Systems and methods for preventing unauthorized use of digital content
First Claim
1. A method for preventing unauthorized use of digital content data comprising:
- subdividing the digital content data into data segments;
modifying the data segments with second data to generate modified data, wherein modifying the data segments comprises interleaving the data segments with the second data to generate interleaved data, wherein the second data is unrelated to the digital content data and wherein the interleaving comprises inserting elements of the second data between elements of the data segments;
storing the modified data at predetermined memory locations;
retrieving the modified data from the predetermined memory locations; and
following retrieving the modified data, de-interleaving the data segments based on the second data used to modify the data segments to generate original digital content data.
2 Assignments
0 Petitions
Accused Products
Abstract
Theft, distribution, and piracy of digital content (software, video, audio, e-books, any content of any kind that is digitally stored and distributed) is generally accomplished by copying it, if possible, or, if it is protected from being copied in any fashion, such piracy is based upon a number of reverse engineering techniques. Aside from the straightforward copying of unprotected content, all of these other methods require first an understanding of the protective mechanism(s) guarding the content, and finally an unauthorized modification of that protection in order to disable or subvert it. Methods which prevent a skilled individual from using reverse engineering tools and techniques to attain that level of understanding and/or prevent anyone from performing such modifications can offer significant advantages to content creators who wish to protect their products.
-
Citations
129 Claims
-
1. A method for preventing unauthorized use of digital content data comprising:
-
subdividing the digital content data into data segments; modifying the data segments with second data to generate modified data, wherein modifying the data segments comprises interleaving the data segments with the second data to generate interleaved data, wherein the second data is unrelated to the digital content data and wherein the interleaving comprises inserting elements of the second data between elements of the data segments; storing the modified data at predetermined memory locations; retrieving the modified data from the predetermined memory locations; and following retrieving the modified data, de-interleaving the data segments based on the second data used to modify the data segments to generate original digital content data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26)
-
-
27. A method for preventing unauthorized use of digital content data in a system having memory locations comprising:
-
subdividing the digital content data into data segments; modifying the data segments with second data to generate modified data, wherein the second data is unrelated to the digital data segments; scanning the system to determine available memory locations; selecting target memory locations within the available memory locations at which to store the modified data; and storing the modified data at the target memory locations, wherein a subset of the available memory locations are located outside the bounds of file system locations as identified by a table of contents of the file system on which the subset of available memory locations are located. - View Dependent Claims (28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52)
-
-
53. A method for preventing unauthorized use of digital content data hosted on a system comprising:
-
modifying the digital content data to generate modified data; storing the modified data at predetermined memory locations on the system to deter unauthorized access of the digital content data; determining whether an unauthorized attempt at accessing the digital content data occurs; and in the event of unauthorized access, reading a saturation profile of the system and system settings and generating saturation traffic on the system to deter the unauthorized activity. - View Dependent Claims (54, 55, 56, 57, 58, 59)
-
-
60. A method for preventing unauthorized use of digital content data in a system having memory locations comprising:
-
scanning the system to determine available memory locations based on a file system identifying locations of files on the system; selecting target memory locations within the available memory locations at which to store the digital content data; and storing the digital content data at the target memory locations, wherein a subset of the available memory locations are located outside the bounds of the file system locations as identified by a table of contents of the file system on which the subset of available memory locations are located. - View Dependent Claims (61, 62)
-
-
63. A system for preventing unauthorized use of digital content data comprising:
-
a subdividing unit for subdividing the digital content data into data segments; a modification unit for modifying the data segments with second data to generate modified data, wherein modifying the data segments comprises interleaving the data segments with the second data to generate interleaved data, wherein the second data is unrelated to the digital content data and wherein the interleaving comprises inserting elements of the second data between elements of the data segments; a storage unit for storing the modified data at predetermined memory locations; means for retrieving the modified data from the predetermined memory locations; and means for de-interleaving the data segments, following retrieving the modified data, based on the second data used to modify the data segments to generate original digital content data. - View Dependent Claims (64, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74, 75, 76, 77, 78, 79, 80, 81, 82, 83, 84, 85, 86)
-
-
87. A system for preventing unauthorized use of digital content data in a system having memory locations comprising:
-
means for subdividing the digital content data into data segments; means for modifying the data segments with second data to generate modified data, wherein the second data is unrelated to the digital content data; means for scanning the system to determine available memory locations; a selector for selecting target memory locations within the available memory locations at which to store the modified data; and a storage unit for storing the modified data at the target memory locations; wherein a subset of the available memory locations are located outside the bounds of the file system locations as identified by a table of contents of the file system on which the subset of available memory locations are located. - View Dependent Claims (88, 89, 90, 91, 92, 93, 94, 95, 96)
-
-
97. A system for preventing unauthorized use of digital content data hosted on a system comprising:
-
a modification unit for modifying the digital content data to generate modified data; a storage unit for storing the modified data at predetermined memory locations on the system to deter unauthorized access of the digital content data; and means for determining whether an unauthorized attempt at accessing the digital content data occurs, and, in the event of unauthorized access, reading a saturation profile of the system and system settings and generating saturation traffic on the system to deter the unauthorized activity. - View Dependent Claims (98, 99, 100, 101, 102, 103)
-
-
104. A system for preventing unauthorized use of digital content data in a system having memory locations comprising:
-
a scanner for scanning the system to determine available memory locations based on a file system identifying locations of files on the system; means for selecting target memory locations within the available memory locations at which to store the digital content data; and a storage unit for storing the digital content data at the target memory locations, wherein a subset of the available memory locations are located outside the bounds of the file system locations as identified by a table of contents of the file system on which the subset of available memory locations are located. - View Dependent Claims (105, 106)
-
-
107. A method for preventing unauthorized use of digital content data comprising:
-
subdividing the digital content data into data segments; modifying the data segments with second data to generate modified data, wherein modifying the data segments comprises interleaving the data segments with the second data to generate interleaved data, wherein the second data is unrelated to the digital content data and wherein the interleaving comprises inserting elements of the second data between elements of the data segments; storing the modified data at predetermined memory locations; retrieving the modified data from the predetermined memory locations; and following retrieving the modified data, de-interleaving the data segments based on the second data used to modify the data segments to generate original digital content data; wherein the memory locations reside on a system and wherein a tame of contents identifies files stored on the system and identifies memory locations at which the files are stored, and wherein the modified data are stored at memory locations occupied by the files, as identified by the table of contents, and wherein, if an authorized access of a file replaced by the modified data is determined, the file is accessed. - View Dependent Claims (108, 109, 110, 111, 112)
-
-
113. A method for preventing unauthorized use of digital content data comprising:
-
subdividing the digital content data into data segments; modifying the data segments with second data to generate modified data, wherein modifying the data segments comprises interleaving the data segments with the second data to generate interleaved data, wherein the second data is unrelated to the digital content data and wherein the interleaving comprises inserting elements of the second data between elements of the data segments; storing the modified data at predetermined memory locations; retrieving the modified data from the predetermined memory locations; and following retrieving the modified data, de-interleaving the data segments based on the second data used to modify the data segments to generate original digital content data; wherein modifying the data segments with second data comprises tokenizing the data segments with token data and wherein the token data comprises lexical equivalents of assembly language commands. - View Dependent Claims (114, 115, 116, 117, 118, 119, 120)
-
-
121. A system for preventing unauthorized use of digital content data comprising:
-
a subdividing unit for subdividing the digital content data into data segments; a modification unit for modifying the data segments with second data to generate modified data, wherein modifying the data segments comprises;
interleaving the data segments with the second data to generate interleaved data; and
tokenizing the data segments with token data, wherein the token data comprises lexical equivalents of assembly language commands, wherein the second data is unrelated to the digital content data and wherein the interleaving comprises inserting elements of the second data between elements of the data segments;a storage unit for storing the modified data at predetermined memory locations; means for retrieving the modified data from the predetermined memory locations; and means for de-interleaving the data segments, following retrieving the modified data, based on the second data used to modify the data segments to generate original digital content data. - View Dependent Claims (122, 123, 124, 125)
-
-
126. A system for preventing unauthorized use of digital content data comprising:
-
a subdividing unit for subdividing the digital content data into data segments; a modification unit for modifying the data segments with second data to generate modified data, wherein the second data is unrelated to the digital content data; and a storage unit for storing the modified data at predetermined memory locations; wherein the memory locations reside on the system and further comprising; a scanner for scanning the system to determine available memory locations; a selector for selecting target memory locations within the available memory locations at which to store the modified data; and wherein the storage unit stores the modified data at the target memory locations and wherein a subset of available memory locations are located outside the bounds of the file system locations as identified by a table of contents of the file system on which the subset of available memory locations are located. - View Dependent Claims (127, 128, 129)
-
Specification