Method and system for constructing dynamic root of trust based on high-security set top box
A high-security machine and top-box technology, applied in the field of information security, can solve problems such as risks in the chain of trust
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0067] The present invention will be described in detail below in conjunction with the accompanying drawings, and the features of the present invention will be further revealed in the following detailed description.
[0068] figure 2 A security architecture for a high-security set-top box according to an embodiment of the present invention is shown. and figure 1 Compared with the architecture of the present invention, the present invention uses the OTP data written once as the basis, and then through the dynamic session key and dynamic token generated interactively by the terminal authentication background, the dynamic root of trust is constructed based on the dynamic session key and the dynamic token, here Based on the formation of a chain of trust.
[0069] image 3 It is a schematic structural diagram of a system for constructing a dynamic root of trust based on high-security set-top box hardware according to an embodiment of the present invention. Such as image 3 As...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


