Systems and methods for preventing unauthorized use of digital content
First Claim
1. A method for preventing unauthorized use of digital content data hosted on a computer system comprising:
- examining, with a processor, system devices that are operating in the computer system;
determining, with the processor, whether any of the system devices are emulator devices; and
initiating, with the processor, a nondeterministic defense action that includes exiting of system programs in a nondeterministic order in response to a determination that an emulator device is operating on the computer system, wherein the nondeterministic defense action obfuscates a cause of the defense action by at least deferring of said exiting.
0 Assignments
0 Petitions
Accused Products
Abstract
Theft, distribution, and piracy of digital content (software, video, audio, e-books, any content of any kind that is digitally stored and distributed) is generally accomplished by copying it, if possible, or, if it is protected from being copied in any fashion, such piracy is based upon a number of reverse engineering techniques. Aside from the straightforward copying of unprotected content, all of these other methods require first an understanding of the protective mechanism(s) guarding the content, and finally an unauthorized modification of that protection in order to disable or subvert it. Methods that prevent a skilled individual from using reverse engineering tools and techniques to attain that level of understanding and/or prevent anyone from performing such modifications can offer significant advantages to content creators who wish to protect their products.
233 Citations
14 Claims
-
1. A method for preventing unauthorized use of digital content data hosted on a computer system comprising:
-
examining, with a processor, system devices that are operating in the computer system; determining, with the processor, whether any of the system devices are emulator devices; and initiating, with the processor, a nondeterministic defense action that includes exiting of system programs in a nondeterministic order in response to a determination that an emulator device is operating on the computer system, wherein the nondeterministic defense action obfuscates a cause of the defense action by at least deferring of said exiting. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method for preventing unauthorized use of digital content data hosted on a single computer system comprising:
-
executing, a plurality of system processes residing at a processor of the single computer system; monitoring, with the processor, at each of the plurality of system processes for unauthorized use and each of the system processes transferring a status message to another of the plurality of system processes related to the unauthorized use; and each of the plurality of system processes determining, with the processor, whether an unauthorized use of the digit content data has occurred, and, if such a determination is made, initiating, with the processor, a nondeterministic defense action wherein the nondeterministic defense action obfuscates a cause of the defense action includes exiting of system processes in a nondeterministic order by at least deferring of said exiting. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A method for preventing unauthorized use of digital content data hosted on a computer system comprising:
-
during the operation of a function operating on the computer system, determining, with a processor, whether an unauthorized use of the digital content data is in progress; and in the case where an unauthorized use is determined, initiating, with the processor, a nondeterministic defense action, which includes exiting of system programs in a nondeterministic order by at least deferring of said exiting, that is integrated into the function wherein the nondeterministic defense action obfuscates a cause of the defense action. - View Dependent Claims (12, 13, 14)
-
Specification