Method and apparatus for protecting information and privacy
First Claim
1. A computer implemented system of detecting usage of second-level content on a user device comprising:
- one or more computer processors executing a supervising program;
the supervising program configured to detect use of an executing reader application program on a user device where such reader application program is accessing second-level content;
the supervising program configured to locate portions of the second-level content based on information about the functionality of the reader application program; and
the supervising program configured to use protection information including superfingerprints whose values have been sent by a guardian center to identify use of the second-level content, the superfingerprints including portions of the second level content, which are used to enable detection of the second level content accessed by the reader application program.
7 Assignments
0 Petitions
Accused Products
Abstract
A system for protecting software against piracy while protecting a user'"'"'s privacy enables enhancements to the protection software in a user device and extended protections against piracy. The protection system allows the user device to postpone validation of purchased tags stored in a tag table for installed software and to re-establish ownership of a tag table to recover from invalidation of a tag table identifier value resulting from revelation of a tag table identifier value. Continued use of the tag table is provided by the use of credits associated with a tag table. A protection center is protected against denial of service attacks by making calls to the protection center cost time or money to the attackers.
100 Citations
20 Claims
-
1. A computer implemented system of detecting usage of second-level content on a user device comprising:
-
one or more computer processors executing a supervising program; the supervising program configured to detect use of an executing reader application program on a user device where such reader application program is accessing second-level content; the supervising program configured to locate portions of the second-level content based on information about the functionality of the reader application program; and the supervising program configured to use protection information including superfingerprints whose values have been sent by a guardian center to identify use of the second-level content, the superfingerprints including portions of the second level content, which are used to enable detection of the second level content accessed by the reader application program. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 20)
-
-
17. A computer implemented system of controlling usage of second-level content on a user device comprising:
-
one or more computer processors executing a supervising program; the supervising program configured to detect usage of second-level content on a user device by; detecting use of a reader software application program on the user device, where the reader is accessing second-level content; locating portions of the second-level content based on information about the functionality of the reader; and using protection information to identify the second-level content, the protection information including superfingerprints whose values have been sent by a guardian center to identify use of the second-level content, the superfingerprints including portions of the second level content, which are used to enable detection of the second level content accessed by the reader software application program; and the supervising program responding to the detection of the second-level content by determining whether use of the second-level content is permitted on the user device. - View Dependent Claims (18)
-
-
19. A computer program product for controlling usage of second-level content on a user device, the computer program product having computer readable instructions stored on a non-transitory computer readable medium, the computer readable instructions including instructions for:
detecting usage of second-level content on a user device by; detecting use of a reader software application program on the user device that is accessing second-level content; locating portions of the second-level content accessed by the reader software application program based on information about the functionality of the reader software application program; and using protection information to identify the second-level content, the protection including superfingerprints whose values have been sent by a guardian center to identify use of the second-level content, the superfingerprints including portions of the second level content, which are used to enable detection of the second level content accessed by the reader software application program; and responding to the detection of the second-level content by determining whether use of the second-level content is permitted on the user device.
Specification