CN101534429B - Pirate Tracking Method and System - Google Patents
Pirate Tracking Method and System Download PDFInfo
- Publication number
- CN101534429B CN101534429B CN2008100836361A CN200810083636A CN101534429B CN 101534429 B CN101534429 B CN 101534429B CN 2008100836361 A CN2008100836361 A CN 2008100836361A CN 200810083636 A CN200810083636 A CN 200810083636A CN 101534429 B CN101534429 B CN 101534429B
- Authority
- CN
- China
- Prior art keywords
- combination
- unit
- pirate
- groups
- tracking
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000000034 method Methods 0.000 title claims abstract description 46
- 230000008030 elimination Effects 0.000 claims abstract description 9
- 238000003379 elimination reaction Methods 0.000 claims abstract description 9
- 238000012544 monitoring process Methods 0.000 claims description 15
- 230000007717 exclusion Effects 0.000 claims description 9
- 238000012545 processing Methods 0.000 claims description 4
- 238000005516 engineering process Methods 0.000 abstract description 5
- 238000009792 diffusion process Methods 0.000 description 4
- 238000010586 diagram Methods 0.000 description 3
- 230000009286 beneficial effect Effects 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 206010035148 Plague Diseases 0.000 description 1
- 241000607479 Yersinia pestis Species 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000007423 decrease Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
Images
Landscapes
- Television Systems (AREA)
- Compression Or Coding Systems Of Tv Signals (AREA)
Abstract
Description
技术领域technical field
本发明关于数字电视的盗版者追踪技术,特别关于一种盗版者追踪方法和系统。 The invention relates to the digital TV pirate tracking technology, in particular to a pirate tracking method and system. the
背景技术Background technique
随着互联网视频技术和数字电视的发展,以及媒体内容的丰富,用户付费订制自己喜欢的视频节目的数字电视运营模式已经出现并逐步推广,视频内容提供商也更倾向于利用数字电视系统发布节目。数字电视系统中,视频节目经过加密后对所有用户广播,每一位用户在接收端都有解密装置,如果一位用户订阅了某节目,则其对应的解密装置可以恢复该节目的明文,如果没有订阅节目,则解密装置无法对节目进行解密,丢弃节目包。 With the development of Internet video technology and digital TV, as well as the richness of media content, the digital TV operation mode in which users pay to order their favorite video programs has emerged and gradually popularized, and video content providers are more inclined to use digital TV systems to release programme. In the digital TV system, video programs are broadcasted to all users after being encrypted. Each user has a decryption device at the receiving end. If a user subscribes to a certain program, the corresponding decryption device can recover the plaintext of the program. If If no program is subscribed, the decryption device cannot decrypt the program, and the program package is discarded. the
然而,用户的盗版问题成为制约数字电视产业发展的一大问题。在数字电视这种广播模式下的盗版行为,主要是盗版者通过攻击解密装置获得节目解密密钥并将其非法扩散。用户盗版问题会成为困扰数字电视节目运营商的重要问题。如果不能有效的解决这个问题,付费收看节目的模式就可能会受到严重的影响。因此,存在叛逆者追踪技术(Traitor Tracing),用于反盗版。其中, However, user piracy has become a major problem restricting the development of the digital TV industry. Piracy in the broadcasting mode of digital TV is mainly that pirates obtain program decryption keys by attacking decryption devices and illegally distribute them. The problem of user piracy will become an important problem that plagues digital TV program operators. If this problem cannot be effectively solved, the mode of paying to watch programs may be seriously affected. Therefore, Traitor Tracing exists for anti-piracy. in,
图1为相关技术中动态叛逆者追踪示意图。其中,利用盗版者的反馈信息缩短追踪到叛逆者所需要的时间。 FIG. 1 is a schematic diagram of dynamic traitor tracking in the related art. Among them, the feedback information from pirates is used to shorten the time required to track down traitors. the
如图1所示,该系统中存在的终端用户的总数为n,发行商对用户进行分组,并为每个组分发相同的码字,不同的用户组分发的码字不同。几个合谋的盗版用户会从其得到的码字中选一个进行非法扩散。发行商监测被非法扩散的码字,推断出该码字来自哪个用户组,然后结合以前的码字泄露信息和 分组信息推断盗版用户。如果无法判断,则根据这些信息对用户的分组进行调整,重新分发码字并进行监测,直到收集的信息足以推断出盗版者。 As shown in Figure 1, the total number of end users in the system is n, and the publisher divides users into groups and distributes the same codewords to each group. Different user groups distribute different codewords. Several colluding pirate users will choose one of the codewords they get to carry out illegal diffusion. The publisher monitors the illegally diffused codewords, infers which user group the codewords come from, and then infers pirated users by combining the previous codeword leak information and group information. If it cannot be judged, adjust the grouping of users based on this information, redistribute codewords and monitor until the collected information is sufficient to deduce the pirate. the
上述“码字”是一个抽象的概念,该码字可以是对同一个节目的不同解密密钥,也可以是嵌有不同指纹信息的媒体文件。 The above-mentioned "codeword" is an abstract concept, and the codeword can be different decryption keys for the same program, or a media file embedded with different fingerprint information. the
在相关技术中,判断盗版者时可采用二叉树(或多叉树)搜索的方式来确定盗版用户,只有当用户分组数大于合谋用户数时,才可能构造出确定性追踪策略。以最大用户分组数r与盗版用户数上界p的关系满足r=2p+1的情况为例,该追踪策略利用一个用户组I存储可能的无辜用户,而用剩余的2p个用户组存储可能的p个盗版用户,每个用户组对{Li,Ri}中的用户中至少有一个盗版用户。如果监测到的非法扩散码字是分配给I的码字,则将I分为用户数相同的Li和Ri两部分,并将I置空;如果监测到的码字是分配给Li的,则将Ri与I合并,将Li分为Li和Ri两部分;如果监测到的码字来自Ri,则将Li与I合并,将Ri分为Li和Ri两部分。每经过一步,就会有一个用户组中的用户数减半,直到分配给某个只包含一个用户的用户组的码字被监测到,则追踪到一个盗版用户,把该用户从系统断开,并继续上述步骤,直到所有盗版用户被追踪到。 In related technologies, when judging pirates, a binary tree (or multi-tree) search method can be used to determine pirate users. Only when the number of user groups is greater than the number of colluding users can a deterministic tracking strategy be constructed. Taking the case where the relationship between the maximum number of user groups r and the upper bound p of the number of pirated users satisfies r=2p+1 as an example, this tracking strategy uses one user group I to store possible innocent users, and uses the remaining 2p user groups to store possible innocent users. There are p pirated users, each user group pair {Li, Ri} has at least one pirated user. If the monitored illegal diffusion codeword is the codeword assigned to I, then I is divided into two parts Li and Ri with the same number of users, and I is empty; if the monitored codeword is assigned to Li, then Merge Ri with I, and divide Li into two parts, Li and Ri; if the detected codeword comes from Ri, combine Li with I, and divide Ri into two parts, Li and Ri. After each step, the number of users in a user group will be halved until the codeword assigned to a user group containing only one user is detected, then a pirated user will be tracked down and the user will be disconnected from the system , and continue the above steps until all pirated users are traced. the
在上述r=2p+1的动态追踪策略中,搜索过程最初几步的分组数通常远远小于最大分组数r。而在实际应用中,由于多解密密钥系统设计的复杂性或传输带宽的限制,最大分组数往往受到限制,或者说,要增加最大分组数必须付出较高的代价,因此,上述动态追踪策略不能充分地利用既定的系统条件,导致搜索效率受到影响。 In the above dynamic tracking strategy of r=2p+1, the number of groups in the first few steps of the search process is usually much smaller than the maximum number of groups r. In practical applications, due to the complexity of multi-decryption key system design or the limitation of transmission bandwidth, the maximum number of packets is often limited, or in other words, a higher price must be paid to increase the maximum number of packets. Therefore, the above dynamic tracking strategy The established system conditions cannot be fully utilized, resulting in affected search efficiency. the
发明内容Contents of the invention
本发明的目的在于提供一种盗版者追踪方法,该方法是采用组合排除法来追踪盗版者,解决了现有的盗版者追踪的瓶颈问题,即受用户分组数以及用户分组数增加带来的成本、技术实现等条件制约的问题,并且追踪效率高, 维护了运营商的利益。 The object of the present invention is to provide a method for tracking pirates, the method is to use the combined elimination method to track pirates, solve the existing bottleneck problem of pirates tracking, that is, the number of user groups and the increase in the number of user groups brought Cost, technology implementation and other conditions are constrained, and the tracking efficiency is high, safeguarding the interests of operators. the
本发明的目的还在于提供一种盗版者追踪系统,通过该系统解决了现有的盗版者追踪的瓶颈问题,追踪效率高;并且维护了运营商的利益。 The purpose of the present invention is also to provide a pirate tracking system, through which the existing bottleneck problem of pirate tracking is solved, the tracking efficiency is high, and the interests of operators are maintained. the
为实现上述目的,本发明提供一种盗版者追踪方法,该方法包括:根据监测到的非法扩散的码字、采用组合排除法确定终端用户中的盗版者,其中所述根据码字、采用组合排除法确定终端用户中的盗版者,包括: In order to achieve the above object, the present invention provides a method for tracking pirates. The method includes: determining the pirates among the end users according to the monitored illegally diffused codewords and using a combination exclusion method, wherein the method is based on the codewords, using a combination of Elimination methods to identify pirates among end users include:
步骤1,对当前所述终端用户进行分组,并对每个分组分配不同的码字; Step 1, grouping the current terminal users, and assigning different codewords to each group;
步骤2,监测终端用户非法扩散的码字; Step 2, monitoring codewords illegally diffused by end users;
步骤3,根据所述码字确定当前共谋者中的至少一个来自该码字所在的分组; Step 3, according to the codeword, determine that at least one of the current co-conspirators is from the group where the codeword is located;
步骤4,在当前共谋组的组合C(U,T)中排除嫌疑共谋组的组合 以获得剩余嫌疑共谋组的组合C\C1,其中U为终端用户,T为任意可能的共谋者的数量,G为将所述U个终端用户分成的组数,C\C1为在组合C中排除组合C1; Step 4, exclude the combination of the suspected colluding group from the combination C(U, T) of the current colluding group To obtain the combination C\C 1 of the remaining suspected colluding groups, where U is the terminal user, T is the number of any possible co-conspirator, G is the number of groups that divide the U terminal users into, and C\C 1 is Exclude combination C1 from combination C;
附图说明Description of drawings
步骤5,判断该剩余嫌疑共谋组的组合中是否共同存在至少一个共谋者; Step 5, judging whether there is at least one co-conspirator in the combination of the remaining suspected colluding groups;
步骤6,若判断结果为是,则确定该共谋者为盗版者; Step 6, if the judgment result is yes, then determine that the co-conspirator is a pirate;
步骤7,若判断结果为否,则根据剩余嫌疑共谋组的组合对所述终端用户分组,进行步骤2至5,重复上述步骤直至该剩余嫌疑共谋组的组合中共同存在至少一个共谋者。 Step 7, if the judgment result is no, group the terminal users according to the combination of the remaining suspected collusion groups, perform steps 2 to 5, and repeat the above steps until at least one collusion exists in the combination of the remaining suspected collusion groups By. the
为实现上述目的,本发明还提供一种盗版者追踪系统,该系统包括多个终端,终端具体可理解为与某IC卡结合的机顶盒或用户;其中,该系统还包括: In order to achieve the above object, the present invention also provides a pirate tracking system, the system includes a plurality of terminals, and the terminal can be specifically understood as a set-top box or a user combined with a certain IC card; wherein, the system also includes:
监测单元,该监测单元用于监测终端用户非法扩散的码字; A monitoring unit, which is used to monitor codewords illegally diffused by end users;
追踪单元,与所述监测单元连接,用于根据监测到的所述码字采用组合排除法确定终端用户中的盗版者; A tracking unit, connected to the monitoring unit, is used to determine the pirates among the end users by using the combined elimination method according to the monitored codewords;
分组单元,该分组单元与所述追踪单元连接,用于根据追踪单元的追踪 结果,对当前终端用户进行分组,并将分组结果传送至所述分配单元; A grouping unit, the grouping unit is connected to the tracking unit, and is used to group the current end users according to the tracking results of the tracking unit, and transmit the grouping results to the distribution unit;
分配单元,该分配单元与所述分组单元和终端连接,用于根据该分组结果为每个分组分配不同的码字,并将该码字发送至所述终端 An allocation unit, which is connected to the grouping unit and the terminal, and is used to allocate a different codeword for each group according to the grouping result, and send the codeword to the terminal
还包括判断单元,分别与所述分组单元和监测单元相连接,所述判断单元进行以下处理: It also includes a judging unit, which is respectively connected to the grouping unit and the monitoring unit, and the judging unit performs the following processing:
在当前共谋组的组合C(U,T)中排除嫌疑共谋组的组合 以获得剩余嫌疑共谋组的组合C\C1,其中U为终端用户,T为任意可能的共谋者的数量,G为将所述U个终端用户分成的组数,C\C1为在组合C中排除组合C1;判断该剩余嫌疑共谋组的组合中是否共同存在至少一个共谋者;若判断结果为是,则确定该共谋者为盗版者,若判断结果为否,则利用分组单元根据剩余嫌疑共谋组的组合对所述终端用户分组,所述判断单元重复上述处理直至该剩余嫌疑共谋组的组合中共同存在至少一个共谋者。 Exclude the combination of the suspected collusion group from the combination C(U, T) of the current collusion group To obtain the combination C\C 1 of the remaining suspected colluding groups, where U is the terminal user, T is the number of any possible co-conspirator, G is the number of groups that divide the U terminal users into, and C\C 1 is Exclude combination C1 from combination C; judge whether there is at least one co-conspirator in the combination of the remaining suspected colluding groups; if the judgment result is yes, then determine that the co-conspirator is a pirate; Using the grouping unit to group the end users according to the combination of the remaining suspected colluding groups, the judging unit repeats the above processing until at least one co-conspirator exists in the combination of the remaining suspected colluding groups.
本发明的有益效果在于,采用组合排除法来追踪盗版者,解决了现有的盗版者追踪的瓶颈问题,即受用户分组数以及用户分组数增加带来的成本、技术实现等条件制约的问题,并且追踪效率高;并且维护了运营商的利益。 The beneficial effect of the present invention is that the combination exclusion method is used to track the pirates, which solves the bottleneck problem of the existing pirates tracking, that is, the problem restricted by the number of user groups and the increase in the number of user groups, the cost, technical realization and other conditions. , and the tracking efficiency is high; and the interests of operators are maintained. the
此处所说明的附图用来提供对本发明的进一步理解,构成本申请的一部分,并不构成对本发明的限定。在附图中: The drawings described here are used to provide further understanding of the present invention, constitute a part of the application, and do not limit the present invention. In the attached picture:
图1是相关技术中盗版者追踪系统结构示意图; Fig. 1 is a schematic structural diagram of a pirate tracking system in the related art;
图2是本发明实施盗版者追踪方法流程图; Fig. 2 is that the present invention implements the flow chart of pirate's tracking method;
图3是本发明实施方式盗版者追踪系统结构示意图。 Fig. 3 is a schematic structural diagram of a system for tracking pirates according to an embodiment of the present invention. the
具体实施方式Detailed ways
为使本发明的目的、技术方案和优点更加清楚明白,下面结合实施例和附图,对本发明做进一步详细说明。在此,本发明的示意性实施例及其说明 用于解释本发明,但并不作为对本发明的限定。 In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the embodiments and accompanying drawings. Here, the exemplary embodiments of the present invention and their descriptions are used to explain the present invention, but not to limit the present invention. the
本发明提供一种盗版者追踪系统,如图3所示,该系统包括多个终端;此外,该系统还包括: The present invention provides a pirate tracking system, as shown in Figure 3, the system includes a plurality of terminals; in addition, the system also includes:
监测单元301,用于监测终端用户非法扩散的码字;追踪单元302,与监测单元301连接,用于根据监测到的该码字采用组合排除法确定终端用户中的盗版者。 The
由上述可知,通过采用组合排除法来追踪盗版者,解决了现有的盗版者追踪的瓶颈问题,追踪效率高,维护了运营商的利益。 From the above, it can be seen that the existing bottleneck problem of pirate tracking is solved by adopting the combined elimination method to track pirates, the tracking efficiency is high, and the interests of operators are maintained. the
其中,终端可为与某IC卡结合的机顶盒。 Wherein, the terminal may be a set-top box combined with an IC card. the
此外,在本实施方式中,该系统还包括分组单元303和分配单元305;其中,分组单元303与追踪单元302连接,用于根据追踪单元302的追踪结果,对当前终端用户进行分组,并将分组结果传送至分配单元305; In addition, in this embodiment, the system also includes a
分配单元305,用于根据分组单元303的分组结果为每个分组分配不同的码字,并将该码字发送至终端。 The
如图3所示,该系统还包括输出单元304,该输出单元304与追踪单元302连接,用于输出追踪到的盗版者。 As shown in FIG. 3 , the system further includes an
本发明还提供一种盗版者追踪方法,该方法包括:根据监测到的非法扩散的码字、采用组合排除法确定终端用户中的盗版者。 The present invention also provides a method for tracking pirates, which includes: determining the pirates among the terminal users by using the combined exclusion method according to the monitored illegally diffused codewords. the
通过采用组合排除法来追踪盗版者,解决了现有的盗版者追踪的瓶颈问题,即受用户分组数以及用户分组数增加带来的成本、技术实现等条件制约的问题,并且追踪效率高,维护了运营商的利益。 By adopting the combined exclusion method to track pirates, it solves the bottleneck problem of existing pirates tracking, that is, the problem that is restricted by the number of user groups and the increase in the number of user groups, the cost, technical implementation and other conditions, and the tracking efficiency is high. Protect the interests of operators. the
在本发明中,在确定盗版者后,还包括:输出该盗版者。这样,可根据输出的盗版者的信息断开该盗版者终端的连接。 In the present invention, after determining the pirate, it further includes: outputting the pirate. In this way, the pirate terminal can be disconnected according to the output pirate information. the
在本发明中,根据码字、采用组合排除法确定终端用户中的盗版者,可采用如下方式:步骤1,对当前的终端用户进行分组,并对每个分组分配不同的码字;步骤2,监测终端用户非法扩散的码字;步骤3,根据该码字确定当 前共谋者中的至少一个来自该码字所在的分组;步骤4,根据当前共谋组的组合排除嫌疑共谋组的组合,以获得剩余嫌疑共谋组的组合;步骤5,判断该剩余嫌疑共谋组的组合中是否共同存在至少一个共谋者;步骤6,若判断结果为是,则确定该共谋者为盗版者。 In the present invention, according to the code word, the pirates in the terminal users are determined by the combination exclusion method, the following methods can be adopted: Step 1, the current terminal users are grouped, and different code words are assigned to each group; Step 2 , to monitor the code word illegally diffused by the end user; step 3, according to the code word, determine that at least one of the current co-conspirators is from the group where the code word is located; step 4, eliminate the suspected collusion group according to the combination of the current co-conspiracy group to obtain the combination of the remaining suspected colluding groups; step 5, judge whether there is at least one co-conspirator in the combination of the remaining suspected colluding groups; step 6, if the judgment result is yes, determine the co-conspirator for pirates. the
此外,该方法还包括:判断是否找到所有共谋者;若判断结果为是,则说明追踪到所有的盗版者,则追踪过程结束。若判断结果为否,则重复执行步骤1至6直至找到所有的同谋者。 In addition, the method also includes: judging whether all co-conspirators are found; if the judging result is yes, it means that all pirates have been traced, and the tracing process ends. If the judgment result is no, repeat steps 1 to 6 until all accomplices are found. the
以下以结合附图2、3对本发明进行详细说明。 The present invention will be described in detail below in conjunction with accompanying drawings 2 and 3 . the
首先,设该系统共有终端用户数为U,共谋者的人数为T,可以使用的最大用户分组数为G。这样,在追踪开始时,从U个终端用户中任意选择T个都可能是共谋组,记为C,其组合为|C|=C(U,T)。 First, let U be the total number of terminal users in the system, T be the number of co-conspirators, and G be the maximum number of user groups that can be used. In this way, at the beginning of tracking, any selection of T from U end users may be a collusion group, denoted as C, and its combination is |C|=C(U, T). the
步骤201、202、203,追踪开始,在分组单元303将用户均匀分为G组,且分配单元305分别为各个分组分配不同的码字,如分配的码字为{1,2,…,G};
步骤204,监测单元301监测非法扩散的码字,假如共谋组非法扩散的码字为1;其中,终端用户可通过电话、短信、网络等方式进行扩散;
步骤205,判断单元302根据监测到的这一信息进行判断,获知共谋者中至少有一个来自组1,而不可能全部来自{2,3,…,G}组;根据当前共谋者的组合排除嫌疑共谋者的组合,以获取剩余共谋者的组合,这样,因为当前共谋者的组合为C,而有 个嫌疑共谋组被排除,即第一步被排除的共谋组合的集合记为C1,这样可获得剩余嫌疑共谋组合的集合为C\C1。用|C1|表示C1的大小,则
步骤206,判断是否能够根据该剩余嫌疑共谋组的组合确定至少一个共谋者,在本实施方式中可采用如下方式:即判断该剩余共谋组的组合中是否共同存在至少一个共谋者;
步骤207,若判断结果为是,则确定该共谋者为盗版者,这时输出单元304输出该盗版者,断开该盗版者终端与系统的连接;
在步骤206中,若判断结果为否,说明还不能确定盗版者,则返回步骤201,排出更多的剩余嫌疑用户组,直至能够根据该剩余嫌疑共谋组的组合确定出盗版者。其中,可采用如下方式: In
分组单元103根据剩余嫌疑共谋组合对用户进行分组,分配单元305重新分配码字给终端,监测单元301监测被非法扩散的码字;如果监测到被非法泄漏的码字,则根据这一信息排除嫌疑共谋组。记仅根据这一步反馈信息排除的嫌疑共谋组合的集合为B2,则有 而实际根据这一步可排除的嫌疑组合数可能小于|B2|,因为此次的嫌疑共谋组B2中还可能包括与C1共同的组合,即 因此,记在此步中能有效排除的嫌疑共谋组的组合为C2,则C2=B2-C1∩B2; The grouping unit 103 groups the users according to the remaining suspected collusion combinations, the
依此类推,记仅根据第i步的反馈信息排除的嫌疑组合的集合为Bi,记实际能在第i步中被有效排除的嫌疑组合的集合记为Ci,那么Bi与Ci的关系如下: By analogy, record the set of suspected combinations excluded only based on the feedback information in step i as B i , and record the set of suspected combinations that can be effectively eliminated in step i as C i , then Bi and C i The relationship is as follows:
C1=B1 C 1 =B 1
C2=B2-C1∩B2 C 2 =B 2 -C 1 ∩B 2
C3=B3-(C1∪C2)∩B3 C 3 =B 3 -(C 1 ∪C 2 )∩B 3
第i步时,剩余嫌疑共谋组的组合为 如果能够根据剩余嫌疑组合推断出一个盗版者,则输出该盗版者,断开该盗版者终端与系统的连接; At step i, the combination of the remaining suspected colluding groups is If a pirate can be deduced according to the remaining suspect combinations, then output the pirate and disconnect the pirate terminal from the system;
步骤208,判断是否找出所有的盗版者,即判断步骤206中的共谋者的数量是否为T,若为T,则说明通过上述步骤找到所有的盗版者,则追踪过程结 束。
若步骤206中所确定的共谋者的数量K小于T,则说明没有找到所有的盗版者,则回到步骤201追踪盗版者。在这种情况下,每次追踪开始,当前终端用户数为U-K,共谋者数为T-K,可以使用的最大用户分组数仍为G。这样,在追踪开始时,从U-K个终端用户中任意选择T-K个都可能是当前共谋组的组合,依此类推,直到U-K=0为止。 If the number K of co-conspirators determined in
由上述可知,在使用上述组合排除法时,每一次被排除的组合数|Ci|接近 排除的组合数占总组合数的比例称为排除率可为: It can be seen from the above that when using the above combination exclusion method, the number of combinations |C i | to be excluded each time is close to The ratio of the number of excluded combinations to the total number of combinations is called the exclusion rate, which can be:
其中,r可以看作组合排除法收敛速度的一个估计。可以看出,追踪的收敛速度随着G的增加而增大,随着T的增加而减小。 Among them, r can be regarded as an estimate of the convergence speed of the combined exclusion method. It can be seen that the convergence speed of tracking increases with the increase of G and decreases with the increase of T. the
因此,由上述实施例可知,该方法解决了现有的盗版者追踪的瓶颈问题,即受用户分组数以及用户分组数增加带来的成本、技术实现等条件制约的问题,并且追踪效率高,维护了运营商的利益。 Therefore, as can be seen from the foregoing embodiments, this method solves the bottleneck problem of existing pirates tracking, that is, the problem of being restricted by the number of user groups and the increase in the number of user groups, the cost, technical implementation and other conditions, and the tracking efficiency is high. Protect the interests of operators. the
下面以实际的例子进行说明。例如,对于一个总用户数为U=100,其中有T=6个用户共谋的问题,可以使用的最大用户分组数为G=5,每组人数各20。 The following is an illustration with a practical example. For example, for a problem where the total number of users is U=100 and there are T=6 users colluding, the maximum number of user groups that can be used is G=5, with 20 people in each group. the
这样,在追踪开始时,从100个终端用户中任意选择6个都可能是共谋组,记为C,其组合为|C|=C(U,T),即 In this way, at the beginning of tracking, any 6 of the 100 end users may be selected as a collusion group, denoted as C, and its combination is |C|=C(U, T), that is
1)追踪开始,在分组单元303将用户均匀分为5组,且分配单元305分别为各个分组分配不同的码字,如分配的码字为{1,2,3,4,5}; 1) At the beginning of tracking, the
2)监测单元301监测非法扩散的码字,假如共谋组非法扩散的码字为1; 2)
3)判断单元302根据监测到的这一信息进行判断,获知共谋者中至少有一个来自组1,而不可能全部来自{2,3,4,5}组;根据当前共谋者的组合 排 除嫌疑共谋者的组合 以获取剩余共谋者的组合为 个; 3)
4)判断是否能够根据该剩余嫌疑共谋组的组合确定至少一个共谋者,在本实施方式中可采用如下方式:即判断该剩余共谋组的组合中是否共同存在至少一个共谋者;若判断结果为是,则确定该共谋者为盗版者,这时输出单元304输出该盗版者,断开该盗版者终端与系统的连接; 4) Judging whether at least one co-conspirator can be determined according to the combination of the remaining suspected colluding groups, in this embodiment, the following method can be adopted: that is, judging whether there is at least one co-conspirator in the combination of the remaining suspected colluding groups; If the judgment result is yes, then it is determined that the co-conspirator is a pirate, and at this moment the
5)若判断结果为该剩余共谋组的组合中不存在共谋者,则说明还不能确定盗版者,则重复上述步骤1)-4),排出更多的剩余嫌疑用户组,直至能够根据该剩余嫌疑共谋组的组合确定出盗版者。其中,可采用如下方式: 5) If the judgment result is that there is no co-conspirator in the combination of the remaining colluding groups, it means that the pirate cannot be determined yet, then repeat the above steps 1)-4), and discharge more remaining suspected user groups until it can be determined according to The combination of the remaining suspected colluding groups identifies the pirate. Among them, the following methods can be used:
分组单元103根据剩余嫌疑共谋组合对用户进行分组,分配单元305重新分配码字给终端,监测单元301监测被非法扩散的码字;如果监测到被非法泄漏的码字,则根据这一信息排除嫌疑共谋组。记仅根据这一步的反馈信息排除的嫌疑共谋组合的集合为B2,则有 而实际根据这一步可排除的嫌疑组合数可能小于 因为此次的嫌疑共谋组B2中还可能包括与C1共同的组合,即 因此,记在此步中能有效排除的嫌疑共谋组的组合为C2,则C2=B2-C1∩B2; The grouping unit 103 groups the users according to the remaining suspected collusion combinations, the
依此类推,记仅根据第i步的反馈信息排除的嫌疑组合的集合为Bi,记实际在第i步中被有效排除的嫌疑组合的集合记为Ci,那么Bi与Ci的关系如下: By analogy, record the set of suspected combinations excluded only based on the feedback information in the i-th step as B i , record the set of suspected combinations that are effectively excluded in the i-th step as C i , then the relationship between Bi and C i The relationship is as follows:
C1=B1 C 1 =B 1
C2=B2-C1∩B2 C 2 =B 2 -C 1 ∩B 2
C3=B3-(C1∪C2)∩B3 C 3 =B 3 -(C 1 ∪C 2 )∩B 3
第i步时,剩余嫌疑共谋组的组合为 如果能够根据剩余嫌疑组合推断出一个盗版者,则输出该盗版者,断开该盗版者终端与系统的连接; At step i, the combination of the remaining suspected colluding groups is If a pirate can be deduced according to the remaining suspect combinations, then output the pirate and disconnect the pirate terminal from the system;
6)判断是否找出所有的6个盗版者,即判断5)中的共谋者的数量是否为 6,若为6,则说明通过上述步骤找到所有的盗版者,则追踪过程结束。 6) Judging whether to find out all 6 pirates, that is, judging whether the number of co-conspirators in 5) is 6, if it is 6, it means that all pirates are found through the above steps, and the tracking process ends. the
若步骤5)中所确定的共谋者的数量K小于6,则说明没有找到所有的盗版者,则重复步骤1-5)来追踪盗版者。在这种情况下,每次追踪开始,当前终端用户数为100-K,共谋者数为6-K,可以使用的最大用户分组数仍为G。这样,在追踪开始时,从100-K个终端用户中任意选择6-K个都可能是当前共谋组的组合,依此类推,直到6-K=0为止。 If the number K of co-conspirators determined in step 5) is less than 6, it means that not all pirates have been found, and steps 1-5) are repeated to track pirates. In this case, at the beginning of each trace, the current number of end users is 100-K, the number of co-conspirators is 6-K, and the maximum number of user groups that can be used is still G. In this way, at the beginning of the trace, any combination of 6-K end users selected from 100-K end users may be the combination of the current collusion group, and so on until 6-K=0. the
以上所述的具体实施例,对本发明的目的、技术方案和有益效果进行了进一步详细说明,所应理解的是,以上所述仅为本发明的具体实施例而已,并不用于限定本发明的保护范围,凡在本发明的精神和原则之内,所做的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。 The specific embodiments described above have further described the purpose, technical solutions and beneficial effects of the present invention in detail. It should be understood that the above descriptions are only specific embodiments of the present invention and are not intended to limit the scope of the present invention. Protection scope, within the spirit and principles of the present invention, any modification, equivalent replacement, improvement, etc., shall be included in the protection scope of the present invention. the
Claims (6)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2008100836361A CN101534429B (en) | 2008-03-12 | 2008-03-12 | Pirate Tracking Method and System |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2008100836361A CN101534429B (en) | 2008-03-12 | 2008-03-12 | Pirate Tracking Method and System |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101534429A CN101534429A (en) | 2009-09-16 |
CN101534429B true CN101534429B (en) | 2011-02-09 |
Family
ID=41104779
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2008100836361A Expired - Fee Related CN101534429B (en) | 2008-03-12 | 2008-03-12 | Pirate Tracking Method and System |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101534429B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US12225023B2 (en) * | 2022-10-11 | 2025-02-11 | Dell Products L.P. | Revealing byzantine attackers through smart re-clustering in federated learning |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1442978A (en) * | 2002-01-28 | 2003-09-17 | 株式会社东芝 | Data communication system, encryption device and deciphering device |
CN1554163A (en) * | 2001-01-26 | 2004-12-08 | �Ҵ���˾ | Method for tracing traitor receivers in a broadcast encryption system |
CN1991853A (en) * | 2005-12-30 | 2007-07-04 | 国际商业机器公司 | Method and system for tracing traitor in a broadcast encryption system |
-
2008
- 2008-03-12 CN CN2008100836361A patent/CN101534429B/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1554163A (en) * | 2001-01-26 | 2004-12-08 | �Ҵ���˾ | Method for tracing traitor receivers in a broadcast encryption system |
CN1442978A (en) * | 2002-01-28 | 2003-09-17 | 株式会社东芝 | Data communication system, encryption device and deciphering device |
CN1991853A (en) * | 2005-12-30 | 2007-07-04 | 国际商业机器公司 | Method and system for tracing traitor in a broadcast encryption system |
Non-Patent Citations (1)
Title |
---|
JP特开2003-289296A 2003.10.10 |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US12225023B2 (en) * | 2022-10-11 | 2025-02-11 | Dell Products L.P. | Revealing byzantine attackers through smart re-clustering in federated learning |
Also Published As
Publication number | Publication date |
---|---|
CN101534429A (en) | 2009-09-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN1168304C (en) | Global copy protection system for digital home networks | |
KR100448888B1 (en) | Broadcasting server system for protection and management of digital broadcasting contents, processing method in its | |
CN1241350C (en) | Key allocation method and device in conditional receiving system | |
US20170118537A1 (en) | Adaptive watermarking for streaming data | |
US20040199771A1 (en) | Method for tracing a security breach in highly distributed content | |
JP5161372B2 (en) | How to enforce reception rules for broadcast programs by the Administration Center | |
KR101705010B1 (en) | Processing recordable content in a stream | |
CN1282489A (en) | Mehtod for protecting audio-visual data across NRSS interface | |
JP2012503389A5 (en) | ||
CN102427561A (en) | Method for preventing VOD program from illegal transmission and sharing | |
CN105245944A (en) | DVB (Digital Video Broadcasting)-based multi-terminal program playing method and system, set top box and mobile terminal | |
CN105898419A (en) | Program payment method and system based on set top box | |
CN103503464B (en) | Method of identifying the origin of a security module in a pay television decoder system | |
AU2010353927B2 (en) | Information Transmission Method, System and Data Card | |
CN101534429B (en) | Pirate Tracking Method and System | |
CN101282473A (en) | A Method for Realizing Digital TV Copyright Management | |
EP2805328B1 (en) | Distributing content to multiple receivers using multicast channels | |
CN1867066A (en) | Digital television program broadcasting system and method | |
JP4422437B2 (en) | License information transmitting apparatus and license information receiving apparatus | |
CN103988513B (en) | For method, encryption system and the security module of the content packet for descrambling digital transport stream | |
KR101175354B1 (en) | System and method for securing content by using a number of conditional access systems | |
US20130145147A1 (en) | Content Protection Method | |
CN112153417B (en) | A kind of content scrambling protection method and system for streaming media content copyright | |
JP5132651B2 (en) | License information transmitting apparatus and license information transmitting program | |
CN101729746B (en) | Televiewing control method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20110209 |