Method and apparatus for protection of electronic media

Information security – Prevention of unauthorized use of data including prevention...

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S193000, C380S201000, C705S051000, C726S029000, C726S032000, C726S022000, C709S203000, C709S205000

Reexamination Certificate

active

07150045

ABSTRACT:
Described is a system and method for providing protection of media by the detection of unauthorized client behaviors and the communication of the unauthorized client behaviors to augment the invention's detection abilities. A variety of detectors are sent to a client process and the responses are evaluated to detect the presence of an unauthorized software behavior on the client. Unauthorized behaviors include alteration of a client process as well as simultaneously running processes that might enable unauthorized copying of protected media. Communication of unauthorized software behaviors includes sharing of memory detectors among servers on a network, and the sending of memory detectors to other clients to detect previously unseen unauthorized behaviors on the other clients.

REFERENCES:
patent: 4694489 (1987-09-01), Frederiksen
patent: 5067035 (1991-11-01), Kudelski et al.
patent: 5134656 (1992-07-01), Kudelski
patent: 5144663 (1992-09-01), Kudelski et al.
patent: 5375168 (1994-12-01), Kudelski
patent: 5539450 (1996-07-01), Kudelski et al.
patent: 5590200 (1996-12-01), Nachman et al.
patent: 5592212 (1997-01-01), Handelman
patent: 5621799 (1997-04-01), Katta et al.
patent: 5640546 (1997-06-01), Gopinath et al.
patent: 5666412 (1997-09-01), Handelman et al.
patent: 5684876 (1997-11-01), Pinder et al.
patent: 5758257 (1998-05-01), Herz et al.
patent: 5774527 (1998-06-01), Handelman et al.
patent: 5774546 (1998-06-01), Handelman et al.
patent: 5799089 (1998-08-01), Kuhn et al.
patent: 5805705 (1998-09-01), Gray et al.
patent: 5825879 (1998-10-01), Davis
patent: 5878134 (1999-03-01), Handelman et al.
patent: 5883957 (1999-03-01), Moline et al.
patent: 5892900 (1999-04-01), Ginter et al.
patent: 5910987 (1999-06-01), Ginter et al.
patent: 5915019 (1999-06-01), Ginter et al.
patent: 5917912 (1999-06-01), Ginter et al.
patent: 5920625 (1999-07-01), Davies
patent: 5920861 (1999-07-01), Hall et al.
patent: 5922208 (1999-07-01), Demmers
patent: 5923666 (1999-07-01), Gledhill et al.
patent: 5933498 (1999-08-01), Schneck et al.
patent: 5937159 (1999-08-01), Meyers et al.
patent: 5939975 (1999-08-01), Tsuria et al.
patent: 5943422 (1999-08-01), Van Wie et al.
patent: 5949876 (1999-09-01), Ginter et al.
patent: 5953005 (1999-09-01), Liu
patent: 5982891 (1999-11-01), Ginter et al.
patent: 6009116 (1999-12-01), Bednarek et al.
patent: 6009401 (1999-12-01), Horstmann
patent: 6009525 (1999-12-01), Horstmann
patent: 6021197 (2000-02-01), von Willich et al.
patent: 6035037 (2000-03-01), Chaney
patent: 6038433 (2000-03-01), Vegt
patent: 6049671 (2000-04-01), Slivka et al.
patent: 6055503 (2000-04-01), Horstmann
patent: 6073256 (2000-06-01), Sesma
patent: 6112181 (2000-08-01), Shear et al.
patent: 6119165 (2000-09-01), Li et al.
patent: 6138119 (2000-10-01), Hall et al.
patent: 6151643 (2000-11-01), Cheng et al.
patent: 6157721 (2000-12-01), Shear et al.
patent: 6178242 (2001-01-01), Tsuria
patent: 6185683 (2001-02-01), Ginter et al.
patent: 6189097 (2001-02-01), Tycksen, Jr. et al.
patent: 6191782 (2001-02-01), Mori et al.
patent: 6192354 (2001-02-01), Bigus et al.
patent: 6201948 (2001-03-01), Cook et al.
patent: 6226794 (2001-05-01), Anderson, Jr. et al.
patent: 6237786 (2001-05-01), Ginter et al.
patent: 6240185 (2001-05-01), Van Wie et al.
patent: 6247950 (2001-06-01), Hallam et al.
patent: 6253193 (2001-06-01), Ginter et al.
patent: 6256668 (2001-07-01), Slivka et al.
patent: 6272636 (2001-08-01), Neville et al.
patent: 6285985 (2001-09-01), Horstmann
patent: 6292569 (2001-09-01), Shear et al.
patent: 6298441 (2001-10-01), Handelman et al.
patent: 6314409 (2001-11-01), Schneck et al.
patent: 6314572 (2001-11-01), LaRocca et al.
patent: 6330588 (2001-12-01), Freeman
patent: 6334213 (2001-12-01), Li
patent: 6363488 (2002-03-01), Ginter et al.
patent: 6389402 (2002-05-01), Ginter et al.
patent: 6405369 (2002-06-01), Tsuria
patent: 6409080 (2002-06-01), Kawagishi
patent: 6409089 (2002-06-01), Eskicioglu
patent: 6427140 (2002-07-01), Ginter et al.
patent: 6449367 (2002-09-01), Van Wie et al.
patent: 6449719 (2002-09-01), Baker
patent: 6459427 (2002-10-01), Mao et al.
patent: 6466670 (2002-10-01), Tsuria et al.
patent: 6505299 (2003-01-01), Zeng et al.
patent: 6587561 (2003-07-01), Sered et al.
patent: 6618484 (2003-09-01), Weber et al.
patent: 6629243 (2003-09-01), Kleinman et al.
patent: 6634028 (2003-10-01), Handelman
patent: 6640304 (2003-10-01), Ginter et al.
patent: 6651170 (2003-11-01), Rix
patent: 6654420 (2003-11-01), Snook
patent: 6654423 (2003-11-01), Jeong et al.
patent: 6658568 (2003-12-01), Ginter et al.
patent: 6668325 (2003-12-01), Collberg et al.
patent: 6671812 (2003-12-01), Balasubramaniam et al.
patent: 2002/0087883 (2002-07-01), Wohlgemuth et al.
patent: 2003/0007568 (2003-01-01), Hamery et al.
patent: 658054 (1995-06-01), None
patent: 714204 (1996-05-01), None
patent: 1 041 823 (1999-03-01), None
patent: WO96/06504 (1996-02-01), None
patent: WO96/32702 (1996-10-01), None
patent: WO 99/30499 (1999-06-01), None
patent: WO99/54453 (1999-10-01), None
patent: WO 01/35571 (2001-05-01), None
patent: WO 02/21761 (2002-03-01), None
Ghosh, A.K., et al, ‘Execution Control Lists: An Approach to Defending Against Newand Unknown Malicious Software’, Citigal, 2000, entire document, http://www.cigital.com/papers/download/ISW00.pdf.
Directed-Graph Epidemiological Models of Computer Viruses, Kephart and White, 1991 IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, California, May 20-22, 1991, pp. 343-359.
Computers and Epidemiology, Kephart, Chess, and White, IEEE Spectrum, May 1993, 15 pages.
A Biologically Inspired Immune System for Computers, Kephart, Artificial Life IV, R. Brooks and P. Maes, eds., 1994, MIT Press, pp. 1-10.
Self-Nonself Discrimination in a Computer, 1994 IEEE Symposium on Research in Security and Privacy, 11 pages.
An Immunological Approach to Change Detection: Algorithms, Analysis and Implications, 1996 IEEE Symposium on Securiyt and Privacy, 10 pages.
A Sense of Self for Unix Processes, Forrest, Hofmeyr, Somayaji, and Longstff, 1996 Symposium on Security and Privacy, Los Alamitos, CA, IEEE Computer Society Press, pp. 120-128.
After 1997, Lightweight Intrusion Detection for Networked Operating Systems, Hofmeyr, Forrest and Somayaji, pp. 1-31.
Principles of a Computer Immune System, Somayaji, Hofmeyr and Forrest, New Security Paradigms Workshop, Langdale, Cumbria, UK, 1997, pp. 75-82.
A Distributed Approach to Anomaly Detection, D'haeseleer, Forrest, and Helman, Draft, Aug. 30, 1997, pp. 1-30.
Blueprint for a Computer Immune System, Kephart, Sorkin, Swimmer and White, Virus Bulletin International Conference in San Francisco, California, Oct. 1-3, 1997, 19 pages.
1999, Architecture for an Artificial Immune Systems, Hofmeyr and Forrest, Evolutionary Computation 7(1):45-68, Massachusetts Institute of Technology, 31 pages.
Immunity by Design: An Artificial Immune System,Proceedings of the Genetic and Evolutionary Computation Conference(GECCO), Morgan-Kaufmann, San Francisco, CA, Hofmeyr, and Forrest, pp. 1289-1296 (1999).
Detecting Intrusions Using System Calls: Alternative Data Models, Warrender, Forrest, and Pearlmutter, 1999 IEEE Symposium on Security and Privacy, May 9-12, 1999, 13 pages.
After 2001, A New Approach for Intrusion Detection, Dasgupta and Gonzalez, pp. 1-12.
http://www.ntt.co.jp
ews
ews02e/0209/020927.html, Sep. 27, 2002.
Coverage and Generalization in an Artificial Immune System, Balthrop, et al., 2002.
Video Protection by Partial Content Corruption, C. Griwodz, Sep. 1998.
An Overview of Multimedia Content Protection in Consumer Electronics Devices, Eskicioglu et al.
Performance Study of a Selective Encryption Scheme for the Security of Networked, Real-Time Video, Spanos et al., 1995.
Goonatilake, Suran, ed. et al., Intelligent Systems for Finance and Business, 1995, chapters 2-10, pp. 31-173.
Irdeto Access and Optibase create Strategic Alliance—Dec. 14, 2000, http://www.irdetoaccess.com/press/0000041.htm.
System Security, Streaming Media, S. Blumenfeld, Oct. 2001.
http://www.cs.unm.edu/˜forest/proj

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and apparatus for protection of electronic media does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and apparatus for protection of electronic media, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for protection of electronic media will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3674037

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.