Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for implementing broadcasting network condition receiving

A conditional access, broadcast network technology, applied in the field of broadcast network, to achieve the effect of not easy to track and crack

Active Publication Date: 2010-02-03
北京邦天信息技术有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

And this misappropriation can be spread by copying the spread of smart cards

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for implementing broadcasting network condition receiving
  • Method and system for implementing broadcasting network condition receiving
  • Method and system for implementing broadcasting network condition receiving

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] The present invention will be described in more detail below in conjunction with the accompanying drawings and specific embodiments.

[0047] A method for realizing broadcast network conditional access, such as figure 2 shown, including the following steps:

[0048] a. The data of each service is sent to the network after being scrambled with the same or different control word CW;

[0049] b. Generate and send into the network two programs that can run in the receiver: called module 1 and module 2; the key used to decrypt the control information is re-encrypted and stored in module 2, wherein the key is distributed in In the program of module 2, or hidden in module 2. Each key has a corresponding module 2.

[0050] The above steps are not limited by order, and the following steps are performed in order:

[0051]c. Encrypt the control word CW corresponding to each service with the same or different keys to form control information, and send it to the network togethe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a system of realizing conditional reception of broadcasting network, wherein the system comprises a server 1, a server 2, a server3, a multiplexer, a scrambler, anetwork and a receiver. The method comprises the following steps: scrambling service data and encrypting control words; producing a module 1 and a module 2; using the receiver to download the module 1; the module 1 operates on the receiver and checks the legitimacy of the receiver, and then downloads corresponding module 2 to the legal receiver; the module 2 deciphers the control words; the control words are used to descramble corresponding service data after the receiver receives the service data. After adopting the technical proposal of the invention, the authorization situation of users canbe validated to realize conditional reception without using additional hardware safety media to preserve private keys of users, and the transmission of keys in the network is not easily tracked and decoded.

Description

technical field [0001] The invention relates to a broadcast network, in particular to a method and system for realizing conditional reception of a broadcast network. Background technique [0002] The digitization of television broadcasting provides conditions for the management of each user. In terms of access control to user services, the method usually adopted in the world is to use the conditional access system to manage. [0003] Conditional access systems are usually implemented by a three-level key system, such as figure 1 shown. The data flow of the service is scrambled by the control word CW (control word) in a common encryption method. In order to improve the security of the system, the control word can be replaced online, and the new control word is encrypted by a symmetric key to form ECM (EntitleControl Message authorization control information), which is sent to the receiver along with the service data in the code stream. The key used to encrypt the control ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04N7/16H04L9/30H04L9/08
Inventor 杜聚龙范波鲍海兵
Owner 北京邦天信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products