摘要 |
#CMT# #/CMT# The method involves analyzing usage of a safety processor e.g. chip card, during a preset observation period. Number of solicitation is determined from analysis of an average value by a time unit of the processor during the observation period. A sanction is applied to a terminal whose severity level increases gradually, if the average value is more than a threshold. The average value is determined during an activity period of a safety processor during the observation period. #CMT# : #/CMT# Independent claims are also included for the following: (1) a safety processor intended to control access to obscure digital content provided by an operator to a reception terminal (2) a computer program having instructions of program code for execution of steps of the method. #CMT#USE : #/CMT# Method for detecting abnormal usage of a safety processor (claimed) e.g. chip card, solicited by a receiving terminal to control access to an obscure digital content provided by an operator of a reception terminal independent of nature of support network or type of content e.g. TV, video program, and personal video recorder, for use in access control field for accessing multimedia services. #CMT#ADVANTAGE : #/CMT# The method permits the safety processor to detect the situation in which the safety processor is used in an illicit manner, thus permitting to control access to the contents of the processor, while avoiding distortion due to disturbance in a processed temporal program structure and variation of behavior of the users. #CMT#DESCRIPTION OF DRAWINGS : #/CMT# The drawing shows a flow chart illustrating analysis and sanction steps of a safety processor abnormal usage detecting method.'(Drawing includes non-English language text)'. |