Detection method and system of clone terminal devices

A technology of terminal equipment and detection method, which is applied in the field of communication transmission, can solve the problems of damage to the interests of operators and consumers, wrong locking of legal terminals, etc., and achieve the effect of shortening the clone detection cycle, avoiding wrong locking, and maintaining safe operation

Active Publication Date: 2012-07-04
北京视博数字电视科技有限公司
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Comparing the above two methods, the former only conducts statistics and detection from a single aspect of the front-end server, and this method can only determine the cloned terminal when the terminal cloning behavior reaches a certain level. The interests of operators and consumers cause a certain degree of damage; although the latter has a small impact on the system and has a certain cost advantage, a single detection method may cause legitimate terminals to be locked by mistake

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Detection method and system of clone terminal devices
  • Detection method and system of clone terminal devices
  • Detection method and system of clone terminal devices

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The technical principle of the present invention: a detection method for cloning terminal equipment proposed by the present invention adopts a dual processing strategy combining "incident interference" and "post-event monitoring".

[0035] "Incident interference" means that when applying for a content license, the legitimate terminal device and the cloned terminal device will negotiate different keys to encrypt the content license, and the terminal device must be restarted repeatedly through the interval negotiation to allow the application. Content licenses, decrypted to watch shows. Legitimate end users will report this phenomenon of not being able to watch programs normally to the operator at the first time, and the operator will take effective measures to solve the cloning problem in a timely manner. And the interference of not being able to watch programs normally makes cloning terminal equipment meaningless.

[0036] "After-the-fact monitoring" means that when th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a detection method and system of clone terminal devices, and the detection is performed on the basis of a network consisting of a front-end server and a certain number of terminal devices. The method comprises the following steps that: S1) the front-end server receives access applications of the terminal devices, performs conversation after key agreement and performs the conversation in a way allowed by different key interval agreements if the access applications of the same terminal devices exist; S2) the front-end server records and stores information of each terminal device and behavior information for communicating with the front-end server; and S3) whether the terminal device is cloned or not is judged by combining the information and behavior information of each terminal device. The detection system has a simple structure, the method is easy to operate, the clone devices can be found timely, the accuracy in clone detection is greatly improved, the clone detection period is shorted, and the detection method and system are conductive to the safety operation of the network and interests of network participants.

Description

technical field [0001] The invention relates to the technical field of communication transmission, mainly to a two-way network content protection system, and in particular to a detection method and system for a cloned terminal device. Background technique [0002] With the development of communication technology, terminal computer users can connect to the Internet through wired or wireless means, and access network resources provided by servers. In order to ensure the security of accessed content, usually the terminal user and the server communicate through a protocol. [0003] In the content protection system, the front-end server sends ciphertext media content to the end user. While obtaining the media content, the end user also needs to obtain the content license of the media content before they can decrypt and watch the media content. In order to realize the secure transmission and authorization control of digital content, a two-way authentication method based on the PK...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/26H04L29/06
Inventor 李小正王天星王文军李伟东阎松柏
Owner 北京视博数字电视科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products