Copy protection for secured files
First Claim
Patent Images
1. A method comprising:
- receiving, by a processor, a request to copy a file protected by superuser privileges from a requestor with superuser privileges, wherein superuser privileges include access to adjust kernel options, modify system files, modify run level, and adjust resource usage limits;
determining that the file contains one or more hashes and thus is subject to copy protection;
transmitting, in response to determining that the file is subject to copy protection, a notification of the copy attempt; and
applying copy protection to the file, wherein applying copy protection to the file includes modifying the one or more hashes to generate a dummy version of each of the one or more hashes, generating a dummy version of the file containing the dummy version of each of the one or more hashes, and transmitting the dummy version of the file to the requestor.
2 Assignments
0 Petitions
Accused Products
Abstract
Embodiments of the present disclosure relate to copy protection. A request to copy a file from a requestor with one or more privileges sufficient to access the file may be received. The file may be determined to be subject to copy protection. In response to determining that the file is subject to copy protection, a notification of the copy attempt may be transmitted. Copy protection may then be applied to the file.
26 Citations
4 Claims
-
1. A method comprising:
-
receiving, by a processor, a request to copy a file protected by superuser privileges from a requestor with superuser privileges, wherein superuser privileges include access to adjust kernel options, modify system files, modify run level, and adjust resource usage limits; determining that the file contains one or more hashes and thus is subject to copy protection; transmitting, in response to determining that the file is subject to copy protection, a notification of the copy attempt; and applying copy protection to the file, wherein applying copy protection to the file includes modifying the one or more hashes to generate a dummy version of each of the one or more hashes, generating a dummy version of the file containing the dummy version of each of the one or more hashes, and transmitting the dummy version of the file to the requestor. - View Dependent Claims (2)
-
-
3. A system comprising:
-
a memory storing program instructions; a processor configured to execute the program instructions to perform a method comprising; receiving a request to copy a file protected by superuser privileges from a requestor with superuser privileges, wherein superuser privileges include access to adjust kernel options, modify system files, modify run level, and adjust resource usage limits; determining that the file contains one or more hashes and thus is subject to copy protection; transmitting, in response to determining that the file is subject to copy protection, a notification of the copy attempt; and applying copy protection to the file, wherein applying copy protection to the file includes modifying the one or more hashes to generate a dummy version of each of the one or more hashes, generating a dummy version of the file containing the dummy version of each of the one or more hashes, and transmitting the dummy version of the file to the requestor.
-
-
4. A computer program product comprising a computer readable storage medium having program instructions embodied therewith, the program instructions executable by a processor to cause the processor to perform a method comprising:
-
receiving a request to copy a file protected by superuser privileges from a requestor with superuser privileges, wherein superuser privileges include access to adjust kernel options, modify system files, modify run level, and adjust resource usage limits; determining that the file contains one or more hashes and thus is subject to copy protection; transmitting, in response to determining that the file is subject to copy protection, a notification of the copy attempt; and applying copy protection to the file, wherein applying copy protection to the file includes modifying the one or more hashes to generate a dummy version of each of the one or more hashes, generating a dummy version of the file containing the dummy version of each of the one or more hashes, and transmitting the dummy version of the file to the requestor.
-
Specification