Processing

Please wait...

Settings

Settings

Goto Application

1. WO2012066471 - METHOD TO DETECT CLONED SOFTWARE

Publication Number WO/2012/066471
Publication Date 24.05.2012
International Application No. PCT/IB2011/055083
International Filing Date 15.11.2011
IPC
G06F 21/00 2006.01
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
H04N 21/258 2011.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
NPICTORIAL COMMUNICATION, e.g. TELEVISION
21Selective content distribution, e.g. interactive television or video on demand
20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication or learning user preferences for recommending movies
258Client or end-user data management, e.g. managing client capabilities, user preferences or demographics or processing of multiple end-users preferences to derive collaborative data
H04N 21/442 2011.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
NPICTORIAL COMMUNICATION, e.g. TELEVISION
21Selective content distribution, e.g. interactive television or video on demand
40Client devices specifically adapted for the reception of, or interaction with, content, e.g. STB ; Operations thereof
43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronizing decoder's clock; Client middleware
442Monitoring of processes or resources, e.g. detecting the failure of a recording device, monitoring the downstream bandwidth, the number of times a movie has been viewed or the storage space available from the internal hard disk
H04N 21/426 2011.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
NPICTORIAL COMMUNICATION, e.g. TELEVISION
21Selective content distribution, e.g. interactive television or video on demand
40Client devices specifically adapted for the reception of, or interaction with, content, e.g. STB ; Operations thereof
41Structure of client; Structure of client peripherals
426Internal components of the client
H04N 21/6334 2011.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
NPICTORIAL COMMUNICATION, e.g. TELEVISION
21Selective content distribution, e.g. interactive television or video on demand
60Network structure or processes for video distribution between server and client or between remote clients; Control signalling between clients, server and network components; Transmission of management data between server and client; Communication details between server and client
63Control signaling between client, server and network components; Network processes for video distribution between server and clients, e.g. transmitting basic layer and enhancement layers over different transmission paths, setting up a peer-to-peer communication via Internet between remote STB's; Communication protocols; Addressing
633Control signals issued by server directed to the network components or client
6332directed to client
6334for authorisation, e.g. by transmitting a key
H04N 21/6377 2011.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
NPICTORIAL COMMUNICATION, e.g. TELEVISION
21Selective content distribution, e.g. interactive television or video on demand
60Network structure or processes for video distribution between server and client or between remote clients; Control signalling between clients, server and network components; Transmission of management data between server and client; Communication details between server and client
63Control signaling between client, server and network components; Network processes for video distribution between server and clients, e.g. transmitting basic layer and enhancement layers over different transmission paths, setting up a peer-to-peer communication via Internet between remote STB's; Communication protocols; Addressing
637Control signals issued by the client directed to the server or network components
6377directed to server
CPC
G06F 16/23
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
16Information retrieval; Database structures therefor; File system structures therefor
20of structured data, e.g. relational data
23Updating
G06F 21/121
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
12Protecting executable software
121Restricting unauthorised execution of programs
G06F 21/16
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
16Program or content traceability, e.g. by watermarking
G06F 21/64
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
60Protecting data
64Protecting data integrity, e.g. using checksums, certificates or signatures
G06F 2221/0711
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
2221Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
07Indexing scheme relating to G06F21/10, protecting distributed programs or content
0702Binding
0711Token
H04N 21/25816
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
NPICTORIAL COMMUNICATION, e.g. TELEVISION
21Selective content distribution, e.g. interactive television or video on demand [VOD]
20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
258Client or end-user data management, e.g. managing client capabilities, user preferences or demographics, processing of multiple end-users preferences to derive collaborative data
25808Management of client data
25816involving client authentication
Applicants
  • NAGRAVISION S.A. [CH]/[CH] (AllExceptUS)
  • FISCHER, Jean-Bernard [FR]/[CH] (UsOnly)
  • MARCACCI, Patrik [CH]/[CH] (UsOnly)
  • SCHWARZ, Christian [CH]/[CH] (UsOnly)
  • WYSEUR, Brecht [CH]/[CH] (UsOnly)
Inventors
  • FISCHER, Jean-Bernard
  • MARCACCI, Patrik
  • SCHWARZ, Christian
  • WYSEUR, Brecht
Agents
  • LEMAN CONSULTING S.A. 284
Priority Data
61/415,36319.11.2010US
Publication Language English (EN)
Filing Language English (EN)
Designated States
Title
(EN) METHOD TO DETECT CLONED SOFTWARE
(FR) PROCÉDÉ PERMETTANT DE DÉTECTER UN CLONE LOGICIEL
Abstract
(EN)
Method to detect a cloned software to be used on a client user unit communicating with a server for requesting a service by sending a request from the user unit to the server, the latter being connected to a database comprising client records, each of these records comprising at least a tag value (tc) as history of client requests, said method comprising an initialization phase and a operating phase, a) the initialization phase comprising the steps of: defining said tag value (tc) as being equal to an initial random value, then opening a new record storing said tag value (tc) in the database and introducing said tag value into the client user unit, b) the operating phase comprising the steps of: preparing, on the user unit side, a client message for the server comprising said request and a value depending on said tag value (tc), then sending this client message, from the user unit to the server, then checking, on the server side, an access condition by checking if the tag value (tc) of said client message is correct with respect to the tag value comprised in the database, in negative event: deny the requested service, in positive event: sending a server message to the user unit, as a response to his request, updating said tag value (tc), both on the server side and on the user unit side, by replacing it by a new tag value (t'c) derived from the last tag value (tc) and from other data known by both the client and the server, storing the new tag value (t'c) in the record of the database of the server and in the user unit.
(FR)
L'invention a trait à un procédé permettant de détecter un clone logiciel qui va être employé sur une unité utilisatrice client communiquant avec un serveur pour demander un service grâce à l'envoi d'une demande en provenance de l'unité utilisatrice et à destination du serveur, ce dernier étant connecté à une base de données qui comprend des enregistrements client, et chacun de ces enregistrements comportant au moins une valeur de label (tc) qui sert d'historique des demandes client. Ledit procédé comprend une phase d'initialisation et une phase de fonctionnement. a) La phase d'initialisation consiste : à définir la valeur de label (tc) comme étant égale à une valeur aléatoire initiale, puis à ouvrir un nouvel enregistrement contenant ladite valeur de label (tc) dans la base de données et à introduire ladite valeur de label dans l'unité utilisatrice client. b) La phase de fonctionnement consiste : à préparer, du côté de l'unité utilisatrice, un message du client pour le serveur comportant ladite demande et une valeur qui dépend de la valeur de label (tc), puis à envoyer ce message du client depuis l'unité utilisatrice jusqu'au serveur, et à vérifier, du côté du serveur, une condition d'accès par la vérification de l'exactitude de la valeur de label (tc) du message du client grâce à une comparaison avec la valeur de label comprise dans la base de données. Si ces valeurs ne correspondent pas, le service demandé est refusé, mais si ces valeurs correspondent, un message du serveur est envoyé à l'unité utilisatrice, en réponse à sa demande, ladite valeur de label (tc) est mise à jour à la fois du côté du serveur et du côté de l'unité utilisatrice, car elle est remplacée par une nouvelle valeur de label (t'c) dérivée de la dernière valeur de label (tc) et d'autres données connues à la fois du client et du serveur, et la nouvelle valeur de label (t'c) est stockée dans l'enregistrement de la base de données du serveur ainsi que dans l'unité utilisatrice.
Latest bibliographic data on file with the International Bureau