Movatterモバイル変換


[0]ホーム

URL:


US20070199074A1 - Systems and methods for preventing unauthorized use of digital content - Google Patents

Systems and methods for preventing unauthorized use of digital content
Download PDF

Info

Publication number
US20070199074A1
US20070199074A1US11/789,497US78949707AUS2007199074A1US 20070199074 A1US20070199074 A1US 20070199074A1US 78949707 AUS78949707 AUS 78949707AUS 2007199074 A1US2007199074 A1US 2007199074A1
Authority
US
United States
Prior art keywords
content
data
file
digital content
nondeterministic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/789,497
Inventor
Richard LeVine
Andrew Lee
Daniel Howard
Daniel Goldman
John Hart
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SCA IPLA Holdings Inc
Original Assignee
ECD Systems Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US09/960,610external-prioritypatent/US7565697B2/en
Application filed by ECD Systems IncfiledCriticalECD Systems Inc
Priority to US11/789,497priorityCriticalpatent/US20070199074A1/en
Publication of US20070199074A1publicationCriticalpatent/US20070199074A1/en
Assigned to ECD SYSTEMS, INC.reassignmentECD SYSTEMS, INC.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: GOLDMAN, DANIEL M., HART, JOHN J., III, HOWARD, DANIEL G., LEE, ANDREW R., LEVINE, RICHARD B.
Assigned to SCA IPLA HOLDINGS INC.reassignmentSCA IPLA HOLDINGS INC.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: ECD SYSTEMS INC. (F.K.A. ECD SYSTEMS.COM, INC.)
Priority to US12/791,644prioritypatent/US8261359B2/en
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

Theft, distribution, and piracy of digital content (software, video, audio, e-books, any content of any kind that is digitally stored and distributed) is generally accomplished by copying it, if possible, or, if it is protected from being copied in any fashion, such piracy is based upon a number of reverse engineering techniques. Aside from the straightforward copying of unprotected content, all of these other methods require first an understanding of the protective mechanism(s) guarding the content, and finally an unauthorized modification of that protection in order to disable or subvert it. Methods that prevent a skilled individual from using reverse engineering tools and techniques to attain that level of understanding and/or prevent anyone from performing such modifications can offer significant advantages to content creators who wish to protect their products.

Description

Claims (18)

US11/789,4972000-09-222007-04-24Systems and methods for preventing unauthorized use of digital contentAbandonedUS20070199074A1 (en)

Priority Applications (2)

Application NumberPriority DateFiling DateTitle
US11/789,497US20070199074A1 (en)2000-09-222007-04-24Systems and methods for preventing unauthorized use of digital content
US12/791,644US8261359B2 (en)2000-09-222010-06-01Systems and methods for preventing unauthorized use of digital content

Applications Claiming Priority (10)

Application NumberPriority DateFiling DateTitle
US23465700P2000-09-222000-09-22
US24061100P2000-10-162000-10-16
US24294900P2000-10-242000-10-24
US24470400P2000-10-312000-10-31
US24994600P2000-11-202000-11-20
US26070501P2001-01-102001-01-10
US28530001P2001-04-202001-04-20
US09/960,610US7565697B2 (en)2000-09-222001-09-21Systems and methods for preventing unauthorized use of digital content
US09/989,910US7237123B2 (en)2000-09-222001-11-20Systems and methods for preventing unauthorized use of digital content
US11/789,497US20070199074A1 (en)2000-09-222007-04-24Systems and methods for preventing unauthorized use of digital content

Related Parent Applications (1)

Application NumberTitlePriority DateFiling Date
US09/989,910DivisionUS7237123B2 (en)2000-09-222001-11-20Systems and methods for preventing unauthorized use of digital content

Related Child Applications (1)

Application NumberTitlePriority DateFiling Date
US12/791,644ContinuationUS8261359B2 (en)2000-09-222010-06-01Systems and methods for preventing unauthorized use of digital content

Publications (1)

Publication NumberPublication Date
US20070199074A1true US20070199074A1 (en)2007-08-23

Family

ID=27575236

Family Applications (3)

Application NumberTitlePriority DateFiling Date
US09/989,910Expired - Fee RelatedUS7237123B2 (en)2000-09-222001-11-20Systems and methods for preventing unauthorized use of digital content
US11/789,497AbandonedUS20070199074A1 (en)2000-09-222007-04-24Systems and methods for preventing unauthorized use of digital content
US12/791,644Expired - Fee RelatedUS8261359B2 (en)2000-09-222010-06-01Systems and methods for preventing unauthorized use of digital content

Family Applications Before (1)

Application NumberTitlePriority DateFiling Date
US09/989,910Expired - Fee RelatedUS7237123B2 (en)2000-09-222001-11-20Systems and methods for preventing unauthorized use of digital content

Family Applications After (1)

Application NumberTitlePriority DateFiling Date
US12/791,644Expired - Fee RelatedUS8261359B2 (en)2000-09-222010-06-01Systems and methods for preventing unauthorized use of digital content

Country Status (1)

CountryLink
US (3)US7237123B2 (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20100306854A1 (en)*2009-06-012010-12-02Ab Initio Software LlcGenerating Obfuscated Data
US20100318481A1 (en)*2009-06-102010-12-16Ab Initio Technology LlcGenerating Test Data
WO2011061734A1 (en)*2009-11-182011-05-26Safend Ltd.System and method for selective protection of information elements
US20120096562A1 (en)*2009-02-242012-04-19European Aeronautic Defence And Space Company-Eads FranceMethod for protecting the source code of a computer program
US8700896B1 (en)*2010-08-252014-04-15Symantec CorporationTechniques for automatic management of file system encryption drivers
US8806204B2 (en)2011-06-202014-08-12Liaison Technologies, Inc.Systems and methods for maintaining data security across multiple active domains
US20170206156A1 (en)*2013-09-062017-07-20Microsoft Technology Licensing, LlcVerification that particular information is transferred by an application
US10185641B2 (en)2013-12-182019-01-22Ab Initio Technology LlcData generation
US20230041678A1 (en)*2021-08-032023-02-09Dell Products, L.P.Intelligent orchestration of digital watermarking using a platform framework
US11741196B2 (en)2018-11-152023-08-29The Research Foundation For The State University Of New YorkDetecting and preventing exploits of software vulnerability using instruction tags
US11954010B2 (en)*2020-01-072024-04-09Supercell OyMethod for blocking external debugger application from analysing code of software program

Families Citing this family (138)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US7124091B1 (en)2000-01-192006-10-17Individual Network, LlcMethod and system for ordering an advertising spot over a data network
US6434747B1 (en)2000-01-192002-08-13Individual Network, Inc.Method and system for providing a customized media list
US8813123B2 (en)2000-01-192014-08-19Interad Technologies, LlcContent with customized advertisement
US20050050343A1 (en)*2000-06-302005-03-03Selinfreund Richard H.Storage media access control method and system
EP1352307A2 (en)*2000-09-222003-10-15EDC Systems, Inc.Systems and methods for preventing unauthorized use of digital content
US7237123B2 (en)2000-09-222007-06-26Ecd Systems, Inc.Systems and methods for preventing unauthorized use of digital content
JP2002189636A (en)*2000-12-202002-07-05Sega Corp Security system
US20020087400A1 (en)*2000-12-282002-07-04Denis KhooMethod and system for providing a reward for playing content received over a data network
US8615652B2 (en)2001-01-022013-12-24Scott D. RedmondSystem and method for providing load balanced secure media content and data delivery in a distributed computing environment
US20020165770A1 (en)*2001-05-042002-11-07Individual Network, Inc.Method and system for providing content with an option
AU2002305490B2 (en)2001-05-092008-11-06Sca Ipla Holdings, Inc.Systems and methods for the prevention of unauthorized use and manipulation of digital content
US20030149779A1 (en)*2001-05-112003-08-07Gary AdelmanMethod and apparatus utilizing pin numbers for selectively providing digital goods
US6725237B2 (en)*2001-06-012004-04-20International Business Machines CorporationSystem and method of preparing data for a semiconductor mask manufacturer
US20040054952A1 (en)*2002-09-132004-03-18Morrow James W.Device verification system and method
US20030105958A1 (en)*2001-12-052003-06-05International Business Machines CorporationCommand script instrumentation for logging command execution and the protection of sensitive information
US20030120614A1 (en)*2001-12-202003-06-26Dun & Bradstreet, Inc.Automated e-commerce authentication method and system
US7302589B2 (en)*2002-02-202007-11-27Intel CorporationMethod for securing memory mapped control registers
US20030212606A1 (en)*2002-05-132003-11-13Gary AdelmanMethod for selectively providing digital goods to a consumer at a consumer client computer
US7478233B2 (en)*2002-05-302009-01-13Microsoft CorporationPrevention of software tampering
US7398465B2 (en)*2002-06-202008-07-08The Boeing CompanySystem and method for identifying, classifying, extracting and resolving hidden entities
US7620699B1 (en)*2002-07-262009-11-17Paltalk Holdings, Inc.Method and system for managing high-bandwidth data sharing
US7152245B2 (en)*2002-10-212006-12-19Microsoft CorporationInstallation of black box for trusted component for digital rights management (DRM) on computing device
US7539086B2 (en)*2002-10-232009-05-26J2 Global Communications, Inc.System and method for the secure, real-time, high accuracy conversion of general-quality speech into text
US7536713B1 (en)*2002-12-112009-05-19Alan BartholomewKnowledge broadcasting and classification system
AU2002953325A0 (en)*2002-12-132003-01-09Executive Computing Holdings Pty LtdMeans for providing protection for digital assets
US7336784B2 (en)*2002-12-202008-02-26Brite Smart CorporationMultimedia decoder method and system with authentication and enhanced digital rights management (DRM) where each received signal is unique and where the missing signal is cached inside the storage memory of each receiver
AU2003900070A0 (en)*2003-01-072003-01-23Securewrap Pty LtdMethod of and architecture for monitoring digital information
US7548848B1 (en)2003-01-082009-06-16Xambala, Inc.Method and apparatus for semantic processing engine
US20100017627A1 (en)2003-02-072010-01-21Broadon Communications Corp.Ensuring authenticity in a closed content distribution system
US8131649B2 (en)2003-02-072012-03-06Igware, Inc.Static-or-dynamic and limited-or-unlimited content rights
US7089425B2 (en)*2003-03-182006-08-08Ci4 Technologies, Inc.Remote access authorization of local content
US8812852B2 (en)*2003-03-192014-08-19Sony CorporationMethod and system for marking digital content
JP4370800B2 (en)*2003-04-212009-11-25ヤマハ株式会社 Music content utilization apparatus and program
US7469346B2 (en)*2003-06-272008-12-23Disney Enterprises, Inc.Dual virtual machine architecture for media devices
US20050120352A1 (en)*2003-11-282005-06-02Sun Microsystems, Inc.Meta directory server providing users the ability to customize work-flows
US20050237887A1 (en)*2004-03-262005-10-27Collar Bradley TMethod of providing copy protection for optical storage media
US20050257252A1 (en)*2004-04-282005-11-17Art ShelestMethod for protecting privileged device functions
WO2006031723A2 (en)*2004-09-132006-03-23Coretrace CorporationMethod and system for license management
JP4843208B2 (en)*2004-09-302011-12-21株式会社東芝 Digital content editing apparatus, digital content editing method, digital content editing program, and recording medium recording digital content editing program
GB0421774D0 (en)*2004-09-302004-11-03Ttp Communications LtdSource code protection
US9275052B2 (en)2005-01-192016-03-01Amazon Technologies, Inc.Providing annotations of a digital work
US8131647B2 (en)2005-01-192012-03-06Amazon Technologies, Inc.Method and system for providing annotations of a digital work
US8261058B2 (en)*2005-03-162012-09-04Dt Labs, LlcSystem, method and apparatus for electronically protecting data and digital content
US8838974B2 (en)*2005-07-152014-09-16The Mathworks, Inc.System and method for verifying the integrity of read-only components in deployed mixed-mode applications
US7454712B2 (en)*2005-07-182008-11-18International Business Machines CorporationMethod, system, and computer program product for preventing unwanted application behavior
EP1748343A1 (en)2005-07-292007-01-31STMicroelectronics LimitedCircuit personalisation
WO2007017856A1 (en)*2005-08-062007-02-15Secured Dimensions Ltd.Method for preventing software reverse engineering, unauthorized modification, and runtime data interception
US7620987B2 (en)*2005-08-122009-11-17Microsoft CorporationObfuscating computer code to prevent an attack
WO2007030931A1 (en)*2005-09-142007-03-22Tetraglyph Technologies Inc.System and method for preventing unauthorized use of digital works
EP1811464A1 (en)*2005-12-302007-07-25THOMSON LicensingInstallation for protected access to a digital content
JP4564464B2 (en)*2006-01-052010-10-20株式会社東芝 Digital content playback apparatus, method and program
US7757185B2 (en)*2006-01-062010-07-13Apple Inc.Enabling and disabling hotkeys
US8688856B2 (en)*2006-01-242014-04-01Novell, Inc.Techniques for managing a network delivery path of content via a key
US8131995B2 (en)*2006-01-242012-03-06Vixs Systems, Inc.Processing feature revocation and reinvocation
US8352449B1 (en)2006-03-292013-01-08Amazon Technologies, Inc.Reader device content indexing
US20080005797A1 (en)*2006-06-302008-01-03Microsoft CorporationIdentifying malware in a boot environment
US7720765B1 (en)*2006-07-202010-05-18Vatari CorporationSystem and method for using digital strings to provide secure distribution of digital content
US8195571B2 (en)*2006-09-072012-06-05Joseph Henry VogelWeb-based system and method to capture and distribute royalties for access to copyrighted academic texts by preventing unauthorized access to discussion boards associated with copyrighted academic texts
US9672533B1 (en)2006-09-292017-06-06Amazon Technologies, Inc.Acquisition of an item based on a catalog presentation of items
US8725565B1 (en)2006-09-292014-05-13Amazon Technologies, Inc.Expedited acquisition of a digital item following a sample presentation of the item
TWI331309B (en)*2006-12-012010-10-01Ind Tech Res InstMethod and system for executing correlative services
US7865817B2 (en)2006-12-292011-01-04Amazon Technologies, Inc.Invariant referencing in digital works
US7747024B2 (en)*2007-02-092010-06-29Lenovo (Singapore) Pte. Ltd.System and method for generalized authentication
US7751807B2 (en)2007-02-122010-07-06Oomble, Inc.Method and system for a hosted mobile management service architecture
US8024400B2 (en)2007-09-262011-09-20Oomble, Inc.Method and system for transferring content from the web to mobile devices
WO2008104021A1 (en)*2007-02-282008-09-04Rightcopy Properties Pty LtdA method of controlling release of a data product
US8695103B2 (en)*2007-03-072014-04-08Rovi Solutions CorporationApparatus for and a method of copy-protecting a content carrying recording medium
US7716224B2 (en)2007-03-292010-05-11Amazon Technologies, Inc.Search and indexing on a user device
US9665529B1 (en)2007-03-292017-05-30Amazon Technologies, Inc.Relative progress and event indicators
US20080263366A1 (en)*2007-04-192008-10-23Microsoft CorporationSelf-verifying software to prevent reverse engineering and piracy
US7984288B2 (en)*2007-05-212011-07-19Sercomm CorporationSoftware protection apparatus and protection method thereof
US8234282B2 (en)2007-05-212012-07-31Amazon Technologies, Inc.Managing status of search index generation
EP1998267A1 (en)*2007-05-292008-12-03Sercomm CorporationSoftware protection apparatus and protection method thereof
US8122022B1 (en)*2007-08-102012-02-21Google Inc.Abbreviation detection for common synonym generation
US8023653B2 (en)2007-10-092011-09-20Microsoft CorporationMedia key-transformation obfuscation in advanced access content system
US8347401B2 (en)*2007-10-242013-01-01Mcafee, Inc.Method and system for ensuring a sharing violation free environment for a trusted software agent
US20090193185A1 (en)*2008-01-242009-07-30Inventec CorporationMethod for accessing the physical memory of an operating system
US10169598B1 (en)*2008-04-102019-01-01United Services Automobile AssociationSystems and methods for sending and receiving encrypted submessages
US20090276474A1 (en)*2008-05-012009-11-05Rotem SelaMethod for copying protected data from one secured storage device to another via a third party
US8966580B2 (en)*2008-05-012015-02-24Sandisk Il Ltd.System and method for copying protected data from one secured storage device to another via a third party
US20090300737A1 (en)*2008-05-272009-12-03Crandell Jeffrey LSplit template biometric verification system
US8578510B2 (en)*2008-06-262013-11-05Valve CorporationAnti-piracy measures for a video game using hidden secrets
US9075957B2 (en)*2008-08-042015-07-07Sandisk Il Ltd.Backing up digital content that is stored in a secured storage device
US8793498B2 (en)*2008-08-112014-07-29Nbcuniversal Media, LlcSystem and method for forensic analysis of media works
JP5649273B2 (en)*2008-08-252015-01-07株式会社東芝 Information processing apparatus, information processing method, and information processing program
US9087032B1 (en)2009-01-262015-07-21Amazon Technologies, Inc.Aggregation of highlights
US8378979B2 (en)2009-01-272013-02-19Amazon Technologies, Inc.Electronic device with haptic feedback
US8762741B2 (en)*2009-01-292014-06-24Microsoft CorporationPrivacy-preserving communication
US8613108B1 (en)*2009-03-262013-12-17Adobe Systems IncorporatedMethod and apparatus for location-based digital rights management
CN101854311A (en)*2009-03-312010-10-06国际商业机器公司Method and device for transmitting context information on web server
US8832584B1 (en)2009-03-312014-09-09Amazon Technologies, Inc.Questions on highlighted passages
JP5414350B2 (en)*2009-05-082014-02-12キヤノン株式会社 Memory control circuit and control method thereof
US20100325446A1 (en)*2009-06-192010-12-23Joseph Martin MordetskySecuring Executable Code Integrity Using Auto-Derivative Key
US9069992B1 (en)*2009-07-312015-06-30Symantec CorporationSystem and method for reducing data loss prevention scans
US9027143B1 (en)2009-08-262015-05-05Adobe Systems IncorporatedSystem and method for multipronged authentication
US8831228B1 (en)2009-08-282014-09-09Adobe Systems IncorporatedSystem and method for decentralized management of keys and policies
US8692763B1 (en)2009-09-282014-04-08John T. KimLast screen rendering for electronic book reader
JP4756613B2 (en)*2009-11-172011-08-24株式会社ソニー・コンピュータエンタテインメント Information processing device
US8595812B2 (en)2009-12-182013-11-26Sabre Inc.Tokenized data security
EP2438511B1 (en)2010-03-222019-07-03LRDC Systems, LLCA method of identifying and protecting the integrity of a set of source data
US9495322B1 (en)2010-09-212016-11-15Amazon Technologies, Inc.Cover display
US8756434B2 (en)2011-04-082014-06-17Apple Inc.System and method for executing an encrypted binary from a memory pool
TW201243643A (en)*2011-04-222012-11-01Inst Information IndustryHierarchical encryption/decryption device and method thereof
EP2536175B1 (en)*2011-06-142014-08-13Telefonaktiebolaget L M Ericsson (publ)Method, apparatus and computer program for a network node including a PCEF for establishing a user plane session
FR2979442B1 (en)*2011-08-292013-08-16Inside Secure MICROPROCESSOR PROTECTS AGAINST MEMORY DAMAGE
US9158741B1 (en)2011-10-282015-10-13Amazon Technologies, Inc.Indicators for navigating digital works
US9674155B2 (en)*2011-12-122017-06-06International Business Machines CorporationEncrypting segmented data in a distributed computing system
US20180083930A1 (en)2011-12-122018-03-22International Business Machines CorporationReads for dispersed computation jobs
US8762452B2 (en)2011-12-192014-06-24Ericsson Television Inc.Virtualization in adaptive stream creation and delivery
KR101304307B1 (en)2012-02-172013-09-11숭실대학교산학협력단Method for determining android mobile application, Method and Apparatus for identifying illegal copied android mobile application using the same
US11204980B2 (en)2012-03-052021-12-21White Hot Visions, LLCSystem and method for securely retrieving and playing digital media using peer-to-peer distribution
US9576114B2 (en)*2012-03-052017-02-21Marvin MarshallSystem and method for securely retrieving and playing digital media
US8719946B2 (en)*2012-03-052014-05-06Song1, LlcSystem and method for securely retrieving and playing digital media
US20130346379A1 (en)*2012-06-222013-12-26W. Andrew LoeStreaming dynamically-generated zip archive files
US9471514B1 (en)*2012-08-232016-10-18Palo Alto Networks, Inc.Mitigation of cyber attacks by pointer obfuscation
US12045255B2 (en)*2012-09-282024-07-23Apple Inc.Data storage management and synchronization
WO2014068362A1 (en)*2012-10-302014-05-08Soda Private LimitedMethod and system for secure computer file management and storage having high level of usability
US9948573B2 (en)*2013-03-142018-04-17Comcast Cable Communications, LlcDelivery of multimedia components according to user activity
US9477823B1 (en)2013-03-152016-10-25Smart Information Flow Technologies, LLCSystems and methods for performing security authentication based on responses to observed stimuli
EP3005207B1 (en)*2013-05-302020-09-30JScrambler S.A.Digital content execution control mechanism
US10095846B2 (en)*2013-05-302018-10-09Jscrambler S.A.Web application protection
US9117056B2 (en)*2013-06-112015-08-25Vatari CorporationSystem and method for using digital strings to provide secure distribution of digital content
US9245097B2 (en)2013-09-192016-01-26Infosys LimitedSystems and methods for locking an application to device without storing device information on server
US10200345B2 (en)2013-10-292019-02-05Uniloc 2017 LlcElectronic mail sender verification
CN105786456B (en)*2014-12-222018-10-12迈普通信技术股份有限公司A kind of method and device for realizing VxWorks task Hook Function function
US11410225B2 (en)2015-01-132022-08-09State Farm Mutual Automobile Insurance CompanySystem and method for a fast rental application
US9940455B2 (en)*2015-02-252018-04-10International Business Machines CorporationProgramming code execution management
KR102464801B1 (en)2015-04-142022-11-07삼성전자주식회사Method for operating semiconductor device and semiconductor system
US9881142B2 (en)2015-09-112018-01-30Patrick Robert KorenMethod and apparatus for preventing and investigating software piracy
WO2017066318A1 (en)*2015-10-122017-04-20Renesas Electronics America Inc.Secure code delivery
US10419401B2 (en)*2016-01-082019-09-17Capital One Services, LlcMethods and systems for securing data in the public cloud
US20180322305A1 (en)*2017-05-052018-11-08Mastercard International IncorporatedSystem and method for data theft prevention
US11050769B2 (en)2018-02-052021-06-29Bank Of America CorporationControlling dynamic user interface functionality using a machine learning control engine
US10705888B2 (en)*2018-07-052020-07-07Secude AgMethod and system for providing enhanced executable applications
JP7348701B2 (en)*2019-05-032023-09-21ライン プラス コーポレーション Methods and systems for loading executable images into memory
US11470050B2 (en)*2019-07-192022-10-11At&T Intellectual Property I, L.P.Web activity concealment
US20210374730A1 (en)*2020-05-292021-12-02EMC IP Holding Company LLCDcf decentralized ids and verifiable credentials for product delivery into data confidence fabrics
WO2025013085A1 (en)*2023-07-122025-01-16Invidata Pvt. Ltd.Invisible zerobyte data security technology, and add on os with virtual invisible partitions

Citations (46)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5754647A (en)*1996-03-271998-05-19United Microelectronics CorporationSoftware protection apparatus and the method of protection utilizing read-write memory means having inconsistent input and output data
US5953502A (en)*1997-02-131999-09-14Helbig, Sr.; Walter AMethod and apparatus for enhancing computer system security
US5978482A (en)*1995-08-211999-11-02International Business Machines CorporationMethod and system for protection of digital information
US5982891A (en)*1995-02-131999-11-09Intertrust Technologies Corp.Systems and methods for secure transaction management and electronic rights protection
US5991876A (en)*1996-04-011999-11-23Copyright Clearance Center, Inc.Electronic rights management and authorization system
US5991399A (en)*1997-12-181999-11-23Intel CorporationMethod for securely distributing a conditional use private key to a trusted entity on a remote system
US6006332A (en)*1996-10-211999-12-21Case Western Reserve UniversityRights management system for digital media
US6006328A (en)*1995-07-141999-12-21Christopher N. DrakeComputer software authentication, protection, and security system
US6009274A (en)*1996-12-131999-12-283Com CorporationMethod and apparatus for automatically updating software components on end systems over a network
US6009401A (en)*1998-04-061999-12-28Preview Systems, Inc.Relicensing of electronically purchased software
US6052780A (en)*1996-09-122000-04-18Open Security Solutions, LlcComputer system and process for accessing an encrypted and self-decrypting digital information product while restricting access to decrypted digital information
US6073124A (en)*1997-01-292000-06-06Shopnow.Com Inc.Method and system for securely incorporating electronic information into an online purchasing application
US6112181A (en)*1997-11-062000-08-29Intertrust Technologies CorporationSystems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information
US6138119A (en)*1997-02-252000-10-24Intertrust Technologies Corp.Techniques for defining, using and manipulating rights management data structures
US6148402A (en)*1998-04-012000-11-14Hewlett-Packard CompanyApparatus and method for remotely executing commands using distributed computing environment remote procedure calls
US6151618A (en)*1995-12-042000-11-21Microsoft CorporationSafe general purpose virtual machine computing system
US6157721A (en)*1996-08-122000-12-05Intertrust Technologies Corp.Systems and methods using cryptography to protect secure computing environments
US6164841A (en)*1998-05-042000-12-26Hewlett-Packard CompanyMethod, apparatus, and product for dynamic software code translation system
US6178509B1 (en)*1996-06-132001-01-23Intel CorporationTamper resistant methods and apparatus
US6188995B1 (en)*1997-07-282001-02-13Apple Computer, Inc.Method and apparatus for enforcing software licenses
US6192475B1 (en)*1997-03-312001-02-20David R. WallaceSystem and method for cloaking software
US6233567B1 (en)*1997-08-292001-05-15Intel CorporationMethod and apparatus for software licensing electronically distributed programs
US6272636B1 (en)*1997-04-112001-08-07Preview Systems, IncDigital product execution control and security
US6289455B1 (en)*1999-09-022001-09-11Crypotography Research, Inc.Method and apparatus for preventing piracy of digital content
US6295613B1 (en)*1998-04-282001-09-25International Business Machines CorporationDebug watch mechanism and method for debugging a computer program
US20010034846A1 (en)*2000-02-282001-10-25Peter BeeryDigital data and software security protection
US20010037450A1 (en)*2000-03-022001-11-01Metlitski Evgueny A.System and method for process protection
US20010037456A1 (en)*2000-03-102001-11-01Levy Kenneth L.Method and apparatus to protect media existing in an insecure format
US20010041989A1 (en)*2000-05-102001-11-15Vilcauskas Andrew J.System for detecting and preventing distribution of intellectual property protected media
US20010044782A1 (en)*1998-04-292001-11-22Microsoft CorporationHardware ID to prevent software piracy
US6327652B1 (en)*1998-10-262001-12-04Microsoft CorporationLoading and identifying a digital rights management operating system
US6330670B1 (en)*1998-10-262001-12-11Microsoft CorporationDigital rights management operating system
US6334189B1 (en)*1997-12-052001-12-25Jamama, LlcUse of pseudocode to protect software from unauthorized use
US20020002468A1 (en)*1998-08-132002-01-03International Business Machines CorporationMethod and system for securing local database file of local content stored on end-user system
US20020010863A1 (en)*2000-06-082002-01-24Stefan MankeforsMethod for protecting software
US6343280B2 (en)*1998-12-152002-01-29Jonathan ClarkDistributed execution software license server
US20020016918A1 (en)*2000-05-122002-02-07David TuckerInformation security method and system
US6351813B1 (en)*1996-02-092002-02-26Digital Privacy, Inc.Access control/crypto system
US20020035688A1 (en)*2000-09-012002-03-21Ken KutaragiMethod and system for monitoring utilizing condition of contents, computer program and recording medium
US6408391B1 (en)*1998-05-062002-06-18Prc Inc.Dynamic system defense for information warfare
US6460023B1 (en)*1999-06-162002-10-01Pulse Entertainment, Inc.Software authorization system and method
US20030204702A1 (en)*2002-04-302003-10-30Adc Dsl Systems, Inc.Flexible memory architecture for an embedded processor
US20050044228A1 (en)*2003-08-212005-02-24International Business Machines CorporationMethods, systems, and media to expand resources available to a logical partition
US20060146660A1 (en)*2002-10-102006-07-06Wataru IkedaOptical disc, reproducing device, program, reproducing method, recording method
US20070267138A1 (en)*2003-03-282007-11-22White George EMethods for Fabricating Three-Dimensional All Organic Interconnect Structures
US20080028199A1 (en)*2003-04-172008-01-31International Business Machines CorporationMethod for scheduling launch a computer system based upon a time of timed power-on partition of logical partitions

Family Cites Families (167)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US4118789A (en)*1977-06-061978-10-03Allen-Bradley CompanyProgram protection module for programmable controller
US4278837A (en)*1977-10-311981-07-14Best Robert MCrypto microprocessor for executing enciphered programs
US4405829A (en)*1977-12-141983-09-20Massachusetts Institute Of TechnologyCryptographic communications system and method
US4306289A (en)*1980-02-041981-12-15Western Electric Company, Inc.Digital computer having code conversion apparatus for an encrypted program
US4433207A (en)*1981-09-101984-02-21Best Robert MCryptographic decoder for computer programs
US4593353A (en)*1981-10-261986-06-03Telecommunications Associates, Inc.Software protection method and apparatus
US4577289A (en)*1983-12-301986-03-18International Business Machines CorporationHardware key-on-disk system for copy-protecting magnetic storage media
US4688169A (en)*1985-05-301987-08-18Joshi Bhagirath SComputer software security system
US4864494A (en)*1986-03-211989-09-05Computerized Data Ssytems For Mfg., Inc.Software usage authorization system with key for decrypting/re-encrypting/re-transmitting moving target security codes from protected software
US5014234A (en)*1986-08-251991-05-07Ncr CorporationSystem with software usage timer and counter for allowing limited use but preventing continued unauthorized use of protected software
US5021997A (en)*1986-09-291991-06-04At&T Bell LaboratoriesTest automation system
US4977594A (en)*1986-10-141990-12-11Electronic Publishing Resources, Inc.Database usage metering and protection system and method
US5050213A (en)1986-10-141991-09-17Electronic Publishing Resources, Inc.Database usage metering and protection system and method
US4827508A (en)*1986-10-141989-05-02Personal Library Software, Inc.Database usage metering and protection system and method
US5155680A (en)*1986-10-241992-10-13Signal Security TechnologiesBilling system for computing software
GB8704920D0 (en)*1987-03-031987-04-08Hewlett Packard CoSecure messaging system
US5038320A (en)*1987-03-131991-08-06International Business Machines Corp.Computer system with automatic initialization of pluggable option cards
US4999806A (en)*1987-09-041991-03-12Fred ChernowSoftware distribution system
US5140634A (en)*1987-09-071992-08-18U.S Philips CorporationMethod and apparatus for authenticating accreditations and for authenticating and signing messages
US4864616A (en)*1987-10-151989-09-05Micronyx, Inc.Cryptographic labeling of electronically stored data
US4916637A (en)*1987-11-181990-04-10International Business Machines CorporationCustomized instruction generator
US5113518A (en)*1988-06-031992-05-12Durst Jr Robert TMethod and system for preventing unauthorized use of software
US4969189A (en)*1988-06-251990-11-06Nippon Telegraph & Telephone CorporationAuthentication system and apparatus therefor
US5155847A (en)*1988-08-031992-10-13Minicom Data CorporationMethod and apparatus for updating software at remote locations
US5023907A (en)*1988-09-301991-06-11Apollo Computer, Inc.Network license server
DE3906349A1 (en)*1989-03-011990-09-13Hartmut Hennige METHOD AND DEVICE FOR SIMPLIFYING THE USE OF A VARIETY OF CREDIT CARDS AND THE LIKE
US5155837A (en)*1989-03-021992-10-13Bell Communications Research, Inc.Methods and apparatus for software retrofitting
US5191611A (en)*1989-04-031993-03-02Lang Gerald SMethod and apparatus for protecting material on storage media and for transferring material on storage media to various recipients
US5199066A (en)*1989-04-181993-03-30Special Effects Software, Inc.Method and apparatus for protecting software
JPH02293930A (en)*1989-05-081990-12-05Victor Co Of Japan LtdPreventing system for stealing of recording contents of recording medium
US5166886A (en)*1989-07-311992-11-24Molnar Charles ESystem to demonstrate and sell computer programs
US5081675A (en)*1989-11-131992-01-14Kitti KittirutsunetornSystem for protection of software in memory against unauthorized use
US5033084A (en)*1990-04-021991-07-16Data I/O CorporationMethod and apparatus for protection of software in an electronic system
US5027396A (en)*1990-05-071991-06-25Xerox CorporationExecution protection for floppy disks
EP0463251A1 (en)1990-06-281992-01-02International Business Machines CorporationSoftware installation
JPH0792744B2 (en)*1990-08-201995-10-09インターナショナル・ビジネス・マシーンズ・コーポレイション A method of installing multi-level application software on a data processing device.
JPH0799497B2 (en)*1990-12-141995-10-25インターナショナル・ビジネス・マシーンズ・コーポレイション Device and method for controlling the use of software
FR2673476B1 (en)1991-01-181996-04-12Gemplus Card Int SECURE METHOD FOR LOADING MULTIPLE APPLICATIONS INTO A MICROPROCESSOR MEMORY CARD.
US5182770A (en)*1991-04-191993-01-26Geza MedveczkySystem and apparatus for protecting computer software
EP0538464B1 (en)*1991-05-081998-12-30Digital Equipment CorporationLicense management system
US5351297A (en)*1991-06-281994-09-27Matsushita Electric Industrial Co., Ltd.Method of privacy communication using elliptic curves
US5940504A (en)1991-07-011999-08-17Infologic Software, Inc.Licensing management system and method in which datagrams including an address of a licensee and indicative of use of a licensed product are sent from the licensee's site
DE9109977U1 (en)*1991-08-121992-12-24Intelligent Solution Services Gmbh, 8051 Marzling Memory card with copy protection device
US5414850A (en)1991-08-231995-05-09Stac Electronics, Inc.System for transparently compressing data files in a computer system
US5222133A (en)1991-10-171993-06-22Wayne W. ChouMethod of protecting computer software from unauthorized execution using multiple keys
WO1993011480A1 (en)*1991-11-271993-06-10Intergraph CorporationSystem and method for network license administration
US5524072A (en)1991-12-041996-06-04Enco-Tone Ltd.Methods and apparatus for data encryption and transmission
US5220606A (en)1992-02-101993-06-15Harold GreenbergCryptographic system and method
JP3073590B2 (en)1992-03-162000-08-07富士通株式会社 Electronic data protection system, licensor's device and user's device
JPH05281906A (en)*1992-04-021993-10-29Fujitsu Ltd Encryption key sharing method
US5528490A (en)1992-04-101996-06-18Charles E. Hill & Associates, Inc.Electronic catalog system and method
US5313521A (en)*1992-04-151994-05-17Fujitsu LimitedKey distribution protocol for file transfer in the local area network
JP2659896B2 (en)1992-04-291997-09-30インターナショナル・ビジネス・マシーンズ・コーポレイション Structured document copy management method and structured document copy management device
US5222683A (en)*1992-05-151993-06-29Blackshire Glen MWire dispensing apparatus
US5359659A (en)*1992-06-191994-10-25Doren RosenthalMethod for securing software against corruption by computer viruses
US5367683A (en)*1992-06-261994-11-22Digital Equipment CorporationSmart recompilation of performing matchup/difference after code generation
US5410703A (en)*1992-07-011995-04-25Telefonaktiebolaget L M EricssonSystem for changing software during computer operation
US5361359A (en)*1992-08-311994-11-01Trusted Information Systems, Inc.System and method for controlling the use of a computer
NZ255971A (en)1992-09-211997-05-26Uniloc Singapore Private LtdSoftware registration and licensing system uses matching of licensee indentification codes
US5327563A (en)*1992-11-131994-07-05Hewlett-PackardMethod for locking software files to a specific storage device
US5341429A (en)*1992-12-041994-08-23Testdrive CorporationTransformation of ephemeral material
US5509070A (en)*1992-12-151996-04-16Softlock Services Inc.Method for encouraging purchase of executable and non-executable software
ES2130194T3 (en)*1993-01-181999-07-01Siemens Ag CONTROL SYSTEM IN REAL TIME.
US5351293A (en)*1993-02-011994-09-27Wave Systems Corp.System method and apparatus for authenticating an encrypted signal
US5483658A (en)*1993-02-261996-01-09Grube; Gary W.Detection of unauthorized use of software applications in processing devices
US5379343A (en)*1993-02-261995-01-03Motorola, Inc.Detection of unauthorized use of software applications in communication units
US5585585A (en)*1993-05-211996-12-17Coda Music Technology, Inc.Automated accompaniment apparatus and method
US5337357A (en)*1993-06-171994-08-09Software Security, Inc.Method of software distribution protection
US5497423A (en)*1993-06-181996-03-05Matsushita Electric Industrial Co., Ltd.Method of implementing elliptic curve cryptosystems in digital signatures or verification and privacy communication
DE69403806T2 (en)*1993-09-131998-01-22Taligent Inc MULTIMEDIA DATA CONTROL SYSTEM
US5544246A (en)1993-09-171996-08-06At&T Corp.Smartcard adapted for a plurality of service providers and for remote installation of same
US5625690A (en)*1993-11-151997-04-29Lucent Technologies Inc.Software pay per use system
US5421009A (en)*1993-12-221995-05-30Hewlett-Packard CompanyMethod of remotely installing software directly from a central computer
US5473687A (en)1993-12-291995-12-05Infosafe Systems, Inc.Method for retrieving secure information from a database
US5509074A (en)1994-01-271996-04-16At&T Corp.Method of protecting electronically published materials using cryptographic protocols
US5553143A (en)*1994-02-041996-09-03Novell, Inc.Method and apparatus for electronic licensing
US5835911A (en)*1994-02-081998-11-10Fujitsu LimitedSoftware distribution and maintenance system and method
US5845090A (en)*1994-02-141998-12-01Platinium Technology, Inc.System for software distribution in a digital computer network
JPH07230380A (en)*1994-02-151995-08-29Internatl Business Mach Corp <Ibm>Method and system for controlling utilization of application program
US5394469A (en)1994-02-181995-02-28Infosafe Systems, Inc.Method and apparatus for retrieving secure information from mass storage media
US5812980A (en)1994-02-221998-09-22Sega Enterprises, Ltd.Program operating apparatus
JPH07244781A (en)*1994-03-071995-09-19C S K Sogo Kenkyusho:Kk Software rental method and device and distribution medium
US5757907A (en)*1994-04-251998-05-26International Business Machines CorporationMethod and apparatus for enabling trial period use of software products: method and apparatus for generating a machine-dependent identification
CA2143874C (en)*1994-04-252000-06-20Thomas Edward CooperMethod and apparatus for enabling trial period use of software products: method and apparatus for utilizing a decryption stub
US5557675A (en)1994-05-101996-09-17Schupak; DonaldComputer controlled audio-visual system
US5473692A (en)1994-09-071995-12-05Intel CorporationRoving software license for a hardware agent
US5511123A (en)1994-08-041996-04-23Northern Telecom LimitedSymmetric cryptographic system for data encryption
US5557346A (en)1994-08-111996-09-17Trusted Information Systems, Inc.System and method for key escrow encryption
US5570291A (en)*1994-08-241996-10-29Wallace Computer Services, Inc.Custom product estimating and order processing system
US5615061A (en)*1994-09-291997-03-25Singh; Jitendra K.Method of preventng software piracy by uniquely identifying the specific magnetic storage device the software is stored on
US5579479A (en)*1994-10-031996-11-26Plum Hall Inc.Computer software licensing authentication method and apparatus
US5654746A (en)1994-12-011997-08-05Scientific-Atlanta, Inc.Secure authorization and control method and apparatus for a game delivery service
DE9420092U1 (en)*1994-12-151995-02-02MARX Datentechnik GmbH, 85104 Pförring Software protection module
US5625692A (en)1995-01-231997-04-29International Business Machines CorporationMethod and system for a public key cryptosystem having proactive, robust, and recoverable distributed threshold secret sharing
US5943422A (en)1996-08-121999-08-24Intertrust Technologies Corp.Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels
US5892900A (en)1996-08-301999-04-06Intertrust Technologies Corp.Systems and methods for secure transaction management and electronic rights protection
US5835735A (en)*1995-03-031998-11-10Eastman Kodak CompanyMethod for negotiating software compatibility
US5826245A (en)1995-03-201998-10-20Sandberg-Diment; ErikProviding verification information for a transaction
JPH08329011A (en)1995-06-021996-12-13Mitsubishi Corp Data copyright management system
US5903647A (en)*1995-06-071999-05-11Digital River, Inc.Self-launching encrypted digital information distribution system
AU6269796A (en)*1995-06-071996-12-30Digital River, Inc.Try-before-you-buy software distribution and marketing syste m
US5887060A (en)*1995-06-071999-03-23Digital River, Inc.Central database system for automatic software program sales
US5883954A (en)1995-06-071999-03-16Digital River, Inc.Self-launching encrypted try before you buy software distribution system
US5615264A (en)1995-06-081997-03-25Wave Systems Corp.Encrypted data package record for use in remote transaction metered data system
US5592549A (en)1995-06-151997-01-07Infosafe Systems, Inc.Method and apparatus for retrieving selected information from a secure information source
US5671412A (en)*1995-07-281997-09-23Globetrotter Software, IncorporatedLicense management system for software applications
US5721781A (en)1995-09-131998-02-24Microsoft CorporationAuthentication system and method for smart card transactions
US5758068A (en)*1995-09-191998-05-26International Business Machines CorporationMethod and apparatus for software license management
US5638445A (en)1995-09-191997-06-10Microsoft CorporationBlind encryption
US5708709A (en)*1995-12-081998-01-13Sun Microsystems, Inc.System and method for managing try-and-buy usage of application programs
US5812662A (en)1995-12-181998-09-22United Microelectronics CorporationMethod and apparatus to protect computer software
KR100286008B1 (en)*1995-12-302001-04-16윤종용 Software program automatic update method
JP2000503154A (en)1996-01-112000-03-14エムアールジェイ インコーポレイテッド System for controlling access and distribution of digital ownership
US5790664A (en)*1996-02-261998-08-04Network Engineering Software, Inc.Automated system for management of licensed software
US5905860A (en)*1996-03-151999-05-18Novell, Inc.Fault tolerant electronic licensing system
US5794230A (en)*1996-03-151998-08-11Microsoft CorporationMethod and system for creating and searching directories on a server
US5809145A (en)1996-06-281998-09-15Paradata Systems Inc.System for distributing digital information
US7010697B2 (en)1996-06-282006-03-07Protexis, Inc.System for dynamically encrypting information for secure internet commerce and providing embedded fulfillment software
US5894516A (en)*1996-07-101999-04-13Ncr CorporationBroadcast software distribution
US6012144A (en)1996-10-082000-01-04Pickett; Thomas E.Transaction security method and apparatus
US5892904A (en)*1996-12-061999-04-06Microsoft CorporationCode certification for network transmission
JP3172475B2 (en)1996-12-262001-06-04日本アイ・ビー・エム株式会社 Data hiding method and data extraction method using statistical test
EP0855638A1 (en)1997-01-241998-07-29Deutsche Thomson-Brandt GmbhMethod and apparatus for encrypting and for decrypting data arranged in a data sector
US5796952A (en)*1997-03-211998-08-18Dot Com Development, Inc.Method and apparatus for tracking client interaction with a network resource and creating client profiles and resource database
US5930828A (en)1997-03-261999-07-27Executive Software InternationalReal-time apparatus and method for minimizing disk fragmentation in a computer system
EP0970411B1 (en)1997-03-272002-05-15BRITISH TELECOMMUNICATIONS public limited companyCopy protection of data
US6041411A (en)*1997-03-282000-03-21Wyatt; Stuart AlanMethod for defining and verifying user access rights to a computer information
US6006190A (en)*1997-04-281999-12-21Tartaroukos LlcComputer implemented method and a computer system for enforcing software licenses
EP0916134A1 (en)1997-05-301999-05-19C-DillaMethod for copy protecting a record carrier, copy protected record carrier and means for detecting access control information
US6067416A (en)*1997-06-032000-05-23Fraser; Robert E.Method for dynamically wrapping files for downloading
US6236727B1 (en)*1997-06-242001-05-22International Business Machines CorporationApparatus, method and computer program product for protecting copyright data within a computer system
JP4336397B2 (en)*1998-03-252009-09-30キヤノン株式会社 Image processing apparatus and method, and storage medium
US6226747B1 (en)*1998-04-102001-05-01Microsoft CorporationMethod for preventing software piracy during installation from a read only storage medium
US6243468B1 (en)*1998-04-292001-06-05Microsoft CorporationSoftware anti-piracy system that adapts to hardware upgrades
US6957341B2 (en)1998-05-142005-10-18Purdue Research FoundationMethod and system for secure computational outsourcing and disguise
US6243692B1 (en)*1998-05-222001-06-05Preview SoftwareSecure electronic software packaging using setup-external unlocking module
US6223288B1 (en)1998-05-222001-04-24Protexis Inc.System for persistently encrypting critical software file to prevent installation of software program on unauthorized computers
US6266754B1 (en)1998-05-292001-07-24Texas Instruments IncorporatedSecure computing device including operating system stored in non-relocatable page of memory
US6611812B2 (en)1998-08-132003-08-26International Business Machines CorporationSecure electronic content distribution on CDS and DVDs
US6226618B1 (en)*1998-08-132001-05-01International Business Machines CorporationElectronic content delivery system
US7457415B2 (en)1998-08-202008-11-25Akikaze Technologies, LlcSecure information distribution system utilizing information segment scrambling
JP2000090645A (en)1998-09-082000-03-31Sony CorpFile management device and method and supply medium
SG77270A1 (en)1998-10-162000-12-19Matsushita Electric Industrial Co LtdDigital content protection system
US6308326B1 (en)*1999-01-082001-10-23Apple Computer, Inc.Run-time modules for dynamically adjusting computer operation
JP3534646B2 (en)1999-04-212004-06-07株式会社ソニー・コンピュータエンタテインメント Disk-shaped recording medium, apparatus and method for reproducing this medium
GB2353676A (en)1999-08-172001-02-28Hewlett Packard CoRobust encryption and decryption of packetised data transferred across communications networks
US7757097B2 (en)1999-09-032010-07-13Purdue Research FoundationMethod and system for tamperproofing software
JP3534027B2 (en)1999-12-012004-06-07日本電気株式会社 Content providing apparatus and machine-readable recording medium recording program
US6973578B1 (en)2000-05-312005-12-06Networks Associates Technology, Inc.System, method and computer program product for process-based selection of virus detection actions
US6931540B1 (en)2000-05-312005-08-16Networks Associates Technology, Inc.System, method and computer program product for selecting virus detection actions based on a process by which files are being accessed
AU2001259033A1 (en)2000-06-302002-01-14Verification Technologies, Inc.Copy-protected optical media and method of manufacture thereof
US20020001690A1 (en)2000-06-302002-01-03Selinfreund Richard H.Copy-protected optical disc and method of manufacture thereof
US20050050343A1 (en)2000-06-302005-03-03Selinfreund Richard H.Storage media access control method and system
US20050063256A1 (en)2000-06-302005-03-24Selinfreund Richard H.Data storage in optical discs
US7486790B1 (en)2000-06-302009-02-03Verification Technologies, Inc.Method and apparatus for controlling access to storage media
US6638593B2 (en)2000-06-302003-10-28Verification Technologies, Inc.Copy-protected optical media and method of manufacture thereof
US6954861B2 (en)2000-07-142005-10-11America Online, Inc.Identifying unauthorized communication systems based on their memory contents
US7660415B2 (en)2000-08-032010-02-09Selinfreund Richard HMethod and apparatus for controlling access to storage media
US6981279B1 (en)2000-08-172005-12-27International Business Machines CorporationMethod and apparatus for replicating and analyzing worm programs
US7237123B2 (en)2000-09-222007-06-26Ecd Systems, Inc.Systems and methods for preventing unauthorized use of digital content
EP1352307A2 (en)*2000-09-222003-10-15EDC Systems, Inc.Systems and methods for preventing unauthorized use of digital content
US7124114B1 (en)2000-11-092006-10-17Macrovision CorporationMethod and apparatus for determining digital A/V content distribution terms based on detected piracy levels
AU2002221006B2 (en)2000-11-272007-10-18Rovi Europe LimitedA copy protected DVD disc and method for producing and validating same
IL142487A0 (en)2001-04-052003-09-17Hexalock LtdMethod and system for protecting data
AU2002305490B2 (en)*2001-05-092008-11-06Sca Ipla Holdings, Inc.Systems and methods for the prevention of unauthorized use and manipulation of digital content
AU2003210870B2 (en)2002-02-072008-05-22Verification Technologies, Inc.Method and system for optical disc copy-protection
US20050084645A1 (en)2002-02-072005-04-21Selinfreund Richard H.Method and system for optical disc copy-protection

Patent Citations (49)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5982891A (en)*1995-02-131999-11-09Intertrust Technologies Corp.Systems and methods for secure transaction management and electronic rights protection
US6185683B1 (en)*1995-02-132001-02-06Intertrust Technologies Corp.Trusted and secure techniques, systems and methods for item delivery and execution
US6006328A (en)*1995-07-141999-12-21Christopher N. DrakeComputer software authentication, protection, and security system
US5978482A (en)*1995-08-211999-11-02International Business Machines CorporationMethod and system for protection of digital information
US6038316A (en)*1995-08-212000-03-14International Business Machines CorporationMethod and system for protection of digital information
US6151618A (en)*1995-12-042000-11-21Microsoft CorporationSafe general purpose virtual machine computing system
US6351813B1 (en)*1996-02-092002-02-26Digital Privacy, Inc.Access control/crypto system
US5754647A (en)*1996-03-271998-05-19United Microelectronics CorporationSoftware protection apparatus and the method of protection utilizing read-write memory means having inconsistent input and output data
US5991876A (en)*1996-04-011999-11-23Copyright Clearance Center, Inc.Electronic rights management and authorization system
US6178509B1 (en)*1996-06-132001-01-23Intel CorporationTamper resistant methods and apparatus
US6157721A (en)*1996-08-122000-12-05Intertrust Technologies Corp.Systems and methods using cryptography to protect secure computing environments
US6052780A (en)*1996-09-122000-04-18Open Security Solutions, LlcComputer system and process for accessing an encrypted and self-decrypting digital information product while restricting access to decrypted digital information
US6185686B1 (en)*1996-09-122001-02-06Open Security Solutions, LlcComputer system and process for accessing an encrypted and self-decrypting digital information product while restricting access to decrypted digital information
US6006332A (en)*1996-10-211999-12-21Case Western Reserve UniversityRights management system for digital media
US6009274A (en)*1996-12-131999-12-283Com CorporationMethod and apparatus for automatically updating software components on end systems over a network
US6073124A (en)*1997-01-292000-06-06Shopnow.Com Inc.Method and system for securely incorporating electronic information into an online purchasing application
US5953502A (en)*1997-02-131999-09-14Helbig, Sr.; Walter AMethod and apparatus for enhancing computer system security
US6138119A (en)*1997-02-252000-10-24Intertrust Technologies Corp.Techniques for defining, using and manipulating rights management data structures
US6192475B1 (en)*1997-03-312001-02-20David R. WallaceSystem and method for cloaking software
US6272636B1 (en)*1997-04-112001-08-07Preview Systems, IncDigital product execution control and security
US6188995B1 (en)*1997-07-282001-02-13Apple Computer, Inc.Method and apparatus for enforcing software licenses
US6233567B1 (en)*1997-08-292001-05-15Intel CorporationMethod and apparatus for software licensing electronically distributed programs
US6112181A (en)*1997-11-062000-08-29Intertrust Technologies CorporationSystems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information
US6334189B1 (en)*1997-12-052001-12-25Jamama, LlcUse of pseudocode to protect software from unauthorized use
US5991399A (en)*1997-12-181999-11-23Intel CorporationMethod for securely distributing a conditional use private key to a trusted entity on a remote system
US6148402A (en)*1998-04-012000-11-14Hewlett-Packard CompanyApparatus and method for remotely executing commands using distributed computing environment remote procedure calls
US6009401A (en)*1998-04-061999-12-28Preview Systems, Inc.Relicensing of electronically purchased software
US6295613B1 (en)*1998-04-282001-09-25International Business Machines CorporationDebug watch mechanism and method for debugging a computer program
US20010044782A1 (en)*1998-04-292001-11-22Microsoft CorporationHardware ID to prevent software piracy
US6164841A (en)*1998-05-042000-12-26Hewlett-Packard CompanyMethod, apparatus, and product for dynamic software code translation system
US6408391B1 (en)*1998-05-062002-06-18Prc Inc.Dynamic system defense for information warfare
US20020002468A1 (en)*1998-08-132002-01-03International Business Machines CorporationMethod and system for securing local database file of local content stored on end-user system
US6330670B1 (en)*1998-10-262001-12-11Microsoft CorporationDigital rights management operating system
US6327652B1 (en)*1998-10-262001-12-04Microsoft CorporationLoading and identifying a digital rights management operating system
US6343280B2 (en)*1998-12-152002-01-29Jonathan ClarkDistributed execution software license server
US6460023B1 (en)*1999-06-162002-10-01Pulse Entertainment, Inc.Software authorization system and method
US6289455B1 (en)*1999-09-022001-09-11Crypotography Research, Inc.Method and apparatus for preventing piracy of digital content
US20010034846A1 (en)*2000-02-282001-10-25Peter BeeryDigital data and software security protection
US20010037450A1 (en)*2000-03-022001-11-01Metlitski Evgueny A.System and method for process protection
US20010037456A1 (en)*2000-03-102001-11-01Levy Kenneth L.Method and apparatus to protect media existing in an insecure format
US20010041989A1 (en)*2000-05-102001-11-15Vilcauskas Andrew J.System for detecting and preventing distribution of intellectual property protected media
US20020016918A1 (en)*2000-05-122002-02-07David TuckerInformation security method and system
US20020010863A1 (en)*2000-06-082002-01-24Stefan MankeforsMethod for protecting software
US20020035688A1 (en)*2000-09-012002-03-21Ken KutaragiMethod and system for monitoring utilizing condition of contents, computer program and recording medium
US20030204702A1 (en)*2002-04-302003-10-30Adc Dsl Systems, Inc.Flexible memory architecture for an embedded processor
US20060146660A1 (en)*2002-10-102006-07-06Wataru IkedaOptical disc, reproducing device, program, reproducing method, recording method
US20070267138A1 (en)*2003-03-282007-11-22White George EMethods for Fabricating Three-Dimensional All Organic Interconnect Structures
US20080028199A1 (en)*2003-04-172008-01-31International Business Machines CorporationMethod for scheduling launch a computer system based upon a time of timed power-on partition of logical partitions
US20050044228A1 (en)*2003-08-212005-02-24International Business Machines CorporationMethods, systems, and media to expand resources available to a logical partition

Cited By (22)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20120096562A1 (en)*2009-02-242012-04-19European Aeronautic Defence And Space Company-Eads FranceMethod for protecting the source code of a computer program
US8533826B2 (en)*2009-02-242013-09-10European Aernautic Defence and Space Company—EADS FranceMethod for protecting the source code of a computer program
CN102460404B (en)*2009-06-012015-09-09起元技术有限责任公司 generate obfuscated data
US20100306854A1 (en)*2009-06-012010-12-02Ab Initio Software LlcGenerating Obfuscated Data
CN102460404A (en)*2009-06-012012-05-16起元技术有限责任公司Generating obfuscated data
WO2010141410A1 (en)*2009-06-012010-12-09Ab Initio Technology LlcGenerating obfuscated data
US10102398B2 (en)2009-06-012018-10-16Ab Initio Technology LlcGenerating obfuscated data
US20100318481A1 (en)*2009-06-102010-12-16Ab Initio Technology LlcGenerating Test Data
US9411712B2 (en)2009-06-102016-08-09Ab Initio Technology LlcGenerating test data
WO2011061734A1 (en)*2009-11-182011-05-26Safend Ltd.System and method for selective protection of information elements
US8700896B1 (en)*2010-08-252014-04-15Symantec CorporationTechniques for automatic management of file system encryption drivers
US8812844B2 (en)2011-06-202014-08-19Liaison Technologies, Inc.Luhn validation and data security across multiple active domains
US8806204B2 (en)2011-06-202014-08-12Liaison Technologies, Inc.Systems and methods for maintaining data security across multiple active domains
US20170206156A1 (en)*2013-09-062017-07-20Microsoft Technology Licensing, LlcVerification that particular information is transferred by an application
US10437715B2 (en)*2013-09-062019-10-08Microsoft Technology Licensing, LlcVerification that particular information is transferred by an application
US10185641B2 (en)2013-12-182019-01-22Ab Initio Technology LlcData generation
US10437701B2 (en)2013-12-182019-10-08Ab Initio Technology LlcData generation
US11741196B2 (en)2018-11-152023-08-29The Research Foundation For The State University Of New YorkDetecting and preventing exploits of software vulnerability using instruction tags
US12061677B2 (en)2018-11-152024-08-13The Research Foundation For The State University Of New YorkSecure processor for detecting and preventing exploits of software vulnerability
US11954010B2 (en)*2020-01-072024-04-09Supercell OyMethod for blocking external debugger application from analysing code of software program
US20230041678A1 (en)*2021-08-032023-02-09Dell Products, L.P.Intelligent orchestration of digital watermarking using a platform framework
US12079314B2 (en)*2021-08-032024-09-03Dell Products, L.P.Intelligent orchestration of digital watermarking using a platform framework

Also Published As

Publication numberPublication date
US8261359B2 (en)2012-09-04
US20100306552A1 (en)2010-12-02
US20020144153A1 (en)2002-10-03
US7237123B2 (en)2007-06-26

Similar Documents

PublicationPublication DateTitle
US8261359B2 (en)Systems and methods for preventing unauthorized use of digital content
US8015608B2 (en)Systems and methods for preventing unauthorized use of digital content
US8117667B2 (en)Systems and methods for the prevention of unauthorized use and manipulation of digital content
AU2001292910A1 (en)Systems and methods for preventing unauthorized use of digital content
Salamat et al.Orchestra: intrusion detection using parallel execution and monitoring of program variants in user-space
Naumovich et al.Preventing piracy, reverse engineering, and tampering
JP5689472B2 (en) System and method for protecting Java bytecode from static and dynamic attacks within a malicious execution environment
AU2002305490A1 (en)Systems and methods for the prevention of unauthorized use and manipulation of digital content
WO2007066333A1 (en)A practical platform for high risk applications
Sze et al.A portable user-level approach for system-wide integrity protection
AU2002219852B2 (en)Systems and methods for preventing unauthorized use of digital content
AU2002219852A1 (en)Systems and methods for preventing unauthorized use of digital content
EP1637959A2 (en)Systems and methods for preventing unauthorized use of digital content
AU2010202883B2 (en)Systems and Methods for Preventing Unauthorized Use of Digital Content
AU2008200472A1 (en)Systems and methods for preventing unauthorized use of digital content related applications
Pizzolotto et al.Mitigating Debugger-based Attacks to Java Applications with Self-debugging
SaffafMalware Analysis
MuellerHacking Soft Tokens
FlemingData Tethers: Preventing Information Leakage by Enforcing Environmental Data Access Policies
ΛεονάρδοςAdvanced persistent threats (format string, structured exception handler & race condition vulnerabilities)

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:ECD SYSTEMS, INC., MASSACHUSETTS

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:LEVINE, RICHARD B.;LEE, ANDREW R.;HOWARD, DANIEL G.;AND OTHERS;REEL/FRAME:021992/0675

Effective date:20020130

ASAssignment

Owner name:SCA IPLA HOLDINGS INC., NEW YORK

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:ECD SYSTEMS INC. (F.K.A. ECD SYSTEMS.COM, INC.);REEL/FRAME:023668/0925

Effective date:20091217

Owner name:SCA IPLA HOLDINGS INC.,NEW YORK

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:ECD SYSTEMS INC. (F.K.A. ECD SYSTEMS.COM, INC.);REEL/FRAME:023668/0925

Effective date:20091217

STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION


[8]ページ先頭

©2009-2025 Movatter.jp