamic root of trust based on high-security set top box
  • Method and system for constructing dynamic root of trust based on high-security set top box

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0067] The present invention will be described in detail below in conjunction with the accompanying drawings, and the features of the present invention will be further revealed in the following detailed description.

[0068] figure 2 A security architecture for a high-security set-top box according to an embodiment of the present invention is shown. and figure 1 Compared with the architecture of the present invention, the present invention uses the OTP data written once as the basis, and then through the dynamic session key and dynamic token generated interactively by the terminal authentication background, the dynamic root of trust is constructed based on the dynamic session key and the dynamic token, here Based on the formation of a chain of trust.

[0069] image 3 It is a schematic structural diagram of a system for constructing a dynamic root of trust based on high-security set-top box hardware according to an embodiment of the present invention. Such as image 3 As...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and a system for constructing a dynamic root of trust based on a high-security set top box. The system comprises a terminal authentication background; and a high-security set top box communicatively coupled with the terminal authentication background, wherein the high-security set top box is configured to: generate a dynamic session key; perform bidirectional authentication with the terminal authentication background by using OTP data of a security chip of the high-security set top box; receive a dynamic token from the terminal authentication background in response to success of the bidirectional authentication; and generate a dynamic root of trust based on the dynamic session key and the dynamic token.

Description

technical field [0001] The present invention relates to the field of information security, more specifically, to a method and system for constructing a dynamic root of trust based on a high-security set-top box. Background technique [0002] With the development of technologies such as 4K / VR, the value of video content is getting higher and higher, and content providers (ContentProvider, CP) are paying more and more attention to copyright protection to combat increasingly concealed piracy / piracy. Piracy forms mainly include P2P download sharing mode, hotlink mode, network disk mode, mobile / OTT aggregation mode, etc. In addition, the difficulty of anti-piracy and forensics continues to increase. At present, the industry has generally implemented encryption protection for high-definition content to prevent content from being used by pirates. In recent years, with the rise of the Android system around the world, radio and television set-top boxes have gradually changed from t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04N21/835H04N21/4623H04N21/4627H04L9/06
CPCH04N21/835H04N21/4623H04N21/4627H04L9/0643
Inventor 沈晶歆
Owner E-SURFING DIGITAL LIFE TECH CO LTD