CN101977113A - Method for equipment identification in digital copyright management - Google Patents

Method for equipment identification in digital copyright management Download PDF

Info

Publication number
CN101977113A
CN101977113A CN 201010533922 CN201010533922A CN101977113A CN 101977113 A CN101977113 A CN 101977113A CN 201010533922 CN201010533922 CN 201010533922 CN 201010533922 A CN201010533922 A CN 201010533922A CN 101977113 A CN101977113 A CN 101977113A
Authority
CN
China
Prior art keywords
certificate
server
terminal equipment
device authentication
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN 201010533922
Other languages
Chinese (zh)
Other versions
CN101977113B (en
Inventor
胡皓
刘贤洪
张新法
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sichuan Changhong Electric Co Ltd
Original Assignee
Sichuan Changhong Electric Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sichuan Changhong Electric Co Ltd filed Critical Sichuan Changhong Electric Co Ltd
Priority to CN 201010533922 priority Critical patent/CN101977113B/en
Publication of CN101977113A publication Critical patent/CN101977113A/en
Application granted granted Critical
Publication of CN101977113B publication Critical patent/CN101977113B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention relates to a technique of digital copyright management. The invention solves the problem of unidirectional identification of an on-line identification mode for equipment identification in the traditional digital copyright management technique and provides a method for the equipment identification in the digital copyright management, which comprises the steps of storing various certificates and private keys of terminal equipment in the terminal equipment; storing various certificates and private keys of an equipment identification server in the equipment identification server; and adopting a bidirectional identification mode of the terminal equipment and the equipment identification server to identify the terminal equipment. The invention has the advantages that potential safety hazards can be avoided, and the method is suitable for the equipment identification in the digital copyright management.

Description

Carry out the method for device authentication in the digital copyright management
Technical field
The present invention relates to the technology of digital copyright management, particularly the technology of device authentication in the digital copyright management.
Background technology
Characteristics based on digital information have determined that another kind of unique technique must be arranged, strengthen protecting the copyright of these digitized audio/video program contents, this technology is exactly the digital copyright management technology---DRM (digital right management), the operation principle of DRM technology is: at first set up the digital program authorization center, encoding compression digital program content, utilize the digital program content of key (key) after can encipherment protection (lock) encoding compression, digital program head after the encoding compression of encrypting is being deposited the URL of KeyID and digital program authorization center, the user is in a sowing time, KeyID and the URL information deposited according to the digital program head after the encoding compression of encrypting, the association key of sending after just can the checking mandate by the digital program authorization center is decrypted (unlock), program can be play, because the program that needs protection is encrypted, even therefore preserved by user's download, if not obtaining the checking mandate of digital program authorization center also can't play, thereby tight protection the copyright of program, but the emphasis of present DRM technology mainly concentrates on aspects such as authentification of user and mandate, aspect device authentication, mainly contain following problem: 1) equipment is not authenticated, the equipment personation of non-this DRM system may appear, thus the potential safety hazard of staying; 2) adopt the mode of offline authentication, in advance the device authentication desired data is stored on the subscriber computer, equipment is finished authentication by subscriber computer, may can't upgrade in time or is distorted and cause authentication result incorrect because of verify data like this; 3) mode of employing on-line authentication, its step mainly is at first by root certificate verification terminal equipment secondary CA certificate and terminal equipment certificate, use terminal equipment certificate encrypted random number by the back, again with the deciphering of terminal equipment certificate private key, if the identical then authentication success of result that obtains with former random number, so just the device authentication server authenticates terminal equipment, and terminal equipment does not authenticate the device authentication server, the device authentication server might be palmed off, thereby the potential safety hazard of staying, and need the extra smart card that adopts, external agencys such as USBKey increase cost.
Summary of the invention
The objective of the invention is to overcome device authentication on-line authentication mode in the present digital copyright management technology and only carry out the shortcoming of unilateral authentication, the method for carrying out device authentication in a kind of digital copyright management is provided.
The present invention solves its technical problem, and the technical scheme of employing is: carry out the method for device authentication in the digital copyright management, it is characterized in that, may further comprise the steps:
A. issue the root certificate by the certificate management system of DRM system, generate equipment secondary CA (digital certificate authentication center) certificate and server secondary CA certificate with this root certificate, use equipment secondary CA certificate and server secondary CA certificate to generate terminal equipment certificate and device authentication server certificate respectively;
B. root certificate, equipment secondary CA certificate, terminal equipment certificate and private key thereof are stored in the terminal equipment;
C. root certificate, server secondary CA certificate, device authentication server certificate and private key thereof are stored in the device authentication server;
D. during device authentication, terminal equipment is set up network with the device authentication server and is connected, and terminal equipment is initiated authentication request to the device authentication server, comprises terminal equipment ID, terminal equipment certificate serial number in this authentication request;
E. the device authentication server is received the authentication request that terminal equipment sends, reverting equipment certificate server ID;
F. terminal equipment sends terminal secondary CA certificate and terminal equipment certificate to the device authentication server;
G. the terminal equipment certificate and the terminal secondary CA certificate that receive of device authentication server authentication obtains the server authentication result, and to terminal equipment send server secondary CA certificate and device authentication server certificate;
H. terminal equipment verifies that the server secondary CA certificate and the device authentication server certificate that receive obtain terminal checking result, and generate a random number N A, with behind the public key encryption of device authentication server certificate terminal being verified that the result sends to the device authentication server together;
I. the device authentication server generates a random number N B, with behind the public key encryption of terminal equipment certificate the server authentication result being sent to terminal equipment together;
J. terminal equipment judges that according to the server authentication result who receives whether terminal equipment certificate and terminal secondary CA certificate are by checking, if not authentication failed then, finish authentication, if then use the random number N B after the encryption that the private key deciphering of terminal equipment certificate receives to obtain NB ', and carry out certain computing with random number N A and obtain a Transaction Identification Number f (NA, NB '), and with this Transaction Identification Number f (NA, NB ') sends to the device authentication server, enter next step;
K. the device authentication server judges that according to the terminal checking result who receives whether server secondary CA certificate and device authentication server certificate are by checking, if not then send authentication failed to terminal equipment, finish authentication, if then use the random number N A after the encryption that the private key deciphering of device authentication server certificate receives to obtain NA ', and with random number N B carry out described certain computing of j step obtain a server Transaction Identification Number f (NA ', NB), Transaction Identification Number f (the NA that relatively receives, NB ') with server Transaction Identification Number f (NA ', NB) whether identical, if then device authentication success, and comparative result sent to terminal equipment, enter next step, if not then device authentication is unsuccessful, and comparative result sent to terminal equipment, enter next step;
L. terminal equipment receives comparative result, disconnect and being connected with the network of device authentication server, judge Transaction Identification Number f (NA according to the comparative result that receives, NB ') with server Transaction Identification Number f (NA ', NB) whether identical, if then think the device authentication success, if not think that then device authentication is unsuccessful.
Concrete, step b may further comprise the steps:
B1. judge whether this DRM system has CRL, if then enter the b2 step, if not then enter the b3 step;
B2. this CRL is stored in the terminal equipment with root certificate, equipment secondary CA certificate, terminal equipment certificate and private key thereof as the terminal revocation list, enters the c step;
B3. root certificate, equipment secondary CA certificate, terminal equipment certificate and private key thereof are stored in the terminal equipment, enter the c step;
Step c may further comprise the steps:
C1. judge whether this DRM system has CRL, if then enter the c2 step, if not then enter the c3 step;
C2. this CRL is stored in the device authentication server with root certificate, server secondary CA certificate, device authentication server certificate and private key thereof as the server revocation list, and the server revocation list enters the d step according to upgrading the time of running of this DRM system;
C3. root certificate, server secondary CA certificate, device authentication server certificate and private key thereof are stored in the device authentication server, enter the d step;
Steps d may further comprise the steps:
D1. during device authentication, terminal equipment is set up network with the device authentication server and is connected;
D2. terminal equipment is initiated authentication request to the device authentication server, comprise terminal equipment ID, terminal equipment certificate serial number and terminal revocation list version number in this authentication request, if endless revocation list version number, can not send or terminal revocation list version number is changed to 0;
Step e may further comprise the steps:
E1. the device authentication server is received the authentication request that terminal equipment sends, reverting equipment certificate server ID and server revocation list version number, if serverless backup revocation list version number, can not send or server revocation list version number is changed to 0, judge that whether the terminal revocation list version number that receives is less than server revocation list version number, if then send this server revocation list to terminal equipment, enter the e2 step, directly do not enter the f step if not then do not handle;
E2. terminal equipment is changed terminal revocation list version number and the terminal revocation list of storing before according to server revocation list version number that receives and server revocation list as new terminal revocation list version number and terminal revocation list, enters the f step;
Step g may further comprise the steps:
G1. the terminal equipment certificate and the terminal secondary CA certificate that receive of device authentication server authentication obtains the server authentication result, and from the terminal equipment certificate, obtain the terminal equipment certificate serial number, judge whether this terminal equipment certificate serial number is present in the server revocation list, if then enter the g2 step, if not then enter the g3 step;
G2. send the information that certificate has been revoked, device authentication fails to terminal equipment;
G3. to terminal equipment send server secondary CA certificate and device authentication server certificate.
Further, described certain computing of step j is Hash operation or MD5 computing or SHA128 computing or SHA256 computing.
The invention has the beneficial effects as follows, by carrying out the method for device authentication in the above-mentioned digital copyright management, since in the time of each device authentication all by the device authentication server, can guarantee that the device authentication data are up-to-date and correct, the needed number certificate is fired in advance in terminal equipment, does not need additionally to increase equipment, can not increase cost, and adopt the mode of two-way authentication between terminal equipment and the device authentication server, avoid potential safety hazard.
Embodiment
Below in conjunction with embodiment, describe technical scheme of the present invention in detail.
The method of carrying out device authentication in the digital copyright management of the present invention is: at first issue the root certificate by the certificate management system of DRM system, generate equipment secondary CA (digital certificate authentication center) certificate and server secondary CA certificate with this root certificate, use equipment secondary CA certificate and server secondary CA certificate generate terminal equipment certificate and device authentication server certificate respectively, again with the root certificate, equipment secondary CA certificate, terminal equipment certificate and private key thereof are stored in the terminal equipment, with the root certificate, server secondary CA certificate, device authentication server certificate and private key thereof are stored in the device authentication server, when device authentication, terminal equipment is set up network with the device authentication server and is connected, terminal equipment is at first initiated authentication request to the device authentication server, comprise terminal equipment ID in this authentication request, the terminal equipment certificate serial number, after the device authentication server is received the authentication request that terminal equipment sends then, reverting equipment certificate server ID, terminal equipment sends terminal secondary CA certificate and terminal equipment certificate to the device authentication server again, terminal equipment certificate that the device authentication server authentication receives and terminal secondary CA certificate obtain the server authentication result, and to terminal equipment send server secondary CA certificate and device authentication server certificate, terminal equipment verifies that the server secondary CA certificate and the device authentication server certificate that receive obtain terminal checking result then, and generate a random number N A, with behind the public key encryption of device authentication server certificate terminal being verified that the result sends to the device authentication server together, the device authentication server generates a random number N B simultaneously, with behind the public key encryption of terminal equipment certificate the server authentication result being sent to terminal equipment together, terminal equipment judges that according to the server authentication result who receives whether terminal equipment certificate and terminal secondary CA certificate are by checking then, if not authentication failed then, finish authentication, if then use the random number N B after the encryption that the private key deciphering of terminal equipment certificate receives to obtain NB ', and carry out certain computing with random number N A and obtain a Transaction Identification Number f (NA, NB '), and with this Transaction Identification Number f (NA, NB ') sends to the device authentication server, the device authentication server judges that according to the terminal checking result who receives whether server secondary CA certificate and device authentication server certificate are by checking, if not then send authentication failed to terminal equipment, finish authentication, if then use the random number N A after the encryption that the private key deciphering of device authentication server certificate receives to obtain NA ', and with random number N B carry out the identical computing of certain computing of using with terminal equipment obtain a server Transaction Identification Number f (NA ', NB), Transaction Identification Number f (the NA that relatively receives, NB ') with server Transaction Identification Number f (NA ', NB) whether identical, if then device authentication success, and comparative result sent to terminal equipment, if not then device authentication is unsuccessful, and comparative result sent to terminal equipment, terminal equipment receives comparative result, disconnect and being connected with the network of device authentication server, judge Transaction Identification Number f (NA according to the comparative result that receives, NB ') with server Transaction Identification Number f (NA ', NB) whether identical, if then think the device authentication success, if not think that then device authentication is unsuccessful.
Embodiment
Certain computing that this example adopts is Hash operation or MD5 computing or SHA128 computing or SHA256 computing.
At first issue the root certificate by the certificate management system of DRM system, generate equipment secondary CA (digital certificate authentication center) certificate and server secondary CA certificate with this root certificate, use equipment secondary CA certificate and server secondary CA certificate generate terminal equipment certificate and device authentication server certificate respectively, judge again whether this DRM system has CRL, if then with this CRL as terminal revocation list and root certificate, equipment secondary CA certificate, terminal equipment certificate and private key thereof are stored in the terminal equipment together, and with this CRL as server revocation list and root certificate, server secondary CA certificate, device authentication server certificate and private key thereof are stored in the device authentication server together, and the server revocation list is according to upgrading the time of running of this DRM system, if not then with the root certificate, equipment secondary CA certificate, terminal equipment certificate and private key thereof are stored in the terminal equipment, with the root certificate, server secondary CA certificate, device authentication server certificate and private key thereof are stored in the device authentication server, when device authentication, terminal equipment is set up network with the device authentication server and is connected, terminal equipment is at first initiated authentication request to the device authentication server, comprise terminal equipment ID in this authentication request, terminal equipment certificate serial number and terminal revocation list version number, if endless revocation list version number, can not send or terminal revocation list version number is changed to 0, the device authentication server is received the authentication request that terminal equipment sends, reverting equipment certificate server ID and server revocation list version number, if serverless backup revocation list version number, can not send or server revocation list version number is changed to 0, judge that whether the terminal revocation list version number that receives is less than server revocation list version number, if then send this server revocation list to terminal equipment, terminal equipment is changed the terminal revocation list version number and the terminal revocation list of storage before as new terminal revocation list version number and terminal revocation list according to server revocation list version number that receives and server revocation list, if not then do not handle, terminal equipment sends terminal secondary CA certificate and terminal equipment certificate to the device authentication server more then, terminal equipment certificate that the device authentication server authentication receives and terminal secondary CA certificate obtain the server authentication result, and when having the server revocation list, from the terminal equipment certificate, obtain the terminal equipment certificate serial number, judge whether this terminal equipment certificate serial number is present in the server revocation list, if then send the information that certificate has been revoked to terminal equipment, device authentication fails, if not then to terminal equipment send server secondary CA certificate and device authentication server certificate, terminal equipment verifies that the server secondary CA certificate and the device authentication server certificate that receive obtain terminal checking result then, and generate a random number N A, with behind the public key encryption of device authentication server certificate terminal being verified that the result sends to the device authentication server together, the device authentication server generates a random number N B simultaneously, and with behind the public key encryption of terminal equipment certificate the server authentication result being sent to terminal equipment together, terminal equipment judges that according to the server authentication result who receives whether terminal equipment certificate and terminal secondary CA certificate are by checking then, if not authentication failed then, finish authentication,, and carry out certain computing (Hash operation or MD5 computing or SHA128 computing or SHA256 computing with random number N A if then use the random number N B after the encryption that the private key deciphering of terminal equipment certificate receives to obtain NB ', these compute modes are cryptographic calculation mode commonly used) obtain a Transaction Identification Number f (NA, NB '), and with this Transaction Identification Number f (NA, NB ') send to the device authentication server, the device authentication server judges that according to the terminal checking result who receives whether server secondary CA certificate and device authentication server certificate are by checking, if not then send authentication failed, finish authentication, if then use the random number N A after the encryption that the private key deciphering of device authentication server certificate receives to obtain NA ' to terminal equipment, and carry out the computing identical with random number N B and (promptly use identical Hash operation or MD5 computing or SHA128 computing or SHA256 computing with terminal equipment with certain computing of terminal equipment use, for example if terminal equipment uses Hash operation, then this moment, the device authentication server also adopted identical Hash operation) obtain a server Transaction Identification Number f (NA ', NB), Transaction Identification Number f (the NA that relatively receives, NB ') with server Transaction Identification Number f (NA ', NB) whether identical, if then device authentication success, and comparative result sent to terminal equipment, if not then device authentication is unsuccessful, and sends to terminal equipment with comparative result, terminal equipment receives comparative result, disconnect and being connected with the network of device authentication server, according to the comparative result that receives judge Transaction Identification Number f (NA, NB ') and server Transaction Identification Number f (NA ', NB) whether identical, if then think the device authentication success, if not think that then device authentication is unsuccessful.

Claims (3)

1. carry out the method for device authentication in the digital copyright management, it is characterized in that, may further comprise the steps:
A. issue the root certificate by the certificate management system of DRM system, generate equipment secondary CA certificate and server secondary CA certificate with this root certificate, use equipment secondary CA certificate and server secondary CA certificate to generate terminal equipment certificate and device authentication server certificate respectively;
B. root certificate, equipment secondary CA certificate, terminal equipment certificate and private key thereof are stored in the terminal equipment;
C. root certificate, server secondary CA certificate, device authentication server certificate and private key thereof are stored in the device authentication server;
D. during device authentication, terminal equipment is set up network with the device authentication server and is connected, and terminal equipment is initiated authentication request to the device authentication server, comprises terminal equipment ID, terminal equipment certificate serial number in this authentication request;
E. the device authentication server is received the authentication request that terminal equipment sends, reverting equipment certificate server ID;
F. terminal equipment sends terminal secondary CA certificate and terminal equipment certificate to the device authentication server;
G. the terminal equipment certificate and the terminal secondary CA certificate that receive of device authentication server authentication obtains the server authentication result, and to terminal equipment send server secondary CA certificate and device authentication server certificate;
H. terminal equipment verifies that the server secondary CA certificate and the device authentication server certificate that receive obtain terminal checking result, and generate a random number N A, with behind the public key encryption of device authentication server certificate terminal being verified that the result sends to the device authentication server together;
I. the device authentication server generates a random number N B, with behind the public key encryption of terminal equipment certificate the server authentication result being sent to terminal equipment together;
J. terminal equipment judges that according to the server authentication result who receives whether terminal equipment certificate and terminal secondary CA certificate are by checking, if not authentication failed then, finish authentication, if then use the random number N B after the encryption that the private key deciphering of terminal equipment certificate receives to obtain NB ', and carry out certain computing with random number N A and obtain a Transaction Identification Number f (NA, NB '), and with this Transaction Identification Number f (NA, NB ') sends to the device authentication server, enter next step;
K. the device authentication server judges that according to the terminal checking result who receives whether server secondary CA certificate and device authentication server certificate are by checking, if not then send authentication failed to terminal equipment, finish authentication, if then use the random number N A after the encryption that the private key deciphering of device authentication server certificate receives to obtain NA ', and with random number N B carry out described certain computing of j step obtain a server Transaction Identification Number f (NA ', NB), Transaction Identification Number f (the NA that relatively receives, NB ') with server Transaction Identification Number f (NA ', NB) whether identical, if then device authentication success, and comparative result sent to terminal equipment, enter next step, if not then device authentication is unsuccessful, and comparative result sent to terminal equipment, enter next step;
L. terminal equipment receives comparative result, disconnect and being connected with the network of device authentication server, judge Transaction Identification Number f (NA according to the comparative result that receives, NB ') with server Transaction Identification Number f (NA ', NB) whether identical, if then think the device authentication success, if not think that then device authentication is unsuccessful.
2. according to the method for carrying out device authentication in the described digital copyright management of claim 1, it is characterized in that step b may further comprise the steps:
B1. judge whether this DRM system has CRL, if then enter the b2 step, if not then enter the b3 step;
B2. this CRL is stored in the terminal equipment with root certificate, equipment secondary CA certificate, terminal equipment certificate and private key thereof as the terminal revocation list, enters the c step;
B3. root certificate, equipment secondary CA certificate, terminal equipment certificate and private key thereof are stored in the terminal equipment, enter the c step;
Step c may further comprise the steps:
C1. judge whether this DRM system has CRL, if then enter the c2 step, if not then enter the c3 step;
C2. this CRL is stored in the device authentication server with root certificate, server secondary CA certificate, device authentication server certificate and private key thereof as the server revocation list, and the server revocation list enters the d step according to upgrading the time of running of this DRM system;
C3. root certificate, server secondary CA certificate, device authentication server certificate and private key thereof are stored in the device authentication server, enter the d step;
Steps d may further comprise the steps:
D1. during device authentication, terminal equipment is set up network with the device authentication server and is connected;
D2. terminal equipment is initiated authentication request to the device authentication server, comprise terminal equipment ID, terminal equipment certificate serial number and terminal revocation list version number in this authentication request, if endless revocation list version number, can not send or terminal revocation list version number is changed to 0;
Step e may further comprise the steps:
E1. the device authentication server is received the authentication request that terminal equipment sends, reverting equipment certificate server ID and server revocation list version number, if serverless backup revocation list version number, can not send or server revocation list version number is changed to 0, judge that whether the terminal revocation list version number that receives is less than server revocation list version number, if then send this server revocation list to terminal equipment, enter the e2 step, directly do not enter the f step if not then do not handle;
E2. terminal equipment is changed terminal revocation list version number and the terminal revocation list of storing before according to server revocation list version number that receives and server revocation list as new terminal revocation list version number and terminal revocation list, enters the f step;
Step g may further comprise the steps:
G1. the terminal equipment certificate and the terminal secondary CA certificate that receive of device authentication server authentication obtains the server authentication result, and from the terminal equipment certificate, obtain the terminal equipment certificate serial number, judge whether this terminal equipment certificate serial number is present in the server revocation list, if then enter the g2 step, if not then enter the g3 step;
G2. send the information that certificate has been revoked, device authentication fails to terminal equipment;
G3. to terminal equipment send server secondary CA certificate and device authentication server certificate.
3. according to the method for carrying out device authentication in claim 1 or the 2 described digital copyright managements, it is characterized in that described certain computing of step j is Hash operation or MD5 computing or SHA128 computing or SHA256 computing.
CN 201010533922 2010-11-05 2010-11-05 Method for equipment identification in digital copyright management Active CN101977113B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 201010533922 CN101977113B (en) 2010-11-05 2010-11-05 Method for equipment identification in digital copyright management

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 201010533922 CN101977113B (en) 2010-11-05 2010-11-05 Method for equipment identification in digital copyright management

Publications (2)

Publication Number Publication Date
CN101977113A true CN101977113A (en) 2011-02-16
CN101977113B CN101977113B (en) 2013-05-08

Family

ID=43576962

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 201010533922 Active CN101977113B (en) 2010-11-05 2010-11-05 Method for equipment identification in digital copyright management

Country Status (1)

Country Link
CN (1) CN101977113B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102868687A (en) * 2012-09-05 2013-01-09 四川长虹电器股份有限公司 Method for improving security of intelligent street lamp control system
CN103634266A (en) * 2012-08-21 2014-03-12 上海凌攀信息科技有限公司 A bidirectional authentication method for a server and a terminal
CN107431616A (en) * 2015-03-25 2017-12-01 三菱电机株式会社 Server, certificates constructing indicating means and program
CN108234126A (en) * 2016-12-21 2018-06-29 金联汇通信息技术有限公司 For the system and method remotely opened an account

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101094062A (en) * 2006-06-21 2007-12-26 普天信息技术研究院 Method for implementing safe distribution and use of digital content by using memory card
CN101252432A (en) * 2007-12-19 2008-08-27 北大方正集团有限公司 Field managing server and system, digital authority managing method based on field
US20090144541A1 (en) * 2007-12-03 2009-06-04 Soon Choul Kim Method and apparatus of mutual authentication and key distribution for downloadable conditional access system in digital cable broadcasting network

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101094062A (en) * 2006-06-21 2007-12-26 普天信息技术研究院 Method for implementing safe distribution and use of digital content by using memory card
US20090144541A1 (en) * 2007-12-03 2009-06-04 Soon Choul Kim Method and apparatus of mutual authentication and key distribution for downloadable conditional access system in digital cable broadcasting network
CN101252432A (en) * 2007-12-19 2008-08-27 北大方正集团有限公司 Field managing server and system, digital authority managing method based on field

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103634266A (en) * 2012-08-21 2014-03-12 上海凌攀信息科技有限公司 A bidirectional authentication method for a server and a terminal
CN103634266B (en) * 2012-08-21 2017-05-24 上海凌攀信息科技有限公司 A bidirectional authentication method for a server and a terminal
CN102868687A (en) * 2012-09-05 2013-01-09 四川长虹电器股份有限公司 Method for improving security of intelligent street lamp control system
CN102868687B (en) * 2012-09-05 2015-07-15 四川长虹电器股份有限公司 Method for improving security of intelligent street lamp control system
CN107431616A (en) * 2015-03-25 2017-12-01 三菱电机株式会社 Server, certificates constructing indicating means and program
CN108234126A (en) * 2016-12-21 2018-06-29 金联汇通信息技术有限公司 For the system and method remotely opened an account
CN108234126B (en) * 2016-12-21 2021-04-09 金联汇通信息技术有限公司 System and method for remote account opening

Also Published As

Publication number Publication date
CN101977113B (en) 2013-05-08

Similar Documents

Publication Publication Date Title
CN106548345B (en) Method and system for realizing block chain private key protection based on key partitioning
CN106656488B (en) Key downloading method and device for POS terminal
Popescu et al. A DRM security architecture for home networks
CN101005361B (en) Server and software protection method and system
WO2022037596A1 (en) Combined signature and signature verification method and system, and storage medium
US7676042B2 (en) Terminal apparatus, server apparatus, and digital content distribution system
US8533482B2 (en) Method for generating a key pair and transmitting a public key or request file of a certificate in security
CN108123795B (en) Quantum key chip issuing method, application method, issuing platform and system
US8806206B2 (en) Cooperation method and system of hardware secure units, and application device
CN106713279B (en) video terminal identity authentication system
WO2005025125A1 (en) Device authentication system
JP2003085321A (en) System and method for contents use authority control, information processing device, and computer program
CN101609495A (en) A kind of electronic document digital rights management method
CN109328444B (en) Protection device and dongle and method of use thereof
WO2014187206A1 (en) Method and system for backing up private key in electronic signature token
WO2014026462A1 (en) Digital rights management method
CN101227276B (en) Method and system for public key safety transfer of digital mobile certificate
CN101977113B (en) Method for equipment identification in digital copyright management
JP4823704B2 (en) Authentication system, authentication information delegation method and security device in the same system
CN104125239A (en) Network authentication method and system based on data link encryption transmission
US8307457B2 (en) Method and terminal for receiving rights object for content on behalf of memory card
CN101741561B (en) Method and system for authenticating two-way hardware
CN116134825A (en) Content transmission protection method and related equipment thereof
CN111131211A (en) Anti-tampering method for sharing washing machine safety
CN102882882B (en) A kind of user resources authorization method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant