Patents Assigned to Jamama, LLC
  • Patent number: 6643775
    Abstract: Three methods are disclosed for protecting software applications from unauthorized distribution and use (piracy). The first method involves using values generated by a conventional ESD (Electronic Security Device) to encrypt and/or decrypt user data (such as a file) that is generated and used by the application. In a preferred embodiment, the user data is encrypted (such as during a write to memory) using values returned by the ESD, and the user data is later decrypted using like values returned by a software-implemented ESD simulator. The second and third methods involve the use of special development tools that make the task of analyzing the application's copy protection code (such as the code used to encrypt and/or decrypt user data) significantly more difficult. Specifically, the second method involves using pseudocode to implement some or all of the application's copy protection functions.
    Type: Grant
    Filed: November 20, 1998
    Date of Patent: November 4, 2003
    Assignee: Jamama, LLC
    Inventors: Mark J. Granger, Cyrus E. Smith, Matthew I. Hoffman
  • Patent number: 6480959
    Abstract: Three methods are disclosed for protecting software applications from unauthorized distribution and use (piracy). The first method involves using values generated by a conventional ESD (Electronic Security Device) to encrypt and/or decrypt user data (such as a file) that is generated and used by the application. In a preferred embodiment, the user data is encrypted (such as during a write to memory) using values returned by the ESD, and the user data is later decrypted using like values returned by a software-implemented ESD simulator. The second and third methods involve the use of special development tools that make the task of analyzing the application's copy protection code (such as the code used to encrypt and/or decrypt user data) significantly more difficult. Specifically, the second method involves using pseudocode to implement some or all of the application's copy protection functions.
    Type: Grant
    Filed: November 20, 1998
    Date of Patent: November 12, 2002
    Assignee: Jamama, LLC
    Inventors: Mark J. Granger, Cyrus E. Smith, Matthew I. Hoffman
  • Patent number: 6334189
    Abstract: Three methods are disclosed for protecting software applications from unauthorized distribution and use (piracy). The first method involves using values generated by a conventional ESD (Electronic Security Device) to encrypt and/or decrypt user data (such as a file) that is generated and used by the application. In a preferred embodiment, the user data is encrypted (such as during a write to memory) using values returned by the ESD, and the user data is later decrypted using like values returned by a software-implemented ESD simulator. The second and third methods involve the use of special development tools that make the task of analyzing the application's copy protection code (such as the code used to encrypt and/or decrypt user data) significantly more difficult. Specifically, the second method involves using pseudocode to implement some or all of the application's copy protection functions.
    Type: Grant
    Filed: November 20, 1998
    Date of Patent: December 25, 2001
    Assignee: Jamama, LLC
    Inventors: Mark J. Granger, Cyrus E. Smith, Matthew I. Hoffman