A private key acquiring method for use in set-top box

An acquisition method and a set-top box technology, which are applied in the field of Internet key use and its secure transmission, can solve the problems of cumbersome process, high cost, and high production cost of smart cards, and achieve the effect of high privacy performance and low cost

Active Publication Date: 2005-11-23
CHINA TELECOM CORP LTD
View PDF0 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] The main advantage of using a smart card is higher security, but the disadvantages are also obvious: the production cost of the smart card is high, and after the password of the smart card is cracked, replacing the smart card is also a costly and cumbersome process
The main disadvantage of using the FLASH method is that the security is too low, and hackers can easily read the user's private key in the Flash, thereby cracking the security mechanism of the set-top box

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A private key acquiring method for use in set-top box
  • A private key acquiring method for use in set-top box
  • A private key acquiring method for use in set-top box

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0053] see image 3 , the present invention is a method for obtaining a private key used in a set-top box, and its applicable network system includes at least the following three functional components that are connected to each other to form a mutual information transmission channel:

[0054] Set-top box 1 is a client device that plays video and / or audio programs. During the account opening operation, it obtains software containing the latest calculation shared key algorithm, so as to use this algorithm to calculate and generate a shared key based on its own set-top box software and hardware information. key, and then use the shared key to decrypt the downloaded encrypted private key, and then use the private key to decrypt the content key, and then use the conten...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention relates to cell phone cover private key acquiring method, which comprises the following steps: a, operator runs the staring to the cover before the usage; b, in the operation, the cover management module has newest computer common formula software into machine case to provide the common private keys; c, in each starting, the management module receives the download keys and checks the cover software to ensure the legal identity and computes the common keys by use of the pre-stored hardware and software; d, after that, it uses the hardware and software information to compute common keys to get the private keys for decoding to realize the display.

Description

technical field [0001] The invention relates to a method for obtaining a private key used in a set-top box, and belongs to the technical field of Internet key usage and its safe transmission. Background technique [0002] Digital set-top boxes are generally used to play video and / or audio programs. In order to protect the copyright and content security of these video and / or audio digital programs, at present, digital rights management (DRM) technology is often used to protect the security of content. The principle of digital rights management (DRM) is to use technical means to control the distribution, transmission and use of digital products, so that digital products can only be used by authorized users within the authorized period according to the authorized method. . [0003] DRM technology is a content protection technology based on the public key system PKI (Public Key Infrastructure). The main part of DRM technology is composed of authorization and key system and enc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04N7/16
Inventor 陈戈唐宏梁洁吕冠中
Owner CHINA TELECOM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products