Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Method of protecting encrypted control word, hardware security module, main chip and terminal

A technology of hardware security modules and control words, which is applied in the directions of secure communication devices, program/content distribution protection, internal/peripheral computer component protection, etc., can solve problems such as restricting development, and achieve the effect of enhancing security

Active Publication Date: 2017-06-06
ACADEMY OF BROADCASTING SCI STATE ADMINISTATION OF PRESS PUBLICATION RADIO FILM & TELEVISION +3
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Based on the conditional access system, CAS is bound to the set-top box, which restricts the development of the industry

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method of protecting encrypted control word, hardware security module, main chip and terminal
  • Method of protecting encrypted control word, hardware security module, main chip and terminal
  • Method of protecting encrypted control word, hardware security module, main chip and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0038] figure 1 The flow chart of the method for protecting an encrypted control word provided by Embodiment 1 of the present invention, this embodiment can be applied to a downloadable conditional access system DCAS, wherein the DCAS includes a front end and a terminal, and the terminal includes a main chip and a hardware security module. The method May be performed by the hardware security module. The method of Embodiment 1 of the present invention specifically includes:

[0039] S101. Receive a hardware security module authorization management message and an encrypted control word sent by the main chip, wherein the hardware security module authorization management message includes a key for decrypting the encrypted control word.

[0040] Wherein, the control word is used for the front-end to scramble the audio and video content subscribed by the user, such as the content of digital TV. Knowing the control word can descramble the scrambled content, so as to watch the audio ...

Embodiment 2

[0054] figure 2 It is a flow chart of the method provided by Embodiment 2 of the present invention. Embodiment 2 further optimizes the terminal activation operation on the basis of Embodiment 1. Such as figure 2 As shown, the method of the second embodiment of the present invention specifically includes:

[0055] S201. Receive an activation message sent by the main chip, where the activation message includes at least a pairing key, the re-encryption key, and a hardware security module root key.

[0056] The activation described here is usually performed before the terminal is used, and it can be used normally after activation. Specifically, the main chip in the terminal sends an activation request message to the front end, and then the front end sends the activation message to the main chip, and then the main chip sends the activation request message to the hardware security module. The activation message includes at least a pairing key, a re-encryption key and a hardware...

Embodiment 3

[0067] image 3 It is a flow chart of the method for protecting an encrypted control word in Embodiment 3 of the present invention. This embodiment can be applied to a downloadable conditional access system DCAS, wherein the DCAS includes a front end and a terminal, and the terminal includes a main chip and a hardware security module. The method Can be executed by the main chip. The method of the third embodiment of the present invention specifically includes:

[0068] S301. Receive the encrypted control word, scrambled content, main chip authorization management message, and hardware security module authorization management message sent by the front end.

[0069] Among them, the control word is used by the front end to scramble the audio and video content to be played. After the control word is encrypted, the terminal is authorized and sent to the main chip in the form of the main chip authorization management message and the hardware security module authorization management...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a method of protecting encrypted control words, a hardware security module, a main chip and a terminal. The method is applied to a downloadable conditional access system including a front end and a terminal, and the terminal comprises the main chip and the hardware security module. The method includes the following steps: receiving a hardware security module authorization management message and an encrypted control word sent from the main chip, wherein the hardware security module authorization management message includes a secret key for decrypting encrypted the control word; decrypting the encrypted the control word and obtaining a control word on the basis of the hardware security module authorization management message and a hardware security module root key stored in the hardware security module; re-encrypting the control word on the basis of a re-encryption secret key stored in the hardware security module, and obtaining a re-encrypted control word; and sending the re-encrypted control word to the main chip so that the main chip decrypts the re-encrypted control word according to a main chip authorization management message sent from the front end, and obtaining a control word. According to the embodiment of the invention, the security of the DCAS is improved by means of the hardware security module.

Description

technical field [0001] The embodiment of the present invention relates to message security technology, in particular to a method for protecting an encrypted control word, a hardware security module, a main chip and a terminal. Background technique [0002] Conditional Access System (CAS, Conditional Access System) is the core technical guarantee of digital TV encryption control, providing necessary technical means for the operation of digital TV, so that authorized users can legally use a certain service, while unauthorized Users cannot use this service. Based on the conditional access system, CAS is bound to the set-top box, restricting the development of the industry. To solve this problem, a downloadable conditional access system (DCAS, Downloadable Conditional Access System) based on the separation of software and hardware came into being. [0003] DCAS is a complete end-to-end business protection system, which consists of front-end, terminal and security data manageme...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04N21/418H04N21/426H04N21/4623H04N21/266
CPCH04N21/26606H04N21/26613H04N21/4182H04N21/42623H04N21/4623H04L9/0891H04L9/0897H04L9/3234G06F21/10G06F21/72
Inventor 盛志凡解伟张晶田雪冰熊彬郑力铮严海峰方中华王强杨勍陈鹏靳龙辉刘晶磊
Owner ACADEMY OF BROADCASTING SCI STATE ADMINISTATION OF PRESS PUBLICATION RADIO FILM & TELEVISION
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products