METHOD AND SYSTEM FOR GAP BASED ANTI-PIRACY
First Claim
Patent Images
1. A method for controlling piracy of an asset comprising:
- generating a gap by factoring out of the asset functionality which is required to use the asset;
receiving an indication that the asset is attempting to gain access to or use the gap;
allowing access to the gap when a user is authorized to access the asset; and
restricting access to the gap when the user is not authorized to access the asset.
2 Assignments
0 Petitions
Accused Products
Abstract
In order to achieve a more robust level of piracy protection, a gap protection scheme is utilized. This protection scheme may utilize the notion of a gap, which may comprise any entity or component that is withheld from a distribution that is required in order to run or execute a software title or is required in order to play and enjoy any other type of protected asset.
22 Citations
20 Claims
-
1. A method for controlling piracy of an asset comprising:
-
generating a gap by factoring out of the asset functionality which is required to use the asset; receiving an indication that the asset is attempting to gain access to or use the gap; allowing access to the gap when a user is authorized to access the asset; and restricting access to the gap when the user is not authorized to access the asset. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system for controlling piracy of an asset comprising:
-
a gap generated by factoring out of the asset functionality which is required to use the asset; and a processor operative to execute instructions comprising; receiving an indication that the asset is attempting to gain access to or use the gap; allowing access to the gap when a user is authorized to access the asset; and restricting access to the gap when the user is not authorized to access the asset. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A computer readable medium having stored thereon computer executable instructions comprising:
-
generating a gap by factoring out of the asset functionality which is required to use the asset; receiving an indication that the asset is attempting to gain access to or use the gap; allowing access to the gap when a user is authorized to access the asset; and restricting access to the gap when the user is not authorized to access the asset. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification