Systems and methods for preventing unauthorized use of digital content
First Claim
1. A method for preventing unauthorized use of digital content data to be transferred from a first system to a second system comprising:
- locating an original archive of a digital content data at the first system;
determining transaction data of the second system that identifies the second system by executing an analysis tool to examine components of the second system and to generate a unique identifying value in response to a request for the transfer of the digital content data from the first system to the second system, the unique identifying value identifying the second system and being based on selected properties of the examined components, the transaction data comprising the unique identifying value;
providing the transaction data to the first system;
modifying the original archive using the transaction data of the second system that identities the second system to generate a modified archive;
transferring the modified archive from the first system to the second system; and
receiving the transferred archive at the second system and recovering the digital content data of the original archive at the second system using the transaction data of the second system if the second system is a valid recipient.
2 Assignments
0 Petitions
Accused Products
Abstract
Theft, distribution, and piracy of digital content (software, video, audio, e-books, any content of any kind that is digitally stored and distributed) is generally accomplished by copying it, if possible, or, if it is protected from being copied in any fashion, such piracy is based upon a number of reverse engineering techniques. Aside from the straightforward copying of unprotected content, all of these other methods require first an understanding of the protective mechanism(s) guarding the content, and finally an unauthorized modification of that protection in order to disable or subvert it. Methods that prevent a skilled individual from using reverse engineering tools and techniques to attain that level of understanding and/or prevent anyone from performing such modifications can offer significant advantages to content creators who wish to protect their products.
326 Citations
35 Claims
-
1. A method for preventing unauthorized use of digital content data to be transferred from a first system to a second system comprising:
-
locating an original archive of a digital content data at the first system; determining transaction data of the second system that identifies the second system by executing an analysis tool to examine components of the second system and to generate a unique identifying value in response to a request for the transfer of the digital content data from the first system to the second system, the unique identifying value identifying the second system and being based on selected properties of the examined components, the transaction data comprising the unique identifying value; providing the transaction data to the first system; modifying the original archive using the transaction data of the second system that identities the second system to generate a modified archive; transferring the modified archive from the first system to the second system; and receiving the transferred archive at the second system and recovering the digital content data of the original archive at the second system using the transaction data of the second system if the second system is a valid recipient. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35)
-
Specification