CN1917563A - Method of controlling security of terminal set top box applied under environment of living broadcast and broadcast on demand - Google Patents

Method of controlling security of terminal set top box applied under environment of living broadcast and broadcast on demand Download PDF

Info

Publication number
CN1917563A
CN1917563A CNA2006100304197A CN200610030419A CN1917563A CN 1917563 A CN1917563 A CN 1917563A CN A2006100304197 A CNA2006100304197 A CN A2006100304197A CN 200610030419 A CN200610030419 A CN 200610030419A CN 1917563 A CN1917563 A CN 1917563A
Authority
CN
China
Prior art keywords
top box
set top
terminal set
carried out
program
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA2006100304197A
Other languages
Chinese (zh)
Other versions
CN100531299C (en
Inventor
卢宝丰
陈卫
吴南山
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
WENGUANG INTERDYANMIC TV CO Ltd SHANGHAI
Original Assignee
WENGUANG INTERDYANMIC TV CO Ltd SHANGHAI
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by WENGUANG INTERDYANMIC TV CO Ltd SHANGHAI filed Critical WENGUANG INTERDYANMIC TV CO Ltd SHANGHAI
Priority to CNB2006100304197A priority Critical patent/CN100531299C/en
Publication of CN1917563A publication Critical patent/CN1917563A/en
Application granted granted Critical
Publication of CN100531299C publication Critical patent/CN100531299C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Stored Programmes (AREA)

Abstract

The method comprises: embedding a dependable computing chip into a digital set-top box; the right object of digital media content, decrypt key and decrypt program are packaged into the dependable computing chip; with digital right management technology, each operation in the dependable computing chip can be effectively supervised and controlled to ensure that the digital media content can not be illegally used. In addition, the frequent renew of decrypt key can be avoided, and the renew operation time period can be reduced to 3-6 months.

Description

A kind of method of controlling security of terminal set top box that is applied under live and the program request environment
Technical field
The present invention relates to a kind of method of controlling security of terminal set top box that is applied under live and the program request environment, the technical field that genus information is propagated.
Background technology
Digital TV receiving system of today mainly is a digital television conditional access system.Because the used store decrypted key of this type systematic adopts the low-intensity cryptographic algorithm, causes short realistic problem of decruption key decoding cycle.In the practical application decruption key replacement cycle also at 5-15 between second, very frequent.In addition, communication port dangerous between the IC-card of terminal set top box and store decrypted key and authorization message in this type systematic directly cause digital media content dangerous after decruption key and the deciphering, and authorization message can not be carried out effectively.In view of above problem, existing systems can not adapt with the Digital Television of extensive development at present, can not adapt to the application of the live and program request of popularizing day by day especially.The Security Control Problem of this type systematic needs to be resolved hurrily.
Summary of the invention
The objective of the invention is to propose a kind of method of controlling security of terminal set top box that is applied under live and the program request environment, definitely say, is to propose a kind of top box of digital machine method of controlling security that is applied to the user terminal under live and the program request environment.
For achieving the above object, the present invention adopts following technical scheme.Implement in the terminal set top box of described method under being applied to live and program request environment, in the Single Chip Microcomputer (SCM) system of this set-top box, embed hermetic, can independently finish the reception of digital media content, the credible computing chip of deciphering and play operation, manage and control the various operations of credible computing chip by described Single Chip Microcomputer (SCM) system, stop that digital media content is illegally used or use without permission, guarantee the execution of the safety and the authorization control of digital media content decruption key, with the update cycle that prolongs decruption key, generally can reach 3~6 months, the Digital Television that just in time can satisfy extensive development at present is to decruption key institute requirement.
Now describe technical scheme of the present invention in detail.
A kind of method of controlling security of terminal set top box that is applied under live and the program request environment, implement in the Internet system by described terminal set top box, described terminal set top box is online by Internet and supplier's server, described terminal set top box is online by cable and television set, first Single Chip Microcomputer (SCM) system of described terminal set top box contains a ROM, the one CPU and a Flash, the program that stores control among the described ROM and command a described CPU to work, store the program that contains play control among the described Flash, in a described ROM and a described Flash control of program stored and commander under, a described CPU carries out the operation that the work to the 2nd following CPU manages and controls, it is characterized in that, also be embedded with credible computing chip in described first Single Chip Microcomputer (SCM) system, described credible computing chip seals, contain the 2nd ROM, the second singlechip system of the 2nd CPU and the 2nd Flash, described the 2nd ROM stores control and commands the program of described the 2nd CPU work, described the 2nd Flash stores right object, decruption key and decrypted program, in described the 2nd ROM and described the 2nd Flash the control of program stored and commander under, described the 2nd CPU carries out following operation: receive digital media content, judge whether the user has the right of deciphering described digital media content, decipher described digital media content and with the audio and video program that deciphering obtains be transmitted to play control in the terminal set top box (1) partly or entirely, a described CPU, described the 2nd CPU, described server and described television set be collaborative finish from described terminal set top box start shooting shutdown during the included whole operating procedures of described method of controlling security of terminal set top box:
First step user opens the power supply of described terminal set top box, after described terminal set top box is finished self-starting, sends logging request to described server, and described logging request contains customer identification number and device id;
Second step, described server judged whether described customer identification number or described device id are revoked or piped off, if carried out for the 3rd step, otherwise carried out for the 4th to 26 step;
The 3rd step, described server was refused the logging request of described terminal set top box, carried out for the 26 step;
The 4th step, described server carried out integrity verification to described terminal set top box, and described integrity verification contains the checking to the numbering and the condition code of hardware and software all in the described terminal set top box;
Described server of the 5th step is judged according to the integrity verification result whether in the hardware and software all in the described terminal set top box any one has illegally been distorted or is substituted, if carried out for the 6th step, otherwise carried out for the 7th to 26 step;
Described server of the 6th step is revoked described customer identification number and described device end number, and blacklists it, and carries out for the 26 step;
Described server of the 7th step number carries out verification to the various version of described terminal set top box, checks whether it is up-to-date, and described version number contains software version number, right object version number;
Described server of the 8th step is according to the check results to described version number, and it is not up-to-date judging whether to exist a version number, if carried out for the 9th to 11 step, otherwise carried out for the 12 to 26 step;
Described server of the 9th step is not to described in the described terminal set top box being that up-to-date version number upgrades;
The tenth step judged described in the described terminal set top box not to be whether successfully up-to-date version number upgrades, if carried out for the 12 to 26 step, otherwise carried out for the 11 step;
The information of failure is upgraded in the prompting on described screen of TV set of the 11 step, carries out for the 26 step;
The 12 step, described terminal set top box was in holding state, waited for user instruction;
The 13 step was judged user's program of whether having selected programme televised live or program request, if then carried out for the 14 to 26 step, otherwise returned for the 12 step;
The 14 step judged whether the user has corresponding authority to the program of selecting, if then carried out for the 20 to 26 step, otherwise carried out for the 15 to 19 step;
The 15 step, whether the right object version number on the described terminal set top box of described server application verification was up-to-date, if then carried out for the 16 step, otherwise carried out for the 17 to 19 step;
The information that the 16 step, the prompting user had no right to receive on described screen of TV set returned for the 12 step;
The 17 step, described server upgraded the right object of described terminal set top box;
The 18 step judged whether the right object of described terminal set top box upgrades successful, if returned for the 14 step, otherwise carried out for the 19 step;
The information of failure is upgraded in the prompting on described screen of TV set of the 19 step, carries out for the 26 step;
The 20 step started the play control in the described terminal set top box, and received described digital media content, more received described digital media content was transmitted to described credible computing chip;
The 21 step, described credible computing chip received described digital media content, and with the decruption key in the described credible computing chip it was decrypted;
The 22 step judged whether deciphering is successful, if carried out for the 24 to 25 step, otherwise carried out for the 23 step;
The information of the 23 step prompting decoding failure on described screen of TV set carried out for the 26 step;
Described digital media content after described credible computing chip will be deciphered in the 24 step, be that audio and video program is transmitted to the described play control in the described terminal set top box, the described audio and video program that described play control will be received is for described television for play, makes the user can enjoy him and wants the program appreciated;
The 25 step judged whether to finish, if returned for the 12 step, otherwise returned for the 21 step;
The 26 step end of run, described terminal set top box is cut off the electricity supply automatically;
The 27 step carried out in the process in first to 25 step, if work at present is directly interrupted in user's shutdown, carried out for the 26 step.
Technical scheme of the present invention is further characterized in that, the term of the information in the 11 step, the 16 step, the 19 step and the 23 step is respectively " upgrading failure; please get in touch with supplier ", " user haves no right to receive this program; please buy the power of reception to supplier ", " upgrading failure; please get in touch with supplier " and " the decoding failure is please got in touch with supplier ".
Characteristics of the present invention and technique effect:
The method of controlling security of terminal set top box that the present invention proposes be applied to live and the program request environment under, by in the user terminal set-top box, embedding credible computing chip, right object, decruption key and the decrypted program of digital media content are encapsulated in the credible computing chip fully, in conjunction with digital rights management technology, various operations in credible computing chip are effectively managed and controlled, except that guaranteeing that digital media content not by the illegal and unwarranted use, has also ensured effective execution of the safety and the authorization control of digital media content decruption key.In addition, the frequent updating of decruption key has also been avoided in this effective security control, and the update cycle can reduce to 3~6 months in practical operation, is fit to very much the needs of the extensive development of present Digital Television.
Description of drawings
Fig. 1 is the schematic diagram that method of the present invention is implemented in the Internet system, and wherein 1 is terminal set top box, and 2 is first Single Chip Microcomputer (SCM) system, 21 is CPU, and 22 is ROM, and 23 is Flash, the 3rd, credible computing chip, be the second singlechip system, 31 is the 2nd CPU, and 32 is the 2nd ROM, 33 is the 2nd Flash, the 4th, television set, the 5th, server, the 6th, the Internet and 7 is cables.
Fig. 2 is the operational flowchart of method of the present invention.
Embodiment
Now describe technical scheme of the present invention and operation principle thereof in detail by embodiment and accompanying drawing.
Embodiment 1
A kind of method of controlling security of terminal set top box that is applied under live and the program request environment, implement in the Internet system by terminal set top box 1, terminal set top box 1 is online with supplier's server 5 by Internet 6, terminal set top box 1 is online by cable 7 and television set 4, first Single Chip Microcomputer (SCM) system 2 of terminal set top box 1 contains a ROM22, the one CPU21 and a Flash23, the program that stores control among the one ROM22 and command a CPU21 to work, store the program that contains play control among the one Flash23, in a ROM22 and a Flash23 control of program stored and commander under, the one CPU21 carries out the operation that the work to following CPU31 manages and controls, it is characterized in that, also be embedded with credible computing chip 3 in first Single Chip Microcomputer (SCM) system 2, credible computing chip 3 seals, contain the 2nd ROM32, the second singlechip system of the 2nd CPU31 and the 2nd Flash33, the 2nd ROM32 stores control and commands the program of the 2nd CPU31 work, the 2nd Flash33 stores right object, decruption key and decrypted program, in the 2nd ROM32 and the 2nd Flash33 the control of program stored and commander under, the 2nd CPU31 carries out following operation: receive digital media content, judge whether the user has the right of deciphering described digital media content, decipher described digital media content and with the audio and video program that deciphering obtains be transmitted to play control in the terminal set top box 1 partly or entirely, a CPU21, the 2nd CPU31, server 5 and television set 4 be collaborative finish from terminal set top box 1 start shooting shutdown during the included whole operating procedures of described method of controlling security of terminal set top box:
First step user opens the power supply of terminal set top box 1, after terminal set top box 1 is finished self-starting, sends logging request to server 5, and described logging request contains customer identification number and device id;
The second step server 5 judges whether described customer identification number or described device id are revoked or piped off, if carried out for the 3rd step, otherwise carried out for the 4th to 26 step;
The logging request of the 3rd step server 5 refusal terminal set top boxes 1 carried out for the 26 step;
5 pairs of terminal set top boxes of the 4th step server 1 carry out integrity verification, and described integrity verification contains the checking to the numbering and the condition code of hardware and software all in the terminal set top box 1;
The 5th step server 5 is judged according to the integrity verification result whether in the hardware and software all in the terminal set top box 1 any one has illegally been distorted or is substituted, if carried out for the 6th step, otherwise carried out for the 7th to 26 step;
The 6th step server 5 is revoked described customer identification number and described device end number, and blacklists it, and carries out for the 26 step;
The various version of the 7th step server 5 pairs of terminal set top boxes No. 1 is carried out verification, checks whether it is up-to-date, and described version number contains software version number, right object version number;
The 8th step server 5 is according to the check results to described version number, and it is not up-to-date judging whether to exist a version number, if carried out for the 9th to 11 step, otherwise carried out for the 12 to 26 step;
Described in 5 pairs of terminal set top boxes 1 of the 9th step server is not that up-to-date version number upgrades;
The tenth step judged described in the terminal set top box 1 not to be whether successfully up-to-date version number upgrades, if carried out for the 12 to 26 step, otherwise carried out for the 11 step;
The information of failure is upgraded in the prompting on the screen of television set 4 of the 11 step, carries out for the 26 step;
The 12 step terminal set top box 1 is in holding state, waits for user instruction;
The 13 step was judged user's program of whether having selected programme televised live or program request, if then carried out for the 14 to 26 step, otherwise returned for the 12 step;
The 14 step judged whether the user has corresponding authority to the program of selecting, if then carried out for the 20 to 26 step, otherwise carried out for the 15 to 19 step;
The 15 step, whether the right object version number on server 5 application verification terminal set top boxes 1 was up-to-date, if then carried out for the 16 step, otherwise carried out for the 17 to 19 step;
The information that the 16 step, the prompting user had no right to receive on the screen of television set 4 returned for the 12 step;
The right object of 5 pairs of terminal set top boxes 1 of the 17 step server upgrades;
The 18 step judged whether the right object of terminal set top box 1 upgrades successful, if returned for the 14 step, otherwise carried out for the 19 step;
The information of failure is upgraded in the prompting on the screen of television set 4 of the 19 step, carries out for the 26 step;
The 20 step started the play control in the terminal set top box 1, and received described digital media content, more received described digital media content was transmitted to credible computing chip 3;
The 21 step, credible computing chip 3 received described digital media content, and with the decruption key in the credible computing chip 3 it was decrypted;
The 22 step judged whether deciphering is successful, if carried out for the 24 to 25 step, otherwise carried out for the 23 step;
The information of the 23 step prompting decoding failure on the screen of television set 4 carried out for the 26 step;
Described digital media content after credible computing chip 3 will be deciphered in the 24 step, be that audio and video program is transmitted to the described play control in the terminal set top box 1, the described audio and video program that described play control will be received is play for television set 4, makes the user can enjoy him and wants the program appreciated;
The 25 step judged whether to finish, if returned for the 12 step, otherwise returned for the 21 step;
The 26 step end of run, terminal set top box 1 is cut off the electricity supply automatically;
The 27 step carried out in the process in first to 25 step, if work at present is directly interrupted in user's shutdown, carried out for the 26 step.
Embodiment 2
The term that removes the information in the 11 step, the 16 step, the 19 step and the 23 step is respectively that remainder is identical with embodiment's 1 outside " upgrading failure; please get in touch with supplier ", " user haves no right to receive this program; please buy the power of reception to supplier ", " upgrading failure; please get in touch with supplier " and " decoding failure; please get in touch with supplier ".
The situation that above embodiment implements in the Internet system is seen Fig. 1.The operating process of above embodiment is seen Fig. 2.
Operation principle.Credible computing chip 3 obtains digital media content from described play control, in the scope of permitting by the right object in it, decrypted program is decrypted described digital media content according to the decruption key in it, then with the digital media content of deciphering, be that audio and video program is forwarded to described play control, the described audio and video program that described play control will be received is play for television set 4, makes the user can enjoy him and wants the program appreciated.For terminal set top box 1, credible computing chip 3 is one " black boxes ", the described digital media content that the one CPU21 only is responsible for receiving sends the credible chip 3 of calculating to, if in the scope that the right object of user's service request in credible computing chip 3 permitted, a CPU21 can obtain the digital media content of deciphering from credible computing chip 3 so.Credible computing chip 3 is totally enclosed chips of a safety, and remarkable anti-imitation, anti-tamper and attack protection performance are arranged.

Claims (2)

1, a kind of method of controlling security of terminal set top box that is applied under live and the program request environment, implement in the Internet system by terminal set top box (1), terminal set top box (1) is online with supplier's server (5) by Internet (6), terminal set top box (1) is online by cable (7) and television set (4), first Single Chip Microcomputer (SCM) system (2) of terminal set top box (1) contains a ROM (22), the one CPU (21) and a Flash (23), the program that stores control among the one ROM (22) and command a CPU (21) to work, the one Flash stores the program that contains play control in (23), in a ROM (22) and a Flash (23) control of program stored and commander under, the one CPU (21) carries out the operation that the work to following CPU (31) manages and controls, it is characterized in that, also be embedded with credible computing chip (3) in first Single Chip Microcomputer (SCM) system (2), credible computing chip (3) seals, contain the 2nd ROM (32), the second singlechip system of CPU (31) and the 2nd Flash (33), the 2nd ROM (32) stores control and commands the program of the 2nd CPU (31) work, the 2nd Flash (33) stores right object, decruption key and decrypted program, in the 2nd ROM (32) and the 2nd Flash (33) control of program stored and commander under, the 2nd CPU (31) carries out following operation: receive digital media content, judge whether the user has the right of deciphering described digital media content, decipher described digital media content and with the audio and video program that deciphering obtains be transmitted to play control in the terminal set top box (1) partly or entirely, a CPU (21), CPU (31), server (5) and television set (4) be collaborative finish from terminal set top box (1) start shooting shutdown during the included whole operating procedures of described method of controlling security of terminal set top box:
First step user opens the power supply of terminal set top box (1), after terminal set top box (1) is finished self-starting, sends logging request to server (5), and described logging request contains customer identification number and device id;
The second step server (5) judges whether described customer identification number or described device id are revoked or piped off, if carried out for the 3rd step, otherwise carried out for the 4th to 26 step;
The logging request of the 3rd step server (5) refusal terminal set top box (1) carried out for the 26 step;
The 4th step server (5) carries out integrity verification to terminal set top box (1), and described integrity verification contains the numbering of hardware and software all in the terminal set top box (1) and the checking of condition code;
The 5th step server (5) is judged according to the integrity verification result whether in the hardware and software all in the terminal set top box (1) any one has illegally been distorted or is substituted, if carried out for the 6th step, otherwise carried out for the 7th to 26 step;
The 6th step server (5) is revoked described customer identification number and described device end number, and blacklists it, and carries out for the 26 step;
The 7th step server (5) number carries out verification to the various version of terminal set top box (1), checks whether it is up-to-date, and described version number contains software version number, right object version number;
The 8th step server (5) is according to the check results to described version number, and it is not up-to-date judging whether to exist a version number, if carried out for the 9th to 11 step, otherwise carried out for the 12 to 26 step;
The 9th step server (5) is not to described in the terminal set top box (1) being that up-to-date version number upgrades;
The tenth step judged described in the terminal set top box (1) not to be whether successfully up-to-date version number upgrades, if carried out for the 12 to 26 step, otherwise carried out for the 11 step;
The information of failure is upgraded in the prompting on the screen of television set (4) of the 11 step, carries out for the 26 step;
The 12 step terminal set top box (1) is in holding state, waits for user instruction;
The 13 step was judged user's program of whether having selected programme televised live or program request, if then carried out for the 14 to 26 step, otherwise returned for the 12 step;
The 14 step judged whether the user has corresponding authority to the program of selecting, if then carried out for the 20 to 26 step, otherwise carried out for the 15 to 19 step;
The 15 step, whether the right object version number on server (5) application verification terminal set top box (1) was up-to-date, if then carried out for the 16 step, otherwise carried out for the 17 to 19 step;
The information that the 16 step, the prompting user had no right to receive on the screen of television set (4) returned for the 12 step;
The 17 step server (5) upgrades the right object of terminal set top box (1);
The 18 step judged whether the right object of terminal set top box (1) upgrades successful, if returned for the 14 step, otherwise carried out for the 19 step;
The information of failure is upgraded in the prompting on the screen of television set (4) of the 19 step, carries out for the 26 step;
The 20 step started the play control in the terminal set top box (1), and received described digital media content, more received described digital media content was transmitted to credible computing chip (3);
The 21 credible computing chip of step (3) receives described digital media content, and with the decruption key in the credible computing chip (3) it is decrypted;
The 22 step judged whether deciphering is successful, if carried out for the 24 to 25 step, otherwise carried out for the 23 step;
The information of the 23 step prompting decoding failure on the screen of television set (4) carried out for the 26 step;
Described digital media content after the 24 credible computing chip of step (3) will be deciphered, be that audio and video program is transmitted to the described play control in the terminal set top box (1), the described audio and video program that described play control will be received is play for television set (4), makes the user can enjoy him and wants the program appreciated;
The 25 step judged whether to finish, if returned for the 12 step, otherwise returned for the 21 step;
The 26 step end of run, terminal set top box (1) is cut off the electricity supply automatically;
The 27 step carried out in the process in first to 25 step, if work at present is directly interrupted in user's shutdown, carried out for the 26 step.
2, the method for controlling security of terminal set top box that is applied under live and the program request environment according to claim 1, it is characterized in that, the term of the information in the 11 step, the 16 step, the 19 step and the 23 step is respectively " upgrading failure; please get in touch with supplier ", " user haves no right to receive this program; please buy the power of reception to supplier ", " upgrading failure; please get in touch with supplier " and " the decoding failure is please got in touch with supplier ".
CNB2006100304197A 2006-08-25 2006-08-25 Method of controlling security of terminal set top box applied under environment of living broadcast and broadcast on demand Expired - Fee Related CN100531299C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2006100304197A CN100531299C (en) 2006-08-25 2006-08-25 Method of controlling security of terminal set top box applied under environment of living broadcast and broadcast on demand

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2006100304197A CN100531299C (en) 2006-08-25 2006-08-25 Method of controlling security of terminal set top box applied under environment of living broadcast and broadcast on demand

Publications (2)

Publication Number Publication Date
CN1917563A true CN1917563A (en) 2007-02-21
CN100531299C CN100531299C (en) 2009-08-19

Family

ID=37738448

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2006100304197A Expired - Fee Related CN100531299C (en) 2006-08-25 2006-08-25 Method of controlling security of terminal set top box applied under environment of living broadcast and broadcast on demand

Country Status (1)

Country Link
CN (1) CN100531299C (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102523503A (en) * 2011-12-19 2012-06-27 华为技术有限公司 Video-on-demand control method and relative device and system
CN102945174A (en) * 2012-11-08 2013-02-27 大连捷成实业发展有限公司 Method for upgrading singlechip program by means of connected off-chip Flash
CN104469422A (en) * 2014-12-31 2015-03-25 四川金网通电子科技有限公司 Set top box advertising system with security mechanism and obtaining method thereof
CN105184179A (en) * 2015-11-05 2015-12-23 深圳市凯祥源科技有限公司 Embedded encrypted mobile storage device and operation method thereof
CN109981733A (en) * 2019-02-19 2019-07-05 广州勒夫蔓德电器有限公司 Control method, server and the computer readable storage medium of intelligent terminal
CN111414066A (en) * 2020-02-29 2020-07-14 苏州浪潮智能科技有限公司 Server expansion system and power supply control method thereof

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102523503A (en) * 2011-12-19 2012-06-27 华为技术有限公司 Video-on-demand control method and relative device and system
CN102945174A (en) * 2012-11-08 2013-02-27 大连捷成实业发展有限公司 Method for upgrading singlechip program by means of connected off-chip Flash
CN104469422A (en) * 2014-12-31 2015-03-25 四川金网通电子科技有限公司 Set top box advertising system with security mechanism and obtaining method thereof
CN104469422B (en) * 2014-12-31 2018-02-13 四川金网通电子科技有限公司 Set top box ad system and its implementation with security mechanism
CN105184179A (en) * 2015-11-05 2015-12-23 深圳市凯祥源科技有限公司 Embedded encrypted mobile storage device and operation method thereof
CN109981733A (en) * 2019-02-19 2019-07-05 广州勒夫蔓德电器有限公司 Control method, server and the computer readable storage medium of intelligent terminal
CN111414066A (en) * 2020-02-29 2020-07-14 苏州浪潮智能科技有限公司 Server expansion system and power supply control method thereof

Also Published As

Publication number Publication date
CN100531299C (en) 2009-08-19

Similar Documents

Publication Publication Date Title
CN1150468C (en) Computer system and method of protecting contents
CN1780361A (en) Digital audio/video data processing unit and method for controlling access to said data
CN1228978C (en) Video request system and method for requesting vedio program by request short message
CN1917563A (en) Method of controlling security of terminal set top box applied under environment of living broadcast and broadcast on demand
CN1113284C (en) Electronic data processing device and system
CN1582422A (en) Method to protect software against unauthorized use
CN1700765A (en) A private key acquiring method for use in set-top box
US8392722B2 (en) Digital cable system and method for protection of secure micro program
RU2477923C2 (en) Conventional access system for digital television and method for its use
CN1486569A (en) Conditional access for functional units
CA2566801A1 (en) Method for authenticating and executing an application program
CN1866870A (en) Software validity checking system and method based on device management protocol
KR20020075439A (en) Method and apparatus for providing secure control of software or firmware code downloading and secure operation of a computing device receiving downloaded code
CN1553349A (en) Safety chip and information safety processor and processing method
CN1885836A (en) Information filtering and secret-keeping method and apparatus in instantaneous communication
CN1960363A (en) Method and equipment for implementing remote updating information security devices through network
CN1812416A (en) Method for managing consumption of digital contents within a client domain and devices implementing this method
CN1863038A (en) Method of implementing control and management of applied program in terminal apparatus
CN1851604A (en) Digital copyright protection system and method
CN1852432A (en) Method for enciphering and deciphering living-broadcasting flow-medium data
CN1863041A (en) Method for implementing network television programme preview
CN1413416A (en) Interface module and decoder for host
CN105812877A (en) Set-top box starting method and system based on Chip ID
CN1877595A (en) Software copyright protection method
CN1675928A (en) Method for verifying validity of domestic digital network key

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20090819

Termination date: 20100825