METHOD OF DETECTING AN ABNORMAL USE OF A SECURITY PROCESSOR
First Claim
Patent Images
1. Method of detecting abnormal use of a security processor invoked by at least one receiving terminal in order to control access to a scrambled digital content supplied by at least one operator to said receiving terminal, method characterised in that it comprises the following steps:
- analysing security processor use during a preset observation period Tobs,determining on the basis of said analysis the mean value MECM of the number of invocations per time unit of said security processor during said observation Tobs,comparing said mean value MECM with a preset threshold Smax, andif the mean value MECM is greater than the threshold Smax, applying to said terminal a sanction whereof the level of severity increases progressively.
1 Assignment
0 Petitions
Accused Products
Abstract
The invention relates to a method of detecting an abnormal use of a security processor invoked by at least one receiving terminal in order to control access to a scrambled digital content supplied by at least one operator to said receiving terminal.
This method comprises the following steps:
- analysing security processor use during a preset observation period TObs,
- determining on the basis of said analysis the mean value MECM of the number of invocations per time unit of said security processor during said observation period TObs,
- comparing said mean value MECM with a preset threshold Smax, and
- if the value MECM is greater than the threshold Smax, applying to said terminal a sanction whereof the level of severity increases progressively.
-
Citations
19 Claims
-
1. Method of detecting abnormal use of a security processor invoked by at least one receiving terminal in order to control access to a scrambled digital content supplied by at least one operator to said receiving terminal, method characterised in that it comprises the following steps:
-
analysing security processor use during a preset observation period Tobs, determining on the basis of said analysis the mean value MECM of the number of invocations per time unit of said security processor during said observation Tobs, comparing said mean value MECM with a preset threshold Smax, and if the mean value MECM is greater than the threshold Smax, applying to said terminal a sanction whereof the level of severity increases progressively. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 15, 16, 17, 18, 19)
-
-
14. Security processor intended to control access to a scrambled digital content supplied by at least one operator to at least one receiving terminal, characterised in that it comprises:
-
a first module for analysing its use during a preset observation period Tobs, a second module for determining on the basis of said analysis the mean value MECM of the number of invitations per time unit of said security processor during said observation period Tobs and for comparing said mean value MECM with a preset threshold Smax, and a third module for applying to said terminal a sanction whereof the level of severity progressively increases if the mean value MECM is greater than the threshold Smax.
-
Specification