Copy Detection Patents (Class 726/32)
  • Patent number: 7975313
    Abstract: A system and method is provided for identifying the source of an unauthorized copy of content. The method includes embedding a unique user fingerprint code to into each of a plurality of authorized copies of content and identifying an unknown fingerprint code in an unauthorized copy of the content. Each member of the unknown fingerprint code is compared to each corresponding member in each of the user fingerprint codes. A score is assigned to each of the user fingerprint codes based on the comparison and users associated with scores exceeding a threshold are identified as a source of the unauthorized copy.
    Type: Grant
    Filed: August 14, 2007
    Date of Patent: July 5, 2011
    Assignee: International Business Machines Corporation
    Inventor: Jeffrey Bruce Lotspiech
  • Patent number: 7971017
    Abstract: A software installation system comprises an interface component that receives a request to access data resident upon a flash memory card. An installation component compares a unique identifier associated with the data with a unique identifier embedded within the flash memory card, and the installation component determines whether to allow access to the data based at least in part upon the comparison. The installation component prohibits access to the data if the unique identifier associated with the data does not match the unique identifier embedded within the flash memory card.
    Type: Grant
    Filed: August 21, 2006
    Date of Patent: June 28, 2011
    Assignee: Rockwell Automation Technologies, Inc.
    Inventors: Joseph Francis Mann, William N. Schroeder
  • Patent number: 7966498
    Abstract: A reproducing method is disclosed, that comprises the steps of determining whether or not additional data has been read from data that had been read from a loaded record medium, and when the determined result represents that the additional data has been read from the data, performing a reproducing process for the data that had been read from the record medium corresponding to reward data contained in the additional data.
    Type: Grant
    Filed: November 17, 2006
    Date of Patent: June 21, 2011
    Assignee: Sony Corporation
    Inventor: Yoichiro Sako
  • Patent number: 7966499
    Abstract: Systems and methods related to concealing mathematical and logical operations in software. Mathematical and logical operations are disguised by replacing them with logically equivalent expressions. Each equivalent expression has at least two expression constants whose values are based on scaling and bias constants assigned to variables in the original mathematical or logical operation. Each of the expression constants may also be based on additive or multiplicative inverses modulo n of the scaling and bias constants. By replacing the original operations with more complex but logically equivalent expressions containing variables that also involve more operations, the true nature of the original operations is disguised.
    Type: Grant
    Filed: January 24, 2005
    Date of Patent: June 21, 2011
    Assignee: Irdeto Canada Corporation
    Inventors: Arun Narayanan Kandanchatha, Yongxin Zhou
  • Publication number: 20110138487
    Abstract: A storage device and method for using a virtual file in a public memory area to access a plurality of protected files in a private memory area are disclosed. In one embodiment, a storage device receives a request from a host for access to a virtual file in the public memory area, wherein the virtual file is associated with a plurality of protected files stored in the private memory area. The storage device responds to the request by selecting and providing the host with access to one of the plurality of protected files stored in the private memory area. The storage device receives an additional request from the host for access to the virtual file and responds to the additional request by selecting and providing the host with access to a different one of the plurality of protected files stored in the private memory area.
    Type: Application
    Filed: December 9, 2009
    Publication date: June 9, 2011
    Inventors: Ehud Cohen, Eyal Ittah, Lola Grin, Uri Peltz, Irit Maor, Yonatan Halevi, Avraham Shmuel
  • Patent number: 7957529
    Abstract: A method to procure and audit digital rights management (DRM) event data by collecting a first set of event data in a first event data format, converting the first set of event data to one or more standardized event data formats, and communicating the first set of event data to an event data collection server for storage. The method may also include collecting a second set of event data in a second event data format, converting the second set of event data to one or more standardized event data formats, and communicating the second set of event data to the event data collection server for storage. The method may also include storing the first and second sets of event data in a centralized repository, authorizing access to the event data, and performing an event data audit corresponding to the event data.
    Type: Grant
    Filed: July 23, 2007
    Date of Patent: June 7, 2011
    Assignee: International Business Machines Corporation
    Inventors: Glenn E. Brew, James C. Mahlbacher, Joseph C. Polimeni
  • Patent number: 7954164
    Abstract: The invention relates to a method of copy detection of a record carrier. In one particular embodiment the table of content entries are mastered on the record carrier in a detectable non-standard way, e.g. the sequence of table of content entries is mixed or the number of repetitions is varied. According to another embodiment additional synchronization symbols are used in one or more subcode frames which can be detected by a read-out device in order to distinguish between an original or a copy of a record carrier.
    Type: Grant
    Filed: April 1, 2003
    Date of Patent: May 31, 2011
    Assignee: Koninklijke Philips Electronics N.V.
    Inventors: Petrus Henricus Cornelius Bentvelsen, Paulus Franciscus Vollebregt
  • Patent number: 7953853
    Abstract: A method provides for access to an electronic profile of a first client to a second client. The method comprises creating a network accessible electronic profile of the first client, wherein the electronic profile is accessible by an active object, wherein the active object is bound to the electronic profile. The method further comprises defining an access right of the second client, wherein the access right determines a portion of the electronic profile of available to the second client via the active object. The method verifies an identity of the second client, and provides access to the portion electronic profile to the second client via the active object, wherein the active object is transferable.
    Type: Grant
    Filed: December 28, 2001
    Date of Patent: May 31, 2011
    Assignee: International Business Machines Corporation
    Inventors: James Edward Christensen, Peter K. Malkin, Lewis Alexander Morrow, John T. Richards, Rhonda Rosenbaum
  • Patent number: 7953975
    Abstract: Disclosed herein is a method of generating anti-collusion fingerprint codes using a (na, n2a?2, na?1, n, 0, 1) GD-PBIBD. The fingerprint codes are generated using computer equipment that executes a program for executing a program for generating the fingerprint codes. The method includes step 1 of receiving an arbitrary prime number n and an arbitrary integer a larger than 3, step 2 of generating an n×n index matrix, step 3 of generating n n×n type_i matrixes, step 4 of generating an n2×n2 matrix using the n×n index matrix and the n×n type_i matrixes, step 5 of generating an na×n2a?2 matrix, and step 6 of extracting one arbitrary column from the na×n2a?2 matrix.
    Type: Grant
    Filed: September 5, 2007
    Date of Patent: May 31, 2011
    Assignee: Korea Advanced Institute of Science and Technology
    Inventors: Heung Kyu Lee, In Koo Kang, Sung Hyuk Park, Eun Mee Lee
  • Patent number: 7949124
    Abstract: An information processing apparatus that generates private information used as one of an encryption key for encrypting data or a generation key for generating falsification detection information used in detecting falsification of data, comprises a storage unit adapted to prestore key information, an input unit adapted to input calculation target information, a calculating unit adapted to perform a calculation on targeted information based on the key information held in the storage unit, a detecting unit adapted to detect a predetermined event, and a control unit adapted, when triggered by detection of the event by the detecting unit, to perform controls to generate the private information by making the calculating unit perform the calculation with the input calculation target information as the targeted information, and to place the key information stored in the storage unit in an unusable state.
    Type: Grant
    Filed: January 10, 2007
    Date of Patent: May 24, 2011
    Assignee: Canon Kabushiki Kaisha
    Inventors: Yasuhiro Nakamoto, Junichi Hayashi
  • Patent number: 7945924
    Abstract: A system and method is disclosed for detecting distribution of multimedia content. The volume level of data traffic is monitored for a plurality of users to select any users with high-bandwidth usage. The time of day and the day of the week may be considered when determining whether a user is a high-bandwidth user. Upon selecting a user as one with high-bandwidth usage, such user may be subject to packet inspections of data traffic streams. In some embodiments, content identification parameters or watermarks are added to one or more packets in a data traffic stream carrying multimedia content.
    Type: Grant
    Filed: November 15, 2007
    Date of Patent: May 17, 2011
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Zhi Li, Dipak Ghosal, Canhui Ou, Raghvendra Savoor
  • Patent number: 7937588
    Abstract: Improved techniques for making copy detection patterns and using them to detect copying relationships between digital representations. The techniques include techniques for including a message in a copy detection pattern without altering the copy detection patterns entropy and reading the message, techniques for using a copy detection pattern on an analog form to determine whether the analog form is an original analog form without reference to a digital representation of the original of the analog form's copy detection pattern, techniques for increasing the sensitivity of copy detection using copy detection patterns by modifying one of two copy detection patterns that are being compared to take into account alterations resulting from the copying process, techniques for distributing a copy detection pattern across a document, and techniques for using the entropy of a copy detection pattern to locate the copy detection pattern.
    Type: Grant
    Filed: January 6, 2005
    Date of Patent: May 3, 2011
    Assignee: Thomson Licensing
    Inventors: Justin Picard, Jian Zhao
  • Patent number: 7933031
    Abstract: Generation/non-generation of print data for a printer driver is controlled in correspondence with an external print policy for a document to be printed. The print policy includes a print policy file, and defines print-inhibited items in a predetermined description. The predetermined description includes a description directly stored in the print policy file, and a description that requires an external reference.
    Type: Grant
    Filed: December 20, 2005
    Date of Patent: April 26, 2011
    Assignee: Canon Kabushiki Kaisha
    Inventor: Masanori Aritomi
  • Patent number: 7934097
    Abstract: The disclosed embodiments are directed to a data management system, apparatus and process for uniquely identifying and protecting data. In preferred embodiments, the data management system comprises a data management server, a key generator, a source print generator and a source print detector. In some preferred embodiments, the data management system further comprises a data embedding system. Keys are created by the data management system for application to source files to create a fingerprint for the source file. The fingerprint is compared to unknown files to identify uses of the source file.
    Type: Grant
    Filed: September 26, 2000
    Date of Patent: April 26, 2011
    Assignee: BayTSP.com, Inc.
    Inventors: Mark M. Ishikawa, Gregory A. Piccionelli
  • Patent number: 7929695
    Abstract: A printing system and printer with an electronic signature capability, and a method thereof are provided. To print security documents using an electronic signature stored in a portable memory, the printing system of the invention includes a portable memory for storing an electronic signature. A memory interface connects detachably to the portable memory. A printer receives the electronic signature from the memory interface, composes the received electronic signature with print data, and executes a print operation. Accordingly, a stamping or signature process on numerous documents can be facilitated, and excessive stamping or signature execution can be prevented. Moreover, the electronic signature of the invention can be executed on various types of forms or documents.
    Type: Grant
    Filed: April 7, 2006
    Date of Patent: April 19, 2011
    Assignee: Samsung Electronics Co., Ltd.
    Inventors: Eun-ah Song, Hyun-sun Jung, Yong-geun Kim
  • Publication number: 20110083188
    Abstract: A TSR (Terminate and Stay Resident) program based virus, trojan, worm and copy protection of audio, video, digital, multi media, executable files and installable programs. The TSR is co-resident on the chip-set or the CPU of the system; the BIOS and the OS (Operating System), whereby it is an intrinsic part of the system and is uninstallable. The TSR monitors any attempt to copy, play, record, any designated copy protected audio, video, digital, multi media; or any attempt to copy, install or execute any executable files or such installable programs and seeks authorization and or authentication from a clearing house or by using a local authentication key, before playing, recording, storing, executing or installing such digital media. Additionally the TSR generates and inserts a unique digitally encrypted source signature that includes the machine number and the date and time code for pay per use and verification purposes.
    Type: Application
    Filed: October 7, 2010
    Publication date: April 7, 2011
    Inventor: Om Ahuja
  • Patent number: 7917958
    Abstract: A recording medium, such as a high-density and/or read-only recording medium, such as BD-ROM, which includes copy protection indicating information, which can identify whether copy protection information is needed or not for the playback of contents stored on the recording medium, and to methods and apparatuses for forming, recording, and reproducing data on the recording medium.
    Type: Grant
    Filed: March 6, 2006
    Date of Patent: March 29, 2011
    Assignee: LG Electronics Inc.
    Inventors: Sang Woon Suh, Jin Yong Kim
  • Patent number: 7912894
    Abstract: An engine identifying segments or portions of one source material or source file common to or found in another source material or file. The engine may receive a first data stream in binary form as well as a second stream in binary form. The engine may include a data stream processor or pre-processor programmed to translate the first and second data streams to generate respective first and second processed data streams. The commonality between the first and second processed data streams may be greater than the commonality between the first and second data streams themselves. Also, a comparator may be programmed to compare the first and second process data streams and identify binary segments found in both the first and second processed data streams.
    Type: Grant
    Filed: May 15, 2007
    Date of Patent: March 22, 2011
    Inventor: Phillip M. Adams
  • Publication number: 20110067118
    Abstract: A method and a system for protecting data, a storage device, and a storage device controller are provided. In the present method, when a host accesses data in the storage device, whether the host performs a play operation or a copy operation on the data is first determined. If the host performs the play operation on the data, the storage device continues to execute the play operation so as to allow the host to access the data. On the other hand, if the host performs the copy operation on the data, the storage device executes an interference procedure so as to prevent or retard the data from being copied into the host.
    Type: Application
    Filed: November 20, 2009
    Publication date: March 17, 2011
    Applicant: PHISON ELECTRONICS CORP.
    Inventors: Hsiang-Hsiung Yu, Yu-Chung Shen, Yun-Chieh Chen
  • Patent number: 7900049
    Abstract: A method of recognizing an audio and/or visual format in a digital transmission network such as the Internet wherein formats include a quasi-continuous or divided in packets sequence of data, at least part of the sequence of data is analyzed for the presence of one or more bit patterns, and a notice is given in response to recognition of a predetermined format in an analyzed bit pattern.
    Type: Grant
    Filed: February 27, 2002
    Date of Patent: March 1, 2011
    Assignee: Mayah Communications GmbH
    Inventors: Detlef Wiese, Georg Plenge, Joerg Rimkus
  • Patent number: 7895661
    Abstract: A method and system for network-based distribution of content are disclosed. The distribution of content is not only secure but also controlled. The security restricts access to content within media files during downloads as well as while stored at a server or client. In one embodiment, each media file is encrypted with a different, randomly generated key. The control over the distribution of the media file can serve to limit the subsequent distribution of media files from clients to other clients. In another embodiment, the control can permit media files to be shared on a limited number of different clients affiliated with the same user. The clients can vary with application but generally are computing devices that have memory storage. Often, the clients are personal computers or other computing devices that are capable of storing and presenting content to their users.
    Type: Grant
    Filed: April 26, 2004
    Date of Patent: February 22, 2011
    Assignee: Apple Inc.
    Inventors: Thomas Dowdy, Jeffrey L. Robbin, Guy L. Tribble, David Heller
  • Patent number: 7891010
    Abstract: An authentication function authenticates a PDA. The content database holds the usage conditions of a content and the information about the content. The communication function controls the reception of the usage conditions and the content information, both transmitted from the PDA. The content management function updates the usage conditions and the content information received, on the basis of the usage conditions and the content information held. The desired content is thereby retrieved quickly.
    Type: Grant
    Filed: August 27, 2007
    Date of Patent: February 15, 2011
    Assignee: Sony Corporation
    Inventors: Shinobu Kuriya, Akira Kurihara
  • Patent number: 7886362
    Abstract: An optical disc is authenticated by measuring physical attributes of the disc. A challenge is presented to the drive comprising the disc. The challenge includes locations on the disc to be used for authentication. The locations are determined each time the disc is to be authenticated. No restriction is placed on the locations on the medium, and no restriction is placed on the number of locations. Locations on the disc are accessed and an answer to the challenge is calculated in accordance with a physical attribute pertaining to the locations. The answer can include an angle between the locations, the physical separation between the locations, an amount of time elapsed between detection of the locations, an amount of time taken to read data between written between the locations, or a number of rotations occurring between detection of the locations. The answer is analyzed to determine the validity of the disc.
    Type: Grant
    Filed: April 13, 2007
    Date of Patent: February 8, 2011
    Assignee: Micrsoft Corporation
    Inventor: Hiroo Umeno
  • Patent number: 7877328
    Abstract: A communication system and so forth are provided by which registration or cancellation of a plurality of apparatus owned by a user can be executed efficiently. In the communication system, a content processing apparatus acquires a second source ID list of a content reproduction apparatus. If it is detected based on the second source ID list that the content reproduction apparatus is not yet registered in a management server and a recorder ID of the content processing apparatus is not yet registered in the second source ID list, the content processing apparatus recommends registration. If a registration instruction of the content reproduction apparatus is accepted, the content processing apparatus requests the management server to register the content reproduction apparatus. The content processing apparatus receives registration completion transmitted from the management server and adds a group ID stored in a first source ID list to the second source ID list of the content reproduction apparatus.
    Type: Grant
    Filed: July 21, 2005
    Date of Patent: January 25, 2011
    Assignee: Sony Corporation
    Inventor: Koujirou Tanaka
  • Patent number: 7870393
    Abstract: An apparatus and method for encoding and decoding additional information into a stream of digitized samples in an integral manner. The information is encoded using special keys. The information is contained in the samples, not prepended or appended to the sample stream. The method makes it extremely difficult to find the information in the samples if the proper keys are not possessed by the decoder. The method does not cause a significant degradation to the sample stream. The method is used to establish ownership of copyrighted digital multimedia content and provide a disincentive to piracy of such material.
    Type: Grant
    Filed: August 21, 2007
    Date of Patent: January 11, 2011
    Assignee: Wistaria Trading, Inc.
    Inventors: Scott A. Moskowitz, Marc Cooperman
  • Publication number: 20100306859
    Abstract: A system and method of secure copy and/or playback control of a usage protected frame-based work is disclosed. The method includes accessing serial copy management system information for the usage protected frame-based work. In addition, the method validates the serial copy management system information. Copy management information of the usage protected frame-based work is also accessed. In so doing, the copy management information is utilized to determine if a secure copy/playback application is authorized to generate a copy of the usage protected frame-based work. Thus the copy management information acts as a technological measure which “effectively controls access to a work” by requiring the application of information, with the authority of the copyright owner, to gain access to the work.
    Type: Application
    Filed: May 29, 2009
    Publication date: December 2, 2010
    Inventor: Hank Risan
  • Patent number: 7831832
    Abstract: Described herein is an implementation that produces a new representation of a digital good (such as an image) in a new defined representation domain. In particular, the representations in this new domain are based upon matrix invariances. In some implementations, the matrix invariances may, for example, heavily use singular value decomposition (SVD).
    Type: Grant
    Filed: January 6, 2004
    Date of Patent: November 9, 2010
    Assignee: Microsoft Corporation
    Inventors: S. Serdar Kozat, M. Kivanc Mihcak, Ramarathnam Venkatesan
  • Publication number: 20100281546
    Abstract: Files stored on a non-removable storage device of a computer system are susceptible to being deleted and to theft. The present invention ensures that vital data files are not lost and that removable storage devices are not used to steal data.
    Type: Application
    Filed: June 8, 2010
    Publication date: November 4, 2010
    Applicant: RMCL, INC.
    Inventors: Ronald M. Kruse, Jacob R. Graf
  • Publication number: 20100275273
    Abstract: A system and method for the prevention of malicious file copying detects a file copy operation indicative of copying a file to an electronic clipboard. If the file copy operation is detected, the computer reads file contents of the copied file, and scrambles the file contents. If a file paste operation indicative of the copied file being pasted to a designated file system path, the computer pastes the scrambled file to the designated file system path. File attributes of the scrambled file are the same as file attributes of the copied file.
    Type: Application
    Filed: November 4, 2009
    Publication date: October 28, 2010
    Applicant: HON HAI PRECISION INDUSTRY CO., LTD.
    Inventors: CHIH-CHIEH LIU, WEI-YUAN CHEN
  • Patent number: 7823127
    Abstract: Plagiarism of software source code is a serious problem in two distinct areas of endeavor—cheating by students at schools and intellectual property theft at corporations. A number of algorithms have been implemented to check source code files for plagiarism, each with their strengths and weaknesses. This invention detects plagiarism by comparing statements within source code of a first program to comments within source code of a second program.
    Type: Grant
    Filed: December 8, 2008
    Date of Patent: October 26, 2010
    Assignee: Software Analysis and Forensic Engineering Corp.
    Inventor: Robert Marc Zeidman
  • Patent number: 7823210
    Abstract: A rights management system is described in which, subsequent to recording a media resource, client-side equipment receives and stores recording definition information (RDI). The RDI provides information that can be used to recover the keys used to decrypt the media resource. When a client device subsequently wishes to consume the media resource, it can forward the RDI to an operations center. At the operations center, a transcription module validates the client device's rights and converts the RDI into client targeted information (CTI) by recovering the keys used to decrypt the media resource. The client device receives the CTI from the transcription module and uses it to consume the media resource. The CTI has an expiration date, after which it can no longer be used.
    Type: Grant
    Filed: May 23, 2006
    Date of Patent: October 26, 2010
    Assignee: Microsoft Corporation
    Inventors: Alexander Bessonov, John H. Grossman, IV
  • Patent number: 7814514
    Abstract: A digital broadcasting receiver includes a digital tuning section having a plurality of tuners which receive digital broadcasting and output video signals of programs as well as a copy control signal, and a controller which selects one of video signals supplied from the tuners based on the copy control signal supplied from the digital tuning section. The foregoing structure allows the receiver to output the videos of programs free from intermittence at the beginning of the program of which copy control signal is switched from the previous one.
    Type: Grant
    Filed: March 7, 2006
    Date of Patent: October 12, 2010
    Assignee: Panasonic Corporation
    Inventor: Hisami Ibaraki
  • Patent number: 7814564
    Abstract: To identify participants in collusion directed to altering a digital fingerprint embedded in multimedia content, an ECC based fingerprinting technique establishes a code symbol for each of a plurality of segments of digital data forming the multimedia content. The code symbols are concatenated to form a fingerprint signal, which is subdivided into a plurality of subsegments for each segment in the digital data. The subsegments are permuted and embedded into the digital data. When a suspicious copy of the multimedia content is discovered, the permuted fingerprint signal is extracted from the content and inversely permuted to form a test fingerprint. The identity of one of the colluders is determined by correlation with characteristics of the codeword originally assigned to the user. The determination of identity may be enhanced by the addition of group data embedded as an additional fingerprint in the digital data.
    Type: Grant
    Filed: January 6, 2006
    Date of Patent: October 12, 2010
    Assignee: University of Maryland
    Inventors: Shan He, Min Wu
  • Patent number: 7802311
    Abstract: A recording apparatus which executes copy control utilizing copy control information which is indicative of plural types of copy control includes an electronic watermark detection device, which detects a predetermined copy control information portion of the copy control information out of a content over which an electronic watermark expressing the copy control information is superimposed, and a recording device which records a content in accordance with a detection result obtained by the electronic watermark detection device.
    Type: Grant
    Filed: January 14, 2004
    Date of Patent: September 21, 2010
    Assignee: Panasonic Corporation
    Inventors: Kenji Muraki, Tetsuhiko Kaneaki
  • Patent number: 7801819
    Abstract: Methods and systems for controlling the distribution of digital content are provided. A license holder acquires protected content and an original digital license to the protected content from a content provider system. The license holder in turn delegates all or part of the grants in that original license to other qualified devices or clients. The content remains in its original, protected or encrypted form while it is delivered from the license holder to the client along with a digital sublicense that the client receives from the original license holder, whereupon the content can then be rendered. The original digital license defines or governs the conditions under which such delegation occurs, and includes terms under which such delegation is permitted to continue in order to enforce the intent of the content provider.
    Type: Grant
    Filed: October 1, 2004
    Date of Patent: September 21, 2010
    Assignees: Sony Corporation, Sony Electronics, Inc.
    Inventors: Eric John Swenson, Ryuji Ishiguro, Motohiko Nagano, Pierre Chavanne
  • Patent number: 7797245
    Abstract: A protectable content is inspected using both a first technique and a second technique that is different from the first technique. An area of interest in the protectable content is then identified based on the inspections.
    Type: Grant
    Filed: March 18, 2005
    Date of Patent: September 14, 2010
    Assignee: Black Duck Software, Inc.
    Inventor: Palle Martin Pedersen
  • Patent number: 7797550
    Abstract: Systems and methods that securely buffer content are provided. In one embodiment, a system may include, for example, a processor and a memory. The memory may be coupled to the processor. Before content leaves the processor for the memory, the processor may secure the content. After the secured content enters the processor from the memory, the processor may recover the content from the secured content.
    Type: Grant
    Filed: December 4, 2002
    Date of Patent: September 14, 2010
    Assignee: Broadcom Corporation
    Inventor: Jeffrey Douglas Carr
  • Patent number: 7793354
    Abstract: The present invention relates to a system for verifying data recorded on an information recording medium. The system includes a data reproduction unit for reproducing data recorded on an information recording medium, a reproduction-verification-data generation unit for executing a calculation based on the data reproduced by the data reproduction unit to generate reproduction verification data, and a data comparison unit for comparing the reproduction verification data with recording verification data, which is obtained by executing a calculation based on data to be recorded on the information recording medium.
    Type: Grant
    Filed: June 20, 2005
    Date of Patent: September 7, 2010
    Assignee: Sony Corporation
    Inventors: Shinichi Kazami, Kazuyoshi Takahashi
  • Patent number: 7792756
    Abstract: Providing subscription management in local communication regions. Upon detecting a computing device of a user within a predefined proximity, a media server provides the user with access to a corresponding user profile maintained by a media service. The user profile includes subscription information defining access by the user to media content items available from the media service. The user creates or renews a subscription to the media service while connected to the media server, and subsequently receives media content items from the media service.
    Type: Grant
    Filed: October 13, 2006
    Date of Patent: September 7, 2010
    Assignee: Microsoft Corporation
    Inventors: Daniel Plastina, David Jones, Ryan Alexander Haveson
  • Patent number: 7788504
    Abstract: Subversive DSV (SDSV) sequences of data symbols having a large absolute value of DSV are extremely valuable in the copy protection of optical discs as they can induce uncorrectable read errors. However, very few SDSV sequences of data symbols can be found in multimodal codes such as Eight-to-Sixteen Modulation (ESM) utilised in DVDs. It is required to select data symbols, for encoding using a multimodal code, which are capable of forcing an encoder to produce at least one subversive sequence of code words. A possible code word for a data symbol is selected if the code word has a large absolute value of DSV and there are no alternative code words, or all alternative code words are equivalent, or all alternatives except one are ruled out by RLL rules.
    Type: Grant
    Filed: May 19, 2005
    Date of Patent: August 31, 2010
    Assignee: Rovi Solutions Corporation
    Inventor: Carmen Laura Basile
  • Publication number: 20100212028
    Abstract: A method and system for protecting software products from unauthorized use and distribution is described. The system comprises a client process executed on a client computer coupled to a producer computer over a network. The method comprises the steps of providing to a user a copy of the distributed software, the distributed software comprising an incomplete executable program requiring a security module to be installed prior to execution on the client computer. The user receives a registration code for use with the distributed software. Upon attempted execution of the distributed software the producer computer requests user registration from the user. Upon receipt of the registration information including the registration code from the user, the producer computer validates the registration code and constructing a security module for transmission to the client computer. The security module is integrated with the distributed software to allow execution of the executable program.
    Type: Application
    Filed: March 23, 2010
    Publication date: August 19, 2010
    Inventors: Thomas Eriksson, Jurgen Wenzel, Tobias Karlsson
  • Patent number: 7779273
    Abstract: A mechanism is provided for booting a multiprocessor device based on selection of encryption keys to be provided to the processors. With the mechanism, a security key and one or more randomly generated key values are provided to a selector mechanism of each processor of the multiprocessor device. A random selection mechanism is provided in pervasive logic that randomly selects one of the processors to be a boot processor and thereby, provides a select signal to the selector of the boot processor such that the boot processor selects the security key. All other processors select one of the one or more randomly generated key values. As a result, only the randomly selected boot processor is able to use the proper security key to decrypt the boot code for execution.
    Type: Grant
    Filed: May 15, 2008
    Date of Patent: August 17, 2010
    Assignee: International Business Machines Corporation
    Inventors: Jason N. Dale, Jonathan J. DeMent, Clark M. O'Niell, Christopher J. Spandikow
  • Patent number: 7778421
    Abstract: An apparatus and a method are provided for selectively accessing digital content carried on a distribution medium such as a physical medium or a broadcast medium. In one embodiment, a plurality of digital content items are encrypted under a plurality of different key management blocks, wherein each key management block is associated with a different set of device keys. The plurality of content items may be provided together on a single distribution medium to devices having assigned device keys, so that devices may selectively access content as determined by the different key management block used to encrypt the various content items and by the device keys assigned to the devices. Depending on the association between the device key and the key management blocks, the decoding device may decode all of the content items, some of the content items, or none of the content items. To provide greater security, each content item may be multiple encrypted using multiple key management blocks per content item.
    Type: Grant
    Filed: February 12, 2007
    Date of Patent: August 17, 2010
    Assignee: International Business Machines Corporation
    Inventors: Thomas A. Bellwood, Matt F. Rutkowski
  • Patent number: 7774857
    Abstract: A computer-implemented method of protecting content includes receiving a request from a user to access the content. The user is enabled to perceive the content based on the request received from the user. The user is prevented from capturing the content when perception of the content is enabled. The method may be performed by a Java applet running in a network environment.
    Type: Grant
    Filed: December 3, 2007
    Date of Patent: August 10, 2010
    Assignee: AOL Inc.
    Inventor: Gary Crance
  • Patent number: 7774617
    Abstract: A mechanism is provided for masking a boot sequence by providing a dummy processor. With the mechanism, one of the processors of a multiprocessor system is chosen to be a boot processor. The other processors of the multiprocessor system execute masking code that generates electromagnetic and/or thermal signatures that mask the electromagnetic and/or thermal signatures of the actual boot processor. The execution of the masking code on the non-boot processors preferably generates electromagnetic and/or thermal signatures that approximate the signatures of the actual boot code execution on the boot processor. One of the non-boot processors is selected to execute masking code that is different from the other masking code sequence to thereby generate a electromagnetic and/or thermal signature that appears to be unique from an external monitoring perspective.
    Type: Grant
    Filed: May 15, 2008
    Date of Patent: August 10, 2010
    Assignee: International Business Machines Corporation
    Inventors: Jason N. Dale, Jonathan J. DeMent, Clark M. O'Niell, Steven L. Roberts
  • Publication number: 20100192126
    Abstract: An information processing apparatus is described which includes a list fetching section for fetching, from outside, a list of disabled contents information indicating disabling execution of an application program, when the contents data is subjected to a contents data reproducing/copying process for at least reproducing or copying the contents data. When it is determined that a type and/or a version of the application program identified by referring to the starting file corresponds to a type and/or a version of any disabled application program described in the list of disabled contents information, the starting file is not distributed to the application program.
    Type: Application
    Filed: April 1, 2010
    Publication date: July 29, 2010
    Applicant: Sony Corporation
    Inventors: Yasuharu SEKI, Yoshitaka ONUMA, Tatsuya KONNO
  • Patent number: 7761927
    Abstract: The invention provides a device driver for monitoring and controlling access to data on a computer readable medium. The device driver comprises an interface for access to a device-driver stack for a media drive, a detector for detecting the insertion of a computer readable medium in said media drive, and a monitor for monitoring data transfer from said computer readable medium. The monitor evaluates a behavior characteristic of an application accessing data on said computer readable medium, and indicates when said behavior characteristic fulfills predetermined criteria. A control system is responsive to said monitor for issuing at least one control output when said behavior characteristic fulfills said predetermined criteria. The invention also provides a method of monitoring and controlling access to data on a computer readable medium by means of the device driver.
    Type: Grant
    Filed: September 21, 2005
    Date of Patent: July 20, 2010
    Assignee: Rovi Solutions Limited
    Inventors: Jonny Boyd Reckless, Ori Dvir, Philippe Marcel Henri Selve, Carmen Laura Basile, Victor Kovner
  • Patent number: 7757295
    Abstract: Structures and methods within an integrated circuit for controlling access to secured information embedded therein. A security block embedded within an integrated circuit (e.g., an SOC) may control authorized and unauthorized access to secured information stored within a memory of the integrated circuit. The security block may combine security key techniques and structures with a counting technique and structure such that when a maximum number of unauthorized attempts are detected, all further access to the secured information will be denied thereby rendering the IC unusable. In one aspect, the counting features may be implemented using a one time programmable register comprising a plurality of one time programmable bits such that each bit may be set to indicate detection of an unauthorized access attempt. If all bits of the OTP register are so set, the maximum number of unauthorized attempts has been detected and the circuit precludes all further access attempts.
    Type: Grant
    Filed: February 9, 2005
    Date of Patent: July 13, 2010
    Assignee: LSI Corporation
    Inventor: Ardeshir Hadaaegh
  • Patent number: 7752137
    Abstract: A subset of unique codes are generated from a set of codes. The subset of codes are stored in a database on a secure server and each of the codes is marked on a corresponding instantiation of the product. The marked instantiations are distributed. During their distribution, the marked instantiations are verified for authenticity and for routing. This verification is performed by reading or scanning the codes on the instantiations, and transmitting that information to the secure server for comparison against the codes and other information located in the database contained therein.
    Type: Grant
    Filed: November 3, 2003
    Date of Patent: July 6, 2010
    Assignee: Meyers Printing Company
    Inventor: David Dillon
  • Patent number: 7747015
    Abstract: Copying of visual images by electronic devices is discouraged by metamerically altering the relative weights of the color components forming the visual images in a manner that is not perceptible to the human eye but which is perceptible in the copy. In a preferred technique, the visual images are represented by more than three primary color components whose relative values are varied in this manner. A primary application is to discourage copying by video cameras of movies displayed on theater movie screens, by causing the copies to contain unacceptable spatial or temporal variations in colors perceived by the human eye.
    Type: Grant
    Filed: April 8, 2008
    Date of Patent: June 29, 2010
    Assignee: QDesign USA, Inc.
    Inventors: Sergiy Bilobrov, Jason A. Lesperance