CN105657454A - Audio and video terminal network EPG receiving method and system - Google Patents
Audio and video terminal network EPG receiving method and system Download PDFInfo
- Publication number
- CN105657454A CN105657454A CN201610114883.8A CN201610114883A CN105657454A CN 105657454 A CN105657454 A CN 105657454A CN 201610114883 A CN201610114883 A CN 201610114883A CN 105657454 A CN105657454 A CN 105657454A
- Authority
- CN
- China
- Prior art keywords
- epg
- configuration file
- cryptographic hash
- audio
- video terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 27
- 238000012795 verification Methods 0.000 claims description 75
- 230000005540 biological transmission Effects 0.000 abstract description 2
- 238000012163 sequencing technique Methods 0.000 description 3
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
- H04N21/234—Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
- H04N21/2347—Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving video stream encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
- H04N21/235—Processing of additional data, e.g. scrambling of additional data or processing content descriptors
- H04N21/2351—Processing of additional data, e.g. scrambling of additional data or processing content descriptors involving encryption of additional data
Landscapes
- Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
- Storage Device Security (AREA)
Abstract
The invention relates to an audio and video terminal network EPG receiving method and system. When an audio and video terminal requests and receives network EPG data from a server, all requests and data are encrypted in the process, transmission is performed in the mode of ciphertext, not only the EPG data is encrypted, and therefore it is effectively prevented that the data is broken through by other persons through a network EPG, potential safety hazards of the data are eliminated, safety of network data is greatly ensured, and the network safety problem is solved.
Description
Technical field
The present invention relates to digital TV field, relate in particular to a kind of audio-video terminal network EPG method of reseptance andSystem.
Background technology
Such as, along with the intelligent development of audio-video terminal (television set, Set Top Box etc.), network EPGThe application of (ElectronicProgramGuide, i.e. electronic program guides) is also more and more extensive.
Audio-video terminal (for example Set Top Box) is in the time obtaining network EPG, first to server end request EPGData, the legitimacy of server end checking request, is verified by the EPG configuration literary composition on current serverPart and version information are issued Set Top Box end. Audio-video terminal can be according to configuration file and the version information receivedGo for and ask EPG data. In whole process, except EPG data are encrypted, other variousPlease summed data be all to transmit in mode expressly, audio-video terminal be easy to be utilized network by other people like thisEPG breaks through, and brings very large hidden danger to data security, can not ensure the safety of network data, makesBecome great network security problem.
Summary of the invention
In view of this,, while being necessary to obtain network EPG for above-mentioned audio-video terminal, easily utilized by other peopleNetwork EPG breaks through, and brings very large hidden danger to data security, can not ensure the safety of network dataProblem, a kind of audio-video terminal network EPG method of reseptance is provided.
Meanwhile, also provide a kind of audio-video terminal network EPG receiving system.
A kind of audio-video terminal network EPG method of reseptance provided by the invention, comprises the steps:
S10: audio-video terminal to server send request, server authentication by time, calculate EPG versionThe cryptographic Hash of this configuration file URL, is all encrypted EPG edition configuration file URL and cryptographic Hash,After encryption, send to audio-video terminal;
S20: control audio-video terminal and receive EPG edition configuration file URL and the cryptographic Hash of encrypting and carry outDeciphering, is used the cryptographic Hash after deciphering to carry out verification to the EPG edition configuration file URL after deciphering, ifVerification is passed through, and this time EPG edition configuration file URL is effective, controls audio-video terminal according to EPG versionThis configuration file URL is to EPG edition configuration file corresponding to server request and perform step S30, ifVerification, not by invalid, controlled audio-video terminal and is again sent request to server;
S30: calculate the cryptographic Hash of EPG edition configuration file, to EPG edition configuration file cryptographic Hash andEPG edition configuration file is all encrypted, and sends to audio-video terminal after encryption;
S40: control audio-video terminal and receive EPG edition configuration file and the EPG edition configuration file encryptedCryptographic Hash is also decrypted, and the EPG edition configuration file cryptographic Hash after use deciphering is to the EPG after decipheringEdition configuration file carries out verification, if verification is by parsing EPG's according to EPG edition configuration fileURL, according to the URL of EPG to EPG data corresponding to server request and perform step S50, if schoolTest not by EPG edition configuration file is invalid;
S50: calculate the cryptographic Hash of corresponding EPG data, equal to the cryptographic Hash of EPG data and EPG dataBe encrypted, after encryption, send to audio-video terminal;
S60: control audio-video terminal and receive EPG data and the EPG data cryptographic Hash of encrypting and be decrypted,Use the EPG data cryptographic Hash after deciphering to carry out verification to the EPG data after deciphering, if verification is passed throughStorage EPG data, if verification is not by directly abandoning.
In an embodiment therein, described step S30 is specially:
Use SHA256 algorithm to calculate the cryptographic Hash of EPG edition configuration file, adopt the first cipher mode pairThe cryptographic Hash of EPG edition configuration file is encrypted, and adopts the second cipher mode to EPG edition configuration fileBe encrypted.
In an embodiment therein, described step S40 is specially:
First adopt the first cipher mode to be decrypted the cryptographic Hash of EPG edition configuration file; If be decrypted intoMerit adopts the second cipher mode to be decrypted EPG edition configuration file again, otherwise not to EPG versionConfiguration file is decrypted.
In an embodiment therein, described step S50 is specially:
Use SHA256 algorithm to calculate the cryptographic Hash of EPG data, adopt the first cipher mode to EPG numberAccording to cryptographic Hash be encrypted, adopt the second cipher mode EPG data are encrypted.
In an embodiment therein, described step S60 is specially:
First adopt the first cipher mode to be decrypted the cryptographic Hash of EPG data; If successful decryption is adopted againEPG data are decrypted with the second cipher mode, otherwise EPG data are not decrypted.
In an embodiment therein, described the first cipher mode is rsa encryption mode, described secondCipher mode is AES cipher mode.
A kind of audio-video terminal network EPG receiving system provided by the invention, comprising:
EPG edition configuration file URL encrypting module, sends request, takes to server at audio-video terminalWhen business device is verified, calculate the cryptographic Hash of EPG edition configuration file URL, to EPG version configuration literary compositionPart URL and cryptographic Hash are all encrypted, and send to audio-video terminal after encryption;
EPG edition configuration file URL correction verification module, controls audio-video terminal and receives the EPG version of encryptingConfiguration file URL and cryptographic Hash are also decrypted, and the cryptographic Hash after use deciphering is to the EPG version after decipheringThis configuration file URL carries out verification, if verification is passed through, this time EPG edition configuration file URL is effective,Controlling audio-video terminal joins to EPG version corresponding to server request according to EPG edition configuration file URLPut file and perform step S30, if verification, not by invalid, is controlled audio-video terminal again to serverSend request;
EPG edition configuration file encrypting module, the cryptographic Hash of calculating EPG edition configuration file, to EPGEdition configuration file cryptographic Hash and EPG edition configuration file are all encrypted, and send to audio frequency and video eventually after encryptionEnd;
EPG edition configuration file correction verification module, controls audio-video terminal and receives the EPG version configuration literary composition of encryptingPart and EPG edition configuration file cryptographic Hash are also decrypted, and use the EPG edition configuration file after decipheringCryptographic Hash is carried out verification to the EPG edition configuration file after deciphering, if verification is passed through according to EPG versionConfiguration file parses the URL of EPG, according to the URL of EPG to EPG number corresponding to server requestAccording to and perform step S50, if verification is by EPG edition configuration file is invalid;
EPG data encryption module, calculates the cryptographic Hash of corresponding EPG data, to EPG data and EPG numberAccording to cryptographic Hash be all encrypted, after encryption, send to audio-video terminal;
EPG data deciphering module, controls audio-video terminal and receives EPG data and the EPG data Kazakhstan of encryptingUncommon value is also decrypted, and uses the EPG data cryptographic Hash after deciphering to carry out school to the EPG data after decipheringTest, if verification is by storing EPG data, if verification is not by directly abandoning.
In an embodiment therein, described EPG edition configuration file encrypting module uses SHA256Algorithm calculates the cryptographic Hash of EPG edition configuration file, adopts the first cipher mode to EPG version configuration literary compositionThe cryptographic Hash of part is encrypted, and adopts the second cipher mode to be encrypted EPG edition configuration file;
Described EPG data encryption module is used SHA256 algorithm to calculate the cryptographic Hash of EPG data, adoptsThe first cipher mode is encrypted the cryptographic Hash of EPG data, adopts the second cipher mode to EPG dataBe encrypted.
In an embodiment therein, first described EPG edition configuration file correction verification module adopts firstCipher mode is decrypted the cryptographic Hash of EPG edition configuration file; If successful decryption adopts second to add againClose mode is decrypted EPG edition configuration file, otherwise EPG edition configuration file is not decrypted;
First described EPG data check module adopts the first cipher mode to carry out the cryptographic Hash of EPG dataDeciphering; If successful decryption adopts the second cipher mode to be decrypted EPG data again, otherwise not to EPGData are decrypted.
In an embodiment therein, described the first cipher mode is rsa encryption mode, described secondCipher mode is AES cipher mode.
Audio-video terminal network EPG method of reseptance of the present invention and system, at audio-video terminal to server requestAnd while receiving network EPG data, to all please summed data being all encrypted in process, adopt ciphertextMode is transmitted, but not just EPG data is encrypted, thereby effectively prevents from being utilized network by other peopleEPG breaks through, and eliminates data security hidden danger, has ensured greatly the safety of network data, has solvedNetwork security problem.
Brief description of the drawings
Fig. 1 is the flow chart of an audio-video terminal network EPG method of reseptance in embodiment;
Fig. 2 is the structure chart of an audio-video terminal network EPG receiving system in embodiment.
Detailed description of the invention
In order to make object of the present invention, technical scheme and advantage clearer, below in conjunction with accompanying drawing and realityExecute example, the present invention is further elaborated. Only should be appreciated that specific embodiment described hereinIn order to explain the present invention, be not intended to limit the present invention.
While obtaining network EPG for above-mentioned audio-video terminal, easily utilized network EPG to carry out by other peopleBreak through, bring very large hidden danger to data security, can not ensure the technical problem of the safety of network data, thisInventive method at audio-video terminal in the process of server request network EPG, to all please summed data equalBe encrypted, all with ciphertext transmission, to ensure security.
Concrete, as shown in Figure 1, this audio-video terminal network EPG method of reseptance comprises the steps:
S10: audio-video terminal to server send request, server authentication by time, calculate EPG versionThe cryptographic Hash of this configuration file URL (UniformResourceLocator, uniform resource locator) is rightEPG edition configuration file URL and cryptographic Hash are all encrypted, and send to audio-video terminal after encryption.
When audio-video terminal needs network EPG data, first to send request to server, treat server pairAfter requests verification is passed through, can first send EPG edition configuration file URL to audio-video terminal. This embodimentIn, for ensureing the internet security of request network EPG overall process, can calculate EPG edition configuration file URLCryptographic Hash, and EPG edition configuration file URL and cryptographic Hash are all encrypted, in the mode of encryptingEPG edition configuration file URL is sent to audio-video terminal, thereby ensure the security of data.
In further mode, this step is specially: use SHA256 algorithm to calculate the configuration of EPG versionThe cryptographic Hash of file URL, is used rsa encryption mode to EPG edition configuration file URL and cryptographic HashBe encrypted.
S20: control audio-video terminal and receive EPG edition configuration file URL and the cryptographic Hash of encrypting and carry outDeciphering, is used the cryptographic Hash after deciphering to carry out verification to the EPG edition configuration file URL after deciphering, ifVerification is passed through, and this time EPG edition configuration file URL is effective, controls audio-video terminal according to EPG versionThis configuration file URL is to EPG edition configuration file corresponding to server request and perform step S30, ifVerification, not by invalid, controlled audio-video terminal and is again sent request to server.
EPG edition configuration file URL and cryptographic Hash after encrypting are being sent to after audio-video terminal to controlAudio-video terminal processed receives. Because EPG edition configuration file URL and cryptographic Hash are all encrypted,Therefore need to first be decrypted. After deciphering, use the cryptographic Hash after deciphering civilian to the EPG version configuration after decipheringPart URL carries out verification, verification by according to EPG edition configuration file URL to server request correspondenceEPG edition configuration file.
In further mode, this step is specially: adopt rsa encryption mode respectively to cryptographic Hash andEPG edition configuration file is decrypted.
S30: calculate the cryptographic Hash of EPG edition configuration file, to EPG edition configuration file cryptographic Hash andEPG edition configuration file is all encrypted, and sends to audio-video terminal after encryption.
During to server request EPG edition configuration file, be to ensure the configuration of EPG version at audio-video terminalThe security of file, in this embodiment, calculates the cryptographic Hash of EPG edition configuration file, to EPG versionConfiguration file cryptographic Hash and EPG edition configuration file are all encrypted, to ensure security.
Further, this step is specially: use SHA256 algorithm to calculate the Kazakhstan of EPG edition configuration fileUncommon value, adopts the first cipher mode to be encrypted the cryptographic Hash of EPG edition configuration file, adopts second to addClose mode is encrypted EPG edition configuration file. Preferably, the first cipher mode is rsa encryption sideFormula, the second cipher mode is AES cipher mode.
S40: control audio-video terminal and receive EPG edition configuration file and the EPG edition configuration file encryptedCryptographic Hash is also decrypted, and the EPG edition configuration file cryptographic Hash after use deciphering is to the EPG after decipheringEdition configuration file carries out verification, if verification is by parsing EPG's according to EPG edition configuration fileURL, according to the URL of EPG to EPG data corresponding to server request and perform step S50, if schoolTest not by EPG edition configuration file is invalid.
EPG edition configuration file and cryptographic Hash after encrypting are being sent to after audio-video terminal, controlling sound and lookFrequency terminal receives and is decrypted, and the EPG edition configuration file cryptographic Hash after use deciphering is to after decipheringEPG edition configuration file carry out verification, obtain check results.
Further, this step is specially: first adopt the first cipher mode to EPG edition configuration fileCryptographic Hash is decrypted; If successful decryption adopts the second cipher mode to carry out EPG edition configuration file againDeciphering, otherwise EPG edition configuration file is not decrypted. The sequencing that passes through deciphering is like this with associatedRelation, further strengthens confidentiality and security.
S50: calculate the cryptographic Hash of corresponding EPG data, equal to the cryptographic Hash of EPG data and EPG dataBe encrypted, after encryption, send to audio-video terminal.
Verification by, parse the URL of EPG according to EPG edition configuration file, according to EPG'sURL is after EPG data corresponding to server request, for ensureing the security of EPG data, this embodimentIn, calculate the cryptographic Hash of corresponding EPG data, the cryptographic Hash of EPG data and EPG data is all addedClose, ensure the security of EPG data by encryption.
Further, this step is specially: use SHA256 algorithm to calculate the cryptographic Hash of EPG data, adoptThe cryptographic Hash of EPG data is encrypted with the first cipher mode, adopts the second cipher mode to EPG numberAccording to being encrypted. Preferably, the first cipher mode is rsa encryption mode, and the second cipher mode is AESCipher mode.
S60: control audio-video terminal and receive EPG data and the EPG data cryptographic Hash of encrypting and be decrypted,Use the EPG data cryptographic Hash after deciphering to carry out verification to the EPG data after deciphering, if verification is passed throughStorage EPG data, if verification is not by directly abandoning.
In the time that the cryptographic Hash of the EPG data of encryption and EPG data is sent to audio-video terminal, control byAudio-video terminal receives and is decrypted, and the EPG data cryptographic Hash after use deciphering is to the EPG after decipheringData are carried out verification, if verification is by storing EPG data, if verification is not by directly abandoning.
Further, first adopt the first cipher mode to be decrypted the cryptographic Hash of EPG data; If decipheringSuccessful adopt again the second cipher mode to be decrypted EPG data, otherwise EPG data are not separatedClose. By sequencing and the incidence relation of deciphering, further strengthen confidentiality and security like this.
This audio-video terminal network EPG method of reseptance, audio-video terminal to server request and receive networkWhen EPG data, to all please summed data being all encrypted in process, adopt the mode of ciphertext to passDefeated, but not just EPG data are encrypted, thereby effectively prevent from being utilized network EPG to enter by other peopleRow is broken through, and eliminates data security hidden danger, has ensured greatly the safety of network data, has solved network securityProblem.
Meanwhile, the present invention also provides a kind of audio-video terminal network EPG receiving system, as shown in Figure 2, and shouldSystem comprises:
EPG edition configuration file URL encrypting module 100, audio-video terminal to server send request,When server authentication is passed through, calculating EPG edition configuration file URL (UniformResourceLocator,Uniform resource locator) cryptographic Hash, EPG edition configuration file URL and cryptographic Hash are all encrypted,After encryption, send to audio-video terminal.
When audio-video terminal needs network EPG data, first to send request to server, treat server pairAfter requests verification is passed through, can first send EPG edition configuration file URL to audio-video terminal. This embodimentIn, for ensureing the internet security of request network EPG overall process, EPG edition configuration file URL encryptsModule 100 can be calculated the cryptographic Hash of EPG edition configuration file URL, and to EPG edition configuration fileURL and cryptographic Hash are all encrypted, and in the mode of encrypting, EPG edition configuration file URL are sent to soundVideo terminal, thereby the security of guarantee data.
In further mode, EPG edition configuration file URL encrypting module 100 uses SHA256Algorithm calculates the cryptographic Hash of EPG edition configuration file URL, uses rsa encryption mode to EPG versionConfiguration file URL and cryptographic Hash are encrypted.
EPG edition configuration file URL correction verification module 200, controls audio-video terminal and receives the EPG encryptingEdition configuration file URL and cryptographic Hash are also decrypted, and the cryptographic Hash after use deciphering is to the EPG after decipheringEdition configuration file URL carries out verification, if verification is passed through, this time EPG edition configuration file URL hasEffect, control audio-video terminal according to EPG edition configuration file URL to EPG version corresponding to server requestThis configuration file; If verification, not by invalid, controlled audio-video terminal and is again sent request to server.
EPG edition configuration file URL and cryptographic Hash after encrypting are being sent to after audio-video terminal to EPGEdition configuration file URL correction verification module 200 is controlled audio-video terminal and is received. Because EPG version is joinedPut file URL and cryptographic Hash and all encrypt, therefore EPG edition configuration file URL correction verification module 200Need to first be decrypted. After deciphering, EPG edition configuration file URL correction verification module 200 uses after decipheringThe EPG edition configuration file URL of cryptographic Hash after to deciphering carry out verification, verification is by according to EPGEdition configuration file URL is to EPG edition configuration file corresponding to server request.
In further mode, EPG edition configuration file URL correction verification module 200 adopts rsa encryptionMode is decrypted cryptographic Hash and EPG edition configuration file respectively.
EPG edition configuration file encrypting module 300, the cryptographic Hash of calculating EPG edition configuration file is rightEPG edition configuration file cryptographic Hash and EPG edition configuration file are all encrypted, and send to sound and look after encryptionFrequency terminal.
During to server request EPG edition configuration file, be to ensure the configuration of EPG version at audio-video terminalThe security of file, in this embodiment, EPG edition configuration file encrypting module 300 calculates EPG version and joinsPut the cryptographic Hash of file, EPG edition configuration file cryptographic Hash and EPG edition configuration file are all addedClose, to ensure security.
Further, EPG edition configuration file encrypting module 300 uses SHA256 algorithm to calculate EPG versionThe cryptographic Hash of this configuration file, adopts the first cipher mode to add the cryptographic Hash of EPG edition configuration fileClose, adopt the second cipher mode to be encrypted EPG edition configuration file. Preferably, the first cipher modeFor rsa encryption mode, the second cipher mode is AES cipher mode.
EPG edition configuration file correction verification module 400, controls the EPG version of audio-video terminal reception encryption and joinsPut file and EPG edition configuration file cryptographic Hash and be decrypted, using the EPG version configuration after decipheringFile cryptographic Hash is carried out verification to the EPG edition configuration file after deciphering, if verification is passed through according to EPGEdition configuration file parses the URL of EPG, according to the URL of EPG to EPG corresponding to server requestData, if verification is by EPG edition configuration file is invalid.
EPG edition configuration file and cryptographic Hash after encrypting are being sent to after audio-video terminal to EPG versionConfiguration file correction verification module 400 is controlled audio-video terminal and is received and be decrypted, and uses after decipheringEPG edition configuration file cryptographic Hash is carried out verification to the EPG edition configuration file after deciphering, and obtains verification knotReally.
Further, first EPG edition configuration file correction verification module 400 adopts the first cipher mode to EPGThe cryptographic Hash of edition configuration file is decrypted; If successful decryption adopts the second cipher mode to EPG version againThis configuration file is decrypted, otherwise EPG edition configuration file is not decrypted. Pass through like this to decipherSequencing and incidence relation, further strengthen confidentiality and security.
EPG data encryption module 500, calculates the cryptographic Hash of corresponding EPG data, to EPG data and EPGThe cryptographic Hash of data is all encrypted, and sends to audio-video terminal after encryption.
Verification by, parse the URL of EPG according to EPG edition configuration file, according to EPG'sURL is after EPG data corresponding to server request, for ensureing the security of EPG data, this embodimentIn, EPG data encryption module 500 is calculated the cryptographic Hash of corresponding EPG data, to EPG data and EPGThe cryptographic Hash of data is all encrypted, and ensures the security of EPG data by encryption.
Further, EPG data encryption module 500 is used SHA256 algorithm to calculate the Hash of EPG dataValue, adopts the first cipher mode to be encrypted the cryptographic Hash of EPG data, adopts the second cipher mode pairEPG data are encrypted. Preferably, the first cipher mode is rsa encryption mode, the second cipher modeFor AES cipher mode.
EPG data check module 600, controls audio-video terminal and receives EPG data and the EPG number encryptedAccording to cryptographic Hash and be decrypted, the EPG data after using EPG data cryptographic Hash after deciphering to deciphering are enteredRow verification, if verification is by storing EPG data, if verification is not by directly abandoning.
In the time that the cryptographic Hash of the EPG data of encryption and EPG data is sent to audio-video terminal, EPG numberControl by audio-video terminal and receive and be decrypted according to correction verification module 600, use the EPG data after deciphering to breathe outUncommon value is carried out verification to the EPG data after deciphering, if verification is by storing EPG data, if verification is notBy directly abandoning.
Further, first EPG data check module 600 adopts the Kazakhstan of the first cipher mode to EPG dataUncommon value is decrypted; If successful decryption adopts the second cipher mode to be decrypted EPG data again, otherwiseEPG data are not decrypted. By sequencing and the incidence relation of deciphering, further add like thisStrong confidentiality and security.
This audio-video terminal network EPG receiving system, audio-video terminal to server request and receive networkWhen EPG data, to all please summed data being all encrypted in process, adopt the mode of ciphertext to passDefeated, but not just EPG data are encrypted, thereby effectively prevent from being utilized network EPG to enter by other peopleRow is broken through, and eliminates data security hidden danger, has ensured greatly the safety of network data, has solved network securityProblem.
Audio-video terminal network EPG method of reseptance of the present invention and system, at audio-video terminal to server requestAnd while receiving network EPG data, to all please summed data being all encrypted in process, adopt ciphertextMode is transmitted, but not just EPG data is encrypted, thereby effectively prevents from being utilized network by other peopleEPG breaks through, and eliminates data security hidden danger, has ensured greatly the safety of network data, has solvedNetwork security problem.
These are only preferred embodiment of the present invention, not in order to limit the present invention, all of the present inventionAny amendment of doing within spirit and principle, be equal to replacement and improvement etc., all should be included in guarantor of the present inventionWithin protecting scope.
Claims (10)
1. an audio-video terminal network EPG method of reseptance, is characterized in that, comprises the steps:
S10: audio-video terminal to server send request, server authentication by time, calculate EPG versionThe cryptographic Hash of this configuration file URL, is all encrypted EPG edition configuration file URL and cryptographic Hash,After encryption, send to audio-video terminal;
S20: control audio-video terminal and receive EPG edition configuration file URL and the cryptographic Hash of encrypting and carry outDeciphering, is used the cryptographic Hash after deciphering to carry out verification to the EPG edition configuration file URL after deciphering, ifVerification is passed through, and this time EPG edition configuration file URL is effective, controls audio-video terminal according to EPG versionThis configuration file URL is to EPG edition configuration file corresponding to server request and perform step S30, ifVerification, not by invalid, controlled audio-video terminal and is again sent request to server;
S30: calculate the cryptographic Hash of EPG edition configuration file, to EPG edition configuration file cryptographic Hash andEPG edition configuration file is all encrypted, and sends to audio-video terminal after encryption;
S40: control audio-video terminal and receive EPG edition configuration file and the EPG edition configuration file encryptedCryptographic Hash is also decrypted, and the EPG edition configuration file cryptographic Hash after use deciphering is to the EPG after decipheringEdition configuration file carries out verification, if verification is by parsing EPG's according to EPG edition configuration fileURL, according to the URL of EPG to EPG data corresponding to server request and perform step S50, if schoolTest not by EPG edition configuration file is invalid;
S50: calculate the cryptographic Hash of corresponding EPG data, equal to the cryptographic Hash of EPG data and EPG dataBe encrypted, after encryption, send to audio-video terminal;
S60: control audio-video terminal and receive EPG data and the EPG data cryptographic Hash of encrypting and be decrypted,Use the EPG data cryptographic Hash after deciphering to carry out verification to the EPG data after deciphering, if verification is passed throughStorage EPG data, if verification is not by directly abandoning.
2. audio-video terminal network EPG method of reseptance according to claim 1, is characterized in that,Described step S30 is specially:
Use SHA256 algorithm to calculate the cryptographic Hash of EPG edition configuration file, adopt the first cipher mode pairThe cryptographic Hash of EPG edition configuration file is encrypted, and adopts the second cipher mode to EPG edition configuration fileBe encrypted.
3. audio-video terminal network EPG method of reseptance according to claim 2, is characterized in that,Described step S40 is specially:
First adopt the first cipher mode to be decrypted the cryptographic Hash of EPG edition configuration file; If be decrypted intoMerit adopts the second cipher mode to be decrypted EPG edition configuration file again, otherwise not to EPG versionConfiguration file is decrypted.
4. audio-video terminal network EPG method of reseptance according to claim 1, is characterized in that,Described step S50 is specially:
Use SHA256 algorithm to calculate the cryptographic Hash of EPG data, adopt the first cipher mode to EPG numberAccording to cryptographic Hash be encrypted, adopt the second cipher mode EPG data are encrypted.
5. audio-video terminal network EPG method of reseptance according to claim 4, is characterized in that,Described step S60 is specially:
First adopt the first cipher mode to be decrypted the cryptographic Hash of EPG data; If successful decryption is adopted againEPG data are decrypted with the second cipher mode, otherwise EPG data are not decrypted.
6. according to the arbitrary described audio-video terminal network EPG method of reseptance of claim 2 to 5, its spyLevy and be, described the first cipher mode is rsa encryption mode, and described the second cipher mode is that AES encryptsMode.
7. an audio-video terminal network EPG receiving system, is characterized in that, comprising:
EPG edition configuration file URL encrypting module, sends request, takes to server at audio-video terminalWhen business device is verified, calculate the cryptographic Hash of EPG edition configuration file URL, to EPG version configuration literary compositionPart URL and cryptographic Hash are all encrypted, and send to audio-video terminal after encryption;
EPG edition configuration file URL correction verification module, controls audio-video terminal and receives the EPG version of encryptingConfiguration file URL and cryptographic Hash are also decrypted, and the cryptographic Hash after use deciphering is to the EPG version after decipheringThis configuration file URL carries out verification, if verification is passed through, this time EPG edition configuration file URL is effective,Controlling audio-video terminal joins to EPG version corresponding to server request according to EPG edition configuration file URLPut file and perform step S30, if verification, not by invalid, is controlled audio-video terminal again to serverSend request;
EPG edition configuration file encrypting module, the cryptographic Hash of calculating EPG edition configuration file, to EPGEdition configuration file cryptographic Hash and EPG edition configuration file are all encrypted, and send to audio frequency and video eventually after encryptionEnd;
EPG edition configuration file correction verification module, controls audio-video terminal and receives the EPG version configuration literary composition of encryptingPart and EPG edition configuration file cryptographic Hash are also decrypted, and use the EPG edition configuration file after decipheringCryptographic Hash is carried out verification to the EPG edition configuration file after deciphering, if verification is passed through according to EPG versionConfiguration file parses the URL of EPG, according to the URL of EPG to EPG number corresponding to server requestAccording to and perform step S50, if verification is by EPG edition configuration file is invalid;
EPG data encryption module, calculates the cryptographic Hash of corresponding EPG data, to EPG data and EPG numberAccording to cryptographic Hash be all encrypted, after encryption, send to audio-video terminal;
EPG data deciphering module, controls audio-video terminal and receives EPG data and the EPG data Kazakhstan of encryptingUncommon value is also decrypted, and uses the EPG data cryptographic Hash after deciphering to carry out school to the EPG data after decipheringTest, if verification is by storing EPG data, if verification is not by directly abandoning.
8. audio-video terminal network EPG receiving system according to claim 7, is characterized in that,
Described EPG edition configuration file encrypting module uses SHA256 algorithm to calculate EPG version configuration literary compositionThe cryptographic Hash of part, adopts the first cipher mode to be encrypted the cryptographic Hash of EPG edition configuration file, adoptsThe second cipher mode is encrypted EPG edition configuration file;
Described EPG data encryption module is used SHA256 algorithm to calculate the cryptographic Hash of EPG data, adoptsThe first cipher mode is encrypted the cryptographic Hash of EPG data, adopts the second cipher mode to EPG dataBe encrypted.
9. audio-video terminal network EPG receiving system according to claim 8, is characterized in that,First described EPG edition configuration file correction verification module adopts the first cipher mode to EPG edition configuration fileCryptographic Hash be decrypted; If successful decryption adopts the second cipher mode to enter EPG edition configuration file againRow deciphering, otherwise EPG edition configuration file is not decrypted;
First described EPG data check module adopts the first cipher mode to carry out the cryptographic Hash of EPG dataDeciphering; If successful decryption adopts the second cipher mode to be decrypted EPG data again, otherwise not to EPGData are decrypted.
10. audio-video terminal network EPG receiving system according to claim 8 or claim 9, its feature existsIn, described the first cipher mode is rsa encryption mode, described the second cipher mode is AES cipher mode.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610114883.8A CN105657454B (en) | 2016-03-01 | 2016-03-01 | A kind of audio-video terminal network EPG method of reseptance and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610114883.8A CN105657454B (en) | 2016-03-01 | 2016-03-01 | A kind of audio-video terminal network EPG method of reseptance and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105657454A true CN105657454A (en) | 2016-06-08 |
CN105657454B CN105657454B (en) | 2019-02-15 |
Family
ID=56492859
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610114883.8A Expired - Fee Related CN105657454B (en) | 2016-03-01 | 2016-03-01 | A kind of audio-video terminal network EPG method of reseptance and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105657454B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109996096A (en) * | 2019-03-06 | 2019-07-09 | 湖北省广播电视信息网络股份有限公司 | Region EPG management system, dissemination system and distribution method |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1725852A (en) * | 2004-07-21 | 2006-01-25 | 联想(北京)有限公司 | Encipher and decipher method of electronic program guide |
KR20080090165A (en) * | 2007-04-04 | 2008-10-08 | 삼성전자주식회사 | System of offering digital broadcasting using picture in picture in portable terminal, method thereof and apparatus thereof |
US20120082311A1 (en) * | 2000-11-02 | 2012-04-05 | Oleg Rashkovskiy | Content protection using block reordering |
-
2016
- 2016-03-01 CN CN201610114883.8A patent/CN105657454B/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120082311A1 (en) * | 2000-11-02 | 2012-04-05 | Oleg Rashkovskiy | Content protection using block reordering |
CN1725852A (en) * | 2004-07-21 | 2006-01-25 | 联想(北京)有限公司 | Encipher and decipher method of electronic program guide |
KR20080090165A (en) * | 2007-04-04 | 2008-10-08 | 삼성전자주식회사 | System of offering digital broadcasting using picture in picture in portable terminal, method thereof and apparatus thereof |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109996096A (en) * | 2019-03-06 | 2019-07-09 | 湖北省广播电视信息网络股份有限公司 | Region EPG management system, dissemination system and distribution method |
CN109996096B (en) * | 2019-03-06 | 2022-01-11 | 湖北省广播电视信息网络股份有限公司 | Regional EPG management system, distribution system and distribution method |
Also Published As
Publication number | Publication date |
---|---|
CN105657454B (en) | 2019-02-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105939484B (en) | A kind of the encryption playback method and its system of audio-video | |
KR100957121B1 (en) | Key distribution method and authentication server | |
US10055553B2 (en) | PC secure video path | |
US20200364319A1 (en) | Systems and methods for utilizing hardware assisted protection for media content | |
US20130283033A1 (en) | Token-based entitlement verification for streaming media decryption | |
EP2595082A1 (en) | Method and authentication server for verifying access identity of set-top box | |
US20040111749A1 (en) | Demanding a video program by using demand short message | |
CN105491073B (en) | Data downloading method, device and system | |
US20140090019A1 (en) | Integrated broadcasting communications receiver, resource access controlling program, and integrated broadcasting communications system | |
CN104298896A (en) | Method and system for managing and distributing digital rights | |
US12095910B2 (en) | System for thin client devices in hybrid edge cloud systems | |
WO2018157724A1 (en) | Method for protecting encrypted control word, hardware security module, main chip and terminal | |
KR102140356B1 (en) | Method and device to embed watermark in uncompressed video data | |
CN112738560A (en) | Video data transmission method, receiving method, server and client | |
US10387628B2 (en) | Accessing content at a device | |
CN107919958B (en) | Data encryption processing method, device and equipment | |
CN110912941A (en) | Transmission processing method and device for multicast data | |
CN105657454A (en) | Audio and video terminal network EPG receiving method and system | |
EP2713576B1 (en) | Method and device for processing streaming media content | |
CN103297464A (en) | Program information obtaining method and device | |
KR20130096575A (en) | Apparatus and method for distributing group key based on public-key | |
KR102516004B1 (en) | System for security key managing of video file and method for key generating thereof | |
CN111711836B (en) | Data transmission method, device, terminal equipment and storage medium | |
CN115459949A (en) | Data transmission method and device | |
CN115002089A (en) | Streaming media transmission method and device, electronic equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20190215 Termination date: 20200301 |
|
CF01 | Termination of patent right due to non-payment of annual fee |