The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.
The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.
Patent No.:
Date of Patent:
Sep. 23, 2014
Filed:
Jan. 12, 2012
James A. Merkle, Jr., Rochester Hills, MI (US);
Richard B. Levine, Marstons Mills, MA (US);
Andrew R. Lee, Marlborough, MA (US);
Daniel G. Howard, Mashpee, MA (US);
Daniel M. Goldman, North Falmouth, MA (US);
Jeffrey A. Pagliarulo, West Barnstable, MA (US);
John J. Hart, Iii, Mashpee, MA (US);
Jose L. Bouza, Osterville, MA (US);
James A. Merkle, Jr., Rochester Hills, MI (US);
Richard B. LeVine, Marstons Mills, MA (US);
Andrew R. Lee, Marlborough, MA (US);
Daniel G. Howard, Mashpee, MA (US);
Daniel M. Goldman, North Falmouth, MA (US);
Jeffrey A. Pagliarulo, West Barnstable, MA (US);
John J. Hart, III, Mashpee, MA (US);
Jose L. Bouza, Osterville, MA (US);
SCA IPLA Holdings Inc., New York, NY (US);
Abstract
A number of systems and methods, alone, or in combination, achieve various levels of protection against unauthorized modification and distribution of digital content. This encompasses at least unauthorized study, modification, monitoring, reconstruction, and any other means for subversion from the originally intended purpose and license model of the digital content. The invention combines a number of techniques that in whole, or in part, serve to protect such content from unauthorized modification, reconstructive engineering, or monitoring by third parties. This is accomplished by means of methods which protect against subversion by specific tools operating on specific platforms as well as general tools operating on general platforms. Specific time domain attacks are identified, code modification can be identified and reversed, and virtual and emulated systems are identified. In addition, identification of in-circuit emulator tools (both software and hardware), debuggers, and security threats to running programs can be achieved.