CA2429587A1 - Systemes et procedes pour interdire l'utilisation non autorisee d'un contenu numerique - Google Patents

Systemes et procedes pour interdire l'utilisation non autorisee d'un contenu numerique Download PDF

Info

Publication number
CA2429587A1
CA2429587A1 CA002429587A CA2429587A CA2429587A1 CA 2429587 A1 CA2429587 A1 CA 2429587A1 CA 002429587 A CA002429587 A CA 002429587A CA 2429587 A CA2429587 A CA 2429587A CA 2429587 A1 CA2429587 A1 CA 2429587A1
Authority
CA
Canada
Prior art keywords
data
content
archive
file
digital content
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
CA002429587A
Other languages
English (en)
Inventor
Richard B. Levine
Andrew R. Lee
Daniel G. Howard
Daniel M. Goldman
John J. Hart, Iii
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SCA IPLA Holdings Inc
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US09/960,610 external-priority patent/US7565697B2/en
Application filed by Individual filed Critical Individual
Publication of CA2429587A1 publication Critical patent/CA2429587A1/fr
Abandoned legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/14Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]

Abstract

Le vol, la distribution et la piraterie d'un contenu numérique (logiciel, livres électroniques, vidéo, audio, tout contenu de n'importe quel type stocké et distribué numériquement) se traduisent généralement par sa copie éventuelle, ou s'il est protégé contre toute forme de copie, cette piraterie est basée sur un nombre de techniques d'ingénierie inverse. Mis à part la copie ordinaire d'un contenu non protégé, tous ces autres procédés nécessitent d'abord une compréhension du ou des mécanismes de protection du contenu, puis une modification non autorisée de cette protection afin de la désactiver. Les procédés qui interdisent à un individu qualifié d'utiliser des outils et des techniques d'ingénierie inverse pour obtenir e niveau de compréhension et/ou interdire quiconque d'effectuer ces modifications peuvent offrir des avantages considérables aux créateurs de contenus souhaitant protéger leurs produits.
CA002429587A 2000-11-20 2001-11-20 Systemes et procedes pour interdire l'utilisation non autorisee d'un contenu numerique Abandoned CA2429587A1 (fr)

Applications Claiming Priority (9)

Application Number Priority Date Filing Date Title
US24994600P 2000-11-20 2000-11-20
US60/249,946 2000-11-20
US26070501P 2001-01-10 2001-01-10
US60/260,705 2001-01-10
US28530001P 2001-04-20 2001-04-20
US60/285,300 2001-04-20
US09/960,610 US7565697B2 (en) 2000-09-22 2001-09-21 Systems and methods for preventing unauthorized use of digital content
US09/960,610 2001-09-21
PCT/US2001/044045 WO2003029939A2 (fr) 2000-11-20 2001-11-20 Systemes et procedes pour interdire l'utilisation non autorisee d'un contenu numerique

Publications (1)

Publication Number Publication Date
CA2429587A1 true CA2429587A1 (fr) 2003-04-10

Family

ID=27500337

Family Applications (1)

Application Number Title Priority Date Filing Date
CA002429587A Abandoned CA2429587A1 (fr) 2000-11-20 2001-11-20 Systemes et procedes pour interdire l'utilisation non autorisee d'un contenu numerique

Country Status (4)

Country Link
EP (1) EP1393145A2 (fr)
AU (2) AU2002219852B2 (fr)
CA (1) CA2429587A1 (fr)
WO (2) WO2003029939A2 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7752139B2 (en) 2005-12-27 2010-07-06 Michael Noel Hu Method and system for managing software licenses and reducing unauthorized use of software

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7681046B1 (en) 2003-09-26 2010-03-16 Andrew Morgan System with secure cryptographic capabilities using a hardware specific digital secret
US7694151B1 (en) 2003-11-20 2010-04-06 Johnson Richard C Architecture, system, and method for operating on encrypted and/or hidden information
WO2014153762A1 (fr) * 2013-03-28 2014-10-02 Irdeto B.V. Génération d'un identificateur

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
PT885417E (pt) * 1996-02-09 2002-11-29 Digital Privacy Inc Sistema de controlo/criptografia de acesso
US5754647A (en) * 1996-03-27 1998-05-19 United Microelectronics Corporation Software protection apparatus and the method of protection utilizing read-write memory means having inconsistent input and output data
WO1998044402A1 (fr) * 1997-03-27 1998-10-08 British Telecommunications Public Limited Company Protection de donnees contre la copie
WO1998054713A1 (fr) * 1997-05-30 1998-12-03 Ç-Dilla Limited Procede visant a assurer une protection contre les copies d'un support d'enregistrement, support d'enregistrement protege contre les copies et moyen de detection des informations de commande d'acces

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7752139B2 (en) 2005-12-27 2010-07-06 Michael Noel Hu Method and system for managing software licenses and reducing unauthorized use of software

Also Published As

Publication number Publication date
AU2002219852B2 (en) 2007-11-01
WO2003029939A2 (fr) 2003-04-10
WO2002043465A2 (fr) 2002-06-06
WO2003029939A3 (fr) 2003-11-06
EP1393145A2 (fr) 2004-03-03
AU2002239280A1 (en) 2002-06-11

Similar Documents

Publication Publication Date Title
US8261359B2 (en) Systems and methods for preventing unauthorized use of digital content
US7565697B2 (en) Systems and methods for preventing unauthorized use of digital content
US8844048B2 (en) Systems and methods for the prevention of unauthorized use and manipulation of digital content
AU2001292910A1 (en) Systems and methods for preventing unauthorized use of digital content
Salamat et al. Orchestra: intrusion detection using parallel execution and monitoring of program variants in user-space
Bhatkar et al. Address obfuscation: An efficient approach to combat a broad range of memory error exploits
AU2002305490A1 (en) Systems and methods for the prevention of unauthorized use and manipulation of digital content
Boyd et al. On the general applicability of instruction-set randomization
Landwehr et al. A taxonomy of computer program security flaws, with examples
Sze et al. A portable user-level approach for system-wide integrity protection
AU2002219852B2 (en) Systems and methods for preventing unauthorized use of digital content
Salamat Multi-Variant Execution: Run-Time Defense against Malicious Code Injection Attacks DISSERTATION
AU2002219852A1 (en) Systems and methods for preventing unauthorized use of digital content
EP1637959A2 (fr) Systèmes et procédés pour empêcher lýutilisation non autorisée de contenus numériques
AU2010202883B2 (en) Systems and Methods for Preventing Unauthorized Use of Digital Content
AU2008200472A1 (en) Systems and methods for preventing unauthorized use of digital content related applications
Saffaf Malware Analysis
Marco et al. Emerging Trends in ICT Security: Chapter 21. Security through Emulation-Based Processor Diversification
Opfer et al. 1st Kassel Student Workshop on Security in Distributed Systems
Sotirios Advanced Persistent Threats (Format String, Structured Exception Handler & Race Condition Vulnerabilities)
Pettersson Visualizing Endpoint Security Technologies using Attack Trees

Legal Events

Date Code Title Description
EEER Examination request
FZDE Discontinued

Effective date: 20160810