SOFTWARE WATERMARKING
First Claim
Patent Images
1. A method of executing program code on a hardware system, the method including the acts:
- monitoring program execution using tracking software that assesses a behavior associated with program execution, and then consulting reference data to determine whether said monitored behavior corresponds to a dynamic software watermark.
2 Assignments
0 Petitions
Accused Products
Abstract
Various techniques for uniquely marking software, such as by reference to hidden information or other telltale features, are detailed. Some marks are evident in static code. Others are observable when the code is executed. Some do not manifest themselves until the code is exercised with specific stimulus. Different of the techniques are applicable to source code, object code, and firmware. A great number of other features and arrangements are also disclosed.
53 Citations
12 Claims
-
1. A method of executing program code on a hardware system, the method including the acts:
- monitoring program execution using tracking software that assesses a behavior associated with program execution, and then consulting reference data to determine whether said monitored behavior corresponds to a dynamic software watermark.
-
2. A method of executing software on a hardware system, the method including the acts:
- collecting thermal information from said system, and checking said collected information for correspondence with a thermal profile associated with particular software.
-
3. A method for uniquely identifying an instance of program code, by reference to an order of plural items therein, the items being sortable into a first order ranging from an initial item at a starting end of the order, to a last item at a final end of the order, the method comprising the acts:
-
(a) receiving a plural-bit payload, comprising ones and zeroes; (b) identifying an item from an intermediate position in the first order, and assigning it to an end position in a new order; and (c) arranging other of said items in subsequent positions of the new order so that the new order encodes the plural-bit payload. - View Dependent Claims (4, 5, 6, 7, 8, 9, 10, 11, 12)
-
Specification