CA2435624A1 - Systems and methods for preventing unauthorized use of digital content - Google Patents

Systems and methods for preventing unauthorized use of digital content Download PDF

Info

Publication number
CA2435624A1
CA2435624A1 CA002435624A CA2435624A CA2435624A1 CA 2435624 A1 CA2435624 A1 CA 2435624A1 CA 002435624 A CA002435624 A CA 002435624A CA 2435624 A CA2435624 A CA 2435624A CA 2435624 A1 CA2435624 A1 CA 2435624A1
Authority
CA
Canada
Prior art keywords
data
memory locations
digital content
content data
locations
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CA002435624A
Other languages
French (fr)
Other versions
CA2435624C (en
Inventor
Richard B. Levine
Andrew R. Lee
Daniel G. Howard
John J. Hart, Iii
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SCA IPLA Holdings Inc
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of CA2435624A1 publication Critical patent/CA2435624A1/en
Application granted granted Critical
Publication of CA2435624C publication Critical patent/CA2435624C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/14Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]

Abstract

Theft, distribution, and piracy of digital content (software, video, audio, ebooks, any content of any kind that is digitally stored and distributed) is generally accomplished by copying it, if possible, or, if it is protected from being copied in any fashion, such piracy is based upon a number of reverse engineering techniques.
Aside from the straightforward copying of unprotected content, all of these other methods require fist an understanding of the protective mechanism(s) guarding the content, and finally and unauthorized modification of that protection i order to disable or subvert it. Methods which prevent a skilled individual from using reverse engineering tools and techniques to attain that level of understanding and/or prevent anyone from performing such modifications can offer significant advantages to content creators who whish to protect their products.

Claims (160)

1. A method for preventing unauthorized use of digital content data comprising:
subdividing the digital content data into data segments;
modifying the data segments with second data to generate modified data; and storing the modified data at predetermined memory locations.
2. The method of claim 1 wherein the digital data comprises data types selected from a group consisting of audio, video, documents, text and software.
3. The method of claim 1 wherein the data segments are of a variable length.
4. The method of claim 1 wherein the second data comprises a randomly generated data stream.
5. The method of claim 1 wherein the second data comprises portions of the digital content data.
6. The method of claim 1 further comprising encrypting the modified data and storing the encrypted modified data.
7. The method of claim 6 further comprising encrypting the modified data with an encryption key.
8. The method of claim 7 further comprising encrypting the encryption key.
9. The method of claim 8 further comprising storing the encryption key with the encrypted modified data at the predetermined memory locations.
10. The method of claim 9 further comprising partitioning the encryption key among the encrypted modified data.
11. The method of claim 1 wherein the predetermined memory locations are selected as the locations at which the digital content data was originally stored.
12. The method of claim 1 wherein the digital content data comprises first and second digital content data and wherein the predetermined memory locations are selected as combinations of the locations at which the first and second digital content data were originally stored.
13. The method of claim 1 further comprising generating a map of locations at which the modified data is stored.
14. The method of claim 13 further comprising storing the map of locations at the predetermined memory locations.
15. The method of claim 1 wherein the memory locations reside on a system and further comprising:
scanning the system to determine available memory locations;
selecting target memory locations within the available memory locations at which to store the modified data; and storing the modified data at the target memory locations.
16. The method of claim 15 wherein a subset of available memory locations are located within file system locations
17. The method of claim 15 wherein a subset of available memory locations are located outside file system locations.
18. The method of claim 15 further comprising generating a map of the target memory locations.
19. The method of claim 18 further comprising storing the map of target memory locations at the target memory locations.
20. The method of claim 1 further comprising:
retrieving the modified data from the predetermined memory locations; and de-interleaving the data segments based on the second data to generate original digital content data.
21. The method of claim 1 wherein the memory locations reside on a system and wherein a table of contents identifies files stored on the system, and wherein a subset of the memory locations used for storing the modified data are between memory locations used by files stored on the system, as identified by the table of contents.
22. The method of claim 1 wherein the memory locations reside on a system and wherein a table of contents identifies files stored on the system, and wherein a subset of the memory locations used for storing the modified data are exclusive of memory locations of files stored on the system, as identified by the table of contents.
23. The method of claim 1 wherein the memory locations reside on a system and wherein a table of contents identifies files stored on the system and identifies memory locations at which the files are stored, and wherein the modified data are stored at memory locations occupied by the files, as identified by the table of contents.
24. The method of claim 23 further comprising, if an authorized access of a file replaced by the modified data is determined, the file is accessed.
25. The method of claim 1 wherein modifying the data segments comprises interleaving the data segments with the second data to generate interleaved data.
26. The method of claim 1 wherein modifying the data segments with second data comprises tokenizing the data segments with token data.
27. The method of claim 26 wherein the token data comprises lexical equivalents of assembly language commands.
28. The method of claim 27 wherein the lexical equivalents are consumed by a system interpreter, in turn generating alternative assembly language commands selected to obfuscate the digital content data in the event of an unauthorized access.
29. A method for preventing unauthorized use of digital content data in a system having memory locations comprising:
subdividing the digital content data into data segments;
modifying the data segments with second data to generate modified data;
scanning the system to determine available memory locations;
selecting target memory locations within the available memory locations at which to store the modified data; and storing the modified data at the target memory locations.
30. The method of claim 29 wherein a subset of available memory locations are located within file system locations.
31. The method of claim 29 wherein a subset of available memory locations are located outside file system locations.
32. The method of claim 29 further comprising generating a map of the target memory locations.
33. The method of claim 32 further comprising storing the map of target memory locations at the target memory locations.
34. The method of claim 29 wherein the digital data comprises data types selected from a group consisting of audio, video, documents, text and software.
35. The method of claim 29 wherein the data segments are of a variable length
36. The method of claim 29 wherein the second data comprises a randomly generated data stream.
37. The method of claim 29 wherein the second data comprises portions of the digital content data.
38. The method of claim 29 further comprising encrypting the modified data and storing the encrypted modified data.
39. The method of claim 38 further comprising encrypting the modified data with an encryption key.
40. The method of claim 39 further comprising encrypting the encryption key.
41. The method of claim 40 further comprising storing the encryption key with the encrypted modified data at the predetermined memory locations.
42. The method of claim 41 further comprising partitioning the encryption key among the encrypted modified data.
43. The method of claim 29 wherein the predetermined memory locations are selected as the locations at which the digital content data was originally stored.
44. The method of claim 29 wherein the digital content data comprises first and second digital content data and wherein the predetermined memory locations are selected as combinations of the locations at which the first and second digital content data were originally stored.
45. The method of claim 29 further comprising generating a map of locations at which the modified data is stored.
46. The method of claim 45 further comprising storing the map of locations at the predetermined memory locations.
47. The method of claim 29 further comprising:
retrieving the modified data from the predetermined memory locations; and de-interleaving the data segments based on the second data to generate original digital content data.
48. The method of claim 29 wherein the memory locations reside on a system and wherein a table of contents identifies files stored on the system, and wherein a subset of the memory locations used for storing the modified data are between memory locations used by files stored on the system, as identified by the table of contents.
49. The method of claim 29 wherein the memory locations reside on a system and wherein a table of contents identifies files stored on the system, and wherein a subset of the memory locations used for storing the modified data are exclusive of memory locations of files stored on the system, as identified by the table of contents.
50. The method of claim 29 wherein the memory locations reside on a system and wherein a table of contents identifies files stored on the system and identifies memory locations at which the files are stored, and wherein the modified data are stored at memory locations occupied by the files, as identified by the table of contents.
51. The method of claim 50 further comprising, if an authorized access of a file replaced by the modified data is determined, the file is accessed.
52. The method of claim 29 wherein modifying the data segments comprises interleaving the data segments with the second data to generate interleaved data.
53. The method of claim 29 wherein modifying the data segments with second data comprises tokenizing the data segments with token data.
54. The method of claim 53 wherein the token data comprises lexical equivalents of assembly language commands.
55. The method of claim 54 wherein the lexical equivalents are consumed by a system interpreter, in turn generating alternative assembly language commands selected to obfuscate the digital content data to deter unauthorized access.
56. A method for preventing unauthorized use of digital content data hosted on a system comprising:
modifying the digital content data with saturation data to generate modified data; and storing the modified data at predetermined memory locations on the system to deter unauthorized access of the digital content data.
57. The method of claim 56 further comprising subdividing the digital content data into data segments and modifying the data segments.
58. The method of claim 56 further comprising:
determining whether an unauthorized attempt at accessing the digital content data occurs;
in the event of unauthorized access, generating saturation traffic on the system to deter the unauthorized activity.
59. The method of claim 58 wherein the saturation traffic comprises system commands that burden system resources.
60. The method of claim 59 wherein the system commands are generated as a function of activity utilizing the system resources subject to the unauthorized access.
61. The method of claim 58 wherein determining whether an unauthorized attempt at accessing the digital content data occurs comprises monitoring activity of the system hosting the digital content data and determining whether the activity is inconsistent with the type of digital content data being hosted.
62. The method of claim 56 further comprising interleaving the digital content data with second data to generate interleaved data.
63. The method of claim 56 further comprising tokenizing the digital content data with token data.
64. A method for preventing unauthorized use of digital content data hosted on a system wherein a table of contents identifies files stored at memory locations of the system comprising:

identifying at the table of contents a first memory location referring to a location at which at which first data file is stored;
modifying the first memory location in the table of contents to refer to a second data file at a second location; and upon an attempt at access by the system of the first data file, accessing the second data file if the attempt is unauthorized.
65. The method of claim 64 further comprising accessing the first data file if the attempt is authorized.
66. A method for preventing unauthorized use of digital content data hosted on a system wherein a table of contents identifies files stored at memory locations of the system comprising:
identifying at the table of contents a first memory location referring to a location at which at which first data file is stored;
copying the contents of the first data file to a second memory location; and replacing the first data file with a second data file;
upon an attempt at access by the system of the first data file, accessing the second data file if the attempt is unauthorized.
67. The method of claim 66 further comprising accessing the first data file if the attempt is authorized.
68. A method for preventing unauthorized use of digital content data hosted on a system comprising:
monitoring an operating system interface of the system to determine access of operating system resources; and repeatedly generating a shim on the operating system interface to deter unauthorized access of the digital content data.
69. The method of claim 68 wherein the shim is generated in the event of an unauthorized access.
70. The method of claim 68 wherein the shim is repeatedly generated periodically, each shim being regenerated following a predetermined time period.
71. The method of claim 68 wherein the shim comprises first and second shims generated on the operating system interface for operation in front of and behind the unauthorized access respectively.
72. The method of claim 68 wherein generating the shim comprises initiating an operation that generates saturation data.
73. A method for preventing unauthorized use of digital content data hosted on a system comprising:
substituting a portion of the digital content data with token data to generate tokenized data; and storing the tokenized data at predetermined memory locations on the system to deter unauthorized access of the digital content data.
74. The method of claim 73 further comprising subdividing the digital content data into data segments and substituting a portion of the data segments.
75. The method of claim 73 further comprising interleaving the digital content data with second data to generate interleaved digital content data.
76. The method of claim 75 further comprising:
determining whether an unauthorized attempt at accessing the digital content data occurs;
in the event of unauthorized access, generating saturation traffic on the system to deter the unauthorized activity.
77. The method of claim 76 wherein the saturation traffic comprises system commands that burden system resources.
78. The method of claim 73 wherein the token data comprises lexical equivalents of assembly language commands.
79. The method of claim 78 wherein the lexical equivalents are consumed by a system interpreter, in turn generating alternative assembly language commands selected to obfuscate the digital content data to deter unauthorized access thereof.
80. A method for preventing unauthorized use of digital content data hosted on a system comprising:
monitoring an operating system interface operating on the system and the digital content data at an assassin process to determine whether an unauthorized attempt at accessing the digital content data occurs; and in the event of unauthorized access, deterring the unauthorized access and communicating the unauthorized access to the operating system interface.
81. The method of claim 80 wherein the assassin process further determines whether secondary assassin processes are located on the operating system interface, and, if so, causes the secondary assassin processes to exit.
82. The method of claim 80 wherein deterring unauthorized access comprises generating saturation data to deter the unauthorized activity.
83. The method of claim 80 wherein the step of monitoring comprises assembling a list of authorized accesses and comparing a newly generated process with the list to determine a status of the newly generated process as being authorized or unauthorized.
84. ~The method of claim 83 wherein the step of monitoring further tracks descendant processes of processes on the list to determine the status of the descendant process.
85. ~A method for preventing unauthorized use of digital content data in a system having memory locations comprising:
scanning the system to determine available memory locations based on a file system identifying locations of files on the system;
selecting target memory locations within the available memory locations at which to store the digital content data; and storing the digital content data at the target memory locations.
86. ~The method of claim 85 wherein a subset of available memory locations are located within files identified by the file system locations.
87. ~The method of claim 85 wherein a subset of available memory locations are located between files identified by the file system locations.
88. ~The method of claim 85 wherein a subset of available memory locations are located outside the file system locations.
89. ~A system for preventing unauthorized use of digital content data comprising:
a subdividing unit for subdividing the digital content data into data segments;
a modification unit for modifying the data segments with second data to generate modified data; and a storage unit for storing the modified data at predetermined memory locations.
90. ~~The system of claim 89 wherein the data segments are of a variable length
91. The system of claim 89 wherein the second data comprises a randomly generated data stream.
92. The system of claim 89 wherein the second data comprises portions of the digital content data.
93. The system of claim 89 further comprising an encryption unit for encrypting the modified data and storing the encrypted modified data.
94. The system of claim 93 wherein the encryption unit further encrypts the modified data with an encryption key.
95. The system of claim 94 wherein the encryption unit further encrypts the encryption key.
96. The system of claim 95 wherein the storage unit further stores the encryption key with the encrypted modified data at the predetermined memory locations.
97. The system of claim 96 further comprising a partitioning unit for partitioning the encryption key among the encrypted modified data.
98. The system of claim 89 wherein the predetermined memory locations are selected as the locations at which the digital content data was originally stored.
99. The system of claim 89 wherein the digital content data comprises first and second digital content data and wherein the predetermined memory locations are selected as combinations of the locations at which the first and second digital content data were originally stored.
100. The system of claim 89 further comprising a map generator for generating a map of locations at which the modified data is stored.
101. The system of claim 100 wherein the storage unit further stores the map of locations at the predetermined memory locations.
102. The system of claim 89 wherein the memory locations reside on the system and further comprising:
a scanner for scanning the system to determine available memory locations;
a selector for selecting target memory locations within the available memory locations at which to store the modified data; and wherein the storage unit stores the modified data at the target memory locations.
103. The system of claim 102 wherein a subset of available memory locations are located within file system locations
104. The system of claim 102 wherein a subset of available memory locations are located outside file system locations.
105. The system of claim 102 further comprising a map generator for generating a map of the target memory locations.
106. The system of claim 105 wherein the storage unit stores the map of target memory locations at the target memory locations.
107. The system of claim 89 further comprising:
means for retrieving the modified data from the predetermined memory locations; and means for de-interleaving the data segments based on the second data to generate original digital content data.
108. The system of claim 89 wherein the memory locations reside on a system and wherein a table of contents identifies files stored on the system, and wherein a subset of the memory locations used for storing the modified data are between memory locations used by files stored on the system, as identified by the table of contents.
109. The system of claim 89 wherein the memory locations reside on a system and wherein a table of contents identifies files stored on the system, and wherein a subset of the memory locations used for storing the modified data are exclusive of memory locations of files stored on the system, as identified by the table of contents.
110. The system of claim 89 wherein the memory locations reside on a system and wherein a table of contents identifies files stored on the system and identifies memory locations at which the files are stored, and wherein the modified data are stored at memory locations occupied by the files, as identified by the table of contents.
111. The system of claim 89 wherein the modification unit modifies the data segments comprises interleaving the data segments with the second data to generate interleaved data.
112. The system of claim 89 wherein the modification unit modifies the data segments with second data comprises tokenizing the data segments with token data.
113. The system of claim 112 wherein the token data comprises lexical equivalents of assembly language commands.
114. The system of claim 113 wherein the lexical equivalents are consumed by a system interpreter, in turn generating alternative assembly language commands selected to obfuscate the digital content data in the event of an unauthorized access.
115. A system for preventing unauthorized use of digital content data in a system having memory locations comprising:
means for subdividing the digital content data into data segments;
means for modifying the data segments with second data to generate modified data;
means for scanning the system to determine available memory locations;
a selector for selecting target memory locations within the available memory locations at which to store the modified data; and a storage unit for storing the modified data at the target memory locations.
116. The system of claim 115 wherein a subset of available memory locations are located within file system locations.
117. The system of claim 115 wherein a subset of available memory locations are located outside file system locations.
118. The system of claim 115 further comprising a map generator for generating a map of the target memory locations.
119. The system of claim 118 wherein the storage unit stores the map of target memory locations at the target memory locations.
120. The system of claim 115 further comprising means for encrypting the modified data and wherein the storage unit stores the encrypted modified data.
121. The system of claim 120 wherein the means for encrypting further encrypts the modified data with an encryption key.
122. The system of claim 121 wherein the means for encrypting further encrypts the encryption key.
123. The system of claim 115 wherein the memory locations reside on a system and wherein a table of contents identifies files stored on the system, and wherein a subset of the memory locations used for storing the modified data are between memory locations used by files stored on the system, as identified by the table of contents.
124. The system of claim 115 wherein the memory locations reside on a system and wherein a table of contents identifies files stored on the system, and wherein a subset of the memory locations used for storing the modified data are exclusive of memory locations of files stored on the system, as identified by the table of contents.
125. The system of claim 115 wherein the memory locations reside on a system and wherein a table of contents identifies files stored on the system and identifies memory locations at which the files are stored, and wherein the modified data are stored at memory locations occupied by the files, as identified by the table of contents.
126. A system for preventing unauthorized use of digital content data hosted on a system comprising:
a modification unit for modifying the digital content data with saturation data to generate modified data; and a storage unit for storing the modified data at predetermined memory locations on the system to deter unauthorized access of the digital content data.
127. The system of claim 126 further comprising subdividing the digital content data into data segments and modifying the data segments.
128. The system of claim 126 further comprising means for determining whether an unauthorized attempt at accessing the digital content data occurs, and, in the event of unauthorized access, means for generating saturation traffic on the system to deter the unauthorized activity.
129. The system of claim 128 wherein the saturation traffic comprises system commands that burden system resources.
130. The system of claim 129 wherein the system commands are generated as a function of activity utilizing the system resources subject to the unauthorized access.
131. The system of claim 128 wherein the means for determining whether an unauthorized attempt at accessing the digital content data occurs monitors activity of the system hosting the digital content data and determines whether the activity is inconsistent with the type of digital content data being hosted.
132. The system of claim 126 further comprising means for interleaving the digital content data with second data to generate interleaved data.
133. The system of claim 126 further comprising means for tokenizing the digital content data with token data.
134. A system for preventing unauthorized use of digital content data hosted on a system wherein a table of contents identifies files stored at memory locations of the system comprising:
a table of contents for identifying a first memory location referring to a location at which at which first data file is stored;
a modification unit for modifying the first memory location in the table of contents to refer to a second data file at a second location; and access means for, upon an attempt at access by the system of the first data file, accessing the second data file if the attempt is unauthorized.
135. The system of claim 134 wherein the access means further accesses the first data file if the attempt is authorized.
136. A system for preventing unauthorized use of digital content data hosted on a system wherein a table of contents identifies files stored at memory locations of the system comprising:
a table of contents for identifying a first memory location referring to a location at which at which first data file is stored;
means for copying the contents of the first data file to a second memory location; and means for replacing the first data file with a second data file;
access means for, upon an attempt at access by the system of the first data file, accessing the second data file if the attempt is unauthorized.
137. The system of claim 136 wherein the access means accesses the first data file if the attempt is authorized.
138. A system for preventing unauthorized use of digital content data hosted on a system comprising:
means for monitoring an operating system interface of the system to determine access of operating system resources; and means for repeatedly generating a shim on the operating system interface to deter unauthorized access of the digital content data.
139. The system of claim 138 wherein the shim is generated in the event of an unauthorized access.
140. The system of claim 138 wherein the shim is repeatedly generated periodically, each shim being regenerated following a predetermined time period.
141. The system of claim 138 wherein the shim comprises first and second shims generated on the operating system interface for operation in front of and behind the unauthorized access respectively.
142. The system of claim 138 wherein the means for generating the shim further initiates an operation that generates saturation data.
143. A system for preventing unauthorized use of digital content data hosted on a system comprising:
means for substituting a portion of the digital content data with token data to generate tokenized data; and means for storing the tokenized data at predetermined memory locations on the system to deter unauthorized access of the digital content data.
144. The system of claim 143 further comprising means for subdividing the digital content data into data segments and substituting a portion of the data segments.
145. The system of claim 143 further comprising means for interleaving the digital content data with second data to generate interleaved digital content data.
146. The system of claim 143 further comprising:
means for determining whether an unauthorized attempt at accessing the digital content data occurs; and means for generating saturation traffic on the system to deter the unauthorized activity in the event of unauthorized access.
147. The system of claim 146 wherein the saturation traffic comprises system commands that burden system resources.
148. The system of claim 143 wherein the token data comprises lexical equivalents of assembly language commands.
149. The system of claim 148 wherein the lexical equivalents are consumed by a system interpreter, in turn generating alternative assembly language commands selected to obfuscate the digital content data to deter unauthorized access thereof.
150. A system for preventing unauthorized use of digital content data hosted on a system comprising:
an assassin process for monitoring an operating system interface operating on the system and the digital content data to determine whether an unauthorized attempt at accessing the digital content data occurs; and means for deterring the unauthorized access and communicating the unauthorized access to the operating system interface, in the event of unauthorized access.
151. The system of claim 150 wherein the assassin process further determines whether secondary assassin processes are located on the operating system interface, and, if so, causes the secondary assassin processes to exit.
152. The system of claim 150 wherein the means for deterring unauthorized access comprises means for generating saturation data to deter the unauthorized activity.
153. The system of claim 150 wherein the assassin process assembles a list of authorized accesses and compares a newly generated process with the list to determine a status of the newly generated process as being authorized or unauthorized.
154. The system of claim 153 wherein the assassin process further tracks descendant processes of processes on the list to determine the status of the descendant process.
155. A system for preventing unauthorized use of digital content data in a system having memory locations comprising:
a scanner for scanning the system to determine available memory locations based on a file system identifying locations of files on the system;
means for selecting target memory locations within the available memory locations at which to store the digital content data; and a storage unit for storing the digital content data at the target memory locations.
156. The system of claim 155 wherein a subset of available memory locations are located within files identified by the file system locations.
157. The system of claim 155 wherein a subset of available memory locations are located between files identified by the file system locations.
158. The system of claim 155 wherein a subset of available memory locations are located outside the file system locations.
159. A system for preventing unauthorized use of digital content data in a system having memory locations wherein the system enables a user to select from a plurality of tool modules, each module providing a service for protecting digital content from unauthorized use such that a user can protect digital content.
160. The system of claim 159 wherein the tool modules comprise modules that perform functions selected from the group of functions consisting of:
interleaving; tokenization; obfuscation; saturation; translocation; shimming and assassination.
CA2435624A 2000-09-22 2001-09-21 Systems and methods for preventing unauthorized use of digital content Expired - Fee Related CA2435624C (en)

Applications Claiming Priority (9)

Application Number Priority Date Filing Date Title
US23465700P 2000-09-22 2000-09-22
US60/234,657 2000-09-22
US24061100P 2000-10-16 2000-10-16
US60/240,611 2000-10-16
US24294900P 2000-10-24 2000-10-24
US60/242,949 2000-10-24
US24470400P 2000-10-31 2000-10-31
US60/244,704 2000-10-31
PCT/US2001/029554 WO2002025415A2 (en) 2000-09-22 2001-09-21 Systems and methods for preventing unauthorized use of digital content

Publications (2)

Publication Number Publication Date
CA2435624A1 true CA2435624A1 (en) 2002-03-28
CA2435624C CA2435624C (en) 2013-05-07

Family

ID=27499759

Family Applications (1)

Application Number Title Priority Date Filing Date
CA2435624A Expired - Fee Related CA2435624C (en) 2000-09-22 2001-09-21 Systems and methods for preventing unauthorized use of digital content

Country Status (5)

Country Link
US (2) US7565697B2 (en)
EP (1) EP1352307A2 (en)
AU (3) AU2001292910B2 (en)
CA (1) CA2435624C (en)
WO (1) WO2002025415A2 (en)

Families Citing this family (78)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7644282B2 (en) 1998-05-28 2010-01-05 Verance Corporation Pre-processed information embedding system
US6737957B1 (en) 2000-02-16 2004-05-18 Verance Corporation Remote control signaling using audio watermarks
US20050050343A1 (en) * 2000-06-30 2005-03-03 Selinfreund Richard H. Storage media access control method and system
US7237123B2 (en) * 2000-09-22 2007-06-26 Ecd Systems, Inc. Systems and methods for preventing unauthorized use of digital content
CA2435624C (en) * 2000-09-22 2013-05-07 Richard B. Levine Systems and methods for preventing unauthorized use of digital content
US7916124B1 (en) 2001-06-20 2011-03-29 Leapfrog Enterprises, Inc. Interactive apparatus using print media
AU2002350203A1 (en) * 2001-11-20 2003-06-10 Contentguard Holdings, Inc. Systems and methods for creating, manipulating and processing rights and contract expressions using tokenized templates
US20030120614A1 (en) * 2001-12-20 2003-06-26 Dun & Bradstreet, Inc. Automated e-commerce authentication method and system
US7539391B2 (en) * 2002-06-27 2009-05-26 Nxp B.V. Method and apparatus for trick-mode support of audio/video/data streams with conditional access
DE10335943A1 (en) * 2002-08-06 2004-06-03 Brainshield Technologies Inc. Device for copy-protected distribution of electronic documents via public electronic data network e.g. the internet, with time-limited access to reconstruction server for reconstruction of encrypted document
EP2782337A3 (en) 2002-10-15 2014-11-26 Verance Corporation Media monitoring, management and information system
US7363620B2 (en) 2003-09-25 2008-04-22 Sun Microsystems, Inc. Non-linear execution of application program instructions for application program obfuscation
US7353499B2 (en) * 2003-09-25 2008-04-01 Sun Microsystems, Inc. Multiple instruction dispatch tables for application program obfuscation
US20050069138A1 (en) * 2003-09-25 2005-03-31 Sun Microsystems, Inc., A Delaware Corporation Application program obfuscation
US7424620B2 (en) * 2003-09-25 2008-09-09 Sun Microsystems, Inc. Interleaved data and instruction streams for application program obfuscation
US8220058B2 (en) * 2003-09-25 2012-07-10 Oracle America, Inc. Rendering and encryption engine for application program obfuscation
US7415618B2 (en) * 2003-09-25 2008-08-19 Sun Microsystems, Inc. Permutation of opcode values for application program obfuscation
US7369677B2 (en) 2005-04-26 2008-05-06 Verance Corporation System reactions to the detection of embedded watermarks in a digital host content
US20060239501A1 (en) 2005-04-26 2006-10-26 Verance Corporation Security enhancements of digital watermarks for multi-media content
US9055239B2 (en) 2003-10-08 2015-06-09 Verance Corporation Signal continuity assessment using embedded watermarks
US7616776B2 (en) 2005-04-26 2009-11-10 Verance Corproation Methods and apparatus for enhancing the robustness of watermark extraction from digital host content
US8085938B2 (en) * 2004-02-10 2011-12-27 Ntt Communications Corporation Secret information management scheme based on secret sharing scheme
US7853193B2 (en) 2004-03-17 2010-12-14 Leapfrog Enterprises, Inc. Method and device for audibly instructing a user to interact with a function
JP4843208B2 (en) * 2004-09-30 2011-12-21 株式会社東芝 Digital content editing apparatus, digital content editing method, digital content editing program, and recording medium recording digital content editing program
US8020004B2 (en) 2005-07-01 2011-09-13 Verance Corporation Forensic marking using a common customization function
US8781967B2 (en) 2005-07-07 2014-07-15 Verance Corporation Watermarking in an encrypted domain
US7549596B1 (en) * 2005-07-29 2009-06-23 Nvidia Corporation Image bearing surface
US7922099B1 (en) 2005-07-29 2011-04-12 Leapfrog Enterprises, Inc. System and method for associating content with an image bearing surface
RU2439669C2 (en) 2005-08-06 2012-01-10 Майкрософт Корпорейшн Method to prevent reverse engineering of software, unauthorised modification and data capture during performance
US7536540B2 (en) 2005-09-14 2009-05-19 Sandisk Corporation Method of hardware driver integrity check of memory card controller firmware
US7936339B2 (en) 2005-11-01 2011-05-03 Leapfrog Enterprises, Inc. Method and system for invoking computer functionality by interaction with dynamically generated interface regions of a writing surface
JP4564464B2 (en) * 2006-01-05 2010-10-20 株式会社東芝 Digital content playback apparatus, method and program
US8599143B1 (en) 2006-02-06 2013-12-03 Leapfrog Enterprises, Inc. Switch configuration for detecting writing pressure in a writing device
US8640235B2 (en) * 2006-03-31 2014-01-28 Symantec Corporation Determination of malicious entities
US8127360B1 (en) * 2006-06-29 2012-02-28 Symantec Corporation Method and apparatus for detecting leakage of sensitive information
US8261967B1 (en) 2006-07-19 2012-09-11 Leapfrog Enterprises, Inc. Techniques for interactively coupling electronic content with printed media
US8146163B2 (en) * 2006-11-09 2012-03-27 International Business Machines Corporation Method and system for securing personal computing devices from unauthorized data copying and removal
US8286138B2 (en) * 2007-01-30 2012-10-09 Microsoft Corporation Multi-threaded detection of a game software debugger
US20080189789A1 (en) * 2007-02-01 2008-08-07 Elaine Lamontagne System, method and apparatus for the detection and capturing of technological crime instances
CN101311942B (en) * 2007-05-23 2011-08-24 西门子(中国)有限公司 Software encryption and decryption method and encryption and decryption device
US20090113549A1 (en) * 2007-10-24 2009-04-30 International Business Machines Corporation System and method to analyze software systems against tampering
US8156565B2 (en) * 2008-04-28 2012-04-10 Microsoft Corporation Hardware-based protection of secure data
US8393008B2 (en) * 2008-05-21 2013-03-05 Microsoft Corporation Hardware-based output protection of multiple video streams
US8259938B2 (en) 2008-06-24 2012-09-04 Verance Corporation Efficient and secure forensic marking in compressed
US9871807B2 (en) * 2009-06-12 2018-01-16 Microsoft Technology Licensing, Llc Generic protocol decoder for generic application-level protocol signatures
US8595812B2 (en) * 2009-12-18 2013-11-26 Sabre Inc. Tokenized data security
US8838977B2 (en) 2010-09-16 2014-09-16 Verance Corporation Watermark extraction and content screening in a networked environment
TWI420339B (en) 2010-11-10 2013-12-21 Ind Tech Res Inst Software authorization system and method
US20120321078A1 (en) 2011-06-20 2012-12-20 Jason Chambers Key rotation and selective re-encryption for data security
US11194462B2 (en) * 2011-08-03 2021-12-07 Avaya Inc. Exclusion of selected data from access by collaborators
US8533481B2 (en) 2011-11-03 2013-09-10 Verance Corporation Extraction of embedded watermarks from a host content based on extrapolation techniques
US8923548B2 (en) 2011-11-03 2014-12-30 Verance Corporation Extraction of embedded watermarks from a host content using a plurality of tentative watermarks
US8682026B2 (en) 2011-11-03 2014-03-25 Verance Corporation Efficient extraction of embedded watermarks in the presence of host content distortions
US8615104B2 (en) 2011-11-03 2013-12-24 Verance Corporation Watermark extraction based on tentative watermarks
US8745403B2 (en) 2011-11-23 2014-06-03 Verance Corporation Enhanced content management based on watermark extraction records
US9323902B2 (en) 2011-12-13 2016-04-26 Verance Corporation Conditional access using embedded watermarks
US9547753B2 (en) 2011-12-13 2017-01-17 Verance Corporation Coordinated watermarking
RU2014152808A (en) * 2012-05-25 2016-07-20 Конинклейке Филипс Н.В. METHOD, SYSTEM AND DEVICE FOR PROTECTION FROM REVERSE ENGINEERING AND / OR INTERFERENCE IN PROGRAMS
US9887887B2 (en) 2012-07-09 2018-02-06 Eturi Corp. Information throttle based on compliance with electronic communication rules
US9854393B2 (en) 2012-07-09 2017-12-26 Eturi Corp. Partial information throttle based on compliance with an agreement
US8706872B2 (en) 2012-07-09 2014-04-22 Parentsware, Llc Agreement compliance controlled information throttle
US9847948B2 (en) 2012-07-09 2017-12-19 Eturi Corp. Schedule and location responsive agreement compliance controlled device throttle
US10079931B2 (en) 2012-07-09 2018-09-18 Eturi Corp. Information throttle that enforces policies for workplace use of electronic devices
US9571606B2 (en) 2012-08-31 2017-02-14 Verance Corporation Social media viewing system
US8869222B2 (en) 2012-09-13 2014-10-21 Verance Corporation Second screen content
US20140075469A1 (en) 2012-09-13 2014-03-13 Verance Corporation Content distribution including advertisements
US8726304B2 (en) 2012-09-13 2014-05-13 Verance Corporation Time varying evaluation of multimedia content
US8806558B1 (en) * 2013-09-20 2014-08-12 Limelight Networks, Inc. Unique watermarking of content objects according to end user identity
US9262793B2 (en) 2013-03-14 2016-02-16 Verance Corporation Transactional video marking system
US9251549B2 (en) 2013-07-23 2016-02-02 Verance Corporation Watermark extractor enhancements based on payload ranking
US9645860B2 (en) * 2013-09-06 2017-05-09 Microsoft Technology Licensing, Llc Verification that particular information is transferred by an application
US9208334B2 (en) 2013-10-25 2015-12-08 Verance Corporation Content management using multiple abstraction layers
EP2913772A1 (en) * 2014-02-28 2015-09-02 Wibu-Systems AG Method and computer system for protecting a computer program against influence
KR101731770B1 (en) 2014-03-13 2017-04-28 베란스 코오포레이션 Interactive content acquisition using embedded codes
US10445505B2 (en) * 2014-09-22 2019-10-15 Mcafee, Llc Process vulnerability assessment
US10614826B2 (en) 2017-05-24 2020-04-07 Modulate, Inc. System and method for voice-to-voice conversion
US10440063B1 (en) 2018-07-10 2019-10-08 Eturi Corp. Media device content review and management
WO2021030759A1 (en) * 2019-08-14 2021-02-18 Modulate, Inc. Generation and detection of watermark for real-time voice conversion

Family Cites Families (125)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4118789A (en) * 1977-06-06 1978-10-03 Allen-Bradley Company Program protection module for programmable controller
US4278837A (en) * 1977-10-31 1981-07-14 Best Robert M Crypto microprocessor for executing enciphered programs
US4405829A (en) * 1977-12-14 1983-09-20 Massachusetts Institute Of Technology Cryptographic communications system and method
US4306289A (en) * 1980-02-04 1981-12-15 Western Electric Company, Inc. Digital computer having code conversion apparatus for an encrypted program
US4433207A (en) * 1981-09-10 1984-02-21 Best Robert M Cryptographic decoder for computer programs
US4593353A (en) * 1981-10-26 1986-06-03 Telecommunications Associates, Inc. Software protection method and apparatus
US4577289A (en) * 1983-12-30 1986-03-18 International Business Machines Corporation Hardware key-on-disk system for copy-protecting magnetic storage media
US4688169A (en) * 1985-05-30 1987-08-18 Joshi Bhagirath S Computer software security system
US4864494A (en) * 1986-03-21 1989-09-05 Computerized Data Ssytems For Mfg., Inc. Software usage authorization system with key for decrypting/re-encrypting/re-transmitting moving target security codes from protected software
US5014234A (en) * 1986-08-25 1991-05-07 Ncr Corporation System with software usage timer and counter for allowing limited use but preventing continued unauthorized use of protected software
US5021997A (en) * 1986-09-29 1991-06-04 At&T Bell Laboratories Test automation system
US4977594A (en) * 1986-10-14 1990-12-11 Electronic Publishing Resources, Inc. Database usage metering and protection system and method
US5050213A (en) * 1986-10-14 1991-09-17 Electronic Publishing Resources, Inc. Database usage metering and protection system and method
US4827508A (en) * 1986-10-14 1989-05-02 Personal Library Software, Inc. Database usage metering and protection system and method
US5155680A (en) * 1986-10-24 1992-10-13 Signal Security Technologies Billing system for computing software
GB8704920D0 (en) * 1987-03-03 1987-04-08 Hewlett Packard Co Secure messaging system
US5038320A (en) * 1987-03-13 1991-08-06 International Business Machines Corp. Computer system with automatic initialization of pluggable option cards
US4999806A (en) * 1987-09-04 1991-03-12 Fred Chernow Software distribution system
US5140634A (en) * 1987-09-07 1992-08-18 U.S Philips Corporation Method and apparatus for authenticating accreditations and for authenticating and signing messages
US4864616A (en) * 1987-10-15 1989-09-05 Micronyx, Inc. Cryptographic labeling of electronically stored data
US4916637A (en) * 1987-11-18 1990-04-10 International Business Machines Corporation Customized instruction generator
US5113518A (en) * 1988-06-03 1992-05-12 Durst Jr Robert T Method and system for preventing unauthorized use of software
US4969189A (en) * 1988-06-25 1990-11-06 Nippon Telegraph & Telephone Corporation Authentication system and apparatus therefor
US5155847A (en) * 1988-08-03 1992-10-13 Minicom Data Corporation Method and apparatus for updating software at remote locations
US5023907A (en) * 1988-09-30 1991-06-11 Apollo Computer, Inc. Network license server
DE3906349A1 (en) * 1989-03-01 1990-09-13 Hartmut Hennige METHOD AND DEVICE FOR SIMPLIFYING THE USE OF A VARIETY OF CREDIT CARDS AND THE LIKE
US5155837A (en) * 1989-03-02 1992-10-13 Bell Communications Research, Inc. Methods and apparatus for software retrofitting
US5191611A (en) * 1989-04-03 1993-03-02 Lang Gerald S Method and apparatus for protecting material on storage media and for transferring material on storage media to various recipients
US5199066A (en) * 1989-04-18 1993-03-30 Special Effects Software, Inc. Method and apparatus for protecting software
JPH02293930A (en) * 1989-05-08 1990-12-05 Victor Co Of Japan Ltd Preventing system for stealing of recording contents of recording medium
US5166886A (en) * 1989-07-31 1992-11-24 Molnar Charles E System to demonstrate and sell computer programs
US5081675A (en) * 1989-11-13 1992-01-14 Kitti Kittirutsunetorn System for protection of software in memory against unauthorized use
US5033084A (en) * 1990-04-02 1991-07-16 Data I/O Corporation Method and apparatus for protection of software in an electronic system
US5027396A (en) * 1990-05-07 1991-06-25 Xerox Corporation Execution protection for floppy disks
EP0463251A1 (en) * 1990-06-28 1992-01-02 International Business Machines Corporation Software installation
JPH0792744B2 (en) * 1990-08-20 1995-10-09 インターナショナル・ビジネス・マシーンズ・コーポレイション A method of installing multi-level application software on a data processing device.
FR2673476B1 (en) * 1991-01-18 1996-04-12 Gemplus Card Int SECURE METHOD FOR LOADING MULTIPLE APPLICATIONS INTO A MICROPROCESSOR MEMORY CARD.
US5182770A (en) * 1991-04-19 1993-01-26 Geza Medveczky System and apparatus for protecting computer software
AU2247092A (en) 1991-05-08 1992-12-21 Digital Equipment Corporation License management system
US5351297A (en) * 1991-06-28 1994-09-27 Matsushita Electric Industrial Co., Ltd. Method of privacy communication using elliptic curves
DE9109977U1 (en) * 1991-08-12 1992-12-24 Intelligent Solution Services Gmbh, 8051 Marzling, De
US5414850A (en) * 1991-08-23 1995-05-09 Stac Electronics, Inc. System for transparently compressing data files in a computer system
US5222133A (en) * 1991-10-17 1993-06-22 Wayne W. Chou Method of protecting computer software from unauthorized execution using multiple keys
WO1993011480A1 (en) * 1991-11-27 1993-06-10 Intergraph Corporation System and method for network license administration
US5524072A (en) * 1991-12-04 1996-06-04 Enco-Tone Ltd. Methods and apparatus for data encryption and transmission
US5220606A (en) * 1992-02-10 1993-06-15 Harold Greenberg Cryptographic system and method
JP3073590B2 (en) * 1992-03-16 2000-08-07 富士通株式会社 Electronic data protection system, licensor's device and user's device
JPH05281906A (en) * 1992-04-02 1993-10-29 Fujitsu Ltd Cipher key common-used system
US5528490A (en) 1992-04-10 1996-06-18 Charles E. Hill & Associates, Inc. Electronic catalog system and method
US5313521A (en) * 1992-04-15 1994-05-17 Fujitsu Limited Key distribution protocol for file transfer in the local area network
JP2659896B2 (en) * 1992-04-29 1997-09-30 インターナショナル・ビジネス・マシーンズ・コーポレイション Structured document copy management method and structured document copy management device
US5367683A (en) * 1992-06-26 1994-11-22 Digital Equipment Corporation Smart recompilation of performing matchup/difference after code generation
US5410703A (en) * 1992-07-01 1995-04-25 Telefonaktiebolaget L M Ericsson System for changing software during computer operation
US5361359A (en) * 1992-08-31 1994-11-01 Trusted Information Systems, Inc. System and method for controlling the use of a computer
NZ255971A (en) * 1992-09-21 1997-05-26 Uniloc Singapore Private Ltd Software registration and licensing system uses matching of licensee indentification codes
US5327563A (en) * 1992-11-13 1994-07-05 Hewlett-Packard Method for locking software files to a specific storage device
US5341429A (en) * 1992-12-04 1994-08-23 Testdrive Corporation Transformation of ephemeral material
US5509070A (en) * 1992-12-15 1996-04-16 Softlock Services Inc. Method for encouraging purchase of executable and non-executable software
ATE176953T1 (en) * 1993-01-18 1999-03-15 Siemens Ag REAL-TIME CONTROL SYSTEM
US5351293A (en) * 1993-02-01 1994-09-27 Wave Systems Corp. System method and apparatus for authenticating an encrypted signal
US5483658A (en) * 1993-02-26 1996-01-09 Grube; Gary W. Detection of unauthorized use of software applications in processing devices
US5379343A (en) * 1993-02-26 1995-01-03 Motorola, Inc. Detection of unauthorized use of software applications in communication units
US5585585A (en) * 1993-05-21 1996-12-17 Coda Music Technology, Inc. Automated accompaniment apparatus and method
US5337357A (en) * 1993-06-17 1994-08-09 Software Security, Inc. Method of software distribution protection
US5497423A (en) * 1993-06-18 1996-03-05 Matsushita Electric Industrial Co., Ltd. Method of implementing elliptic curve cryptosystems in digital signatures or verification and privacy communication
US5544246A (en) * 1993-09-17 1996-08-06 At&T Corp. Smartcard adapted for a plurality of service providers and for remote installation of same
US5625690A (en) * 1993-11-15 1997-04-29 Lucent Technologies Inc. Software pay per use system
US5421009A (en) * 1993-12-22 1995-05-30 Hewlett-Packard Company Method of remotely installing software directly from a central computer
US5495411A (en) * 1993-12-22 1996-02-27 Ananda; Mohan Secure software rental system using continuous asynchronous password verification
US5473687A (en) * 1993-12-29 1995-12-05 Infosafe Systems, Inc. Method for retrieving secure information from a database
US5509074A (en) * 1994-01-27 1996-04-16 At&T Corp. Method of protecting electronically published materials using cryptographic protocols
US5553143A (en) * 1994-02-04 1996-09-03 Novell, Inc. Method and apparatus for electronic licensing
JPH07230380A (en) * 1994-02-15 1995-08-29 Internatl Business Mach Corp <Ibm> Method and system for controlling utilization of application program
US5394469A (en) * 1994-02-18 1995-02-28 Infosafe Systems, Inc. Method and apparatus for retrieving secure information from mass storage media
JPH07244781A (en) 1994-03-07 1995-09-19 C S K Sogo Kenkyusho:Kk Method and device for renting software and circulation medium
CA2143874C (en) 1994-04-25 2000-06-20 Thomas Edward Cooper Method and apparatus for enabling trial period use of software products: method and apparatus for utilizing a decryption stub
US5757907A (en) 1994-04-25 1998-05-26 International Business Machines Corporation Method and apparatus for enabling trial period use of software products: method and apparatus for generating a machine-dependent identification
US5557675A (en) * 1994-05-10 1996-09-17 Schupak; Donald Computer controlled audio-visual system
US5473692A (en) * 1994-09-07 1995-12-05 Intel Corporation Roving software license for a hardware agent
US5511123A (en) * 1994-08-04 1996-04-23 Northern Telecom Limited Symmetric cryptographic system for data encryption
US5557346A (en) 1994-08-11 1996-09-17 Trusted Information Systems, Inc. System and method for key escrow encryption
US5570291A (en) * 1994-08-24 1996-10-29 Wallace Computer Services, Inc. Custom product estimating and order processing system
US5615061A (en) * 1994-09-29 1997-03-25 Singh; Jitendra K. Method of preventng software piracy by uniquely identifying the specific magnetic storage device the software is stored on
US5579479A (en) * 1994-10-03 1996-11-26 Plum Hall Inc. Computer software licensing authentication method and apparatus
US5654746A (en) * 1994-12-01 1997-08-05 Scientific-Atlanta, Inc. Secure authorization and control method and apparatus for a game delivery service
US5625692A (en) 1995-01-23 1997-04-29 International Business Machines Corporation Method and system for a public key cryptosystem having proactive, robust, and recoverable distributed threshold secret sharing
US5826245A (en) * 1995-03-20 1998-10-20 Sandberg-Diment; Erik Providing verification information for a transaction
US6671813B2 (en) * 1995-06-07 2003-12-30 Stamps.Com, Inc. Secure on-line PC postage metering system
US5615264A (en) 1995-06-08 1997-03-25 Wave Systems Corp. Encrypted data package record for use in remote transaction metered data system
US5592549A (en) 1995-06-15 1997-01-07 Infosafe Systems, Inc. Method and apparatus for retrieving selected information from a secure information source
US5671412A (en) * 1995-07-28 1997-09-23 Globetrotter Software, Incorporated License management system for software applications
US5721781A (en) 1995-09-13 1998-02-24 Microsoft Corporation Authentication system and method for smart card transactions
US5638445A (en) 1995-09-19 1997-06-10 Microsoft Corporation Blind encryption
US5758068A (en) 1995-09-19 1998-05-26 International Business Machines Corporation Method and apparatus for software license management
US5708709A (en) 1995-12-08 1998-01-13 Sun Microsystems, Inc. System and method for managing try-and-buy usage of application programs
US5790664A (en) 1996-02-26 1998-08-04 Network Engineering Software, Inc. Automated system for management of licensed software
US5794230A (en) 1996-03-15 1998-08-11 Microsoft Corporation Method and system for creating and searching directories on a server
US5754647A (en) 1996-03-27 1998-05-19 United Microelectronics Corporation Software protection apparatus and the method of protection utilizing read-write memory means having inconsistent input and output data
US6918038B1 (en) * 1996-08-13 2005-07-12 Angel Secure Networks, Inc. System and method for installing an auditable secure network
US6012144A (en) * 1996-10-08 2000-01-04 Pickett; Thomas E. Transaction security method and apparatus
JP3172475B2 (en) * 1996-12-26 2001-06-04 日本アイ・ビー・エム株式会社 Data hiding method and data extraction method using statistical test
EP0855638A1 (en) * 1997-01-24 1998-07-29 Deutsche Thomson-Brandt Gmbh Method and apparatus for encrypting and for decrypting data arranged in a data sector
US5930828A (en) * 1997-03-26 1999-07-27 Executive Software International Real-time apparatus and method for minimizing disk fragmentation in a computer system
US5974549A (en) * 1997-03-27 1999-10-26 Soliton Ltd. Security monitor
US7457415B2 (en) * 1998-08-20 2008-11-25 Akikaze Technologies, Llc Secure information distribution system utilizing information segment scrambling
JP2000090645A (en) * 1998-09-08 2000-03-31 Sony Corp File management device and method and supply medium
CN1224909C (en) * 1998-10-16 2005-10-26 松下电器产业株式会社 Digital works protecting system
GB9903900D0 (en) * 1999-02-19 1999-04-14 Digital Gramaphone And Wireles Data encoding/decoding device and apparatus using the same
CA2267395C (en) * 1999-03-30 2002-07-09 Ibm Canada Limited-Ibm Canada Limitee Method and system for managing keys for encrypted data
GB2353676A (en) * 1999-08-17 2001-02-28 Hewlett Packard Co Robust encryption and decryption of packetised data transferred across communications networks
US7757097B2 (en) * 1999-09-03 2010-07-13 Purdue Research Foundation Method and system for tamperproofing software
JP3534027B2 (en) * 1999-12-01 2004-06-07 日本電気株式会社 Content providing apparatus and machine-readable recording medium recording program
US7065652B1 (en) * 2000-06-21 2006-06-20 Aladdin Knowledge Systems, Ltd. System for obfuscating computer code upon disassembly
US7237123B2 (en) * 2000-09-22 2007-06-26 Ecd Systems, Inc. Systems and methods for preventing unauthorized use of digital content
CA2435624C (en) * 2000-09-22 2013-05-07 Richard B. Levine Systems and methods for preventing unauthorized use of digital content
US7328453B2 (en) * 2001-05-09 2008-02-05 Ecd Systems, Inc. Systems and methods for the prevention of unauthorized use and manipulation of digital content
US20030204702A1 (en) * 2002-04-30 2003-10-30 Adc Dsl Systems, Inc. Flexible memory architecture for an embedded processor
US7260890B2 (en) * 2002-06-26 2007-08-28 Georgia Tech Research Corporation Methods for fabricating three-dimensional all organic interconnect structures
WO2004034395A1 (en) * 2002-10-10 2004-04-22 Matsushita Electric Industrial Co., Ltd. Optical disc, reproducing device, program, reproducing method, recording method
US7290125B2 (en) * 2003-04-17 2007-10-30 International Business Corporation Method for scheduling launch a computer system based upon a time of timed power-on partition of logical partitions
US7877754B2 (en) * 2003-08-21 2011-01-25 International Business Machines Corporation Methods, systems, and media to expand resources available to a logical partition
US7631360B2 (en) * 2004-06-12 2009-12-08 Microsoft Corporation Hardware protection
US7797702B1 (en) * 2005-02-22 2010-09-14 Symantec Corporation Preventing execution of remotely injected threads
US20080115219A1 (en) * 2006-11-13 2008-05-15 Electronics And Telecommunications Research Apparatus and method of detecting file having embedded malicious code
KR20100078081A (en) * 2008-12-30 2010-07-08 (주) 세인트 시큐리티 System and method for detecting unknown malicious codes by analyzing kernel based system events

Also Published As

Publication number Publication date
US7565697B2 (en) 2009-07-21
AU2008203454B2 (en) 2011-10-20
WO2002025415A2 (en) 2002-03-28
US20020120854A1 (en) 2002-08-29
WO2002025415A8 (en) 2003-08-14
CA2435624C (en) 2013-05-07
AU2001292910B2 (en) 2008-05-01
AU9291001A (en) 2002-04-02
EP1352307A2 (en) 2003-10-15
AU2008203454A1 (en) 2008-08-21
US20100122349A1 (en) 2010-05-13
US8015608B2 (en) 2011-09-06

Similar Documents

Publication Publication Date Title
CA2435624A1 (en) Systems and methods for preventing unauthorized use of digital content
EP0238537B1 (en) System for preventing software piracy employing multi-encrypted keys and single decryption circuit modules
US7146644B2 (en) Data security system and method responsive to electronic attacks
US5933497A (en) Apparatus and method for controlling access to software
Petersen et al. System implications of information privacy
US5822771A (en) System for management of software employing memory for processing unit with regulatory information, for limiting amount of use and number of backup copies of software
US5606610A (en) Apparatus and method for storing data
CA2242596C (en) System for controlling access and distribution of digital property
KR100626920B1 (en) File managing system, file managing device, file managing method, and program recording medium
AU2001292910A1 (en) Systems and methods for preventing unauthorized use of digital content
US20050246551A1 (en) System and method for rendering selective presentation of documents
WO2006035227A2 (en) Source code protection
EP0325777A3 (en) A distributed auditing subsystem for an operating system
KR980010772A (en) How to prevent copying of computer software
CN111460531A (en) Multidimensional grading destruction method for key data
US7571490B2 (en) Method and apparatus for protecting data from unauthorized modification
KR20170062307A (en) Apparatus and method for hidding hidden message
GB2276965A (en) Protecting temporarily stored data.
WO2005020008A2 (en) Data security through dissembly of data elements or connectiions between elements
US20240054217A1 (en) Method and apparatus for detecting disablement of data backup processes
Brown et al. Guidelines for Audit Log Mechanisms in Secure Computer Systems
WO2003029939A3 (en) Systems and methods for preventing unauthorized use of digital content
Kantzavelou et al. An attack detection system for secure computer systems—Outline of the solution
Menendez et al. A Guide to Understanding Audit in Trusted Systems
Schneider et al. Final Evaluation Report of Infosafe Corporation, X-Lock 50. Version 2. 00

Legal Events

Date Code Title Description
EEER Examination request
MKLA Lapsed

Effective date: 20160921