Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for realizing secure communication between set-top box and intelligent card

A secure communication and smart card technology, which is applied in the field of secure communication and key exchange between set-top boxes and smart cards, can solve problems such as the lack of mutual authentication mechanism, and achieve the effect of simple implementation and guaranteed security

Inactive Publication Date: 2012-12-12
中山爱科数字家庭产业孵化基地有限公司
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Two: Lack of mutual authentication mechanism

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing secure communication between set-top box and intelligent card
  • Method for realizing secure communication between set-top box and intelligent card
  • Method for realizing secure communication between set-top box and intelligent card

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] Specific embodiments and accompanying drawings of the present invention will be given below in order to further illustrate the present invention.

[0040] This embodiment adopts the ELGamal algorithm encryption system. The ELGamal algorithm is based on the difficulty of solving the discrete logarithm problem to ensure security. It is generally believed that it has reliable security, and the ELGamal algorithm is widely used.

[0041] This embodiment is realized through the following technical solutions:

[0042] First, the STB distributes a pair of asymmetric keys during manufacturing, including the public key Y A , g A ,p A and private key X A , the public key of the asymmetric encryption is disclosed to the public, and the private key is kept secret.

[0043] Keys are generated as follows:

[0044] First select a large enough prime number p A and GF(p A ) on the primitive element g A , and then select a random number as the private key X A ,

[0045] calculate:...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for realizing secure communication between a set-top box and an intelligent card. The method comprises the following steps that: both the set-top box and the intelligent card have a pair of asymmetric keys; and the set-top box and the intelligent card are matched with each other in pair. The set-top box and the intelligent card are mutually authenticated before exchanging a control word; after the authentication, the exchanged information is encrypted by using the public keys of the opposite parties and then transmitted; and the receiving parties can decipher the information by using the own private keys. Through the mutual authentication mechanism between the set-top box and the intelligent card, the communication between an illegal set-top box (or an illegal intelligent card) and a legal intelligent card (or a legal set-top box) can be prevented so as not to exchange the keys. By encrypting the information exchanged through the communication between the set-top box and the intelligent card, the connection between the set-top box and the intelligent card can be effectively prevented from being attacked, so that the security of the exchange processis guaranteed.

Description

technical field [0001] The invention relates to digital family communication technology, in particular to the field of secure communication and key exchange between a set-top box and a smart card. Background technique [0002] Digital TV conditional access (CA) system refers to a system used to control users to receive digital TV services, that is, users can only watch authorized digital TV programs. Its basic purpose is to enable operators to authorize and manage users in the TV system, so as to realize paid services for digital TV. [0003] The current digital TV conditional access system is mainly based on the European DVB standard. The main principle is: there is a pair of periodically changing keys in the front-end encrypted digital TV signal, called the control word (CW). The conditional access system is responsible for encrypting the CW and securely transmitting it to the decryptor at the digital TV receiving end, and at the same time granting the decryption authorit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04N21/41H04N21/418H04L9/32H04L9/30
Inventor 叶灿才卢林发
Owner 中山爱科数字家庭产业孵化基地有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products