CN101534429B - Pirate Tracking Method and System - Google Patents

Pirate Tracking Method and System Download PDF

Info

Publication number
CN101534429B
CN101534429B CN2008100836361A CN200810083636A CN101534429B CN 101534429 B CN101534429 B CN 101534429B CN 2008100836361 A CN2008100836361 A CN 2008100836361A CN 200810083636 A CN200810083636 A CN 200810083636A CN 101534429 B CN101534429 B CN 101534429B
Authority
CN
China
Prior art keywords
combination
unit
pirate
groups
tracking
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN2008100836361A
Other languages
Chinese (zh)
Other versions
CN101534429A (en
Inventor
卢增祥
路海明
王天星
李栋
李一捷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Shibo Digital TV Technology Co Ltd
Original Assignee
Beijing Shibo Digital TV Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Shibo Digital TV Technology Co Ltd filed Critical Beijing Shibo Digital TV Technology Co Ltd
Priority to CN2008100836361A priority Critical patent/CN101534429B/en
Publication of CN101534429A publication Critical patent/CN101534429A/en
Application granted granted Critical
Publication of CN101534429B publication Critical patent/CN101534429B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Television Systems (AREA)
  • Compression Or Coding Systems Of Tv Signals (AREA)

Abstract

The invention provides a pirate tracking method and a system thereof. The method adopts a combination elimination technique to determine the pirate from end users according to the detected illicit diffused code word. Using the method to track the pirates solves the existing bottleneck in tracking the pirate, namely the problem of restricts by the cost and technology realization brought by the number of user groups and the increase in the number of user groups. Moreover, the tracking efficiency is high and the benefits of the operators are protected.

Description

盗版者追踪方法和系统 Pirate tracking method and system

技术领域technical field

本发明关于数字电视的盗版者追踪技术,特别关于一种盗版者追踪方法和系统。 The invention relates to the digital TV pirate tracking technology, in particular to a pirate tracking method and system. the

背景技术Background technique

随着互联网视频技术和数字电视的发展,以及媒体内容的丰富,用户付费订制自己喜欢的视频节目的数字电视运营模式已经出现并逐步推广,视频内容提供商也更倾向于利用数字电视系统发布节目。数字电视系统中,视频节目经过加密后对所有用户广播,每一位用户在接收端都有解密装置,如果一位用户订阅了某节目,则其对应的解密装置可以恢复该节目的明文,如果没有订阅节目,则解密装置无法对节目进行解密,丢弃节目包。 With the development of Internet video technology and digital TV, as well as the richness of media content, the digital TV operation mode in which users pay to order their favorite video programs has emerged and gradually popularized, and video content providers are more inclined to use digital TV systems to release programme. In the digital TV system, video programs are broadcasted to all users after being encrypted. Each user has a decryption device at the receiving end. If a user subscribes to a certain program, the corresponding decryption device can recover the plaintext of the program. If If no program is subscribed, the decryption device cannot decrypt the program, and the program package is discarded. the

然而,用户的盗版问题成为制约数字电视产业发展的一大问题。在数字电视这种广播模式下的盗版行为,主要是盗版者通过攻击解密装置获得节目解密密钥并将其非法扩散。用户盗版问题会成为困扰数字电视节目运营商的重要问题。如果不能有效的解决这个问题,付费收看节目的模式就可能会受到严重的影响。因此,存在叛逆者追踪技术(Traitor Tracing),用于反盗版。其中, However, user piracy has become a major problem restricting the development of the digital TV industry. Piracy in the broadcasting mode of digital TV is mainly that pirates obtain program decryption keys by attacking decryption devices and illegally distribute them. The problem of user piracy will become an important problem that plagues digital TV program operators. If this problem cannot be effectively solved, the mode of paying to watch programs may be seriously affected. Therefore, Traitor Tracing exists for anti-piracy. in,

图1为相关技术中动态叛逆者追踪示意图。其中,利用盗版者的反馈信息缩短追踪到叛逆者所需要的时间。 FIG. 1 is a schematic diagram of dynamic traitor tracking in the related art. Among them, the feedback information from pirates is used to shorten the time required to track down traitors. the

如图1所示,该系统中存在的终端用户的总数为n,发行商对用户进行分组,并为每个组分发相同的码字,不同的用户组分发的码字不同。几个合谋的盗版用户会从其得到的码字中选一个进行非法扩散。发行商监测被非法扩散的码字,推断出该码字来自哪个用户组,然后结合以前的码字泄露信息和 分组信息推断盗版用户。如果无法判断,则根据这些信息对用户的分组进行调整,重新分发码字并进行监测,直到收集的信息足以推断出盗版者。 As shown in Figure 1, the total number of end users in the system is n, and the publisher divides users into groups and distributes the same codewords to each group. Different user groups distribute different codewords. Several colluding pirate users will choose one of the codewords they get to carry out illegal diffusion. The publisher monitors the illegally diffused codewords, infers which user group the codewords come from, and then infers pirated users by combining the previous codeword leak information and group information. If it cannot be judged, adjust the grouping of users based on this information, redistribute codewords and monitor until the collected information is sufficient to deduce the pirate. the

上述“码字”是一个抽象的概念,该码字可以是对同一个节目的不同解密密钥,也可以是嵌有不同指纹信息的媒体文件。 The above-mentioned "codeword" is an abstract concept, and the codeword can be different decryption keys for the same program, or a media file embedded with different fingerprint information. the

在相关技术中,判断盗版者时可采用二叉树(或多叉树)搜索的方式来确定盗版用户,只有当用户分组数大于合谋用户数时,才可能构造出确定性追踪策略。以最大用户分组数r与盗版用户数上界p的关系满足r=2p+1的情况为例,该追踪策略利用一个用户组I存储可能的无辜用户,而用剩余的2p个用户组存储可能的p个盗版用户,每个用户组对{Li,Ri}中的用户中至少有一个盗版用户。如果监测到的非法扩散码字是分配给I的码字,则将I分为用户数相同的Li和Ri两部分,并将I置空;如果监测到的码字是分配给Li的,则将Ri与I合并,将Li分为Li和Ri两部分;如果监测到的码字来自Ri,则将Li与I合并,将Ri分为Li和Ri两部分。每经过一步,就会有一个用户组中的用户数减半,直到分配给某个只包含一个用户的用户组的码字被监测到,则追踪到一个盗版用户,把该用户从系统断开,并继续上述步骤,直到所有盗版用户被追踪到。 In related technologies, when judging pirates, a binary tree (or multi-tree) search method can be used to determine pirate users. Only when the number of user groups is greater than the number of colluding users can a deterministic tracking strategy be constructed. Taking the case where the relationship between the maximum number of user groups r and the upper bound p of the number of pirated users satisfies r=2p+1 as an example, this tracking strategy uses one user group I to store possible innocent users, and uses the remaining 2p user groups to store possible innocent users. There are p pirated users, each user group pair {Li, Ri} has at least one pirated user. If the monitored illegal diffusion codeword is the codeword assigned to I, then I is divided into two parts Li and Ri with the same number of users, and I is empty; if the monitored codeword is assigned to Li, then Merge Ri with I, and divide Li into two parts, Li and Ri; if the detected codeword comes from Ri, combine Li with I, and divide Ri into two parts, Li and Ri. After each step, the number of users in a user group will be halved until the codeword assigned to a user group containing only one user is detected, then a pirated user will be tracked down and the user will be disconnected from the system , and continue the above steps until all pirated users are traced. the

在上述r=2p+1的动态追踪策略中,搜索过程最初几步的分组数通常远远小于最大分组数r。而在实际应用中,由于多解密密钥系统设计的复杂性或传输带宽的限制,最大分组数往往受到限制,或者说,要增加最大分组数必须付出较高的代价,因此,上述动态追踪策略不能充分地利用既定的系统条件,导致搜索效率受到影响。 In the above dynamic tracking strategy of r=2p+1, the number of groups in the first few steps of the search process is usually much smaller than the maximum number of groups r. In practical applications, due to the complexity of multi-decryption key system design or the limitation of transmission bandwidth, the maximum number of packets is often limited, or in other words, a higher price must be paid to increase the maximum number of packets. Therefore, the above dynamic tracking strategy The established system conditions cannot be fully utilized, resulting in affected search efficiency. the

发明内容Contents of the invention

本发明的目的在于提供一种盗版者追踪方法,该方法是采用组合排除法来追踪盗版者,解决了现有的盗版者追踪的瓶颈问题,即受用户分组数以及用户分组数增加带来的成本、技术实现等条件制约的问题,并且追踪效率高, 维护了运营商的利益。 The object of the present invention is to provide a method for tracking pirates, the method is to use the combined elimination method to track pirates, solve the existing bottleneck problem of pirates tracking, that is, the number of user groups and the increase in the number of user groups brought Cost, technology implementation and other conditions are constrained, and the tracking efficiency is high, safeguarding the interests of operators. the

本发明的目的还在于提供一种盗版者追踪系统,通过该系统解决了现有的盗版者追踪的瓶颈问题,追踪效率高;并且维护了运营商的利益。 The purpose of the present invention is also to provide a pirate tracking system, through which the existing bottleneck problem of pirate tracking is solved, the tracking efficiency is high, and the interests of operators are maintained. the

为实现上述目的,本发明提供一种盗版者追踪方法,该方法包括:根据监测到的非法扩散的码字、采用组合排除法确定终端用户中的盗版者,其中所述根据码字、采用组合排除法确定终端用户中的盗版者,包括: In order to achieve the above object, the present invention provides a method for tracking pirates. The method includes: determining the pirates among the end users according to the monitored illegally diffused codewords and using a combination exclusion method, wherein the method is based on the codewords, using a combination of Elimination methods to identify pirates among end users include:

步骤1,对当前所述终端用户进行分组,并对每个分组分配不同的码字; Step 1, grouping the current terminal users, and assigning different codewords to each group;

步骤2,监测终端用户非法扩散的码字; Step 2, monitoring codewords illegally diffused by end users;

步骤3,根据所述码字确定当前共谋者中的至少一个来自该码字所在的分组; Step 3, according to the codeword, determine that at least one of the current co-conspirators is from the group where the codeword is located;

步骤4,在当前共谋组的组合C(U,T)中排除嫌疑共谋组的组合 

Figure DEST_PATH_GSB00000261818800011
以获得剩余嫌疑共谋组的组合C\C1,其中U为终端用户,T为任意可能的共谋者的数量,G为将所述U个终端用户分成的组数,C\C1为在组合C中排除组合C1; Step 4, exclude the combination of the suspected colluding group from the combination C(U, T) of the current colluding group
Figure DEST_PATH_GSB00000261818800011
To obtain the combination C\C 1 of the remaining suspected colluding groups, where U is the terminal user, T is the number of any possible co-conspirator, G is the number of groups that divide the U terminal users into, and C\C 1 is Exclude combination C1 from combination C;

附图说明Description of drawings

步骤5,判断该剩余嫌疑共谋组的组合中是否共同存在至少一个共谋者; Step 5, judging whether there is at least one co-conspirator in the combination of the remaining suspected colluding groups;

步骤6,若判断结果为是,则确定该共谋者为盗版者; Step 6, if the judgment result is yes, then determine that the co-conspirator is a pirate;

步骤7,若判断结果为否,则根据剩余嫌疑共谋组的组合对所述终端用户分组,进行步骤2至5,重复上述步骤直至该剩余嫌疑共谋组的组合中共同存在至少一个共谋者。 Step 7, if the judgment result is no, group the terminal users according to the combination of the remaining suspected collusion groups, perform steps 2 to 5, and repeat the above steps until at least one collusion exists in the combination of the remaining suspected collusion groups By. the

为实现上述目的,本发明还提供一种盗版者追踪系统,该系统包括多个终端,终端具体可理解为与某IC卡结合的机顶盒或用户;其中,该系统还包括: In order to achieve the above object, the present invention also provides a pirate tracking system, the system includes a plurality of terminals, and the terminal can be specifically understood as a set-top box or a user combined with a certain IC card; wherein, the system also includes:

监测单元,该监测单元用于监测终端用户非法扩散的码字; A monitoring unit, which is used to monitor codewords illegally diffused by end users;

追踪单元,与所述监测单元连接,用于根据监测到的所述码字采用组合排除法确定终端用户中的盗版者; A tracking unit, connected to the monitoring unit, is used to determine the pirates among the end users by using the combined elimination method according to the monitored codewords;

分组单元,该分组单元与所述追踪单元连接,用于根据追踪单元的追踪 结果,对当前终端用户进行分组,并将分组结果传送至所述分配单元; A grouping unit, the grouping unit is connected to the tracking unit, and is used to group the current end users according to the tracking results of the tracking unit, and transmit the grouping results to the distribution unit;

分配单元,该分配单元与所述分组单元和终端连接,用于根据该分组结果为每个分组分配不同的码字,并将该码字发送至所述终端 An allocation unit, which is connected to the grouping unit and the terminal, and is used to allocate a different codeword for each group according to the grouping result, and send the codeword to the terminal

还包括判断单元,分别与所述分组单元和监测单元相连接,所述判断单元进行以下处理: It also includes a judging unit, which is respectively connected to the grouping unit and the monitoring unit, and the judging unit performs the following processing:

在当前共谋组的组合C(U,T)中排除嫌疑共谋组的组合 以获得剩余嫌疑共谋组的组合C\C1,其中U为终端用户,T为任意可能的共谋者的数量,G为将所述U个终端用户分成的组数,C\C1为在组合C中排除组合C1;判断该剩余嫌疑共谋组的组合中是否共同存在至少一个共谋者;若判断结果为是,则确定该共谋者为盗版者,若判断结果为否,则利用分组单元根据剩余嫌疑共谋组的组合对所述终端用户分组,所述判断单元重复上述处理直至该剩余嫌疑共谋组的组合中共同存在至少一个共谋者。 Exclude the combination of the suspected collusion group from the combination C(U, T) of the current collusion group To obtain the combination C\C 1 of the remaining suspected colluding groups, where U is the terminal user, T is the number of any possible co-conspirator, G is the number of groups that divide the U terminal users into, and C\C 1 is Exclude combination C1 from combination C; judge whether there is at least one co-conspirator in the combination of the remaining suspected colluding groups; if the judgment result is yes, then determine that the co-conspirator is a pirate; Using the grouping unit to group the end users according to the combination of the remaining suspected colluding groups, the judging unit repeats the above processing until at least one co-conspirator exists in the combination of the remaining suspected colluding groups.

本发明的有益效果在于,采用组合排除法来追踪盗版者,解决了现有的盗版者追踪的瓶颈问题,即受用户分组数以及用户分组数增加带来的成本、技术实现等条件制约的问题,并且追踪效率高;并且维护了运营商的利益。 The beneficial effect of the present invention is that the combination exclusion method is used to track the pirates, which solves the bottleneck problem of the existing pirates tracking, that is, the problem restricted by the number of user groups and the increase in the number of user groups, the cost, technical realization and other conditions. , and the tracking efficiency is high; and the interests of operators are maintained. the

此处所说明的附图用来提供对本发明的进一步理解,构成本申请的一部分,并不构成对本发明的限定。在附图中: The drawings described here are used to provide further understanding of the present invention, constitute a part of the application, and do not limit the present invention. In the attached picture:

图1是相关技术中盗版者追踪系统结构示意图; Fig. 1 is a schematic structural diagram of a pirate tracking system in the related art;

图2是本发明实施盗版者追踪方法流程图; Fig. 2 is that the present invention implements the flow chart of pirate's tracking method;

图3是本发明实施方式盗版者追踪系统结构示意图。 Fig. 3 is a schematic structural diagram of a system for tracking pirates according to an embodiment of the present invention. the

具体实施方式Detailed ways

为使本发明的目的、技术方案和优点更加清楚明白,下面结合实施例和附图,对本发明做进一步详细说明。在此,本发明的示意性实施例及其说明 用于解释本发明,但并不作为对本发明的限定。 In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the embodiments and accompanying drawings. Here, the exemplary embodiments of the present invention and their descriptions are used to explain the present invention, but not to limit the present invention. the

本发明提供一种盗版者追踪系统,如图3所示,该系统包括多个终端;此外,该系统还包括: The present invention provides a pirate tracking system, as shown in Figure 3, the system includes a plurality of terminals; in addition, the system also includes:

监测单元301,用于监测终端用户非法扩散的码字;追踪单元302,与监测单元301连接,用于根据监测到的该码字采用组合排除法确定终端用户中的盗版者。 The monitoring unit 301 is used to monitor the code word illegally diffused by the end user; the tracking unit 302 is connected to the monitoring unit 301 and is used to determine the pirate among the end users by using the combined elimination method according to the monitored code word. the

由上述可知,通过采用组合排除法来追踪盗版者,解决了现有的盗版者追踪的瓶颈问题,追踪效率高,维护了运营商的利益。 From the above, it can be seen that the existing bottleneck problem of pirate tracking is solved by adopting the combined elimination method to track pirates, the tracking efficiency is high, and the interests of operators are maintained. the

其中,终端可为与某IC卡结合的机顶盒。 Wherein, the terminal may be a set-top box combined with an IC card. the

此外,在本实施方式中,该系统还包括分组单元303和分配单元305;其中,分组单元303与追踪单元302连接,用于根据追踪单元302的追踪结果,对当前终端用户进行分组,并将分组结果传送至分配单元305; In addition, in this embodiment, the system also includes a grouping unit 303 and a distribution unit 305; wherein, the grouping unit 303 is connected to the tracking unit 302, and is used to group the current terminal users according to the tracking results of the tracking unit 302, and assign The grouping result is sent to the allocation unit 305;

分配单元305,用于根据分组单元303的分组结果为每个分组分配不同的码字,并将该码字发送至终端。 The allocation unit 305 is configured to allocate a different codeword to each group according to the grouping result of the grouping unit 303, and send the codeword to the terminal. the

如图3所示,该系统还包括输出单元304,该输出单元304与追踪单元302连接,用于输出追踪到的盗版者。 As shown in FIG. 3 , the system further includes an output unit 304 connected to the tracking unit 302 for outputting tracked pirates. the

本发明还提供一种盗版者追踪方法,该方法包括:根据监测到的非法扩散的码字、采用组合排除法确定终端用户中的盗版者。 The present invention also provides a method for tracking pirates, which includes: determining the pirates among the terminal users by using the combined exclusion method according to the monitored illegally diffused codewords. the

通过采用组合排除法来追踪盗版者,解决了现有的盗版者追踪的瓶颈问题,即受用户分组数以及用户分组数增加带来的成本、技术实现等条件制约的问题,并且追踪效率高,维护了运营商的利益。 By adopting the combined exclusion method to track pirates, it solves the bottleneck problem of existing pirates tracking, that is, the problem that is restricted by the number of user groups and the increase in the number of user groups, the cost, technical implementation and other conditions, and the tracking efficiency is high. Protect the interests of operators. the

在本发明中,在确定盗版者后,还包括:输出该盗版者。这样,可根据输出的盗版者的信息断开该盗版者终端的连接。 In the present invention, after determining the pirate, it further includes: outputting the pirate. In this way, the pirate terminal can be disconnected according to the output pirate information. the

在本发明中,根据码字、采用组合排除法确定终端用户中的盗版者,可采用如下方式:步骤1,对当前的终端用户进行分组,并对每个分组分配不同的码字;步骤2,监测终端用户非法扩散的码字;步骤3,根据该码字确定当 前共谋者中的至少一个来自该码字所在的分组;步骤4,根据当前共谋组的组合排除嫌疑共谋组的组合,以获得剩余嫌疑共谋组的组合;步骤5,判断该剩余嫌疑共谋组的组合中是否共同存在至少一个共谋者;步骤6,若判断结果为是,则确定该共谋者为盗版者。 In the present invention, according to the code word, the pirates in the terminal users are determined by the combination exclusion method, the following methods can be adopted: Step 1, the current terminal users are grouped, and different code words are assigned to each group; Step 2 , to monitor the code word illegally diffused by the end user; step 3, according to the code word, determine that at least one of the current co-conspirators is from the group where the code word is located; step 4, eliminate the suspected collusion group according to the combination of the current co-conspiracy group to obtain the combination of the remaining suspected colluding groups; step 5, judge whether there is at least one co-conspirator in the combination of the remaining suspected colluding groups; step 6, if the judgment result is yes, determine the co-conspirator for pirates. the

此外,该方法还包括:判断是否找到所有共谋者;若判断结果为是,则说明追踪到所有的盗版者,则追踪过程结束。若判断结果为否,则重复执行步骤1至6直至找到所有的同谋者。 In addition, the method also includes: judging whether all co-conspirators are found; if the judging result is yes, it means that all pirates have been traced, and the tracing process ends. If the judgment result is no, repeat steps 1 to 6 until all accomplices are found. the

以下以结合附图2、3对本发明进行详细说明。 The present invention will be described in detail below in conjunction with accompanying drawings 2 and 3 . the

首先,设该系统共有终端用户数为U,共谋者的人数为T,可以使用的最大用户分组数为G。这样,在追踪开始时,从U个终端用户中任意选择T个都可能是共谋组,记为C,其组合为|C|=C(U,T)。 First, let U be the total number of terminal users in the system, T be the number of co-conspirators, and G be the maximum number of user groups that can be used. In this way, at the beginning of tracking, any selection of T from U end users may be a collusion group, denoted as C, and its combination is |C|=C(U, T). the

步骤201、202、203,追踪开始,在分组单元303将用户均匀分为G组,且分配单元305分别为各个分组分配不同的码字,如分配的码字为{1,2,…,G}; Steps 201, 202, 203, tracking starts, the grouping unit 303 evenly divides users into G groups, and the allocation unit 305 allocates different codewords for each group, for example, the allocated codewords are {1, 2, ..., G };

步骤204,监测单元301监测非法扩散的码字,假如共谋组非法扩散的码字为1;其中,终端用户可通过电话、短信、网络等方式进行扩散; Step 204, the monitoring unit 301 monitors the illegally diffused codeword, if the codeword illegally diffused by the collusion group is 1; wherein, the terminal user can diffuse through telephone, text message, network, etc.;

步骤205,判断单元302根据监测到的这一信息进行判断,获知共谋者中至少有一个来自组1,而不可能全部来自{2,3,…,G}组;根据当前共谋者的组合排除嫌疑共谋者的组合,以获取剩余共谋者的组合,这样,因为当前共谋者的组合为C,而有 

Figure DEST_PATH_GSB00000261818800041
个嫌疑共谋组被排除,即第一步被排除的共谋组合的集合记为C1,这样可获得剩余嫌疑共谋组合的集合为C\C1。用|C1|表示C1的大小,则 
Figure DEST_PATH_GSB00000261818800042
Step 205, the judging unit 302 judges according to the monitored information, and learns that at least one of the co-conspirators is from group 1, and it is impossible for all of them to come from {2, 3, ..., G} group; according to the current co-conspirator's The combination excludes the combination of the suspected co-conspirator to obtain the combination of the remaining co-conspirator. In this way, because the current combination of the co-conspirator is C, and there is
Figure DEST_PATH_GSB00000261818800041
The suspected collusion groups are excluded, that is, the set of the excluded collusion combinations in the first step is recorded as C 1 , so that the set of the remaining suspected collusion combinations can be obtained as C\C 1 . Denote the size of C 1 by |C 1 |, then
Figure DEST_PATH_GSB00000261818800042

步骤206,判断是否能够根据该剩余嫌疑共谋组的组合确定至少一个共谋者,在本实施方式中可采用如下方式:即判断该剩余共谋组的组合中是否共同存在至少一个共谋者; Step 206, judging whether at least one co-conspirator can be determined according to the combination of the remaining suspected colluding groups, in this embodiment, the following method can be adopted: that is, judging whether there is at least one co-conspirator in the combination of the remaining colluding groups ;

步骤207,若判断结果为是,则确定该共谋者为盗版者,这时输出单元304输出该盗版者,断开该盗版者终端与系统的连接; Step 207, if the judgment result is yes, then determine that the co-conspirator is a pirate, at this moment the output unit 304 outputs the pirate, and disconnects the pirate terminal from the system;

在步骤206中,若判断结果为否,说明还不能确定盗版者,则返回步骤201,排出更多的剩余嫌疑用户组,直至能够根据该剩余嫌疑共谋组的组合确定出盗版者。其中,可采用如下方式: In step 206, if the judgment result is negative, indicating that the pirate cannot be determined yet, then return to step 201, and discharge more remaining suspected user groups until the pirate can be determined according to the combination of the remaining suspected colluding groups. Among them, the following methods can be used:

分组单元103根据剩余嫌疑共谋组合对用户进行分组,分配单元305重新分配码字给终端,监测单元301监测被非法扩散的码字;如果监测到被非法泄漏的码字,则根据这一信息排除嫌疑共谋组。记仅根据这一步反馈信息排除的嫌疑共谋组合的集合为B2,则有 

Figure DEST_PATH_GSB00000261818800051
而实际根据这一步可排除的嫌疑组合数可能小于|B2|,因为此次的嫌疑共谋组B2中还可能包括与C1共同的组合,即 
Figure DEST_PATH_GSB00000261818800052
因此,记在此步中能有效排除的嫌疑共谋组的组合为C2,则C2=B2-C1∩B2; The grouping unit 103 groups the users according to the remaining suspected collusion combinations, the allocation unit 305 redistributes the codewords to the terminals, and the monitoring unit 301 monitors the illegally diffused codewords; Exclude the suspected colluding group. Note that the set of suspected collusion combinations excluded based on the feedback information of this step is B 2 , then there is
Figure DEST_PATH_GSB00000261818800051
In fact, the number of suspected combinations that can be excluded according to this step may be less than |B 2 |, because the suspected collusion group B 2 may also include the common combination with C 1 , namely
Figure DEST_PATH_GSB00000261818800052
Therefore, record the combination of suspected colluding groups that can be effectively eliminated in this step as C 2 , then C 2 =B 2 -C 1 ∩B 2 ;

依此类推,记仅根据第i步的反馈信息排除的嫌疑组合的集合为Bi,记实际能在第i步中被有效排除的嫌疑组合的集合记为Ci,那么Bi与Ci的关系如下: By analogy, record the set of suspected combinations excluded only based on the feedback information in step i as B i , and record the set of suspected combinations that can be effectively eliminated in step i as C i , then Bi and C i The relationship is as follows:

C1=B1 C 1 =B 1

C2=B2-C1∩B2 C 2 =B 2 -C 1 ∩B 2

C3=B3-(C1∪C2)∩B3 C 3 =B 3 -(C 1 ∪C 2 )∩B 3

CC ii == BB ii -- (( ∪∪ kk == 11 ii -- 11 CC kk )) ∩∩ BB ii

第i步时,剩余嫌疑共谋组的组合为 

Figure DEST_PATH_GSB00000261818800054
如果能够根据剩余嫌疑组合推断出一个盗版者,则输出该盗版者,断开该盗版者终端与系统的连接; At step i, the combination of the remaining suspected colluding groups is
Figure DEST_PATH_GSB00000261818800054
If a pirate can be deduced according to the remaining suspect combinations, then output the pirate and disconnect the pirate terminal from the system;

步骤208,判断是否找出所有的盗版者,即判断步骤206中的共谋者的数量是否为T,若为T,则说明通过上述步骤找到所有的盗版者,则追踪过程结 束。 Step 208, judging whether to find out all pirates, that is, judging whether the number of co-conspirators in step 206 is T, if it is T, it means that all pirates are found through the above steps, and the tracking process ends. the

若步骤206中所确定的共谋者的数量K小于T,则说明没有找到所有的盗版者,则回到步骤201追踪盗版者。在这种情况下,每次追踪开始,当前终端用户数为U-K,共谋者数为T-K,可以使用的最大用户分组数仍为G。这样,在追踪开始时,从U-K个终端用户中任意选择T-K个都可能是当前共谋组的组合,依此类推,直到U-K=0为止。 If the number K of co-conspirators determined in step 206 is less than T, it means that not all pirates have been found, and then return to step 201 to track pirates. In this case, at the beginning of each trace, the current number of end users is U-K, the number of co-conspirators is T-K, and the maximum number of user groups that can be used is still G. In this way, at the beginning of tracing, any combination of T-K end users selected from U-K end users may be the combination of the current collusion group, and so on until U-K=0. the

由上述可知,在使用上述组合排除法时,每一次被排除的组合数|Ci|接近 

Figure DEST_PATH_GSB00000261818800061
排除的组合数占总组合数的比例称为排除率可为: It can be seen from the above that when using the above combination exclusion method, the number of combinations |C i | to be excluded each time is close to
Figure DEST_PATH_GSB00000261818800061
The ratio of the number of excluded combinations to the total number of combinations is called the exclusion rate, which can be:

rr == || CC ii || || CC || == CC (( GG -- 11 GG Uu ,, TT )) CC (( Uu ,, TT )) ≈≈ (( GG -- 11 GG )) nno

其中,r可以看作组合排除法收敛速度的一个估计。可以看出,追踪的收敛速度随着G的增加而增大,随着T的增加而减小。 Among them, r can be regarded as an estimate of the convergence speed of the combined exclusion method. It can be seen that the convergence speed of tracking increases with the increase of G and decreases with the increase of T. the

因此,由上述实施例可知,该方法解决了现有的盗版者追踪的瓶颈问题,即受用户分组数以及用户分组数增加带来的成本、技术实现等条件制约的问题,并且追踪效率高,维护了运营商的利益。 Therefore, as can be seen from the foregoing embodiments, this method solves the bottleneck problem of existing pirates tracking, that is, the problem of being restricted by the number of user groups and the increase in the number of user groups, the cost, technical implementation and other conditions, and the tracking efficiency is high. Protect the interests of operators. the

下面以实际的例子进行说明。例如,对于一个总用户数为U=100,其中有T=6个用户共谋的问题,可以使用的最大用户分组数为G=5,每组人数各20。 The following is an illustration with a practical example. For example, for a problem where the total number of users is U=100 and there are T=6 users colluding, the maximum number of user groups that can be used is G=5, with 20 people in each group. the

这样,在追踪开始时,从100个终端用户中任意选择6个都可能是共谋组,记为C,其组合为|C|=C(U,T),即 

Figure DEST_PATH_GSB00000261818800063
In this way, at the beginning of tracking, any 6 of the 100 end users may be selected as a collusion group, denoted as C, and its combination is |C|=C(U, T), that is
Figure DEST_PATH_GSB00000261818800063

1)追踪开始,在分组单元303将用户均匀分为5组,且分配单元305分别为各个分组分配不同的码字,如分配的码字为{1,2,3,4,5}; 1) At the beginning of tracking, the grouping unit 303 divides the users evenly into 5 groups, and the allocation unit 305 allocates different codewords for each group respectively, such as the allocated codewords are {1, 2, 3, 4, 5};

2)监测单元301监测非法扩散的码字,假如共谋组非法扩散的码字为1; 2) Monitoring unit 301 monitors the code word of illegal diffusion, if the code word of collusion group illegal diffusion is 1;

3)判断单元302根据监测到的这一信息进行判断,获知共谋者中至少有一个来自组1,而不可能全部来自{2,3,4,5}组;根据当前共谋者的组合 

Figure DEST_PATH_GSB00000261818800064
排 除嫌疑共谋者的组合 
Figure DEST_PATH_GSB00000261818800071
以获取剩余共谋者的组合为 
Figure DEST_PATH_GSB00000261818800072
个; 3) Judgment unit 302 judges according to the monitored information, and learns that at least one of the co-conspirators comes from group 1, and it is impossible for all of them to come from {2, 3, 4, 5} groups; according to the current combination of co-conspirators
Figure DEST_PATH_GSB00000261818800064
Combinations that exclude suspected co-conspirators
Figure DEST_PATH_GSB00000261818800071
To obtain the combination of the remaining colluders as
Figure DEST_PATH_GSB00000261818800072
indivual;

4)判断是否能够根据该剩余嫌疑共谋组的组合确定至少一个共谋者,在本实施方式中可采用如下方式:即判断该剩余共谋组的组合中是否共同存在至少一个共谋者;若判断结果为是,则确定该共谋者为盗版者,这时输出单元304输出该盗版者,断开该盗版者终端与系统的连接; 4) Judging whether at least one co-conspirator can be determined according to the combination of the remaining suspected colluding groups, in this embodiment, the following method can be adopted: that is, judging whether there is at least one co-conspirator in the combination of the remaining suspected colluding groups; If the judgment result is yes, then it is determined that the co-conspirator is a pirate, and at this moment the output unit 304 outputs the pirate, and disconnects the pirate terminal from the system;

5)若判断结果为该剩余共谋组的组合中不存在共谋者,则说明还不能确定盗版者,则重复上述步骤1)-4),排出更多的剩余嫌疑用户组,直至能够根据该剩余嫌疑共谋组的组合确定出盗版者。其中,可采用如下方式: 5) If the judgment result is that there is no co-conspirator in the combination of the remaining colluding groups, it means that the pirate cannot be determined yet, then repeat the above steps 1)-4), and discharge more remaining suspected user groups until it can be determined according to The combination of the remaining suspected colluding groups identifies the pirate. Among them, the following methods can be used:

分组单元103根据剩余嫌疑共谋组合对用户进行分组,分配单元305重新分配码字给终端,监测单元301监测被非法扩散的码字;如果监测到被非法泄漏的码字,则根据这一信息排除嫌疑共谋组。记仅根据这一步的反馈信息排除的嫌疑共谋组合的集合为B2,则有 

Figure DEST_PATH_GSB00000261818800073
而实际根据这一步可排除的嫌疑组合数可能小于 
Figure DEST_PATH_GSB00000261818800074
因为此次的嫌疑共谋组B2中还可能包括与C1共同的组合,即 
Figure DEST_PATH_GSB00000261818800075
因此,记在此步中能有效排除的嫌疑共谋组的组合为C2,则C2=B2-C1∩B2; The grouping unit 103 groups the users according to the remaining suspected collusion combinations, the allocation unit 305 redistributes the codewords to the terminals, and the monitoring unit 301 monitors the illegally diffused codewords; Exclude the suspected colluding group. Note that the set of suspected collusion combinations excluded only based on the feedback information of this step is B 2 , then we have
Figure DEST_PATH_GSB00000261818800073
In fact, the number of suspected combinations that can be excluded according to this step may be less than
Figure DEST_PATH_GSB00000261818800074
Because the suspected conspiracy group B 2 may also include a combination with C 1 , namely
Figure DEST_PATH_GSB00000261818800075
Therefore, record the combination of suspected colluding groups that can be effectively eliminated in this step as C 2 , then C 2 =B 2 -C 1 ∩B 2 ;

依此类推,记仅根据第i步的反馈信息排除的嫌疑组合的集合为Bi,记实际在第i步中被有效排除的嫌疑组合的集合记为Ci,那么Bi与Ci的关系如下: By analogy, record the set of suspected combinations excluded only based on the feedback information in the i-th step as B i , record the set of suspected combinations that are effectively excluded in the i-th step as C i , then the relationship between Bi and C i The relationship is as follows:

C1=B1 C 1 =B 1

C2=B2-C1∩B2 C 2 =B 2 -C 1 ∩B 2

C3=B3-(C1∪C2)∩B3 C 3 =B 3 -(C 1 ∪C 2 )∩B 3

CC ii == BB ii -- (( ∪∪ kk == 11 ii -- 11 CC kk )) ∩∩ BB ii

第i步时,剩余嫌疑共谋组的组合为 

Figure DEST_PATH_GSB00000261818800077
如果能够根据剩余嫌疑组合推断出一个盗版者,则输出该盗版者,断开该盗版者终端与系统的连接; At step i, the combination of the remaining suspected colluding groups is
Figure DEST_PATH_GSB00000261818800077
If a pirate can be deduced according to the remaining suspect combinations, then output the pirate and disconnect the pirate terminal from the system;

6)判断是否找出所有的6个盗版者,即判断5)中的共谋者的数量是否为 6,若为6,则说明通过上述步骤找到所有的盗版者,则追踪过程结束。 6) Judging whether to find out all 6 pirates, that is, judging whether the number of co-conspirators in 5) is 6, if it is 6, it means that all pirates are found through the above steps, and the tracking process ends. the

若步骤5)中所确定的共谋者的数量K小于6,则说明没有找到所有的盗版者,则重复步骤1-5)来追踪盗版者。在这种情况下,每次追踪开始,当前终端用户数为100-K,共谋者数为6-K,可以使用的最大用户分组数仍为G。这样,在追踪开始时,从100-K个终端用户中任意选择6-K个都可能是当前共谋组的组合,依此类推,直到6-K=0为止。 If the number K of co-conspirators determined in step 5) is less than 6, it means that not all pirates have been found, and steps 1-5) are repeated to track pirates. In this case, at the beginning of each trace, the current number of end users is 100-K, the number of co-conspirators is 6-K, and the maximum number of user groups that can be used is still G. In this way, at the beginning of the trace, any combination of 6-K end users selected from 100-K end users may be the combination of the current collusion group, and so on until 6-K=0. the

以上所述的具体实施例,对本发明的目的、技术方案和有益效果进行了进一步详细说明,所应理解的是,以上所述仅为本发明的具体实施例而已,并不用于限定本发明的保护范围,凡在本发明的精神和原则之内,所做的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。 The specific embodiments described above have further described the purpose, technical solutions and beneficial effects of the present invention in detail. It should be understood that the above descriptions are only specific embodiments of the present invention and are not intended to limit the scope of the present invention. Protection scope, within the spirit and principles of the present invention, any modification, equivalent replacement, improvement, etc., shall be included in the protection scope of the present invention. the

Claims (6)

1. A method for tracking a pirate, the method comprising: determining pirates in the terminal users by adopting a combined elimination method according to the monitored illegally spread code words,
wherein the determining of the pirate in the end user by adopting a combined elimination method according to the code words comprises:
step 1, grouping the current terminal users and distributing different code words to each group;
step 2, monitoring illegal diffused code words of the terminal user;
step 3, determining at least one of the current colluders from the group where the code word is located according to the code word;
step 4, eliminating the combination of the suspected collusion group in the combination C (U, T) of the current collusion group
Figure FSB00000261818700011
To obtain the combination C \ C of the remaining suspected collusion groups1Wherein U is a terminal user, T is the number of any possible colluders, G is the number of groups into which the U terminal users are divided, C \ C1To exclude combination C from combination C1
Step 5, judging whether at least one colluder exists in the combination of the remaining suspected collusion groups;
step 6, if the judgment result is yes, the collusion person is determined to be a pirate;
and 7, if the judgment result is negative, grouping the terminal users according to the combination of the remaining suspected collusion groups, performing the steps 2 to 5, and repeating the steps until at least one colluder exists in the combination of the remaining suspected collusion groups.
2. The method of claim 1, further comprising: and outputting the pirate.
3. The method of claim 1, further comprising:
judging whether all colluders are found;
if the judgment result is yes, the tracking is finished.
4. The method of claim 3, wherein if the determination of whether all colluders are found is negative, then repeating steps 1 through 7 until all colluders are found.
5. A pirate tracing system comprises a plurality of terminals; characterized in that, the system also includes:
the monitoring unit is used for monitoring the code words illegally spread by the terminal user;
the tracking unit is connected with the monitoring unit and used for determining a pirate in the terminal user by adopting a combination elimination method according to the monitored code word;
the grouping unit is connected with the tracking unit and used for grouping the current terminal user according to the tracking result of the tracking unit and transmitting the grouping result to the distribution unit;
the distribution unit is connected with the grouping unit and the terminal and used for distributing different code words to each group according to the grouping result and sending the code words to the terminal;
the device also comprises a judging unit which is respectively connected with the grouping unit and the monitoring unit, and the judging unit carries out the following processing:
exclusion of combinations of suspect collusion groups in combinations C (U, T) of current collusion groups
Figure FSB00000261818700021
To obtain the combination C \ C of the remaining suspected collusion groups1Wherein U is a terminal user, T is the number of any possible colluders, G is the number of groups into which the U terminal users are divided, C \ C1To exclude combination C from combination C1(ii) a Judging whether at least one colluder exists in the combination of the remaining suspected collusion groups; if the judgment result is yes, the colluder is determined to be a pirate, if the judgment result is no, the grouping unit is used for grouping the terminal user according to the combination of the remaining suspected collusion groups, and the judgment unit repeats the processing until at least one colluder commonly exists in the combination of the remaining suspected collusion groups.
6. The system of claim 5, further comprising an output unit coupled to the tracking unit for outputting the pirate.
CN2008100836361A 2008-03-12 2008-03-12 Pirate Tracking Method and System Expired - Fee Related CN101534429B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2008100836361A CN101534429B (en) 2008-03-12 2008-03-12 Pirate Tracking Method and System

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2008100836361A CN101534429B (en) 2008-03-12 2008-03-12 Pirate Tracking Method and System

Publications (2)

Publication Number Publication Date
CN101534429A CN101534429A (en) 2009-09-16
CN101534429B true CN101534429B (en) 2011-02-09

Family

ID=41104779

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2008100836361A Expired - Fee Related CN101534429B (en) 2008-03-12 2008-03-12 Pirate Tracking Method and System

Country Status (1)

Country Link
CN (1) CN101534429B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US12225023B2 (en) * 2022-10-11 2025-02-11 Dell Products L.P. Revealing byzantine attackers through smart re-clustering in federated learning

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1442978A (en) * 2002-01-28 2003-09-17 株式会社东芝 Data communication system, encryption device and deciphering device
CN1554163A (en) * 2001-01-26 2004-12-08 �Ҵ���˾ Method for tracing traitor receivers in a broadcast encryption system
CN1991853A (en) * 2005-12-30 2007-07-04 国际商业机器公司 Method and system for tracing traitor in a broadcast encryption system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1554163A (en) * 2001-01-26 2004-12-08 �Ҵ���˾ Method for tracing traitor receivers in a broadcast encryption system
CN1442978A (en) * 2002-01-28 2003-09-17 株式会社东芝 Data communication system, encryption device and deciphering device
CN1991853A (en) * 2005-12-30 2007-07-04 国际商业机器公司 Method and system for tracing traitor in a broadcast encryption system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
JP特开2003-289296A 2003.10.10

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US12225023B2 (en) * 2022-10-11 2025-02-11 Dell Products L.P. Revealing byzantine attackers through smart re-clustering in federated learning

Also Published As

Publication number Publication date
CN101534429A (en) 2009-09-16

Similar Documents

Publication Publication Date Title
CN1168304C (en) Global copy protection system for digital home networks
KR100448888B1 (en) Broadcasting server system for protection and management of digital broadcasting contents, processing method in its
CN1241350C (en) Key allocation method and device in conditional receiving system
US20170118537A1 (en) Adaptive watermarking for streaming data
US20040199771A1 (en) Method for tracing a security breach in highly distributed content
JP5161372B2 (en) How to enforce reception rules for broadcast programs by the Administration Center
KR101705010B1 (en) Processing recordable content in a stream
CN1282489A (en) Mehtod for protecting audio-visual data across NRSS interface
JP2012503389A5 (en)
CN102427561A (en) Method for preventing VOD program from illegal transmission and sharing
CN105245944A (en) DVB (Digital Video Broadcasting)-based multi-terminal program playing method and system, set top box and mobile terminal
CN105898419A (en) Program payment method and system based on set top box
CN103503464B (en) Method of identifying the origin of a security module in a pay television decoder system
AU2010353927B2 (en) Information Transmission Method, System and Data Card
CN101534429B (en) Pirate Tracking Method and System
CN101282473A (en) A Method for Realizing Digital TV Copyright Management
EP2805328B1 (en) Distributing content to multiple receivers using multicast channels
CN1867066A (en) Digital television program broadcasting system and method
JP4422437B2 (en) License information transmitting apparatus and license information receiving apparatus
CN103988513B (en) For method, encryption system and the security module of the content packet for descrambling digital transport stream
KR101175354B1 (en) System and method for securing content by using a number of conditional access systems
US20130145147A1 (en) Content Protection Method
CN112153417B (en) A kind of content scrambling protection method and system for streaming media content copyright
JP5132651B2 (en) License information transmitting apparatus and license information transmitting program
CN101729746B (en) Televiewing control method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20110209