Systems and methods for the prevention of unauthorized use and manipulation of digital content
First Claim
1. A method for preventing unauthorized use of digital content data in a computer system comprising:
- examining system devices that are operational in the system to determine features that characterize the system devices;
generating a signature representative of the system based on the features; and
assigning the signature to the digital content data.
3 Assignments
0 Petitions
Accused Products
Abstract
A number of systems and methods, alone, or in combination, achieve various levels of protection against unauthorized modification and distribution of digital content. This encompasses at least unauthorized study, modification, monitoring, reconstruction, and any other means for subversion from the originally intended purpose and license model of the digital content. The invention combines a number of techniques that in whole, or in part, serve to protect such content from unauthorized modification, reconstructive engineering, or monitoring by third parties. This is accomplished by means of methods which protect against subversion by specific tools operating on specific platforms as well as general tools operating on general platforms. Specific time domain attacks are identified, code modification can be identified and reversed, and virtual and emulated systems are identified. In addition, identification of in-circuit emulator tools (both software and hardware), debuggers, and security threats to running programs can be achieved.
143 Citations
14 Claims
-
1. A method for preventing unauthorized use of digital content data in a computer system comprising:
-
examining system devices that are operational in the system to determine features that characterize the system devices; generating a signature representative of the system based on the features; and assigning the signature to the digital content data. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method for preventing unauthorized use of digital content data in a computer system comprising:
-
requesting an installation of the digital content data at a client; transmitting the request for installation to a server; verifying, at the server, whether the requested installation is authorized, if the installation is unauthorized, transmitting an installation denial message to the client, and if the installation is authorized, transmitting an installation authorization message to the client; installing the digital content data at the client if the requested installation is authorized. - View Dependent Claims (8, 9, 10)
-
-
11. A method for preventing unauthorized use of digital content data in a computer system comprising:
-
requesting use of the digital content data at a client; transmitting the request for use to a server; verifying, at the server, whether the requested use is authorized, if the installation is unauthorized, transmitting a use denial message to the client, and if the installation is authorized, transmitting a use authorization message to the client; utilizing the digital content data at the client if the requested installation is authorized. - View Dependent Claims (12, 13, 14)
-
Specification