Systems and methods for the prevention of unauthorized use and manipulation of digital content
First Claim
1. A method for preventing unauthorized use of digital content data in a computer system comprising:
- executing protected digital content data;
in response to the execution of the protected digital content data, examining system devices that are operational in the system;
determining whether at least one of the operational system devices is a subversion device that subverts control mechanisms of the computer system that control the unauthorized use of the digital content data, wherein the subversion device performs at least one of unauthorized study, modification, monitoring, and reconstruction of the executed protected digital content data, wherein determining comprises;
determining a performance parameter of the at least one operational system device. wherein determining a performance parameter comprises supplying test data to the at least one operational system device, and monitoring performance data of the at least one operational device; and
comparing the performance data to actual data collected on a sample operational device, and if the comparison result is outside a predetermined range, then determining that the operational system device is a subversion device; and
initiating a defensive action if it is determined that at least one of the operational system devices is a subversion device.
3 Assignments
0 Petitions
Accused Products
Abstract
A number of systems and methods, alone, or in combination, achieve various levels of protection against unauthorized modification and distribution of digital content. This encompasses at least unauthorized study, modification, monitoring, reconstruction, and any other means for subversion from the originally intended purpose and license model of the digital content. The invention combines a number of techniques that in whole, or in part, serve to protect such content from unauthorized modification, reconstructive engineering, or monitoring by third parties. This is accomplished by means of methods which protect against subversion by specific tools operating on specific platforms as well as general tools operating on general platforms. Specific time domain attacks are identified, code modification can be identified and reversed, and virtual and emulated systems are identified. In addition, identification of in-circuit emulator tools (both software and hardware), debuggers, and security threats to running programs can be achieved.
-
Citations
28 Claims
-
1. A method for preventing unauthorized use of digital content data in a computer system comprising:
-
executing protected digital content data; in response to the execution of the protected digital content data, examining system devices that are operational in the system; determining whether at least one of the operational system devices is a subversion device that subverts control mechanisms of the computer system that control the unauthorized use of the digital content data, wherein the subversion device performs at least one of unauthorized study, modification, monitoring, and reconstruction of the executed protected digital content data, wherein determining comprises; determining a performance parameter of the at least one operational system device. wherein determining a performance parameter comprises supplying test data to the at least one operational system device, and monitoring performance data of the at least one operational device; and comparing the performance data to actual data collected on a sample operational device, and if the comparison result is outside a predetermined range, then determining that the operational system device is a subversion device; and initiating a defensive action if it is determined that at least one of the operational system devices is a subversion device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method for preventing unauthorized use of digital content data in a computer system comprising:
-
executing protected digital content data in response to the execution of the protected digital content data, enumerating processes that are active on the computer system, wherein enumerating comprises at least one of examining processes registered in a taskbar of the computer system and inspecting memory partitioning signatures of the computer system; determining whether at least one of the processes is a subversion process that subverts control mechanisms of the computer system that control the unauthorized use of the digital content data, wherein the subversion process performs at least one of unauthorized study, modification, monitoring, and reconstruction of the executed protected digital content data; and
initiating a defensive action if it is determined that at least one of the operational system processes is a subversion process. - View Dependent Claims (13, 14)
-
-
15. A method for preventing unauthorized use of digital content data in a computer system comprising:
-
executing protected digital content data in response to the execution of the protected digital content data, enumerating processes that are active on the computer system, wherein enumerating comprises at least one of examining incremental portions of system memory and examining processes registered in a taskbar of the computer system; determining whether at least one of the processes is a subversion process by searching the computer system memory for a known signature of a subversion process that subverts control mechanisms of the computer system that control the unauthorized use of the digital content data, wherein the subversion process performs at least one of unauthorized study, modification, monitoring, and reconstruction of the executed protected digital content data; and
initiating a defensive action if it is determined that at least one of the operational system processes is a subversion process. - View Dependent Claims (16)
-
-
17. A method for preventing unauthorized use of digital content data in a computer system comprising:
-
executing protected digital content data; in response to the execution of the protected digital content data, enumerating processes that are active on the computer system, wherein enumerating comprises at least one of examining incremental portions of system memory and examining processes registered in a taskbar of the computer system; determining whether at least one of the processes is a subversion process by searching the computer system memory for a known memory partitioning signature of a subversion process that subverts control mechanisms of the computer system that control the unauthorized use of the digital content data, wherein the subversion process performs at least one of unauthorized study, modification, monitoring, and reconstruction of the executed protected digital content data; and
initiating a defensive action if it is determined that at least one of the operational system processes is a subversion process. - View Dependent Claims (18)
-
-
19. A method for preventing unauthorized use of digital content data in a computer system comprising:
-
executing protected digital content data; in response to the execution of the protected digital content data, examining system memory for the existence of system devices that are operational in the system; determining whether at least one of the operational system devices is a physical or virtual subversion device that subverts control mechanisms of the computer system that control the unauthorized use of the digital content data, by determining a memory latency value for the at least one system device and comparing the determined memory latency value to a known memory latency value, wherein the subversion device performs at least one of unauthorized study, modification, monitoring, and reconstruction of the executed protected digital content data; and initiating a defensive action if it is determined that at least one of the operational system devices is a virtual subversion device. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27, 28)
-
Specification