CA2429587A1 - Systemes et procedes pour interdire l'utilisation non autorisee d'un contenu numerique - Google Patents
Systemes et procedes pour interdire l'utilisation non autorisee d'un contenu numerique Download PDFInfo
- Publication number
- CA2429587A1 CA2429587A1 CA002429587A CA2429587A CA2429587A1 CA 2429587 A1 CA2429587 A1 CA 2429587A1 CA 002429587 A CA002429587 A CA 002429587A CA 2429587 A CA2429587 A CA 2429587A CA 2429587 A1 CA2429587 A1 CA 2429587A1
- Authority
- CA
- Canada
- Prior art keywords
- data
- content
- archive
- file
- digital content
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000000034 method Methods 0.000 title claims abstract description 352
- 230000008569 process Effects 0.000 claims description 179
- 230000006870 function Effects 0.000 claims description 49
- 238000012544 monitoring process Methods 0.000 claims description 20
- 230000009471 action Effects 0.000 claims description 13
- 230000007123 defense Effects 0.000 claims description 9
- 230000026676 system process Effects 0.000 claims description 6
- 238000004458 analytical method Methods 0.000 claims description 4
- 230000000704 physical effect Effects 0.000 claims description 2
- 230000000977 initiatory effect Effects 0.000 claims 4
- 230000002159 abnormal effect Effects 0.000 claims 1
- 238000012986 modification Methods 0.000 abstract description 19
- 230000004048 modification Effects 0.000 abstract description 19
- 230000002441 reversible effect Effects 0.000 abstract description 17
- 230000004224 protection Effects 0.000 abstract description 14
- 238000009826 distribution Methods 0.000 abstract description 8
- 230000008901 benefit Effects 0.000 abstract description 5
- 230000009979 protective mechanism Effects 0.000 abstract description 3
- 238000010586 diagram Methods 0.000 description 62
- 230000007246 mechanism Effects 0.000 description 41
- 230000000694 effects Effects 0.000 description 24
- 238000003860 storage Methods 0.000 description 23
- 230000001681 protective effect Effects 0.000 description 22
- 230000004044 response Effects 0.000 description 20
- 230000005945 translocation Effects 0.000 description 18
- 238000013475 authorization Methods 0.000 description 16
- 238000009434 installation Methods 0.000 description 16
- 230000003068 static effect Effects 0.000 description 13
- 230000007958 sleep Effects 0.000 description 11
- 239000000945 filler Substances 0.000 description 10
- 230000001010 compromised effect Effects 0.000 description 9
- 239000003550 marker Substances 0.000 description 7
- 238000012545 processing Methods 0.000 description 7
- 230000009993 protective function Effects 0.000 description 7
- 239000011800 void material Substances 0.000 description 7
- 238000004422 calculation algorithm Methods 0.000 description 6
- 238000011900 installation process Methods 0.000 description 6
- 238000003780 insertion Methods 0.000 description 5
- 230000000007 visual effect Effects 0.000 description 5
- 230000008859 change Effects 0.000 description 4
- 230000037431 insertion Effects 0.000 description 4
- 238000006467 substitution reaction Methods 0.000 description 4
- 230000001360 synchronised effect Effects 0.000 description 4
- 238000012795 verification Methods 0.000 description 4
- 238000013459 approach Methods 0.000 description 3
- 230000006399 behavior Effects 0.000 description 3
- 238000004891 communication Methods 0.000 description 3
- 238000001514 detection method Methods 0.000 description 3
- 239000000284 extract Substances 0.000 description 3
- 238000013507 mapping Methods 0.000 description 3
- 238000005096 rolling process Methods 0.000 description 3
- 230000001960 triggered effect Effects 0.000 description 3
- 230000004075 alteration Effects 0.000 description 2
- 238000006243 chemical reaction Methods 0.000 description 2
- 239000003086 colorant Substances 0.000 description 2
- 230000000875 corresponding effect Effects 0.000 description 2
- 238000005336 cracking Methods 0.000 description 2
- 230000003111 delayed effect Effects 0.000 description 2
- 238000013461 design Methods 0.000 description 2
- 230000009977 dual effect Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 238000013467 fragmentation Methods 0.000 description 2
- 238000006062 fragmentation reaction Methods 0.000 description 2
- 230000008676 import Effects 0.000 description 2
- 230000002147 killing effect Effects 0.000 description 2
- 238000004806 packaging method and process Methods 0.000 description 2
- 230000036961 partial effect Effects 0.000 description 2
- 238000010079 rubber tapping Methods 0.000 description 2
- 241000609886 Addax Species 0.000 description 1
- 101000939676 Androctonus crassicauda Toxin a Proteins 0.000 description 1
- 206010010144 Completed suicide Diseases 0.000 description 1
- 241000282414 Homo sapiens Species 0.000 description 1
- PVNIIMVLHYAWGP-UHFFFAOYSA-N Niacin Chemical compound OC(=O)C1=CC=CN=C1 PVNIIMVLHYAWGP-UHFFFAOYSA-N 0.000 description 1
- 239000002253 acid Substances 0.000 description 1
- 238000007792 addition Methods 0.000 description 1
- 238000012152 algorithmic method Methods 0.000 description 1
- 230000003466 anti-cipated effect Effects 0.000 description 1
- 230000009118 appropriate response Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000000903 blocking effect Effects 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 230000002596 correlated effect Effects 0.000 description 1
- 238000012217 deletion Methods 0.000 description 1
- 230000037430 deletion Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000000605 extraction Methods 0.000 description 1
- 238000001914 filtration Methods 0.000 description 1
- 230000009191 jumping Effects 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 238000007620 mathematical function Methods 0.000 description 1
- 238000002715 modification method Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 238000002360 preparation method Methods 0.000 description 1
- 239000003223 protective agent Substances 0.000 description 1
- 230000002829 reductive effect Effects 0.000 description 1
- 238000009877 rendering Methods 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 230000000979 retarding effect Effects 0.000 description 1
- 238000005070 sampling Methods 0.000 description 1
- 230000004617 sleep duration Effects 0.000 description 1
- 230000004622 sleep time Effects 0.000 description 1
- 238000000638 solvent extraction Methods 0.000 description 1
- 230000001629 suppression Effects 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
- 238000013519 translation Methods 0.000 description 1
- 238000010200 validation analysis Methods 0.000 description 1
- 230000003245 working effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/14—Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
Abstract
Le vol, la distribution et la piraterie d'un contenu numérique (logiciel, livres électroniques, vidéo, audio, tout contenu de n'importe quel type stocké et distribué numériquement) se traduisent généralement par sa copie éventuelle, ou s'il est protégé contre toute forme de copie, cette piraterie est basée sur un nombre de techniques d'ingénierie inverse. Mis à part la copie ordinaire d'un contenu non protégé, tous ces autres procédés nécessitent d'abord une compréhension du ou des mécanismes de protection du contenu, puis une modification non autorisée de cette protection afin de la désactiver. Les procédés qui interdisent à un individu qualifié d'utiliser des outils et des techniques d'ingénierie inverse pour obtenir e niveau de compréhension et/ou interdire quiconque d'effectuer ces modifications peuvent offrir des avantages considérables aux créateurs de contenus souhaitant protéger leurs produits.
Applications Claiming Priority (9)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US24994600P | 2000-11-20 | 2000-11-20 | |
US60/249,946 | 2000-11-20 | ||
US26070501P | 2001-01-10 | 2001-01-10 | |
US60/260,705 | 2001-01-10 | ||
US28530001P | 2001-04-20 | 2001-04-20 | |
US60/285,300 | 2001-04-20 | ||
US09/960,610 US7565697B2 (en) | 2000-09-22 | 2001-09-21 | Systems and methods for preventing unauthorized use of digital content |
US09/960,610 | 2001-09-21 | ||
PCT/US2001/044045 WO2003029939A2 (fr) | 2000-11-20 | 2001-11-20 | Systemes et procedes pour interdire l'utilisation non autorisee d'un contenu numerique |
Publications (1)
Publication Number | Publication Date |
---|---|
CA2429587A1 true CA2429587A1 (fr) | 2003-04-10 |
Family
ID=27500337
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA002429587A Abandoned CA2429587A1 (fr) | 2000-11-20 | 2001-11-20 | Systemes et procedes pour interdire l'utilisation non autorisee d'un contenu numerique |
Country Status (4)
Country | Link |
---|---|
EP (1) | EP1393145A2 (fr) |
AU (2) | AU2002219852B2 (fr) |
CA (1) | CA2429587A1 (fr) |
WO (2) | WO2003029939A2 (fr) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7752139B2 (en) | 2005-12-27 | 2010-07-06 | Michael Noel Hu | Method and system for managing software licenses and reducing unauthorized use of software |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7681046B1 (en) | 2003-09-26 | 2010-03-16 | Andrew Morgan | System with secure cryptographic capabilities using a hardware specific digital secret |
US7694151B1 (en) | 2003-11-20 | 2010-04-06 | Johnson Richard C | Architecture, system, and method for operating on encrypted and/or hidden information |
WO2014153762A1 (fr) * | 2013-03-28 | 2014-10-02 | Irdeto B.V. | Génération d'un identificateur |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
PT885417E (pt) * | 1996-02-09 | 2002-11-29 | Digital Privacy Inc | Sistema de controlo/criptografia de acesso |
US5754647A (en) * | 1996-03-27 | 1998-05-19 | United Microelectronics Corporation | Software protection apparatus and the method of protection utilizing read-write memory means having inconsistent input and output data |
WO1998044402A1 (fr) * | 1997-03-27 | 1998-10-08 | British Telecommunications Public Limited Company | Protection de donnees contre la copie |
WO1998054713A1 (fr) * | 1997-05-30 | 1998-12-03 | Ç-Dilla Limited | Procede visant a assurer une protection contre les copies d'un support d'enregistrement, support d'enregistrement protege contre les copies et moyen de detection des informations de commande d'acces |
-
2001
- 2001-11-20 EP EP01274516A patent/EP1393145A2/fr not_active Ceased
- 2001-11-20 CA CA002429587A patent/CA2429587A1/fr not_active Abandoned
- 2001-11-20 WO PCT/US2001/044045 patent/WO2003029939A2/fr not_active Application Discontinuation
- 2001-11-20 AU AU2002219852A patent/AU2002219852B2/en not_active Ceased
- 2001-11-20 WO PCT/US2001/043300 patent/WO2002043465A2/fr not_active Application Discontinuation
- 2001-11-20 AU AU2002239280A patent/AU2002239280A1/en not_active Abandoned
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7752139B2 (en) | 2005-12-27 | 2010-07-06 | Michael Noel Hu | Method and system for managing software licenses and reducing unauthorized use of software |
Also Published As
Publication number | Publication date |
---|---|
AU2002219852B2 (en) | 2007-11-01 |
WO2003029939A2 (fr) | 2003-04-10 |
WO2002043465A2 (fr) | 2002-06-06 |
WO2003029939A3 (fr) | 2003-11-06 |
EP1393145A2 (fr) | 2004-03-03 |
AU2002239280A1 (en) | 2002-06-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8261359B2 (en) | Systems and methods for preventing unauthorized use of digital content | |
US7565697B2 (en) | Systems and methods for preventing unauthorized use of digital content | |
US8844048B2 (en) | Systems and methods for the prevention of unauthorized use and manipulation of digital content | |
AU2001292910A1 (en) | Systems and methods for preventing unauthorized use of digital content | |
Salamat et al. | Orchestra: intrusion detection using parallel execution and monitoring of program variants in user-space | |
Bhatkar et al. | Address obfuscation: An efficient approach to combat a broad range of memory error exploits | |
AU2002305490A1 (en) | Systems and methods for the prevention of unauthorized use and manipulation of digital content | |
Boyd et al. | On the general applicability of instruction-set randomization | |
Landwehr et al. | A taxonomy of computer program security flaws, with examples | |
Sze et al. | A portable user-level approach for system-wide integrity protection | |
AU2002219852B2 (en) | Systems and methods for preventing unauthorized use of digital content | |
Salamat | Multi-Variant Execution: Run-Time Defense against Malicious Code Injection Attacks DISSERTATION | |
AU2002219852A1 (en) | Systems and methods for preventing unauthorized use of digital content | |
EP1637959A2 (fr) | Systèmes et procédés pour empêcher lýutilisation non autorisée de contenus numériques | |
AU2010202883B2 (en) | Systems and Methods for Preventing Unauthorized Use of Digital Content | |
AU2008200472A1 (en) | Systems and methods for preventing unauthorized use of digital content related applications | |
Saffaf | Malware Analysis | |
Marco et al. | Emerging Trends in ICT Security: Chapter 21. Security through Emulation-Based Processor Diversification | |
Opfer et al. | 1st Kassel Student Workshop on Security in Distributed Systems | |
Sotirios | Advanced Persistent Threats (Format String, Structured Exception Handler & Race Condition Vulnerabilities) | |
Pettersson | Visualizing Endpoint Security Technologies using Attack Trees |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
EEER | Examination request | ||
FZDE | Discontinued |
Effective date: 20160810 |