Unauthorized Device Detection Device And Unauthorized Device Detection System

a detection device and unauthorized technology, applied in the field of unauthorized device detection devices and unauthorized device detection systems, can solve the problems of high labor and cost, the decryption key may be revealed,

Inactive Publication Date: 2008-01-17
PANASONIC CORP +1
View PDF8 Cites 30 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0014] According to this configuration, a device that is likely to be an unauthorized device manufactured by copying can be detected based on the number of portable media used by unauthorized devices.
[0015] Here, the detection device may further include: a calculation unit that includes: an acquisition unit operable to acquire, from a rewritable portable medium used by the target device, a media identifier for identifying the portable medium and the device identifier held by the target device; a storage unit operable to store, in correspondence with a device identifier held by each past target device, one or more media identifiers respectively for identifying one or more rewritable portable media used by the past target device; and a calculating unit operable to calculate, using the stored device identifier and one or more media identifiers and the acquired device identifier and media identifier, a total number of media identifiers corresponding to a same device identifier as the acquired device identifier, as the total media number, and write the calculated total media number to the media number storage unit.
[0016] According to this configuration, the total media number can be calculated reliably.
[0017] Here, the comparison unit may further compare the total media number with a warning value that is smaller than the threshold value, wherein the identifier storage unit further stores the device identifier if the total media number is no greater than the threshold value but is greater than the warning value.
[0018] According to this configuration, a device that is likely to be either an unauthorized device or a device that requires a warning can be detected.
[0019] Here, the target device may be a playback device for decrypting encrypted content and playing back the decrypted content, wherein the detection device further includes: a prohibition unit operable to prohibit to output a decryption key used for decrypting the encrypted content to the portable medium, if the total media number is greater than the threshold value; and an output unit operable to output the decryption key to the portable medium, if the total media number is no greater than the threshold value.

Problems solved by technology

However, there is a danger that the decryption key may be revealed as a result of an unauthorized party conducting analysis inside the terminal.
However, neither patent document 1 nor patent document 2 discloses a method of specifying the key revealed to outside (i.e. the key to be invalidated).
This requires much labor and cost.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Unauthorized Device Detection Device And Unauthorized Device Detection System
  • Unauthorized Device Detection Device And Unauthorized Device Detection System
  • Unauthorized Device Detection Device And Unauthorized Device Detection System

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

1. Unauthorized Device Detection System 1

[0064] The following describes an unauthorized device detection system 1 as one embodiment of the present invention.

1.1. Overview of the Unauthorized Device Detection System 1

[0065] The unauthorized device detection system 1 includes a management server device 100, a register device 300, and DVD players 400a, . . . , 400b, 400c, . . . , 400d, as shown in FIG. 1. The management server device 100 and the register device 300 are connected to each other via an internet 10.

[0066] The DVD players 400a, . . . , 400b are authorized players manufactured by an authorized manufacturer, and each hold a device ID for uniquely identifying the DVD player itself. For example, a total number of the DVD players 400a, . . . , 400b is 10,000.

[0067] Meanwhile, the DVD players 400c, . . . , 400d are players manufactured by an unauthorized manufacturer copying the DVD player 400b, and each hold a same device ID as the one for uniquely identifying the DVD playe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

To provide an unauthorized device detection system capable of finding and specifying a device that was manufactured or altered unauthorizedly. A DVD player 400a writes its own device ID to a memory card 200a. When a user purchases content, a register device 300 reads a media ID and the device ID from the memory card 200a, and transmits the media ID and the device ID to a management server device 100. The management server device 100 calculates, based on pairs of media IDs and device IDs stored beforehand and the received pair of media ID and device ID, a total number of media IDs corresponding to the received device ID, and compares the calculated total number with a threshold value. If the total number exceeds the threshold value, the management server device 100 judges that the DVD player identified by the received device ID is an unauthorized device.

Description

TECHNICAL FIELD [0001] The present invention relates to unauthorized device detection techniques for finding or specifying an unauthorized device altered or manufactured by copying. BACKGROUND ART [0002] In recent years, the development of multimedia-related technologies, the emergence of large-capacity recording media, and the like have led to the advent of systems that distribute digital content (hereafter “content”) made up of video, audio, and the like on large-capacity recording media such as optical discs or via a network or broadcasting. [0003] In general, cryptography is employed to protect a copyright of content, that is, to protect content from unauthorized use such as unauthorized playback and copying. In detail, content encrypted using an encryption key is recorded on a recording medium such as an optical disc and distributed. Only a terminal in possession of a decryption key corresponding to the encryption key can decrypt the encrypted content read from the recording me...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(United States)
IPC IPC(8): G06Q10/00G06F17/30G06F21/44G06F21/60G06F21/62G09C1/00
CPCG06F21/10G06F2221/0764G11B20/00086G11B20/00195G11B20/0021H04L2209/60G11B20/00688G11B20/00862G11B2220/2562H04L9/0822H04L9/083G11B20/00528G06F21/1073
Inventor NAKANO, TOSHIHISANONAKA, MASAOFUTA, YUICHIOHMORI, MOTOJIGOMI, TAKESHIKOBARA, KAZUKUNIIMAI, HIDEKI
Owner PANASONIC CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products