USRE40702E1 - Method for securing video images - Google Patents

Method for securing video images Download PDF

Info

Publication number
USRE40702E1
USRE40702E1 US11/418,555 US41855506A USRE40702E US RE40702 E1 USRE40702 E1 US RE40702E1 US 41855506 A US41855506 A US 41855506A US RE40702 E USRE40702 E US RE40702E
Authority
US
United States
Prior art keywords
video memory
video
image
hardware
locking
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
US11/418,555
Inventor
Carlos Pizano
Gregory Heileman
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xylon LLC
Hanger Solutions LLC
Original Assignee
Visual Advances LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Visual Advances LLC filed Critical Visual Advances LLC
Priority to US11/418,555 priority Critical patent/USRE40702E1/en
Assigned to VISUAL ADVANCES LLC reassignment VISUAL ADVANCES LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: ELISAR SOFTWARE CORPORATION
Assigned to ELISAR SOFTWARE CORPORATION, INC. reassignment ELISAR SOFTWARE CORPORATION, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: HEILEMAN, GREGORY L., PIZANO, CARLOS E.
Application granted granted Critical
Publication of USRE40702E1 publication Critical patent/USRE40702E1/en
Assigned to XYLON LLC reassignment XYLON LLC MERGER (SEE DOCUMENT FOR DETAILS). Assignors: VISUAL ADVANCES LLC
Anticipated expiration legal-status Critical
Assigned to HANGER SOLUTIONS, LLC reassignment HANGER SOLUTIONS, LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: INTELLECTUAL VENTURES ASSETS 161 LLC
Expired - Lifetime legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
    • H04N21/44004Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video buffer management, e.g. video decoder buffer or video display buffer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/16Analogue secrecy systems; Analogue subscription systems
    • H04N7/162Authorising the user terminal, e.g. by paying; Registering the use of a subscription channel, e.g. billing
    • H04N7/163Authorising the user terminal, e.g. by paying; Registering the use of a subscription channel, e.g. billing by receiver means only

Definitions

  • the present invention relates to the field of displaying digital images on a computer, and in particular to the protection of these images from unauthorized copying.
  • One of the fundamental problems associated with making multimedia content is the inability of stopping anyone who accesses the content from copying it, and subsequently distributing it to others.
  • multimedia content e.g., digital images, digital video, and digital audio
  • a user can press the right mouse button while a multimedia object in the browser is selected, and they are then given the option of saving this object.
  • the Microsoft Windows® 95, 98, or NT operating systems generally allow a user to perform a “screen capture”, saving a copy of whatever is displayed on the screen.
  • the sole mode of copy protection once the image has been decrypted requires the use of windows hooks as means to protect the images in disk and video memory.
  • the present invention does not rely or require any kind of hook mechanism. Hook global mechanisms are not favored in environments where process security is important.
  • the present invention uses direct manipulation of video memory that will bypass hook mechanisms.
  • Mast requires that the applications that use the protection provided by said invention, be modified to link and make calls into the protection DLL (BITBLOCK.DLL).
  • the protection DLL must make the calls to the protected applications.
  • the present invention does not require other programs to be modified to accommodate the means of protection.
  • the present invention does not rely on calls to other applications to provide the means of protection.
  • the means of protection relies solely on calls to operating system-level services.
  • Mast also requires the protection DLL (BITBLOCK.DLL) to install a callback function into the Microsoft Windows 3.1® BitBlt() GDI function hook chain.
  • the present invention does not make use of protection DLLs, nor does it use callback functions to provide means of protection.
  • the Mast invention requires a device driver and a means for intercepting memory read requests.
  • the present invention does not rely or require device drivers or other standalone decryption services, although it can be implemented using them. Decryption is provided as a routine embedded in the application.
  • the general goal of the present invention is to allow multimedia content providers to make their intellectual property (i.e., their images) publicly available, while at the same time preventing those who view these images from copying them.
  • the present invention prevents the image from being copied or screen captured.
  • users attempt to view the image from “outside” the secure viewer, they will only see the noise-like encrypted content.
  • the secure viewer will allow a user to copy an image, but only if the user possesses a secret key necessary to decrypt the image. This gives content owners the ability to control who is able to save their images. Note that this approach is quite different from the manner in which secure containers are used.
  • the present invention details how operating system services or custom device drivers can be used to gain direct control of video hardware.
  • the Microsoft Windows® 95/98/NT platforms it uses the services of DirectX® to directly manipulate and control the video hardware.
  • Other embodiments are possible, as described below.
  • a method of securing video images in computer systems provides a method of allowing copies of images to be made only with authorization.
  • the preferred method of preventing illicit copying of a displayed image from a computer video memory comprises the steps of decoding a proprietary image format into video memory, controlling video hardware and locking video memory and displaying the image.
  • the preferred step of decoding a proprietary image format into video memory comprises decrypting a previously encrypted image using a secret key.
  • the preferred step of controlling video hardware and locking video memory comprises the substeps of obtaining exclusive cooperative control of the video hardware, allocating video memory, locking video hardware and issuing pending video hardware operations, and destroying an image displayed in video memory via pending video hardware operations if an attempt is made to unlock video memory.
  • the preferred substep of obtaining exclusive cooperative control of the video hardware comprises issuing video hardware control DirectX® calls.
  • An alternative substep of obtaining exclusive cooperative control of the video hardware comprises a first set of calls to a video device driver.
  • the preferred substep of allocating video memory comprises creating at least one display surface.
  • the preferred substep of locking video hardware and issuing pending video hardware operations comprises issuing video hardware locking and issuing pending hardware operation DirectX® calls.
  • the alternative substep of locking video hardware and issuing pending video hardware operations comprises a second set of calls to a video device driver.
  • the preferred substep of destroying the image via pending video hardware operations if an attempt is made to unlock video memory comprises execution of pending video hardware operations.
  • the preferred step of displaying the image comprises the steps of decoding a native image file format, verifying an image file using a check sum method, if the image file is valid, reading decrypting information from the image file and decrypting the image into video memory.
  • the preferred method of preventing illicit copying of images from a computer video memory comprises the steps of decoding a proprietary image format into video memory, controlling video hardware and locking video memory comprising the substeps of executing the following DirectX® calls:
  • the preferred method further comprises the step of creating a blank surface.
  • the preferred step of creating a blank surface comprises executing the following DirectX® calls:
  • a primary objective of the present invention is to allow multimedia content providers to make images publicly available, while at the same time preventing those who view these images from copying them without authority.
  • Another object of the present invention is to allow multimedia content providers to make selected images available to designated user groups.
  • images will be encrypted according to a key associated with the user group, and therefore only members of the user group will be able to view the selected images.
  • a second key can be provided to the user for the purpose of downloading (i.e., copying) the image if the content provider wishes to do so.
  • a primary advantage of the present invention is that it allows content providers to explicitly control not only who is able to view their images, but more importantly, who is able to copy them.
  • Another advantage of the present invention is that it can be used to make potentially offensive images “non-viewable” to certain users.
  • the required viewing key can be supplied to a user once he has indicated that he would like to view the material, the content provider has verified some claim (e.g., proof of age), etc.
  • Such protocols are easily incorporated into the present invention.
  • the present invention can be used to protect the confidentially of sensitive or personal information, such as medical x-rays, or classified images.
  • Yet another advantage is that the invention can allow the viewing of images to be time-locked, allowing the image to be viewed for a prescribed period of time.
  • FIG. 1 is a flowchart describing a prior art image protection system
  • FIG. 2 is a flowchart describing the processes used to display an image
  • FIG. 3 is a flowchart depicting how the invention prevents image capture.
  • the basic capabilities offered by the secure viewer are that (1) viewing of an image can be restricted to specific users, (2) it is screen capture resistant, and (3) users are only allowed to save an image after they have ben given explicit permission to do so.
  • DC Using the DC, an application is able to issue draw commands, text commands, bitmap commands, along with many other display-related functions.
  • this code will copy the entire screen contents (i.e., video memory) into an application-owned memory region pointed to by the variable hdcCompatible. Once this is accomplished, the application can proceed to save to disk the memory region containing the screen contents as a bitmap or in any other image file format.
  • the first is to monitor all running applications, intercepting any read requests that attempt to access video memory (as is disclosed in Mast, U.S. Pat. No. 5,881,287). This is a cumbersome solution to the problem. For example, Mast involves intercepting all memory transfers, an then evaluating if the requesting application has the right to access the memory. This will adversely affect the running time of any program, and would significantly slow down a data intensive program (even if it does not access video memory).
  • a second approach is the present invention.
  • Start “enabled”program 60 indicates that all application programs wishing to protect the contents of video memory must be enabled. That is, the program must be instrumented with code that enables it to call the BITBLOCK dynamic link library.
  • the application programs must provide a callback function, and register it with the BITBLOCK dynamic link library. The regions of memory that an application program wishes to protect are specified in this callback function.
  • the BITBLOCK dynamic link library monitors all memory requests 62 , checking to determine whether any of them are BITBLT operations 64 attempting to access video memory.
  • the BITBLOCK dynamic link library checks to see it has any registered callback functions 66 . If there are no registered callback functions, the video memory transfer is allowed to perform a BITBLT from source region to destination region 68 ; otherwise, the BITBLOCK dynamic link library calls all callback functions to determine the protected regions 70 in video memory. If the required video memory access falls in the protected region 70 , the BITBLOCK replaces the destination memory with a fill pattern 72 .
  • the present embodiment of the invention takes advantage of the DirectX® extensions to get full and exclusive control of the video memory. Measures are taken by the invention to display images, and at the same time block any other application from performing a screen capture. The specific details of how this is accomplished are described below, but first a discussion is required on definitional terminology related to DirectX®:
  • the memory used to represent a surface can exist either in display RAM or in system RAM.
  • Flippable surface These are surfaces that allow page flipping, a technique where the contents of an entire surface are made visible instantaneously through a hardware operation.
  • a flippable surface is actually two surfaces, one that is visible and once that is not.
  • the non-visible surface is called back buffer. When a page flip occurs, the surface that was previously a back buffer becomes visible, and the surface that was previously visible becomes the back buffer.
  • Primary Surface The portion of video RAM that is visible on the screen. Primary surfaces must reside on video RAM Primary surfaces are usually flippable surfaces.
  • Lock A lock exists when a program is granted unrestricted direct access to a primary surface as if it were a local memory block. During a lock, no other program or even the operating system can access the locked surface.
  • Page Flip The action of swapping the primary and the back buffer surfaces. This is accomplished using video hardware and is therefore very fast. Only surfaces that are not locked can be swapped.
  • Cooperative Level Generic term for the level of control that the application has over the video or display hardware.
  • Exclusive cooperative level means that the application has full control of the display hardware, and can change display modes as well as the system-wide palette.
  • the flowchart shown in FIG. 2 describes the processes used by the secure viewer in order to display an image.
  • the secure viewer program 10 is executed.
  • a secure image viewable (SIV) image is selected for viewing. At least some portion of a SIV image is encrypted, and all information necessary to decrypt the image (except the secret key) is encoded in the SIV image.
  • all SIV images contain authentication information that is used to determine if an image has been modified since its creation.
  • the secure viewer application first requests exclusive cooperative control of the video hardware 12 . Specifically, the program determines whether or not it can take control of the video hardware. If this cannot be obtained, the secure viewer application terminates, without displaying the image 14 .
  • the program attempts to read the appropriate information from the SIV image 16 necessary to decrypt it.
  • This step includes the authentication information. If the decrypting information can be obtained from the image, and the SIV file passes the authentication 18 , then the file is decrypted 20 ; otherwise, it is not (this allows non-SIV images to be viewed using the secure viewer) and commands are issued to create primary and back buffer surfaces 22 in the video card memory, and video display hardware is adjusted for viewing 24 . Next, the image is copied into the back buffer surface, and the local memory copy of the image is destroyed 26 . After this a page flip command is issued to the video hardware 28 , which moves the image to the primary surface and makes the image viewable on the display device.
  • a command is issued to lock the primary surface, along with an additional command that access the video hardware 30 (more than one command can be issued). Since the primary surface is locked, the command will not be immediately executed, but will remain pending in a queue. The choice of the command is very important.
  • the BLTFAST command is used, which acts to clear the video memory containing the image. This command is hardware accelerated, so that the clearing of video memory occurs very fast, in particular, faster than any software program that might try to capture the encrypted image (the specific sequence of steps are described in FIG. 3 ).
  • user input is accepted 32 . The details of this step are expanded in FIG. 3 .
  • FIG. 3 the specific steps used by the secure viewers in order to provide security to an image as it is being displayed are shown.
  • an image is displayed using the secure viewer 40 .
  • the user is able to interact with the secure viewer program via a user interface 42 , the program will then process the input 44 that allows the user to perform various functions such as changing the image resolution, reading information about the author of the image, saving the image (if they possess the correct key), etc.
  • other applications may be executed 46 concurrently while the secure viewer is displaying an image (these programs, as well as the secure viewer, are managed by the operating system). The secure viewer does not interfere with these other applications, unless they attempt to unlock the primary surface 48 .
  • the pending page flip command is executed followed by the BLTFAST command, clearing the contents of video memory 50 . During these operations, all other access to video memory is preempted. Only after the pending commands are executed will the primary surface be made available to the requesting application 52 .
  • the present invention involves securing a queued (or suspended) video hardware operation into a list of pending video operations. This is done in such a way that when another running program tries to read the video memory, the queued operation executes and destroys the information contained in the video memory, thereby stopping the application from coping the displayed image. Notice that a program running concurrently with the present invention is not affected unless it tries to access video memory. In this sense, the present invention is “passive”, unlike the prior art.
  • Windows® 95,98, and NT all provide the ability to perform screen capture by simply pressing the “Print Screen” key.
  • the operating system itself captures the screen and conveniently places it in the clipboard where the user may access and copy it.
  • the present invention can effectively protect from both operating system-level and application-level screen captures by means of queuing operations to the video card.
  • the preferred embodiment is a user-level program. If it does not, the preferred embodiment is by a combination of a kernel-mode device driver and a user level program.
  • the present embodiment uses Microsoft DirectX® to obtain user-level direct video memory access. Thus, it does not require the use of a device driver other than the standard ones available in Windows® 95/98/NT operating environments.
  • exclusive control of video hardware is obtained by executing the following DirectX® calls using Windows® 95/98/NT (or any system supporting DirectX®):
  • Line 1 declares two pointer variables to the DirectDraw (a subsystem of DirectX®) interface called DirectXhandle 1 and DirectXhandle 2 .
  • the DirectXhandle 1 pointer is initialized with respect to a specific video driver (VideoID in this case). If a DirectXhandle 1 is a valid pointer, then the call to the Queryinterface function in line 3 will initialize the pointer DirectXhandle 2 to the address of the DirectDraw 2 interface.
  • exclusive control of the video hardware is requested, along with full screen viewing. If another application currently has exclusive control of the video hardware, this call will fail. If for this reason, or any other reason, the SetCooperativeLevel call fails to obtain exclusive control of the hardware, the secure viewer application will terminate without displaying the said image.
  • video memory is allocated by executing the following DirectX® calls:
  • DirectX® specific pointers variables are declared.
  • a specific type of surface is specified.
  • the flag DDSCAPS_PRIMARYSURFACE indicates that the created surface will be displayed
  • the flag DDSCAPS_FLIP indicates that this surface may be flipped
  • the flag DDSCAPS_COMPLEX indicates that one or more back surfaces can be attached to the primary surface.
  • a request for one back surface is specified.
  • surfaces are created according to the specifications given in lines 4 and 5.
  • the primary surface is used to obtain a pointer to the back surface.
  • an image is displayed by performing the following steps:
  • video hardware is locked by executing the following DirectX® call:
  • This call will lock the primary surface preventing any other running thread from accessing this surface until a command is issued to unlock the surface.
  • pending video hardware operations are issued using the following DirectX® calls:
  • the DDFLIP_WAIT and DDBLTFAST_WAIT parameters will cause the operations to remain pending in the queue.
  • the blank_surface variable in line 2 points to a blank surface containing all zeros (black) or an alternative image. This surface is created in a manner similar to the way that the primary and back surfaces when created. Note that these operations will not be executed until the primary surface is unlocked (e.g., by a screen capture program).

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Storage Device Security (AREA)

Abstract

A method for protecting the video memory on a computer system from being illicitly copied. The invention decrypts a previously encrypted image and displays it on the video screen. During the time the image is displayed, the invention protects it from being copied by other running applications. This is accomplished in multithreaded operating systems by first issuing a multithreaded locking primitive to the video memory resource, and then inserting a pending video hardware request that will take precedence over any subsequent video memory access requests. The pending request serves the purpose of destroying the contents of video memory. The pending request is passive in that it does not execute unless a malicious program has removed the video memory lock.

Description

BACKGROUND OF THE INVENTION
1. Field of the Invention (Technical Field)
The present invention relates to the field of displaying digital images on a computer, and in particular to the protection of these images from unauthorized copying.
2. Background Art
One of the fundamental problems associated with making multimedia content (e.g., digital images, digital video, and digital audio) publicly available over the global internet is the inability of stopping anyone who accesses the content from copying it, and subsequently distributing it to others. For example, using the Microsoft Internet Explorer® or the Netscape Navigator® browsers, a user can press the right mouse button while a multimedia object in the browser is selected, and they are then given the option of saving this object. Furthermore, in the case of the digital images, the Microsoft Windows® 95, 98, or NT operating systems generally allow a user to perform a “screen capture”, saving a copy of whatever is displayed on the screen. In these operating systems, this is accomplished by pressing the “Print Screen” button on the computer keyboard, thereby saving a bit-mapped image of the computer screen in a “clipboard”. The clipboard can then be “passed” into image processing applications that can manipulate the bit-mapped image, allowing one to save selected regions of the bit-map. In addition, there are a number of software applications that provide more sophisticated image capture capabilities, including “HyperSnap-Dx”, G. Koshaniak, and “Capture Professional”. Recently, a number of products related to the idea of a “secure container” have been proposed, including DigiBox™ by InterTrust Technologies Corporation, “The DigiBox: A Self-Protecting Container for Electronic Commerce”, O. Sibert, Dbernstein, and D. Van Wie, USENIX 1995 Electronic Commerce Workshop, and Cryptolopes® by the IBM Corporation, “Cryptolope Containers”. The generic idea involves encapsulating encrypted digital content, along with a set of rules for decrypting the content, within the secure container. Users are only allowed to decrypt specific pieces of the content, as specified by the rules, once they have obtained authority for doing so. Typically, access to the encrypted content is controlled via a “key exchange” over a separate channel to each user (e.g., Cryptolope® uses RSA public key encryption). If the proper authority is granted to a user, then that user is able to use their specific key to “unlock” portions of the content, thereby obtaining a “clear view” of the content. This same concept can be extended to groups of users.
With respect to images, secure containers prevent a protected image from being viewed until a user is given the proper authority. Once the image is viewable; however, secure containers do not specifically prevent the image from being copied using screen capture programs. To address this problem, a number of “countermeasures” have been employed by content providers in order to discourage illicit copying of images once they are in “clear view”. These include placing visible watermarks in an image, or only making a “low resolution” version of the image available for viewing. However, each of these approaches is lacking in one way or another. For example, visible watermarks are in general easily removed using simple image processing operations, and in both of the cases cited above, the prospective buyer does not get to view the image they may wish to buy. Ideally, a consumer should be able to view the actual content they are contemplating purchasing, but they should not be able to download this content unless the owner of the content has granted permission to do so.
An example of the present methodology for securing video images is in U.S. Pat. No. 5,881,287 to Mast, entitled Method and Apparatus for Copy Protection of Images in a Computer System. However, as can be seen, there are several deficiencies in the Mast patent. The embodiment in Mast discloses a library, plus a set of installed services to be used by other applications. The present invention is an application. The copy protection is provided to the image files, not as a run-time service to other applications. Additionally, The present invention does not require the presence or installation of services or other applications other than provided by the operating system-level components.
In the Mast patent, the sole mode of copy protection once the image has been decrypted, requires the use of windows hooks as means to protect the images in disk and video memory. The present invention does not rely or require any kind of hook mechanism. Hook global mechanisms are not favored in environments where process security is important. The present invention uses direct manipulation of video memory that will bypass hook mechanisms. Mast requires that the applications that use the protection provided by said invention, be modified to link and make calls into the protection DLL (BITBLOCK.DLL). In addition, the protection DLL must make the calls to the protected applications. The present invention does not require other programs to be modified to accommodate the means of protection. In addition, the present invention does not rely on calls to other applications to provide the means of protection. The means of protection relies solely on calls to operating system-level services.
Mast also requires the protection DLL (BITBLOCK.DLL) to install a callback function into the Microsoft Windows 3.1® BitBlt() GDI function hook chain. The present invention does not make use of protection DLLs, nor does it use callback functions to provide means of protection. The Mast invention requires a device driver and a means for intercepting memory read requests. The present invention does not rely or require device drivers or other standalone decryption services, although it can be implemented using them. Decryption is provided as a routine embedded in the application.
The general goal of the present invention is to allow multimedia content providers to make their intellectual property (i.e., their images) publicly available, while at the same time preventing those who view these images from copying them. Specifically, during the time an image is viewable, the present invention prevents the image from being copied or screen captured. Thus, if users attempt to view the image from “outside” the secure viewer, they will only see the noise-like encrypted content. Under specific conditions, the secure viewer will allow a user to copy an image, but only if the user possesses a secret key necessary to decrypt the image. This gives content owners the ability to control who is able to save their images. Note that this approach is quite different from the manner in which secure containers are used. In particular, under a specific viewing mode (and assuming the image is encrypted for this mode) a user can always view the image; however, they are never able to copy it. This security is accomplished in the secure viewer by directly controlling the client system output devices. Specifically, the present invention details how operating system services or custom device drivers can be used to gain direct control of video hardware. In its present embodiment in the Microsoft Windows® 95/98/NT platforms, it uses the services of DirectX® to directly manipulate and control the video hardware. Other embodiments are possible, as described below.
SUMMARY OF THE INVENTION (DISCLOSURE OF THE INVENTION)
In accordance with the present invention, there is provided a method of securing video images in computer systems. The invention provides a method of allowing copies of images to be made only with authorization. The preferred method of preventing illicit copying of a displayed image from a computer video memory comprises the steps of decoding a proprietary image format into video memory, controlling video hardware and locking video memory and displaying the image. The preferred step of decoding a proprietary image format into video memory comprises decrypting a previously encrypted image using a secret key. The preferred step of controlling video hardware and locking video memory comprises the substeps of obtaining exclusive cooperative control of the video hardware, allocating video memory, locking video hardware and issuing pending video hardware operations, and destroying an image displayed in video memory via pending video hardware operations if an attempt is made to unlock video memory. The preferred substep of obtaining exclusive cooperative control of the video hardware comprises issuing video hardware control DirectX® calls. An alternative substep of obtaining exclusive cooperative control of the video hardware comprises a first set of calls to a video device driver. The preferred substep of allocating video memory comprises creating at least one display surface. The preferred substep of locking video hardware and issuing pending video hardware operations comprises issuing video hardware locking and issuing pending hardware operation DirectX® calls. The alternative substep of locking video hardware and issuing pending video hardware operations comprises a second set of calls to a video device driver. The preferred substep of destroying the image via pending video hardware operations if an attempt is made to unlock video memory comprises execution of pending video hardware operations. The preferred step of displaying the image comprises the steps of decoding a native image file format, verifying an image file using a check sum method, if the image file is valid, reading decrypting information from the image file and decrypting the image into video memory.
The preferred method of preventing illicit copying of images from a computer video memory comprises the steps of decoding a proprietary image format into video memory, controlling video hardware and locking video memory comprising the substeps of executing the following DirectX® calls:
    • LPDIRECTDRAW DirectXhandle1, DirectXhandle2;
    • DirectDrawCreate(VideoID, &DirectXhandle, 0);
    • DirectXhandle1→Queryinterface(IID_IDirectDraw2, (void**)DirectXhandle2);
    • DirectXhandle2→SetCooperativeLevel(WindowHandle, DDSCL_EXCLUSIVE|DDSCL_FULLSCREEN);
      obtaining exclusive cooperative control of the video hardware, allocating video memory comprising the substeps of executing the following DirectX® calls:
    • LPDIRECTDRAWSURFACE primary_surface, back_surface, blank_surface;
    • DDSURFACEDESC surface_descriptor;
    • DDSCAPS surface_capabilities;
    • surface_descriptor.ddsCaps.dwCaps=DDSCAPS_PRIMARYSURFACE|
    • DDSCAPS_FLIP|DDSCAPS_COMPLEX;
    • surface_descriptor.dwBackbufferCount=1;
    • DirectXhandle2→CreateSurface(&surface_descriptor, &primary_surface, 0);
    • primary_surface→GetAftachedSurface(&surface_capabilities, &back_surface);
      locking video hardware and issuing pending video hardware operations comprising the substeps of executing the following DirectX® call:
    • primary_surface→Lock(0, &surface_descriptor, DDLOCK_WAIT|
    • DDLOCK_WRITEONLY, 0)
      destroying an image via pending video hardware operations if an attempt is made to unlock video memory comprising the substeps of issuing the following DirectX® calls:
    • primary_surface→Flip(0, DDFLIP_WAIT);
    • back_surface→BItFast(0, 0, blank_surface, 0, DDBLTFAST_WAIT).
The preferred method further comprises the step of creating a blank surface. The preferred step of creating a blank surface comprises executing the following DirectX® calls:
    • LPDIRECTDRAWSURFACE blank_surface;
    • DDSURFACEDESC surface_descriptor;
    • surface_descriptor.ddsCaps.dwCaps=DDSCAPS_PRIMARYSURFACE;
    • DirectXhandle2→CreateSurface(&surface_descriptor, &blank_surface, 0);
A primary objective of the present invention is to allow multimedia content providers to make images publicly available, while at the same time preventing those who view these images from copying them without authority.
Another object of the present invention is to allow multimedia content providers to make selected images available to designated user groups. In this case, images will be encrypted according to a key associated with the user group, and therefore only members of the user group will be able to view the selected images. A second key can be provided to the user for the purpose of downloading (i.e., copying) the image if the content provider wishes to do so.
A primary advantage of the present invention is that it allows content providers to explicitly control not only who is able to view their images, but more importantly, who is able to copy them.
Another advantage of the present invention is that it can be used to make potentially offensive images “non-viewable” to certain users. For example, the required viewing key can be supplied to a user once he has indicated that he would like to view the material, the content provider has verified some claim (e.g., proof of age), etc. Such protocols are easily incorporated into the present invention. In addition, the present invention can be used to protect the confidentially of sensitive or personal information, such as medical x-rays, or classified images.
Yet another advantage is that the invention can allow the viewing of images to be time-locked, allowing the image to be viewed for a prescribed period of time.
Other objects, advantages, and novel features, and further scope of applicability of the present invention will be set forth in part in the detailed description to follow, taken in conjunction with the accompanying drawings, and in part will become apparent to those skilled in the art upon examination of the following, or may be learned by practice of the invention. The objects and advantages of the invention may be realized and attained by means of the instrumentalities and combinations particularly pointed out in the appended claims.
BRIEF DESCRIPTION OF THE DRAWINGS
The accompanying drawings, which are incorporated into and form a part of the specification, illustrate several embodiments of the present invention and, together with the description, serve to explain the principles of the invention. The drawings are only for the purpose of illustrating a preferred embodiment of the invention and are not to be construed as limiting the invention. In the drawings:
FIG. 1 is a flowchart describing a prior art image protection system;
FIG. 2 is a flowchart describing the processes used to display an image; and
FIG. 3 is a flowchart depicting how the invention prevents image capture.
DESCRIPTION OF THE PREFERRED EMBODIMENTS (BEST MODES FOR CARRYING OUT THE INVENTION)
The basic capabilities offered by the secure viewer are that (1) viewing of an image can be restricted to specific users, (2) it is screen capture resistant, and (3) users are only allowed to save an image after they have ben given explicit permission to do so.
All modern computer operating systems are memory protected, and offer true multitasking capabilities (e.g., Microsoft Windows® 95/98/NT or any of the modern UNIX® derivative). In these operating systems, computing resources such as printers, serial ports, and the video screen are administered so as to ensure “fair” access by all user-level applications. In the particular case of Windows® 95/98/NT, normal programs output data to the screen using an operating system-level service called the Graphics Device Interface (GUI); direct access to the video memory by user-level applications is not allowed. Any application that tries to access memory outside of its own Windows® assigned memory region is terminated immediately by Windows®. Therefore, every single pixel rendered on the screen must result from commands issued to the GDI through an object called the Device Context (DC). Using the DC, an application is able to issue draw commands, text commands, bitmap commands, along with many other display-related functions. There are several types of DCs. Normal applications use a DC that is restricted to their own window area, but nothing prevents an application from asking for a special type of DC that encompasses the whole screen. For example, the following C function call, which can conceivably be executed by any application, requests a display screen handler from the GDI:
    • hdcScreen=CreateDC(“DISPLAY”, NULL, NULL, NULL);
If the GDI returns a valid handler (which will be stored in the variable hdcScreen in this example), the application is able to copy the entire screen contents using the appropriate code. The relevant C code fragment for accomplishing this is:
    • hdcCompatible=CreateCompatibleDC(hdcScreen);
    • BitBIt (hdcCompatible, 0,0, MaxX, MaxY, hdcScreen, 0,0, SRCCOPY));
Specifically, this code will copy the entire screen contents (i.e., video memory) into an application-owned memory region pointed to by the variable hdcCompatible. Once this is accomplished, the application can proceed to save to disk the memory region containing the screen contents as a bitmap or in any other image file format.
There are two known ways to protect the contents of the video memory from being “screen captured” by an application program.
The first is to monitor all running applications, intercepting any read requests that attempt to access video memory (as is disclosed in Mast, U.S. Pat. No. 5,881,287). This is a cumbersome solution to the problem. For example, Mast involves intercepting all memory transfers, an then evaluating if the requesting application has the right to access the memory. This will adversely affect the running time of any program, and would significantly slow down a data intensive program (even if it does not access video memory). A second approach is the present invention.
A flowchart describing the '287 patent is shown in FIG. 1. Start “enabled”program 60 indicates that all application programs wishing to protect the contents of video memory must be enabled. That is, the program must be instrumented with code that enables it to call the BITBLOCK dynamic link library. The application programs must provide a callback function, and register it with the BITBLOCK dynamic link library. The regions of memory that an application program wishes to protect are specified in this callback function. The BITBLOCK dynamic link library monitors all memory requests 62, checking to determine whether any of them are BITBLT operations 64 attempting to access video memory. If a BITBLT operation 64 is detected, the BITBLOCK dynamic link library checks to see it has any registered callback functions 66. If there are no registered callback functions, the video memory transfer is allowed to perform a BITBLT from source region to destination region 68; otherwise, the BITBLOCK dynamic link library calls all callback functions to determine the protected regions 70 in video memory. If the required video memory access falls in the protected region 70, the BITBLOCK replaces the destination memory with a fill pattern 72.
Specific differences between the present invention and U.S. Pat. No. 5,881,287 (Mast) are given below.
  • 1) In the '287 patent, the preferred embodiment is a library and a set of installed services (a service is a running application in the same machine that provides some functionality) to be used by the image applications.
    • a) In the present invention, the preferred embodiment is an application. The copy protection is provided to the image files via encryption, and to video memory using pending video hardware operations via direct hardware control. The Mast patent provides protection to video memory as a run-time service to other applications.
    • b) The present invention does not require the presence or installation of services or other applications other than those provided by the operating system itself. (DirectX® is part of the operating system).
  • 2) In the '287 patent, the sole mode of copy protection (besides encryption) requires the use of Windows 3.1® hooks as a means to protect the images in disk and video memory.
    • a) The present invention does not rely or require any kind of hook mechanism. Hook global mechanisms are not favored in environments where process security is important. A global hook as required in the Mast patent needs to inspect memory transactions that do not belong to the application. This will allow a given application to snoop into data associated with other applications, thereby compromising system security as a whole.
    • b) The present invention uses direct manipulation of video memory that will bypass hook mechanisms. The idea behind DirectX® is accelerated graphics by allowing the application “direct” interaction with the hardware.
  • 3) The '287 patent requires that the applications that use the protection provided by said invention must be modified to link and make calls into the protection DLL (BITBLOCKDLL). In addition, the protection of DLL must make calls to the protected applications.
    • a) Present invention does not require other programs to be modified to accommodate the means of protection.
    • b) Present invention does not rely on calls to other applications to provide the means of protection. The means for protection relies solely on calls to operating system-level services.
  • 4) The '287 patent requires the protection dynamic link library (BITBLOCKDLL) that installs a callback function into the Windows 3.1® BitBIt() GDI function hook chain. This implementation is not allowed in true multi-user computing environments (e.g., Windows NT®) as it would allow users to “snoop” in other users' applications.
    • a) The present invention does not make use of protection dynamic link libraries.
    • b) The present invention does not use callback functions to provide a means of protection.
  • 5) The '287 patent provides a similar mechanism for protecting files that requires a decrypting device driver and means for intercepting file reads. The present invention does not rely or require virtual device drivers or other standalone decryption services. Decryption is provided as a routine embedded in the application.
The present embodiment of the invention takes advantage of the DirectX® extensions to get full and exclusive control of the video memory. Measures are taken by the invention to display images, and at the same time block any other application from performing a screen capture. The specific details of how this is accomplished are described below, but first a discussion is required on definitional terminology related to DirectX®:
Surface: A rectangular portion of memory, usually containing image data. The memory used to represent a surface can exist either in display RAM or in system RAM.
Flippable surface: These are surfaces that allow page flipping, a technique where the contents of an entire surface are made visible instantaneously through a hardware operation. A flippable surface is actually two surfaces, one that is visible and once that is not. The non-visible surface is called back buffer. When a page flip occurs, the surface that was previously a back buffer becomes visible, and the surface that was previously visible becomes the back buffer.
Primary Surface: The portion of video RAM that is visible on the screen. Primary surfaces must reside on video RAM Primary surfaces are usually flippable surfaces.
Lock: A lock exists when a program is granted unrestricted direct access to a primary surface as if it were a local memory block. During a lock, no other program or even the operating system can access the locked surface.
Page Flip: The action of swapping the primary and the back buffer surfaces. This is accomplished using video hardware and is therefore very fast. Only surfaces that are not locked can be swapped.
Cooperative Level: Generic term for the level of control that the application has over the video or display hardware. Exclusive cooperative level means that the application has full control of the display hardware, and can change display modes as well as the system-wide palette.
The flowchart shown in FIG. 2 describes the processes used by the secure viewer in order to display an image. First, the secure viewer program 10 is executed. A secure image viewable (SIV) image is selected for viewing. At least some portion of a SIV image is encrypted, and all information necessary to decrypt the image (except the secret key) is encoded in the SIV image. In addition, all SIV images contain authentication information that is used to determine if an image has been modified since its creation. The secure viewer application first requests exclusive cooperative control of the video hardware 12. Specifically, the program determines whether or not it can take control of the video hardware. If this cannot be obtained, the secure viewer application terminates, without displaying the image 14. If; however, exclusive cooperative control can be obtained, then the program attempts to read the appropriate information from the SIV image 16 necessary to decrypt it. This step includes the authentication information. If the decrypting information can be obtained from the image, and the SIV file passes the authentication 18, then the file is decrypted 20; otherwise, it is not (this allows non-SIV images to be viewed using the secure viewer) and commands are issued to create primary and back buffer surfaces 22 in the video card memory, and video display hardware is adjusted for viewing 24. Next, the image is copied into the back buffer surface, and the local memory copy of the image is destroyed 26. After this a page flip command is issued to the video hardware 28, which moves the image to the primary surface and makes the image viewable on the display device. A command is issued to lock the primary surface, along with an additional command that access the video hardware 30 (more than one command can be issued). Since the primary surface is locked, the command will not be immediately executed, but will remain pending in a queue. The choice of the command is very important. In the present embodiment, the BLTFAST command is used, which acts to clear the video memory containing the image. This command is hardware accelerated, so that the clearing of video memory occurs very fast, in particular, faster than any software program that might try to capture the encrypted image (the specific sequence of steps are described in FIG. 3). Finally, user input is accepted 32. The details of this step are expanded in FIG. 3.
In FIG. 3, the specific steps used by the secure viewers in order to provide security to an image as it is being displayed are shown. Initially, an image is displayed using the secure viewer 40. The user is able to interact with the secure viewer program via a user interface 42, the program will then process the input 44 that allows the user to perform various functions such as changing the image resolution, reading information about the author of the image, saving the image (if they possess the correct key), etc. Note that other applications may be executed 46 concurrently while the secure viewer is displaying an image (these programs, as well as the secure viewer, are managed by the operating system). The secure viewer does not interfere with these other applications, unless they attempt to unlock the primary surface 48. If an application does unlock the primary surface 48, the pending page flip command is executed followed by the BLTFAST command, clearing the contents of video memory 50. During these operations, all other access to video memory is preempted. Only after the pending commands are executed will the primary surface be made available to the requesting application 52.
The present invention involves securing a queued (or suspended) video hardware operation into a list of pending video operations. This is done in such a way that when another running program tries to read the video memory, the queued operation executes and destroys the information contained in the video memory, thereby stopping the application from coping the displayed image. Notice that a program running concurrently with the present invention is not affected unless it tries to access video memory. In this sense, the present invention is “passive”, unlike the prior art.
In addition to the possibility of screen captures by application-level programs, one has to be concerned with screen capture via operating system-level mechanisms. Specifically, Windows® 95,98, and NT all provide the ability to perform screen capture by simply pressing the “Print Screen” key. In this case, the operating system itself captures the screen and conveniently places it in the clipboard where the user may access and copy it.
The present invention can effectively protect from both operating system-level and application-level screen captures by means of queuing operations to the video card. If the operating system allows direct access to video memory, the preferred embodiment is a user-level program. If it does not, the preferred embodiment is by a combination of a kernel-mode device driver and a user level program. The present embodiment uses Microsoft DirectX® to obtain user-level direct video memory access. Thus, it does not require the use of a device driver other than the standard ones available in Windows® 95/98/NT operating environments.
In the preferred embodiment, exclusive control of video hardware is obtained by executing the following DirectX® calls using Windows® 95/98/NT (or any system supporting DirectX®):
    • 1. LPDIRECTDRAW DirectXhandle1, DirectXhandle2;
    • 2. DirectDrawCreate(VideoID, &DirectXhandle, 0);
    • 3. DirectXhandle1→Queryinterface(IID_IDirectDraw2, (void**)DirectXhandle2);
    • 4. DirectXhandle2→SetCooperativeLevel (WindowHandle, DDSCL_EXCLUSIVE|DDSCL_FULLSCREEN);
Line 1 declares two pointer variables to the DirectDraw (a subsystem of DirectX®) interface called DirectXhandle1 and DirectXhandle2. In line 2, the DirectXhandle1 pointer is initialized with respect to a specific video driver (VideoID in this case). If a DirectXhandle1 is a valid pointer, then the call to the Queryinterface function in line 3 will initialize the pointer DirectXhandle2 to the address of the DirectDraw2 interface. Next, in line 4, exclusive control of the video hardware is requested, along with full screen viewing. If another application currently has exclusive control of the video hardware, this call will fail. If for this reason, or any other reason, the SetCooperativeLevel call fails to obtain exclusive control of the hardware, the secure viewer application will terminate without displaying the said image.
In the preferred embodiment, video memory is allocated by executing the following DirectX® calls:
    • 1. LPDIRECTDRAWSURFACE primary_surface, back_surface, blank_surface;
    • 2. DDSURFACEDESC surface_descriptor;
    • 3. DDSCAPS surface_capabilities;
    • 4. surface_descriptor.ddsCaps=DDSCAPS_PRIMARYSURFACE|DDSCAPS_FLIP|DDSCAPS_COM
    • 5. surface.dwBackBufferCount=1;
    • 6. DirectXhandle2→CreateSurface(&surface_descriptor, &primary_surface, 0);
    • 7. primary_surface→GetAttachedSurface(&surface_capabilities, &back_surface);
In lines 1-3, DirectX® specific pointers variables are declared. In line 4, a specific type of surface is specified. The flag DDSCAPS_PRIMARYSURFACE indicates that the created surface will be displayed, the flag DDSCAPS_FLIP indicates that this surface may be flipped, and the flag DDSCAPS_COMPLEX indicates that one or more back surfaces can be attached to the primary surface. In line 5 a request for one back surface is specified. In line 6, surfaces are created according to the specifications given in lines 4 and 5. Finally in line 7, the primary surface is used to obtain a pointer to the back surface.
In the preferred embodiment, an image is displayed by performing the following steps:
    • 1. Depending the native image file format.
    • 2. Verifying the integrity of the image file using a check sum method.
    • 3. If the file is valid, reading information stored in the image file that is necessary to decrypt the image (assuming the secret key has been supplied).
    • 4. Decrypting of the said image into video memory.
In the preferred embodiment, video hardware is locked by executing the following DirectX® call:
    • primary_surface→Lock(0, &surface_descriptor, DDLOCK_WAIT|DDLOCK_WRITEONLY, 0);
This call will lock the primary surface preventing any other running thread from accessing this surface until a command is issued to unlock the surface.
In the preferred embodiment, pending video hardware operations are issued using the following DirectX® calls:
    • 1. primary_surfaceFlip(0, DDFLIP_WAIT);
    • 2. back_surface→BItFast(0, 0, blank_surface, 0, DDBLAST_WAIT);
Where the first pending request in line 1 will move the contents of the primary surface, which is currently being displayed, to the back surface, and the second pending operation in line 2 will overwrite, the contents of the back surface, effectively destroying the previously displayed image. The DDFLIP_WAIT and DDBLTFAST_WAIT parameters will cause the operations to remain pending in the queue. The blank_surface variable in line 2 points to a blank surface containing all zeros (black) or an alternative image. This surface is created in a manner similar to the way that the primary and back surfaces when created. Note that these operations will not be executed until the primary surface is unlocked (e.g., by a screen capture program).
Although the invention has been described in detail with particular reference to these preferred embodiments, other embodiments can achieve the same results. Variations and modifications of the present invention will be obvious to those skilled in the art and it is intended to cover in the appended claims all such modifications and equivalents. The entire disclosure of all references, applications, patents, and publications cited above are hereby incorporated by reference.

Claims (29)

1. A method of preventing copying of a displayed an image from a computer video memory comprising the steps of:
a. decoding anstoring the image intoin the video memory;
b. controlling video hardware and protecting the video memory, wherein the protecting step comprises locking the video memory and;
issuing at least one pending operation comprising a suspended video operation in a queue for destroying , wherein the suspended video operation is executable to destroy the contents of the video memory;
c. displaying the image; and
d. destroying the image displayed in the video memory via said at least one pending operation if an attempt is made to unlock the video memory.
2. The method of claim 1 wherein the step of decoding an storing the image into in the video memory comprises decrypting a previously encrypted image using a secret key.
3. The method of claim 1 further comprising the step of obtaining exclusive cooperative control of the video hardware comprising issuing video hardware control DirectX calls.
4. The method of claim 1 further comprising the step of obtaining exclusive cooperative control of the video hardware comprising a first set of calls to a video device driver.
5. The method of claim 1 further comprising the step of allocating video memory comprising creating at least one display surface.
6. The method of claim 1 wherein the step steps of locking the video memory and issuing at least one pending hardware operation comprises comprise issuing video hardware locking and issuing pending operations using DirectX® calls.
7. The method of claim 1 wherein the step steps of locking the video memory and issuing at least one pending operation comprises comprise issuing a second set of calls to a video device driver.
8. The method of claim 1 wherein the step of destroying the image displayed in the video memory comprises destroying the image displayed in the video memory when another application unlocks the video memory for reading the video memory.
9. The method of claim 1 whereby further comprising the step of displaying the image comprises comprising the steps of:
a. decoding a native image file format;
b. verifying an image file using a check sum method;
c. if the image file is valid, reading decrypting information from the image file; and
d. decrypting the image into video memory.
10. A method of preventing copying of images from a computer video memory, the method comprising the steps of:
a) decoding a proprietary image format into video memory;
b) controlling video hardware and locking video memory, wherein the locking step comprises locking a video surface and issuing at least one pending operation wherein the pending operation comprises a pending video hardware operation issued via a DirectX® call, comprising the substeps of executing the following DirectX® calls;
LPDIRECTDRAW DirectXhandle1, DirectXhandle2;
DirectDrawCreate(VideoID, &DirectXhandle, 0);
DirectXhandle1→QueryInterface(IID_IDirectDraw2, (void**)Directxhandle2);
DirectXhandle2→SetCooperativeLevel (WindowHandle, DDSCL_EXCLUSIVE|DDSCL_FULLSCREEN);
c) obtaining exclusive cooperative control of the video hardware;
d) allocating video memory comprising the substeps of executing the following DirectX® calls:
LPDIRECTDRAWSURFACE primary_surface, back_surface, blank_surface;
DDSURFACEDESC surface_descriptor;
DDSCAPS surface_capabilities;
surface_descriptor.ddsCaps.dwCaps=DDSCAPS_PRIMARYSURFACE
DDSCAPS_FLIP IDDSCAPS_COMPLEX;
surface_descriptor.dwBackBufferCount=1;
DirectXhandle2→CreateSurface(&surface_descriptor, &primary_surface, 0);
primary_surface→GetAttachedSurface(&surface_capabilities, &back_surface);
e) locking video hardware comprising the substeps of executing the following DirectX® call;
primary_surface→Lock(0, &surface_descriptor, DDLOCK_WAIT|DDLOCK_WRITEONLY, 0)
f) destroying an image via pending video operations if an attempt is made to unlock video memory comprising the substeps of issuing the following DirectX® calls:
primary_surface→Flip(0, DDFLIP_WAIT);
back_surface→BItFast(0, 0, blank_surface, 0, DDBLTFAST_WAIT).
11. The method of claim 10 further comprising the step of creating a blank surface.
12. The method of claim 11 wherein the step of creating a blank surface comprises executing the following DirectX® calls:
LPDIRECTDRAWSURFACE blank_surface;
DDSURFACEDESC surface_descriptor;
surface_descriptor.ddsCaps.dwCaps=DDSCAPS_PRIMARYSURFACE;
DirectXhandle2→CreateSurface(&surface_descriptor, &blank_surface, 0).
13. The method of claim 1 wherein the step of controlling video hardware and protecting the video memory comprises further comprising the step of executing a hardware accelerated Bit-Blt (bit-boundary block transfer) instruction.
14. A method for preventing copying of an image from a computer video memory of a computer running a multithreaded operating system, said method comprising:
issuing a multithreaded locking primitive associated with the computer video memory;
issuing a passive video hardware operation executable upon said multithreaded locking primitive being removed;
displaying the image; and
executing said passive video hardware operation in response to said multithreaded locking primitive being removed, wherein said executing said passive video hardware operation destroys the displayed image.
15. The method of claim 14 further comprising:
generating the image by decrypting an encrypted image; and
storing the image in the computer video memory.
16. The method of claim 14 further comprising:
obtaining exclusive cooperative control of the computer video memory.
17. The method of claim 16 wherein obtaining exclusive cooperative control of the computer video memory comprises issuing one or more video hardware control DirectX® calls.
18. A system comprising:
a video memory configured to store an image;
a processor coupled to the video memory, wherein the processor is configured to execute program instructions to:
lock the video memory;
issue a suspended video operation executable to destroy the contents of the video memory; and
destroy the image in the video memory by executing the suspended video operation if an attempt is made to unlock the video memory.
19. The system of claim 18 wherein the processor is further configured to execute the program instructions to:
generate the image by decrypting an encrypted image; and
store the image in the video memory.
20. The system of claim 18 wherein the processor is further configured to execute the program instructions to:
obtain exclusive cooperative control of the video memory.
21. The system of claim 20 wherein in obtaining exclusive cooperative control of the video memory, the processor is further configured to execute the program instructions to issue one or more video hardware control DirextX® calls.
22. The system of claim 18 wherein in locking the video memory, the processor is further configured to execute the program instructions to issue a multithreaded locking primitive associated with the video memory.
23. The system of claim 22 wherein the attempt to unlock the video memory comprises an attempt to remove the multithreaded locking primitive.
24. A computer-readable storage medium comprising program instructions for preventing copying of an image from a video memory, wherein the program instructions are executable to implement:
storing the image in the video memory;
locking the video memory;
issuing a suspended video operation executable to destroy the contents of the video memory; and
destroying the image in the video memory by executing the suspended video operation if an attempt is made to unlock the video memory.
25. The computer-readable storage medium of claim 24 wherein the program instructions are further executable to implement:
generating the image by decrypting an encrypted image.
26. The computer-readable storage medium of claim 24 wherein the program instructions are further executable to implement:
obtaining exclusive cooperative control of the video memory.
27. The computer-readable storage medium of claim 26 wherein in obtaining exclusive cooperative control of the video memory, the program instructions are further executable to implement issuing one or more video hardware control DirectX® calls.
28. The computer-readable storage medium of claim 24 wherein in locking the video memory, the program instructions are further executable to implement issuing a multithreaded locking primitive associated with the video memory.
29. The computer-readable storage medium of claim 28 wherein the attempt to unlock the video memory comprises an attempt to remove the multithreaded locking primitive.
US11/418,555 1999-06-21 2006-05-04 Method for securing video images Expired - Lifetime USRE40702E1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US11/418,555 USRE40702E1 (en) 1999-06-21 2006-05-04 Method for securing video images

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US09/337,718 US6731756B1 (en) 1999-06-21 1999-06-21 Method for securing video images
US11/418,555 USRE40702E1 (en) 1999-06-21 2006-05-04 Method for securing video images

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US09/337,718 Reissue US6731756B1 (en) 1999-06-21 1999-06-21 Method for securing video images

Publications (1)

Publication Number Publication Date
USRE40702E1 true USRE40702E1 (en) 2009-04-21

Family

ID=32176307

Family Applications (2)

Application Number Title Priority Date Filing Date
US09/337,718 Ceased US6731756B1 (en) 1999-06-21 1999-06-21 Method for securing video images
US11/418,555 Expired - Lifetime USRE40702E1 (en) 1999-06-21 2006-05-04 Method for securing video images

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US09/337,718 Ceased US6731756B1 (en) 1999-06-21 1999-06-21 Method for securing video images

Country Status (1)

Country Link
US (2) US6731756B1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130007469A1 (en) * 2011-06-29 2013-01-03 Internatioanl Business Machines Corporation Securely managing the execution of screen rendering instructions in a host operating system and virtual machine
US9111123B2 (en) 2013-06-28 2015-08-18 International Business Machines Corporation Firmware for protecting data from software threats

Families Citing this family (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6983371B1 (en) * 1998-10-22 2006-01-03 International Business Machines Corporation Super-distribution of protected digital content
JP3977549B2 (en) * 1999-04-30 2007-09-19 株式会社東芝 Content management method, content usage management system, content usage management device, and playback device
US6484176B1 (en) 1999-06-25 2002-11-19 Baynet World, Inc. System and process for providing remote interactive access to a real estate information database using a portable computing device
US7305713B1 (en) 1999-10-14 2007-12-04 Aol Llc Method and system for preventing capture of electronic digital content
US7200230B2 (en) * 2000-04-06 2007-04-03 Macrovision Corporation System and method for controlling and enforcing access rights to encrypted media
US7225240B1 (en) * 2000-05-20 2007-05-29 Ciena Corporation Decoupling processes from hardware with logical identifiers
US20040073617A1 (en) 2000-06-19 2004-04-15 Milliken Walter Clark Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail
US20020046052A1 (en) * 2000-08-18 2002-04-18 Sean Brown Page content item billing
US7007304B1 (en) * 2000-09-20 2006-02-28 Intel Corporation Method and apparatus to improve the protection of information presented by a computer
US7073070B2 (en) * 2001-06-29 2006-07-04 Intel Corporation Method and apparatus to improve the protection of information presented by a computer
US7120252B1 (en) * 2001-08-16 2006-10-10 Mcafee, Inc. System and method for automatically protecting private video content using cryptographic security for legacy systems
US7065651B2 (en) * 2002-01-16 2006-06-20 Microsoft Corporation Secure video card methods and systems
US7515173B2 (en) * 2002-05-23 2009-04-07 Microsoft Corporation Head pose tracking system
US8155314B2 (en) * 2002-06-24 2012-04-10 Microsoft Corporation Systems and methods for securing video card output
US7293178B2 (en) * 2002-12-09 2007-11-06 Microsoft Corporation Methods and systems for maintaining an encrypted video memory subsystem
US20050210056A1 (en) * 2004-01-31 2005-09-22 Itzhak Pomerantz Workstation information-flow capture and characterization for auditing and data mining
US7721340B2 (en) * 2004-06-12 2010-05-18 Microsoft Corporation Registry protection
US7584509B2 (en) * 2004-06-12 2009-09-01 Microsoft Corporation Inhibiting software tampering
US8156565B2 (en) * 2008-04-28 2012-04-10 Microsoft Corporation Hardware-based protection of secure data
US8393008B2 (en) * 2008-05-21 2013-03-05 Microsoft Corporation Hardware-based output protection of multiple video streams
US8429741B2 (en) * 2008-08-29 2013-04-23 Google, Inc. Altered token sandboxing
US8368707B2 (en) * 2009-05-18 2013-02-05 Apple Inc. Memory management based on automatic full-screen detection
KR101661265B1 (en) * 2015-04-22 2016-09-30 주식회사 테르텐 Virtual browsing method using application and virtual browsing server
JP2020017233A (en) * 2018-07-27 2020-01-30 京セラドキュメントソリューションズ株式会社 Electronic apparatus and image forming device

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5471675A (en) 1993-07-27 1995-11-28 Taligent, Inc. Object oriented video framework system
US5881287A (en) 1994-08-12 1999-03-09 Mast; Michael B. Method and apparatus for copy protection of images in a computer system
US5930515A (en) 1997-09-30 1999-07-27 Scientific-Atlanta, Inc. Apparatus and method for upgrading a computer system operating system
US6098171A (en) 1998-03-31 2000-08-01 International Business Machines Corporation Personal computer ROM scan startup protection
US6195474B1 (en) 1997-10-28 2001-02-27 Eastman Kodak Company Pathology dependent viewing of processed dental radiographic film having authentication data
US6516416B2 (en) 1997-06-11 2003-02-04 Prism Resources Subscription access system for use with an untrusted network

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5471675A (en) 1993-07-27 1995-11-28 Taligent, Inc. Object oriented video framework system
US5881287A (en) 1994-08-12 1999-03-09 Mast; Michael B. Method and apparatus for copy protection of images in a computer system
US6516416B2 (en) 1997-06-11 2003-02-04 Prism Resources Subscription access system for use with an untrusted network
US5930515A (en) 1997-09-30 1999-07-27 Scientific-Atlanta, Inc. Apparatus and method for upgrading a computer system operating system
US6195474B1 (en) 1997-10-28 2001-02-27 Eastman Kodak Company Pathology dependent viewing of processed dental radiographic film having authentication data
US6098171A (en) 1998-03-31 2000-08-01 International Business Machines Corporation Personal computer ROM scan startup protection

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
Adam Perer: "What is DirectX? The DirectX Experience", article[online], [retrieved on Oct. 10, 2002]. Retrieved from the internet<URLhttp://www.geocities.com/SiliconValley/Way/3390/whatisdirectx.html>dated 1998.
Amir Herzberg: "Safeguarding Digital Library Contents" IBM Haifa Research Laboratory Tel Aviv, Israel D-Lib Magazine Jan. 1998.
Artistscope: "Artistscope" Problem areas http:/www.artistscope.com/_info/problemareas.htm; Copyright Artistscope strategies 1998-99.
H. Snyder/David P. Maher: "Music on the Internet & the Intellectual Property Protection Problem" Jack Lacy/James Published in Proc. ISIE, Guimares, Portugal Jul. 1997.
Matt Blaze/Joan Feigenbaum/Jack Lacy: "Decentralized Trust Management" Published in Proc. IEEE conf. on security & privacy Oakland, CA May 1996.

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130007469A1 (en) * 2011-06-29 2013-01-03 Internatioanl Business Machines Corporation Securely managing the execution of screen rendering instructions in a host operating system and virtual machine
US8595511B2 (en) * 2011-06-29 2013-11-26 International Business Machines Corporation Securely managing the execution of screen rendering instructions in a host operating system and virtual machine
US9111123B2 (en) 2013-06-28 2015-08-18 International Business Machines Corporation Firmware for protecting data from software threats

Also Published As

Publication number Publication date
US6731756B1 (en) 2004-05-04

Similar Documents

Publication Publication Date Title
USRE40702E1 (en) Method for securing video images
US7007025B1 (en) Method and system for maintaining secure data input and output
US6922693B1 (en) Method and system for copy protection of images displayed on a computer monitor
US5881287A (en) Method and apparatus for copy protection of images in a computer system
US8027925B1 (en) System method and apparatus for authorizing access
US7761706B2 (en) Method for controlling access to protected content
US6148083A (en) Application certification for an international cryptography framework
US7020772B2 (en) Secure execution of program code
US7073059B2 (en) Secure machine platform that interfaces to operating systems and customized control programs
US7225157B2 (en) Limited-use browser and security system
US7950066B1 (en) Method and system for restricting use of a clipboard application
US20020087876A1 (en) Adaptive software installation process supporting multiple layers of security-related attributes
EP0843249A1 (en) Dynamic classes of service for an international cryptography framework
US20130031354A1 (en) System for preventing unauthorized acquisition of information and method thereof
WO1998009209B1 (en) Systems and methods for secure transaction management and electronic rights protection
MXPA03004371A (en) Systems and methods for securing video card output.
Yu et al. Display-only file server: A solution against information theft due to insider attack
EP1402334B1 (en) Method and system for maintaining secure data input and output
JPH113349A (en) Data protecting system, data preparing device and data processing device

Legal Events

Date Code Title Description
AS Assignment

Owner name: ELISAR SOFTWARE CORPORATION, INC., NEW MEXICO

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:PIZANO, CARLOS E.;HEILEMAN, GREGORY L.;REEL/FRAME:022333/0139

Effective date: 20001207

Owner name: VISUAL ADVANCES LLC, NEVADA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:ELISAR SOFTWARE CORPORATION;REEL/FRAME:022333/0171

Effective date: 20050310

FPAY Fee payment

Year of fee payment: 8

FPAY Fee payment

Year of fee payment: 12

AS Assignment

Owner name: XYLON LLC, NEVADA

Free format text: MERGER;ASSIGNOR:VISUAL ADVANCES LLC;REEL/FRAME:037013/0656

Effective date: 20150813

AS Assignment

Owner name: HANGER SOLUTIONS, LLC, GEORGIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:INTELLECTUAL VENTURES ASSETS 161 LLC;REEL/FRAME:052159/0509

Effective date: 20191206