Data protection systems and methods

Electrical computers and digital processing systems: support – Data processing protection using cryptography – By stored data protection

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S189000, C726S016000, C726S017000, C726S021000, C726S026000

Reexamination Certificate

active

09653517

ABSTRACT:
Systems and methods are provided for protecting electronic content from the time it is packaged through the time it is experienced by an end user. Protection against content misuse is accomplished using a combination of encryption, watermark screening, detection of invalid content processing software and hardware, and/or detection of invalid content flows. Encryption protects the secrecy of content while it is being transferred or stored. Watermark screening protects against the unauthorized use of content. Watermark screening is provided by invoking a filter module to examine content for the presence of a watermark before the content is delivered to output hardware or software. The filter module is operable to prevent delivery of the content to the output hardware or software if it detects a predefined protection mark. Invalid content processing software is detected by a monitoring mechanism that validates the software involved in processing protected electronic content. Invalid content flows can be detected by scanning the information passed across system interfaces for the attempted transfer of bit patterns that were released from an application and/or a piece of content management software.

REFERENCES:
patent: 4672572 (1987-06-01), Alsberg
patent: 4799156 (1989-01-01), Shavit et al.
patent: 4823264 (1989-04-01), Deming
patent: 4827508 (1989-05-01), Shear
patent: 4930073 (1990-05-01), Cina, Jr.
patent: 5103476 (1992-04-01), Waite et al.
patent: 5111390 (1992-05-01), Ketcham
patent: 5126728 (1992-06-01), Hall
patent: 5224163 (1993-06-01), Gasser et al.
patent: 5319705 (1994-06-01), Halter et al.
patent: 5343527 (1994-08-01), Moore
patent: 5390330 (1995-02-01), Talati
patent: 5491800 (1996-02-01), Goldsmith et al.
patent: 5530235 (1996-06-01), Stefik et al.
patent: 5534975 (1996-07-01), Stefik et al.
patent: 5613089 (1997-03-01), Hornbuckle
patent: 5629980 (1997-05-01), Stefik et al.
patent: 5634012 (1997-05-01), Stefik et al.
patent: 5638443 (1997-06-01), Stefik et al.
patent: 5640546 (1997-06-01), Gopinath et al.
patent: 5692047 (1997-11-01), McManis
patent: 5715403 (1998-02-01), Stefik
patent: 5745678 (1998-04-01), Herzberg et al.
patent: 5748960 (1998-05-01), Fischer
patent: 5757914 (1998-05-01), McManis
patent: 5797127 (1998-08-01), Walker et al.
patent: 5835896 (1998-11-01), Fisher et al.
patent: 5845281 (1998-12-01), Benson et al.
patent: 5890138 (1999-03-01), Godin et al.
patent: 5892900 (1999-04-01), Ginter et al.
patent: 5897620 (1999-04-01), Walker et al.
patent: 5905975 (1999-05-01), Ausubel
patent: 5910987 (1999-06-01), Ginter et al.
patent: 5915019 (1999-06-01), Ginter et al.
patent: 5920861 (1999-07-01), Hall et al.
patent: 5926796 (1999-07-01), Walker et al.
patent: 5940504 (1999-08-01), Griswold
patent: 5943422 (1999-08-01), Van Wie et al.
patent: 6052780 (2000-04-01), Glover
patent: 6064739 (2000-05-01), Davis
patent: 6088801 (2000-07-01), Grecsek
patent: 6112181 (2000-08-01), Shear et al.
patent: 6157721 (2000-12-01), Shear et al.
patent: 6185683 (2001-02-01), Ginter et al.
patent: 6236727 (2001-05-01), Ciacelli et al.
patent: 6327652 (2001-12-01), England et al.
patent: 6330670 (2001-12-01), England et al.
patent: 1-36815/97 (1998-02-01), None
patent: A-36816/97 (1998-02-01), None
patent: A-36840/97 (1998-02-01), None
patent: 0 128 672 (1984-12-01), None
patent: 0 399 822 (1990-11-01), None
patent: 0 421 409 (1991-04-01), None
patent: 0 565 314 (1993-10-01), None
patent: 0 715 247 (1996-06-01), None
patent: 0 913 757 (1999-05-01), None
patent: 915620 (1999-05-01), None
patent: 2 264 796 (1993-09-01), None
patent: WO 90/02382 (1990-03-01), None
patent: WO 92/22870 (1992-12-01), None
patent: WO 93/01550 (1993-01-01), None
patent: WO 94/03859 (1994-02-01), None
patent: WO 94/06103 (1994-03-01), None
patent: WO 96/27155 (1996-09-01), None
patent: WO 97/43761 (1997-11-01), None
patent: WO 98/09209 (1998-03-01), None
patent: WO 98/10381 (1998-03-01), None
patent: WO 98/37481 (1998-08-01), None
patent: WO 98/45768 (1998-10-01), None
patent: WO 99/01815 (1999-01-01), None
patent: WO 99/24928 (1999-05-01), None
patent: WO 99/48296 (1999-09-01), None
patent: WO 00/75925 (2000-06-01), None
patent: WO 01/10076 (2001-02-01), None
SDMI, “SDMI Portable Device Specification”, Jul. 8, 1999, Part 1, Version 1.0.
Internet Engineering Task Force (IETF) RFC 2693—SPKI Certificate Theory, Sep. 1999, available at http://www.ietf.org/rfc/rfc2693.txt?number=2693, 39 pages.
“Microsoft Authenticode Technology: Ensuring Accountability and Authenticity for Software Components on the Internet,” Microsoft Corporation Shite Paper, Oct. 1996, 14 pages.
M. Blaze, et al., “Decentralized Trust Management,” Proceedings IEEE Symposium on Security and Privacy, May 1996, pp. 164-173.
S. Berkovits, et al., “Authentication of Mobile Agents,”Mobile Agents and Security,Giovanni Vigna, Ed., Springer-Verlag, 1998, pp. 114-136.
D. Chess, “Security Issues in Mobile Code Systems,”Mobile Agents and Security,Giovanni Vigna, Ed., Springer-Verlag, 1998, pp. 1-14.
Li Gong, et al., “Signing, sealing and guarding java objects,”Lecture Notes in Computer Science,vol. 1419, Mobile Agents, and Security, G. Vigna, Ed., Springer-Verlag, 1998, pp. 206-216.
F. Hohl, “Time Limited Blackbox Security: Protecting Mobile Agents from Malicious Hosts”,Lecture Notes in Computer Science,vol. 1419, Mobile Agents and Security, G. Vigna, Ed., Springer-Verlag, 1998, pp. 90-111.
T. Sander, et al., “Protecting Mobile Agents Against Malicious Hosts,”Lecture Notes in Computer Science,vol. 1419, Mobile Agents and Security, G. Vigna, Ed., Springer-Verlag, 1998, 16 pages.
T. Sander, et al., “Towards Mobile Cryptography,”International Computer Science Institute,Berkeley, CA, TR-97-049, Nov. 22, 1997, pp. 1-14.
Hal Varian, “Buying, Sharing and Renting Information Goods”, University of California at Berkeley, Dec. 1994, Current Version: May 14, 1999.
Hal Varian, “Economic Mechanism Design for Computerized Agents”, School of Information Management and Systems, University of California at Berkeley, not dated.
Hal Varian, “Pricing Electronic Journals”, D-Lib Magazine, Jun. 1996, ISSN 1082-9873.
Hal Varian, “Pricing Information Goods”, University of Michigan, Jun. 1995.
Steve R. White et al., “ABYSS: A Trusted Architecture for Software Protection”, 1987 IEEE, IBM Thomas J. Watson Research Center, Yorktown Heights, New York 10598, pp. 39-51.
Baker, A.,The Windows NT Device Driver Book, Prentice Hall, NJ, 1997.
Borodin, A. et al.,Online Computation and Competitive Analysis, Cambridge University Press, 1998.
Born, G.,Inside the Registry for Microsoft® Windows® 95, Microsoft Press, Washington, 1997.
Brassil, J. et al., “Copyright Protection for the Electronic Distribution of Text Documents,”Proceedings of the IEEE,vol. 87, No. 7, Jul. 1999, pp. 1181-1196.
Cox, I. et al., “Watermarking as Communictions with Side Information,”Proceedings of the IEEE,vol. 87, No. 7, Jul. 1999, pp. 1127-1141.
Dekker, E. et al.,Developing Windows NT Device Drivers: A Programmer's Handbook, Addison-Wesley Longman, Inc., Massachusetts, 1999.
Hartung, F. et al., “Multimedia Watermarking Techniques,”Proceedings of the IEEE,vol. 87, No. 7, Jul. 1999, pp. 1079-1107.
Hennessy, J. et al.,Computer Architecture: A Quantitative Approach, 2d ed., Morgan Kaufmann Publishers, Inc., California, 1996.
Hernandez, J. et al., “Statistical Analysis of Watermarking Schemes for Copyright Protection of Images,”Proceedings of the IEEE,vol. 87, No. 7, Jul. 1999, pp. 1142-1166.
Kundur, D. et al., “Digital Watermarking for Telltale Tamper Proofing and Authentication,”Proceedings of the IEEE,vol. 87, No. 7, Jul. 1999, pp. 1167-1180.
Menezes, A. et al.,Handbook of applied Cryptography, CRC Press, 1996.
Patterson, D. et al.,Computer Organization and Design: The Hardware/Software Interface, 2d ed., Morgan Kaufmann Publisher

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Data protection systems and methods does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Data protection systems and methods, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Data protection systems and methods will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3918836

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.