Data protection systems and methods
First Claim
1. A computer-implemented method for protecting electronic content from unauthorized use performed by a computer system comprising a processor and a non-transitory computer-readable storage medium storing executable instructions that cause the computer system to perform the method, the method comprising:
- receiving a request to process electronic content using a software module executing on the computer system, wherein the software module comprises at least one of a video display driver, a sound driver, an SCSI driver, an IDE driver, a network driver, a video capture driver, a floppy disk driver, and a scanner driver;
accessing a control policy associated with the electronic content;
determining that the software module exhibits one or more predefined behaviors specified in the control policy, wherein determining that the software module exhibits the one or more predefined behaviors comprises detecting that the software module exhibits a request response time at least one of greater than a first threshold response time or shorter than a second threshold response time; and
implementing at least one action to protect the electronic content from unauthorized use based on the determination, wherein the at least one action comprises modifying at least a portion of the electronic content before it is processed by the software module.
3 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods are provided for protecting electronic content from the time it is packaged through the time it is experienced by an end user. Protection against content misuse is accomplished using a combination of encryption, watermark screening, detection of invalid content processing software and hardware, and/or detection of invalid content flows. Encryption protects the secrecy of content while it is being transferred or stored. Watermark screening protects against the unauthorized use of content. Watermark screening is provided by invoking a filter module to examine content for the presence of a watermark before the content is delivered to output hardware or software. The filter module is operable to prevent delivery of the content to the output hardware or software if it detects a predefined protection mark. Invalid content processing software is detected by a monitoring mechanism that validates the software involved in processing protected electronic content. Invalid content flows can be detected by scanning the information passed across system interfaces for the attempted transfer of bit patterns that were released from an application and/or a piece of content management software.
65 Citations
12 Claims
-
1. A computer-implemented method for protecting electronic content from unauthorized use performed by a computer system comprising a processor and a non-transitory computer-readable storage medium storing executable instructions that cause the computer system to perform the method, the method comprising:
-
receiving a request to process electronic content using a software module executing on the computer system, wherein the software module comprises at least one of a video display driver, a sound driver, an SCSI driver, an IDE driver, a network driver, a video capture driver, a floppy disk driver, and a scanner driver; accessing a control policy associated with the electronic content; determining that the software module exhibits one or more predefined behaviors specified in the control policy, wherein determining that the software module exhibits the one or more predefined behaviors comprises detecting that the software module exhibits a request response time at least one of greater than a first threshold response time or shorter than a second threshold response time; and implementing at least one action to protect the electronic content from unauthorized use based on the determination, wherein the at least one action comprises modifying at least a portion of the electronic content before it is processed by the software module. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A non-transitory computer-readable storage medium storing instructions that, when executed by a processor of a computer system, cause the computer system to perform a method comprising:
-
receiving a request to process electronic content using a software module executing on the computer system, wherein the software module comprises at least one of a video display driver, a sound driver, an SCSI driver, an IDE driver, a network driver, a video capture driver, a floppy disk driver, and a scanner driver; accessing a control policy associated with the electronic content; determining that the software module exhibits one or more predefined behaviors specified in the control policy, wherein determining that the software module exhibits the one or more predefined behaviors comprises detecting that the software module exhibits a request response time at least one of greater than a first threshold response time or shorter than a second threshold response time; and implementing at least one action to protect the electronic content from unauthorized use based on the determination, wherein the at least one action comprises modifying at least a portion of the electronic content before it is processed by the software module. - View Dependent Claims (8, 9, 10, 11, 12)
-
Specification