IPC분류정보
국가/구분 |
United States(US) Patent
등록
|
국제특허분류(IPC7판) |
|
출원번호 |
US-0008320
(2008-01-10)
|
등록번호 |
US-8117667
(2012-02-14)
|
발명자
/ 주소 |
- Merkle, Jr., James A.
- LeVine, Richard B.
- Lee, Andrew R.
- Howard, Daniel G.
- Goldman, Daniel M.
- Pagliarulo, Jeffrey A.
- Hart, III, John J.
- Bouza, Jose L.
|
출원인 / 주소 |
|
대리인 / 주소 |
Oblon, Spivak, McClelland, Maier & Neustadt, L.L.P.
|
인용정보 |
피인용 횟수 :
6 인용 특허 :
193 |
초록
▼
A number of systems and methods, alone, or in combination, achieve various levels of protection against unauthorized modification and distribution of digital content. This encompasses at least unauthorized study, modification, monitoring, reconstruction, and any other means for subversion from the o
A number of systems and methods, alone, or in combination, achieve various levels of protection against unauthorized modification and distribution of digital content. This encompasses at least unauthorized study, modification, monitoring, reconstruction, and any other means for subversion from the originally intended purpose and license model of the digital content. The invention combines a number of techniques that in whole, or in part, serve to protect such content from unauthorized modification, reconstructive engineering, or monitoring by third parties. This is accomplished by means of methods which protect against subversion by specific tools operating on specific platforms as well as general tools operating on general platforms. Specific time domain attacks are identified, code modification can be identified and reversed, and virtual and emulated systems are identified. In addition, identification of in-circuit emulator tools (both software and hardware), debuggers, and security threats to running programs can be achieved.
대표청구항
▼
1. A method for preventing unauthorized use of digital content data in a computer system comprising: examining system devices that are operational in the computer system to determine features of hardware included in the system devices;determining whether the computer system is a virtual machine or e
1. A method for preventing unauthorized use of digital content data in a computer system comprising: examining system devices that are operational in the computer system to determine features of hardware included in the system devices;determining whether the computer system is a virtual machine or emulation;generating a signature unique to the computer system based on the features of the hardware included in the system devices of the computer system;encrypting the digital content data using the signature unique to the computer system based on the features of the hardware included in the system devices, wherein the encrypted digital content is specific to the computer system; andpreventing distribution of the digital content to the computer system if the computer system is determined to be a virtual machine or emulation. 2. The method of claim 1, wherein the features of the hardware comprise at least one of memory capacity, CPU clock rate, bus rate, component version, bus latency, and memory speed. 3. The method of claim 1, further comprising encrypting the signature before encrypting the digital content data with the signature. 4. The method of claim 1, wherein the signature comprises combined multiple features corresponding to hardware of multiple system devices. 5. The method of claim 1, further comprising controlling installation of the digital content data based on the signature. 6. The method of claim 1, further comprising controlling operation of the digital content data on the system based on the signature. 7. A method for preventing unauthorized use of digital content data in a computer system comprising: requesting an installation of the digital content data at a client;examining system devices of the client that are operational in the client to determine features of hardware included in the system devices of the client;determining whether the client is a virtual machine or emulation;generating a signature representative of the client based on the features of the hardware included in the system devices of the client;transmitting the request for installation to a server, said request including the signature;verifying, at the server, whether the requested installation is authorized, if the installation is unauthorized, transmitting an installation denial message to the client, and if the installation is authorized, transmitting an installation authorization message to the client;installing the digital content data at the client if the requested installation is authorized; andpreventing distribution of the digital content to the client if the client is determined to be a virtual machine or emulation. 8. The method of claim 7, further comprising verifying, at the server, authorization of the installation based on the signature. 9. A method for preventing unauthorized use of digital content data in a computer system comprising: requesting use of the digital content data at a client;examining system devices of the client that are operational in the client to determine features of hardware included in the system devices of the client;determining whether the client is a virtual machine or emulation;generating a signature representative of the system based on the features of the hardware included in the system devices;transmitting the request for use to a server, said request including the signature;verifying, at the server, whether the requested use is authorized, if the installation is unauthorized, transmitting a use denial message to the client, and if the installation is authorized, transmitting a use authorization message to the client;utilizing the digital content data at the client if the requested installation is authorized; andpreventing distribution of the digital content to the client if the client is determined to be a virtual machine or emulation. 10. The method of claim 9, further comprising verifying, at the server, authorization of the use based on the signature. 11. The method of claim 1, further comprising decrypting the digital content by using the signature as a decryption key. 12. The method of claim 1, further comprising: generating numeric values from the features of the hardware; andgenerating the signature by combining the numeric values. 13. The method of claim 7, wherein the features of the hardware comprise at least one of memory capacity, CPU clock rate, bus rate, component version, bus latency, and memory speed. 14. The method of claim 9, wherein the features of the hardware comprise at least one of memory capacity, CPU clock rate, bus rate, component version, bus latency, and memory speed. 15. The method of claim 7, further comprising: determining whether a number of previously authorized installations exceeds a predetermined number greater than 1. 16. The method of claim 9, further comprising: determining whether a number of previously authorized installations exceeds a predetermined number greater than 1.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.