Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method of controlling security of terminal set top box applied under environment of living broadcast and broadcast on demand

A security control and terminal technology, applied in the field of information dissemination, can solve the problems of short and frequent decryption key deciphering period, unsafe communication channels between terminal set-top boxes and IC cards, and achieve the effect of avoiding frequent updates and ensuring effective execution

Inactive Publication Date: 2007-02-21
上海文广互动电视有限公司
View PDF0 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the storage decryption key used in this type of system adopts a low-strength encryption algorithm, the actual problem of the decryption key deciphering cycle is short
In practical applications, the decryption key replacement cycle is also between 5-15 seconds, which is very frequent
In addition, the insecurity of the communication channel between the terminal set-top box and the IC card storing the decryption key and authorization information in this type of system directly leads to the insecurity of the decryption key and the decrypted digital media content, and the authorization information cannot be effectively executed.
In view of the above problems, the existing system can no longer adapt to the current large-scale development of digital TV, especially the increasingly popular live broadcast and on-demand applications.
Security control issues for such systems need to be addressed urgently

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method of controlling security of terminal set top box applied under environment of living broadcast and broadcast on demand
  • Method of controlling security of terminal set top box applied under environment of living broadcast and broadcast on demand

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0041]A terminal set-top box security control method applied in the live broadcast and on-demand environment, implemented in the Internet network system through the terminal set-top box 1, the terminal set-top box 1 is connected to the server 5 of the supplier through the Internet network 6, and the terminal set-top box 1 is connected to the TV through a cable 7 The machine 4 is online, the first single-chip microcomputer system 2 of the terminal set-top box 1 contains the first ROM22, the first CPU21 and the first Flash23. The program of the control, under the control and command of the program stored in the first ROM22 and the first Flash23, the first CPU21 performs the operation of managing and controlling the work of the following CPU31. It is characterized in that the first single-chip microcomputer system 2 Trusted computing chip 3 is also embedded in it, trusted computing chip 3 is a second single-chip microcomputer system that is sealed and contains the second ROM32, th...

Embodiment 2

[0070] Except for the prompt information in the eleventh step, the sixteenth step, the nineteenth step and the twenty-third step, the words of the prompt information are "update failed, please contact the supplier", "the user has no right to receive the program, please contact the supplier The supplier purchases the right to receive", "Update failed, please contact the supplier" and "Decoding failed, please contact the supplier", the rest is the same as that of Embodiment 1.

[0071] The above embodiment is implemented in the Internet network system, see figure 1 . The operation process of above embodiment, see figure 2 .

[0072] working principle. The trusted computing chip 3 obtains the digital media content from the playback control, and within the scope permitted by the right object in it, the decryption program decrypts the digital media content according to the decryption key in it, and then decrypts the The digital media content, that is, the audio-visual program ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The method comprises: embedding a dependable computing chip into a digital set-top box; the right object of digital media content, decrypt key and decrypt program are packaged into the dependable computing chip; with digital right management technology, each operation in the dependable computing chip can be effectively supervised and controlled to ensure that the digital media content can not be illegally used. In addition, the frequent renew of decrypt key can be avoided, and the renew operation time period can be reduced to 3-6 months.

Description

technical field [0001] The invention relates to a terminal set-top box safety control method applied in the live broadcast and on-demand environment, and belongs to the technical field of information dissemination. Background technique [0002] Today's digital TV receiving systems are mainly digital TV conditional access systems. Since the storage decryption key used in this type of system adopts a low-strength encryption algorithm, it causes the practical problem that the decryption key deciphering period is short. In practical applications, the decryption key replacement cycle is also between 5-15 seconds, which is very frequent. In addition, the insecurity of the communication channel between the terminal set-top box and the IC card storing the decryption key and authorization information in this type of system directly leads to the insecurity of the decryption key and the decrypted digital media content, and the authorization information cannot be ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04N5/00H04N7/173H04N21/266H04N21/441
Inventor 卢宝丰陈卫吴南山
Owner 上海文广互动电视有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products