AU2001294017A1 - A method for controlling access to protected content - Google Patents
A method for controlling access to protected contentInfo
- Publication number
- AU2001294017A1 AU2001294017A1 AU2001294017A AU9401701A AU2001294017A1 AU 2001294017 A1 AU2001294017 A1 AU 2001294017A1 AU 2001294017 A AU2001294017 A AU 2001294017A AU 9401701 A AU9401701 A AU 9401701A AU 2001294017 A1 AU2001294017 A1 AU 2001294017A1
- Authority
- AU
- Australia
- Prior art keywords
- protected content
- controlling access
- access
- operating system
- system service
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/125—Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code
- G06F21/126—Interacting with the operating system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6281—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database at program execution time, where the protection is within the operating system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/629—Protecting access to data via a platform, e.g. using keys or access control rules to features or functions of an application
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/106—Enforcing content protection by specific content processing
- G06F21/1064—Restricting content processing at operating system level
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2147—Locking files
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2149—Restricted operating environment
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/101—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measures for digital rights management
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
- Selective Calling Equipment (AREA)
- Hardware Redundancy (AREA)
- Transition And Organic Metals Composition Catalysts For Addition Polymerization (AREA)
Abstract
A method is disclosed for controlling access by use of an operating system service to content that is to be protected from unauthorised access. The method includes the steps of, for an operating system service which can enable unauthorised access to protected content, modifying the operation of said operating system service to restrict or deny access to the protected content.
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GBGB0024919.3A GB0024919D0 (en) | 2000-10-11 | 2000-10-11 | Method of further securing an operating system |
GB0024919.3 | 2000-10-11 | ||
PCT/GB2001/004544 WO2002031632A2 (en) | 2000-10-11 | 2001-10-11 | A method for controlling access to protected content |
Publications (1)
Publication Number | Publication Date |
---|---|
AU2001294017A1 true AU2001294017A1 (en) | 2002-04-22 |
Family
ID=9901090
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
AU2001294017A Abandoned AU2001294017A1 (en) | 2000-10-11 | 2001-10-11 | A method for controlling access to protected content |
Country Status (6)
Country | Link |
---|---|
US (1) | US7761706B2 (en) |
EP (1) | EP1386206B1 (en) |
AT (1) | ATE536580T1 (en) |
AU (1) | AU2001294017A1 (en) |
GB (1) | GB0024919D0 (en) |
WO (1) | WO2002031632A2 (en) |
Families Citing this family (62)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7529929B2 (en) * | 2002-05-30 | 2009-05-05 | Nokia Corporation | System and method for dynamically enforcing digital rights management rules |
AU2003253106A1 (en) | 2002-07-04 | 2004-01-23 | Gyne Ideas Ltd | Medical implant |
US7383586B2 (en) * | 2003-01-17 | 2008-06-03 | Microsoft Corporation | File system operation and digital rights management (DRM) |
US7100047B2 (en) * | 2003-01-23 | 2006-08-29 | Verdasys, Inc. | Adaptive transparent encryption |
US7472272B2 (en) * | 2003-01-23 | 2008-12-30 | Verdasys, Inc. | Digital asset usage accountability via event journaling |
US7814021B2 (en) * | 2003-01-23 | 2010-10-12 | Verdasys, Inc. | Managed distribution of digital assets |
US8136155B2 (en) * | 2003-04-01 | 2012-03-13 | Check Point Software Technologies, Inc. | Security system with methodology for interprocess communication control |
US7490332B2 (en) * | 2003-04-04 | 2009-02-10 | Sesma Systems, Inc. | System and method for accessing ActiveX objects in a platform dependent environment from objects in a platform independent environment |
US7478408B2 (en) * | 2003-04-04 | 2009-01-13 | Sesma Systems, Inc. | System and method for accessing objects in a platform dependent environment from a platform independent environment |
AP2005003476A0 (en) * | 2003-06-05 | 2005-12-31 | Intertrust Tech Corp | Interoperable systems and methods for peer-to-peerservice orchestration. |
US7712140B2 (en) * | 2003-08-04 | 2010-05-04 | Lsi Corporation | 3-prong security/reliability/real-time distributed architecture of information handling system |
US7434048B1 (en) * | 2003-09-09 | 2008-10-07 | Adobe Systems Incorporated | Controlling access to electronic documents |
JP2005157059A (en) * | 2003-11-27 | 2005-06-16 | Seiko Epson Corp | Illuminating apparatus and projector |
ATE436047T1 (en) * | 2003-12-30 | 2009-07-15 | Wibu Systems Ag | METHOD FOR CONTROLLING A DATA PROCESSING DEVICE |
US20050262568A1 (en) * | 2004-05-18 | 2005-11-24 | Hansen Mark D | System and method for managing access to protected content by untrusted applications |
US7502481B2 (en) * | 2004-08-31 | 2009-03-10 | Microsoft Corporation | Microphone with ultrasound/audible mixing chamber to secure audio path |
US7739720B2 (en) * | 2004-10-14 | 2010-06-15 | Microsoft Corporation | Method and system for merging security policies |
US8776206B1 (en) * | 2004-10-18 | 2014-07-08 | Gtb Technologies, Inc. | Method, a system, and an apparatus for content security in computer networks |
US7907727B2 (en) * | 2004-10-19 | 2011-03-15 | Rovi Solutions Corporation | System and method for allowing copying or distribution of a copy protected signal |
US7784103B2 (en) * | 2004-10-19 | 2010-08-24 | Rovi Solutions Corporation | Method and apparatus for storing copy protection information separately from protected content |
US7373446B2 (en) * | 2004-11-05 | 2008-05-13 | Microsoft Corporation | Method and system for dynamically patching an operating system's interrupt mechanism |
US7984513B1 (en) * | 2005-02-09 | 2011-07-19 | Liquid Machines, Inc. | Method and system for using a rules engine for enforcing access and usage policies in rights-aware applications |
US7895651B2 (en) | 2005-07-29 | 2011-02-22 | Bit 9, Inc. | Content tracking in a network security system |
US8272058B2 (en) | 2005-07-29 | 2012-09-18 | Bit 9, Inc. | Centralized timed analysis in a network security system |
US8984636B2 (en) | 2005-07-29 | 2015-03-17 | Bit9, Inc. | Content extractor and analysis system |
CN102882677B (en) * | 2005-10-18 | 2015-11-25 | 英特托拉斯技术公司 | The method of digital rights management |
EP1941417A1 (en) * | 2005-10-18 | 2008-07-09 | Telecom Italia S.p.A. | A method for controlling access to file systems, related system, sim card and computer program product for use therein |
US20070204078A1 (en) * | 2006-02-09 | 2007-08-30 | Intertrust Technologies Corporation | Digital rights management engine systems and methods |
US9274974B1 (en) | 2005-10-21 | 2016-03-01 | Vmware, Inc. | Isolating data within a computer system using private shadow mappings |
US8214296B2 (en) * | 2006-02-14 | 2012-07-03 | Microsoft Corporation | Disaggregated secure execution environment |
US10528705B2 (en) * | 2006-05-09 | 2020-01-07 | Apple Inc. | Determining validity of subscription to use digital content |
US9971776B1 (en) * | 2006-06-29 | 2018-05-15 | Veritas Technologies Llc | Method and apparatus for extending functionality of an operating system |
US9218464B2 (en) * | 2006-10-20 | 2015-12-22 | Adobe Systems Incorporated | Interception of controlled functions |
US20100031342A1 (en) * | 2007-04-12 | 2010-02-04 | Honeywell International, Inc | Method and system for providing secure video data transmission and processing |
KR20080103225A (en) * | 2007-05-23 | 2008-11-27 | 삼성전자주식회사 | Method for encryption transmitting and decrypting contents and apparatus thereof |
WO2009028873A2 (en) * | 2007-08-29 | 2009-03-05 | Cdnetworks Co., Ltd. | Protection against unauthorized copying of digital media content |
US9740637B2 (en) | 2007-10-30 | 2017-08-22 | Vmware, Inc. | Cryptographic multi-shadowing with integrity verification |
US20090113111A1 (en) | 2007-10-30 | 2009-04-30 | Vmware, Inc. | Secure identification of execution contexts |
US8117243B2 (en) * | 2008-02-21 | 2012-02-14 | Oracle America, Inc. | Dynamic transactional instantiation of system configuration using a virtual file system layer |
US8769675B2 (en) * | 2008-05-13 | 2014-07-01 | Apple Inc. | Clock roll forward detection |
US8245308B2 (en) * | 2008-06-04 | 2012-08-14 | Microsoft Corporation | Using trusted third parties to perform DRM operations |
US8484616B1 (en) * | 2009-06-23 | 2013-07-09 | Emc Corporation | Universal module model |
US20100333065A1 (en) * | 2009-06-30 | 2010-12-30 | Computer Assoicates Think, Inc. | Binary code modification system and method for implementing a web service interface |
US20100333079A1 (en) * | 2009-06-30 | 2010-12-30 | Computer Associates Think, Inc. | Binary Code Modification System and Method for Implementing Identity and Access Management or Governance Policies |
US20110213971A1 (en) * | 2010-03-01 | 2011-09-01 | Nokia Corporation | Method and apparatus for providing rights management at file system level |
US8365192B2 (en) | 2011-01-14 | 2013-01-29 | Apple Inc. | Methods for managing authority designation of graphical user interfaces |
US8473961B2 (en) | 2011-01-14 | 2013-06-25 | Apple Inc. | Methods to generate security profile for restricting resources used by a program based on entitlements of the program |
KR20120050742A (en) | 2010-11-11 | 2012-05-21 | 삼성에스디에스 주식회사 | Apparatus and method for managing digital rights through hooking process of kernel native api |
CN103597488B (en) | 2011-04-11 | 2016-08-24 | 英特托拉斯技术公司 | Information safety system and method |
US9213827B2 (en) | 2012-09-27 | 2015-12-15 | Intel Corporation | Security data aggregation and business intelligence for web applications |
US9560026B1 (en) * | 2013-01-22 | 2017-01-31 | Amazon Technologies, Inc. | Secure computer operations |
US9377940B2 (en) * | 2013-02-28 | 2016-06-28 | Facebook, Inc. | Predictive pre-decoding of encoded media item |
US20140258720A1 (en) * | 2013-03-11 | 2014-09-11 | Barracuda Networks, Inc. | Systems and methods for transparent per-file encryption and decryption via metadata identification |
EP3005207B1 (en) * | 2013-05-30 | 2020-09-30 | JScrambler S.A. | Digital content execution control mechanism |
EP3005209B1 (en) * | 2013-05-30 | 2021-02-17 | JScrambler S.A. | Web application protection |
CN103778382A (en) * | 2014-01-16 | 2014-05-07 | 宇龙计算机通信科技(深圳)有限公司 | Access method of encrypted file and communication terminal |
US11134063B2 (en) * | 2014-03-12 | 2021-09-28 | Akamai Technologies, Inc. | Preserving special characters in an encoded identifier |
IN2014CH01484A (en) | 2014-03-20 | 2015-09-25 | Infosys Ltd | |
WO2016026532A1 (en) * | 2014-08-21 | 2016-02-25 | Irdeto B.V. | User authentication using a randomized keypad over a drm secured video path |
US9940486B2 (en) * | 2015-02-23 | 2018-04-10 | Cisco Technology, Inc. | Detection of hardware tampering |
US10572675B2 (en) | 2016-11-02 | 2020-02-25 | Cisco Technology, Inc. | Protecting and monitoring internal bus transactions |
CN114647821A (en) * | 2022-02-10 | 2022-06-21 | 北京奇艺世纪科技有限公司 | Screen recording detection method, device, equipment and storage medium |
Family Cites Families (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5027273A (en) * | 1985-04-10 | 1991-06-25 | Microsoft Corporation | Method and operating system for executing programs in a multi-mode microprocessor |
JPH07230380A (en) * | 1994-02-15 | 1995-08-29 | Internatl Business Mach Corp <Ibm> | Method and system for controlling utilization of application program |
CN101359350B (en) * | 1995-02-13 | 2012-10-03 | 英特特拉斯特技术公司 | Methods for secure transaction management and electronic rights protection |
US5671417A (en) * | 1995-08-11 | 1997-09-23 | International Business Machines Corporation | Method and system for inserting floating code hooks into multiple versions of code |
US5899987A (en) * | 1995-10-03 | 1999-05-04 | Memco Software Ltd. | Apparatus for and method of providing user exits on an operating system platform |
US6868495B1 (en) * | 1996-09-12 | 2005-03-15 | Open Security Solutions, Llc | One-time pad Encryption key Distribution |
US6141698A (en) * | 1997-01-29 | 2000-10-31 | Network Commerce Inc. | Method and system for injecting new code into existing application code |
US5974549A (en) * | 1997-03-27 | 1999-10-26 | Soliton Ltd. | Security monitor |
US6282657B1 (en) * | 1997-09-16 | 2001-08-28 | Safenet, Inc. | Kernel mode protection |
WO1999039261A1 (en) * | 1997-10-09 | 1999-08-05 | The Learning Company | Windows api trapping system |
US7213247B1 (en) * | 2000-01-10 | 2007-05-01 | Wind River Systems, Inc. | Protection domains for a computer operating system |
-
2000
- 2000-10-11 GB GBGB0024919.3A patent/GB0024919D0/en not_active Ceased
-
2001
- 2001-10-11 AT AT01974503T patent/ATE536580T1/en active
- 2001-10-11 US US10/398,566 patent/US7761706B2/en not_active Expired - Lifetime
- 2001-10-11 EP EP01974503A patent/EP1386206B1/en not_active Expired - Lifetime
- 2001-10-11 AU AU2001294017A patent/AU2001294017A1/en not_active Abandoned
- 2001-10-11 WO PCT/GB2001/004544 patent/WO2002031632A2/en active Application Filing
Also Published As
Publication number | Publication date |
---|---|
EP1386206A2 (en) | 2004-02-04 |
EP1386206B1 (en) | 2011-12-07 |
US20040054894A1 (en) | 2004-03-18 |
WO2002031632A3 (en) | 2003-11-20 |
ATE536580T1 (en) | 2011-12-15 |
GB0024919D0 (en) | 2000-11-22 |
WO2002031632A2 (en) | 2002-04-18 |
US7761706B2 (en) | 2010-07-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
AU2001294017A1 (en) | A method for controlling access to protected content | |
WO2002023801A3 (en) | Method for controlling access | |
WO2002045382A3 (en) | Service record for an application running on a wireless device | |
GB2386456A (en) | Computer system with operating system on a ram-disk | |
WO2007024366A3 (en) | System and method for controlling access to mobile devices | |
WO2003044640A3 (en) | System and method for managing confidential data | |
WO2000074967A3 (en) | Method for operating a transmission device | |
WO1996024092A3 (en) | A method and system for managing a data object so as to comply with predetermined conditions for usage | |
WO2002103499A3 (en) | System and method for specifying security, privacy, and access control to information used by others | |
HU0200434D0 (en) | Method to determine which requirements from a general requirements document apply to a specific situation, computer system for operating the method and computer-readable medium containing instructions for... | |
AU2002318230A1 (en) | Method for reducing emissions from evaporative emissions control systems | |
WO2002019957A3 (en) | System and method for the central control of devices used during an operation | |
AU2002354000A1 (en) | Adaptive rate control for an ofdm communication system | |
WO2001055848A3 (en) | A method and system for implementing an enterprise information portal | |
AU2001273051A1 (en) | Method of comparing utterances for security control | |
AU2002362568A1 (en) | System and method for policy dependent name to address resolutioin. | |
GB0012914D0 (en) | Performance profiling tool | |
NO20021138L (en) | Procedure for controlling an underground safety valve | |
WO2007024367A3 (en) | System and method for controlling access to mobile devices | |
GB2396037A (en) | Method and system for logging into and providing access to a computer system via a communications network | |
WO2007095406A3 (en) | Method and apparatus for synthesizing presence information | |
AU2002325400A1 (en) | Control System for Choke Valve of Carburetor | |
WO2003007101A3 (en) | Complex adaptive systems | |
AU2002353401A1 (en) | Method of operating an access control system | |
AU2003268921A1 (en) | Access control system and method for operating an access control system of this type |