Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

System and method for realizing authentication monitoring

A monitoring server, illegal technology, applied in the field of communication, can solve the problems of inability to grasp the specific situation of the functional module F, inability to deal with infringements, etc., to achieve the effect of ensuring healthy development, protecting intellectual property rights, and reducing harm

Active Publication Date: 2014-03-19
北京中智润邦科技有限公司
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If there is no monitoring, terminal system manufacturer A will not be able to grasp the specific situation of the application of functional module F, so that it will not be able to further deal with the infringement

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for realizing authentication monitoring
  • System and method for realizing authentication monitoring
  • System and method for realizing authentication monitoring

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] In the present invention, it is possible to monitor whether the scope of authorization is exceeded, and the implementation is as follows: when the function module is triggered, the terminal sends the manufacturer identification, authorization number and terminal equipment identification to the authorization monitoring server; The comparison between the number of device identifications corresponding to the authorization number and the scope of authorization determines whether there is illegal infringement. If it is determined that there is illegal infringement, the authorization monitoring server may further identify the manufacturer identifier and the corresponding authorization number as an authorization exception and / or generate an alarm.

[0055] The authorization monitoring server stores the manufacturer ID and the corresponding authorization number. In this way, before counting the number of device IDs corresponding to the manufacturer ID and the authorization numbe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a system and a method for realizing authentication monitoring. The method comprises the following steps that: a terminal transmits a manufacturer identifier, an authorization number and an equipment identifier of the terminal to an authentication monitoring server; the authentication monitoring server determines whether illegal infringement exists or not according to a comparison between the number of the equipment identifiers corresponding to the counted manufacturer identifiers and authentication numbers and an authentication range in a scheme for monitoring whether the authentication range is surpassed or not; and in a scheme for performing authentication monitoring on a specific terminal, the existence of the illegal infringement in a functional module corresponding to the equipment identifier is judged according to the manufacturer identifier and the authentication number and a limited use mark is transmitted to the terminal when limit on the use of the functional module is further determined according to a limit strategy if the illegal infringement exists. Therefore, the monitoring server can grasp the authentication situation of the functional module, effectively monitor an illegal infringement action, protect the intellectual property of the functional module owned by a terminal system manufacturer to the maximum extent, ensure healthy development of an industrial chain and promote the benign development of functional application.

Description

technical field [0001] The invention relates to the communication field, in particular to a system and method for realizing authorization monitoring. Background technique [0002] At present, with the rise of mobile TV business, mobile TV terminal is one of the most important components in the mobile TV industry chain, and its development level is closely related to the rapid development of the mobile TV industry chain. In the initial stage of the development of mobile TV services, operators will promote the development of mobile TV services by customizing specific mobile terminals. [0003] Mobile TV terminals are composed of many functional modules, which are generally produced and developed by many terminal system manufacturers, and then integrated by terminal system integrators. For mobile TV terminals, some functional modules such as chips and molds are difficult to copy or costly to copy. Therefore, terminal system integrators need to purchase a large number of functi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04N21/6334H04L29/06
Inventor 林向东王晔陈刚
Owner 北京中智润邦科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products