Class / Patent application number | Description | Number of patent applications / Date published |
726033000 | Copy inactivation | 26 |
20080263681 | System and Method for Transferring Media Rights Under Predetermined Conditions - A method for distributing media rights includes obtaining ( | 10-23-2008 |
20080276324 | Encoding With Watermarking Prior to Phase Modulation - In watermarking systems, hackers may try to remove the watermark using a so-called collusion attack. If the attacker has access to multiple identical signals with different watermarks (this typically occurs in electronic content delivery systems), simply averaging the signals will remove the watermark energy. A known solution to this problem is phase modulation. By modulating the phase of the signals, the averaging attack will cause phase cancellation to occur and annoying artifacts to be introduced. In the prior art, said phase modulation is carried out in the base-band domain, prior to watermark embedding. The present invention enables phase modification efficiently to be applied to transform coded signals, in particular DCT or MDCT coded signals such as MP3 or AAC audio signals, or MPEG2 video signals. The bitstream is partially decoded ( | 11-06-2008 |
20080276325 | Method and apparatus for providing content control via detection of modifications to a signal - A method and apparatus is provided for generating or providing any of various types of modifications purposely made to generally known signals, waveforms, conditions, functions, etc. The modifications are sensed, read, detected or interpreted to provide a content control command indicative of the difference between the original signal, waveform, condition, functions, etc., and the modified signal, waveform, condition, function, etc. The content control command may be used to provide content control for a content control system, which in turn may provide control of a selected compliant device. | 11-06-2008 |
20080320607 | SYSTEM AND METHOD FOR AUDITING SOFTWARE USAGE - Systems and methods are provided for auditing and selectively restricting software usage based on, for example, software copy counts or execution counts. In one embodiment, the method comprises verifying whether the serial number for a software installed on a computing device corresponds to one of recognized serial numbers, and calculating a copy count (or software execution count) for the serial number. In response to the copy count exceeding a defined upper limit, a limited unlock key may be sent to the device. The limited unlock key may allow the software to be executed on the device for a defined time period, a defined number of executions, and/or with at least one feature of the software disabled. | 12-25-2008 |
20090031432 | LICENSE MANAGEMENT APPARATUS, LICENSE MANAGEMENT METHOD, AND STORAGE MEDIUM - A license management apparatus transfers license information from a transfer source device to a transfer destination device. The license information is required for enabling functions of a program package serving as an integrated product including a plurality of functions. The license management apparatus includes a management unit and a transfer unit. The management unit manages all or part of the plurality of functions as belonging to one group. After license information of functions included in the program package and managed by the management unit as belonging to the same group is acquired from the transfer source device, the transfer unit transfers license information of functions managed as belonging to the same group to the transfer destination device. | 01-29-2009 |
20090044285 | METHOD AND SYSTEM FOR MANAGING RIGHTS FOR DIGITAL MUSIC - A method is described for managing rights for digital music, including registering music players, from among a plurality of music players, with digital archives that store songs, from among a plurality of digital archives, wherein songs can be copied from digital archives to music players, and from music players to digital archives, permitting a music player to copy a song from a digital archive for which it is registered, permitting a digital archive to copy a song from a music player that is registered with the digital archive, restricting a music player from copying a song from a digital archive for which it is not registered, and restricting a digital archive from copying a song from a music player that is not registered with the digital archive. A system and a computer-readable storage medium are also described. | 02-12-2009 |
20090064348 | Protection Against Unauthorized Copying of Digital Medial Cotent - Protection against unauthorized copying of digital media content is achieved by receiving a request to provide digital media content to a client device, sending instructions to the client device regarding a processor executable function that provides protection against unauthorized copying of the digital media content, and sending the digital media content to the client device upon activation of the processor executable function. | 03-05-2009 |
20090119784 | OUT OF BAND LICENSE ACQUISITION INCLUDING CONTENT IDENTIFICATION - Particular embodiments generally relate to transferring data with first usage rights to a device and presenting the data by a receiving device by using different usage rights. The receiving device contacts one or more services that can determine what rights are available and can issue those rights to the receiving device. The receiving device is challenged to identify the received content. The receiving device can update the state across devices and services that maintain compliance with the usage rights. | 05-07-2009 |
20090172825 | METHOD AND APPARATUS FOR UPDATING REVOCATION LIST AND REPRODUCING ENCRYPTED CONTENT - Method of updating revocation list is disclosed. Time information of revocation list indicating registration time of most recently registered revocation entity included in revocation list of first device is extracted, and time information of revocation list indicating registration time of the most recently registered revocation entity included in the revocation list of a second device connected to the first device is also extracted. A revocation entity registered in the first device after the registration time of time information of the revocation list of the second device is copied in the revocation list of the second device, if the registration time of extracted time information of the revocation list of the first device is later than the registration time of the extracted time information of the revocation list of the second device. Thus, the revocation list can be updated by connecting the first and second devices even in an offline state. | 07-02-2009 |
20090271877 | METHOD TO SECURE EMBEDDED SYSTEM WITH PROGRAMMABLE LOGIC, HARDWARE AND SOFTWARE BINDING, EXECUTION MONITORING AND COUNTERACTION - Systems and methods for securing an embedded system are disclosed. An embedded system comprises a hardware subsystem including physical components of the embedded system, a software subsystem including a software application and a program code, and a programmable logic subsystem programmed to monitor one or more parts of the hardware and software subsystems and interactions thereof to detect tampering of the embedded system. The programmable logic subsystem is capable of being activated by a security function in the software subsystem or by a special hardware component in the hardware subsystem. The activation of the programmable logic subsystem facilitate a coupling of the hardware, software, and the programmable logic subsystems. The program code can be used to dynamically re-program the programmable logic subsystem. | 10-29-2009 |
20100122353 | METHODS AND SYSTEMS OF DIGITAL RIGHTS MANAGEMENT FOR INTEGRATED CIRCUITS - Methods for remote activation and permanent or temporary deactivation of integrated circuits (IC) for digital rights management are disclosed. Remote activation enables designers to remotely control each IC manufactured by an independent silicon foundry. Certain embodiments of the invention exploit inherent unclonable variability in modern manufacturing for the creation of unique identification (ID) and then integrate the IDs into the circuit functionality. Some of the objectives may be realized by replicating a subset of states of one or more finite state machines and by superimposing additional state transitions that are known only to the designer. On each chip, the added transitions signals are a function of the unique IDs and are thus unclonable. The method and system of the invention is robust against operational and environment conditions, unclonable and attack-resilient, while having a low overhead and a unique key for each IC with very high probability. | 05-13-2010 |
20100306860 | USING A CUSTOM MEDIA LIBRARY TO SECURE DIGITAL MEDIA CONTENT - A system and method for using a custom media library to secure digital media content on a computing system is disclosed. The method includes directly linking the custom media library with a copyright compliance mechanism (CCM)-enabled playback/recording application. In addition, the custom media library generates a new pathway distinct from a commonly used data pathway of the CCM-enabled playback/recording application and a media rendering subsystem of an operating system. Also, a CCM is alerted to monitor a plurality of media subsystems of the computing system. In so doing, a raw media file may be securely passed from the CCM-enabled playback/recording application via the custom media library and over the new pathway to a media subsystem of the operating system that is monitored by the CCM, such that the raw media file is rendered, playable and copyable in a secure environment. | 12-02-2010 |
20110162091 | METHOD OF DEACTIVATION AFTER SOFTWARE BEING ACTIVATED ONLINE - A method of deactivation after software being activated online is provided, including: online-activated software sending a deactivation request message and its license key to a network server; the request being validated by the server inquiring its file system; if the request being valid, the server changing the status of the license key into “deactivated” or deleting the license key and its associate information in its file system and sending a deactivation permission message to the software; after receiving the deactivation permission message the software deleting or modifying local activation information promptly to ensure the software cannot run in activated status any more. By this method, an activated software user could initiatively deactivate the software on its current hardware device and then activate the software on another hardware device. The method of the invention enables user to transfer the software license to another hardware device initiatively. | 06-30-2011 |
20110167503 | TPM-BASED LICENSE ACTIVATION AND VALIDATION - A Trusted Activation License (TAL) can be comprised of a key unique to a Trusted Platform Module (TPM) and identifying information of the software applications bundled with the computing device having that TPM. To activate the software applications, the identifying information in the TAL can be compared against that of the software applications being activated, and the unique TPM key in the TAL can be compared against that of the TPM on the computing device on which the activation is taking place. Subsequent validations can be based on a protected association between the TAL and an Attestation Identity Key (AIK) that can be generated by the TPM as part of the activation step. Optionally, Platform Configuration Registers (PCRs) of the TPM can be periodically changed during validation to protect against useage of one TPM for validations on multiple computing devices. | 07-07-2011 |
20110167504 | Application Rights Enabling - Methods and apparatus, including computer program products, implementing and using techniques for controlling capabilities of a user software application. A user software application is provided, the user software application including a set of disabled operations. Content capable of being operated on by one or more of the disabled operations in the set of disabled operations is received. Application rights information operable to enable an operation in the set of disabled operations to operate on content within a context specified in the application rights information are received and the operation in the set of disabled operations is enabled to operate on the received content. Methods and apparatus for providing content to be operated on by a user software application and methods and apparatus for providing a configurable, context-dependent user software application are also described. | 07-07-2011 |
20110289602 | ACTIVATION CODE SYSTEM AND METHOD FOR PREVENTING SOFTWARE PIRACY - A system and method for preventing piracy of a given software application limits the number of times that such software application is activated. A given software application must be activated in order to become fully functional. The user must provide a unique software identification code, relating to the specific software which the user is attempting to activate, to a remote provider. The remote provider determines the number of times that such specific software has already been activated, and provides an activation code to the user unless the number of activations exceeds a predetermined threshold. Once activated, the software becomes fully operational, and the user is allowed complete access to its functions. | 11-24-2011 |
20120060228 | Completely automated computer implemented system and method for piracy control based on update requests - An automated system and method for piracy control based on user generated updates is described. The system and method described renders human intervention for piracy control superfluous and, therefore, is cost-effective, and consumes less time. The automated system and method for piracy control based upon update requests significantly reduces the number of update requests by pirated copies of the software, reduces the burden on the update server and smoothens the overall user experience for the legitimate users of the software. | 03-08-2012 |
20130055415 | SOFTWARE PIRACY PREVENTION THROUGH REMOTE ENFORCEMENT OF AN ACTIVATION THRESHOLD - A system and method for preventing piracy of a given software application limits the number of times that such software application is activated. A given software application must be activated in order to become fully functional. The user must provide a unique software identification code, relating to the specific software which the user is attempting to activate, to a remote provider. The remote provider determines the number of times that such specific software has already been activated, and provides an activation code to the user unless the number of activations exceeds a predetermined threshold. Once activated, the software becomes fully operational, and the user is allowed complete access to its functions. | 02-28-2013 |
20130312120 | METHOD AND SYSTEM FOR PREVENTING UNAUTHORIZED RECORDING OF MEDIA CONTENT ON AN APPLE OPERATING SYSTEM - A method for preventing unauthorized recording of media content on an Apple operating system (OS). The present method registers a compliance mechanism on a client system having the Apple OS operating thereon. The compliance mechanism comprises a framework for validating the compliance mechanism on the client system, and a multimedia component opened by the framework. The present method uses the multimedia component for decrypting the media content on the client system. The present method also prevents decryption of the media content on the client system having the Apple OS operating thereon if a portion of the compliance mechanism is invalidated. | 11-21-2013 |
20130312121 | NON-AUTHENTIC DISC DEACTIVATION METHOD - An optical disc undergoes authentication by reading a designated area on the optical disc containing authentication data. Following authentication, the designated area undergoes irradiation by the laser beam that reads the optical disc to erase recordable sectors in the designated area when the optical disc comprises a recordable disc to render unreadable data contained in the designated area for disc authentication. | 11-21-2013 |
20140150123 | USING RECEIPTS TO CONTROL ASSIGNMENTS OF ITEMS OF CONTENT TO USERS - The described embodiments comprise an electronic device that executes an application, the electronic device including a processing subsystem. In these embodiments, the processing subsystem is configured to acquire a receipt associated with the application, wherein the application was purchased by a purchasing entity and installed on the electronic device after being assigned to a user of the electronic device by the purchasing entity. The processing subsystem is further configured to determine, using the receipt, if the application has expired. When the application has not expired, The processing subsystem is configured to execute the application with predetermined functions of the application enabled. When the application has expired, The processing subsystem is configured to execute the application with the predetermined functions of the application disabled. | 05-29-2014 |
20140223583 | SYSTEM, METHOD, AND PROGRAM PRODUCT FOR DIGITAL PRODUCTION MANAGEMENT - Systems, methods, and program products for managing digital production from one or more production devices with one or more sources providing inputs of production designs and/or production options are disclosed. | 08-07-2014 |
20140289875 | METHOD AND SYSTEM FOR ENSURING SENSITIVE DATA ARE NOT ACCESSIBLE - A method and an analysis system that help ensure that sensitive data, including in particular patient data, are not accessible to unauthorized persons is presented. The method and system help prevent sensitive data stored on portable devices from being transported along with a portable device to a location outside of a security perimeter. By determining if a portable device is outside of the security perimeter and then automatically erasing the sensitive data stored on the portable device if that is the case, the method and system help prevent disclosure of sensitive data to unauthorized persons. | 09-25-2014 |
20160063265 | PHOTOGRAPHIC COPY PREVENTION OF A SCREEN IMAGE - A method for preventing photographic capture of a displayed image on an electronically controlled screen using a photographic capture device is provided. The method includes intercepting an image for display; generating a plurality of subset frames based on the intercepted image; dividing the intercepted image into a plurality of subsections; generating a pseudo random number on each of the subsections within the plurality of subsections using a pseudo random number generator; mapping, on each of the subset frames within the plurality of subset frames, a group of subsections within the plurality of subsections that share a common generated pseudo random number; and determining a frame rate value for displaying the plurality of subset frames, which enables human visualization of the plurality of subset frames as a single perceived frame. | 03-03-2016 |
20160171191 | INFORMATION PROCESSING APPARATUS, EVALUATION METHOD, AND STORAGE MEDIUM FOR EVALUATING APPLICATION PROGRAM | 06-16-2016 |
20160378958 | INFORMATION DISCRIMINATING DEVICE, INFORMATION DISCRIMINATING METHOD, AND NON-TRANSITORY STORAGE MEDIUM STORING INFORMATION DISCRIMINATING PROGRAM - An information discriminating device includes an information acquiring unit, an information discriminating unit, and an information superimposing unit. The information acquiring unit acquires private information to be privately used by a user of the information discriminating device. The information discriminating unit discriminates a public information portion that is also usable as public information accessible by a special majority in the private information acquired by the information acquiring unit from a private information portion unusable as the public information. The information superimposing unit superimposes the private information portion on the public information. | 12-29-2016 |