Copy protection for secured files
First Claim
Patent Images
1. A method comprising:
- receiving, by a processor, a request to copy a file from a requestor with one or more privileges sufficient to access the file;
determining that the file contains a plurality of hashes and thus is subject to copy protection, wherein determining that the file contains the plurality of hashes comprises;
identifying a plurality of data sets corresponding to the plurality of hashes in the file;
determining a number of bits in each data set of the plurality of data sets;
comparing the number of bits in each data set to each other; and
determining, in response to the number of bits being identical in each data set, that the file contains the plurality of hashes;
transmitting, in response to determining that the file is subject to copy protection, a notification of the copy attempt; and
applying copy protection to the file wherein applying copy protection to the file comprises;
generating a dummy version of each hash by modifying each of the plurality of hashes;
transmitting a file containing the dummy version of each hash to the requestor; and
transmitting, in response to transmitting the file containing the dummy version of each hash to the requestor, a notification to the requestor that the request to copy the file was successfully processed.
2 Assignments
0 Petitions
Accused Products
Abstract
Embodiments of the present disclosure relate to copy protection. A request to copy a file from a requestor with one or more privileges sufficient to access the file may be received. The file may be determined to be subject to copy protection. In response to determining that the file is subject to copy protection, a notification of the copy attempt may be transmitted. Copy protection may then be applied to the file.
16 Citations
19 Claims
-
1. A method comprising:
-
receiving, by a processor, a request to copy a file from a requestor with one or more privileges sufficient to access the file; determining that the file contains a plurality of hashes and thus is subject to copy protection, wherein determining that the file contains the plurality of hashes comprises; identifying a plurality of data sets corresponding to the plurality of hashes in the file; determining a number of bits in each data set of the plurality of data sets; comparing the number of bits in each data set to each other; and determining, in response to the number of bits being identical in each data set, that the file contains the plurality of hashes; transmitting, in response to determining that the file is subject to copy protection, a notification of the copy attempt; and applying copy protection to the file wherein applying copy protection to the file comprises; generating a dummy version of each hash by modifying each of the plurality of hashes; transmitting a file containing the dummy version of each hash to the requestor; and transmitting, in response to transmitting the file containing the dummy version of each hash to the requestor, a notification to the requestor that the request to copy the file was successfully processed. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 18, 19)
-
-
9. A system comprising:
a central processing unit (CPU) configured to perform a method comprising; receiving a request to copy a file from a requestor with one or more privileges sufficient to access the file; determining that the file contains a plurality of hashes and thus is subject to copy protection, wherein determining that the file contains the plurality of hashes comprises; identifying a plurality of data sets corresponding to the plurality of hashes in the file; determining a number of bits in each data set of the plurality of data sets; comparing the number of bits in each data set to each other; and determining, in response to the number of bits being identical in each data set, that the file contains the plurality of hashes; transmitting, in response to determining that the file is subject to copy protection, a notification of the copy attempt; and applying copy protection to the file wherein applying copy protection to the file comprises; generating a dummy version of each hash by modifying each of the plurality of hashes; transmitting a file containing the dummy version of each hash to the requestor; and transmitting, in response to transmitting the file containing the dummy version of each hash to the requestor, a notification to the requestor that the request to copy the file was successfully processed. - View Dependent Claims (10, 11, 12)
-
13. A computer program product comprising a computer readable storage medium having program instructions embodied therewith, the program instructions executable by a processor to cause the processor to perform a method comprising:
-
receiving a request to copy a file from a requestor with one or more privileges sufficient to access the file; determining that the file contains a plurality of hashes and thus is subject to copy protection, wherein determining that the file contains the plurality of hashes comprises; identifying a plurality of data sets corresponding to the plurality of hashes in the file; determining a number of bits in each data set of the plurality of data sets; comparing the number of bits in each data set to each other; and determining, in response to the number of bits being identical in each data set, that the file contains the plurality of hashes; transmitting, in response to determining that the file is subject to copy protection, a notification of the copy attempt; and applying copy protection to the file wherein applying copy protection to the file comprises; generating a dummy version of each hash by modifying each of the plurality of hashes; transmitting a file containing the dummy version of each hash to the requestor; and transmitting, in response to transmitting the file containing the dummy version of each hash to the requestor, a notification to the requestor that the request to copy the file was successfully processed. - View Dependent Claims (14, 15, 16, 17)
-
Specification