WO2019066098A1 - Système de détection d'utilisation illégale de contenu et procédé associé - Google Patents

Système de détection d'utilisation illégale de contenu et procédé associé Download PDF

Info

Publication number
WO2019066098A1
WO2019066098A1 PCT/KR2017/010759 KR2017010759W WO2019066098A1 WO 2019066098 A1 WO2019066098 A1 WO 2019066098A1 KR 2017010759 W KR2017010759 W KR 2017010759W WO 2019066098 A1 WO2019066098 A1 WO 2019066098A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
content
usage information
client terminal
external device
Prior art date
Application number
PCT/KR2017/010759
Other languages
English (en)
Korean (ko)
Inventor
조창훈
민정기
Original Assignee
(주)알티캐스트
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by (주)알티캐스트 filed Critical (주)알티캐스트
Publication of WO2019066098A1 publication Critical patent/WO2019066098A1/fr

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/42User authentication using separate channels for security data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/42User authentication using separate channels for security data
    • G06F21/43User authentication using separate channels for security data wireless channels
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/00971Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures for monitoring the industrial media production and distribution channels, e.g. for controlling content providers or the official manufacturers or replicators of recording media
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/24Monitoring of processes or resources, e.g. monitoring of server load, available bandwidth, upstream requests
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/442Monitoring of processes or resources, e.g. detecting the failure of a recording device, monitoring the downstream bandwidth, the number of times a movie has been viewed, the storage space available from the internal hard disk

Definitions

  • the present invention relates to a system and a method for detecting illegal use of digital contents, and more particularly, to a technical idea for detecting an abnormal behavior due to use of digital contents.
  • the detection system based on the rule or the policy can detect the abnormal behavior only when the behavior of the client terminal or the user corresponds to the specific condition, the limit of detecting the abnormal behavior gradually becomes intelligent have.
  • a system for detecting illegal use of contents includes an authentication unit forming a first secure channel with a management server, A usage information receiving unit for receiving the usage information collected using the first secure channel and a usage information receiving unit for collecting usage information based on the collected usage information when the usage information is collected from at least one or more client terminals using a second secure channel, And an analysis model generation unit for generating an analysis model for detecting an abnormal behavior according to digital content use at the client terminal.
  • a client terminal can receive digital content using at least one content providing service from among a streaming service and a download service.
  • a client terminal includes log information according to usage of digital contents, ID information of a client terminal, manufacturer information of a client terminal, extended display identification data (EDID) information, ID information, and manufacturer information of an external device to the management server.
  • EDID extended display identification data
  • the management server may include at least one of a Conditional Access System (CAS) server and a Digital Rights Management (DRM) server.
  • CAS Conditional Access System
  • DRM Digital Rights Management
  • the management server can transmit the collected usage information to the usage information receiving unit at predetermined intervals.
  • the analysis model generation unit may extract an occurrence event of an abnormal behavior from the collected usage information, and may generate an analysis model including expected signs for predictive detection of an abnormal behavior by machine learning of the occurrence event of the abnormal behavior .
  • the analysis model generation unit generates an analysis model for machine learning the collected usage information to predict and detect an abnormal behavior in real time or before the occurrence of the abnormality, entity is an operation other than a procedure generated by an entity.
  • the analysis model generation unit may perform an operation other than a procedure, such as an attempt to hack and infringe a threat that threatens copyright and security, an illegal download of digital content, an illegal copy of digital content, An analysis model for detecting at least one operation among an operation using digital contents and an operation of frequently exchanging suspicious data between a client terminal and an external device can be generated.
  • a blocking operation of digital content distribution through a management server when abnormal behavior is detected based on an analysis model, a blocking operation of digital content distribution through a management server, a connection blocking operation to a client terminal or an external device in which an abnormal behavior is detected, And a signal generating unit for generating a control signal for controlling at least one of the operations to be performed.
  • a client terminal includes a content receiving unit for receiving digital content provided through a content service, a digital interface unit for connecting an external device using the digital content, ID information of an external device, manufacturer information, and EDID data information, and generates a usage information reflecting the extracted information, and a transmitter for transmitting the usage information to the management server through the second secure channel.
  • a system for detecting illegal use of content includes a content receiving unit for receiving digital content provided through a content service, a digital interface unit for connecting an external device using the digital content, A usage information generating unit for extracting information, generating use information reflecting the extracted information, and a transmitting unit for transmitting usage information to an analysis server.
  • the analysis server collects usage information to be transmitted, And generates an analysis model for detecting an abnormal behavior due to use of digital contents of the external device.
  • the usage information generating unit may extract at least one piece of information from the log information according to the use of the digital contents, the extended display identification data (EDID) information, the ID information, have.
  • EDID extended display identification data
  • the analysis server when the abnormal behavior is detected based on the analysis model, performs a blocking operation of digital content distribution through the CAS or the DRM server based on the detection result, a connection blocking operation with respect to the external apparatus in which the abnormal behavior is detected, And generate a control signal that controls at least one of the authentication request operations to be performed.
  • the apparatus may further include an analysis model receiving unit that receives the analysis model from the analysis server, and an abnormal behavior sensing unit that detects the abnormal behavior based on the received analysis model.
  • a method of detecting illegal use of content includes the steps of forming a first secure channel with a management server in an authentication unit, The method comprising: receiving usage information collected using a first secure channel when usage information is collected from at least one client terminal using a second secure channel formed between the first secure channel and the management server, And generating an analysis model for detecting an abnormal behavior in accordance with the use of the digital content in the client terminal based on the usage information collected by the generation unit.
  • the receiving of the usage information includes using log information according to digital content use, ID information of a client terminal, manufacturer information of a client terminal, extended display identification data (EDID) ID information of the external device, and manufacturer information of the external device.
  • ID information of a client terminal ID information of a client terminal
  • manufacturer information of a client terminal ID information of a client terminal
  • EDID extended display identification data
  • a connection blocking operation and a user authentication request operation for a client terminal or an external device, And generating a control signal for controlling to be performed.
  • the step of receiving collected usage information includes receiving digital content provided through a content service in a content receiving unit, connecting an external device using digital content in a digital interface unit, Extracting at least one piece of information from the external device identification information, manufacturer information, and extended display identification data (EDID) information, generating usage information reflecting the extracted information, and transmitting the usage information to a management server As shown in FIG.
  • a method of detecting illegal use of content includes receiving digital content provided through a content service in a content receiving unit, connecting an external device using digital content in a digital interface unit, A step of extracting information on an external device from the use information generating unit, generating usage information reflecting the extracted information, and transmitting the usage information to an analysis server in a transmitter, and the analysis server collects usage information to be transmitted And generates an analysis model for detecting an abnormal behavior due to use of digital contents of the external apparatus by machine learning of the collected usage information.
  • the step of generating use information includes at least one of log information according to use of digital contents, extended display identification data (EDID) information of an external apparatus, ID information, and manufacturer information as information on an external apparatus Can be extracted.
  • EDID extended display identification data
  • FIG. 1 is a block diagram illustrating a system for detecting illegal use of contents according to an embodiment of the present invention.
  • FIG. 2 is a diagram illustrating an analysis server according to an embodiment of the present invention.
  • FIG. 3 illustrates a system for detecting illegal use of content according to another embodiment of the present invention.
  • FIG. 4 is a diagram showing a client terminal according to another embodiment.
  • FIG. 5 is a diagram illustrating a method for detecting illegal use of contents according to an embodiment of the present invention.
  • FIG. 6 is a diagram illustrating a method for detecting illegal use of contents according to another embodiment of the present invention.
  • first, second, or the like may be used to describe various elements, but the elements should not be limited by the terms.
  • the terms may be named for the purpose of distinguishing one element from another, for example without departing from the scope of the right according to the concept of the present invention, the first element being referred to as the second element, Similarly, the second component may also be referred to as the first component.
  • FIG. 1 is a block diagram illustrating a system for detecting illegal use of contents according to an embodiment of the present invention.
  • a system 100 for detecting illegal use of contents may improve efficiency of network and system resource utilization, improve transparency of a content distribution process, .
  • the system 100 for detecting illegal use of contents may include an analysis server 110, a management server 120, and at least one client terminal 130.
  • the analysis server 110 forms a first secure channel with the management server 120 and can receive usage information collected from the management server 120 through the first secure channel have.
  • the analysis server 110 may generate an analysis model for detecting an abnormal behavior due to the use of digital contents based on the collected usage information.
  • the management server 120 may transmit usage information to the analysis server 110.
  • the management server 120 may collect usage information from at least one client terminal 130.
  • the management server 120 may use a second secure channel formed between at least one client terminal 130 and the management server 120.
  • FIG. 2 is a diagram illustrating an analysis server according to an embodiment of the present invention.
  • the analysis server 200 receives usage information collected through a first secure channel (hereinafter referred to as " first secure channel "), And generates an analysis model for detecting an abnormal behavior.
  • a first secure channel hereinafter referred to as " first secure channel "
  • the analysis server 200 includes an authentication unit 210, a usage information receiving unit 220, and an analysis model generation unit 230.
  • analysis server 200 may further include a controller for controlling the operation of each component.
  • the authentication unit 210 forms a first secure channel with the management server of FIG.
  • the authentication unit 210 can form a first secure channel through authentication with the management server, and can maintain the first secure channel without performing additional authentication with a single authentication.
  • the management server collects usage information from at least one client terminal using a second secure channel formed between the at least one client terminal and the management server shown in FIG. 1 do.
  • the client terminal may include at least one of a settop box, a computer, and a smartphone.
  • a client terminal can receive digital content using at least one of a streaming service and a download service.
  • the client terminal can provide usage information according to the use of the received digital contents to the management server.
  • the usage information includes log information according to use of digital contents, ID information of a client terminal, manufacturer information of a client terminal, extended display identification data (EDID) information, ID information of an external device connected through a client terminal , Manufacturer information of the external device, and the like.
  • EDID extended display identification data
  • an external device is a device connected through a digital port of a client terminal, and may be a display device for reproducing digital contents.
  • the usage information receiving unit 220 collects the usage information from the management server and receives the usage information from the management server.
  • the management server may include at least one of a Conditional Access System (CAS) server and a Digital Rights Management (DRM) server.
  • CAS Conditional Access System
  • DRM Digital Rights Management
  • the management server may transmit the collected usage information to the usage information receiving unit 220 at predetermined intervals.
  • the management server may collect usage information from at least one client terminal for a predetermined time, compress the collected usage information, and transmit the compressed usage information to the usage information receiving unit.
  • the management server can collect usage information using a second secure channel that is configured between each client terminal and the management server.
  • the analysis server 200 can form the first secure channel without receiving a new secure channel with each client terminal, and can receive the collected usage information, thereby improving the efficiency of network and system resource utilization.
  • a client terminal may include a content receiving unit for receiving digital content provided through a content service, and a digital interface unit for connecting an external device using digital content.
  • the client terminal may further include a usage information generating unit that extracts at least one piece of information among the ID information, the manufacturer information, and the EDID information of the external device, and generates usage information reflecting the extracted information.
  • the client terminal may further include a transmitter for transmitting usage information to the management server through the second secure channel.
  • a client terminal according to one side will be described in more detail with reference to FIG. 4 related to a client terminal according to another embodiment hereinafter.
  • the analysis model generation unit 230 generates an analysis model for detecting an abnormal behavior in the client terminal based on the collected usage information.
  • the analysis model generation unit 230 extracts occurrence cases of abnormal behaviors from the collected usage information, and analyzes the occurrence cases of the abnormal behaviors to learn an analytical model including expected signs for predictive detection of abnormal behaviors Can be generated.
  • the analysis model generation unit 230 may analyze the log information among the collected usage information to extract a case of occurrence of an abnormal behavior.
  • Examples of the occurrence of the abnormal behavior include a symptom of an abnormal behavior, And may include corresponding actions.
  • the present invention it is possible to proactively detect an abnormal behavior before occurrence of an abnormal behavior by predicting and detecting an abnormal behavior based on an analytical model including a predicted symptom.
  • the analysis model generation unit 230 may generate an analysis model for mechanically learning the collected usage information to detect an abnormal behavior in real time or before prediction.
  • the analysis model may detect an operation other than a procedure generated by an authenticated entity when purchasing, using, and distributing digital contents as an abnormal behavior.
  • the analysis model generation unit may generate an analysis model for detecting an operation other than a procedure.
  • operations other than the procedures include an operation of attempting hacking and infringement that threatens copyright and security, an operation of illegally downloading digital contents, an operation of illegally copying digital contents, an operation of using digital contents in an unauthorized external device, An operation of frequently exchanging suspicious data between the client terminal and the external device, and the like.
  • the analysis model generation unit 230 may machine-learn usage information collected using at least one learning algorithm, and may generate an analysis model through the learning.
  • the at least one learning algorithm may include at least one learning algorithm among a Neural Network, a Decision Tree, a Bayesian network, and a Support Vector Machine (SVM).
  • SVM Support Vector Machine
  • the analysis server 200 may further include a signal generation unit 240 that generates a control signal for controlling a predetermined operation to be performed when an abnormal behavior is detected based on the analysis model have.
  • the preset operation may include a blocking operation of the digital content distribution through the management server, a connection blocking operation to a client terminal or an external device in which an abnormal behavior is detected, a user authentication request operation, and the like.
  • the management server may include at least one of a CAS server and a DRM server.
  • the signal generator 240 may generate a control signal based on the detection result, and may transmit the generated control signal to the management server.
  • the management server receiving the control signal may block the connection to the client terminal or the external device in which the abnormal behavior is detected, or may block the content distribution.
  • the management server can control the client terminal to request the user authentication.
  • the present invention it is possible to determine the abnormal behavior based on the analytical model generated by machine learning of the usage information collected from each client terminal, and perform real-time correspondence to the abnormal behavior based on the determination result, It can provide technology that can improve the transparency of distribution process and protect contents copyright.
  • FIG. 3 illustrates a system for detecting illegal use of content according to another embodiment of the present invention.
  • a system 300 for detecting illegal use of contents may include an analysis server 310 and at least one client terminal 320.
  • the analysis server 310 collects usage information transmitted from at least one client terminal 320 and mechanically learns the collected usage information to detect an abnormal behavior according to the use of digital content of an external device An analysis model can be generated.
  • the client terminal 320 extracts information on an external device connected through a digital interface, generates usage information reflecting the extracted information, and transmits the usage information to the analysis server 310.
  • FIG. 4 is a diagram showing a client terminal according to another embodiment.
  • the client terminal 400 may receive digital contents provided through a content service. Also, the client terminal 400 can be connected to an external device that uses the received digital content, and can extract information on the connected external device to generate usage information. Then, the client terminal 400 transmits the generated usage information to the analysis server of FIG.
  • a content receiving unit 410 may be included.
  • a digital interface unit 420 may be included.
  • a usage information generating unit 430 may be included.
  • a transmitting unit 440 may be included.
  • the client terminal 400 may further include a controller for controlling the operation of each component.
  • the content receiving unit 410 receives digital content provided through a content service.
  • the content service may include at least one of a streaming service and a download service.
  • the digital interface unit 420 connects an external device using digital contents.
  • the client terminal 400 may be a set-top box and the external device may be a display device for reproducing digital contents.
  • the digital interface unit 420 may be an HDMI port.
  • the usage information generating unit 430 extracts information on an external device and generates usage information reflecting the extracted information.
  • the usage information generating unit 430 may include log information according to use of digital contents, extended display identification data (EDID) information of an external apparatus, ID information of an external apparatus, At least one piece of information can be extracted from the information.
  • EDID extended display identification data
  • the transmitting unit 440 transmits usage information to the analysis server.
  • the transmitting unit 440 may transmit usage information through a secure channel formed between the analysis server and the client terminal 400.
  • the analysis server collects the usage information to be transmitted and can machine-learn the collected usage information.
  • the analysis server generates an analysis model for detecting an abnormal behavior due to the use of digital contents of the external device by using the results of the machine learning.
  • the analysis server can extract an occurrence occurrence of an abnormal behavior from the collected usage information, and generate an analysis model including predictive indications for predicting abnormal behavior by machine learning of the occurrence event of the abnormal behavior.
  • the server may analyze the log information among the collected usage information to extract the occurrence of abnormal behavior, and the occurrence case of abnormal behavior may include a symptom of abnormal behavior and a corresponding action according to occurrence of abnormal behavior have.
  • the present invention it is possible to predict the abnormal behavior based on the analytical model including the expected symptom, and to proactively detect the abnormal behavior before the abnormal behavior occurs.
  • the analysis server may generate an analysis model for machine learning of collected usage information to predict or detect abnormal behavior in real time or before occurrence.
  • the analysis model may detect an operation other than a procedure generated by an authenticated entity when purchasing, using, and distributing digital contents as an abnormal behavior.
  • the analysis server can generate an analysis model for detecting actions other than the procedure.
  • operations other than the procedures include an operation of attempting hacking and infringement that threatens copyright and security, an operation of illegally downloading digital contents, an operation of illegally copying digital contents, an operation of using digital contents in an unauthorized external device, An operation of frequently exchanging suspicious data between the client terminal and the external device, and the like.
  • the analysis server can detect abnormal behavior based on the analysis model.
  • the analysis server performs an operation for blocking digital content distribution through the CAS server or the DRM server, a connection blocking operation for an external device in which an abnormal behavior is detected, a user authentication request operation A control signal can be generated.
  • the client terminal 400 may further include an analysis model receiving unit 450 receiving the analysis model from the analysis server, and an abnormal behavior sensing unit 460 sensing the abnormal behavior based on the received analysis model .
  • the client terminal 400 can receive the analysis model and directly detect an abnormal behavior with respect to the external device.
  • the client terminal 400 may control the connection blocking operation and the user authentication request operation to the external device to be performed.
  • FIG. 5 is a diagram illustrating a method for detecting illegal use of contents according to an embodiment of the present invention.
  • a method for detecting illegal use of content forms a first secure channel with a management server in an authentication unit.
  • the content receiving unit can receive digital contents provided through a content service.
  • the client terminal may form a second secure channel with the management server before step 520, and may receive the digital content through the second secure channel.
  • a method of detecting illegal use of contents may connect an external device that uses digital contents in the digital interface unit.
  • the digital interface unit may be an HDMI port
  • the external device may be a display device for reproducing digital contents.
  • a method of detecting illegal use of content includes extracting at least one piece of information among ID information, manufacturer information, and extended display identification data (EDID) And use information reflecting the extracted information can be generated.
  • ID information ID information
  • manufacturer information ID information
  • EDID extended display identification data
  • a transmitter may transmit usage information to a management server through a second secure channel.
  • the management server receives at least one of the at least one client terminal and the management server using a second secure channel When usage information is collected from one or more client terminals, usage information collected using the first secure channel is received.
  • a method of detecting illegal use of contents includes, as usage information, log information according to digital contents usage, ID information of a client terminal, manufacturer information of a client terminal, data information, ID information of an external device connected through a client terminal, and manufacturer information of an external device.
  • step 570 the method for detecting illegal use of content according to an exemplary embodiment generates an analysis model for detecting an abnormal behavior according to digital content use at the client terminal based on the usage information collected by the analysis model generation unit.
  • a method of detecting illegal use of contents according to an exemplary embodiment of the present invention in step 580 is a method in which when an abnormal behavior is detected based on an analysis model in a signal generation unit, A connection blocking operation for the apparatus, and a user authentication request operation.
  • FIG. 6 is a diagram illustrating a method for detecting illegal use of contents according to another embodiment of the present invention.
  • a method for detecting illegal use of contents receives digital contents provided through a content service in a content receiving unit.
  • a method for detecting illegal use of contents connects an external device using digital contents in a digital interface unit.
  • the usage information generating unit extracts information on an external apparatus and generates usage information reflecting the extracted information.
  • a method for detecting illegal use of contents includes information on an external device, log information on use of digital contents, extended display identification data (EDID) At least one of the ID information of the apparatus and the manufacturer information of the external apparatus can be extracted.
  • EDID extended display identification data
  • a method of detecting illegal use of contents transmits usage information to an analysis server in a transmission unit.
  • the method for detecting illegal use of contents includes collecting usage information transmitted from the analysis server, mechanically learning the collected usage information, detecting an abnormal behavior due to use of digital contents of the external device To generate an analytical model.
  • the management server can collect usage information using the existing secure channel between each client terminal and the management server.
  • the analysis server can improve the efficiency of network and system resource utilization by forming only one secure channel with the management server and receiving the collected usage information, without forming a new secure channel with each client terminal.
  • the apparatus described above may be implemented as a hardware component, a software component, and / or a combination of hardware components and software components.
  • the apparatus and components described in the embodiments may be implemented within a processor, a controller, an arithmetic logic unit (ALU), a digital signal processor, a microcomputer, a field programmable array (FPA) A programmable logic unit (PLU), a microprocessor, or any other device capable of executing and responding to instructions.
  • the processing device may execute an operating system (OS) and one or more software applications running on the operating system.
  • the processing device may also access, store, manipulate, process, and generate data in response to execution of the software.
  • the processing apparatus may be described as being used singly, but those skilled in the art will recognize that the processing apparatus may have a plurality of processing elements and / As shown in FIG.
  • the processing unit may comprise a plurality of processors or one processor and one controller.
  • Other processing configurations are also possible, such as a parallel processor.
  • the software may include a computer program, code, instructions, or a combination of one or more of the foregoing, and may be configured to configure the processing device to operate as desired or to process it collectively or collectively Device can be commanded.
  • the software and / or data may be in the form of any type of machine, component, physical device, virtual equipment, computer storage media, or device , Or may be permanently or temporarily embodied in a transmitted signal wave.
  • the software may be distributed over a networked computer system and stored or executed in a distributed manner.
  • the software and data may be stored on one or more computer readable recording media.
  • the method according to an embodiment may be implemented in the form of a program command that can be executed through various computer means and recorded in a computer-readable medium.
  • the computer-readable medium may include program instructions, data files, data structures, and the like, alone or in combination.
  • the program instructions to be recorded on the medium may be those specially designed and configured for the embodiments or may be available to those skilled in the art of computer software.
  • Examples of computer-readable media include magnetic media such as hard disks, floppy disks and magnetic tape; optical media such as CD-ROMs and DVDs; magnetic media such as floppy disks; Magneto-optical media, and hardware devices specifically configured to store and execute program instructions such as ROM, RAM, flash memory, and the like.
  • program instructions include machine language code such as those produced by a compiler, as well as high-level language code that can be executed by a computer using an interpreter or the like.
  • the hardware devices described above may be configured to operate as one or more software modules to perform the operations of the embodiments, and vice versa.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Technology Law (AREA)
  • Databases & Information Systems (AREA)
  • Computing Systems (AREA)
  • Mathematical Physics (AREA)
  • Information Transfer Between Computers (AREA)
  • Debugging And Monitoring (AREA)
  • Storage Device Security (AREA)

Abstract

La présente invention concerne une technologie se rapportant à un système permettant de détecter l'utilisation illégale de contenu et un procédé associé. Le système de détection d'utilisation illégale de contenu, selon un mode de réalisation, comprend : une unité d'authentification qui forme un premier canal sécurisé avec un serveur de gestion ; une unité de réception d'informations d'utilisation permettant de recevoir des informations d'utilisation collectées au moyen du premier canal sécurisé si le serveur de gestion collecte les informations d'utilisation en provenance d'au moins un terminal client au moyen d'un second canal sécurisé formé entre le serveur de gestion et ledit terminal client ; et une unité de génération de modèle d'analyse permettant de générer un modèle d'analyse pour détecter un comportement anormal, sur la base de l'utilisation d'un contenu numérique, dans le ou les terminaux clients sur la base des informations d'utilisation collectées.
PCT/KR2017/010759 2017-09-27 2017-09-27 Système de détection d'utilisation illégale de contenu et procédé associé WO2019066098A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
KR10-2017-0125011 2017-09-27
KR1020170125011A KR101978289B1 (ko) 2017-09-27 2017-09-27 컨텐츠의 불법 이용을 감지하는 시스템 및 그 방법

Publications (1)

Publication Number Publication Date
WO2019066098A1 true WO2019066098A1 (fr) 2019-04-04

Family

ID=65903640

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/KR2017/010759 WO2019066098A1 (fr) 2017-09-27 2017-09-27 Système de détection d'utilisation illégale de contenu et procédé associé

Country Status (2)

Country Link
KR (1) KR101978289B1 (fr)
WO (1) WO2019066098A1 (fr)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR102434606B1 (ko) * 2022-05-26 2022-08-22 (주)커넥 Nft를 활용한 개인 정보의 사용 요금을 정산하는 방법, 장치 및 컴퓨터-판독 가능 기록 매체

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20070092806A (ko) * 2006-03-09 2007-09-14 주식회사 플랜티넷 P2p·메신저·온라인게임 등의 유해, 불법, 또는 비업무용통신프로그램의 통신패턴 자동추출을 통한 통신차단장치및 방법
US20110030065A1 (en) * 2009-07-20 2011-02-03 Verimatrix, Inc. Systems and methods for detecting clone playback devices
JP2014029750A (ja) * 2012-07-31 2014-02-13 Toshiba Corp データ転送方法ならびに電子機器
US20140283067A1 (en) * 2013-03-15 2014-09-18 Shape Security Inc. Detecting the introduction of alien content
US20160142424A1 (en) * 2014-11-19 2016-05-19 Sec.Do Technologies Ltd. System and method thereof for identifying and responding to security incidents based on preemptive forensics

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100700511B1 (ko) 2000-01-22 2007-03-28 엘지전자 주식회사 방송 수신장치의 복사 방지 방법
KR101029707B1 (ko) 2010-10-18 2011-04-18 권동우 Hdmi 카드를 이용한 영상 데이터의 녹화를 차단하는 방법 및 장치

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20070092806A (ko) * 2006-03-09 2007-09-14 주식회사 플랜티넷 P2p·메신저·온라인게임 등의 유해, 불법, 또는 비업무용통신프로그램의 통신패턴 자동추출을 통한 통신차단장치및 방법
US20110030065A1 (en) * 2009-07-20 2011-02-03 Verimatrix, Inc. Systems and methods for detecting clone playback devices
JP2014029750A (ja) * 2012-07-31 2014-02-13 Toshiba Corp データ転送方法ならびに電子機器
US20140283067A1 (en) * 2013-03-15 2014-09-18 Shape Security Inc. Detecting the introduction of alien content
US20160142424A1 (en) * 2014-11-19 2016-05-19 Sec.Do Technologies Ltd. System and method thereof for identifying and responding to security incidents based on preemptive forensics

Also Published As

Publication number Publication date
KR101978289B1 (ko) 2019-05-14
KR20190036143A (ko) 2019-04-04

Similar Documents

Publication Publication Date Title
WO2012015171A2 (fr) Dispositif de commande à sécurité intégrée contre virus de piratage informatique
WO2013048111A2 (fr) Procédé et appareil de détection d'une intrusion dans un service informatique en nuage
WO2018056601A1 (fr) Dispositif et procédé de blocage de rançongiciel à l'aide d'une commande d'accès à un fichier de contenu
WO2013168913A1 (fr) Appareil et procédé de contrôle de fichiers non exécutables
WO2016114601A1 (fr) Procédé pour service de notification de catastrophe ne nécessitant pas de collecte d'informations de localisation, et serveur de notification de catastrophe et système d'application associés
WO2013168951A1 (fr) Appareil et procédé de contrôle de fichier malveillant
WO2019088686A1 (fr) Système et procédé de gestion de distribution de contenu à l'aide d'une technologie de chaîne de blocs
WO2017034072A1 (fr) Système de sécurité de réseau et procédé de sécurité
WO2016064041A1 (fr) Terminal d'utilisateur utilisant une valeur de hachage pour détecter si un programme d'application a été altéré et procédé de détection d'altération utilisant le terminal d'utilisateur
WO2019160195A1 (fr) Appareil et procédé de détection de menaces malveillantes contenues dans un fichier, et support d'enregistrement associé
WO2015137235A1 (fr) Dispositif d'identification, procédé d'identification et programme d'identification
WO2019039730A1 (fr) Dispositif et méthode pour empêcher les logiciels de rançon
WO2018164503A1 (fr) Détection de logiciel rançonneur en fonction de la sensibilité au contexte
WO2019088688A1 (fr) Système et procédé de gestion de distribution de contenu à l'aide d'une technologie de chaîne de blocs
WO2019066099A1 (fr) Système de détection de comportement anormal sur la base d'un modèle d'analyse intégré, et procédé associé
KR101971799B1 (ko) 통합된 분석 모델에 기초하여 이상 행동을 감지하는 시스템 및 그 방법
WO2019103443A1 (fr) Procédé, appareil, et système de gestion d'empreinte électronique de fichier électronique
WO2019066098A1 (fr) Système de détection d'utilisation illégale de contenu et procédé associé
WO2016064040A1 (fr) Terminal utilisateur utilisant des informations de signature pour détecter si programme d'application a été altéré et procédé de détection de fraude à l'aide du terminal utilisateur
WO2018070598A1 (fr) Dispositif de surveillance d'activité illégale à l'aide d'une évaluation d'influence de changement d'un code source et procédé associé
WO2020060101A1 (fr) Dispositif électronique de fourniture de service par utilisation d'un élément sécurisé, et son procédé de fonctionnement
WO2019177265A1 (fr) Procédé de traitement de données contre les logiciels rançonneurs, programme d'exécution de ce dernier, et support d'enregistrement lisible par ordinateur avec programme enregistré sur ce dernier
WO2019124770A1 (fr) Appareil terminal et procédé de commande d'appareil terminal
WO2018088680A1 (fr) Système de sécurité et procédé de traitement de demande d'accès à un site bloqué
WO2018056582A1 (fr) Procédé d'inspection de paquet à l'aide d'une communication ssl

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17927645

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17927645

Country of ref document: EP

Kind code of ref document: A1