CA2435624A1 - Systems and methods for preventing unauthorized use of digital content - Google Patents
Systems and methods for preventing unauthorized use of digital content Download PDFInfo
- Publication number
- CA2435624A1 CA2435624A1 CA002435624A CA2435624A CA2435624A1 CA 2435624 A1 CA2435624 A1 CA 2435624A1 CA 002435624 A CA002435624 A CA 002435624A CA 2435624 A CA2435624 A CA 2435624A CA 2435624 A1 CA2435624 A1 CA 2435624A1
- Authority
- CA
- Canada
- Prior art keywords
- data
- memory locations
- digital content
- content data
- locations
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract 113
- 230000004048 modification Effects 0.000 claims abstract 7
- 238000012986 modification Methods 0.000 claims abstract 7
- 230000000694 effects Effects 0.000 claims 12
- 238000012544 monitoring process Methods 0.000 claims 7
- 230000006870 function Effects 0.000 claims 4
- 238000000638 solvent extraction Methods 0.000 claims 4
- 230000000977 initiatory effect Effects 0.000 claims 1
- 230000005945 translocation Effects 0.000 claims 1
- 230000004224 protection Effects 0.000 abstract 1
- 230000009979 protective mechanism Effects 0.000 abstract 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/14—Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
Abstract
Theft, distribution, and piracy of digital content (software, video, audio, ebooks, any content of any kind that is digitally stored and distributed) is generally accomplished by copying it, if possible, or, if it is protected from being copied in any fashion, such piracy is based upon a number of reverse engineering techniques.
Aside from the straightforward copying of unprotected content, all of these other methods require fist an understanding of the protective mechanism(s) guarding the content, and finally and unauthorized modification of that protection i order to disable or subvert it. Methods which prevent a skilled individual from using reverse engineering tools and techniques to attain that level of understanding and/or prevent anyone from performing such modifications can offer significant advantages to content creators who whish to protect their products.
Aside from the straightforward copying of unprotected content, all of these other methods require fist an understanding of the protective mechanism(s) guarding the content, and finally and unauthorized modification of that protection i order to disable or subvert it. Methods which prevent a skilled individual from using reverse engineering tools and techniques to attain that level of understanding and/or prevent anyone from performing such modifications can offer significant advantages to content creators who whish to protect their products.
Claims (160)
1. A method for preventing unauthorized use of digital content data comprising:
subdividing the digital content data into data segments;
modifying the data segments with second data to generate modified data; and storing the modified data at predetermined memory locations.
subdividing the digital content data into data segments;
modifying the data segments with second data to generate modified data; and storing the modified data at predetermined memory locations.
2. The method of claim 1 wherein the digital data comprises data types selected from a group consisting of audio, video, documents, text and software.
3. The method of claim 1 wherein the data segments are of a variable length.
4. The method of claim 1 wherein the second data comprises a randomly generated data stream.
5. The method of claim 1 wherein the second data comprises portions of the digital content data.
6. The method of claim 1 further comprising encrypting the modified data and storing the encrypted modified data.
7. The method of claim 6 further comprising encrypting the modified data with an encryption key.
8. The method of claim 7 further comprising encrypting the encryption key.
9. The method of claim 8 further comprising storing the encryption key with the encrypted modified data at the predetermined memory locations.
10. The method of claim 9 further comprising partitioning the encryption key among the encrypted modified data.
11. The method of claim 1 wherein the predetermined memory locations are selected as the locations at which the digital content data was originally stored.
12. The method of claim 1 wherein the digital content data comprises first and second digital content data and wherein the predetermined memory locations are selected as combinations of the locations at which the first and second digital content data were originally stored.
13. The method of claim 1 further comprising generating a map of locations at which the modified data is stored.
14. The method of claim 13 further comprising storing the map of locations at the predetermined memory locations.
15. The method of claim 1 wherein the memory locations reside on a system and further comprising:
scanning the system to determine available memory locations;
selecting target memory locations within the available memory locations at which to store the modified data; and storing the modified data at the target memory locations.
scanning the system to determine available memory locations;
selecting target memory locations within the available memory locations at which to store the modified data; and storing the modified data at the target memory locations.
16. The method of claim 15 wherein a subset of available memory locations are located within file system locations
17. The method of claim 15 wherein a subset of available memory locations are located outside file system locations.
18. The method of claim 15 further comprising generating a map of the target memory locations.
19. The method of claim 18 further comprising storing the map of target memory locations at the target memory locations.
20. The method of claim 1 further comprising:
retrieving the modified data from the predetermined memory locations; and de-interleaving the data segments based on the second data to generate original digital content data.
retrieving the modified data from the predetermined memory locations; and de-interleaving the data segments based on the second data to generate original digital content data.
21. The method of claim 1 wherein the memory locations reside on a system and wherein a table of contents identifies files stored on the system, and wherein a subset of the memory locations used for storing the modified data are between memory locations used by files stored on the system, as identified by the table of contents.
22. The method of claim 1 wherein the memory locations reside on a system and wherein a table of contents identifies files stored on the system, and wherein a subset of the memory locations used for storing the modified data are exclusive of memory locations of files stored on the system, as identified by the table of contents.
23. The method of claim 1 wherein the memory locations reside on a system and wherein a table of contents identifies files stored on the system and identifies memory locations at which the files are stored, and wherein the modified data are stored at memory locations occupied by the files, as identified by the table of contents.
24. The method of claim 23 further comprising, if an authorized access of a file replaced by the modified data is determined, the file is accessed.
25. The method of claim 1 wherein modifying the data segments comprises interleaving the data segments with the second data to generate interleaved data.
26. The method of claim 1 wherein modifying the data segments with second data comprises tokenizing the data segments with token data.
27. The method of claim 26 wherein the token data comprises lexical equivalents of assembly language commands.
28. The method of claim 27 wherein the lexical equivalents are consumed by a system interpreter, in turn generating alternative assembly language commands selected to obfuscate the digital content data in the event of an unauthorized access.
29. A method for preventing unauthorized use of digital content data in a system having memory locations comprising:
subdividing the digital content data into data segments;
modifying the data segments with second data to generate modified data;
scanning the system to determine available memory locations;
selecting target memory locations within the available memory locations at which to store the modified data; and storing the modified data at the target memory locations.
subdividing the digital content data into data segments;
modifying the data segments with second data to generate modified data;
scanning the system to determine available memory locations;
selecting target memory locations within the available memory locations at which to store the modified data; and storing the modified data at the target memory locations.
30. The method of claim 29 wherein a subset of available memory locations are located within file system locations.
31. The method of claim 29 wherein a subset of available memory locations are located outside file system locations.
32. The method of claim 29 further comprising generating a map of the target memory locations.
33. The method of claim 32 further comprising storing the map of target memory locations at the target memory locations.
34. The method of claim 29 wherein the digital data comprises data types selected from a group consisting of audio, video, documents, text and software.
35. The method of claim 29 wherein the data segments are of a variable length
36. The method of claim 29 wherein the second data comprises a randomly generated data stream.
37. The method of claim 29 wherein the second data comprises portions of the digital content data.
38. The method of claim 29 further comprising encrypting the modified data and storing the encrypted modified data.
39. The method of claim 38 further comprising encrypting the modified data with an encryption key.
40. The method of claim 39 further comprising encrypting the encryption key.
41. The method of claim 40 further comprising storing the encryption key with the encrypted modified data at the predetermined memory locations.
42. The method of claim 41 further comprising partitioning the encryption key among the encrypted modified data.
43. The method of claim 29 wherein the predetermined memory locations are selected as the locations at which the digital content data was originally stored.
44. The method of claim 29 wherein the digital content data comprises first and second digital content data and wherein the predetermined memory locations are selected as combinations of the locations at which the first and second digital content data were originally stored.
45. The method of claim 29 further comprising generating a map of locations at which the modified data is stored.
46. The method of claim 45 further comprising storing the map of locations at the predetermined memory locations.
47. The method of claim 29 further comprising:
retrieving the modified data from the predetermined memory locations; and de-interleaving the data segments based on the second data to generate original digital content data.
retrieving the modified data from the predetermined memory locations; and de-interleaving the data segments based on the second data to generate original digital content data.
48. The method of claim 29 wherein the memory locations reside on a system and wherein a table of contents identifies files stored on the system, and wherein a subset of the memory locations used for storing the modified data are between memory locations used by files stored on the system, as identified by the table of contents.
49. The method of claim 29 wherein the memory locations reside on a system and wherein a table of contents identifies files stored on the system, and wherein a subset of the memory locations used for storing the modified data are exclusive of memory locations of files stored on the system, as identified by the table of contents.
50. The method of claim 29 wherein the memory locations reside on a system and wherein a table of contents identifies files stored on the system and identifies memory locations at which the files are stored, and wherein the modified data are stored at memory locations occupied by the files, as identified by the table of contents.
51. The method of claim 50 further comprising, if an authorized access of a file replaced by the modified data is determined, the file is accessed.
52. The method of claim 29 wherein modifying the data segments comprises interleaving the data segments with the second data to generate interleaved data.
53. The method of claim 29 wherein modifying the data segments with second data comprises tokenizing the data segments with token data.
54. The method of claim 53 wherein the token data comprises lexical equivalents of assembly language commands.
55. The method of claim 54 wherein the lexical equivalents are consumed by a system interpreter, in turn generating alternative assembly language commands selected to obfuscate the digital content data to deter unauthorized access.
56. A method for preventing unauthorized use of digital content data hosted on a system comprising:
modifying the digital content data with saturation data to generate modified data; and storing the modified data at predetermined memory locations on the system to deter unauthorized access of the digital content data.
modifying the digital content data with saturation data to generate modified data; and storing the modified data at predetermined memory locations on the system to deter unauthorized access of the digital content data.
57. The method of claim 56 further comprising subdividing the digital content data into data segments and modifying the data segments.
58. The method of claim 56 further comprising:
determining whether an unauthorized attempt at accessing the digital content data occurs;
in the event of unauthorized access, generating saturation traffic on the system to deter the unauthorized activity.
determining whether an unauthorized attempt at accessing the digital content data occurs;
in the event of unauthorized access, generating saturation traffic on the system to deter the unauthorized activity.
59. The method of claim 58 wherein the saturation traffic comprises system commands that burden system resources.
60. The method of claim 59 wherein the system commands are generated as a function of activity utilizing the system resources subject to the unauthorized access.
61. The method of claim 58 wherein determining whether an unauthorized attempt at accessing the digital content data occurs comprises monitoring activity of the system hosting the digital content data and determining whether the activity is inconsistent with the type of digital content data being hosted.
62. The method of claim 56 further comprising interleaving the digital content data with second data to generate interleaved data.
63. The method of claim 56 further comprising tokenizing the digital content data with token data.
64. A method for preventing unauthorized use of digital content data hosted on a system wherein a table of contents identifies files stored at memory locations of the system comprising:
identifying at the table of contents a first memory location referring to a location at which at which first data file is stored;
modifying the first memory location in the table of contents to refer to a second data file at a second location; and upon an attempt at access by the system of the first data file, accessing the second data file if the attempt is unauthorized.
identifying at the table of contents a first memory location referring to a location at which at which first data file is stored;
modifying the first memory location in the table of contents to refer to a second data file at a second location; and upon an attempt at access by the system of the first data file, accessing the second data file if the attempt is unauthorized.
65. The method of claim 64 further comprising accessing the first data file if the attempt is authorized.
66. A method for preventing unauthorized use of digital content data hosted on a system wherein a table of contents identifies files stored at memory locations of the system comprising:
identifying at the table of contents a first memory location referring to a location at which at which first data file is stored;
copying the contents of the first data file to a second memory location; and replacing the first data file with a second data file;
upon an attempt at access by the system of the first data file, accessing the second data file if the attempt is unauthorized.
identifying at the table of contents a first memory location referring to a location at which at which first data file is stored;
copying the contents of the first data file to a second memory location; and replacing the first data file with a second data file;
upon an attempt at access by the system of the first data file, accessing the second data file if the attempt is unauthorized.
67. The method of claim 66 further comprising accessing the first data file if the attempt is authorized.
68. A method for preventing unauthorized use of digital content data hosted on a system comprising:
monitoring an operating system interface of the system to determine access of operating system resources; and repeatedly generating a shim on the operating system interface to deter unauthorized access of the digital content data.
monitoring an operating system interface of the system to determine access of operating system resources; and repeatedly generating a shim on the operating system interface to deter unauthorized access of the digital content data.
69. The method of claim 68 wherein the shim is generated in the event of an unauthorized access.
70. The method of claim 68 wherein the shim is repeatedly generated periodically, each shim being regenerated following a predetermined time period.
71. The method of claim 68 wherein the shim comprises first and second shims generated on the operating system interface for operation in front of and behind the unauthorized access respectively.
72. The method of claim 68 wherein generating the shim comprises initiating an operation that generates saturation data.
73. A method for preventing unauthorized use of digital content data hosted on a system comprising:
substituting a portion of the digital content data with token data to generate tokenized data; and storing the tokenized data at predetermined memory locations on the system to deter unauthorized access of the digital content data.
substituting a portion of the digital content data with token data to generate tokenized data; and storing the tokenized data at predetermined memory locations on the system to deter unauthorized access of the digital content data.
74. The method of claim 73 further comprising subdividing the digital content data into data segments and substituting a portion of the data segments.
75. The method of claim 73 further comprising interleaving the digital content data with second data to generate interleaved digital content data.
76. The method of claim 75 further comprising:
determining whether an unauthorized attempt at accessing the digital content data occurs;
in the event of unauthorized access, generating saturation traffic on the system to deter the unauthorized activity.
determining whether an unauthorized attempt at accessing the digital content data occurs;
in the event of unauthorized access, generating saturation traffic on the system to deter the unauthorized activity.
77. The method of claim 76 wherein the saturation traffic comprises system commands that burden system resources.
78. The method of claim 73 wherein the token data comprises lexical equivalents of assembly language commands.
79. The method of claim 78 wherein the lexical equivalents are consumed by a system interpreter, in turn generating alternative assembly language commands selected to obfuscate the digital content data to deter unauthorized access thereof.
80. A method for preventing unauthorized use of digital content data hosted on a system comprising:
monitoring an operating system interface operating on the system and the digital content data at an assassin process to determine whether an unauthorized attempt at accessing the digital content data occurs; and in the event of unauthorized access, deterring the unauthorized access and communicating the unauthorized access to the operating system interface.
monitoring an operating system interface operating on the system and the digital content data at an assassin process to determine whether an unauthorized attempt at accessing the digital content data occurs; and in the event of unauthorized access, deterring the unauthorized access and communicating the unauthorized access to the operating system interface.
81. The method of claim 80 wherein the assassin process further determines whether secondary assassin processes are located on the operating system interface, and, if so, causes the secondary assassin processes to exit.
82. The method of claim 80 wherein deterring unauthorized access comprises generating saturation data to deter the unauthorized activity.
83. The method of claim 80 wherein the step of monitoring comprises assembling a list of authorized accesses and comparing a newly generated process with the list to determine a status of the newly generated process as being authorized or unauthorized.
84. ~The method of claim 83 wherein the step of monitoring further tracks descendant processes of processes on the list to determine the status of the descendant process.
85. ~A method for preventing unauthorized use of digital content data in a system having memory locations comprising:
scanning the system to determine available memory locations based on a file system identifying locations of files on the system;
selecting target memory locations within the available memory locations at which to store the digital content data; and storing the digital content data at the target memory locations.
scanning the system to determine available memory locations based on a file system identifying locations of files on the system;
selecting target memory locations within the available memory locations at which to store the digital content data; and storing the digital content data at the target memory locations.
86. ~The method of claim 85 wherein a subset of available memory locations are located within files identified by the file system locations.
87. ~The method of claim 85 wherein a subset of available memory locations are located between files identified by the file system locations.
88. ~The method of claim 85 wherein a subset of available memory locations are located outside the file system locations.
89. ~A system for preventing unauthorized use of digital content data comprising:
a subdividing unit for subdividing the digital content data into data segments;
a modification unit for modifying the data segments with second data to generate modified data; and a storage unit for storing the modified data at predetermined memory locations.
a subdividing unit for subdividing the digital content data into data segments;
a modification unit for modifying the data segments with second data to generate modified data; and a storage unit for storing the modified data at predetermined memory locations.
90. ~~The system of claim 89 wherein the data segments are of a variable length
91. The system of claim 89 wherein the second data comprises a randomly generated data stream.
92. The system of claim 89 wherein the second data comprises portions of the digital content data.
93. The system of claim 89 further comprising an encryption unit for encrypting the modified data and storing the encrypted modified data.
94. The system of claim 93 wherein the encryption unit further encrypts the modified data with an encryption key.
95. The system of claim 94 wherein the encryption unit further encrypts the encryption key.
96. The system of claim 95 wherein the storage unit further stores the encryption key with the encrypted modified data at the predetermined memory locations.
97. The system of claim 96 further comprising a partitioning unit for partitioning the encryption key among the encrypted modified data.
98. The system of claim 89 wherein the predetermined memory locations are selected as the locations at which the digital content data was originally stored.
99. The system of claim 89 wherein the digital content data comprises first and second digital content data and wherein the predetermined memory locations are selected as combinations of the locations at which the first and second digital content data were originally stored.
100. The system of claim 89 further comprising a map generator for generating a map of locations at which the modified data is stored.
101. The system of claim 100 wherein the storage unit further stores the map of locations at the predetermined memory locations.
102. The system of claim 89 wherein the memory locations reside on the system and further comprising:
a scanner for scanning the system to determine available memory locations;
a selector for selecting target memory locations within the available memory locations at which to store the modified data; and wherein the storage unit stores the modified data at the target memory locations.
a scanner for scanning the system to determine available memory locations;
a selector for selecting target memory locations within the available memory locations at which to store the modified data; and wherein the storage unit stores the modified data at the target memory locations.
103. The system of claim 102 wherein a subset of available memory locations are located within file system locations
104. The system of claim 102 wherein a subset of available memory locations are located outside file system locations.
105. The system of claim 102 further comprising a map generator for generating a map of the target memory locations.
106. The system of claim 105 wherein the storage unit stores the map of target memory locations at the target memory locations.
107. The system of claim 89 further comprising:
means for retrieving the modified data from the predetermined memory locations; and means for de-interleaving the data segments based on the second data to generate original digital content data.
means for retrieving the modified data from the predetermined memory locations; and means for de-interleaving the data segments based on the second data to generate original digital content data.
108. The system of claim 89 wherein the memory locations reside on a system and wherein a table of contents identifies files stored on the system, and wherein a subset of the memory locations used for storing the modified data are between memory locations used by files stored on the system, as identified by the table of contents.
109. The system of claim 89 wherein the memory locations reside on a system and wherein a table of contents identifies files stored on the system, and wherein a subset of the memory locations used for storing the modified data are exclusive of memory locations of files stored on the system, as identified by the table of contents.
110. The system of claim 89 wherein the memory locations reside on a system and wherein a table of contents identifies files stored on the system and identifies memory locations at which the files are stored, and wherein the modified data are stored at memory locations occupied by the files, as identified by the table of contents.
111. The system of claim 89 wherein the modification unit modifies the data segments comprises interleaving the data segments with the second data to generate interleaved data.
112. The system of claim 89 wherein the modification unit modifies the data segments with second data comprises tokenizing the data segments with token data.
113. The system of claim 112 wherein the token data comprises lexical equivalents of assembly language commands.
114. The system of claim 113 wherein the lexical equivalents are consumed by a system interpreter, in turn generating alternative assembly language commands selected to obfuscate the digital content data in the event of an unauthorized access.
115. A system for preventing unauthorized use of digital content data in a system having memory locations comprising:
means for subdividing the digital content data into data segments;
means for modifying the data segments with second data to generate modified data;
means for scanning the system to determine available memory locations;
a selector for selecting target memory locations within the available memory locations at which to store the modified data; and a storage unit for storing the modified data at the target memory locations.
means for subdividing the digital content data into data segments;
means for modifying the data segments with second data to generate modified data;
means for scanning the system to determine available memory locations;
a selector for selecting target memory locations within the available memory locations at which to store the modified data; and a storage unit for storing the modified data at the target memory locations.
116. The system of claim 115 wherein a subset of available memory locations are located within file system locations.
117. The system of claim 115 wherein a subset of available memory locations are located outside file system locations.
118. The system of claim 115 further comprising a map generator for generating a map of the target memory locations.
119. The system of claim 118 wherein the storage unit stores the map of target memory locations at the target memory locations.
120. The system of claim 115 further comprising means for encrypting the modified data and wherein the storage unit stores the encrypted modified data.
121. The system of claim 120 wherein the means for encrypting further encrypts the modified data with an encryption key.
122. The system of claim 121 wherein the means for encrypting further encrypts the encryption key.
123. The system of claim 115 wherein the memory locations reside on a system and wherein a table of contents identifies files stored on the system, and wherein a subset of the memory locations used for storing the modified data are between memory locations used by files stored on the system, as identified by the table of contents.
124. The system of claim 115 wherein the memory locations reside on a system and wherein a table of contents identifies files stored on the system, and wherein a subset of the memory locations used for storing the modified data are exclusive of memory locations of files stored on the system, as identified by the table of contents.
125. The system of claim 115 wherein the memory locations reside on a system and wherein a table of contents identifies files stored on the system and identifies memory locations at which the files are stored, and wherein the modified data are stored at memory locations occupied by the files, as identified by the table of contents.
126. A system for preventing unauthorized use of digital content data hosted on a system comprising:
a modification unit for modifying the digital content data with saturation data to generate modified data; and a storage unit for storing the modified data at predetermined memory locations on the system to deter unauthorized access of the digital content data.
a modification unit for modifying the digital content data with saturation data to generate modified data; and a storage unit for storing the modified data at predetermined memory locations on the system to deter unauthorized access of the digital content data.
127. The system of claim 126 further comprising subdividing the digital content data into data segments and modifying the data segments.
128. The system of claim 126 further comprising means for determining whether an unauthorized attempt at accessing the digital content data occurs, and, in the event of unauthorized access, means for generating saturation traffic on the system to deter the unauthorized activity.
129. The system of claim 128 wherein the saturation traffic comprises system commands that burden system resources.
130. The system of claim 129 wherein the system commands are generated as a function of activity utilizing the system resources subject to the unauthorized access.
131. The system of claim 128 wherein the means for determining whether an unauthorized attempt at accessing the digital content data occurs monitors activity of the system hosting the digital content data and determines whether the activity is inconsistent with the type of digital content data being hosted.
132. The system of claim 126 further comprising means for interleaving the digital content data with second data to generate interleaved data.
133. The system of claim 126 further comprising means for tokenizing the digital content data with token data.
134. A system for preventing unauthorized use of digital content data hosted on a system wherein a table of contents identifies files stored at memory locations of the system comprising:
a table of contents for identifying a first memory location referring to a location at which at which first data file is stored;
a modification unit for modifying the first memory location in the table of contents to refer to a second data file at a second location; and access means for, upon an attempt at access by the system of the first data file, accessing the second data file if the attempt is unauthorized.
a table of contents for identifying a first memory location referring to a location at which at which first data file is stored;
a modification unit for modifying the first memory location in the table of contents to refer to a second data file at a second location; and access means for, upon an attempt at access by the system of the first data file, accessing the second data file if the attempt is unauthorized.
135. The system of claim 134 wherein the access means further accesses the first data file if the attempt is authorized.
136. A system for preventing unauthorized use of digital content data hosted on a system wherein a table of contents identifies files stored at memory locations of the system comprising:
a table of contents for identifying a first memory location referring to a location at which at which first data file is stored;
means for copying the contents of the first data file to a second memory location; and means for replacing the first data file with a second data file;
access means for, upon an attempt at access by the system of the first data file, accessing the second data file if the attempt is unauthorized.
a table of contents for identifying a first memory location referring to a location at which at which first data file is stored;
means for copying the contents of the first data file to a second memory location; and means for replacing the first data file with a second data file;
access means for, upon an attempt at access by the system of the first data file, accessing the second data file if the attempt is unauthorized.
137. The system of claim 136 wherein the access means accesses the first data file if the attempt is authorized.
138. A system for preventing unauthorized use of digital content data hosted on a system comprising:
means for monitoring an operating system interface of the system to determine access of operating system resources; and means for repeatedly generating a shim on the operating system interface to deter unauthorized access of the digital content data.
means for monitoring an operating system interface of the system to determine access of operating system resources; and means for repeatedly generating a shim on the operating system interface to deter unauthorized access of the digital content data.
139. The system of claim 138 wherein the shim is generated in the event of an unauthorized access.
140. The system of claim 138 wherein the shim is repeatedly generated periodically, each shim being regenerated following a predetermined time period.
141. The system of claim 138 wherein the shim comprises first and second shims generated on the operating system interface for operation in front of and behind the unauthorized access respectively.
142. The system of claim 138 wherein the means for generating the shim further initiates an operation that generates saturation data.
143. A system for preventing unauthorized use of digital content data hosted on a system comprising:
means for substituting a portion of the digital content data with token data to generate tokenized data; and means for storing the tokenized data at predetermined memory locations on the system to deter unauthorized access of the digital content data.
means for substituting a portion of the digital content data with token data to generate tokenized data; and means for storing the tokenized data at predetermined memory locations on the system to deter unauthorized access of the digital content data.
144. The system of claim 143 further comprising means for subdividing the digital content data into data segments and substituting a portion of the data segments.
145. The system of claim 143 further comprising means for interleaving the digital content data with second data to generate interleaved digital content data.
146. The system of claim 143 further comprising:
means for determining whether an unauthorized attempt at accessing the digital content data occurs; and means for generating saturation traffic on the system to deter the unauthorized activity in the event of unauthorized access.
means for determining whether an unauthorized attempt at accessing the digital content data occurs; and means for generating saturation traffic on the system to deter the unauthorized activity in the event of unauthorized access.
147. The system of claim 146 wherein the saturation traffic comprises system commands that burden system resources.
148. The system of claim 143 wherein the token data comprises lexical equivalents of assembly language commands.
149. The system of claim 148 wherein the lexical equivalents are consumed by a system interpreter, in turn generating alternative assembly language commands selected to obfuscate the digital content data to deter unauthorized access thereof.
150. A system for preventing unauthorized use of digital content data hosted on a system comprising:
an assassin process for monitoring an operating system interface operating on the system and the digital content data to determine whether an unauthorized attempt at accessing the digital content data occurs; and means for deterring the unauthorized access and communicating the unauthorized access to the operating system interface, in the event of unauthorized access.
an assassin process for monitoring an operating system interface operating on the system and the digital content data to determine whether an unauthorized attempt at accessing the digital content data occurs; and means for deterring the unauthorized access and communicating the unauthorized access to the operating system interface, in the event of unauthorized access.
151. The system of claim 150 wherein the assassin process further determines whether secondary assassin processes are located on the operating system interface, and, if so, causes the secondary assassin processes to exit.
152. The system of claim 150 wherein the means for deterring unauthorized access comprises means for generating saturation data to deter the unauthorized activity.
153. The system of claim 150 wherein the assassin process assembles a list of authorized accesses and compares a newly generated process with the list to determine a status of the newly generated process as being authorized or unauthorized.
154. The system of claim 153 wherein the assassin process further tracks descendant processes of processes on the list to determine the status of the descendant process.
155. A system for preventing unauthorized use of digital content data in a system having memory locations comprising:
a scanner for scanning the system to determine available memory locations based on a file system identifying locations of files on the system;
means for selecting target memory locations within the available memory locations at which to store the digital content data; and a storage unit for storing the digital content data at the target memory locations.
a scanner for scanning the system to determine available memory locations based on a file system identifying locations of files on the system;
means for selecting target memory locations within the available memory locations at which to store the digital content data; and a storage unit for storing the digital content data at the target memory locations.
156. The system of claim 155 wherein a subset of available memory locations are located within files identified by the file system locations.
157. The system of claim 155 wherein a subset of available memory locations are located between files identified by the file system locations.
158. The system of claim 155 wherein a subset of available memory locations are located outside the file system locations.
159. A system for preventing unauthorized use of digital content data in a system having memory locations wherein the system enables a user to select from a plurality of tool modules, each module providing a service for protecting digital content from unauthorized use such that a user can protect digital content.
160. The system of claim 159 wherein the tool modules comprise modules that perform functions selected from the group of functions consisting of:
interleaving; tokenization; obfuscation; saturation; translocation; shimming and assassination.
interleaving; tokenization; obfuscation; saturation; translocation; shimming and assassination.
Applications Claiming Priority (9)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US23465700P | 2000-09-22 | 2000-09-22 | |
US60/234,657 | 2000-09-22 | ||
US24061100P | 2000-10-16 | 2000-10-16 | |
US60/240,611 | 2000-10-16 | ||
US24294900P | 2000-10-24 | 2000-10-24 | |
US60/242,949 | 2000-10-24 | ||
US24470400P | 2000-10-31 | 2000-10-31 | |
US60/244,704 | 2000-10-31 | ||
PCT/US2001/029554 WO2002025415A2 (en) | 2000-09-22 | 2001-09-21 | Systems and methods for preventing unauthorized use of digital content |
Publications (2)
Publication Number | Publication Date |
---|---|
CA2435624A1 true CA2435624A1 (en) | 2002-03-28 |
CA2435624C CA2435624C (en) | 2013-05-07 |
Family
ID=27499759
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA2435624A Expired - Fee Related CA2435624C (en) | 2000-09-22 | 2001-09-21 | Systems and methods for preventing unauthorized use of digital content |
Country Status (5)
Country | Link |
---|---|
US (2) | US7565697B2 (en) |
EP (1) | EP1352307A2 (en) |
AU (3) | AU2001292910B2 (en) |
CA (1) | CA2435624C (en) |
WO (1) | WO2002025415A2 (en) |
Families Citing this family (78)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7644282B2 (en) | 1998-05-28 | 2010-01-05 | Verance Corporation | Pre-processed information embedding system |
US6737957B1 (en) | 2000-02-16 | 2004-05-18 | Verance Corporation | Remote control signaling using audio watermarks |
US20050050343A1 (en) * | 2000-06-30 | 2005-03-03 | Selinfreund Richard H. | Storage media access control method and system |
US7237123B2 (en) * | 2000-09-22 | 2007-06-26 | Ecd Systems, Inc. | Systems and methods for preventing unauthorized use of digital content |
CA2435624C (en) * | 2000-09-22 | 2013-05-07 | Richard B. Levine | Systems and methods for preventing unauthorized use of digital content |
US7916124B1 (en) | 2001-06-20 | 2011-03-29 | Leapfrog Enterprises, Inc. | Interactive apparatus using print media |
AU2002350203A1 (en) * | 2001-11-20 | 2003-06-10 | Contentguard Holdings, Inc. | Systems and methods for creating, manipulating and processing rights and contract expressions using tokenized templates |
US20030120614A1 (en) * | 2001-12-20 | 2003-06-26 | Dun & Bradstreet, Inc. | Automated e-commerce authentication method and system |
US7539391B2 (en) * | 2002-06-27 | 2009-05-26 | Nxp B.V. | Method and apparatus for trick-mode support of audio/video/data streams with conditional access |
DE10335943A1 (en) * | 2002-08-06 | 2004-06-03 | Brainshield Technologies Inc. | Device for copy-protected distribution of electronic documents via public electronic data network e.g. the internet, with time-limited access to reconstruction server for reconstruction of encrypted document |
EP2782337A3 (en) | 2002-10-15 | 2014-11-26 | Verance Corporation | Media monitoring, management and information system |
US7363620B2 (en) | 2003-09-25 | 2008-04-22 | Sun Microsystems, Inc. | Non-linear execution of application program instructions for application program obfuscation |
US7353499B2 (en) * | 2003-09-25 | 2008-04-01 | Sun Microsystems, Inc. | Multiple instruction dispatch tables for application program obfuscation |
US20050069138A1 (en) * | 2003-09-25 | 2005-03-31 | Sun Microsystems, Inc., A Delaware Corporation | Application program obfuscation |
US7424620B2 (en) * | 2003-09-25 | 2008-09-09 | Sun Microsystems, Inc. | Interleaved data and instruction streams for application program obfuscation |
US8220058B2 (en) * | 2003-09-25 | 2012-07-10 | Oracle America, Inc. | Rendering and encryption engine for application program obfuscation |
US7415618B2 (en) * | 2003-09-25 | 2008-08-19 | Sun Microsystems, Inc. | Permutation of opcode values for application program obfuscation |
US7369677B2 (en) | 2005-04-26 | 2008-05-06 | Verance Corporation | System reactions to the detection of embedded watermarks in a digital host content |
US20060239501A1 (en) | 2005-04-26 | 2006-10-26 | Verance Corporation | Security enhancements of digital watermarks for multi-media content |
US9055239B2 (en) | 2003-10-08 | 2015-06-09 | Verance Corporation | Signal continuity assessment using embedded watermarks |
US7616776B2 (en) | 2005-04-26 | 2009-11-10 | Verance Corproation | Methods and apparatus for enhancing the robustness of watermark extraction from digital host content |
US8085938B2 (en) * | 2004-02-10 | 2011-12-27 | Ntt Communications Corporation | Secret information management scheme based on secret sharing scheme |
US7853193B2 (en) | 2004-03-17 | 2010-12-14 | Leapfrog Enterprises, Inc. | Method and device for audibly instructing a user to interact with a function |
JP4843208B2 (en) * | 2004-09-30 | 2011-12-21 | 株式会社東芝 | Digital content editing apparatus, digital content editing method, digital content editing program, and recording medium recording digital content editing program |
US8020004B2 (en) | 2005-07-01 | 2011-09-13 | Verance Corporation | Forensic marking using a common customization function |
US8781967B2 (en) | 2005-07-07 | 2014-07-15 | Verance Corporation | Watermarking in an encrypted domain |
US7549596B1 (en) * | 2005-07-29 | 2009-06-23 | Nvidia Corporation | Image bearing surface |
US7922099B1 (en) | 2005-07-29 | 2011-04-12 | Leapfrog Enterprises, Inc. | System and method for associating content with an image bearing surface |
RU2439669C2 (en) | 2005-08-06 | 2012-01-10 | Майкрософт Корпорейшн | Method to prevent reverse engineering of software, unauthorised modification and data capture during performance |
US7536540B2 (en) | 2005-09-14 | 2009-05-19 | Sandisk Corporation | Method of hardware driver integrity check of memory card controller firmware |
US7936339B2 (en) | 2005-11-01 | 2011-05-03 | Leapfrog Enterprises, Inc. | Method and system for invoking computer functionality by interaction with dynamically generated interface regions of a writing surface |
JP4564464B2 (en) * | 2006-01-05 | 2010-10-20 | 株式会社東芝 | Digital content playback apparatus, method and program |
US8599143B1 (en) | 2006-02-06 | 2013-12-03 | Leapfrog Enterprises, Inc. | Switch configuration for detecting writing pressure in a writing device |
US8640235B2 (en) * | 2006-03-31 | 2014-01-28 | Symantec Corporation | Determination of malicious entities |
US8127360B1 (en) * | 2006-06-29 | 2012-02-28 | Symantec Corporation | Method and apparatus for detecting leakage of sensitive information |
US8261967B1 (en) | 2006-07-19 | 2012-09-11 | Leapfrog Enterprises, Inc. | Techniques for interactively coupling electronic content with printed media |
US8146163B2 (en) * | 2006-11-09 | 2012-03-27 | International Business Machines Corporation | Method and system for securing personal computing devices from unauthorized data copying and removal |
US8286138B2 (en) * | 2007-01-30 | 2012-10-09 | Microsoft Corporation | Multi-threaded detection of a game software debugger |
US20080189789A1 (en) * | 2007-02-01 | 2008-08-07 | Elaine Lamontagne | System, method and apparatus for the detection and capturing of technological crime instances |
CN101311942B (en) * | 2007-05-23 | 2011-08-24 | 西门子(中国)有限公司 | Software encryption and decryption method and encryption and decryption device |
US20090113549A1 (en) * | 2007-10-24 | 2009-04-30 | International Business Machines Corporation | System and method to analyze software systems against tampering |
US8156565B2 (en) * | 2008-04-28 | 2012-04-10 | Microsoft Corporation | Hardware-based protection of secure data |
US8393008B2 (en) * | 2008-05-21 | 2013-03-05 | Microsoft Corporation | Hardware-based output protection of multiple video streams |
US8259938B2 (en) | 2008-06-24 | 2012-09-04 | Verance Corporation | Efficient and secure forensic marking in compressed |
US9871807B2 (en) * | 2009-06-12 | 2018-01-16 | Microsoft Technology Licensing, Llc | Generic protocol decoder for generic application-level protocol signatures |
US8595812B2 (en) * | 2009-12-18 | 2013-11-26 | Sabre Inc. | Tokenized data security |
US8838977B2 (en) | 2010-09-16 | 2014-09-16 | Verance Corporation | Watermark extraction and content screening in a networked environment |
TWI420339B (en) | 2010-11-10 | 2013-12-21 | Ind Tech Res Inst | Software authorization system and method |
US20120321078A1 (en) | 2011-06-20 | 2012-12-20 | Jason Chambers | Key rotation and selective re-encryption for data security |
US11194462B2 (en) * | 2011-08-03 | 2021-12-07 | Avaya Inc. | Exclusion of selected data from access by collaborators |
US8533481B2 (en) | 2011-11-03 | 2013-09-10 | Verance Corporation | Extraction of embedded watermarks from a host content based on extrapolation techniques |
US8923548B2 (en) | 2011-11-03 | 2014-12-30 | Verance Corporation | Extraction of embedded watermarks from a host content using a plurality of tentative watermarks |
US8682026B2 (en) | 2011-11-03 | 2014-03-25 | Verance Corporation | Efficient extraction of embedded watermarks in the presence of host content distortions |
US8615104B2 (en) | 2011-11-03 | 2013-12-24 | Verance Corporation | Watermark extraction based on tentative watermarks |
US8745403B2 (en) | 2011-11-23 | 2014-06-03 | Verance Corporation | Enhanced content management based on watermark extraction records |
US9323902B2 (en) | 2011-12-13 | 2016-04-26 | Verance Corporation | Conditional access using embedded watermarks |
US9547753B2 (en) | 2011-12-13 | 2017-01-17 | Verance Corporation | Coordinated watermarking |
RU2014152808A (en) * | 2012-05-25 | 2016-07-20 | Конинклейке Филипс Н.В. | METHOD, SYSTEM AND DEVICE FOR PROTECTION FROM REVERSE ENGINEERING AND / OR INTERFERENCE IN PROGRAMS |
US9887887B2 (en) | 2012-07-09 | 2018-02-06 | Eturi Corp. | Information throttle based on compliance with electronic communication rules |
US9854393B2 (en) | 2012-07-09 | 2017-12-26 | Eturi Corp. | Partial information throttle based on compliance with an agreement |
US8706872B2 (en) | 2012-07-09 | 2014-04-22 | Parentsware, Llc | Agreement compliance controlled information throttle |
US9847948B2 (en) | 2012-07-09 | 2017-12-19 | Eturi Corp. | Schedule and location responsive agreement compliance controlled device throttle |
US10079931B2 (en) | 2012-07-09 | 2018-09-18 | Eturi Corp. | Information throttle that enforces policies for workplace use of electronic devices |
US9571606B2 (en) | 2012-08-31 | 2017-02-14 | Verance Corporation | Social media viewing system |
US8869222B2 (en) | 2012-09-13 | 2014-10-21 | Verance Corporation | Second screen content |
US20140075469A1 (en) | 2012-09-13 | 2014-03-13 | Verance Corporation | Content distribution including advertisements |
US8726304B2 (en) | 2012-09-13 | 2014-05-13 | Verance Corporation | Time varying evaluation of multimedia content |
US8806558B1 (en) * | 2013-09-20 | 2014-08-12 | Limelight Networks, Inc. | Unique watermarking of content objects according to end user identity |
US9262793B2 (en) | 2013-03-14 | 2016-02-16 | Verance Corporation | Transactional video marking system |
US9251549B2 (en) | 2013-07-23 | 2016-02-02 | Verance Corporation | Watermark extractor enhancements based on payload ranking |
US9645860B2 (en) * | 2013-09-06 | 2017-05-09 | Microsoft Technology Licensing, Llc | Verification that particular information is transferred by an application |
US9208334B2 (en) | 2013-10-25 | 2015-12-08 | Verance Corporation | Content management using multiple abstraction layers |
EP2913772A1 (en) * | 2014-02-28 | 2015-09-02 | Wibu-Systems AG | Method and computer system for protecting a computer program against influence |
KR101731770B1 (en) | 2014-03-13 | 2017-04-28 | 베란스 코오포레이션 | Interactive content acquisition using embedded codes |
US10445505B2 (en) * | 2014-09-22 | 2019-10-15 | Mcafee, Llc | Process vulnerability assessment |
US10614826B2 (en) | 2017-05-24 | 2020-04-07 | Modulate, Inc. | System and method for voice-to-voice conversion |
US10440063B1 (en) | 2018-07-10 | 2019-10-08 | Eturi Corp. | Media device content review and management |
WO2021030759A1 (en) * | 2019-08-14 | 2021-02-18 | Modulate, Inc. | Generation and detection of watermark for real-time voice conversion |
Family Cites Families (125)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4118789A (en) * | 1977-06-06 | 1978-10-03 | Allen-Bradley Company | Program protection module for programmable controller |
US4278837A (en) * | 1977-10-31 | 1981-07-14 | Best Robert M | Crypto microprocessor for executing enciphered programs |
US4405829A (en) * | 1977-12-14 | 1983-09-20 | Massachusetts Institute Of Technology | Cryptographic communications system and method |
US4306289A (en) * | 1980-02-04 | 1981-12-15 | Western Electric Company, Inc. | Digital computer having code conversion apparatus for an encrypted program |
US4433207A (en) * | 1981-09-10 | 1984-02-21 | Best Robert M | Cryptographic decoder for computer programs |
US4593353A (en) * | 1981-10-26 | 1986-06-03 | Telecommunications Associates, Inc. | Software protection method and apparatus |
US4577289A (en) * | 1983-12-30 | 1986-03-18 | International Business Machines Corporation | Hardware key-on-disk system for copy-protecting magnetic storage media |
US4688169A (en) * | 1985-05-30 | 1987-08-18 | Joshi Bhagirath S | Computer software security system |
US4864494A (en) * | 1986-03-21 | 1989-09-05 | Computerized Data Ssytems For Mfg., Inc. | Software usage authorization system with key for decrypting/re-encrypting/re-transmitting moving target security codes from protected software |
US5014234A (en) * | 1986-08-25 | 1991-05-07 | Ncr Corporation | System with software usage timer and counter for allowing limited use but preventing continued unauthorized use of protected software |
US5021997A (en) * | 1986-09-29 | 1991-06-04 | At&T Bell Laboratories | Test automation system |
US4977594A (en) * | 1986-10-14 | 1990-12-11 | Electronic Publishing Resources, Inc. | Database usage metering and protection system and method |
US5050213A (en) * | 1986-10-14 | 1991-09-17 | Electronic Publishing Resources, Inc. | Database usage metering and protection system and method |
US4827508A (en) * | 1986-10-14 | 1989-05-02 | Personal Library Software, Inc. | Database usage metering and protection system and method |
US5155680A (en) * | 1986-10-24 | 1992-10-13 | Signal Security Technologies | Billing system for computing software |
GB8704920D0 (en) * | 1987-03-03 | 1987-04-08 | Hewlett Packard Co | Secure messaging system |
US5038320A (en) * | 1987-03-13 | 1991-08-06 | International Business Machines Corp. | Computer system with automatic initialization of pluggable option cards |
US4999806A (en) * | 1987-09-04 | 1991-03-12 | Fred Chernow | Software distribution system |
US5140634A (en) * | 1987-09-07 | 1992-08-18 | U.S Philips Corporation | Method and apparatus for authenticating accreditations and for authenticating and signing messages |
US4864616A (en) * | 1987-10-15 | 1989-09-05 | Micronyx, Inc. | Cryptographic labeling of electronically stored data |
US4916637A (en) * | 1987-11-18 | 1990-04-10 | International Business Machines Corporation | Customized instruction generator |
US5113518A (en) * | 1988-06-03 | 1992-05-12 | Durst Jr Robert T | Method and system for preventing unauthorized use of software |
US4969189A (en) * | 1988-06-25 | 1990-11-06 | Nippon Telegraph & Telephone Corporation | Authentication system and apparatus therefor |
US5155847A (en) * | 1988-08-03 | 1992-10-13 | Minicom Data Corporation | Method and apparatus for updating software at remote locations |
US5023907A (en) * | 1988-09-30 | 1991-06-11 | Apollo Computer, Inc. | Network license server |
DE3906349A1 (en) * | 1989-03-01 | 1990-09-13 | Hartmut Hennige | METHOD AND DEVICE FOR SIMPLIFYING THE USE OF A VARIETY OF CREDIT CARDS AND THE LIKE |
US5155837A (en) * | 1989-03-02 | 1992-10-13 | Bell Communications Research, Inc. | Methods and apparatus for software retrofitting |
US5191611A (en) * | 1989-04-03 | 1993-03-02 | Lang Gerald S | Method and apparatus for protecting material on storage media and for transferring material on storage media to various recipients |
US5199066A (en) * | 1989-04-18 | 1993-03-30 | Special Effects Software, Inc. | Method and apparatus for protecting software |
JPH02293930A (en) * | 1989-05-08 | 1990-12-05 | Victor Co Of Japan Ltd | Preventing system for stealing of recording contents of recording medium |
US5166886A (en) * | 1989-07-31 | 1992-11-24 | Molnar Charles E | System to demonstrate and sell computer programs |
US5081675A (en) * | 1989-11-13 | 1992-01-14 | Kitti Kittirutsunetorn | System for protection of software in memory against unauthorized use |
US5033084A (en) * | 1990-04-02 | 1991-07-16 | Data I/O Corporation | Method and apparatus for protection of software in an electronic system |
US5027396A (en) * | 1990-05-07 | 1991-06-25 | Xerox Corporation | Execution protection for floppy disks |
EP0463251A1 (en) * | 1990-06-28 | 1992-01-02 | International Business Machines Corporation | Software installation |
JPH0792744B2 (en) * | 1990-08-20 | 1995-10-09 | インターナショナル・ビジネス・マシーンズ・コーポレイション | A method of installing multi-level application software on a data processing device. |
FR2673476B1 (en) * | 1991-01-18 | 1996-04-12 | Gemplus Card Int | SECURE METHOD FOR LOADING MULTIPLE APPLICATIONS INTO A MICROPROCESSOR MEMORY CARD. |
US5182770A (en) * | 1991-04-19 | 1993-01-26 | Geza Medveczky | System and apparatus for protecting computer software |
AU2247092A (en) | 1991-05-08 | 1992-12-21 | Digital Equipment Corporation | License management system |
US5351297A (en) * | 1991-06-28 | 1994-09-27 | Matsushita Electric Industrial Co., Ltd. | Method of privacy communication using elliptic curves |
DE9109977U1 (en) * | 1991-08-12 | 1992-12-24 | Intelligent Solution Services Gmbh, 8051 Marzling, De | |
US5414850A (en) * | 1991-08-23 | 1995-05-09 | Stac Electronics, Inc. | System for transparently compressing data files in a computer system |
US5222133A (en) * | 1991-10-17 | 1993-06-22 | Wayne W. Chou | Method of protecting computer software from unauthorized execution using multiple keys |
WO1993011480A1 (en) * | 1991-11-27 | 1993-06-10 | Intergraph Corporation | System and method for network license administration |
US5524072A (en) * | 1991-12-04 | 1996-06-04 | Enco-Tone Ltd. | Methods and apparatus for data encryption and transmission |
US5220606A (en) * | 1992-02-10 | 1993-06-15 | Harold Greenberg | Cryptographic system and method |
JP3073590B2 (en) * | 1992-03-16 | 2000-08-07 | 富士通株式会社 | Electronic data protection system, licensor's device and user's device |
JPH05281906A (en) * | 1992-04-02 | 1993-10-29 | Fujitsu Ltd | Cipher key common-used system |
US5528490A (en) | 1992-04-10 | 1996-06-18 | Charles E. Hill & Associates, Inc. | Electronic catalog system and method |
US5313521A (en) * | 1992-04-15 | 1994-05-17 | Fujitsu Limited | Key distribution protocol for file transfer in the local area network |
JP2659896B2 (en) * | 1992-04-29 | 1997-09-30 | インターナショナル・ビジネス・マシーンズ・コーポレイション | Structured document copy management method and structured document copy management device |
US5367683A (en) * | 1992-06-26 | 1994-11-22 | Digital Equipment Corporation | Smart recompilation of performing matchup/difference after code generation |
US5410703A (en) * | 1992-07-01 | 1995-04-25 | Telefonaktiebolaget L M Ericsson | System for changing software during computer operation |
US5361359A (en) * | 1992-08-31 | 1994-11-01 | Trusted Information Systems, Inc. | System and method for controlling the use of a computer |
NZ255971A (en) * | 1992-09-21 | 1997-05-26 | Uniloc Singapore Private Ltd | Software registration and licensing system uses matching of licensee indentification codes |
US5327563A (en) * | 1992-11-13 | 1994-07-05 | Hewlett-Packard | Method for locking software files to a specific storage device |
US5341429A (en) * | 1992-12-04 | 1994-08-23 | Testdrive Corporation | Transformation of ephemeral material |
US5509070A (en) * | 1992-12-15 | 1996-04-16 | Softlock Services Inc. | Method for encouraging purchase of executable and non-executable software |
ATE176953T1 (en) * | 1993-01-18 | 1999-03-15 | Siemens Ag | REAL-TIME CONTROL SYSTEM |
US5351293A (en) * | 1993-02-01 | 1994-09-27 | Wave Systems Corp. | System method and apparatus for authenticating an encrypted signal |
US5483658A (en) * | 1993-02-26 | 1996-01-09 | Grube; Gary W. | Detection of unauthorized use of software applications in processing devices |
US5379343A (en) * | 1993-02-26 | 1995-01-03 | Motorola, Inc. | Detection of unauthorized use of software applications in communication units |
US5585585A (en) * | 1993-05-21 | 1996-12-17 | Coda Music Technology, Inc. | Automated accompaniment apparatus and method |
US5337357A (en) * | 1993-06-17 | 1994-08-09 | Software Security, Inc. | Method of software distribution protection |
US5497423A (en) * | 1993-06-18 | 1996-03-05 | Matsushita Electric Industrial Co., Ltd. | Method of implementing elliptic curve cryptosystems in digital signatures or verification and privacy communication |
US5544246A (en) * | 1993-09-17 | 1996-08-06 | At&T Corp. | Smartcard adapted for a plurality of service providers and for remote installation of same |
US5625690A (en) * | 1993-11-15 | 1997-04-29 | Lucent Technologies Inc. | Software pay per use system |
US5421009A (en) * | 1993-12-22 | 1995-05-30 | Hewlett-Packard Company | Method of remotely installing software directly from a central computer |
US5495411A (en) * | 1993-12-22 | 1996-02-27 | Ananda; Mohan | Secure software rental system using continuous asynchronous password verification |
US5473687A (en) * | 1993-12-29 | 1995-12-05 | Infosafe Systems, Inc. | Method for retrieving secure information from a database |
US5509074A (en) * | 1994-01-27 | 1996-04-16 | At&T Corp. | Method of protecting electronically published materials using cryptographic protocols |
US5553143A (en) * | 1994-02-04 | 1996-09-03 | Novell, Inc. | Method and apparatus for electronic licensing |
JPH07230380A (en) * | 1994-02-15 | 1995-08-29 | Internatl Business Mach Corp <Ibm> | Method and system for controlling utilization of application program |
US5394469A (en) * | 1994-02-18 | 1995-02-28 | Infosafe Systems, Inc. | Method and apparatus for retrieving secure information from mass storage media |
JPH07244781A (en) | 1994-03-07 | 1995-09-19 | C S K Sogo Kenkyusho:Kk | Method and device for renting software and circulation medium |
CA2143874C (en) | 1994-04-25 | 2000-06-20 | Thomas Edward Cooper | Method and apparatus for enabling trial period use of software products: method and apparatus for utilizing a decryption stub |
US5757907A (en) | 1994-04-25 | 1998-05-26 | International Business Machines Corporation | Method and apparatus for enabling trial period use of software products: method and apparatus for generating a machine-dependent identification |
US5557675A (en) * | 1994-05-10 | 1996-09-17 | Schupak; Donald | Computer controlled audio-visual system |
US5473692A (en) * | 1994-09-07 | 1995-12-05 | Intel Corporation | Roving software license for a hardware agent |
US5511123A (en) * | 1994-08-04 | 1996-04-23 | Northern Telecom Limited | Symmetric cryptographic system for data encryption |
US5557346A (en) | 1994-08-11 | 1996-09-17 | Trusted Information Systems, Inc. | System and method for key escrow encryption |
US5570291A (en) * | 1994-08-24 | 1996-10-29 | Wallace Computer Services, Inc. | Custom product estimating and order processing system |
US5615061A (en) * | 1994-09-29 | 1997-03-25 | Singh; Jitendra K. | Method of preventng software piracy by uniquely identifying the specific magnetic storage device the software is stored on |
US5579479A (en) * | 1994-10-03 | 1996-11-26 | Plum Hall Inc. | Computer software licensing authentication method and apparatus |
US5654746A (en) * | 1994-12-01 | 1997-08-05 | Scientific-Atlanta, Inc. | Secure authorization and control method and apparatus for a game delivery service |
US5625692A (en) | 1995-01-23 | 1997-04-29 | International Business Machines Corporation | Method and system for a public key cryptosystem having proactive, robust, and recoverable distributed threshold secret sharing |
US5826245A (en) * | 1995-03-20 | 1998-10-20 | Sandberg-Diment; Erik | Providing verification information for a transaction |
US6671813B2 (en) * | 1995-06-07 | 2003-12-30 | Stamps.Com, Inc. | Secure on-line PC postage metering system |
US5615264A (en) | 1995-06-08 | 1997-03-25 | Wave Systems Corp. | Encrypted data package record for use in remote transaction metered data system |
US5592549A (en) | 1995-06-15 | 1997-01-07 | Infosafe Systems, Inc. | Method and apparatus for retrieving selected information from a secure information source |
US5671412A (en) * | 1995-07-28 | 1997-09-23 | Globetrotter Software, Incorporated | License management system for software applications |
US5721781A (en) | 1995-09-13 | 1998-02-24 | Microsoft Corporation | Authentication system and method for smart card transactions |
US5638445A (en) | 1995-09-19 | 1997-06-10 | Microsoft Corporation | Blind encryption |
US5758068A (en) | 1995-09-19 | 1998-05-26 | International Business Machines Corporation | Method and apparatus for software license management |
US5708709A (en) | 1995-12-08 | 1998-01-13 | Sun Microsystems, Inc. | System and method for managing try-and-buy usage of application programs |
US5790664A (en) | 1996-02-26 | 1998-08-04 | Network Engineering Software, Inc. | Automated system for management of licensed software |
US5794230A (en) | 1996-03-15 | 1998-08-11 | Microsoft Corporation | Method and system for creating and searching directories on a server |
US5754647A (en) | 1996-03-27 | 1998-05-19 | United Microelectronics Corporation | Software protection apparatus and the method of protection utilizing read-write memory means having inconsistent input and output data |
US6918038B1 (en) * | 1996-08-13 | 2005-07-12 | Angel Secure Networks, Inc. | System and method for installing an auditable secure network |
US6012144A (en) * | 1996-10-08 | 2000-01-04 | Pickett; Thomas E. | Transaction security method and apparatus |
JP3172475B2 (en) * | 1996-12-26 | 2001-06-04 | 日本アイ・ビー・エム株式会社 | Data hiding method and data extraction method using statistical test |
EP0855638A1 (en) * | 1997-01-24 | 1998-07-29 | Deutsche Thomson-Brandt Gmbh | Method and apparatus for encrypting and for decrypting data arranged in a data sector |
US5930828A (en) * | 1997-03-26 | 1999-07-27 | Executive Software International | Real-time apparatus and method for minimizing disk fragmentation in a computer system |
US5974549A (en) * | 1997-03-27 | 1999-10-26 | Soliton Ltd. | Security monitor |
US7457415B2 (en) * | 1998-08-20 | 2008-11-25 | Akikaze Technologies, Llc | Secure information distribution system utilizing information segment scrambling |
JP2000090645A (en) * | 1998-09-08 | 2000-03-31 | Sony Corp | File management device and method and supply medium |
CN1224909C (en) * | 1998-10-16 | 2005-10-26 | 松下电器产业株式会社 | Digital works protecting system |
GB9903900D0 (en) * | 1999-02-19 | 1999-04-14 | Digital Gramaphone And Wireles | Data encoding/decoding device and apparatus using the same |
CA2267395C (en) * | 1999-03-30 | 2002-07-09 | Ibm Canada Limited-Ibm Canada Limitee | Method and system for managing keys for encrypted data |
GB2353676A (en) * | 1999-08-17 | 2001-02-28 | Hewlett Packard Co | Robust encryption and decryption of packetised data transferred across communications networks |
US7757097B2 (en) * | 1999-09-03 | 2010-07-13 | Purdue Research Foundation | Method and system for tamperproofing software |
JP3534027B2 (en) * | 1999-12-01 | 2004-06-07 | 日本電気株式会社 | Content providing apparatus and machine-readable recording medium recording program |
US7065652B1 (en) * | 2000-06-21 | 2006-06-20 | Aladdin Knowledge Systems, Ltd. | System for obfuscating computer code upon disassembly |
US7237123B2 (en) * | 2000-09-22 | 2007-06-26 | Ecd Systems, Inc. | Systems and methods for preventing unauthorized use of digital content |
CA2435624C (en) * | 2000-09-22 | 2013-05-07 | Richard B. Levine | Systems and methods for preventing unauthorized use of digital content |
US7328453B2 (en) * | 2001-05-09 | 2008-02-05 | Ecd Systems, Inc. | Systems and methods for the prevention of unauthorized use and manipulation of digital content |
US20030204702A1 (en) * | 2002-04-30 | 2003-10-30 | Adc Dsl Systems, Inc. | Flexible memory architecture for an embedded processor |
US7260890B2 (en) * | 2002-06-26 | 2007-08-28 | Georgia Tech Research Corporation | Methods for fabricating three-dimensional all organic interconnect structures |
WO2004034395A1 (en) * | 2002-10-10 | 2004-04-22 | Matsushita Electric Industrial Co., Ltd. | Optical disc, reproducing device, program, reproducing method, recording method |
US7290125B2 (en) * | 2003-04-17 | 2007-10-30 | International Business Corporation | Method for scheduling launch a computer system based upon a time of timed power-on partition of logical partitions |
US7877754B2 (en) * | 2003-08-21 | 2011-01-25 | International Business Machines Corporation | Methods, systems, and media to expand resources available to a logical partition |
US7631360B2 (en) * | 2004-06-12 | 2009-12-08 | Microsoft Corporation | Hardware protection |
US7797702B1 (en) * | 2005-02-22 | 2010-09-14 | Symantec Corporation | Preventing execution of remotely injected threads |
US20080115219A1 (en) * | 2006-11-13 | 2008-05-15 | Electronics And Telecommunications Research | Apparatus and method of detecting file having embedded malicious code |
KR20100078081A (en) * | 2008-12-30 | 2010-07-08 | (주) 세인트 시큐리티 | System and method for detecting unknown malicious codes by analyzing kernel based system events |
-
2001
- 2001-09-21 CA CA2435624A patent/CA2435624C/en not_active Expired - Fee Related
- 2001-09-21 AU AU2001292910A patent/AU2001292910B2/en not_active Ceased
- 2001-09-21 EP EP01973317A patent/EP1352307A2/en not_active Withdrawn
- 2001-09-21 US US09/960,610 patent/US7565697B2/en not_active Expired - Fee Related
- 2001-09-21 AU AU9291001A patent/AU9291001A/en active Pending
- 2001-09-21 WO PCT/US2001/029554 patent/WO2002025415A2/en active Search and Examination
-
2008
- 2008-08-01 AU AU2008203454A patent/AU2008203454B2/en not_active Ceased
-
2009
- 2009-07-20 US US12/460,506 patent/US8015608B2/en not_active Expired - Fee Related
Also Published As
Publication number | Publication date |
---|---|
US7565697B2 (en) | 2009-07-21 |
AU2008203454B2 (en) | 2011-10-20 |
WO2002025415A2 (en) | 2002-03-28 |
US20020120854A1 (en) | 2002-08-29 |
WO2002025415A8 (en) | 2003-08-14 |
CA2435624C (en) | 2013-05-07 |
AU2001292910B2 (en) | 2008-05-01 |
AU9291001A (en) | 2002-04-02 |
EP1352307A2 (en) | 2003-10-15 |
AU2008203454A1 (en) | 2008-08-21 |
US20100122349A1 (en) | 2010-05-13 |
US8015608B2 (en) | 2011-09-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA2435624A1 (en) | Systems and methods for preventing unauthorized use of digital content | |
EP0238537B1 (en) | System for preventing software piracy employing multi-encrypted keys and single decryption circuit modules | |
US7146644B2 (en) | Data security system and method responsive to electronic attacks | |
US5933497A (en) | Apparatus and method for controlling access to software | |
Petersen et al. | System implications of information privacy | |
US5822771A (en) | System for management of software employing memory for processing unit with regulatory information, for limiting amount of use and number of backup copies of software | |
US5606610A (en) | Apparatus and method for storing data | |
CA2242596C (en) | System for controlling access and distribution of digital property | |
KR100626920B1 (en) | File managing system, file managing device, file managing method, and program recording medium | |
AU2001292910A1 (en) | Systems and methods for preventing unauthorized use of digital content | |
US20050246551A1 (en) | System and method for rendering selective presentation of documents | |
WO2006035227A2 (en) | Source code protection | |
EP0325777A3 (en) | A distributed auditing subsystem for an operating system | |
KR980010772A (en) | How to prevent copying of computer software | |
CN111460531A (en) | Multidimensional grading destruction method for key data | |
US7571490B2 (en) | Method and apparatus for protecting data from unauthorized modification | |
KR20170062307A (en) | Apparatus and method for hidding hidden message | |
GB2276965A (en) | Protecting temporarily stored data. | |
WO2005020008A2 (en) | Data security through dissembly of data elements or connectiions between elements | |
US20240054217A1 (en) | Method and apparatus for detecting disablement of data backup processes | |
Brown et al. | Guidelines for Audit Log Mechanisms in Secure Computer Systems | |
WO2003029939A3 (en) | Systems and methods for preventing unauthorized use of digital content | |
Kantzavelou et al. | An attack detection system for secure computer systems—Outline of the solution | |
Menendez et al. | A Guide to Understanding Audit in Trusted Systems | |
Schneider et al. | Final Evaluation Report of Infosafe Corporation, X-Lock 50. Version 2. 00 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
EEER | Examination request | ||
MKLA | Lapsed |
Effective date: 20160921 |