Systems and methods are provided for protecting electronic content from the time it is packaged through the time it is experienced by an end user. Protection against content misuse is accomplished using a combination of encryption, watermark screening, detection of invalid content processing softwar
Systems and methods are provided for protecting electronic content from the time it is packaged through the time it is experienced by an end user. Protection against content misuse is accomplished using a combination of encryption, watermark screening, detection of invalid content processing software and hardware, and/or detection of invalid content flows. Encryption protects the secrecy of content while it is being transferred or stored. Watermark screening protects against the unauthorized use of content. Watermark screening is provided by invoking a filter module to examine content for the presence of a watermark before the content is delivered to output hardware or software. The filter module is operable to prevent delivery of the content to the output hardware or software if it detects a predefined protection mark. Invalid content processing software is detected by a monitoring mechanism that validates the software involved in processing protected electronic content. Invalid content flows can be detected by scanning the information passed across system interfaces for the attempted transfer of bit patterns that were released from an application and/or a piece of content management software.
대표청구항▼
1. A computer-implemented method for protecting electronic content from unauthorized use by a computer system, the method comprising: receiving a request to process electronic content using a software module executing on the computer system;obtaining a first identifier associated with the software m
1. A computer-implemented method for protecting electronic content from unauthorized use by a computer system, the method comprising: receiving a request to process electronic content using a software module executing on the computer system;obtaining a first identifier associated with the software module, wherein the first identifier is a distillation of some part of the software module;comparing the first identifier with a second identifier;determining that the first identifier is related to the second identifier in a predefined manner, and that the software module exhibits one or more predefined behaviors, wherein the determination that the software module exhibits one or more predefined behaviors includes detecting at least one of: the software module attempting to access one or more predefined system interfaces, and the software module exhibiting one or more predefined timing characteristics; andimplementing at least one action to protect the electronic content from unauthorized use based on the determination. 2. The method of claim 1, wherein the software module comprises one or more system drivers. 3. The method of claim 1, wherein the one or more system drivers comprises at least one of a video display driver, a sound driver, an SCSI driver, an IDE driver, a network driver, a video capture driver, a floppy disk driver, and a scanner driver. 4. The method of claim 1, wherein the at least one action comprises modifying at least a portion of the electronic content before it is processed by the software module. 5. The method of claim 4, wherein modifying at least a portion of the electronic content comprises scrambling at least a portion of the electronic content. 6. The method of claim 4, wherein modifying at least a portion of the electronic content comprises adding noise to at least a portion of the electronic content. 7. The method of claim 4, wherein modifying at least a portion of the electronic content comprises adding an electronic watermark to at least a portion of the electronic content. 8. The method of claim 1, wherein the at least one action comprises preventing the software module from processing the electronic content. 9. The method of claim 1, wherein the electronic content comprises electronic media content. 10. The method of claim 1, wherein the first identifier comprises a hash value of at least a portion of the software module and the second identifier comprises one or more known hash values. 11. The method of claim 10, wherein the one or more known hash values comprise one or more hash values of one or more known unauthorized software modules. 12. The method of claim 1, wherein obtaining the first identifier, comparing the first identifier with the second identifier, and determining that the first identifier is related to the second identifier in a predefined manner are performed according to one or more policies associated with the electronic content. 13. A non-transitory computer-readable storage medium storing instructions that, when executed by a processor of a computer system, cause the computer system to perform a method comprising: receiving a request to process electronic content using a software module executing on the computer system;obtaining a first identifier associated with the software module, wherein the first identifier is a distillation of some part of the software module;comparing the first identifier with a second identifier;determining that the first identifier is related to the second identifier in a predefined manner, and that the software module exhibits one or more predefined behaviors, wherein the determination that the software module exhibits one or more predefined behaviors includes detecting at least one of: the software module attempting to access one or more predefined system interfaces, and the software module exhibiting one or more predefined timing characteristics; andimplementing at least one action to protect the electronic content from unauthorized use based on the determination. 14. The non-transitory computer-readable storage medium of claim 13, wherein the software module comprises one or more system drivers. 15. The non-transitory computer-readable storage medium of claim 13, wherein the at least one action comprises modifying at least a portion of the electronic content before it is processed by the software module. 16. The non-transitory computer-readable storage medium of claim 13, wherein the at least one action comprises preventing the software module from processing the electronic content. 17. The non-transitory computer-readable storage medium of claim 13, wherein the first identifier comprises a hash of at least a portion of the software module and the second identifier comprises one or more known hash values. 18. The non-transitory computer-readable storage medium of claim 17, wherein the one or more known hash values comprise one or more hash values of one or more known unauthorized software modules. 19. The non-transitory computer-readable storage medium of claim 13, wherein obtaining the first identifier, comparing the first identifier with the second identifier, and determining that the first identifier is related to the second identifier in a predefined manner are performed according to one or more policies associated with the electronic content. 20. The non-transitory computer-readable storage medium of claim 13, wherein the electronic content comprises electronic media content.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (51)
Hall Donald R. (309 N. Fillmore St. Arlington VA 22201), ADP security device for labeled data.
Ciacelli Mark Louis ; Urda John William ; Lam Wai Man ; Kouloheris Jack Lawrence ; Fetkovich John Edward, Apparatus, method and computer program product for protecting copyright data within a computer system.
Gopinath Bhaskarpillai (Watchung NJ) Kurshan David (Sea Bright NJ), Composition of systems of objects by interlocking coordination, projection, and distribution.
Glover John J., Computer system and process for accessing an encrypted and self-decrypting digital information product while restricting access to decrypted digital information.
Talati Kirit K. (207 Sun Ray La. Sunnyvale TX 75102), Control system and method for direct execution of software application information models without code generation.
Stefik Mark J. (Woodside CA) Russell Daniel M. (Palo Alto CA) Bobrow Daniel G. (Palo Alto CA) Henderson ; Jr. D. Austin (La Honda CA), Document processing system utilizing document service cards to provide document processing services.
Stefik Mark J. (Woodside CA) Bobrow Daniel G. (Palo Alto CA) Card Stuart K. (Los Altos CA) Casey Michalene M. (Morgan Hill CA) Goldstein Richard J. (San Francisco CA) Lamming Michael G. (Cambridge CA, Interactive contents revealing storage device.
Halter Bernard J. (Longmont CO) Bracco Alphonse M. (Reston VA) Johnson Donald B. (Manassas VA) Le An V. (Manassas VA) Matyas Stephen M. (Manassas VA) Prymak ; deceased Rostislaw (late of Dumfries VA , Method and system for multimedia access control enablement.
Herzberg Amir ; Krawczyk Hugo Mario ; Kutten Shay ; Le An Van ; Matyas Stephen Michael ; Yung Marcel Mordechay, Method and system for the secured distribution of multimedia titles.
Gasser Morrie (Saugus MA) Goldstein Andrew C. (Hudson MA) Kaufman Charles W. (Northborough MA) Lampson Butler W. (Cambridge MA), Method for delegating authorization from one entity to another through the use of session encryption keys.
Walker Jay S. ; Case T. Scott ; Jorasch James A. ; Sparico Thomas M., Method, apparatus, and program for pricing, selling, and exercising options to purchase airline tickets.
Goldsmith Amy M. (Los Gatos CA) Goldsmith David B. (Los Gatos CA) Pettus Christopher E. (San Francisco CA), Object-oriented remote procedure call networking system.
Ketcham Larry R. (Laguna Niguel CA), Software security system for maintaining integrity of compiled object code by restricting users ability to define compil.
Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
McManis Charles E. (Sunnyvale CA), System and method for executing verifiable programs with facility for using non-verifiable programs from trusted sources.
Stefik Mark J. (Woodside CA) Bobrow Daniel G. (Palo Alto CA) Pirolli Peter L. T. (El Cerrito CA), System for controlling the distribution and use of composite digital works.
Stefik Mark J. (Woodside CA) Merkle Ralph C. (Sunnyvale CA) Pirolli Peter L. T. (El Cerrito CA), System for controlling the distribution and use of digital works having a fee reporting mechanism.
Shear Victor H. ; Van Wie David M. ; Weber Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining using and manipulating rights management data structures.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.