ATE536580T1 - Verfahren zum kontrollieren des zugriffs auf gesicherte inhaltsdaten - Google Patents

Verfahren zum kontrollieren des zugriffs auf gesicherte inhaltsdaten

Info

Publication number
ATE536580T1
ATE536580T1 AT01974503T AT01974503T ATE536580T1 AT E536580 T1 ATE536580 T1 AT E536580T1 AT 01974503 T AT01974503 T AT 01974503T AT 01974503 T AT01974503 T AT 01974503T AT E536580 T1 ATE536580 T1 AT E536580T1
Authority
AT
Austria
Prior art keywords
controlling access
content data
secured content
access
operating system
Prior art date
Application number
AT01974503T
Other languages
English (en)
Inventor
Martin Richard Lambert
Original Assignee
Sealedmedia Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sealedmedia Ltd filed Critical Sealedmedia Ltd
Application granted granted Critical
Publication of ATE536580T1 publication Critical patent/ATE536580T1/de

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/106Enforcing content protection by specific content processing
    • G06F21/1064Restricting content processing at operating system level
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/125Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code
    • G06F21/126Interacting with the operating system
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6281Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database at program execution time, where the protection is within the operating system
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/629Protecting access to data via a platform, e.g. using keys or access control rules to features or functions of an application
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2147Locking files
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2149Restricted operating environment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/101Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measures for digital rights management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Technology Law (AREA)
  • Multimedia (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)
  • Selective Calling Equipment (AREA)
  • Transition And Organic Metals Composition Catalysts For Addition Polymerization (AREA)
  • Hardware Redundancy (AREA)
AT01974503T 2000-10-11 2001-10-11 Verfahren zum kontrollieren des zugriffs auf gesicherte inhaltsdaten ATE536580T1 (de)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GBGB0024919.3A GB0024919D0 (en) 2000-10-11 2000-10-11 Method of further securing an operating system
PCT/GB2001/004544 WO2002031632A2 (en) 2000-10-11 2001-10-11 A method for controlling access to protected content

Publications (1)

Publication Number Publication Date
ATE536580T1 true ATE536580T1 (de) 2011-12-15

Family

ID=9901090

Family Applications (1)

Application Number Title Priority Date Filing Date
AT01974503T ATE536580T1 (de) 2000-10-11 2001-10-11 Verfahren zum kontrollieren des zugriffs auf gesicherte inhaltsdaten

Country Status (6)

Country Link
US (1) US7761706B2 (de)
EP (1) EP1386206B1 (de)
AT (1) ATE536580T1 (de)
AU (1) AU2001294017A1 (de)
GB (1) GB0024919D0 (de)
WO (1) WO2002031632A2 (de)

Families Citing this family (62)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7529929B2 (en) * 2002-05-30 2009-05-05 Nokia Corporation System and method for dynamically enforcing digital rights management rules
AU2003253106A1 (en) 2002-07-04 2004-01-23 Gyne Ideas Ltd Medical implant
US7383586B2 (en) * 2003-01-17 2008-06-03 Microsoft Corporation File system operation and digital rights management (DRM)
US7100047B2 (en) * 2003-01-23 2006-08-29 Verdasys, Inc. Adaptive transparent encryption
US7814021B2 (en) * 2003-01-23 2010-10-12 Verdasys, Inc. Managed distribution of digital assets
US7472272B2 (en) * 2003-01-23 2008-12-30 Verdasys, Inc. Digital asset usage accountability via event journaling
US8136155B2 (en) * 2003-04-01 2012-03-13 Check Point Software Technologies, Inc. Security system with methodology for interprocess communication control
US7478408B2 (en) * 2003-04-04 2009-01-13 Sesma Systems, Inc. System and method for accessing objects in a platform dependent environment from a platform independent environment
US7490332B2 (en) * 2003-04-04 2009-02-10 Sesma Systems, Inc. System and method for accessing ActiveX objects in a platform dependent environment from objects in a platform independent environment
JP5242915B2 (ja) * 2003-06-05 2013-07-24 インタートラスト テクノロジーズ コーポレイション ピア・ツー・ピアサービス編成ための相互運用システム及び方法
US7712140B2 (en) * 2003-08-04 2010-05-04 Lsi Corporation 3-prong security/reliability/real-time distributed architecture of information handling system
US7434048B1 (en) * 2003-09-09 2008-10-07 Adobe Systems Incorporated Controlling access to electronic documents
JP2005157059A (ja) * 2003-11-27 2005-06-16 Seiko Epson Corp 照明装置及びプロジェクタ
ATE436047T1 (de) * 2003-12-30 2009-07-15 Wibu Systems Ag Verfahren zum steuern eines datenverarbeitungsgeräts
US20050262568A1 (en) * 2004-05-18 2005-11-24 Hansen Mark D System and method for managing access to protected content by untrusted applications
US7502481B2 (en) 2004-08-31 2009-03-10 Microsoft Corporation Microphone with ultrasound/audible mixing chamber to secure audio path
US7739720B2 (en) * 2004-10-14 2010-06-15 Microsoft Corporation Method and system for merging security policies
US8776206B1 (en) * 2004-10-18 2014-07-08 Gtb Technologies, Inc. Method, a system, and an apparatus for content security in computer networks
US7784103B2 (en) * 2004-10-19 2010-08-24 Rovi Solutions Corporation Method and apparatus for storing copy protection information separately from protected content
US7907727B2 (en) * 2004-10-19 2011-03-15 Rovi Solutions Corporation System and method for allowing copying or distribution of a copy protected signal
US7373446B2 (en) * 2004-11-05 2008-05-13 Microsoft Corporation Method and system for dynamically patching an operating system's interrupt mechanism
US7984513B1 (en) * 2005-02-09 2011-07-19 Liquid Machines, Inc. Method and system for using a rules engine for enforcing access and usage policies in rights-aware applications
US7895651B2 (en) 2005-07-29 2011-02-22 Bit 9, Inc. Content tracking in a network security system
US8984636B2 (en) 2005-07-29 2015-03-17 Bit9, Inc. Content extractor and analysis system
US8272058B2 (en) 2005-07-29 2012-09-18 Bit 9, Inc. Centralized timed analysis in a network security system
US20070204078A1 (en) * 2006-02-09 2007-08-30 Intertrust Technologies Corporation Digital rights management engine systems and methods
US8572372B2 (en) * 2005-10-18 2013-10-29 Telecom Italia S.P.A. Method for selectively enabling access to file systems of mobile terminals
EP2128780A3 (de) * 2005-10-18 2010-04-07 Intertrust Technologies Corporation Digitales Rechteverwaltungsantriebssystem und Verfahren
US9274974B1 (en) 2005-10-21 2016-03-01 Vmware, Inc. Isolating data within a computer system using private shadow mappings
US8214296B2 (en) * 2006-02-14 2012-07-03 Microsoft Corporation Disaggregated secure execution environment
US10528705B2 (en) * 2006-05-09 2020-01-07 Apple Inc. Determining validity of subscription to use digital content
US9971776B1 (en) * 2006-06-29 2018-05-15 Veritas Technologies Llc Method and apparatus for extending functionality of an operating system
US9218464B2 (en) * 2006-10-20 2015-12-22 Adobe Systems Incorporated Interception of controlled functions
US20100031342A1 (en) * 2007-04-12 2010-02-04 Honeywell International, Inc Method and system for providing secure video data transmission and processing
KR20080103225A (ko) * 2007-05-23 2008-11-27 삼성전자주식회사 컨텐츠의 암호화 전송 방법 및 복호화 방법과 그 장치
WO2009028873A2 (en) * 2007-08-29 2009-03-05 Cdnetworks Co., Ltd. Protection against unauthorized copying of digital media content
US9740637B2 (en) 2007-10-30 2017-08-22 Vmware, Inc. Cryptographic multi-shadowing with integrity verification
US8261265B2 (en) * 2007-10-30 2012-09-04 Vmware, Inc. Transparent VMM-assisted user-mode execution control transfer
US8117243B2 (en) * 2008-02-21 2012-02-14 Oracle America, Inc. Dynamic transactional instantiation of system configuration using a virtual file system layer
US8769675B2 (en) * 2008-05-13 2014-07-01 Apple Inc. Clock roll forward detection
US8245308B2 (en) * 2008-06-04 2012-08-14 Microsoft Corporation Using trusted third parties to perform DRM operations
US8484616B1 (en) * 2009-06-23 2013-07-09 Emc Corporation Universal module model
US20100333079A1 (en) * 2009-06-30 2010-12-30 Computer Associates Think, Inc. Binary Code Modification System and Method for Implementing Identity and Access Management or Governance Policies
US20100333065A1 (en) * 2009-06-30 2010-12-30 Computer Assoicates Think, Inc. Binary code modification system and method for implementing a web service interface
US20110213971A1 (en) * 2010-03-01 2011-09-01 Nokia Corporation Method and apparatus for providing rights management at file system level
US8365192B2 (en) 2011-01-14 2013-01-29 Apple Inc. Methods for managing authority designation of graphical user interfaces
US8473961B2 (en) 2011-01-14 2013-06-25 Apple Inc. Methods to generate security profile for restricting resources used by a program based on entitlements of the program
KR20120050742A (ko) * 2010-11-11 2012-05-21 삼성에스디에스 주식회사 커널 네이티브 에이피아이의 후킹 처리를 통한 디지털 저작권 관리 장치 및 방법
CA2832752A1 (en) 2011-04-11 2012-10-18 Intertrust Technologies Corporation Information security systems and methods
US9213827B2 (en) * 2012-09-27 2015-12-15 Intel Corporation Security data aggregation and business intelligence for web applications
US9560026B1 (en) * 2013-01-22 2017-01-31 Amazon Technologies, Inc. Secure computer operations
US9377940B2 (en) * 2013-02-28 2016-06-28 Facebook, Inc. Predictive pre-decoding of encoded media item
US20140258720A1 (en) * 2013-03-11 2014-09-11 Barracuda Networks, Inc. Systems and methods for transparent per-file encryption and decryption via metadata identification
US10102384B2 (en) * 2013-05-30 2018-10-16 Jscrambler S.A. Digital content execution control mechanism
EP3005209B1 (de) * 2013-05-30 2021-02-17 JScrambler S.A. Webanwendungsschutz
CN103778382A (zh) * 2014-01-16 2014-05-07 宇龙计算机通信科技(深圳)有限公司 加密文件的访问方法及通信终端
US11134063B2 (en) * 2014-03-12 2021-09-28 Akamai Technologies, Inc. Preserving special characters in an encoded identifier
IN2014CH01484A (de) 2014-03-20 2015-09-25 Infosys Ltd
WO2016026532A1 (en) * 2014-08-21 2016-02-25 Irdeto B.V. User authentication using a randomized keypad over a drm secured video path
US9940486B2 (en) * 2015-02-23 2018-04-10 Cisco Technology, Inc. Detection of hardware tampering
US10572675B2 (en) 2016-11-02 2020-02-25 Cisco Technology, Inc. Protecting and monitoring internal bus transactions
CN114647821B (zh) * 2022-02-10 2025-03-14 北京奇艺世纪科技有限公司 一种录屏检测方法、装置、设备及存储介质

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5027273A (en) * 1985-04-10 1991-06-25 Microsoft Corporation Method and operating system for executing programs in a multi-mode microprocessor
JPH07230380A (ja) * 1994-02-15 1995-08-29 Internatl Business Mach Corp <Ibm> 適用業務プログラムの利用管理方法およびシステム
CN101398871B (zh) * 1995-02-13 2011-05-18 英特特拉斯特技术公司 用于安全交易管理和电子权利保护的系统和方法
US5671417A (en) * 1995-08-11 1997-09-23 International Business Machines Corporation Method and system for inserting floating code hooks into multiple versions of code
US5899987A (en) * 1995-10-03 1999-05-04 Memco Software Ltd. Apparatus for and method of providing user exits on an operating system platform
US6868495B1 (en) * 1996-09-12 2005-03-15 Open Security Solutions, Llc One-time pad Encryption key Distribution
US6141698A (en) * 1997-01-29 2000-10-31 Network Commerce Inc. Method and system for injecting new code into existing application code
US5974549A (en) * 1997-03-27 1999-10-26 Soliton Ltd. Security monitor
US6282657B1 (en) * 1997-09-16 2001-08-28 Safenet, Inc. Kernel mode protection
WO1999039261A1 (en) * 1997-10-09 1999-08-05 The Learning Company Windows api trapping system
US7213247B1 (en) * 2000-01-10 2007-05-01 Wind River Systems, Inc. Protection domains for a computer operating system

Also Published As

Publication number Publication date
GB0024919D0 (en) 2000-11-22
WO2002031632A3 (en) 2003-11-20
US20040054894A1 (en) 2004-03-18
US7761706B2 (en) 2010-07-20
EP1386206A2 (de) 2004-02-04
AU2001294017A1 (en) 2002-04-22
WO2002031632A2 (en) 2002-04-18
EP1386206B1 (de) 2011-12-07

Similar Documents

Publication Publication Date Title
ATE536580T1 (de) Verfahren zum kontrollieren des zugriffs auf gesicherte inhaltsdaten
GB2386456A (en) Computer system with operating system on a ram-disk
TW200513866A (en) Access method
BRPI0511223A8 (pt) &#34;sistema hospedeiro&#34;
TW200745854A (en) Self prefetching L2 cache mechanism for data lines
DE10249427B4 (de) Verfahren zum Definieren des Sicherheitszustands eines Computersystems
TW200634548A (en) System and method for selectively installing an operating system to be remotely booted within a storage area network
EE200400053A (et) Meetod ja süsteem andmete töötlemiseks elektroonilises seadmes, elektrooniline seade ja töötlusplokk
DE602006020288D1 (de) Sicheres endgerät, routine und verfahren zum schützen eines geheimen schlüssels
DE502005004396D1 (de) Vorrichtung für sicheren Fernzugriff
ATE517376T1 (de) Verfahren zur zugriffskontrolle auf eine automatisierungsanlage
IL157542A0 (en) System and method for restoring computer systems damaged by a malicious computer program
PT1336937E (pt) Sistema de controlo de acesso, processo de controlo de acesso e dispositivos adequados aos mesmos
WO2005022414A3 (en) Method and apparatus for protecting private information within a database
ATE528729T1 (de) Verfahren und system zur vermittlung plattformunabhängiger fernsteurervorrichtung und zur überwachung der einrichtungszugriffskontrolle
HRP20060151A2 (en) The method of safe certification service
BR0014534A (pt) Método baseado em computador e sistema para controlar um processo industrial
ATE533101T1 (de) Bedienvorrichtung
WO2002023801A3 (de) Verfahren zur steuerung des zugriffs
ATE507536T1 (de) Verfahren und vorrichtung zum verbessern des schutzes der mit rechnern präsentierten informationen
WO2001052061A3 (en) Method and apparatus for using an assist processor to pre-fetch data values for a primary processor
GB2437888A (en) System for restricted cache access during data transfers and method thereof
DE602005011295D1 (de) Verfahren und vorrichtung zum schützen von systemdaten auf einer computerfestplatte
FR2906960B1 (fr) Procede de mise a disposition cloisonnee d&#39;un service electronique.
ATE271419T1 (de) Katalysator und verfahren zur dehydrierung von kohlenwasserstoffe