Method and Apparatus for Protecting Information and Privacy
First Claim
1. A computer implemented system of detecting usage of second-level content on a user device comprising:
- one or more computer processors executing a supervising program;
the supervising program detecting use of an executing substrate on a user device, the executing substrate capable of accessing second-level content;
the supervising program locating portions of the second-level content based on information about the functionality of the executing substrate; and
the supervising program using protection information to identify the second-level content.
7 Assignments
0 Petitions
Accused Products
Abstract
A system for protecting software against piracy while protecting a user'"'"'s privacy enables enhancements to the protection software in a user device and extended protections against piracy. The protection system allows the user device to postpone validation of purchased tags stored in a tag table for installed software and to re-establish ownership of a tag table to recover from invalidation of a tag table identifier value resulting from revelation of a tag table identifier value. Continued use of the tag table is provided by the use of credits associated with a tag table. A protection center is protected against denial of service attacks by making calls to the protection center cost time or money to the attackers.
-
Citations
19 Claims
-
1. A computer implemented system of detecting usage of second-level content on a user device comprising:
-
one or more computer processors executing a supervising program; the supervising program detecting use of an executing substrate on a user device, the executing substrate capable of accessing second-level content; the supervising program locating portions of the second-level content based on information about the functionality of the executing substrate; and the supervising program using protection information to identify the second-level content. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A computer implemented system of controlling usage of second-level content on a user device comprising:
-
one or more computer processors executing a supervising program; the supervising program detecting usage of second-level content on a user device by; detecting use of a reader software application program on the user device, where the reader is capable of accessing second-level content; locating portions of the second-level content based on information about the functionality of the reader; and using protection information to identify the second-level content; and the supervising program responding to the detection of the second-level content by determining whether use of the second-level content is permitted on the user device. - View Dependent Claims (18)
-
-
19. A computer product capable of executing on one or more computer processors, the computer program product having computer readable instructions for controlling usage of second-level content on a user device, the computer readable instructions including instructions for:
-
detecting usage of second-level content on a user device by; detecting use of a reader software application program on the user device, where the reader is capable of accessing second-level content; locating portions of the second-level content based on information about the functionality of the reader; and using protection information to identify the second-level content; and responding to the detection of the second-level content by determining whether use of the second-level content is permitted on the user device.
-
Specification