Server device for authentication, and method and system for detecting unauthorized terminal

An authentication server, unauthorized technology, applied in the field of devices, can solve problems such as difficulty in detection

Inactive Publication Date: 2007-01-24
PANASONIC CORP
View PDF2 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] In addition, the method of related art 2 described above makes it possible to detect whether it is an illegally copied terminal, but it is difficult to detect "which authorized DVD player's terminal key is stored in an unauthorized DVD player"

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Server device for authentication, and method and system for detecting unauthorized terminal
  • Server device for authentication, and method and system for detecting unauthorized terminal
  • Server device for authentication, and method and system for detecting unauthorized terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] Embodiments of the present invention will be described with reference to the drawings.

[0032] figure 2 is a block diagram showing the outline of the unauthorized terminal detection system 5 in this embodiment. figure 2 The unauthorized terminal detection system 5 in is a system for detecting an illegally manufactured terminal (such as a DVD player) using a network 30, and an authentication server 40 of a center 50 for detecting the above terminal and a DVD terminal 20 to be inspected (including at least one DVD terminal 20) are connected via a network 30 such as the Internet. Here, "illegal manufacture" means "unauthorized manufacture". For example, the case where a terminal key necessary to decrypt encrypted content (such as encrypted packaged software stored in a DVD-ROM) is stored in an unauthorized manner in a terminal (such as a DVD player) where the terminal Used to play the above packaged content.

[0033] Here, an outline of the copy terminal detection m...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The DVD terminal (20) issues a request to send the sub-content to the authentication server (40) (in this case, "model name and serial number" of the DVD terminal (20) is appended) (S302). The authentication server (40) generates a random number R (S304) and sends it to the DVD terminal (20) (S306). The DVD terminal (20) reads the terminal key and the terminal ID stored in the terminal information storage unit (25), uses the terminal key (SK_X) to decrypt the received random number R (S308) and combines it with the terminal ID (ID_X) is sent to the authentication server (40) (S310). The authentication server (40) verifies the random number R and the terminal ID received and encrypted from the DVD terminal (20), and judges whether the DVD terminal (20) is an authenticated terminal (S312).

Description

technical field [0001] The present invention relates to a device, method and system for detecting a terminal produced in an unauthorized manner, and more particularly to a device for detecting a DVD player or the like in a network in which a decryption key is generated in an unauthorized manner. Background technique [0002] Currently, various recording media such as digital versatile discs (DVDs) and devices for playing them (such as DVD discs) storing packaged contents such as video and music software have become popular, and for Various measures have been taken to protect their copyrights. [0003] For example, there is a method of decrypting encrypted content stored in a DVD with a terminal key (or "device key") stored in a DVD player (refer to Related Art 1). In this case, use a unique terminal key for each player. And, after paying the license fee, the manufacturer of the DVD player receives one or more terminal keys from the licensor according to the license fee. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G11B20/00G06F1/00H04L9/32G06F21/44G06F15/00G09C1/00
CPCG11B20/00086H04L9/3263H04L2209/605H04L9/3247H04L9/3271H04L2209/56G06F21/10H04L9/321H04L9/0869
Inventor 大森基司大原俊次片山崇
Owner PANASONIC CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products