Systems and methods for preventing unauthorized use of digital content
First Claim
1. A method for preventing unauthorized use of digital content data comprising:
- subdividing the digital content data into data segments;
modifying the data segments with second data to generate modified data; and
storing the modified data at predetermined memory locations.
2 Assignments
0 Petitions
Accused Products
Abstract
Theft, distribution, and piracy of digital content (software, video, audio, e-books, any content of any kind that is digitally stored and distributed) is generally accomplished by copying it, if possible, or, if it is protected from being copied in any fashion, such piracy is based upon a number of reverse engineering techniques. Aside from the straightforward copying of unprotected content, all of these other methods require first an understanding of the protective mechanism(s) guarding the content, and finally an unauthorized modification of that protection in order to disable or subvert it. Methods which prevent a skilled individual from using reverse engineering tools and techniques to attain that level of understanding and/or prevent anyone from performing such modifications can offer significant advantages to content creators who wish to protect their products.
-
Citations
160 Claims
-
1. A method for preventing unauthorized use of digital content data comprising:
-
subdividing the digital content data into data segments;
modifying the data segments with second data to generate modified data; and
storing the modified data at predetermined memory locations. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 27, 28, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 57, 58, 59, 60, 61, 62, 63)
-
-
26. The method of claim I wherein modifying the data segments with second data comprises tokenizing the data segments with token data.
-
29. A method for preventing unauthorized use of digital content data in a system having memory locations comprising:
-
subdividing the digital content data into data segments;
modifying the data segments with second data to generate modified data;
scanning the system to determine available memory locations;
selecting target memory locations within the available memory locations at which to store the modified data; and
storing the modified data at the target memory locations.
-
-
56. A method for preventing unauthorized use of digital content data hosted on a system comprising:
-
modifying the digital content data with saturation data to generate modified data; and
storing the modified data at predetermined memory locations on the system to deter unauthorized access of the digital content data.
-
-
64. A method for preventing unauthorized use of digital content data hosted on a system wherein a table of contents identifies files stored at memory locations of the system comprising:
-
identifying at the table of contents a first memory location referring to a location at which at which first data file is stored;
modifying the first memory location in the table of contents to refer to a second data file at a second location; and
upon an attempt at access by the system of the first data file, accessing the second data file if the attempt is unauthorized. - View Dependent Claims (65)
-
-
66. A method for preventing unauthorized use of digital content data hosted on a system wherein a table of contents identifies files stored at memory locations of the system comprising:
-
identifying at the table of contents a first memory location referring to a location at which at which first data file is stored;
copying the contents of the first data file to a second memory location; and
replacing the first data file with a second data file;
upon an attempt at access by the system of the first data file, accessing the second data file if the attempt is unauthorized. - View Dependent Claims (67, 69, 70, 71, 72)
-
-
68. A method for preventing unauthorized use of digital content data hosted on a system comprising:
-
monitoring an operating system interface of the system to determine access of operating system resources; and
repeatedly generating a shim on the operating system interface to deter unauthorized access of the digital content data.
-
-
73. A method for preventing unauthorized use of digital content data hosted on a system comprising:
-
substituting a portion of the digital content data with token data to generate tokenized data; and
storing the tokenized data at predetermined memory locations on the system to deter unauthorized access of the digital content data. - View Dependent Claims (74, 75, 76, 77, 78, 79)
-
-
80. A method for preventing unauthorized use of digital content data hosted on a system comprising:
-
monitoring an operating system interface operating on the system and the digital content data at an assassin process to determine whether an unauthorized attempt at accessing the digital content data occurs; and
in the event of unauthorized access, deterring the unauthorized access and communicating the unauthorized access to the operating system interface. - View Dependent Claims (81, 82, 83, 84)
-
-
85. A method for preventing unauthorized use of digital content data in a system having memory locations comprising:
-
scanning the system to determine available memory locations based on a file system identifying locations of files on the system;
selecting target memory locations within the available memory locations at which to store the digital content data; and
storing the digital content data at the target memory locations. - View Dependent Claims (86, 87, 88, 90, 91, 92, 93, 94, 95, 96, 97, 98, 99, 100, 101, 102, 103, 104, 105, 106, 107, 108, 109, 110, 111, 112, 113, 114, 116, 117, 118, 119, 120, 121, 122, 123, 124, 125, 127, 128, 129, 130, 131, 132, 133, 135, 137, 139, 140, 141, 142, 144, 145, 146, 147, 148, 149, 151, 152, 153, 154, 156, 157, 158, 160)
-
-
89. A system for preventing unauthorized use of digital content data comprising:
-
a subdividing unit for subdividing the digital content data into data segments;
a modification unit for modifying the data segments with second data to generate modified data; and
a storage unit for storing the modified data at predetermined memory locations.
-
-
115. A system for preventing unauthorized use of digital content data in a system having memory locations comprising:
-
means for subdividing the digital content data into data segments;
means for modifying the data segments with second data to generate modified data;
means for scanning the system to determine available memory locations;
a selector for selecting target memory locations within the available memory locations at which to store the modified data; and
a storage unit for storing the modified data at the target memory locations.
-
-
126. A system for preventing unauthorized use of digital content data hosted on a system comprising:
-
a modification unit for modifying the digital content data with saturation data to generate modified data; and
a storage unit for storing the modified data at predetermined memory locations on the system to deter unauthorized access of the digital content data.
-
-
134. A system for preventing unauthorized use of digital content data hosted on a system wherein a table of contents identifies files stored at memory locations of the system comprising:
-
a table of contents for identifying a first memory location referring to a location at which at which first data file is stored;
a modification unit for modifying the first memory location in the table of contents to refer to a second data file at a second location; and
access means for, upon an attempt at access by the system of the first data file, accessing the second data file if the attempt is unauthorized.
-
-
136. A system for preventing unauthorized use of digital content data hosted on a system wherein a table of contents identifies files stored at memory locations of the system comprising:
-
a table of contents for identifying a first memory location referring to a location at which at which first data file is stored;
means for copying the contents of the first data file to a second memory location; and
means for replacing the first data file with a second data file;
access means for, upon an attempt at access by the system of the first data file, accessing the second data file if the attempt is unauthorized.
-
-
138. A system for preventing unauthorized use of digital content data hosted on a system comprising:
-
means for monitoring an operating system interface of the system to determine access of operating system resources; and
means for repeatedly generating a shim on the operating system interface to deter unauthorized access of the digital content data.
-
-
143. A system for preventing unauthorized use of digital content data hosted on a system comprising:
-
means for substituting a portion of the digital content data with token data to generate tokenized data; and
means for storing the tokenized data at predetermined memory locations on the system to deter unauthorized access of the digital content data.
-
-
150. A system for preventing unauthorized use of digital content data hosted on a system comprising:
-
an assassin process for monitoring an operating system interface operating on the system and the digital content data to determine whether an unauthorized attempt at accessing the digital content data occurs; and
means for deterring the unauthorized access and communicating the unauthorized access to the operating system interface, in the event of unauthorized access.
-
-
155. A system for preventing unauthorized use of digital content data in a system having memory locations comprising:
-
a scanner for scanning the system to determine available memory locations based on a file system identifying locations of files on the system;
means for selecting target memory locations within the available memory locations at which to store the digital content data; and
a storage unit for storing the digital content data at the target memory locations.
-
-
159. A system for preventing unauthorized use of digital content data in a system having memory locations wherein the system enables a user to select from a plurality of tool modules, each module providing a service for protecting digital content from unauthorized use such that a user can protect digital content.
Specification