Systems and methods for preventing unauthorized use of digital content
First Claim
1. A method for preventing unauthorized use of digital content data to be transferred from a first system to a second system comprising:
- locating an archive of a digital content data at the first system;
determining transaction data of the second system;
determining whether the transaction data of the second system indicates whether the second system is a valid recipient of the archive; and
transferring the archive from the first system to the second system if the second system is a valid recipient.
2 Assignments
0 Petitions
Accused Products
Abstract
Theft, distribution, and piracy of digital content (software, video, audio, e-books, any content of any kind that is digitally stored and distributed) is generally accomplished by copying it, if possible, or, if it is protected from being copied in any fashion, such piracy is based upon a number of reverse engineering techniques. Aside from the straightforward copying of unprotected content, all of these other methods require first an understanding of the protective mechanism(s) guarding the content, and finally an unauthorized modification of that protection in order to disable or subvert it. Methods that prevent a skilled individual from using reverse engineering tools and techniques to attain that level of understanding and/or prevent anyone from performing such modifications can offer significant advantages to content creators who wish to protect their products.
204 Citations
34 Claims
-
1. A method for preventing unauthorized use of digital content data to be transferred from a first system to a second system comprising:
-
locating an archive of a digital content data at the first system;
determining transaction data of the second system;
determining whether the transaction data of the second system indicates whether the second system is a valid recipient of the archive; and
transferring the archive from the first system to the second system if the second system is a valid recipient. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A method for preventing unauthorized use of digital content data hosted on a system comprising:
-
examining system devices that are operating in the system;
determining whether any of the system devices are emulator devices; and
initiating a defense action, in event that an emulator device is operating on the system. - View Dependent Claims (22, 23, 25, 26, 27, 29, 30, 31)
-
-
24. A method for preventing unauthorized use of digital content data hosted on a system comprising:
-
determining whether an unauthorized use of the digital content data is in progress; and
in the case where an unauthorized use is determined, initiating a defense action by disabling an input device.
-
-
28. A method for preventing unauthorized use of digital content data hosted on a system comprising:
-
executing a plurality of system processes;
monitoring at each process for unauthorized use and each process transferring a status message to another process related to the unauthorized use; and
each process determining whether an unauthorized use has occurred, and, if such a determination is made, initiating a defense action.
-
-
32. A method for preventing unauthorized use of digital content data hosted on a system comprising:
-
during the operation of a function operating on the system, determining whether an unauthorized use of the digital content data is in progress; and
in the case where an unauthorized use is determined, initiating a defense action that is integrated into the function. - View Dependent Claims (33, 34)
-
Specification