WO2002025415A8 - Systems and methods for preventing unauthorized use of digital content - Google Patents

Systems and methods for preventing unauthorized use of digital content

Info

Publication number
WO2002025415A8
WO2002025415A8 PCT/US2001/029554 US0129554W WO0225415A8 WO 2002025415 A8 WO2002025415 A8 WO 2002025415A8 US 0129554 W US0129554 W US 0129554W WO 0225415 A8 WO0225415 A8 WO 0225415A8
Authority
WO
WIPO (PCT)
Prior art keywords
systems
methods
digital content
unauthorized use
preventing unauthorized
Prior art date
Application number
PCT/US2001/029554
Other languages
French (fr)
Other versions
WO2002025415A2 (en
Inventor
Richard B Levine
Andrew R Lee
Daniel G Howard
John J Hart Iii
Original Assignee
Edc Systems Inc
Richard B Levine
Andrew R Lee
Daniel G Howard
John J Hart Iii
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Edc Systems Inc, Richard B Levine, Andrew R Lee, Daniel G Howard, John J Hart Iii filed Critical Edc Systems Inc
Priority to EP01973317A priority Critical patent/EP1352307A2/en
Priority to AU2001292910A priority patent/AU2001292910B2/en
Priority to AU9291001A priority patent/AU9291001A/en
Priority to CA2435624A priority patent/CA2435624C/en
Publication of WO2002025415A2 publication Critical patent/WO2002025415A2/en
Publication of WO2002025415A8 publication Critical patent/WO2002025415A8/en
Priority to AU2008203454A priority patent/AU2008203454B2/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/14Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
PCT/US2001/029554 2000-09-22 2001-09-21 Systems and methods for preventing unauthorized use of digital content WO2002025415A2 (en)

Priority Applications (5)

Application Number Priority Date Filing Date Title
EP01973317A EP1352307A2 (en) 2000-09-22 2001-09-21 Systems and methods for preventing unauthorized use of digital content
AU2001292910A AU2001292910B2 (en) 2000-09-22 2001-09-21 Systems and methods for preventing unauthorized use of digital content
AU9291001A AU9291001A (en) 2000-09-22 2001-09-21 Systems and methods for preventing unauthorized use of digital content
CA2435624A CA2435624C (en) 2000-09-22 2001-09-21 Systems and methods for preventing unauthorized use of digital content
AU2008203454A AU2008203454B2 (en) 2000-09-22 2008-08-01 Systems & Methods for Preventing Unauthorized Use of Digital Content

Applications Claiming Priority (8)

Application Number Priority Date Filing Date Title
US23465700P 2000-09-22 2000-09-22
US60/234,657 2000-09-22
US24061100P 2000-10-16 2000-10-16
US60/240,611 2000-10-16
US24294900P 2000-10-24 2000-10-24
US60/242,949 2000-10-24
US24470400P 2000-10-31 2000-10-31
US60/244,704 2000-10-31

Publications (2)

Publication Number Publication Date
WO2002025415A2 WO2002025415A2 (en) 2002-03-28
WO2002025415A8 true WO2002025415A8 (en) 2003-08-14

Family

ID=27499759

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2001/029554 WO2002025415A2 (en) 2000-09-22 2001-09-21 Systems and methods for preventing unauthorized use of digital content

Country Status (5)

Country Link
US (2) US7565697B2 (en)
EP (1) EP1352307A2 (en)
AU (3) AU2001292910B2 (en)
CA (1) CA2435624C (en)
WO (1) WO2002025415A2 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8966284B2 (en) 2005-09-14 2015-02-24 Sandisk Technologies Inc. Hardware driver integrity check of memory card controller firmware

Families Citing this family (77)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7644282B2 (en) 1998-05-28 2010-01-05 Verance Corporation Pre-processed information embedding system
US6737957B1 (en) 2000-02-16 2004-05-18 Verance Corporation Remote control signaling using audio watermarks
US20050050343A1 (en) * 2000-06-30 2005-03-03 Selinfreund Richard H. Storage media access control method and system
EP1352307A2 (en) * 2000-09-22 2003-10-15 EDC Systems, Inc. Systems and methods for preventing unauthorized use of digital content
US7237123B2 (en) * 2000-09-22 2007-06-26 Ecd Systems, Inc. Systems and methods for preventing unauthorized use of digital content
US7916124B1 (en) 2001-06-20 2011-03-29 Leapfrog Enterprises, Inc. Interactive apparatus using print media
MXPA04004681A (en) * 2001-11-20 2004-09-10 Contentguard Holdings Inc An extensible rights expression processing system.
US20030120614A1 (en) * 2001-12-20 2003-06-26 Dun & Bradstreet, Inc. Automated e-commerce authentication method and system
US7539391B2 (en) * 2002-06-27 2009-05-26 Nxp B.V. Method and apparatus for trick-mode support of audio/video/data streams with conditional access
WO2004015952A2 (en) * 2002-08-06 2004-02-19 Brainshield Technologies Inc. Device for carrying out the copy-protected distribution of electronic documents
ES2507642T3 (en) 2002-10-15 2014-10-15 Verance Corporation Media supervision, management and information system
US7424620B2 (en) * 2003-09-25 2008-09-09 Sun Microsystems, Inc. Interleaved data and instruction streams for application program obfuscation
US7415618B2 (en) * 2003-09-25 2008-08-19 Sun Microsystems, Inc. Permutation of opcode values for application program obfuscation
US7363620B2 (en) 2003-09-25 2008-04-22 Sun Microsystems, Inc. Non-linear execution of application program instructions for application program obfuscation
US7353499B2 (en) * 2003-09-25 2008-04-01 Sun Microsystems, Inc. Multiple instruction dispatch tables for application program obfuscation
US8220058B2 (en) * 2003-09-25 2012-07-10 Oracle America, Inc. Rendering and encryption engine for application program obfuscation
US20050069138A1 (en) * 2003-09-25 2005-03-31 Sun Microsystems, Inc., A Delaware Corporation Application program obfuscation
US7369677B2 (en) 2005-04-26 2008-05-06 Verance Corporation System reactions to the detection of embedded watermarks in a digital host content
US20060239501A1 (en) 2005-04-26 2006-10-26 Verance Corporation Security enhancements of digital watermarks for multi-media content
US7616776B2 (en) 2005-04-26 2009-11-10 Verance Corproation Methods and apparatus for enhancing the robustness of watermark extraction from digital host content
US9055239B2 (en) 2003-10-08 2015-06-09 Verance Corporation Signal continuity assessment using embedded watermarks
US8085938B2 (en) * 2004-02-10 2011-12-27 Ntt Communications Corporation Secret information management scheme based on secret sharing scheme
US7853193B2 (en) 2004-03-17 2010-12-14 Leapfrog Enterprises, Inc. Method and device for audibly instructing a user to interact with a function
JP4843208B2 (en) * 2004-09-30 2011-12-21 株式会社東芝 Digital content editing apparatus, digital content editing method, digital content editing program, and recording medium recording digital content editing program
US8020004B2 (en) 2005-07-01 2011-09-13 Verance Corporation Forensic marking using a common customization function
US8781967B2 (en) 2005-07-07 2014-07-15 Verance Corporation Watermarking in an encrypted domain
US7922099B1 (en) 2005-07-29 2011-04-12 Leapfrog Enterprises, Inc. System and method for associating content with an image bearing surface
US7549596B1 (en) * 2005-07-29 2009-06-23 Nvidia Corporation Image bearing surface
BRPI0614089A8 (en) * 2005-08-06 2017-01-17 Secured Dimensions Ltd METHOD TO AVOID REVERSE ENGINEERING OF SOFTWARE, UNAUTHORIZED MODIFICATION AND INTERCEPTION OF RUNTIME DATA
US7936339B2 (en) 2005-11-01 2011-05-03 Leapfrog Enterprises, Inc. Method and system for invoking computer functionality by interaction with dynamically generated interface regions of a writing surface
JP4564464B2 (en) * 2006-01-05 2010-10-20 株式会社東芝 Digital content playback apparatus, method and program
US8599143B1 (en) 2006-02-06 2013-12-03 Leapfrog Enterprises, Inc. Switch configuration for detecting writing pressure in a writing device
US8640235B2 (en) * 2006-03-31 2014-01-28 Symantec Corporation Determination of malicious entities
US8127360B1 (en) * 2006-06-29 2012-02-28 Symantec Corporation Method and apparatus for detecting leakage of sensitive information
US8261967B1 (en) 2006-07-19 2012-09-11 Leapfrog Enterprises, Inc. Techniques for interactively coupling electronic content with printed media
US8146163B2 (en) * 2006-11-09 2012-03-27 International Business Machines Corporation Method and system for securing personal computing devices from unauthorized data copying and removal
US8286138B2 (en) * 2007-01-30 2012-10-09 Microsoft Corporation Multi-threaded detection of a game software debugger
US20080189789A1 (en) * 2007-02-01 2008-08-07 Elaine Lamontagne System, method and apparatus for the detection and capturing of technological crime instances
CN101311942B (en) * 2007-05-23 2011-08-24 西门子(中国)有限公司 Software encryption and decryption method and encryption and decryption device
US20090113549A1 (en) * 2007-10-24 2009-04-30 International Business Machines Corporation System and method to analyze software systems against tampering
US8156565B2 (en) * 2008-04-28 2012-04-10 Microsoft Corporation Hardware-based protection of secure data
US8393008B2 (en) * 2008-05-21 2013-03-05 Microsoft Corporation Hardware-based output protection of multiple video streams
US8259938B2 (en) 2008-06-24 2012-09-04 Verance Corporation Efficient and secure forensic marking in compressed
US9871807B2 (en) * 2009-06-12 2018-01-16 Microsoft Technology Licensing, Llc Generic protocol decoder for generic application-level protocol signatures
US8595812B2 (en) * 2009-12-18 2013-11-26 Sabre Inc. Tokenized data security
US8838977B2 (en) 2010-09-16 2014-09-16 Verance Corporation Watermark extraction and content screening in a networked environment
TWI420339B (en) 2010-11-10 2013-12-21 Ind Tech Res Inst Software authorization system and method
US8806204B2 (en) 2011-06-20 2014-08-12 Liaison Technologies, Inc. Systems and methods for maintaining data security across multiple active domains
US11194462B2 (en) * 2011-08-03 2021-12-07 Avaya Inc. Exclusion of selected data from access by collaborators
US8923548B2 (en) 2011-11-03 2014-12-30 Verance Corporation Extraction of embedded watermarks from a host content using a plurality of tentative watermarks
US8615104B2 (en) 2011-11-03 2013-12-24 Verance Corporation Watermark extraction based on tentative watermarks
US8533481B2 (en) 2011-11-03 2013-09-10 Verance Corporation Extraction of embedded watermarks from a host content based on extrapolation techniques
US8682026B2 (en) 2011-11-03 2014-03-25 Verance Corporation Efficient extraction of embedded watermarks in the presence of host content distortions
US8745403B2 (en) 2011-11-23 2014-06-03 Verance Corporation Enhanced content management based on watermark extraction records
US9323902B2 (en) 2011-12-13 2016-04-26 Verance Corporation Conditional access using embedded watermarks
US9547753B2 (en) 2011-12-13 2017-01-17 Verance Corporation Coordinated watermarking
US10095847B2 (en) * 2012-05-25 2018-10-09 Koninklijke Philips N.V. Method, system and device for protection against reverse engineering and/or tampering with programs
US9887887B2 (en) 2012-07-09 2018-02-06 Eturi Corp. Information throttle based on compliance with electronic communication rules
US8966064B2 (en) 2012-07-09 2015-02-24 Parentsware, Llc Agreement compliance controlled electronic device throttle
US10079931B2 (en) 2012-07-09 2018-09-18 Eturi Corp. Information throttle that enforces policies for workplace use of electronic devices
US9847948B2 (en) 2012-07-09 2017-12-19 Eturi Corp. Schedule and location responsive agreement compliance controlled device throttle
US9854393B2 (en) 2012-07-09 2017-12-26 Eturi Corp. Partial information throttle based on compliance with an agreement
US9571606B2 (en) 2012-08-31 2017-02-14 Verance Corporation Social media viewing system
US8726304B2 (en) 2012-09-13 2014-05-13 Verance Corporation Time varying evaluation of multimedia content
US8869222B2 (en) 2012-09-13 2014-10-21 Verance Corporation Second screen content
US9106964B2 (en) 2012-09-13 2015-08-11 Verance Corporation Enhanced content distribution using advertisements
US8806558B1 (en) * 2013-09-20 2014-08-12 Limelight Networks, Inc. Unique watermarking of content objects according to end user identity
US9262794B2 (en) 2013-03-14 2016-02-16 Verance Corporation Transactional video marking system
US9251549B2 (en) 2013-07-23 2016-02-02 Verance Corporation Watermark extractor enhancements based on payload ranking
US9645860B2 (en) * 2013-09-06 2017-05-09 Microsoft Technology Licensing, Llc Verification that particular information is transferred by an application
US9208334B2 (en) 2013-10-25 2015-12-08 Verance Corporation Content management using multiple abstraction layers
EP2913772A1 (en) * 2014-02-28 2015-09-02 Wibu-Systems AG Method and computer system for protecting a computer program against influence
US9596521B2 (en) 2014-03-13 2017-03-14 Verance Corporation Interactive content acquisition using embedded codes
US10445505B2 (en) * 2014-09-22 2019-10-15 Mcafee, Llc Process vulnerability assessment
WO2018218081A1 (en) 2017-05-24 2018-11-29 Modulate, LLC System and method for voice-to-voice conversion
US10440063B1 (en) 2018-07-10 2019-10-08 Eturi Corp. Media device content review and management
WO2021030759A1 (en) * 2019-08-14 2021-02-18 Modulate, Inc. Generation and detection of watermark for real-time voice conversion

Family Cites Families (125)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4118789A (en) * 1977-06-06 1978-10-03 Allen-Bradley Company Program protection module for programmable controller
US4278837A (en) * 1977-10-31 1981-07-14 Best Robert M Crypto microprocessor for executing enciphered programs
US4405829A (en) * 1977-12-14 1983-09-20 Massachusetts Institute Of Technology Cryptographic communications system and method
US4306289A (en) * 1980-02-04 1981-12-15 Western Electric Company, Inc. Digital computer having code conversion apparatus for an encrypted program
US4433207A (en) * 1981-09-10 1984-02-21 Best Robert M Cryptographic decoder for computer programs
US4593353A (en) * 1981-10-26 1986-06-03 Telecommunications Associates, Inc. Software protection method and apparatus
US4577289A (en) * 1983-12-30 1986-03-18 International Business Machines Corporation Hardware key-on-disk system for copy-protecting magnetic storage media
US4688169A (en) * 1985-05-30 1987-08-18 Joshi Bhagirath S Computer software security system
US4864494A (en) * 1986-03-21 1989-09-05 Computerized Data Ssytems For Mfg., Inc. Software usage authorization system with key for decrypting/re-encrypting/re-transmitting moving target security codes from protected software
US5014234A (en) * 1986-08-25 1991-05-07 Ncr Corporation System with software usage timer and counter for allowing limited use but preventing continued unauthorized use of protected software
US5021997A (en) * 1986-09-29 1991-06-04 At&T Bell Laboratories Test automation system
US4977594A (en) * 1986-10-14 1990-12-11 Electronic Publishing Resources, Inc. Database usage metering and protection system and method
US5050213A (en) * 1986-10-14 1991-09-17 Electronic Publishing Resources, Inc. Database usage metering and protection system and method
US4827508A (en) * 1986-10-14 1989-05-02 Personal Library Software, Inc. Database usage metering and protection system and method
US5155680A (en) * 1986-10-24 1992-10-13 Signal Security Technologies Billing system for computing software
GB8704920D0 (en) * 1987-03-03 1987-04-08 Hewlett Packard Co Secure messaging system
US5038320A (en) * 1987-03-13 1991-08-06 International Business Machines Corp. Computer system with automatic initialization of pluggable option cards
US4999806A (en) * 1987-09-04 1991-03-12 Fred Chernow Software distribution system
US5140634A (en) * 1987-09-07 1992-08-18 U.S Philips Corporation Method and apparatus for authenticating accreditations and for authenticating and signing messages
US4864616A (en) * 1987-10-15 1989-09-05 Micronyx, Inc. Cryptographic labeling of electronically stored data
US4916637A (en) * 1987-11-18 1990-04-10 International Business Machines Corporation Customized instruction generator
US5113518A (en) * 1988-06-03 1992-05-12 Durst Jr Robert T Method and system for preventing unauthorized use of software
US4969189A (en) * 1988-06-25 1990-11-06 Nippon Telegraph & Telephone Corporation Authentication system and apparatus therefor
US5155847A (en) * 1988-08-03 1992-10-13 Minicom Data Corporation Method and apparatus for updating software at remote locations
US5023907A (en) * 1988-09-30 1991-06-11 Apollo Computer, Inc. Network license server
DE3906349A1 (en) * 1989-03-01 1990-09-13 Hartmut Hennige METHOD AND DEVICE FOR SIMPLIFYING THE USE OF A VARIETY OF CREDIT CARDS AND THE LIKE
US5155837A (en) * 1989-03-02 1992-10-13 Bell Communications Research, Inc. Methods and apparatus for software retrofitting
US5191611A (en) * 1989-04-03 1993-03-02 Lang Gerald S Method and apparatus for protecting material on storage media and for transferring material on storage media to various recipients
US5199066A (en) * 1989-04-18 1993-03-30 Special Effects Software, Inc. Method and apparatus for protecting software
JPH02293930A (en) * 1989-05-08 1990-12-05 Victor Co Of Japan Ltd Preventing system for stealing of recording contents of recording medium
US5166886A (en) * 1989-07-31 1992-11-24 Molnar Charles E System to demonstrate and sell computer programs
US5081675A (en) * 1989-11-13 1992-01-14 Kitti Kittirutsunetorn System for protection of software in memory against unauthorized use
US5033084A (en) * 1990-04-02 1991-07-16 Data I/O Corporation Method and apparatus for protection of software in an electronic system
US5027396A (en) * 1990-05-07 1991-06-25 Xerox Corporation Execution protection for floppy disks
EP0463251A1 (en) * 1990-06-28 1992-01-02 International Business Machines Corporation Software installation
JPH0792744B2 (en) * 1990-08-20 1995-10-09 インターナショナル・ビジネス・マシーンズ・コーポレイション A method of installing multi-level application software on a data processing device.
FR2673476B1 (en) * 1991-01-18 1996-04-12 Gemplus Card Int SECURE METHOD FOR LOADING MULTIPLE APPLICATIONS INTO A MICROPROCESSOR MEMORY CARD.
US5182770A (en) * 1991-04-19 1993-01-26 Geza Medveczky System and apparatus for protecting computer software
EP0538464B1 (en) 1991-05-08 1998-12-30 Digital Equipment Corporation License management system
US5351297A (en) * 1991-06-28 1994-09-27 Matsushita Electric Industrial Co., Ltd. Method of privacy communication using elliptic curves
DE9109977U1 (en) * 1991-08-12 1992-12-24 Intelligent Solution Services Gmbh, 8051 Marzling, De
US5414850A (en) * 1991-08-23 1995-05-09 Stac Electronics, Inc. System for transparently compressing data files in a computer system
US5222133A (en) * 1991-10-17 1993-06-22 Wayne W. Chou Method of protecting computer software from unauthorized execution using multiple keys
WO1993011480A1 (en) * 1991-11-27 1993-06-10 Intergraph Corporation System and method for network license administration
US5524072A (en) * 1991-12-04 1996-06-04 Enco-Tone Ltd. Methods and apparatus for data encryption and transmission
US5220606A (en) * 1992-02-10 1993-06-15 Harold Greenberg Cryptographic system and method
JP3073590B2 (en) * 1992-03-16 2000-08-07 富士通株式会社 Electronic data protection system, licensor's device and user's device
JPH05281906A (en) * 1992-04-02 1993-10-29 Fujitsu Ltd Cipher key common-used system
US5528490A (en) 1992-04-10 1996-06-18 Charles E. Hill & Associates, Inc. Electronic catalog system and method
US5313521A (en) * 1992-04-15 1994-05-17 Fujitsu Limited Key distribution protocol for file transfer in the local area network
JP2659896B2 (en) * 1992-04-29 1997-09-30 インターナショナル・ビジネス・マシーンズ・コーポレイション Structured document copy management method and structured document copy management device
US5367683A (en) * 1992-06-26 1994-11-22 Digital Equipment Corporation Smart recompilation of performing matchup/difference after code generation
US5410703A (en) * 1992-07-01 1995-04-25 Telefonaktiebolaget L M Ericsson System for changing software during computer operation
US5361359A (en) * 1992-08-31 1994-11-01 Trusted Information Systems, Inc. System and method for controlling the use of a computer
CA2145068A1 (en) * 1992-09-21 1994-03-31 Ric Bailier Richardson System for software registration
US5327563A (en) * 1992-11-13 1994-07-05 Hewlett-Packard Method for locking software files to a specific storage device
US5341429A (en) * 1992-12-04 1994-08-23 Testdrive Corporation Transformation of ephemeral material
US5509070A (en) * 1992-12-15 1996-04-16 Softlock Services Inc. Method for encouraging purchase of executable and non-executable software
ES2130194T3 (en) * 1993-01-18 1999-07-01 Siemens Ag CONTROL SYSTEM IN REAL TIME.
US5351293A (en) * 1993-02-01 1994-09-27 Wave Systems Corp. System method and apparatus for authenticating an encrypted signal
US5483658A (en) * 1993-02-26 1996-01-09 Grube; Gary W. Detection of unauthorized use of software applications in processing devices
US5379343A (en) * 1993-02-26 1995-01-03 Motorola, Inc. Detection of unauthorized use of software applications in communication units
US5585585A (en) * 1993-05-21 1996-12-17 Coda Music Technology, Inc. Automated accompaniment apparatus and method
US5337357A (en) * 1993-06-17 1994-08-09 Software Security, Inc. Method of software distribution protection
US5497423A (en) * 1993-06-18 1996-03-05 Matsushita Electric Industrial Co., Ltd. Method of implementing elliptic curve cryptosystems in digital signatures or verification and privacy communication
US5544246A (en) * 1993-09-17 1996-08-06 At&T Corp. Smartcard adapted for a plurality of service providers and for remote installation of same
US5625690A (en) * 1993-11-15 1997-04-29 Lucent Technologies Inc. Software pay per use system
US5421009A (en) * 1993-12-22 1995-05-30 Hewlett-Packard Company Method of remotely installing software directly from a central computer
US5495411A (en) * 1993-12-22 1996-02-27 Ananda; Mohan Secure software rental system using continuous asynchronous password verification
US5473687A (en) * 1993-12-29 1995-12-05 Infosafe Systems, Inc. Method for retrieving secure information from a database
US5509074A (en) * 1994-01-27 1996-04-16 At&T Corp. Method of protecting electronically published materials using cryptographic protocols
US5553143A (en) * 1994-02-04 1996-09-03 Novell, Inc. Method and apparatus for electronic licensing
JPH07230380A (en) * 1994-02-15 1995-08-29 Internatl Business Mach Corp <Ibm> Method and system for controlling utilization of application program
US5394469A (en) * 1994-02-18 1995-02-28 Infosafe Systems, Inc. Method and apparatus for retrieving secure information from mass storage media
JPH07244781A (en) 1994-03-07 1995-09-19 C S K Sogo Kenkyusho:Kk Method and device for renting software and circulation medium
US5757907A (en) 1994-04-25 1998-05-26 International Business Machines Corporation Method and apparatus for enabling trial period use of software products: method and apparatus for generating a machine-dependent identification
CA2143874C (en) 1994-04-25 2000-06-20 Thomas Edward Cooper Method and apparatus for enabling trial period use of software products: method and apparatus for utilizing a decryption stub
US5557675A (en) * 1994-05-10 1996-09-17 Schupak; Donald Computer controlled audio-visual system
US5473692A (en) * 1994-09-07 1995-12-05 Intel Corporation Roving software license for a hardware agent
US5511123A (en) * 1994-08-04 1996-04-23 Northern Telecom Limited Symmetric cryptographic system for data encryption
US5557346A (en) 1994-08-11 1996-09-17 Trusted Information Systems, Inc. System and method for key escrow encryption
US5570291A (en) * 1994-08-24 1996-10-29 Wallace Computer Services, Inc. Custom product estimating and order processing system
US5615061A (en) * 1994-09-29 1997-03-25 Singh; Jitendra K. Method of preventng software piracy by uniquely identifying the specific magnetic storage device the software is stored on
US5579479A (en) * 1994-10-03 1996-11-26 Plum Hall Inc. Computer software licensing authentication method and apparatus
US5654746A (en) * 1994-12-01 1997-08-05 Scientific-Atlanta, Inc. Secure authorization and control method and apparatus for a game delivery service
US5625692A (en) 1995-01-23 1997-04-29 International Business Machines Corporation Method and system for a public key cryptosystem having proactive, robust, and recoverable distributed threshold secret sharing
US5826245A (en) * 1995-03-20 1998-10-20 Sandberg-Diment; Erik Providing verification information for a transaction
US6671813B2 (en) * 1995-06-07 2003-12-30 Stamps.Com, Inc. Secure on-line PC postage metering system
US5615264A (en) 1995-06-08 1997-03-25 Wave Systems Corp. Encrypted data package record for use in remote transaction metered data system
US5592549A (en) 1995-06-15 1997-01-07 Infosafe Systems, Inc. Method and apparatus for retrieving selected information from a secure information source
US5671412A (en) * 1995-07-28 1997-09-23 Globetrotter Software, Incorporated License management system for software applications
US5721781A (en) 1995-09-13 1998-02-24 Microsoft Corporation Authentication system and method for smart card transactions
US5758068A (en) 1995-09-19 1998-05-26 International Business Machines Corporation Method and apparatus for software license management
US5638445A (en) 1995-09-19 1997-06-10 Microsoft Corporation Blind encryption
US5708709A (en) 1995-12-08 1998-01-13 Sun Microsystems, Inc. System and method for managing try-and-buy usage of application programs
US5790664A (en) 1996-02-26 1998-08-04 Network Engineering Software, Inc. Automated system for management of licensed software
US5794230A (en) 1996-03-15 1998-08-11 Microsoft Corporation Method and system for creating and searching directories on a server
US5754647A (en) 1996-03-27 1998-05-19 United Microelectronics Corporation Software protection apparatus and the method of protection utilizing read-write memory means having inconsistent input and output data
US6918038B1 (en) * 1996-08-13 2005-07-12 Angel Secure Networks, Inc. System and method for installing an auditable secure network
US6012144A (en) * 1996-10-08 2000-01-04 Pickett; Thomas E. Transaction security method and apparatus
JP3172475B2 (en) * 1996-12-26 2001-06-04 日本アイ・ビー・エム株式会社 Data hiding method and data extraction method using statistical test
EP0855638A1 (en) * 1997-01-24 1998-07-29 Deutsche Thomson-Brandt Gmbh Method and apparatus for encrypting and for decrypting data arranged in a data sector
US5930828A (en) * 1997-03-26 1999-07-27 Executive Software International Real-time apparatus and method for minimizing disk fragmentation in a computer system
US5974549A (en) * 1997-03-27 1999-10-26 Soliton Ltd. Security monitor
US7457415B2 (en) * 1998-08-20 2008-11-25 Akikaze Technologies, Llc Secure information distribution system utilizing information segment scrambling
JP2000090645A (en) * 1998-09-08 2000-03-31 Sony Corp File management device and method and supply medium
EP0994475B1 (en) * 1998-10-16 2001-07-11 Matsushita Electric Industrial Co., Ltd. Digital content protection system
GB9903900D0 (en) * 1999-02-19 1999-04-14 Digital Gramaphone And Wireles Data encoding/decoding device and apparatus using the same
CA2267395C (en) * 1999-03-30 2002-07-09 Ibm Canada Limited-Ibm Canada Limitee Method and system for managing keys for encrypted data
GB2353676A (en) * 1999-08-17 2001-02-28 Hewlett Packard Co Robust encryption and decryption of packetised data transferred across communications networks
US7757097B2 (en) * 1999-09-03 2010-07-13 Purdue Research Foundation Method and system for tamperproofing software
JP3534027B2 (en) * 1999-12-01 2004-06-07 日本電気株式会社 Content providing apparatus and machine-readable recording medium recording program
US7065652B1 (en) * 2000-06-21 2006-06-20 Aladdin Knowledge Systems, Ltd. System for obfuscating computer code upon disassembly
EP1352307A2 (en) * 2000-09-22 2003-10-15 EDC Systems, Inc. Systems and methods for preventing unauthorized use of digital content
US7237123B2 (en) * 2000-09-22 2007-06-26 Ecd Systems, Inc. Systems and methods for preventing unauthorized use of digital content
US7328453B2 (en) * 2001-05-09 2008-02-05 Ecd Systems, Inc. Systems and methods for the prevention of unauthorized use and manipulation of digital content
US20030204702A1 (en) * 2002-04-30 2003-10-30 Adc Dsl Systems, Inc. Flexible memory architecture for an embedded processor
US7260890B2 (en) * 2002-06-26 2007-08-28 Georgia Tech Research Corporation Methods for fabricating three-dimensional all organic interconnect structures
JP4764631B2 (en) * 2002-10-10 2011-09-07 パナソニック株式会社 Optical disc, playback device, program, playback method, recording method
US7290125B2 (en) * 2003-04-17 2007-10-30 International Business Corporation Method for scheduling launch a computer system based upon a time of timed power-on partition of logical partitions
US7877754B2 (en) * 2003-08-21 2011-01-25 International Business Machines Corporation Methods, systems, and media to expand resources available to a logical partition
US7559091B2 (en) * 2004-06-12 2009-07-07 Microsoft Corporation Software obfuscation
US7797702B1 (en) * 2005-02-22 2010-09-14 Symantec Corporation Preventing execution of remotely injected threads
US20080115219A1 (en) * 2006-11-13 2008-05-15 Electronics And Telecommunications Research Apparatus and method of detecting file having embedded malicious code
KR20100078081A (en) * 2008-12-30 2010-07-08 (주) 세인트 시큐리티 System and method for detecting unknown malicious codes by analyzing kernel based system events

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8966284B2 (en) 2005-09-14 2015-02-24 Sandisk Technologies Inc. Hardware driver integrity check of memory card controller firmware

Also Published As

Publication number Publication date
WO2002025415A2 (en) 2002-03-28
EP1352307A2 (en) 2003-10-15
US7565697B2 (en) 2009-07-21
CA2435624C (en) 2013-05-07
US20100122349A1 (en) 2010-05-13
US8015608B2 (en) 2011-09-06
AU2008203454A1 (en) 2008-08-21
AU2001292910B2 (en) 2008-05-01
US20020120854A1 (en) 2002-08-29
CA2435624A1 (en) 2002-03-28
AU2008203454B2 (en) 2011-10-20
AU9291001A (en) 2002-04-02

Similar Documents

Publication Publication Date Title
WO2002025415A8 (en) Systems and methods for preventing unauthorized use of digital content
AU6640500A (en) Methods and systems of protecting digital content
AU2002239470A1 (en) Systems and methods for digital entertainement
AU2001255361A1 (en) System and method of managing metadata
AU2002230484A1 (en) System and method of managing documents
AU2002314833A1 (en) Content management and transformation system for digital content
AU5334500A (en) Method and system for preventing the unauthorized use of software
AU2001295090A1 (en) Tampering detector and system disabler
AU2001294168A1 (en) Secure distribution of digital content
AU2001273624A1 (en) Digital signature system and method
AU2003202815A1 (en) Method and system for the information protection of digital content
AU2635101A (en) Policy notice method and system
AU2001258856A1 (en) Rental system of digital content
EP2267626B8 (en) Digital rights management system and method
AU2001241657A1 (en) Video and music distribution system
AU2002215209A1 (en) Content distribution system and content distribution method
AU2002238153A1 (en) Multimedia and computing system
AU2001259314A1 (en) Method and system for licensing digital works
AU2001292659A1 (en) Time and object based masking for video watermarking
AU1330601A (en) Networked digital security system and methods
AU2002318403A1 (en) Method and system for providing secure digital music duplication
AUPQ865700A0 (en) Content filtering and management
AU2001244302A1 (en) Assessment methods and systems
AU2003268037A1 (en) Digital content security system and method
AU2001277229A1 (en) Systems and methods for etching digital watermarks

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
121 Ep: the epo has been informed by wipo that ep was designated in this application
REEP Request for entry into the european phase

Ref document number: 2001973317

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2435624

Country of ref document: CA

Ref document number: 2001292910

Country of ref document: AU

Ref document number: 2001973317

Country of ref document: EP

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

D17 Declaration under article 17(2)a
WWP Wipo information: published in national office

Ref document number: 2001973317

Country of ref document: EP

NENP Non-entry into the national phase

Ref country code: JP